diff --git a/docs/AuthEnableMethodRequest.md b/docs/AuthEnableMethodRequest.md index 20854bb6..4ca0759c 100644 --- a/docs/AuthEnableMethodRequest.md +++ b/docs/AuthEnableMethodRequest.md @@ -10,7 +10,7 @@ Name | Type | Description | Notes **Local** | **bool** | Mark the mount as a local mount, which is not replicated and is unaffected by replication. | [optional] [default to false] **Options** | **Object** | The options to pass into the backend. Should be a json object with string keys and values. | [optional] **PluginName** | **string** | Name of the auth plugin to use based from the name in the plugin catalog. | [optional] -**PluginVersion** | **string** | The semantic version of the plugin to use. | [optional] +**PluginVersion** | **string** | The semantic version of the plugin to use, or image tag if oci_image is provided. | [optional] **SealWrap** | **bool** | Whether to turn on seal wrapping for the mount. | [optional] [default to false] **Type** | **string** | The type of the backend. Example: \"userpass\" | [optional] diff --git a/docs/AuthTuneConfigurationParametersRequest.md b/docs/AuthTuneConfigurationParametersRequest.md index 530746c5..1f6d78ea 100644 --- a/docs/AuthTuneConfigurationParametersRequest.md +++ b/docs/AuthTuneConfigurationParametersRequest.md @@ -13,7 +13,7 @@ Name | Type | Description | Notes **MaxLeaseTtl** | **string** | The max lease TTL for this mount. | [optional] **Options** | **Object** | The options to pass into the backend. Should be a json object with string keys and values. | [optional] **PassthroughRequestHeaders** | **List<string>** | A list of headers to whitelist and pass from the request to the plugin. | [optional] -**PluginVersion** | **string** | The semantic version of the plugin to use. | [optional] +**PluginVersion** | **string** | The semantic version of the plugin to use, or image tag if oci_image is provided. | [optional] **TokenType** | **string** | The type of token to issue (service or batch). | [optional] **UserLockoutConfig** | **Object** | The user lockout configuration to pass into the backend. Should be a json object with string keys and values. | [optional] diff --git a/docs/AwsConfigureClientRequest.md b/docs/AwsConfigureClientRequest.md index 286eb808..60537363 100644 --- a/docs/AwsConfigureClientRequest.md +++ b/docs/AwsConfigureClientRequest.md @@ -13,6 +13,7 @@ Name | Type | Description | Notes **SecretKey** | **string** | AWS Secret Access Key for the account used to make AWS API requests. | [optional] [default to ""] **StsEndpoint** | **string** | URL to override the default generated endpoint for making AWS STS API calls. | [optional] [default to ""] **StsRegion** | **string** | The region ID for the sts_endpoint, if set. | [optional] [default to ""] +**UseStsRegionFromClient** | **bool** | Uses the STS region from client requests for making AWS STS API calls. | [optional] [default to false] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/AwsLoginRequest.md b/docs/AwsLoginRequest.md index 9dc1e44a..d8e61cbf 100644 --- a/docs/AwsLoginRequest.md +++ b/docs/AwsLoginRequest.md @@ -4,7 +4,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**IamHttpRequestMethod** | **string** | HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. Currently, POST is the only supported value | [optional] +**IamHttpRequestMethod** | **string** | HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. | [optional] **IamRequestBody** | **string** | Base64-encoded request body when auth_type is iam. This must match the request body included in the signature. | [optional] **IamRequestHeaders** | **string** | Key/value pairs of headers for use in the sts:GetCallerIdentity HTTP requests headers when auth_type is iam. Can be either a Base64-encoded, JSON-serialized string, or a JSON object of key/value pairs. This must at a minimum include the headers over which AWS has included a signature. | [optional] **IamRequestUrl** | **string** | Base64-encoded full URL against which to make the AWS request when using iam auth_type. | [optional] diff --git a/docs/DatabaseWriteStaticRoleRequest.md b/docs/DatabaseWriteStaticRoleRequest.md index cd85dd03..3a80c85f 100644 --- a/docs/DatabaseWriteStaticRoleRequest.md +++ b/docs/DatabaseWriteStaticRoleRequest.md @@ -7,8 +7,10 @@ Name | Type | Description | Notes **CredentialConfig** | **Object** | The configuration for the given credential_type. | [optional] **CredentialType** | **string** | The type of credential to manage. Options include: 'password', 'rsa_private_key'. Defaults to 'password'. | [optional] [default to "password"] **DbName** | **string** | Name of the database this role acts on. | [optional] -**RotationPeriod** | **string** | Period for automatic credential rotation of the given username. Not valid unless used with \"username\". | [optional] +**RotationPeriod** | **string** | Period for automatic credential rotation of the given username. Not valid unless used with \"username\". Mutually exclusive with \"rotation_schedule.\" | [optional] +**RotationSchedule** | **string** | Schedule for automatic credential rotation of the given username. Mutually exclusive with \"rotation_period.\" | [optional] **RotationStatements** | **List<string>** | Specifies the database statements to be executed to rotate the accounts credentials. Not every plugin type will support this functionality. See the plugin's API page for more information on support and formatting for this parameter. | [optional] +**RotationWindow** | **string** | The window of time in which rotations are allowed to occur starting from a given \"rotation_schedule\". Requires \"rotation_schedule\" to be specified | [optional] **Username** | **string** | Name of the static user account for Vault to manage. Requires \"rotation_period\" to be specified | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/MountsEnableSecretsEngineRequest.md b/docs/MountsEnableSecretsEngineRequest.md index 1d4d28c4..1407b24d 100644 --- a/docs/MountsEnableSecretsEngineRequest.md +++ b/docs/MountsEnableSecretsEngineRequest.md @@ -10,7 +10,7 @@ Name | Type | Description | Notes **Local** | **bool** | Mark the mount as a local mount, which is not replicated and is unaffected by replication. | [optional] [default to false] **Options** | **Object** | The options to pass into the backend. Should be a json object with string keys and values. | [optional] **PluginName** | **string** | Name of the plugin to mount based from the name registered in the plugin catalog. | [optional] -**PluginVersion** | **string** | The semantic version of the plugin to use. | [optional] +**PluginVersion** | **string** | The semantic version of the plugin to use, or image tag if oci_image is provided. | [optional] **SealWrap** | **bool** | Whether to turn on seal wrapping for the mount. | [optional] [default to false] **Type** | **string** | The type of the backend. Example: \"passthrough\" | [optional] diff --git a/docs/MountsReadConfigurationResponse.md b/docs/MountsReadConfigurationResponse.md index 211ae9b1..eb30da75 100644 --- a/docs/MountsReadConfigurationResponse.md +++ b/docs/MountsReadConfigurationResponse.md @@ -11,7 +11,7 @@ Name | Type | Description | Notes **ExternalEntropyAccess** | **bool** | | [optional] **Local** | **bool** | Mark the mount as a local mount, which is not replicated and is unaffected by replication. | [optional] [default to false] **Options** | **Object** | The options to pass into the backend. Should be a json object with string keys and values. | [optional] -**PluginVersion** | **string** | The semantic version of the plugin to use. | [optional] +**PluginVersion** | **string** | The semantic version of the plugin to use, or image tag if oci_image is provided. | [optional] **RunningPluginVersion** | **string** | | [optional] **RunningSha256** | **string** | | [optional] **SealWrap** | **bool** | Whether to turn on seal wrapping for the mount. | [optional] [default to false] diff --git a/docs/MountsReadTuningInformationResponse.md b/docs/MountsReadTuningInformationResponse.md index 8d734523..f893cdca 100644 --- a/docs/MountsReadTuningInformationResponse.md +++ b/docs/MountsReadTuningInformationResponse.md @@ -16,7 +16,7 @@ Name | Type | Description | Notes **MaxLeaseTtl** | **int** | The max lease TTL for this mount. | [optional] **Options** | **Object** | The options to pass into the backend. Should be a json object with string keys and values. | [optional] **PassthroughRequestHeaders** | **List<string>** | | [optional] -**PluginVersion** | **string** | The semantic version of the plugin to use. | [optional] +**PluginVersion** | **string** | The semantic version of the plugin to use, or image tag if oci_image is provided. | [optional] **TokenType** | **string** | The type of token to issue (service or batch). | [optional] **UserLockoutCounterResetDuration** | **long** | | [optional] **UserLockoutDisable** | **bool** | | [optional] diff --git a/docs/MountsTuneConfigurationParametersRequest.md b/docs/MountsTuneConfigurationParametersRequest.md index eef3e466..9cc008d5 100644 --- a/docs/MountsTuneConfigurationParametersRequest.md +++ b/docs/MountsTuneConfigurationParametersRequest.md @@ -14,7 +14,7 @@ Name | Type | Description | Notes **MaxLeaseTtl** | **string** | The max lease TTL for this mount. | [optional] **Options** | **Object** | The options to pass into the backend. Should be a json object with string keys and values. | [optional] **PassthroughRequestHeaders** | **List<string>** | A list of headers to whitelist and pass from the request to the plugin. | [optional] -**PluginVersion** | **string** | The semantic version of the plugin to use. | [optional] +**PluginVersion** | **string** | The semantic version of the plugin to use, or image tag if oci_image is provided. | [optional] **TokenType** | **string** | The type of token to issue (service or batch). | [optional] **UserLockoutConfig** | **Object** | The user lockout configuration to pass into the backend. Should be a json object with string keys and values. | [optional] diff --git a/docs/PkiPatchIssuerResponse.md b/docs/PkiPatchIssuerResponse.md index a9379c0b..faeaeaad 100644 --- a/docs/PkiPatchIssuerResponse.md +++ b/docs/PkiPatchIssuerResponse.md @@ -14,7 +14,7 @@ Name | Type | Description | Notes **KeyId** | **string** | Key Id | [optional] **LeafNotAfterBehavior** | **string** | Leaf Not After Behavior | [optional] **ManualChain** | **List<string>** | Manual Chain | [optional] -**OcspServers** | **List<string>** | OSCP Servers | [optional] +**OcspServers** | **List<string>** | OCSP Servers | [optional] **RevocationSignatureAlgorithm** | **string** | Revocation Signature Alogrithm | [optional] **RevocationTime** | **int** | | [optional] **RevocationTimeRfc3339** | **string** | | [optional] diff --git a/docs/PkiReadIssuerResponse.md b/docs/PkiReadIssuerResponse.md index 2dda8867..63e3f663 100644 --- a/docs/PkiReadIssuerResponse.md +++ b/docs/PkiReadIssuerResponse.md @@ -14,7 +14,7 @@ Name | Type | Description | Notes **KeyId** | **string** | Key Id | [optional] **LeafNotAfterBehavior** | **string** | Leaf Not After Behavior | [optional] **ManualChain** | **List<string>** | Manual Chain | [optional] -**OcspServers** | **List<string>** | OSCP Servers | [optional] +**OcspServers** | **List<string>** | OCSP Servers | [optional] **RevocationSignatureAlgorithm** | **string** | Revocation Signature Alogrithm | [optional] **RevocationTime** | **int** | | [optional] **RevocationTimeRfc3339** | **string** | | [optional] diff --git a/docs/PkiWriteIssuerResponse.md b/docs/PkiWriteIssuerResponse.md index 647e5b8f..024fa1d4 100644 --- a/docs/PkiWriteIssuerResponse.md +++ b/docs/PkiWriteIssuerResponse.md @@ -14,7 +14,7 @@ Name | Type | Description | Notes **KeyId** | **string** | Key Id | [optional] **LeafNotAfterBehavior** | **string** | Leaf Not After Behavior | [optional] **ManualChain** | **List<string>** | Manual Chain | [optional] -**OcspServers** | **List<string>** | OSCP Servers | [optional] +**OcspServers** | **List<string>** | OCSP Servers | [optional] **RevocationSignatureAlgorithm** | **string** | Revocation Signature Alogrithm | [optional] **RevocationTime** | **int** | | [optional] **RevocationTimeRfc3339** | **string** | | [optional] diff --git a/docs/PluginsCatalogReadPluginConfigurationResponse.md b/docs/PluginsCatalogReadPluginConfigurationResponse.md index 6567855e..18fc4269 100644 --- a/docs/PluginsCatalogReadPluginConfigurationResponse.md +++ b/docs/PluginsCatalogReadPluginConfigurationResponse.md @@ -9,8 +9,9 @@ Name | Type | Description | Notes **Command** | **string** | The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory. | [optional] **DeprecationStatus** | **string** | | [optional] **Name** | **string** | The name of the plugin | [optional] -**Sha256** | **string** | The SHA256 sum of the executable used in the command field. This should be HEX encoded. | [optional] -**_Version** | **string** | The semantic version of the plugin to use. | [optional] +**OciImage** | **string** | The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. | [optional] +**Sha256** | **string** | The SHA256 sum of the executable or container to be run. This should be HEX encoded. | [optional] +**_Version** | **string** | The semantic version of the plugin to use, or image tag if oci_image is provided. | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/PluginsCatalogReadPluginConfigurationWithTypeResponse.md b/docs/PluginsCatalogReadPluginConfigurationWithTypeResponse.md index 190316e1..fcb98450 100644 --- a/docs/PluginsCatalogReadPluginConfigurationWithTypeResponse.md +++ b/docs/PluginsCatalogReadPluginConfigurationWithTypeResponse.md @@ -9,8 +9,9 @@ Name | Type | Description | Notes **Command** | **string** | The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory. | [optional] **DeprecationStatus** | **string** | | [optional] **Name** | **string** | The name of the plugin | [optional] -**Sha256** | **string** | The SHA256 sum of the executable used in the command field. This should be HEX encoded. | [optional] -**_Version** | **string** | The semantic version of the plugin to use. | [optional] +**OciImage** | **string** | The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. | [optional] +**Sha256** | **string** | The SHA256 sum of the executable or container to be run. This should be HEX encoded. | [optional] +**_Version** | **string** | The semantic version of the plugin to use, or image tag if oci_image is provided. | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/PluginsCatalogRegisterPluginRequest.md b/docs/PluginsCatalogRegisterPluginRequest.md index 1abe6230..5ef74812 100644 --- a/docs/PluginsCatalogRegisterPluginRequest.md +++ b/docs/PluginsCatalogRegisterPluginRequest.md @@ -7,8 +7,9 @@ Name | Type | Description | Notes **Args** | **List<string>** | The args passed to plugin command. | [optional] **Command** | **string** | The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory. | [optional] **Env** | **List<string>** | The environment variables passed to plugin command. Each entry is of the form \"key=value\". | [optional] -**Sha256** | **string** | The SHA256 sum of the executable used in the command field. This should be HEX encoded. | [optional] -**_Version** | **string** | The semantic version of the plugin to use. | [optional] +**OciImage** | **string** | The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. | [optional] +**Sha256** | **string** | The SHA256 sum of the executable or container to be run. This should be HEX encoded. | [optional] +**_Version** | **string** | The semantic version of the plugin to use, or image tag if oci_image is provided. | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/PluginsCatalogRegisterPluginWithTypeRequest.md b/docs/PluginsCatalogRegisterPluginWithTypeRequest.md index 0fbf122f..9ebe207a 100644 --- a/docs/PluginsCatalogRegisterPluginWithTypeRequest.md +++ b/docs/PluginsCatalogRegisterPluginWithTypeRequest.md @@ -7,8 +7,9 @@ Name | Type | Description | Notes **Args** | **List<string>** | The args passed to plugin command. | [optional] **Command** | **string** | The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory. | [optional] **Env** | **List<string>** | The environment variables passed to plugin command. Each entry is of the form \"key=value\". | [optional] -**Sha256** | **string** | The SHA256 sum of the executable used in the command field. This should be HEX encoded. | [optional] -**_Version** | **string** | The semantic version of the plugin to use. | [optional] +**OciImage** | **string** | The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. | [optional] +**Sha256** | **string** | The SHA256 sum of the executable or container to be run. This should be HEX encoded. | [optional] +**_Version** | **string** | The semantic version of the plugin to use, or image tag if oci_image is provided. | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/PluginsRuntimesCatalogListPluginsRuntimesResponse.md b/docs/PluginsRuntimesCatalogListPluginsRuntimesResponse.md new file mode 100644 index 00000000..122dc819 --- /dev/null +++ b/docs/PluginsRuntimesCatalogListPluginsRuntimesResponse.md @@ -0,0 +1,10 @@ +# Vault.Model.PluginsRuntimesCatalogListPluginsRuntimesResponse + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Runtimes** | **List<Object>** | List of all plugin runtimes in the catalog | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse.md b/docs/PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse.md new file mode 100644 index 00000000..53678741 --- /dev/null +++ b/docs/PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse.md @@ -0,0 +1,15 @@ +# Vault.Model.PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CgroupParent** | **string** | Optional parent cgroup for the container | [optional] +**CpuNanos** | **long** | The limit of runtime CPU in nanos | [optional] +**MemoryBytes** | **long** | The limit of runtime memory in bytes | [optional] +**Name** | **string** | The name of the plugin runtime | [optional] +**OciRuntime** | **string** | The OCI-compatible runtime (default \"runsc\") | [optional] +**Type** | **string** | The type of the plugin runtime | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/PluginsRuntimesCatalogRegisterPluginRuntimeRequest.md b/docs/PluginsRuntimesCatalogRegisterPluginRuntimeRequest.md new file mode 100644 index 00000000..e97a305e --- /dev/null +++ b/docs/PluginsRuntimesCatalogRegisterPluginRuntimeRequest.md @@ -0,0 +1,13 @@ +# Vault.Model.PluginsRuntimesCatalogRegisterPluginRuntimeRequest + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CgroupParent** | **string** | Optional parent cgroup for the container | [optional] +**CpuNanos** | **long** | The limit of runtime CPU in nanos | [optional] +**MemoryBytes** | **long** | The limit of runtime memory in bytes | [optional] +**OciRuntime** | **string** | The OCI-compatible runtime (default \"runsc\") | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/RateLimitQuotasReadResponse.md b/docs/RateLimitQuotasReadResponse.md index 3df7345a..b57e2bc6 100644 --- a/docs/RateLimitQuotasReadResponse.md +++ b/docs/RateLimitQuotasReadResponse.md @@ -5,6 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **BlockInterval** | **int** | | [optional] +**Inheritable** | **bool** | | [optional] **Interval** | **int** | | [optional] **Name** | **string** | | [optional] **Path** | **string** | | [optional] diff --git a/docs/RateLimitQuotasWriteRequest.md b/docs/RateLimitQuotasWriteRequest.md index a3b0a696..a398581f 100644 --- a/docs/RateLimitQuotasWriteRequest.md +++ b/docs/RateLimitQuotasWriteRequest.md @@ -5,6 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **BlockInterval** | **string** | If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' has elapsed. | [optional] +**Inheritable** | **bool** | Whether all child namespaces can inherit this namespace quota. | [optional] **Interval** | **string** | The duration to enforce rate limiting for (default '1s'). | [optional] **Path** | **string** | Path of the mount or namespace to apply the quota. A blank path configures a global quota. For example namespace1/ adds a quota to a full namespace, namespace1/auth/userpass adds a quota to userpass in namespace1. | [optional] **Rate** | **float** | The maximum number of requests in a given interval to be allowed by the quota rule. The 'rate' must be positive. | [optional] diff --git a/docs/SecretsApi.md b/docs/SecretsApi.md index 3894b346..b0920bea 100644 --- a/docs/SecretsApi.md +++ b/docs/SecretsApi.md @@ -371,6 +371,7 @@ Method | HTTP request | Description [**TransitEncrypt**](SecretsApi.md#transitencrypt) | **POST** /{transit_mount_path}/encrypt/{name} | Encrypt a plaintext value or a batch of plaintext blocks using a named key [**TransitExportKey**](SecretsApi.md#transitexportkey) | **GET** /{transit_mount_path}/export/{type}/{name} | Export named encryption or signing key [**TransitExportKeyVersion**](SecretsApi.md#transitexportkeyversion) | **GET** /{transit_mount_path}/export/{type}/{name}/{version} | Export named encryption or signing key +[**TransitGenerateCsrForKey**](SecretsApi.md#transitgeneratecsrforkey) | **POST** /{transit_mount_path}/keys/{name}/csr | [**TransitGenerateDataKey**](SecretsApi.md#transitgeneratedatakey) | **POST** /{transit_mount_path}/datakey/{plaintext}/{name} | Generate a data key [**TransitGenerateHmac**](SecretsApi.md#transitgeneratehmac) | **POST** /{transit_mount_path}/hmac/{name} | Generate an HMAC for input data using the named key [**TransitGenerateHmacWithAlgorithm**](SecretsApi.md#transitgeneratehmacwithalgorithm) | **POST** /{transit_mount_path}/hmac/{name}/{urlalgorithm} | Generate an HMAC for input data using the named key @@ -391,6 +392,7 @@ Method | HTTP request | Description [**TransitRestoreKey**](SecretsApi.md#transitrestorekey) | **POST** /{transit_mount_path}/restore | Restore the named key [**TransitRewrap**](SecretsApi.md#transitrewrap) | **POST** /{transit_mount_path}/rewrap/{name} | Rewrap ciphertext [**TransitRotateKey**](SecretsApi.md#transitrotatekey) | **POST** /{transit_mount_path}/keys/{name}/rotate | Rotate named encryption key +[**TransitSetCertificateForKey**](SecretsApi.md#transitsetcertificateforkey) | **POST** /{transit_mount_path}/keys/{name}/set-certificate | [**TransitSign**](SecretsApi.md#transitsign) | **POST** /{transit_mount_path}/sign/{name} | Generate a signature for input data using the named key [**TransitSignWithAlgorithm**](SecretsApi.md#transitsignwithalgorithm) | **POST** /{transit_mount_path}/sign/{name}/{urlalgorithm} | Generate a signature for input data using the named key [**TransitTrimKey**](SecretsApi.md#transittrimkey) | **POST** /{transit_mount_path}/keys/{name}/trim | Trim key versions of a named key @@ -36240,6 +36242,107 @@ No authorization required +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + + +# **TransitGenerateCsrForKey** + +> void TransitGenerateCsrForKey (string name, string transitMountPath, TransitGenerateCsrForKeyRequest transitGenerateCsrForKeyRequest, TimeSpan? wrapTTL = null) + + + +### Example +```csharp +using System.Collections.Generic; +using System.Diagnostics; + +using System.Net.Http; + +using Vault.Api; +using Vault.Client; +using Vault.Model; + +namespace Example +{ + public class TransitGenerateCsrForKeyExample + { + public static void Main() + { + Configuration config = new Configuration(); + config.BasePath = "http://localhost"; + + + // create instances of HttpClient, HttpClientHandler to be reused later with different Api classes + HttpClient httpClient = new HttpClient(); + HttpClientHandler httpClientHandler = new HttpClientHandler(); + var apiInstance = new Secrets(httpClient, config, httpClientHandler); + + + + + var name = "name_example"; // string | Name of the key + + + + + var transitMountPath = "\"transit\""; // string | Path that the backend was mounted at (default to "transit") + + + + + + var transitGenerateCsrForKeyRequest = new TransitGenerateCsrForKeyRequest(); // TransitGenerateCsrForKeyRequest | + + + + try + { + + + apiInstance.TransitGenerateCsrForKey(string name, string transitMountPath, TransitGenerateCsrForKeyRequest transitGenerateCsrForKeyRequest, TimeSpan? wrapTTL = null); + } + catch (ApiException e) + { + Debug.Print("Exception when calling Secrets.TransitGenerateCsrForKey: " + e.Message ); + Debug.Print("Status Code: "+ e.ErrorCode); + } + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **name** | **string**| Name of the key | + **transitMountPath** | **string**| Path that the backend was mounted at | [default to "transit"] + **transitGenerateCsrForKeyRequest** | [**TransitGenerateCsrForKeyRequest**](TransitGenerateCsrForKeyRequest.md)| | + + +### Return type + +void (empty response body) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: , + - **Accept**: Not defined + + + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| + +| **200** | OK | - | + + + [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) @@ -38250,6 +38353,107 @@ No authorization required +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + + +# **TransitSetCertificateForKey** + +> void TransitSetCertificateForKey (string name, string transitMountPath, TransitSetCertificateForKeyRequest transitSetCertificateForKeyRequest, TimeSpan? wrapTTL = null) + + + +### Example +```csharp +using System.Collections.Generic; +using System.Diagnostics; + +using System.Net.Http; + +using Vault.Api; +using Vault.Client; +using Vault.Model; + +namespace Example +{ + public class TransitSetCertificateForKeyExample + { + public static void Main() + { + Configuration config = new Configuration(); + config.BasePath = "http://localhost"; + + + // create instances of HttpClient, HttpClientHandler to be reused later with different Api classes + HttpClient httpClient = new HttpClient(); + HttpClientHandler httpClientHandler = new HttpClientHandler(); + var apiInstance = new Secrets(httpClient, config, httpClientHandler); + + + + + var name = "name_example"; // string | Name of the key + + + + + var transitMountPath = "\"transit\""; // string | Path that the backend was mounted at (default to "transit") + + + + + + var transitSetCertificateForKeyRequest = new TransitSetCertificateForKeyRequest(); // TransitSetCertificateForKeyRequest | + + + + try + { + + + apiInstance.TransitSetCertificateForKey(string name, string transitMountPath, TransitSetCertificateForKeyRequest transitSetCertificateForKeyRequest, TimeSpan? wrapTTL = null); + } + catch (ApiException e) + { + Debug.Print("Exception when calling Secrets.TransitSetCertificateForKey: " + e.Message ); + Debug.Print("Status Code: "+ e.ErrorCode); + } + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **name** | **string**| Name of the key | + **transitMountPath** | **string**| Path that the backend was mounted at | [default to "transit"] + **transitSetCertificateForKeyRequest** | [**TransitSetCertificateForKeyRequest**](TransitSetCertificateForKeyRequest.md)| | + + +### Return type + +void (empty response body) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: , + - **Accept**: Not defined + + + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| + +| **200** | OK | - | + + + [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) diff --git a/docs/SystemApi.md b/docs/SystemApi.md index 568030c2..6b29d399 100644 --- a/docs/SystemApi.md +++ b/docs/SystemApi.md @@ -91,6 +91,10 @@ Method | HTTP request | Description [**PluginsCatalogRemovePlugin**](SystemApi.md#pluginscatalogremoveplugin) | **DELETE** /sys/plugins/catalog/{name} | Remove the plugin with the given name. [**PluginsCatalogRemovePluginWithType**](SystemApi.md#pluginscatalogremovepluginwithtype) | **DELETE** /sys/plugins/catalog/{type}/{name} | Remove the plugin with the given name. [**PluginsReloadBackends**](SystemApi.md#pluginsreloadbackends) | **POST** /sys/plugins/reload/backend | Reload mounted plugin backends. +[**PluginsRuntimesCatalogListPluginsRuntimes**](SystemApi.md#pluginsruntimescataloglistpluginsruntimes) | **GET** /sys/plugins/runtimes/catalog/ | +[**PluginsRuntimesCatalogReadPluginRuntimeConfiguration**](SystemApi.md#pluginsruntimescatalogreadpluginruntimeconfiguration) | **GET** /sys/plugins/runtimes/catalog/{type}/{name} | Return the configuration data for the plugin runtime with the given name. +[**PluginsRuntimesCatalogRegisterPluginRuntime**](SystemApi.md#pluginsruntimescatalogregisterpluginruntime) | **POST** /sys/plugins/runtimes/catalog/{type}/{name} | Register a new plugin runtime, or updates an existing one with the supplied name. +[**PluginsRuntimesCatalogRemovePluginRuntime**](SystemApi.md#pluginsruntimescatalogremovepluginruntime) | **DELETE** /sys/plugins/runtimes/catalog/{type}/{name} | Remove the plugin runtime with the given name. [**PoliciesDeleteAclPolicy**](SystemApi.md#policiesdeleteaclpolicy) | **DELETE** /sys/policies/acl/{name} | Delete the ACL policy with the given name. [**PoliciesDeletePasswordPolicy**](SystemApi.md#policiesdeletepasswordpolicy) | **DELETE** /sys/policies/password/{name} | Delete a password policy. [**PoliciesGeneratePasswordFromPasswordPolicy**](SystemApi.md#policiesgeneratepasswordfrompasswordpolicy) | **GET** /sys/policies/password/{name}/generate | Generate a password from an existing password policy. @@ -8013,6 +8017,396 @@ No authorization required +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + + +# **PluginsRuntimesCatalogListPluginsRuntimes** + +> PluginsRuntimesCatalogListPluginsRuntimesResponse PluginsRuntimesCatalogListPluginsRuntimes (TimeSpan? wrapTTL = null) + + + +### Example +```csharp +using System.Collections.Generic; +using System.Diagnostics; + +using System.Net.Http; + +using Vault.Api; +using Vault.Client; +using Vault.Model; + +namespace Example +{ + public class PluginsRuntimesCatalogListPluginsRuntimesExample + { + public static void Main() + { + Configuration config = new Configuration(); + config.BasePath = "http://localhost"; + + + // create instances of HttpClient, HttpClientHandler to be reused later with different Api classes + HttpClient httpClient = new HttpClient(); + HttpClientHandler httpClientHandler = new HttpClientHandler(); + var apiInstance = new System(httpClient, config, httpClientHandler); + + + + + var list = "true"; // string | Must be set to `true` + + + + + try + { + + + PluginsRuntimesCatalogListPluginsRuntimesResponse result = apiInstance.PluginsRuntimesCatalogListPluginsRuntimes(TimeSpan? wrapTTL = null); + + Debug.WriteLine(result); + } + catch (ApiException e) + { + Debug.Print("Exception when calling System.PluginsRuntimesCatalogListPluginsRuntimes: " + e.Message ); + Debug.Print("Status Code: "+ e.ErrorCode); + } + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **list** | **string**| Must be set to `true` | + + +### Return type + +[**PluginsRuntimesCatalogListPluginsRuntimesResponse**](PluginsRuntimesCatalogListPluginsRuntimesResponse.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| + +| **200** | OK | - | + + + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + + +# **PluginsRuntimesCatalogReadPluginRuntimeConfiguration** + +> PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse PluginsRuntimesCatalogReadPluginRuntimeConfiguration (string name, string type, TimeSpan? wrapTTL = null) + +Return the configuration data for the plugin runtime with the given name. + +### Example +```csharp +using System.Collections.Generic; +using System.Diagnostics; + +using System.Net.Http; + +using Vault.Api; +using Vault.Client; +using Vault.Model; + +namespace Example +{ + public class PluginsRuntimesCatalogReadPluginRuntimeConfigurationExample + { + public static void Main() + { + Configuration config = new Configuration(); + config.BasePath = "http://localhost"; + + + // create instances of HttpClient, HttpClientHandler to be reused later with different Api classes + HttpClient httpClient = new HttpClient(); + HttpClientHandler httpClientHandler = new HttpClientHandler(); + var apiInstance = new System(httpClient, config, httpClientHandler); + + + + + var name = "name_example"; // string | The name of the plugin runtime + + + + + var type = "type_example"; // string | The type of the plugin runtime + + + + + try + { + + // Return the configuration data for the plugin runtime with the given name. + + + PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse result = apiInstance.PluginsRuntimesCatalogReadPluginRuntimeConfiguration(string name, string type, TimeSpan? wrapTTL = null); + + Debug.WriteLine(result); + } + catch (ApiException e) + { + Debug.Print("Exception when calling System.PluginsRuntimesCatalogReadPluginRuntimeConfiguration: " + e.Message ); + Debug.Print("Status Code: "+ e.ErrorCode); + } + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **name** | **string**| The name of the plugin runtime | + **type** | **string**| The type of the plugin runtime | + + +### Return type + +[**PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse**](PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| + +| **200** | OK | - | + + + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + + +# **PluginsRuntimesCatalogRegisterPluginRuntime** + +> void PluginsRuntimesCatalogRegisterPluginRuntime (string name, string type, PluginsRuntimesCatalogRegisterPluginRuntimeRequest pluginsRuntimesCatalogRegisterPluginRuntimeRequest, TimeSpan? wrapTTL = null) + +Register a new plugin runtime, or updates an existing one with the supplied name. + +### Example +```csharp +using System.Collections.Generic; +using System.Diagnostics; + +using System.Net.Http; + +using Vault.Api; +using Vault.Client; +using Vault.Model; + +namespace Example +{ + public class PluginsRuntimesCatalogRegisterPluginRuntimeExample + { + public static void Main() + { + Configuration config = new Configuration(); + config.BasePath = "http://localhost"; + + + // create instances of HttpClient, HttpClientHandler to be reused later with different Api classes + HttpClient httpClient = new HttpClient(); + HttpClientHandler httpClientHandler = new HttpClientHandler(); + var apiInstance = new System(httpClient, config, httpClientHandler); + + + + + var name = "name_example"; // string | The name of the plugin runtime + + + + + var type = "type_example"; // string | The type of the plugin runtime + + + + + + var pluginsRuntimesCatalogRegisterPluginRuntimeRequest = new PluginsRuntimesCatalogRegisterPluginRuntimeRequest(); // PluginsRuntimesCatalogRegisterPluginRuntimeRequest | + + + + try + { + + // Register a new plugin runtime, or updates an existing one with the supplied name. + + + apiInstance.PluginsRuntimesCatalogRegisterPluginRuntime(string name, string type, PluginsRuntimesCatalogRegisterPluginRuntimeRequest pluginsRuntimesCatalogRegisterPluginRuntimeRequest, TimeSpan? wrapTTL = null); + } + catch (ApiException e) + { + Debug.Print("Exception when calling System.PluginsRuntimesCatalogRegisterPluginRuntime: " + e.Message ); + Debug.Print("Status Code: "+ e.ErrorCode); + } + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **name** | **string**| The name of the plugin runtime | + **type** | **string**| The type of the plugin runtime | + **pluginsRuntimesCatalogRegisterPluginRuntimeRequest** | [**PluginsRuntimesCatalogRegisterPluginRuntimeRequest**](PluginsRuntimesCatalogRegisterPluginRuntimeRequest.md)| | + + +### Return type + +void (empty response body) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: , + - **Accept**: Not defined + + + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| + +| **200** | OK | - | + + + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + + +# **PluginsRuntimesCatalogRemovePluginRuntime** + +> void PluginsRuntimesCatalogRemovePluginRuntime (string name, string type, TimeSpan? wrapTTL = null) + +Remove the plugin runtime with the given name. + +### Example +```csharp +using System.Collections.Generic; +using System.Diagnostics; + +using System.Net.Http; + +using Vault.Api; +using Vault.Client; +using Vault.Model; + +namespace Example +{ + public class PluginsRuntimesCatalogRemovePluginRuntimeExample + { + public static void Main() + { + Configuration config = new Configuration(); + config.BasePath = "http://localhost"; + + + // create instances of HttpClient, HttpClientHandler to be reused later with different Api classes + HttpClient httpClient = new HttpClient(); + HttpClientHandler httpClientHandler = new HttpClientHandler(); + var apiInstance = new System(httpClient, config, httpClientHandler); + + + + + var name = "name_example"; // string | The name of the plugin runtime + + + + + var type = "type_example"; // string | The type of the plugin runtime + + + + + try + { + + // Remove the plugin runtime with the given name. + + + apiInstance.PluginsRuntimesCatalogRemovePluginRuntime(string name, string type, TimeSpan? wrapTTL = null); + } + catch (ApiException e) + { + Debug.Print("Exception when calling System.PluginsRuntimesCatalogRemovePluginRuntime: " + e.Message ); + Debug.Print("Status Code: "+ e.ErrorCode); + } + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **name** | **string**| The name of the plugin runtime | + **type** | **string**| The type of the plugin runtime | + + +### Return type + +void (empty response body) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: Not defined + + + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| + +| **200** | OK | - | + + + [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) diff --git a/docs/TransitGenerateCsrForKeyRequest.md b/docs/TransitGenerateCsrForKeyRequest.md new file mode 100644 index 00000000..c099e00a --- /dev/null +++ b/docs/TransitGenerateCsrForKeyRequest.md @@ -0,0 +1,11 @@ +# Vault.Model.TransitGenerateCsrForKeyRequest + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Csr** | **string** | PEM encoded CSR template. The information attributes will be used as a basis for the CSR with the key in transit. If not set, an empty CSR is returned. | [optional] +**_Version** | **int** | Optional version of key, 'latest' if not set | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/TransitSetCertificateForKeyRequest.md b/docs/TransitSetCertificateForKeyRequest.md new file mode 100644 index 00000000..0a0bf83e --- /dev/null +++ b/docs/TransitSetCertificateForKeyRequest.md @@ -0,0 +1,11 @@ +# Vault.Model.TransitSetCertificateForKeyRequest + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CertificateChain** | **string** | PEM encoded certificate chain. It should be composed by one or more concatenated PEM blocks and ordered starting from the end-entity certificate. | +**_Version** | **int** | Optional version of key, 'latest' if not set | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/openapi.json b/openapi.json index 1fb7d5d8..accc85f1 100644 --- a/openapi.json +++ b/openapi.json @@ -13178,6 +13178,119 @@ } } }, + "/sys/plugins/runtimes/catalog/": { + "description": "List all plugin runtimes in the catalog as a map of type to names.", + "x-vault-sudo": true, + "get": { + "operationId": "plugins-runtimes-catalog-list-plugins-runtimes", + "tags": [ + "system" + ], + "parameters": [ + { + "name": "list", + "description": "Must be set to `true`", + "in": "query", + "schema": { + "type": "string", + "enum": [ + "true" + ] + }, + "required": true + } + ], + "responses": { + "200": { + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PluginsRuntimesCatalogListPluginsRuntimesResponse" + } + } + } + } + } + } + }, + "/sys/plugins/runtimes/catalog/{type}/{name}": { + "description": "Configures plugin runtimes", + "parameters": [ + { + "name": "name", + "description": "The name of the plugin runtime", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "type", + "description": "The type of the plugin runtime", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + } + ], + "x-vault-sudo": true, + "get": { + "summary": "Return the configuration data for the plugin runtime with the given name.", + "operationId": "plugins-runtimes-catalog-read-plugin-runtime-configuration", + "tags": [ + "system" + ], + "responses": { + "200": { + "description": "OK", + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse" + } + } + } + } + } + }, + "post": { + "summary": "Register a new plugin runtime, or updates an existing one with the supplied name.", + "operationId": "plugins-runtimes-catalog-register-plugin-runtime", + "tags": [ + "system" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/PluginsRuntimesCatalogRegisterPluginRuntimeRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + }, + "delete": { + "summary": "Remove the plugin runtime with the given name.", + "operationId": "plugins-runtimes-catalog-remove-plugin-runtime", + "tags": [ + "system" + ], + "responses": { + "200": { + "description": "OK" + } + } + } + }, "/sys/policies/acl/": { "description": "List the configured access control policies.", "get": { @@ -29713,6 +29826,51 @@ } } }, + "/{transit_mount_path}/keys/{name}/csr": { + "description": "Create a CSR from a key in transit", + "parameters": [ + { + "name": "name", + "description": "Name of the key", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "transit_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "transit" + }, + "required": true + } + ], + "post": { + "operationId": "transit-generate-csr-for-key", + "tags": [ + "secrets" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TransitGenerateCsrForKeyRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, "/{transit_mount_path}/keys/{name}/import": { "description": "Imports an externally-generated key into a new transit key", "parameters": [ @@ -29851,6 +30009,51 @@ } } }, + "/{transit_mount_path}/keys/{name}/set-certificate": { + "description": "Imports an externally-signed certificate chain into an existing key version", + "parameters": [ + { + "name": "name", + "description": "Name of the key", + "in": "path", + "schema": { + "type": "string" + }, + "required": true + }, + { + "name": "transit_mount_path", + "description": "Path that the backend was mounted at", + "in": "path", + "schema": { + "type": "string", + "default": "transit" + }, + "required": true + } + ], + "post": { + "operationId": "transit-set-certificate-for-key", + "tags": [ + "secrets" + ], + "requestBody": { + "required": true, + "content": { + "application/json": { + "schema": { + "$ref": "#/components/schemas/TransitSetCertificateForKeyRequest" + } + } + } + }, + "responses": { + "200": { + "description": "OK" + } + } + } + }, "/{transit_mount_path}/keys/{name}/trim": { "description": "Trim key versions of a named key", "parameters": [ @@ -31554,7 +31757,7 @@ }, "plugin_version": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The semantic version of the plugin to use, or image tag if oci_image is provided." }, "seal_wrap": { "type": "boolean", @@ -31745,7 +31948,7 @@ }, "plugin_version": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The semantic version of the plugin to use, or image tag if oci_image is provided." }, "token_type": { "type": "string", @@ -31821,6 +32024,11 @@ "type": "string", "description": "The region ID for the sts_endpoint, if set.", "default": "" + }, + "use_sts_region_from_client": { + "type": "boolean", + "description": "Uses the STS region from client requests for making AWS STS API calls.", + "default": false } } }, @@ -32021,7 +32229,7 @@ "properties": { "iam_http_request_method": { "type": "string", - "description": "HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. Currently, POST is the only supported value" + "description": "HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request." }, "iam_request_body": { "type": "string", @@ -33891,9 +34099,13 @@ }, "rotation_period": { "type": "string", - "description": "Period for automatic credential rotation of the given username. Not valid unless used with \"username\".", + "description": "Period for automatic credential rotation of the given username. Not valid unless used with \"username\". Mutually exclusive with \"rotation_schedule.\"", "format": "duration" }, + "rotation_schedule": { + "type": "string", + "description": "Schedule for automatic credential rotation of the given username. Mutually exclusive with \"rotation_period.\"" + }, "rotation_statements": { "type": "array", "description": "Specifies the database statements to be executed to rotate the accounts credentials. Not every plugin type will support this functionality. See the plugin's API page for more information on support and formatting for this parameter.", @@ -33901,6 +34113,11 @@ "type": "string" } }, + "rotation_window": { + "type": "string", + "description": "The window of time in which rotations are allowed to occur starting from a given \"rotation_schedule\". Requires \"rotation_schedule\" to be specified", + "format": "duration" + }, "username": { "type": "string", "description": "Name of the static user account for Vault to manage. Requires \"rotation_period\" to be specified" @@ -38172,7 +38389,7 @@ }, "plugin_version": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The semantic version of the plugin to use, or image tag if oci_image is provided." }, "seal_wrap": { "type": "boolean", @@ -38218,7 +38435,7 @@ }, "plugin_version": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The semantic version of the plugin to use, or image tag if oci_image is provided." }, "running_plugin_version": { "type": "string" @@ -38302,7 +38519,7 @@ }, "plugin_version": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The semantic version of the plugin to use, or image tag if oci_image is provided." }, "token_type": { "type": "string", @@ -38385,7 +38602,7 @@ }, "plugin_version": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The semantic version of the plugin to use, or image tag if oci_image is provided." }, "token_type": { "type": "string", @@ -42621,7 +42838,7 @@ }, "ocsp_servers": { "type": "array", - "description": "OSCP Servers", + "description": "OCSP Servers", "items": { "type": "string" } @@ -43490,7 +43707,7 @@ }, "ocsp_servers": { "type": "array", - "description": "OSCP Servers", + "description": "OCSP Servers", "items": { "type": "string" } @@ -46132,7 +46349,7 @@ }, "ocsp_servers": { "type": "array", - "description": "OSCP Servers", + "description": "OCSP Servers", "items": { "type": "string" } @@ -46992,13 +47209,17 @@ "type": "string", "description": "The name of the plugin" }, + "oci_image": { + "type": "string", + "description": "The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine." + }, "sha256": { "type": "string", - "description": "The SHA256 sum of the executable used in the command field. This should be HEX encoded." + "description": "The SHA256 sum of the executable or container to be run. This should be HEX encoded." }, "version": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The semantic version of the plugin to use, or image tag if oci_image is provided." } } }, @@ -47026,13 +47247,17 @@ "type": "string", "description": "The name of the plugin" }, + "oci_image": { + "type": "string", + "description": "The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine." + }, "sha256": { "type": "string", - "description": "The SHA256 sum of the executable used in the command field. This should be HEX encoded." + "description": "The SHA256 sum of the executable or container to be run. This should be HEX encoded." }, "version": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The semantic version of the plugin to use, or image tag if oci_image is provided." } } }, @@ -47057,13 +47282,17 @@ "type": "string" } }, + "oci_image": { + "type": "string", + "description": "The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine." + }, "sha256": { "type": "string", - "description": "The SHA256 sum of the executable used in the command field. This should be HEX encoded." + "description": "The SHA256 sum of the executable or container to be run. This should be HEX encoded." }, "version": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The semantic version of the plugin to use, or image tag if oci_image is provided." } } }, @@ -47088,13 +47317,17 @@ "type": "string" } }, + "oci_image": { + "type": "string", + "description": "The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine." + }, "sha256": { "type": "string", - "description": "The SHA256 sum of the executable used in the command field. This should be HEX encoded." + "description": "The SHA256 sum of the executable or container to be run. This should be HEX encoded." }, "version": { "type": "string", - "description": "The semantic version of the plugin to use." + "description": "The semantic version of the plugin to use, or image tag if oci_image is provided." } } }, @@ -47125,6 +47358,72 @@ } } }, + "PluginsRuntimesCatalogListPluginsRuntimesResponse": { + "type": "object", + "properties": { + "runtimes": { + "type": "array", + "description": "List of all plugin runtimes in the catalog", + "items": { + "type": "object" + } + } + } + }, + "PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse": { + "type": "object", + "properties": { + "cgroup_parent": { + "type": "string", + "description": "Optional parent cgroup for the container" + }, + "cpu_nanos": { + "type": "integer", + "description": "The limit of runtime CPU in nanos", + "format": "int64" + }, + "memory_bytes": { + "type": "integer", + "description": "The limit of runtime memory in bytes", + "format": "int64" + }, + "name": { + "type": "string", + "description": "The name of the plugin runtime" + }, + "oci_runtime": { + "type": "string", + "description": "The OCI-compatible runtime (default \"runsc\")" + }, + "type": { + "type": "string", + "description": "The type of the plugin runtime" + } + } + }, + "PluginsRuntimesCatalogRegisterPluginRuntimeRequest": { + "type": "object", + "properties": { + "cgroup_parent": { + "type": "string", + "description": "Optional parent cgroup for the container" + }, + "cpu_nanos": { + "type": "integer", + "description": "The limit of runtime CPU in nanos", + "format": "int64" + }, + "memory_bytes": { + "type": "integer", + "description": "The limit of runtime memory in bytes", + "format": "int64" + }, + "oci_runtime": { + "type": "string", + "description": "The OCI-compatible runtime (default \"runsc\")" + } + } + }, "PoliciesGeneratePasswordFromPasswordPolicyResponse": { "type": "object", "properties": { @@ -47625,6 +47924,9 @@ "block_interval": { "type": "integer" }, + "inheritable": { + "type": "boolean" + }, "interval": { "type": "integer" }, @@ -47654,6 +47956,10 @@ "description": "If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' has elapsed.", "format": "duration" }, + "inheritable": { + "type": "boolean", + "description": "Whether all child namespaces can inherit this namespace quota." + }, "interval": { "type": "string", "description": "The duration to enforce rate limiting for (default '1s').", @@ -49365,6 +49671,19 @@ } } }, + "TransitGenerateCsrForKeyRequest": { + "type": "object", + "properties": { + "csr": { + "type": "string", + "description": "PEM encoded CSR template. The information attributes will be used as a basis for the CSR with the key in transit. If not set, an empty CSR is returned." + }, + "version": { + "type": "integer", + "description": "Optional version of key, 'latest' if not set" + } + } + }, "TransitGenerateDataKeyRequest": { "type": "object", "properties": { @@ -49675,6 +49994,22 @@ } } }, + "TransitSetCertificateForKeyRequest": { + "type": "object", + "properties": { + "certificate_chain": { + "type": "string", + "description": "PEM encoded certificate chain. It should be composed by one or more concatenated PEM blocks and ordered starting from the end-entity certificate." + }, + "version": { + "type": "integer", + "description": "Optional version of key, 'latest' if not set" + } + }, + "required": [ + "certificate_chain" + ] + }, "TransitSignRequest": { "type": "object", "properties": { diff --git a/src/Vault/Api/SecretsApi.cs b/src/Vault/Api/SecretsApi.cs index 776f8eb6..f45ea5f1 100644 --- a/src/Vault/Api/SecretsApi.cs +++ b/src/Vault/Api/SecretsApi.cs @@ -5958,6 +5958,23 @@ public interface ISecretsSync : IApiAccessor /// VaultResponse TransitExportKeyVersion(string name, string type, string version, string transitMountPath = "transit", TimeSpan? wrapTTL = null); + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Name of the key + /// Path that the backend was mounted at + /// VaultResponse of Object(void) + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + VaultResponse TransitGenerateCsrForKey(string name, TransitGenerateCsrForKeyRequest transitGenerateCsrForKeyRequest, string transitMountPath = "transit", TimeSpan? wrapTTL = null); + /// /// Generate a data key /// @@ -6289,6 +6306,23 @@ public interface ISecretsSync : IApiAccessor /// VaultResponse TransitRotateKey(string name, TransitRotateKeyRequest transitRotateKeyRequest, string transitMountPath = "transit", TimeSpan? wrapTTL = null); + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Name of the key + /// Path that the backend was mounted at + /// VaultResponse of Object(void) + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + VaultResponse TransitSetCertificateForKey(string name, TransitSetCertificateForKeyRequest transitSetCertificateForKeyRequest, string transitMountPath = "transit", TimeSpan? wrapTTL = null); + /// /// Generate a signature for input data using the named key /// @@ -12692,6 +12726,24 @@ public interface ISecretsAsync : IApiAccessor /// Task of VaultResponse Task> TransitExportKeyVersionAsync(string name, string type, string version, string transitMountPath = "transit", TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)); + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Name of the key + /// Path that the backend was mounted at + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse + Task> TransitGenerateCsrForKeyAsync(string name, TransitGenerateCsrForKeyRequest transitGenerateCsrForKeyRequest, string transitMountPath = "transit", TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)); + /// /// Generate a data key /// @@ -13043,6 +13095,24 @@ public interface ISecretsAsync : IApiAccessor /// Task of VaultResponse Task> TransitRotateKeyAsync(string name, TransitRotateKeyRequest transitRotateKeyRequest, string transitMountPath = "transit", TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)); + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Name of the key + /// Path that the backend was mounted at + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse + Task> TransitSetCertificateForKeyAsync(string name, TransitSetCertificateForKeyRequest transitSetCertificateForKeyRequest, string transitMountPath = "transit", TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)); + /// /// Generate a signature for input data using the named key /// @@ -63179,6 +63249,153 @@ public VaultResponse TransitExportKeyVersion(string name, string type, s return ClientUtils.ToVaultResponse(response.RawContent); } + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Name of the key + /// Path that the backend was mounted at + /// VaultResponse of Object(void) + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + public VaultResponse TransitGenerateCsrForKey(string name, TransitGenerateCsrForKeyRequest transitGenerateCsrForKeyRequest, string transitMountPath = "transit", TimeSpan? wrapTTL = null) + { + + // verify the required parameter 'name' is set + if (name == null) + throw new VaultApiException(400, "Missing required parameter 'name' when calling Secrets->TransitGenerateCsrForKey"); + + + // verify the required parameter 'transitGenerateCsrForKeyRequest' is set + if (transitGenerateCsrForKeyRequest == null) + throw new VaultApiException(400, "Missing required parameter 'transitGenerateCsrForKeyRequest' when calling Secrets->TransitGenerateCsrForKey"); + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + "", + }; + + // to determine the Accept header + string[] _accepts = new string[] { + + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + requestOptions.PathParameters.Add("name", ClientUtils.ParameterToString(name)); // path parameter + + + requestOptions.PathParameters.Add("transit_mount_path", ClientUtils.ParameterToString(transitMountPath)); // path parameter + + + + + + requestOptions.Data = transitGenerateCsrForKeyRequest; + + + // make the HTTP request + var response = this.Client.Post("/{transit_mount_path}/keys/{name}/csr", requestOptions); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("TransitGenerateCsrForKey", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Name of the key + /// Path that the backend was mounted at + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse + public async Task> TransitGenerateCsrForKeyAsync(string name, TransitGenerateCsrForKeyRequest transitGenerateCsrForKeyRequest, string transitMountPath = "transit", TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)) + { + + // verify the required parameter 'name' is set + if (name == null) + throw new VaultApiException(400, "Missing required parameter 'name' when calling Secrets->TransitGenerateCsrForKey"); + + + // verify the required parameter 'transitGenerateCsrForKeyRequest' is set + if (transitGenerateCsrForKeyRequest == null) + throw new VaultApiException(400, "Missing required parameter 'transitGenerateCsrForKeyRequest' when calling Secrets->TransitGenerateCsrForKey"); + + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + "", + }; + + // to determine the Accept header + string[] _accepts = new string[] { + + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + requestOptions.PathParameters.Add("name", ClientUtils.ParameterToString(name)); // path parameter + + + requestOptions.PathParameters.Add("transit_mount_path", ClientUtils.ParameterToString(transitMountPath)); // path parameter + + + + requestOptions.Data = transitGenerateCsrForKeyRequest; + // make the HTTP request + var response = await this.AsynchronousClient.PostAsync("/{transit_mount_path}/keys/{name}/csr", requestOptions, cancellationToken).ConfigureAwait(false); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("TransitGenerateCsrForKey", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + /// /// Generate a data key /// @@ -65996,6 +66213,153 @@ public VaultResponse TransitRotateKey(string name, TransitRotateKeyReque return ClientUtils.ToVaultResponse(response.RawContent); } + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Name of the key + /// Path that the backend was mounted at + /// VaultResponse of Object(void) + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + public VaultResponse TransitSetCertificateForKey(string name, TransitSetCertificateForKeyRequest transitSetCertificateForKeyRequest, string transitMountPath = "transit", TimeSpan? wrapTTL = null) + { + + // verify the required parameter 'name' is set + if (name == null) + throw new VaultApiException(400, "Missing required parameter 'name' when calling Secrets->TransitSetCertificateForKey"); + + + // verify the required parameter 'transitSetCertificateForKeyRequest' is set + if (transitSetCertificateForKeyRequest == null) + throw new VaultApiException(400, "Missing required parameter 'transitSetCertificateForKeyRequest' when calling Secrets->TransitSetCertificateForKey"); + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + "", + }; + + // to determine the Accept header + string[] _accepts = new string[] { + + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + requestOptions.PathParameters.Add("name", ClientUtils.ParameterToString(name)); // path parameter + + + requestOptions.PathParameters.Add("transit_mount_path", ClientUtils.ParameterToString(transitMountPath)); // path parameter + + + + + + requestOptions.Data = transitSetCertificateForKeyRequest; + + + // make the HTTP request + var response = this.Client.Post("/{transit_mount_path}/keys/{name}/set-certificate", requestOptions); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("TransitSetCertificateForKey", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Name of the key + /// Path that the backend was mounted at + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse + public async Task> TransitSetCertificateForKeyAsync(string name, TransitSetCertificateForKeyRequest transitSetCertificateForKeyRequest, string transitMountPath = "transit", TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)) + { + + // verify the required parameter 'name' is set + if (name == null) + throw new VaultApiException(400, "Missing required parameter 'name' when calling Secrets->TransitSetCertificateForKey"); + + + // verify the required parameter 'transitSetCertificateForKeyRequest' is set + if (transitSetCertificateForKeyRequest == null) + throw new VaultApiException(400, "Missing required parameter 'transitSetCertificateForKeyRequest' when calling Secrets->TransitSetCertificateForKey"); + + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + "", + }; + + // to determine the Accept header + string[] _accepts = new string[] { + + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + requestOptions.PathParameters.Add("name", ClientUtils.ParameterToString(name)); // path parameter + + + requestOptions.PathParameters.Add("transit_mount_path", ClientUtils.ParameterToString(transitMountPath)); // path parameter + + + + requestOptions.Data = transitSetCertificateForKeyRequest; + // make the HTTP request + var response = await this.AsynchronousClient.PostAsync("/{transit_mount_path}/keys/{name}/set-certificate", requestOptions, cancellationToken).ConfigureAwait(false); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("TransitSetCertificateForKey", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + /// /// Generate a signature for input data using the named key /// diff --git a/src/Vault/Api/SystemApi.cs b/src/Vault/Api/SystemApi.cs index 4059bebb..a8a4b6fd 100644 --- a/src/Vault/Api/SystemApi.cs +++ b/src/Vault/Api/SystemApi.cs @@ -1319,6 +1319,69 @@ public interface ISystemSync : IApiAccessor /// VaultResponse PluginsReloadBackends(PluginsReloadBackendsRequest pluginsReloadBackendsRequest, TimeSpan? wrapTTL = null); + /// + /// + /// + /// Thrown when fails to make API call + /// VaultResponse of PluginsRuntimesCatalogListPluginsRuntimesResponse + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + VaultResponse PluginsRuntimesCatalogListPluginsRuntimes(TimeSpan? wrapTTL = null); + + /// + /// Return the configuration data for the plugin runtime with the given name. + /// + /// Thrown when fails to make API call + /// The name of the plugin runtime + /// The type of the plugin runtime + /// VaultResponse of PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + VaultResponse PluginsRuntimesCatalogReadPluginRuntimeConfiguration(string name, string type, TimeSpan? wrapTTL = null); + + /// + /// Register a new plugin runtime, or updates an existing one with the supplied name. + /// + /// Thrown when fails to make API call + /// + /// The name of the plugin runtime + /// The type of the plugin runtime + /// VaultResponse of Object(void) + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + VaultResponse PluginsRuntimesCatalogRegisterPluginRuntime(string name, string type, PluginsRuntimesCatalogRegisterPluginRuntimeRequest pluginsRuntimesCatalogRegisterPluginRuntimeRequest, TimeSpan? wrapTTL = null); + + /// + /// Remove the plugin runtime with the given name. + /// + /// Thrown when fails to make API call + /// The name of the plugin runtime + /// The type of the plugin runtime + /// VaultResponse of Object(void) + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + VaultResponse PluginsRuntimesCatalogRemovePluginRuntime(string name, string type, TimeSpan? wrapTTL = null); + /// /// Delete the ACL policy with the given name. /// @@ -3707,6 +3770,73 @@ public interface ISystemAsync : IApiAccessor /// Task of VaultResponse (PluginsReloadBackendsResponse) Task> PluginsReloadBackendsAsync(PluginsReloadBackendsRequest pluginsReloadBackendsRequest, TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)); + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse (PluginsRuntimesCatalogListPluginsRuntimesResponse) + Task> PluginsRuntimesCatalogListPluginsRuntimesAsync(TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)); + + /// + /// Return the configuration data for the plugin runtime with the given name. + /// + /// Thrown when fails to make API call + /// The name of the plugin runtime + /// The type of the plugin runtime + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse (PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse) + Task> PluginsRuntimesCatalogReadPluginRuntimeConfigurationAsync(string name, string type, TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)); + + /// + /// Register a new plugin runtime, or updates an existing one with the supplied name. + /// + /// Thrown when fails to make API call + /// + /// The name of the plugin runtime + /// The type of the plugin runtime + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse + Task> PluginsRuntimesCatalogRegisterPluginRuntimeAsync(string name, string type, PluginsRuntimesCatalogRegisterPluginRuntimeRequest pluginsRuntimesCatalogRegisterPluginRuntimeRequest, TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)); + + /// + /// Remove the plugin runtime with the given name. + /// + /// Thrown when fails to make API call + /// The name of the plugin runtime + /// The type of the plugin runtime + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse + Task> PluginsRuntimesCatalogRemovePluginRuntimeAsync(string name, string type, TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)); + /// /// Delete the ACL policy with the given name. /// @@ -15590,6 +15720,561 @@ public VaultResponse PluginsReloadBackends(Plugin return ClientUtils.ToVaultResponse(response.RawContent); } + /// + /// + /// + /// Thrown when fails to make API call + /// VaultResponse of PluginsRuntimesCatalogListPluginsRuntimesResponse + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + public VaultResponse PluginsRuntimesCatalogListPluginsRuntimes(TimeSpan? wrapTTL = null) + { + + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + + requestOptions.QueryParameters.Add(ClientUtils.ParameterToMultiMap("", "list", "true")); + + + + + + // make the HTTP request + var response = this.Client.Get("/sys/plugins/runtimes/catalog/", requestOptions); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("PluginsRuntimesCatalogListPluginsRuntimes", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse (PluginsRuntimesCatalogListPluginsRuntimesResponse) + public async Task> PluginsRuntimesCatalogListPluginsRuntimesAsync(TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)) + { + + + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + + requestOptions.QueryParameters.Add(ClientUtils.ParameterToMultiMap("", "list", "true")); + + + // make the HTTP request + var response = await this.AsynchronousClient.GetAsync("/sys/plugins/runtimes/catalog/", requestOptions, cancellationToken).ConfigureAwait(false); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("PluginsRuntimesCatalogListPluginsRuntimes", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + + /// + /// Return the configuration data for the plugin runtime with the given name. + /// + /// Thrown when fails to make API call + /// The name of the plugin runtime + /// The type of the plugin runtime + /// VaultResponse of PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + public VaultResponse PluginsRuntimesCatalogReadPluginRuntimeConfiguration(string name, string type, TimeSpan? wrapTTL = null) + { + + // verify the required parameter 'name' is set + if (name == null) + throw new VaultApiException(400, "Missing required parameter 'name' when calling System->PluginsRuntimesCatalogReadPluginRuntimeConfiguration"); + + // verify the required parameter 'type' is set + if (type == null) + throw new VaultApiException(400, "Missing required parameter 'type' when calling System->PluginsRuntimesCatalogReadPluginRuntimeConfiguration"); + + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + requestOptions.PathParameters.Add("name", ClientUtils.ParameterToString(name)); // path parameter + + + requestOptions.PathParameters.Add("type", ClientUtils.ParameterToString(type)); // path parameter + + + + + + + // make the HTTP request + var response = this.Client.Get("/sys/plugins/runtimes/catalog/{type}/{name}", requestOptions); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("PluginsRuntimesCatalogReadPluginRuntimeConfiguration", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + + + /// + /// Return the configuration data for the plugin runtime with the given name. + /// + /// Thrown when fails to make API call + /// The name of the plugin runtime + /// The type of the plugin runtime + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse (PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse) + public async Task> PluginsRuntimesCatalogReadPluginRuntimeConfigurationAsync(string name, string type, TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)) + { + + // verify the required parameter 'name' is set + if (name == null) + throw new VaultApiException(400, "Missing required parameter 'name' when calling System->PluginsRuntimesCatalogReadPluginRuntimeConfiguration"); + + // verify the required parameter 'type' is set + if (type == null) + throw new VaultApiException(400, "Missing required parameter 'type' when calling System->PluginsRuntimesCatalogReadPluginRuntimeConfiguration"); + + + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + requestOptions.PathParameters.Add("name", ClientUtils.ParameterToString(name)); // path parameter + + + requestOptions.PathParameters.Add("type", ClientUtils.ParameterToString(type)); // path parameter + + + + // make the HTTP request + var response = await this.AsynchronousClient.GetAsync("/sys/plugins/runtimes/catalog/{type}/{name}", requestOptions, cancellationToken).ConfigureAwait(false); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("PluginsRuntimesCatalogReadPluginRuntimeConfiguration", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + + /// + /// Register a new plugin runtime, or updates an existing one with the supplied name. + /// + /// Thrown when fails to make API call + /// + /// The name of the plugin runtime + /// The type of the plugin runtime + /// VaultResponse of Object(void) + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + public VaultResponse PluginsRuntimesCatalogRegisterPluginRuntime(string name, string type, PluginsRuntimesCatalogRegisterPluginRuntimeRequest pluginsRuntimesCatalogRegisterPluginRuntimeRequest, TimeSpan? wrapTTL = null) + { + + // verify the required parameter 'name' is set + if (name == null) + throw new VaultApiException(400, "Missing required parameter 'name' when calling System->PluginsRuntimesCatalogRegisterPluginRuntime"); + + // verify the required parameter 'type' is set + if (type == null) + throw new VaultApiException(400, "Missing required parameter 'type' when calling System->PluginsRuntimesCatalogRegisterPluginRuntime"); + + + // verify the required parameter 'pluginsRuntimesCatalogRegisterPluginRuntimeRequest' is set + if (pluginsRuntimesCatalogRegisterPluginRuntimeRequest == null) + throw new VaultApiException(400, "Missing required parameter 'pluginsRuntimesCatalogRegisterPluginRuntimeRequest' when calling System->PluginsRuntimesCatalogRegisterPluginRuntime"); + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + "", + }; + + // to determine the Accept header + string[] _accepts = new string[] { + + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + requestOptions.PathParameters.Add("name", ClientUtils.ParameterToString(name)); // path parameter + + + requestOptions.PathParameters.Add("type", ClientUtils.ParameterToString(type)); // path parameter + + + + + + requestOptions.Data = pluginsRuntimesCatalogRegisterPluginRuntimeRequest; + + + // make the HTTP request + var response = this.Client.Post("/sys/plugins/runtimes/catalog/{type}/{name}", requestOptions); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("PluginsRuntimesCatalogRegisterPluginRuntime", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + + + /// + /// Register a new plugin runtime, or updates an existing one with the supplied name. + /// + /// Thrown when fails to make API call + /// + /// The name of the plugin runtime + /// The type of the plugin runtime + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse + public async Task> PluginsRuntimesCatalogRegisterPluginRuntimeAsync(string name, string type, PluginsRuntimesCatalogRegisterPluginRuntimeRequest pluginsRuntimesCatalogRegisterPluginRuntimeRequest, TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)) + { + + // verify the required parameter 'name' is set + if (name == null) + throw new VaultApiException(400, "Missing required parameter 'name' when calling System->PluginsRuntimesCatalogRegisterPluginRuntime"); + + // verify the required parameter 'type' is set + if (type == null) + throw new VaultApiException(400, "Missing required parameter 'type' when calling System->PluginsRuntimesCatalogRegisterPluginRuntime"); + + + // verify the required parameter 'pluginsRuntimesCatalogRegisterPluginRuntimeRequest' is set + if (pluginsRuntimesCatalogRegisterPluginRuntimeRequest == null) + throw new VaultApiException(400, "Missing required parameter 'pluginsRuntimesCatalogRegisterPluginRuntimeRequest' when calling System->PluginsRuntimesCatalogRegisterPluginRuntime"); + + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + "", + }; + + // to determine the Accept header + string[] _accepts = new string[] { + + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + requestOptions.PathParameters.Add("name", ClientUtils.ParameterToString(name)); // path parameter + + + requestOptions.PathParameters.Add("type", ClientUtils.ParameterToString(type)); // path parameter + + + + requestOptions.Data = pluginsRuntimesCatalogRegisterPluginRuntimeRequest; + // make the HTTP request + var response = await this.AsynchronousClient.PostAsync("/sys/plugins/runtimes/catalog/{type}/{name}", requestOptions, cancellationToken).ConfigureAwait(false); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("PluginsRuntimesCatalogRegisterPluginRuntime", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + + /// + /// Remove the plugin runtime with the given name. + /// + /// Thrown when fails to make API call + /// The name of the plugin runtime + /// The type of the plugin runtime + /// VaultResponse of Object(void) + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + public VaultResponse PluginsRuntimesCatalogRemovePluginRuntime(string name, string type, TimeSpan? wrapTTL = null) + { + + // verify the required parameter 'name' is set + if (name == null) + throw new VaultApiException(400, "Missing required parameter 'name' when calling System->PluginsRuntimesCatalogRemovePluginRuntime"); + + // verify the required parameter 'type' is set + if (type == null) + throw new VaultApiException(400, "Missing required parameter 'type' when calling System->PluginsRuntimesCatalogRemovePluginRuntime"); + + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + + }; + + // to determine the Accept header + string[] _accepts = new string[] { + + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + requestOptions.PathParameters.Add("name", ClientUtils.ParameterToString(name)); // path parameter + + + requestOptions.PathParameters.Add("type", ClientUtils.ParameterToString(type)); // path parameter + + + + + + + // make the HTTP request + var response = this.Client.Delete("/sys/plugins/runtimes/catalog/{type}/{name}", requestOptions); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("PluginsRuntimesCatalogRemovePluginRuntime", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + + + /// + /// Remove the plugin runtime with the given name. + /// + /// Thrown when fails to make API call + /// The name of the plugin runtime + /// The type of the plugin runtime + /// + /// Sets the X-Vault-Wrap-TTL Header + /// + /// This will take precedence over client level wrapTTL value + /// + /// Vault Response Wrapping + /// + /// Cancellation Token to cancel the request. + /// Task of VaultResponse + public async Task> PluginsRuntimesCatalogRemovePluginRuntimeAsync(string name, string type, TimeSpan? wrapTTL = null, CancellationToken cancellationToken = default(CancellationToken)) + { + + // verify the required parameter 'name' is set + if (name == null) + throw new VaultApiException(400, "Missing required parameter 'name' when calling System->PluginsRuntimesCatalogRemovePluginRuntime"); + + // verify the required parameter 'type' is set + if (type == null) + throw new VaultApiException(400, "Missing required parameter 'type' when calling System->PluginsRuntimesCatalogRemovePluginRuntime"); + + + + RequestOptions requestOptions = new RequestOptions(); + + if (wrapTTL != null) + { + requestOptions.HeaderParameters.Add("X-Vault-Wrap-TTL", wrapTTL.Value.TotalSeconds.ToString()); + } + + string[] _contentTypes = new string[] { + + }; + + // to determine the Accept header + string[] _accepts = new string[] { + + }; + + var contentType = ClientUtils.SelectHeaderContentType(_contentTypes); + if (contentType != null) requestOptions.HeaderParameters.Add("Content-Type", contentType); + + var accept = ClientUtils.SelectHeaderAccept(_accepts); + if (accept != null) requestOptions.HeaderParameters.Add("Accept", accept); + + + requestOptions.PathParameters.Add("name", ClientUtils.ParameterToString(name)); // path parameter + + + requestOptions.PathParameters.Add("type", ClientUtils.ParameterToString(type)); // path parameter + + + + // make the HTTP request + var response = await this.AsynchronousClient.DeleteAsync("/sys/plugins/runtimes/catalog/{type}/{name}", requestOptions, cancellationToken).ConfigureAwait(false); + + if (this.ExceptionFactory != null) + { + Exception exception = this.ExceptionFactory("PluginsRuntimesCatalogRemovePluginRuntime", response); + if (exception != null) throw exception; + } + + return ClientUtils.ToVaultResponse(response.RawContent); + } + /// /// Delete the ACL policy with the given name. /// diff --git a/src/Vault/Model/AuthEnableMethodRequest.cs b/src/Vault/Model/AuthEnableMethodRequest.cs index 316f445d..0ffdd6c5 100644 --- a/src/Vault/Model/AuthEnableMethodRequest.cs +++ b/src/Vault/Model/AuthEnableMethodRequest.cs @@ -46,7 +46,7 @@ public partial class AuthEnableMethodRequest : IEquatableName of the auth plugin to use based from the name in the plugin catalog.. - /// The semantic version of the plugin to use.. + /// The semantic version of the plugin to use, or image tag if oci_image is provided.. /// Whether to turn on seal wrapping for the mount. (default to false). @@ -131,9 +131,9 @@ public partial class AuthEnableMethodRequest : IEquatable - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. [DataMember(Name = "plugin_version", EmitDefaultValue = false)] public string PluginVersion { get; set; } diff --git a/src/Vault/Model/AuthTuneConfigurationParametersRequest.cs b/src/Vault/Model/AuthTuneConfigurationParametersRequest.cs index 589bdc10..a7e1fa3d 100644 --- a/src/Vault/Model/AuthTuneConfigurationParametersRequest.cs +++ b/src/Vault/Model/AuthTuneConfigurationParametersRequest.cs @@ -52,7 +52,7 @@ public partial class AuthTuneConfigurationParametersRequest : IEquatableA list of headers to whitelist and pass from the request to the plugin.. - /// The semantic version of the plugin to use.. + /// The semantic version of the plugin to use, or image tag if oci_image is provided.. /// The type of token to issue (service or batch).. @@ -170,9 +170,9 @@ public partial class AuthTuneConfigurationParametersRequest : IEquatable - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. [DataMember(Name = "plugin_version", EmitDefaultValue = false)] public string PluginVersion { get; set; } diff --git a/src/Vault/Model/AwsConfigureClientRequest.cs b/src/Vault/Model/AwsConfigureClientRequest.cs index 7203b1e7..aff3358c 100644 --- a/src/Vault/Model/AwsConfigureClientRequest.cs +++ b/src/Vault/Model/AwsConfigureClientRequest.cs @@ -52,8 +52,10 @@ public partial class AwsConfigureClientRequest : IEquatableThe region ID for the sts_endpoint, if set. (default to ""). + /// Uses the STS region from client requests for making AWS STS API calls. (default to false). - public AwsConfigureClientRequest(string AccessKey = "", List AllowedStsHeaderValues = default(List), string Endpoint = "", string IamEndpoint = "", string IamServerIdHeaderValue = "", int MaxRetries = -1, string SecretKey = "", string StsEndpoint = "", string StsRegion = "") + + public AwsConfigureClientRequest(string AccessKey = "", List AllowedStsHeaderValues = default(List), string Endpoint = "", string IamEndpoint = "", string IamServerIdHeaderValue = "", int MaxRetries = -1, string SecretKey = "", string StsEndpoint = "", string StsRegion = "", bool UseStsRegionFromClient = false) { // use default value if no "AccessKey" provided @@ -88,6 +90,8 @@ public partial class AwsConfigureClientRequest : IEquatable @@ -171,6 +175,15 @@ public partial class AwsConfigureClientRequest : IEquatable + /// Uses the STS region from client requests for making AWS STS API calls. + /// + /// Uses the STS region from client requests for making AWS STS API calls. + [DataMember(Name = "use_sts_region_from_client", EmitDefaultValue = true)] + + public bool UseStsRegionFromClient { get; set; } + + /// @@ -190,6 +203,7 @@ public override string ToString() sb.Append(" SecretKey: ").Append(SecretKey).Append("\n"); sb.Append(" StsEndpoint: ").Append(StsEndpoint).Append("\n"); sb.Append(" StsRegion: ").Append(StsRegion).Append("\n"); + sb.Append(" UseStsRegionFromClient: ").Append(UseStsRegionFromClient).Append("\n"); sb.Append("}\n"); return sb.ToString(); } @@ -277,6 +291,11 @@ public bool Equals(AwsConfigureClientRequest input) (this.StsRegion != null && this.StsRegion.Equals(input.StsRegion)) + ) && + ( + this.UseStsRegionFromClient == input.UseStsRegionFromClient || + + this.UseStsRegionFromClient.Equals(input.UseStsRegionFromClient) ); } @@ -333,6 +352,8 @@ public override int GetHashCode() hashCode = (hashCode * 59) + this.StsRegion.GetHashCode(); } + + hashCode = (hashCode * 59) + this.UseStsRegionFromClient.GetHashCode(); return hashCode; } } diff --git a/src/Vault/Model/AwsLoginRequest.cs b/src/Vault/Model/AwsLoginRequest.cs index 1072782d..d0d53a5e 100644 --- a/src/Vault/Model/AwsLoginRequest.cs +++ b/src/Vault/Model/AwsLoginRequest.cs @@ -34,7 +34,7 @@ public partial class AwsLoginRequest : IEquatable, IValidatable /// Initializes a new instance of the class. /// - /// HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. Currently, POST is the only supported value. + /// HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request.. /// Base64-encoded request body when auth_type is iam. This must match the request body included in the signature.. @@ -77,9 +77,9 @@ public partial class AwsLoginRequest : IEquatable, IValidatable } /// - /// HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. Currently, POST is the only supported value + /// HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. /// - /// HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. Currently, POST is the only supported value + /// HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. [DataMember(Name = "iam_http_request_method", EmitDefaultValue = false)] public string IamHttpRequestMethod { get; set; } diff --git a/src/Vault/Model/DatabaseWriteStaticRoleRequest.cs b/src/Vault/Model/DatabaseWriteStaticRoleRequest.cs index da83f460..a0133709 100644 --- a/src/Vault/Model/DatabaseWriteStaticRoleRequest.cs +++ b/src/Vault/Model/DatabaseWriteStaticRoleRequest.cs @@ -40,14 +40,18 @@ public partial class DatabaseWriteStaticRoleRequest : IEquatableName of the database this role acts on.. - /// Period for automatic credential rotation of the given username. Not valid unless used with \"username\".. + /// Period for automatic credential rotation of the given username. Not valid unless used with \"username\". Mutually exclusive with \"rotation_schedule.\". + + /// Schedule for automatic credential rotation of the given username. Mutually exclusive with \"rotation_period.\". /// Specifies the database statements to be executed to rotate the accounts credentials. Not every plugin type will support this functionality. See the plugin's API page for more information on support and formatting for this parameter.. + /// The window of time in which rotations are allowed to occur starting from a given \"rotation_schedule\". Requires \"rotation_schedule\" to be specified. + /// Name of the static user account for Vault to manage. Requires \"rotation_period\" to be specified. - public DatabaseWriteStaticRoleRequest(Object CredentialConfig = default(Object), string CredentialType = "password", string DbName = default(string), string RotationPeriod = default(string), List RotationStatements = default(List), string Username = default(string)) + public DatabaseWriteStaticRoleRequest(Object CredentialConfig = default(Object), string CredentialType = "password", string DbName = default(string), string RotationPeriod = default(string), string RotationSchedule = default(string), List RotationStatements = default(List), string RotationWindow = default(string), string Username = default(string)) { this.CredentialConfig = CredentialConfig; @@ -60,8 +64,12 @@ public partial class DatabaseWriteStaticRoleRequest : IEquatable - /// Period for automatic credential rotation of the given username. Not valid unless used with \"username\". + /// Period for automatic credential rotation of the given username. Not valid unless used with \"username\". Mutually exclusive with \"rotation_schedule.\" /// - /// Period for automatic credential rotation of the given username. Not valid unless used with \"username\". + /// Period for automatic credential rotation of the given username. Not valid unless used with \"username\". Mutually exclusive with \"rotation_schedule.\" [DataMember(Name = "rotation_period", EmitDefaultValue = false)] public string RotationPeriod { get; set; } + /// + /// Schedule for automatic credential rotation of the given username. Mutually exclusive with \"rotation_period.\" + /// + /// Schedule for automatic credential rotation of the given username. Mutually exclusive with \"rotation_period.\" + [DataMember(Name = "rotation_schedule", EmitDefaultValue = false)] + + public string RotationSchedule { get; set; } + + /// /// Specifies the database statements to be executed to rotate the accounts credentials. Not every plugin type will support this functionality. See the plugin's API page for more information on support and formatting for this parameter. /// @@ -111,6 +128,15 @@ public partial class DatabaseWriteStaticRoleRequest : IEquatable RotationStatements { get; set; } + /// + /// The window of time in which rotations are allowed to occur starting from a given \"rotation_schedule\". Requires \"rotation_schedule\" to be specified + /// + /// The window of time in which rotations are allowed to occur starting from a given \"rotation_schedule\". Requires \"rotation_schedule\" to be specified + [DataMember(Name = "rotation_window", EmitDefaultValue = false)] + + public string RotationWindow { get; set; } + + /// /// Name of the static user account for Vault to manage. Requires \"rotation_period\" to be specified /// @@ -134,7 +160,9 @@ public override string ToString() sb.Append(" CredentialType: ").Append(CredentialType).Append("\n"); sb.Append(" DbName: ").Append(DbName).Append("\n"); sb.Append(" RotationPeriod: ").Append(RotationPeriod).Append("\n"); + sb.Append(" RotationSchedule: ").Append(RotationSchedule).Append("\n"); sb.Append(" RotationStatements: ").Append(RotationStatements).Append("\n"); + sb.Append(" RotationWindow: ").Append(RotationWindow).Append("\n"); sb.Append(" Username: ").Append(Username).Append("\n"); sb.Append("}\n"); return sb.ToString(); @@ -194,6 +222,12 @@ public bool Equals(DatabaseWriteStaticRoleRequest input) (this.RotationPeriod != null && this.RotationPeriod.Equals(input.RotationPeriod)) + ) && + ( + this.RotationSchedule == input.RotationSchedule || + (this.RotationSchedule != null && + this.RotationSchedule.Equals(input.RotationSchedule)) + ) && ( this.RotationStatements == input.RotationStatements || @@ -201,6 +235,12 @@ public bool Equals(DatabaseWriteStaticRoleRequest input) input.RotationStatements != null && this.RotationStatements.SequenceEqual(input.RotationStatements) ) && + ( + this.RotationWindow == input.RotationWindow || + (this.RotationWindow != null && + this.RotationWindow.Equals(input.RotationWindow)) + + ) && ( this.Username == input.Username || (this.Username != null && @@ -240,11 +280,21 @@ public override int GetHashCode() hashCode = (hashCode * 59) + this.RotationPeriod.GetHashCode(); } + if (this.RotationSchedule != null) + { + hashCode = (hashCode * 59) + this.RotationSchedule.GetHashCode(); + } + if (this.RotationStatements != null) { hashCode = (hashCode * 59) + this.RotationStatements.GetHashCode(); } + if (this.RotationWindow != null) + { + hashCode = (hashCode * 59) + this.RotationWindow.GetHashCode(); + } + if (this.Username != null) { hashCode = (hashCode * 59) + this.Username.GetHashCode(); diff --git a/src/Vault/Model/MountsEnableSecretsEngineRequest.cs b/src/Vault/Model/MountsEnableSecretsEngineRequest.cs index e60f09db..0a2573d9 100644 --- a/src/Vault/Model/MountsEnableSecretsEngineRequest.cs +++ b/src/Vault/Model/MountsEnableSecretsEngineRequest.cs @@ -46,7 +46,7 @@ public partial class MountsEnableSecretsEngineRequest : IEquatableName of the plugin to mount based from the name registered in the plugin catalog.. - /// The semantic version of the plugin to use.. + /// The semantic version of the plugin to use, or image tag if oci_image is provided.. /// Whether to turn on seal wrapping for the mount. (default to false). @@ -131,9 +131,9 @@ public partial class MountsEnableSecretsEngineRequest : IEquatable - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. [DataMember(Name = "plugin_version", EmitDefaultValue = false)] public string PluginVersion { get; set; } diff --git a/src/Vault/Model/MountsReadConfigurationResponse.cs b/src/Vault/Model/MountsReadConfigurationResponse.cs index 0aba2fbc..fb09ac7e 100644 --- a/src/Vault/Model/MountsReadConfigurationResponse.cs +++ b/src/Vault/Model/MountsReadConfigurationResponse.cs @@ -48,7 +48,7 @@ public partial class MountsReadConfigurationResponse : IEquatableThe options to pass into the backend. Should be a json object with string keys and values.. - /// The semantic version of the plugin to use.. + /// The semantic version of the plugin to use, or image tag if oci_image is provided.. /// RunningPluginVersion. @@ -153,9 +153,9 @@ public partial class MountsReadConfigurationResponse : IEquatable - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. [DataMember(Name = "plugin_version", EmitDefaultValue = false)] public string PluginVersion { get; set; } diff --git a/src/Vault/Model/MountsReadTuningInformationResponse.cs b/src/Vault/Model/MountsReadTuningInformationResponse.cs index 894265d3..aafd4cba 100644 --- a/src/Vault/Model/MountsReadTuningInformationResponse.cs +++ b/src/Vault/Model/MountsReadTuningInformationResponse.cs @@ -58,7 +58,7 @@ public partial class MountsReadTuningInformationResponse : IEquatablePassthroughRequestHeaders. - /// The semantic version of the plugin to use.. + /// The semantic version of the plugin to use, or image tag if oci_image is provided.. /// The type of token to issue (service or batch).. @@ -214,9 +214,9 @@ public partial class MountsReadTuningInformationResponse : IEquatable - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. [DataMember(Name = "plugin_version", EmitDefaultValue = false)] public string PluginVersion { get; set; } diff --git a/src/Vault/Model/MountsTuneConfigurationParametersRequest.cs b/src/Vault/Model/MountsTuneConfigurationParametersRequest.cs index 75b34b39..23af709d 100644 --- a/src/Vault/Model/MountsTuneConfigurationParametersRequest.cs +++ b/src/Vault/Model/MountsTuneConfigurationParametersRequest.cs @@ -54,7 +54,7 @@ public partial class MountsTuneConfigurationParametersRequest : IEquatableA list of headers to whitelist and pass from the request to the plugin.. - /// The semantic version of the plugin to use.. + /// The semantic version of the plugin to use, or image tag if oci_image is provided.. /// The type of token to issue (service or batch).. @@ -182,9 +182,9 @@ public partial class MountsTuneConfigurationParametersRequest : IEquatable - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. [DataMember(Name = "plugin_version", EmitDefaultValue = false)] public string PluginVersion { get; set; } diff --git a/src/Vault/Model/PkiPatchIssuerResponse.cs b/src/Vault/Model/PkiPatchIssuerResponse.cs index bc5c4932..7528018e 100644 --- a/src/Vault/Model/PkiPatchIssuerResponse.cs +++ b/src/Vault/Model/PkiPatchIssuerResponse.cs @@ -54,7 +54,7 @@ public partial class PkiPatchIssuerResponse : IEquatable /// Manual Chain. - /// OSCP Servers. + /// OCSP Servers. /// Revocation Signature Alogrithm. @@ -195,9 +195,9 @@ public partial class PkiPatchIssuerResponse : IEquatable /// - /// OSCP Servers + /// OCSP Servers /// - /// OSCP Servers + /// OCSP Servers [DataMember(Name = "ocsp_servers", EmitDefaultValue = false)] public List OcspServers { get; set; } diff --git a/src/Vault/Model/PkiReadIssuerResponse.cs b/src/Vault/Model/PkiReadIssuerResponse.cs index 871a9e7b..d185d5ad 100644 --- a/src/Vault/Model/PkiReadIssuerResponse.cs +++ b/src/Vault/Model/PkiReadIssuerResponse.cs @@ -54,7 +54,7 @@ public partial class PkiReadIssuerResponse : IEquatable, /// Manual Chain. - /// OSCP Servers. + /// OCSP Servers. /// Revocation Signature Alogrithm. @@ -195,9 +195,9 @@ public partial class PkiReadIssuerResponse : IEquatable, /// - /// OSCP Servers + /// OCSP Servers /// - /// OSCP Servers + /// OCSP Servers [DataMember(Name = "ocsp_servers", EmitDefaultValue = false)] public List OcspServers { get; set; } diff --git a/src/Vault/Model/PkiWriteIssuerResponse.cs b/src/Vault/Model/PkiWriteIssuerResponse.cs index 5c3f32e1..a648f36d 100644 --- a/src/Vault/Model/PkiWriteIssuerResponse.cs +++ b/src/Vault/Model/PkiWriteIssuerResponse.cs @@ -54,7 +54,7 @@ public partial class PkiWriteIssuerResponse : IEquatable /// Manual Chain. - /// OSCP Servers. + /// OCSP Servers. /// Revocation Signature Alogrithm. @@ -195,9 +195,9 @@ public partial class PkiWriteIssuerResponse : IEquatable /// - /// OSCP Servers + /// OCSP Servers /// - /// OSCP Servers + /// OCSP Servers [DataMember(Name = "ocsp_servers", EmitDefaultValue = false)] public List OcspServers { get; set; } diff --git a/src/Vault/Model/PluginsCatalogReadPluginConfigurationResponse.cs b/src/Vault/Model/PluginsCatalogReadPluginConfigurationResponse.cs index cf7be8e2..9fcc186b 100644 --- a/src/Vault/Model/PluginsCatalogReadPluginConfigurationResponse.cs +++ b/src/Vault/Model/PluginsCatalogReadPluginConfigurationResponse.cs @@ -44,12 +44,14 @@ public partial class PluginsCatalogReadPluginConfigurationResponse : IEquatable< /// The name of the plugin. - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded.. + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine.. - /// The semantic version of the plugin to use.. + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded.. + /// The semantic version of the plugin to use, or image tag if oci_image is provided.. - public PluginsCatalogReadPluginConfigurationResponse(List Args = default(List), bool Builtin = default(bool), string Command = default(string), string DeprecationStatus = default(string), string Name = default(string), string Sha256 = default(string), string _Version = default(string)) + + public PluginsCatalogReadPluginConfigurationResponse(List Args = default(List), bool Builtin = default(bool), string Command = default(string), string DeprecationStatus = default(string), string Name = default(string), string OciImage = default(string), string Sha256 = default(string), string _Version = default(string)) { this.Args = Args; @@ -62,6 +64,8 @@ public partial class PluginsCatalogReadPluginConfigurationResponse : IEquatable< this.Name = Name; + this.OciImage = OciImage; + this.Sha256 = Sha256; this._Version = _Version; @@ -112,18 +116,27 @@ public partial class PluginsCatalogReadPluginConfigurationResponse : IEquatable< /// - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded. + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. + /// + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. + [DataMember(Name = "oci_image", EmitDefaultValue = false)] + + public string OciImage { get; set; } + + + /// + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded. /// - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded. + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded. [DataMember(Name = "sha256", EmitDefaultValue = false)] public string Sha256 { get; set; } /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. [DataMember(Name = "version", EmitDefaultValue = false)] public string _Version { get; set; } @@ -144,6 +157,7 @@ public override string ToString() sb.Append(" Command: ").Append(Command).Append("\n"); sb.Append(" DeprecationStatus: ").Append(DeprecationStatus).Append("\n"); sb.Append(" Name: ").Append(Name).Append("\n"); + sb.Append(" OciImage: ").Append(OciImage).Append("\n"); sb.Append(" Sha256: ").Append(Sha256).Append("\n"); sb.Append(" _Version: ").Append(_Version).Append("\n"); sb.Append("}\n"); @@ -209,6 +223,12 @@ public bool Equals(PluginsCatalogReadPluginConfigurationResponse input) (this.Name != null && this.Name.Equals(input.Name)) + ) && + ( + this.OciImage == input.OciImage || + (this.OciImage != null && + this.OciImage.Equals(input.OciImage)) + ) && ( this.Sha256 == input.Sha256 || @@ -257,6 +277,11 @@ public override int GetHashCode() hashCode = (hashCode * 59) + this.Name.GetHashCode(); } + if (this.OciImage != null) + { + hashCode = (hashCode * 59) + this.OciImage.GetHashCode(); + } + if (this.Sha256 != null) { hashCode = (hashCode * 59) + this.Sha256.GetHashCode(); diff --git a/src/Vault/Model/PluginsCatalogReadPluginConfigurationWithTypeResponse.cs b/src/Vault/Model/PluginsCatalogReadPluginConfigurationWithTypeResponse.cs index a7f67547..cce549c8 100644 --- a/src/Vault/Model/PluginsCatalogReadPluginConfigurationWithTypeResponse.cs +++ b/src/Vault/Model/PluginsCatalogReadPluginConfigurationWithTypeResponse.cs @@ -44,12 +44,14 @@ public partial class PluginsCatalogReadPluginConfigurationWithTypeResponse : IEq /// The name of the plugin. - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded.. + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine.. - /// The semantic version of the plugin to use.. + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded.. + /// The semantic version of the plugin to use, or image tag if oci_image is provided.. - public PluginsCatalogReadPluginConfigurationWithTypeResponse(List Args = default(List), bool Builtin = default(bool), string Command = default(string), string DeprecationStatus = default(string), string Name = default(string), string Sha256 = default(string), string _Version = default(string)) + + public PluginsCatalogReadPluginConfigurationWithTypeResponse(List Args = default(List), bool Builtin = default(bool), string Command = default(string), string DeprecationStatus = default(string), string Name = default(string), string OciImage = default(string), string Sha256 = default(string), string _Version = default(string)) { this.Args = Args; @@ -62,6 +64,8 @@ public partial class PluginsCatalogReadPluginConfigurationWithTypeResponse : IEq this.Name = Name; + this.OciImage = OciImage; + this.Sha256 = Sha256; this._Version = _Version; @@ -112,18 +116,27 @@ public partial class PluginsCatalogReadPluginConfigurationWithTypeResponse : IEq /// - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded. + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. + /// + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. + [DataMember(Name = "oci_image", EmitDefaultValue = false)] + + public string OciImage { get; set; } + + + /// + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded. /// - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded. + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded. [DataMember(Name = "sha256", EmitDefaultValue = false)] public string Sha256 { get; set; } /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. [DataMember(Name = "version", EmitDefaultValue = false)] public string _Version { get; set; } @@ -144,6 +157,7 @@ public override string ToString() sb.Append(" Command: ").Append(Command).Append("\n"); sb.Append(" DeprecationStatus: ").Append(DeprecationStatus).Append("\n"); sb.Append(" Name: ").Append(Name).Append("\n"); + sb.Append(" OciImage: ").Append(OciImage).Append("\n"); sb.Append(" Sha256: ").Append(Sha256).Append("\n"); sb.Append(" _Version: ").Append(_Version).Append("\n"); sb.Append("}\n"); @@ -209,6 +223,12 @@ public bool Equals(PluginsCatalogReadPluginConfigurationWithTypeResponse input) (this.Name != null && this.Name.Equals(input.Name)) + ) && + ( + this.OciImage == input.OciImage || + (this.OciImage != null && + this.OciImage.Equals(input.OciImage)) + ) && ( this.Sha256 == input.Sha256 || @@ -257,6 +277,11 @@ public override int GetHashCode() hashCode = (hashCode * 59) + this.Name.GetHashCode(); } + if (this.OciImage != null) + { + hashCode = (hashCode * 59) + this.OciImage.GetHashCode(); + } + if (this.Sha256 != null) { hashCode = (hashCode * 59) + this.Sha256.GetHashCode(); diff --git a/src/Vault/Model/PluginsCatalogRegisterPluginRequest.cs b/src/Vault/Model/PluginsCatalogRegisterPluginRequest.cs index 38295aa4..222dc299 100644 --- a/src/Vault/Model/PluginsCatalogRegisterPluginRequest.cs +++ b/src/Vault/Model/PluginsCatalogRegisterPluginRequest.cs @@ -40,12 +40,14 @@ public partial class PluginsCatalogRegisterPluginRequest : IEquatableThe environment variables passed to plugin command. Each entry is of the form \"key=value\".. - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded.. + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine.. - /// The semantic version of the plugin to use.. + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded.. + /// The semantic version of the plugin to use, or image tag if oci_image is provided.. - public PluginsCatalogRegisterPluginRequest(List Args = default(List), string Command = default(string), List Env = default(List), string Sha256 = default(string), string _Version = default(string)) + + public PluginsCatalogRegisterPluginRequest(List Args = default(List), string Command = default(string), List Env = default(List), string OciImage = default(string), string Sha256 = default(string), string _Version = default(string)) { this.Args = Args; @@ -54,6 +56,8 @@ public partial class PluginsCatalogRegisterPluginRequest : IEquatable - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded. + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. + /// + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. + [DataMember(Name = "oci_image", EmitDefaultValue = false)] + + public string OciImage { get; set; } + + + /// + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded. /// - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded. + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded. [DataMember(Name = "sha256", EmitDefaultValue = false)] public string Sha256 { get; set; } /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. [DataMember(Name = "version", EmitDefaultValue = false)] public string _Version { get; set; } @@ -118,6 +131,7 @@ public override string ToString() sb.Append(" Args: ").Append(Args).Append("\n"); sb.Append(" Command: ").Append(Command).Append("\n"); sb.Append(" Env: ").Append(Env).Append("\n"); + sb.Append(" OciImage: ").Append(OciImage).Append("\n"); sb.Append(" Sha256: ").Append(Sha256).Append("\n"); sb.Append(" _Version: ").Append(_Version).Append("\n"); sb.Append("}\n"); @@ -173,6 +187,12 @@ public bool Equals(PluginsCatalogRegisterPluginRequest input) input.Env != null && this.Env.SequenceEqual(input.Env) ) && + ( + this.OciImage == input.OciImage || + (this.OciImage != null && + this.OciImage.Equals(input.OciImage)) + + ) && ( this.Sha256 == input.Sha256 || (this.Sha256 != null && @@ -213,6 +233,11 @@ public override int GetHashCode() hashCode = (hashCode * 59) + this.Env.GetHashCode(); } + if (this.OciImage != null) + { + hashCode = (hashCode * 59) + this.OciImage.GetHashCode(); + } + if (this.Sha256 != null) { hashCode = (hashCode * 59) + this.Sha256.GetHashCode(); diff --git a/src/Vault/Model/PluginsCatalogRegisterPluginWithTypeRequest.cs b/src/Vault/Model/PluginsCatalogRegisterPluginWithTypeRequest.cs index 52ffab87..21ba16c0 100644 --- a/src/Vault/Model/PluginsCatalogRegisterPluginWithTypeRequest.cs +++ b/src/Vault/Model/PluginsCatalogRegisterPluginWithTypeRequest.cs @@ -40,12 +40,14 @@ public partial class PluginsCatalogRegisterPluginWithTypeRequest : IEquatableThe environment variables passed to plugin command. Each entry is of the form \"key=value\".. - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded.. + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine.. - /// The semantic version of the plugin to use.. + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded.. + /// The semantic version of the plugin to use, or image tag if oci_image is provided.. - public PluginsCatalogRegisterPluginWithTypeRequest(List Args = default(List), string Command = default(string), List Env = default(List), string Sha256 = default(string), string _Version = default(string)) + + public PluginsCatalogRegisterPluginWithTypeRequest(List Args = default(List), string Command = default(string), List Env = default(List), string OciImage = default(string), string Sha256 = default(string), string _Version = default(string)) { this.Args = Args; @@ -54,6 +56,8 @@ public partial class PluginsCatalogRegisterPluginWithTypeRequest : IEquatable - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded. + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. + /// + /// The name of the OCI image to be run, without the tag or SHA256. Must already be present on the machine. + [DataMember(Name = "oci_image", EmitDefaultValue = false)] + + public string OciImage { get; set; } + + + /// + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded. /// - /// The SHA256 sum of the executable used in the command field. This should be HEX encoded. + /// The SHA256 sum of the executable or container to be run. This should be HEX encoded. [DataMember(Name = "sha256", EmitDefaultValue = false)] public string Sha256 { get; set; } /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. /// - /// The semantic version of the plugin to use. + /// The semantic version of the plugin to use, or image tag if oci_image is provided. [DataMember(Name = "version", EmitDefaultValue = false)] public string _Version { get; set; } @@ -118,6 +131,7 @@ public override string ToString() sb.Append(" Args: ").Append(Args).Append("\n"); sb.Append(" Command: ").Append(Command).Append("\n"); sb.Append(" Env: ").Append(Env).Append("\n"); + sb.Append(" OciImage: ").Append(OciImage).Append("\n"); sb.Append(" Sha256: ").Append(Sha256).Append("\n"); sb.Append(" _Version: ").Append(_Version).Append("\n"); sb.Append("}\n"); @@ -173,6 +187,12 @@ public bool Equals(PluginsCatalogRegisterPluginWithTypeRequest input) input.Env != null && this.Env.SequenceEqual(input.Env) ) && + ( + this.OciImage == input.OciImage || + (this.OciImage != null && + this.OciImage.Equals(input.OciImage)) + + ) && ( this.Sha256 == input.Sha256 || (this.Sha256 != null && @@ -213,6 +233,11 @@ public override int GetHashCode() hashCode = (hashCode * 59) + this.Env.GetHashCode(); } + if (this.OciImage != null) + { + hashCode = (hashCode * 59) + this.OciImage.GetHashCode(); + } + if (this.Sha256 != null) { hashCode = (hashCode * 59) + this.Sha256.GetHashCode(); diff --git a/src/Vault/Model/PluginsRuntimesCatalogListPluginsRuntimesResponse.cs b/src/Vault/Model/PluginsRuntimesCatalogListPluginsRuntimesResponse.cs new file mode 100644 index 00000000..42529a30 --- /dev/null +++ b/src/Vault/Model/PluginsRuntimesCatalogListPluginsRuntimesResponse.cs @@ -0,0 +1,141 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; + +using System.ComponentModel.DataAnnotations; +using FileParameter = Vault.Client.FileParameter; + + +namespace Vault.Model +{ + /// + /// PluginsRuntimesCatalogListPluginsRuntimesResponse + /// + [DataContract(Name = "PluginsRuntimesCatalogListPluginsRuntimesResponse")] + public partial class PluginsRuntimesCatalogListPluginsRuntimesResponse : IEquatable, IValidatableObject + { + + + /// + /// Initializes a new instance of the class. + /// + + /// List of all plugin runtimes in the catalog. + + + public PluginsRuntimesCatalogListPluginsRuntimesResponse(List Runtimes = default(List)) + { + + this.Runtimes = Runtimes; + + } + + /// + /// List of all plugin runtimes in the catalog + /// + /// List of all plugin runtimes in the catalog + [DataMember(Name = "runtimes", EmitDefaultValue = false)] + + public List Runtimes { get; set; } + + + + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class PluginsRuntimesCatalogListPluginsRuntimesResponse {\n"); + sb.Append(" Runtimes: ").Append(Runtimes).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as PluginsRuntimesCatalogListPluginsRuntimesResponse); + } + + /// + /// Returns true if PluginsRuntimesCatalogListPluginsRuntimesResponse instances are equal + /// + /// Instance of PluginsRuntimesCatalogListPluginsRuntimesResponse to be compared + /// Boolean + public bool Equals(PluginsRuntimesCatalogListPluginsRuntimesResponse input) + { + if (input == null) + { + return false; + } + return + ( + this.Runtimes == input.Runtimes || + this.Runtimes != null && + input.Runtimes != null && + this.Runtimes.SequenceEqual(input.Runtimes) + ); + + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + + if (this.Runtimes != null) + { + hashCode = (hashCode * 59) + this.Runtimes.GetHashCode(); + } + + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/Vault/Model/PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse.cs b/src/Vault/Model/PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse.cs new file mode 100644 index 00000000..a919b40b --- /dev/null +++ b/src/Vault/Model/PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse.cs @@ -0,0 +1,258 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; + +using System.ComponentModel.DataAnnotations; +using FileParameter = Vault.Client.FileParameter; + + +namespace Vault.Model +{ + /// + /// PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse + /// + [DataContract(Name = "PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse")] + public partial class PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse : IEquatable, IValidatableObject + { + + + /// + /// Initializes a new instance of the class. + /// + + /// Optional parent cgroup for the container. + + /// The limit of runtime CPU in nanos. + + /// The limit of runtime memory in bytes. + + /// The name of the plugin runtime. + + /// The OCI-compatible runtime (default \"runsc\"). + + /// The type of the plugin runtime. + + + public PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse(string CgroupParent = default(string), long CpuNanos = default(long), long MemoryBytes = default(long), string Name = default(string), string OciRuntime = default(string), string Type = default(string)) + { + + this.CgroupParent = CgroupParent; + + this.CpuNanos = CpuNanos; + + this.MemoryBytes = MemoryBytes; + + this.Name = Name; + + this.OciRuntime = OciRuntime; + + this.Type = Type; + + } + + /// + /// Optional parent cgroup for the container + /// + /// Optional parent cgroup for the container + [DataMember(Name = "cgroup_parent", EmitDefaultValue = false)] + + public string CgroupParent { get; set; } + + + /// + /// The limit of runtime CPU in nanos + /// + /// The limit of runtime CPU in nanos + [DataMember(Name = "cpu_nanos", EmitDefaultValue = false)] + + public long CpuNanos { get; set; } + + + /// + /// The limit of runtime memory in bytes + /// + /// The limit of runtime memory in bytes + [DataMember(Name = "memory_bytes", EmitDefaultValue = false)] + + public long MemoryBytes { get; set; } + + + /// + /// The name of the plugin runtime + /// + /// The name of the plugin runtime + [DataMember(Name = "name", EmitDefaultValue = false)] + + public string Name { get; set; } + + + /// + /// The OCI-compatible runtime (default \"runsc\") + /// + /// The OCI-compatible runtime (default \"runsc\") + [DataMember(Name = "oci_runtime", EmitDefaultValue = false)] + + public string OciRuntime { get; set; } + + + /// + /// The type of the plugin runtime + /// + /// The type of the plugin runtime + [DataMember(Name = "type", EmitDefaultValue = false)] + + public string Type { get; set; } + + + + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse {\n"); + sb.Append(" CgroupParent: ").Append(CgroupParent).Append("\n"); + sb.Append(" CpuNanos: ").Append(CpuNanos).Append("\n"); + sb.Append(" MemoryBytes: ").Append(MemoryBytes).Append("\n"); + sb.Append(" Name: ").Append(Name).Append("\n"); + sb.Append(" OciRuntime: ").Append(OciRuntime).Append("\n"); + sb.Append(" Type: ").Append(Type).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse); + } + + /// + /// Returns true if PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse instances are equal + /// + /// Instance of PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse to be compared + /// Boolean + public bool Equals(PluginsRuntimesCatalogReadPluginRuntimeConfigurationResponse input) + { + if (input == null) + { + return false; + } + return + ( + this.CgroupParent == input.CgroupParent || + (this.CgroupParent != null && + this.CgroupParent.Equals(input.CgroupParent)) + + ) && + ( + this.CpuNanos == input.CpuNanos || + + this.CpuNanos.Equals(input.CpuNanos) + ) && + ( + this.MemoryBytes == input.MemoryBytes || + + this.MemoryBytes.Equals(input.MemoryBytes) + ) && + ( + this.Name == input.Name || + (this.Name != null && + this.Name.Equals(input.Name)) + + ) && + ( + this.OciRuntime == input.OciRuntime || + (this.OciRuntime != null && + this.OciRuntime.Equals(input.OciRuntime)) + + ) && + ( + this.Type == input.Type || + (this.Type != null && + this.Type.Equals(input.Type)) + + ); + + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + + if (this.CgroupParent != null) + { + hashCode = (hashCode * 59) + this.CgroupParent.GetHashCode(); + } + + + hashCode = (hashCode * 59) + this.CpuNanos.GetHashCode(); + + hashCode = (hashCode * 59) + this.MemoryBytes.GetHashCode(); + if (this.Name != null) + { + hashCode = (hashCode * 59) + this.Name.GetHashCode(); + } + + if (this.OciRuntime != null) + { + hashCode = (hashCode * 59) + this.OciRuntime.GetHashCode(); + } + + if (this.Type != null) + { + hashCode = (hashCode * 59) + this.Type.GetHashCode(); + } + + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/Vault/Model/PluginsRuntimesCatalogRegisterPluginRuntimeRequest.cs b/src/Vault/Model/PluginsRuntimesCatalogRegisterPluginRuntimeRequest.cs new file mode 100644 index 00000000..8e934910 --- /dev/null +++ b/src/Vault/Model/PluginsRuntimesCatalogRegisterPluginRuntimeRequest.cs @@ -0,0 +1,208 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; + +using System.ComponentModel.DataAnnotations; +using FileParameter = Vault.Client.FileParameter; + + +namespace Vault.Model +{ + /// + /// PluginsRuntimesCatalogRegisterPluginRuntimeRequest + /// + [DataContract(Name = "PluginsRuntimesCatalogRegisterPluginRuntimeRequest")] + public partial class PluginsRuntimesCatalogRegisterPluginRuntimeRequest : IEquatable, IValidatableObject + { + + + /// + /// Initializes a new instance of the class. + /// + + /// Optional parent cgroup for the container. + + /// The limit of runtime CPU in nanos. + + /// The limit of runtime memory in bytes. + + /// The OCI-compatible runtime (default \"runsc\"). + + + public PluginsRuntimesCatalogRegisterPluginRuntimeRequest(string CgroupParent = default(string), long CpuNanos = default(long), long MemoryBytes = default(long), string OciRuntime = default(string)) + { + + this.CgroupParent = CgroupParent; + + this.CpuNanos = CpuNanos; + + this.MemoryBytes = MemoryBytes; + + this.OciRuntime = OciRuntime; + + } + + /// + /// Optional parent cgroup for the container + /// + /// Optional parent cgroup for the container + [DataMember(Name = "cgroup_parent", EmitDefaultValue = false)] + + public string CgroupParent { get; set; } + + + /// + /// The limit of runtime CPU in nanos + /// + /// The limit of runtime CPU in nanos + [DataMember(Name = "cpu_nanos", EmitDefaultValue = false)] + + public long CpuNanos { get; set; } + + + /// + /// The limit of runtime memory in bytes + /// + /// The limit of runtime memory in bytes + [DataMember(Name = "memory_bytes", EmitDefaultValue = false)] + + public long MemoryBytes { get; set; } + + + /// + /// The OCI-compatible runtime (default \"runsc\") + /// + /// The OCI-compatible runtime (default \"runsc\") + [DataMember(Name = "oci_runtime", EmitDefaultValue = false)] + + public string OciRuntime { get; set; } + + + + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class PluginsRuntimesCatalogRegisterPluginRuntimeRequest {\n"); + sb.Append(" CgroupParent: ").Append(CgroupParent).Append("\n"); + sb.Append(" CpuNanos: ").Append(CpuNanos).Append("\n"); + sb.Append(" MemoryBytes: ").Append(MemoryBytes).Append("\n"); + sb.Append(" OciRuntime: ").Append(OciRuntime).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as PluginsRuntimesCatalogRegisterPluginRuntimeRequest); + } + + /// + /// Returns true if PluginsRuntimesCatalogRegisterPluginRuntimeRequest instances are equal + /// + /// Instance of PluginsRuntimesCatalogRegisterPluginRuntimeRequest to be compared + /// Boolean + public bool Equals(PluginsRuntimesCatalogRegisterPluginRuntimeRequest input) + { + if (input == null) + { + return false; + } + return + ( + this.CgroupParent == input.CgroupParent || + (this.CgroupParent != null && + this.CgroupParent.Equals(input.CgroupParent)) + + ) && + ( + this.CpuNanos == input.CpuNanos || + + this.CpuNanos.Equals(input.CpuNanos) + ) && + ( + this.MemoryBytes == input.MemoryBytes || + + this.MemoryBytes.Equals(input.MemoryBytes) + ) && + ( + this.OciRuntime == input.OciRuntime || + (this.OciRuntime != null && + this.OciRuntime.Equals(input.OciRuntime)) + + ); + + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + + if (this.CgroupParent != null) + { + hashCode = (hashCode * 59) + this.CgroupParent.GetHashCode(); + } + + + hashCode = (hashCode * 59) + this.CpuNanos.GetHashCode(); + + hashCode = (hashCode * 59) + this.MemoryBytes.GetHashCode(); + if (this.OciRuntime != null) + { + hashCode = (hashCode * 59) + this.OciRuntime.GetHashCode(); + } + + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/Vault/Model/RateLimitQuotasReadResponse.cs b/src/Vault/Model/RateLimitQuotasReadResponse.cs index cf3c117c..89df4d04 100644 --- a/src/Vault/Model/RateLimitQuotasReadResponse.cs +++ b/src/Vault/Model/RateLimitQuotasReadResponse.cs @@ -36,6 +36,8 @@ public partial class RateLimitQuotasReadResponse : IEquatableBlockInterval. + /// Inheritable. + /// Interval. /// Name. @@ -49,11 +51,13 @@ public partial class RateLimitQuotasReadResponse : IEquatableType. - public RateLimitQuotasReadResponse(int BlockInterval = default(int), int Interval = default(int), string Name = default(string), string Path = default(string), float Rate = default(float), string Role = default(string), string Type = default(string)) + public RateLimitQuotasReadResponse(int BlockInterval = default(int), bool Inheritable = default(bool), int Interval = default(int), string Name = default(string), string Path = default(string), float Rate = default(float), string Role = default(string), string Type = default(string)) { this.BlockInterval = BlockInterval; + this.Inheritable = Inheritable; + this.Interval = Interval; this.Name = Name; @@ -76,6 +80,14 @@ public partial class RateLimitQuotasReadResponse : IEquatable + /// Gets or Sets Inheritable + /// + [DataMember(Name = "inheritable", EmitDefaultValue = true)] + + public bool Inheritable { get; set; } + + /// /// Gets or Sets Interval /// @@ -135,6 +147,7 @@ public override string ToString() StringBuilder sb = new StringBuilder(); sb.Append("class RateLimitQuotasReadResponse {\n"); sb.Append(" BlockInterval: ").Append(BlockInterval).Append("\n"); + sb.Append(" Inheritable: ").Append(Inheritable).Append("\n"); sb.Append(" Interval: ").Append(Interval).Append("\n"); sb.Append(" Name: ").Append(Name).Append("\n"); sb.Append(" Path: ").Append(Path).Append("\n"); @@ -181,6 +194,11 @@ public bool Equals(RateLimitQuotasReadResponse input) this.BlockInterval.Equals(input.BlockInterval) ) && + ( + this.Inheritable == input.Inheritable || + + this.Inheritable.Equals(input.Inheritable) + ) && ( this.Interval == input.Interval || @@ -231,6 +249,8 @@ public override int GetHashCode() hashCode = (hashCode * 59) + this.BlockInterval.GetHashCode(); + hashCode = (hashCode * 59) + this.Inheritable.GetHashCode(); + hashCode = (hashCode * 59) + this.Interval.GetHashCode(); if (this.Name != null) { diff --git a/src/Vault/Model/RateLimitQuotasWriteRequest.cs b/src/Vault/Model/RateLimitQuotasWriteRequest.cs index 7692433d..70e01051 100644 --- a/src/Vault/Model/RateLimitQuotasWriteRequest.cs +++ b/src/Vault/Model/RateLimitQuotasWriteRequest.cs @@ -36,6 +36,8 @@ public partial class RateLimitQuotasWriteRequest : IEquatableIf set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' has elapsed.. + /// Whether all child namespaces can inherit this namespace quota.. + /// The duration to enforce rate limiting for (default '1s').. /// Path of the mount or namespace to apply the quota. A blank path configures a global quota. For example namespace1/ adds a quota to a full namespace, namespace1/auth/userpass adds a quota to userpass in namespace1.. @@ -47,11 +49,13 @@ public partial class RateLimitQuotasWriteRequest : IEquatableType of the quota rule.. - public RateLimitQuotasWriteRequest(string BlockInterval = default(string), string Interval = default(string), string Path = default(string), float Rate = default(float), string Role = default(string), string Type = default(string)) + public RateLimitQuotasWriteRequest(string BlockInterval = default(string), bool Inheritable = default(bool), string Interval = default(string), string Path = default(string), float Rate = default(float), string Role = default(string), string Type = default(string)) { this.BlockInterval = BlockInterval; + this.Inheritable = Inheritable; + this.Interval = Interval; this.Path = Path; @@ -73,6 +77,15 @@ public partial class RateLimitQuotasWriteRequest : IEquatable + /// Whether all child namespaces can inherit this namespace quota. + /// + /// Whether all child namespaces can inherit this namespace quota. + [DataMember(Name = "inheritable", EmitDefaultValue = true)] + + public bool Inheritable { get; set; } + + /// /// The duration to enforce rate limiting for (default '1s'). /// @@ -129,6 +142,7 @@ public override string ToString() StringBuilder sb = new StringBuilder(); sb.Append("class RateLimitQuotasWriteRequest {\n"); sb.Append(" BlockInterval: ").Append(BlockInterval).Append("\n"); + sb.Append(" Inheritable: ").Append(Inheritable).Append("\n"); sb.Append(" Interval: ").Append(Interval).Append("\n"); sb.Append(" Path: ").Append(Path).Append("\n"); sb.Append(" Rate: ").Append(Rate).Append("\n"); @@ -175,6 +189,11 @@ public bool Equals(RateLimitQuotasWriteRequest input) this.BlockInterval.Equals(input.BlockInterval)) ) && + ( + this.Inheritable == input.Inheritable || + + this.Inheritable.Equals(input.Inheritable) + ) && ( this.Interval == input.Interval || (this.Interval != null && @@ -222,6 +241,8 @@ public override int GetHashCode() hashCode = (hashCode * 59) + this.BlockInterval.GetHashCode(); } + + hashCode = (hashCode * 59) + this.Inheritable.GetHashCode(); if (this.Interval != null) { hashCode = (hashCode * 59) + this.Interval.GetHashCode(); diff --git a/src/Vault/Model/TransitGenerateCsrForKeyRequest.cs b/src/Vault/Model/TransitGenerateCsrForKeyRequest.cs new file mode 100644 index 00000000..759518dd --- /dev/null +++ b/src/Vault/Model/TransitGenerateCsrForKeyRequest.cs @@ -0,0 +1,162 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; + +using System.ComponentModel.DataAnnotations; +using FileParameter = Vault.Client.FileParameter; + + +namespace Vault.Model +{ + /// + /// TransitGenerateCsrForKeyRequest + /// + [DataContract(Name = "TransitGenerateCsrForKeyRequest")] + public partial class TransitGenerateCsrForKeyRequest : IEquatable, IValidatableObject + { + + + /// + /// Initializes a new instance of the class. + /// + + /// PEM encoded CSR template. The information attributes will be used as a basis for the CSR with the key in transit. If not set, an empty CSR is returned.. + + /// Optional version of key, 'latest' if not set. + + + public TransitGenerateCsrForKeyRequest(string Csr = default(string), int _Version = default(int)) + { + + this.Csr = Csr; + + this._Version = _Version; + + } + + /// + /// PEM encoded CSR template. The information attributes will be used as a basis for the CSR with the key in transit. If not set, an empty CSR is returned. + /// + /// PEM encoded CSR template. The information attributes will be used as a basis for the CSR with the key in transit. If not set, an empty CSR is returned. + [DataMember(Name = "csr", EmitDefaultValue = false)] + + public string Csr { get; set; } + + + /// + /// Optional version of key, 'latest' if not set + /// + /// Optional version of key, 'latest' if not set + [DataMember(Name = "version", EmitDefaultValue = false)] + + public int _Version { get; set; } + + + + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class TransitGenerateCsrForKeyRequest {\n"); + sb.Append(" Csr: ").Append(Csr).Append("\n"); + sb.Append(" _Version: ").Append(_Version).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as TransitGenerateCsrForKeyRequest); + } + + /// + /// Returns true if TransitGenerateCsrForKeyRequest instances are equal + /// + /// Instance of TransitGenerateCsrForKeyRequest to be compared + /// Boolean + public bool Equals(TransitGenerateCsrForKeyRequest input) + { + if (input == null) + { + return false; + } + return + ( + this.Csr == input.Csr || + (this.Csr != null && + this.Csr.Equals(input.Csr)) + + ) && + ( + this._Version == input._Version || + + this._Version.Equals(input._Version) + ); + + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + + if (this.Csr != null) + { + hashCode = (hashCode * 59) + this.Csr.GetHashCode(); + } + + + hashCode = (hashCode * 59) + this._Version.GetHashCode(); + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/Vault/Model/TransitSetCertificateForKeyRequest.cs b/src/Vault/Model/TransitSetCertificateForKeyRequest.cs new file mode 100644 index 00000000..d8d0658e --- /dev/null +++ b/src/Vault/Model/TransitSetCertificateForKeyRequest.cs @@ -0,0 +1,174 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 +// +// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT. + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; + +using System.ComponentModel.DataAnnotations; +using FileParameter = Vault.Client.FileParameter; + + +namespace Vault.Model +{ + /// + /// TransitSetCertificateForKeyRequest + /// + [DataContract(Name = "TransitSetCertificateForKeyRequest")] + public partial class TransitSetCertificateForKeyRequest : IEquatable, IValidatableObject + { + + /// + /// Initializes a new instance of the class. + /// + [JsonConstructorAttribute] + protected TransitSetCertificateForKeyRequest() { } + + + /// + /// Initializes a new instance of the class. + /// + + /// PEM encoded certificate chain. It should be composed by one or more concatenated PEM blocks and ordered starting from the end-entity certificate. (required). + + /// Optional version of key, 'latest' if not set. + + + public TransitSetCertificateForKeyRequest(string CertificateChain = default(string), int _Version = default(int)) + { + + // to ensure "CertificateChain" is required (not null) + if (CertificateChain == null) + { + throw new ArgumentNullException("CertificateChain is a required property for TransitSetCertificateForKeyRequest and cannot be null"); + } + this.CertificateChain = CertificateChain; + + + this._Version = _Version; + + } + + /// + /// PEM encoded certificate chain. It should be composed by one or more concatenated PEM blocks and ordered starting from the end-entity certificate. + /// + /// PEM encoded certificate chain. It should be composed by one or more concatenated PEM blocks and ordered starting from the end-entity certificate. + [DataMember(Name = "certificate_chain", IsRequired = true, EmitDefaultValue = false)] + + public string CertificateChain { get; set; } + + + /// + /// Optional version of key, 'latest' if not set + /// + /// Optional version of key, 'latest' if not set + [DataMember(Name = "version", EmitDefaultValue = false)] + + public int _Version { get; set; } + + + + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class TransitSetCertificateForKeyRequest {\n"); + sb.Append(" CertificateChain: ").Append(CertificateChain).Append("\n"); + sb.Append(" _Version: ").Append(_Version).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as TransitSetCertificateForKeyRequest); + } + + /// + /// Returns true if TransitSetCertificateForKeyRequest instances are equal + /// + /// Instance of TransitSetCertificateForKeyRequest to be compared + /// Boolean + public bool Equals(TransitSetCertificateForKeyRequest input) + { + if (input == null) + { + return false; + } + return + ( + this.CertificateChain == input.CertificateChain || + (this.CertificateChain != null && + this.CertificateChain.Equals(input.CertificateChain)) + + ) && + ( + this._Version == input._Version || + + this._Version.Equals(input._Version) + ); + + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + + if (this.CertificateChain != null) + { + hashCode = (hashCode * 59) + this.CertificateChain.GetHashCode(); + } + + + hashCode = (hashCode * 59) + this._Version.GetHashCode(); + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +}