Add latest changes from gitlab-org/gitlab@master

This commit is contained in:
GitLab Bot 2025-01-16 06:36:38 +00:00
parent a9bc7ae71e
commit 0ba37cae2d
1457 changed files with 85 additions and 270782 deletions

View File

@ -44,9 +44,6 @@ include:
- local: .gitlab/ci/templates/gem.gitlab-ci.yml
inputs:
gem_name: "gitlab-housekeeper"
- local: .gitlab/ci/templates/gem.gitlab-ci.yml
inputs:
gem_name: "openbao_client"
- local: .gitlab/ci/templates/gem.gitlab-ci.yml
inputs:
gem_name: "gitlab-active-context"

View File

@ -48,7 +48,6 @@ gem 'bootsnap', '~> 1.18.3', require: false, feature_category: :shared
gem 'ffi', '~> 1.17', force_ruby_platform: true, feature_category: :shared
gem 'openssl', '~> 3.0', feature_category: :shared
gem 'ipaddr', '~> 1.2.5', feature_category: :shared
gem 'gitlab-safe_request_store', path: 'gems/gitlab-safe_request_store', feature_category: :shared
@ -758,8 +757,6 @@ gem 'duo_api', '~> 1.3', feature_category: :system_access
gem 'gitlab-sdk', '~> 0.3.0', feature_category: :application_instrumentation
gem 'openbao_client', path: 'gems/openbao_client', feature_category: :artifact_security
gem 'paper_trail', '~> 15.0', feature_category: :shared
gem "i18n_data", "~> 0.13.1", feature_category: :system_access

View File

@ -341,7 +341,6 @@
{"name":"influxdb-client","version":"3.2.0","platform":"ruby","checksum":"dc1e8ec80542f64c9f31af6d9bfa4c147474bf32b9179a7f0cab970793b8e1f2"},
{"name":"invisible_captcha","version":"2.1.0","platform":"ruby","checksum":"02b452f3eb1b691d155ba3e8e97e1be0e6b6be62e8bc94957234b9cde0852b1e"},
{"name":"io-event","version":"1.6.5","platform":"ruby","checksum":"5da4c044ac5f411563da1a4743d28c8d30d7802e29370db42139a52b807b4ce2"},
{"name":"ipaddr","version":"1.2.7","platform":"ruby","checksum":"cb7f4087fdbf14bcedc23ac471b8ac521648b3a5b4b5be3a4378066636e6af72"},
{"name":"ipaddress","version":"0.8.3","platform":"ruby","checksum":"85640c4f9194c26937afc8c78e3074a8e7c97d5d1210358d1440f01034d006f5"},
{"name":"jaeger-client","version":"1.1.0","platform":"ruby","checksum":"cb5e9b9bbee6ee8d6a82d03d947a5b04543d8c0a949c22e484254f18d8a458a8"},
{"name":"jaro_winkler","version":"1.5.6","platform":"java","checksum":"3262aea433861fec3179184e9adc1933cca8bc15665957a143b56816f1a22f74"},

View File

@ -123,12 +123,6 @@ PATH
diffy (~> 3.4)
oj (~> 3.13.16)
PATH
remote: gems/openbao_client
specs:
openbao_client (1.0.0)
typhoeus (~> 1.0, >= 1.0.1)
PATH
remote: vendor/gems/attr_encrypted
specs:
@ -1030,7 +1024,6 @@ GEM
invisible_captcha (2.1.0)
rails (>= 5.2)
io-event (1.6.5)
ipaddr (1.2.7)
ipaddress (0.8.3)
jaeger-client (1.1.0)
opentracing (~> 0.3)
@ -2156,7 +2149,6 @@ DEPENDENCIES
icalendar (~> 2.10.1)
influxdb-client (~> 3.1)
invisible_captcha (~> 2.1.0)
ipaddr (~> 1.2.5)
ipaddress (~> 0.8.3)
ipynbdiff!
jira-ruby (~> 2.3.0)
@ -2214,7 +2206,6 @@ DEPENDENCIES
omniauth-shibboleth-redux (~> 2.0)
omniauth_crowd (~> 2.4.0)!
omniauth_openid_connect (~> 0.8.0)
openbao_client!
openid_connect (~> 2.3.0)
openssl (~> 3.0)
opentelemetry-exporter-otlp

View File

@ -343,7 +343,6 @@
{"name":"io-console","version":"0.8.0","platform":"java","checksum":"3cc6fd5c66e587145c1fdf8dc40c2e3d851e90722a5d0cc3f38da352f06fe1bd"},
{"name":"io-console","version":"0.8.0","platform":"ruby","checksum":"cd6a9facbc69871d69b2cb8b926fc6ea7ef06f06e505e81a64f14a470fddefa2"},
{"name":"io-event","version":"1.6.5","platform":"ruby","checksum":"5da4c044ac5f411563da1a4743d28c8d30d7802e29370db42139a52b807b4ce2"},
{"name":"ipaddr","version":"1.2.7","platform":"ruby","checksum":"cb7f4087fdbf14bcedc23ac471b8ac521648b3a5b4b5be3a4378066636e6af72"},
{"name":"ipaddress","version":"0.8.3","platform":"ruby","checksum":"85640c4f9194c26937afc8c78e3074a8e7c97d5d1210358d1440f01034d006f5"},
{"name":"irb","version":"1.14.3","platform":"ruby","checksum":"c457f1f2f1438ae9ce5c5be3981ae2138dec7fb894c7d73777eeeb0a6c0d0752"},
{"name":"jaeger-client","version":"1.1.0","platform":"ruby","checksum":"cb5e9b9bbee6ee8d6a82d03d947a5b04543d8c0a949c22e484254f18d8a458a8"},

View File

@ -123,12 +123,6 @@ PATH
diffy (~> 3.4)
oj (~> 3.13.16)
PATH
remote: gems/openbao_client
specs:
openbao_client (1.0.0)
typhoeus (~> 1.0, >= 1.0.1)
PATH
remote: vendor/gems/attr_encrypted
specs:
@ -1043,7 +1037,6 @@ GEM
rails (>= 5.2)
io-console (0.8.0)
io-event (1.6.5)
ipaddr (1.2.7)
ipaddress (0.8.3)
irb (1.14.3)
rdoc (>= 4.0.0)
@ -2187,7 +2180,6 @@ DEPENDENCIES
icalendar (~> 2.10.1)
influxdb-client (~> 3.1)
invisible_captcha (~> 2.1.0)
ipaddr (~> 1.2.5)
ipaddress (~> 0.8.3)
ipynbdiff!
jira-ruby (~> 2.3.0)
@ -2245,7 +2237,6 @@ DEPENDENCIES
omniauth-shibboleth-redux (~> 2.0)
omniauth_crowd (~> 2.4.0)!
omniauth_openid_connect (~> 0.8.0)
openbao_client!
openid_connect (~> 2.3.0)
openssl (~> 3.0)
opentelemetry-exporter-otlp

View File

@ -71,6 +71,28 @@ export default {
isFileDiscussion() {
return this.positionType === FILE_DIFF_POSITION_TYPE;
},
showHeader() {
return (
this.discussion.diff_file || this.discussion.original_position.position_type === 'file'
);
},
backfilledDiffFile() {
/*
* https://gitlab.com/gitlab-com/gl-infra/production/-/issues/19118
*
* For the vast majority of cases, this should just be discussion.diff_file,
* but due to that defect, there are potentially some file discussions that cannot
* be rendered because there is no diff file attached
*
* This allows the header to display (sans file mode change) to roughly simulate
* having an actual diff file.
*/
return (
this.discussion.diff_file || {
file_path: this.discussion.original_position.new_path,
}
);
},
},
mounted() {
if (this.isTextFile && !this.hasTruncatedDiffLines) {
@ -98,9 +120,9 @@ export default {
<template>
<div :class="{ 'text-file': isTextFile }" class="diff-file file-holder">
<diff-file-header
v-if="discussion.diff_file"
v-if="showHeader"
:discussion-path="discussion.discussion_path"
:diff-file="discussion.diff_file"
:diff-file="backfilledDiffFile"
:can-current-user-fork="false"
class="gl-border gl-border-section"
:expanded="!isCollapsed"

View File

@ -162,8 +162,11 @@ export default {
return !this.discussionResolved ? this.discussion.resolve_with_issue_path : '';
},
canShowReplyActions() {
if (this.shouldRenderDiffs && !this.discussion.diff_file?.diff_refs) {
return false;
if (this.shouldRenderDiffs) {
return (
this.discussion.original_position.position_type === 'file' ||
this.discussion.diff_file?.diff_refs
);
}
return true;

View File

@ -20,23 +20,24 @@ module Types
null: false,
description:
'Container repository path pattern protected by the protection rule. ' \
'For example, `my-project/my-container-*`. Wildcard character `*` allowed.'
'Must start with the projects full path. For example: `my-project/*-prod-*`. ' \
'Wildcard character `*` is allowed anywhere after the projects full path.'
field :minimum_access_level_for_delete,
Types::ContainerRegistry::Protection::RuleAccessLevelEnum,
null: true,
description:
'Minimum GitLab access level required to delete container images from the container repository. ' \
'Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`.' \
'If the value is `nil`, the default minimum access level is `DEVELOPER`'
'Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. ' \
'If the value is `nil`, the default minimum access level is `DEVELOPER`.'
field :minimum_access_level_for_push,
Types::ContainerRegistry::Protection::RuleAccessLevelEnum,
null: true,
description:
'Minimum GitLab access level required to push container images to the container repository. ' \
'Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`.' \
'If the value is `nil`, the default minimum access level is `DEVELOPER`'
'Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. ' \
'If the value is `nil`, the default minimum access level is `DEVELOPER`.'
end
end
end

View File

@ -31,9 +31,8 @@ module Types
experiment: { milestone: '17.8' },
description:
'Minimum GitLab access level required to delete container image tags from the container repository. ' \
'For example, `MAINTAINER`, `OWNER`, or `ADMIN`. ' \
'If the value is `nil`, the minimum access level is ignored. ' \
'Users with at least the Developer role can delete container image tags.'
'Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. ' \
'If the value is `nil`, the default minimum access level is `DEVELOPER`.'
field :minimum_access_level_for_push,
Types::ContainerRegistry::Protection::TagRuleAccessLevelEnum,
@ -41,9 +40,8 @@ module Types
experiment: { milestone: '17.8' },
description:
'Minimum GitLab access level required to push container image tags to the container repository. ' \
'For example, `MAINTAINER`, `OWNER`, or `ADMIN`. ' \
'If the value is `nil`, the minimum access level is ignored. ' \
'Users with at least the Developer role can push container image tags.'
'Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. ' \
'If the value is `nil`, the default minimum access level is `DEVELOPER`.'
# rubocop:enable GraphQL/ExtractType -- These are stored as user preferences
end
end

View File

@ -36,7 +36,8 @@ module Types
experiment: { milestone: '16.5' },
description:
'Minimum GitLab access required to push packages to the package registry. ' \
'For example, `MAINTAINER`, `OWNER`, or `ADMIN`.'
'Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. ' \
'If the value is `nil`, the default minimum access level is `DEVELOPER`.'
end
end
end

View File

@ -3747,10 +3747,10 @@ Input type: `CreateContainerProtectionRepositoryRuleInput`
| Name | Type | Description |
| ---- | ---- | ----------- |
| <a id="mutationcreatecontainerprotectionrepositoryruleclientmutationid"></a>`clientMutationId` | [`String`](#string) | A unique identifier for the client performing the mutation. |
| <a id="mutationcreatecontainerprotectionrepositoryruleminimumaccesslevelfordelete"></a>`minimumAccessLevelForDelete` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to delete container images from the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`.If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="mutationcreatecontainerprotectionrepositoryruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to push container images to the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`.If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="mutationcreatecontainerprotectionrepositoryruleminimumaccesslevelfordelete"></a>`minimumAccessLevelForDelete` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to delete container images from the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="mutationcreatecontainerprotectionrepositoryruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to push container images to the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="mutationcreatecontainerprotectionrepositoryruleprojectpath"></a>`projectPath` | [`ID!`](#id) | Full path of the project where a protection rule is located. |
| <a id="mutationcreatecontainerprotectionrepositoryrulerepositorypathpattern"></a>`repositoryPathPattern` | [`String!`](#string) | Container repository path pattern protected by the protection rule. For example, `my-project/my-container-*`. Wildcard character `*` allowed. |
| <a id="mutationcreatecontainerprotectionrepositoryrulerepositorypathpattern"></a>`repositoryPathPattern` | [`String!`](#string) | Container repository path pattern protected by the protection rule. Must start with the projects full path. For example: `my-project/*-prod-*`. Wildcard character `*` is allowed anywhere after the projects full path. |
#### Fields
@ -3775,8 +3775,8 @@ Input type: `createContainerProtectionTagRuleInput`
| Name | Type | Description |
| ---- | ---- | ----------- |
| <a id="mutationcreatecontainerprotectiontagruleclientmutationid"></a>`clientMutationId` | [`String`](#string) | A unique identifier for the client performing the mutation. |
| <a id="mutationcreatecontainerprotectiontagruleminimumaccesslevelfordelete"></a>`minimumAccessLevelForDelete` | [`ContainerProtectionTagRuleAccessLevel!`](#containerprotectiontagruleaccesslevel) | Minimum GitLab access level required to delete container image tags from the container repository. For example, `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the minimum access level is ignored. Users with at least the Developer role can delete container image tags. Introduced in GitLab 17.8: **Status**: Experiment. |
| <a id="mutationcreatecontainerprotectiontagruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` | [`ContainerProtectionTagRuleAccessLevel!`](#containerprotectiontagruleaccesslevel) | Minimum GitLab access level required to push container image tags to the container repository. For example, `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the minimum access level is ignored. Users with at least the Developer role can push container image tags. Introduced in GitLab 17.8: **Status**: Experiment. |
| <a id="mutationcreatecontainerprotectiontagruleminimumaccesslevelfordelete"></a>`minimumAccessLevelForDelete` | [`ContainerProtectionTagRuleAccessLevel!`](#containerprotectiontagruleaccesslevel) | Minimum GitLab access level required to delete container image tags from the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. Introduced in GitLab 17.8: **Status**: Experiment. |
| <a id="mutationcreatecontainerprotectiontagruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` | [`ContainerProtectionTagRuleAccessLevel!`](#containerprotectiontagruleaccesslevel) | Minimum GitLab access level required to push container image tags to the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. Introduced in GitLab 17.8: **Status**: Experiment. |
| <a id="mutationcreatecontainerprotectiontagruleprojectpath"></a>`projectPath` | [`ID!`](#id) | Full path of the project containing the container image tags. |
| <a id="mutationcreatecontainerprotectiontagruletagnamepattern"></a>`tagNamePattern` | [`String!`](#string) | The pattern that matches container image tags to protect. For example, `v1.*`. Wildcard character `*` allowed. Introduced in GitLab 17.8: **Status**: Experiment. |
@ -4025,7 +4025,7 @@ Input type: `CreatePackagesProtectionRuleInput`
| Name | Type | Description |
| ---- | ---- | ----------- |
| <a id="mutationcreatepackagesprotectionruleclientmutationid"></a>`clientMutationId` | [`String`](#string) | A unique identifier for the client performing the mutation. |
| <a id="mutationcreatepackagesprotectionruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` | [`PackagesProtectionRuleAccessLevel!`](#packagesprotectionruleaccesslevel) | Minimum GitLab access required to push packages to the package registry. For example, `MAINTAINER`, `OWNER`, or `ADMIN`. Introduced in GitLab 16.5: **Status**: Experiment. |
| <a id="mutationcreatepackagesprotectionruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` | [`PackagesProtectionRuleAccessLevel!`](#packagesprotectionruleaccesslevel) | Minimum GitLab access required to push packages to the package registry. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. Introduced in GitLab 16.5: **Status**: Experiment. |
| <a id="mutationcreatepackagesprotectionrulepackagenamepattern"></a>`packageNamePattern` | [`String!`](#string) | Package name protected by the protection rule. For example `@my-scope/my-package-*`. Wildcard character `*` allowed. |
| <a id="mutationcreatepackagesprotectionrulepackagetype"></a>`packageType` | [`PackagesProtectionRulePackageType!`](#packagesprotectionrulepackagetype) | Package type protected by the protection rule. For example `NPM`. |
| <a id="mutationcreatepackagesprotectionruleprojectpath"></a>`projectPath` | [`ID!`](#id) | Full path of the project where a protection rule is located. |
@ -10382,9 +10382,9 @@ Input type: `UpdateContainerProtectionRepositoryRuleInput`
| ---- | ---- | ----------- |
| <a id="mutationupdatecontainerprotectionrepositoryruleclientmutationid"></a>`clientMutationId` | [`String`](#string) | A unique identifier for the client performing the mutation. |
| <a id="mutationupdatecontainerprotectionrepositoryruleid"></a>`id` | [`ContainerRegistryProtectionRuleID!`](#containerregistryprotectionruleid) | Global ID of the container repository protection rule to be updated. |
| <a id="mutationupdatecontainerprotectionrepositoryruleminimumaccesslevelfordelete"></a>`minimumAccessLevelForDelete` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to delete container images from the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`.If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="mutationupdatecontainerprotectionrepositoryruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to push container images to the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`.If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="mutationupdatecontainerprotectionrepositoryrulerepositorypathpattern"></a>`repositoryPathPattern` | [`String`](#string) | Container repository path pattern protected by the protection rule. For example, `my-project/my-container-*`. Wildcard character `*` allowed. |
| <a id="mutationupdatecontainerprotectionrepositoryruleminimumaccesslevelfordelete"></a>`minimumAccessLevelForDelete` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to delete container images from the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="mutationupdatecontainerprotectionrepositoryruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to push container images to the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="mutationupdatecontainerprotectionrepositoryrulerepositorypathpattern"></a>`repositoryPathPattern` | [`String`](#string) | Container repository path pattern protected by the protection rule. Must start with the projects full path. For example: `my-project/*-prod-*`. Wildcard character `*` is allowed anywhere after the projects full path. |
#### Fields
@ -21849,9 +21849,9 @@ A container repository protection rule designed to prevent users with a certain
| Name | Type | Description |
| ---- | ---- | ----------- |
| <a id="containerprotectionrepositoryruleid"></a>`id` | [`ContainerRegistryProtectionRuleID!`](#containerregistryprotectionruleid) | ID of the container repository protection rule. |
| <a id="containerprotectionrepositoryruleminimumaccesslevelfordelete"></a>`minimumAccessLevelForDelete` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to delete container images from the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`.If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="containerprotectionrepositoryruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to push container images to the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`.If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="containerprotectionrepositoryrulerepositorypathpattern"></a>`repositoryPathPattern` | [`String!`](#string) | Container repository path pattern protected by the protection rule. For example, `my-project/my-container-*`. Wildcard character `*` allowed. |
| <a id="containerprotectionrepositoryruleminimumaccesslevelfordelete"></a>`minimumAccessLevelForDelete` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to delete container images from the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="containerprotectionrepositoryruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` | [`ContainerProtectionRepositoryRuleAccessLevel`](#containerprotectionrepositoryruleaccesslevel) | Minimum GitLab access level required to push container images to the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="containerprotectionrepositoryrulerepositorypathpattern"></a>`repositoryPathPattern` | [`String!`](#string) | Container repository path pattern protected by the protection rule. Must start with the projects full path. For example: `my-project/*-prod-*`. Wildcard character `*` is allowed anywhere after the projects full path. |
### `ContainerProtectionTagRule`
@ -21862,8 +21862,8 @@ A container repository tag protection rule designed to prevent users with a cert
| Name | Type | Description |
| ---- | ---- | ----------- |
| <a id="containerprotectiontagruleid"></a>`id` **{warning-solid}** | [`ContainerRegistryProtectionTagRuleID!`](#containerregistryprotectiontagruleid) | **Introduced** in GitLab 17.8. **Status**: Experiment. ID of the container repository tag protection rule. |
| <a id="containerprotectiontagruleminimumaccesslevelfordelete"></a>`minimumAccessLevelForDelete` **{warning-solid}** | [`ContainerProtectionTagRuleAccessLevel!`](#containerprotectiontagruleaccesslevel) | **Introduced** in GitLab 17.8. **Status**: Experiment. Minimum GitLab access level required to delete container image tags from the container repository. For example, `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the minimum access level is ignored. Users with at least the Developer role can delete container image tags. |
| <a id="containerprotectiontagruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` **{warning-solid}** | [`ContainerProtectionTagRuleAccessLevel!`](#containerprotectiontagruleaccesslevel) | **Introduced** in GitLab 17.8. **Status**: Experiment. Minimum GitLab access level required to push container image tags to the container repository. For example, `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the minimum access level is ignored. Users with at least the Developer role can push container image tags. |
| <a id="containerprotectiontagruleminimumaccesslevelfordelete"></a>`minimumAccessLevelForDelete` **{warning-solid}** | [`ContainerProtectionTagRuleAccessLevel!`](#containerprotectiontagruleaccesslevel) | **Introduced** in GitLab 17.8. **Status**: Experiment. Minimum GitLab access level required to delete container image tags from the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="containerprotectiontagruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` **{warning-solid}** | [`ContainerProtectionTagRuleAccessLevel!`](#containerprotectiontagruleaccesslevel) | **Introduced** in GitLab 17.8. **Status**: Experiment. Minimum GitLab access level required to push container image tags to the container repository. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="containerprotectiontagruletagnamepattern"></a>`tagNamePattern` **{warning-solid}** | [`String!`](#string) | **Introduced** in GitLab 17.8. **Status**: Experiment. The pattern that matches container image tags to protect. For example, `v1.*`. Wildcard character `*` allowed. |
### `ContainerRepository`
@ -31202,7 +31202,7 @@ A packages protection rule designed to protect packages from being pushed by use
| Name | Type | Description |
| ---- | ---- | ----------- |
| <a id="packagesprotectionruleid"></a>`id` **{warning-solid}** | [`PackagesProtectionRuleID!`](#packagesprotectionruleid) | **Introduced** in GitLab 16.5. **Status**: Experiment. ID of the package protection rule. |
| <a id="packagesprotectionruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` **{warning-solid}** | [`PackagesProtectionRuleAccessLevel!`](#packagesprotectionruleaccesslevel) | **Introduced** in GitLab 16.5. **Status**: Experiment. Minimum GitLab access required to push packages to the package registry. For example, `MAINTAINER`, `OWNER`, or `ADMIN`. |
| <a id="packagesprotectionruleminimumaccesslevelforpush"></a>`minimumAccessLevelForPush` **{warning-solid}** | [`PackagesProtectionRuleAccessLevel!`](#packagesprotectionruleaccesslevel) | **Introduced** in GitLab 16.5. **Status**: Experiment. Minimum GitLab access required to push packages to the package registry. Valid values include `MAINTAINER`, `OWNER`, or `ADMIN`. If the value is `nil`, the default minimum access level is `DEVELOPER`. |
| <a id="packagesprotectionrulepackagenamepattern"></a>`packageNamePattern` **{warning-solid}** | [`String!`](#string) | **Introduced** in GitLab 16.5. **Status**: Experiment. Package name protected by the protection rule. For example `@my-scope/my-package-*`. Wildcard character `*` allowed. |
| <a id="packagesprotectionrulepackagetype"></a>`packageType` **{warning-solid}** | [`PackagesProtectionRulePackageType!`](#packagesprotectionrulepackagetype) | **Introduced** in GitLab 16.5. **Status**: Experiment. Package type protected by the protection rule. For example `NPM`. |

View File

@ -199,6 +199,17 @@ might not be published in the CI/CD catalog, but could be used for testing.
When [referencing a CI/CD catalog component](#component-versions), you can use a
special format to specify the latest [semantic version](#semantic-versioning) in a range.
This approach offers significant benefits for both consumers and authors of components:
- For users, using version ranges is an excellent way to automatically receive
minor or patch updates without risking breaking changes from major releases. This ensures
your pipelines stay up-to-date with the latest bug fixes and security patches
while maintaining stability.
- For component authors, the use of version ranges allows major version releases
without risk of immediately breaking existing pipelines. Users who have
specified version ranges continue to use the latest compatible minor or patch version,
giving them time to update their pipelines at their own pace.
To specify the latest release of:
- A minor version, use both the major and minor version numbers in the reference,

View File

@ -185,6 +185,24 @@ Include in the MR description:
- The `gitlab-qa` user (`user_id = 1614863`), for queries involving a user.
- Optionally, you can also use your own `user_id`, or the `user_id` of a user with a long history within the project or group being used to generate the query plan.
- That means that no query plan should return 0 records or less records than the provided limit (if a limit is included). If a query is used in batching, a proper example batch with adequate included results should be identified and provided.
NOTE: The `UPDATE` statement always returns 0 records. To identify the rows it updates, we need to check the following lines below.
For example, the `UPDATE` statement returns 0 records, but we can see that it updates 1 row from the line starting with `-> Index scan`.:
```sql
EXPLAIN UPDATE p_ci_pipelines SET updated_at = current_timestamp WHERE id = 1606117348;
ModifyTable on public.p_ci_pipelines (cost=0.58..3.60 rows=0 width=0) (actual time=5.977..5.978 rows=0 loops=1)
Buffers: shared hit=339 read=4 dirtied=4
WAL: records=20 fpi=4 bytes=21800
I/O Timings: read=4.920 write=0.000
-> Index Scan using ci_pipelines_pkey on public.ci_pipelines p_ci_pipelines_1 (cost=0.58..3.60 rows=1 width=18) (actual time=0.041..0.044 rows=1 loops=1)
Index Cond: (p_ci_pipelines_1.id = 1606117348)
Buffers: shared hit=8
I/O Timings: read=0.000 write=0.000
```
- If your queries belong to a new feature in GitLab.com and thus they don't return data in production:
- You may analyze the query and to provide the plan from a local environment.
- [postgres.ai](https://postgres.ai/) allows updates to data (`exec UPDATE issues SET ...`) and creation of new tables and columns (`exec ALTER TABLE issues ADD COLUMN ...`).

View File

@ -1,39 +0,0 @@
# Generated by: https://openapi-generator.tech
#
*.gem
*.rbc
/.config
/coverage/
/InstalledFiles
/pkg/
/spec/reports/
/spec/examples.txt
/test/tmp/
/test/version_tmp/
/tmp/
## Specific to RubyMotion:
.dat*
.repl_history
build/
## Documentation cache and generated files:
/.yardoc/
/_yardoc/
/doc/
/rdoc/
## Environment normalization:
/.bundle/
/vendor/bundle
/lib/bundler/man/
# for a library or gem, you might want to ignore these files since the code is
# intended to run in multiple environments; otherwise, check them in:
# Gemfile.lock
# .ruby-version
# .ruby-gemset
# unless supporting rvm < 1.11.0 or doing something fancy, ignore this:
.rvmrc

View File

@ -1,5 +0,0 @@
include:
- local: gems/gem.gitlab-ci.yml
inputs:
gem_name: "openbao_client"
skip_gem_validation: true # Skipping for now, as ownership may move under openbao namespace

View File

@ -1,23 +0,0 @@
# OpenAPI Generator Ignore
# Generated by openapi-generator https://github.com/openapitools/openapi-generator
# Use this file to prevent files from being overwritten by the generator.
# The patterns follow closely to .gitignore or .dockerignore.
# As an example, the C# client generator defines ApiClient.cs.
# You can make changes and tell OpenAPI Generator to ignore just this file by uncommenting the following line:
#ApiClient.cs
# You can match any string of characters against a directory, file or extension with a single asterisk (*):
#foo/*/qux
# The above matches foo/bar/qux and foo/baz/qux, but not foo/bar/baz/qux
# You can recursively match patterns against a directory, file or extension with a double asterisk (**):
#foo/**/qux
# This matches foo/bar/qux, foo/baz/qux, and foo/bar/baz/qux
# You can also negate patterns with an exclamation (!).
# For example, you can ignore all files in a docs folder with the file extension .md:
#docs/*.md
# Then explicitly reverse the ignore rule for a single file:
#!docs/README.md

File diff suppressed because it is too large Load Diff

View File

@ -1 +0,0 @@
7.7.0

View File

@ -1,2 +0,0 @@
--color
--require spec_helper

View File

@ -1,148 +0,0 @@
# This file is based on https://github.com/rails/rails/blob/master/.rubocop.yml (MIT license)
# Automatically generated by OpenAPI Generator (https://openapi-generator.tech)
AllCops:
TargetRubyVersion: 2.4
# RuboCop has a bunch of cops enabled by default. This setting tells RuboCop
# to ignore them, so only the ones explicitly set in this file are enabled.
DisabledByDefault: true
Exclude:
- '**/templates/**/*'
- '**/vendor/**/*'
- 'actionpack/lib/action_dispatch/journey/parser.rb'
# Prefer &&/|| over and/or.
Style/AndOr:
Enabled: true
# Align `when` with `case`.
Layout/CaseIndentation:
Enabled: true
# Align comments with method definitions.
Layout/CommentIndentation:
Enabled: true
Layout/ElseAlignment:
Enabled: true
Layout/EmptyLineAfterMagicComment:
Enabled: true
# In a regular class definition, no empty lines around the body.
Layout/EmptyLinesAroundClassBody:
Enabled: true
# In a regular method definition, no empty lines around the body.
Layout/EmptyLinesAroundMethodBody:
Enabled: true
# In a regular module definition, no empty lines around the body.
Layout/EmptyLinesAroundModuleBody:
Enabled: true
Layout/FirstArgumentIndentation:
Enabled: true
# Use Ruby >= 1.9 syntax for hashes. Prefer { a: :b } over { :a => :b }.
Style/HashSyntax:
Enabled: false
# Method definitions after `private` or `protected` isolated calls need one
# extra level of indentation.
Layout/IndentationConsistency:
Enabled: true
EnforcedStyle: indented_internal_methods
# Two spaces, no tabs (for indentation).
Layout/IndentationWidth:
Enabled: true
Layout/LeadingCommentSpace:
Enabled: true
Layout/SpaceAfterColon:
Enabled: true
Layout/SpaceAfterComma:
Enabled: true
Layout/SpaceAroundEqualsInParameterDefault:
Enabled: true
Layout/SpaceAroundKeyword:
Enabled: true
Layout/SpaceAroundOperators:
Enabled: true
Layout/SpaceBeforeComma:
Enabled: true
Layout/SpaceBeforeFirstArg:
Enabled: true
Style/DefWithParentheses:
Enabled: true
# Defining a method with parameters needs parentheses.
Style/MethodDefParentheses:
Enabled: true
Style/FrozenStringLiteralComment:
Enabled: false
EnforcedStyle: always
# Use `foo {}` not `foo{}`.
Layout/SpaceBeforeBlockBraces:
Enabled: true
# Use `foo { bar }` not `foo {bar}`.
Layout/SpaceInsideBlockBraces:
Enabled: true
# Use `{ a: 1 }` not `{a:1}`.
Layout/SpaceInsideHashLiteralBraces:
Enabled: true
Layout/SpaceInsideParens:
Enabled: true
# Check quotes usage according to lint rule below.
#Style/StringLiterals:
# Enabled: true
# EnforcedStyle: single_quotes
# Detect hard tabs, no hard tabs.
Layout/IndentationStyle:
Enabled: true
# Blank lines should not have any spaces.
Layout/TrailingEmptyLines:
Enabled: true
# No trailing whitespace.
Layout/TrailingWhitespace:
Enabled: false
# Use quotes for string literals when they are enough.
Style/RedundantPercentQ:
Enabled: true
# Align `end` with the matching keyword or starting expression except for
# assignments, where it should be aligned with the LHS.
Layout/EndAlignment:
Enabled: true
EnforcedStyleAlignWith: variable
AutoCorrect: true
# Use my_method(my_arg) not my_method( my_arg ) or my_method my_arg.
Lint/RequireParentheses:
Enabled: true
Style/RedundantReturn:
Enabled: true
AllowMultipleReturnValues: true
Style/Semicolon:
Enabled: true
AllowAsExpressionSeparator: true

View File

@ -1,5 +0,0 @@
# frozen_string_literal: true
source "https://rubygems.org"
gemspec

View File

@ -1,137 +0,0 @@
PATH
remote: .
specs:
openbao_client (1.0.0)
typhoeus (~> 1.0, >= 1.0.1)
GEM
remote: https://rubygems.org/
specs:
activesupport (7.2.2.1)
base64
benchmark (>= 0.3)
bigdecimal
concurrent-ruby (~> 1.0, >= 1.3.1)
connection_pool (>= 2.2.5)
drb
i18n (>= 1.6, < 2)
logger (>= 1.4.2)
minitest (>= 5.1)
securerandom (>= 0.3)
tzinfo (~> 2.0, >= 2.0.5)
ast (2.4.2)
base64 (0.2.0)
benchmark (0.4.0)
bigdecimal (3.1.8)
concurrent-ruby (1.3.4)
connection_pool (2.4.1)
diff-lcs (1.5.1)
drb (2.2.1)
ethon (0.16.0)
ffi (>= 1.15.0)
ffi (1.17.0)
ffi (1.17.0-aarch64-linux-gnu)
ffi (1.17.0-aarch64-linux-musl)
ffi (1.17.0-arm-linux-gnu)
ffi (1.17.0-arm-linux-musl)
ffi (1.17.0-arm64-darwin)
ffi (1.17.0-x86-linux-gnu)
ffi (1.17.0-x86-linux-musl)
ffi (1.17.0-x86_64-darwin)
ffi (1.17.0-x86_64-linux-gnu)
ffi (1.17.0-x86_64-linux-musl)
gitlab-styles (13.0.1)
rubocop (~> 1.67.0)
rubocop-capybara (~> 2.21.0)
rubocop-factory_bot (~> 2.26.1)
rubocop-graphql (~> 1.5.4)
rubocop-performance (~> 1.21.1)
rubocop-rails (~> 2.26.0)
rubocop-rspec (~> 3.0.4)
rubocop-rspec_rails (~> 2.30.0)
i18n (1.14.6)
concurrent-ruby (~> 1.0)
json (2.7.2)
language_server-protocol (3.17.0.3)
logger (1.6.1)
minitest (5.25.1)
parallel (1.26.3)
parser (3.3.5.0)
ast (~> 2.4.1)
racc
racc (1.8.1)
rack (3.1.8)
rainbow (3.1.1)
regexp_parser (2.9.2)
rspec (3.13.0)
rspec-core (~> 3.13.0)
rspec-expectations (~> 3.13.0)
rspec-mocks (~> 3.13.0)
rspec-core (3.13.0)
rspec-support (~> 3.13.0)
rspec-expectations (3.13.1)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.13.0)
rspec-mocks (3.13.1)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.13.0)
rspec-support (3.13.1)
rubocop (1.67.0)
json (~> 2.3)
language_server-protocol (>= 3.17.0)
parallel (~> 1.10)
parser (>= 3.3.0.2)
rainbow (>= 2.2.2, < 4.0)
regexp_parser (>= 2.4, < 3.0)
rubocop-ast (>= 1.32.2, < 2.0)
ruby-progressbar (~> 1.7)
unicode-display_width (>= 2.4.0, < 3.0)
rubocop-ast (1.32.3)
parser (>= 3.3.1.0)
rubocop-capybara (2.21.0)
rubocop (~> 1.41)
rubocop-factory_bot (2.26.1)
rubocop (~> 1.61)
rubocop-graphql (1.5.4)
rubocop (>= 1.50, < 2)
rubocop-performance (1.21.1)
rubocop (>= 1.48.1, < 2.0)
rubocop-ast (>= 1.31.1, < 2.0)
rubocop-rails (2.26.2)
activesupport (>= 4.2.0)
rack (>= 1.1)
rubocop (>= 1.52.0, < 2.0)
rubocop-ast (>= 1.31.1, < 2.0)
rubocop-rspec (3.0.5)
rubocop (~> 1.61)
rubocop-rspec_rails (2.30.0)
rubocop (~> 1.61)
rubocop-rspec (~> 3, >= 3.0.1)
ruby-progressbar (1.13.0)
securerandom (0.3.1)
typhoeus (1.4.1)
ethon (>= 0.9.0)
tzinfo (2.0.6)
concurrent-ruby (~> 1.0)
unicode-display_width (2.6.0)
PLATFORMS
aarch64-linux-gnu
aarch64-linux-musl
arm-linux-gnu
arm-linux-musl
arm64-darwin
ruby
x86-linux-gnu
x86-linux-musl
x86_64-darwin
x86_64-linux-gnu
x86_64-linux-musl
DEPENDENCIES
gitlab-styles (~> 13.0.1)
openbao_client!
rspec (~> 3.12)
BUNDLED WITH
2.5.11

File diff suppressed because it is too large Load Diff

View File

@ -1,26 +0,0 @@
# OpenbaoClient::AliasCreateRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **canonical_id** | **String** | Entity ID to which this alias belongs to | [optional] |
| **entity_id** | **String** | Entity ID to which this alias belongs to. This field is deprecated in favor of &#39;canonical_id&#39;. | [optional] |
| **id** | **String** | ID of the alias | [optional] |
| **mount_accessor** | **String** | Mount accessor to which this alias belongs to | [optional] |
| **name** | **String** | Name of the alias | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AliasCreateRequest.new(
canonical_id: null,
entity_id: null,
id: null,
mount_accessor: null,
name: null
)
```

View File

@ -1,24 +0,0 @@
# OpenbaoClient::AliasUpdateByIdRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **canonical_id** | **String** | Entity ID to which this alias should be tied to | [optional] |
| **entity_id** | **String** | Entity ID to which this alias should be tied to. This field is deprecated in favor of &#39;canonical_id&#39;. | [optional] |
| **mount_accessor** | **String** | Mount accessor to which this alias belongs to | [optional] |
| **name** | **String** | Name of the alias | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AliasUpdateByIdRequest.new(
canonical_id: null,
entity_id: null,
mount_accessor: null,
name: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleDestroySecretIdByAccessorRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id_accessor** | **String** | Accessor of the SecretID | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleDestroySecretIdByAccessorRequest.new(
secret_id_accessor: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleDestroySecretIdRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id** | **String** | SecretID attached to the role. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleDestroySecretIdRequest.new(
secret_id: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleListRolesResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **keys** | **Array&lt;String&gt;** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleListRolesResponse.new(
keys: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleListSecretIdsResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **keys** | **Array&lt;String&gt;** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleListSecretIdsResponse.new(
keys: null
)
```

View File

@ -1,20 +0,0 @@
# OpenbaoClient::AppRoleLoginRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **role_id** | **String** | Unique identifier of the Role. Required to be supplied when the &#39;bind_secret_id&#39; constraint is set. | [optional] |
| **secret_id** | **String** | SecretID belong to the App role | [optional][default to &#39;&#39;] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleLoginRequest.new(
role_id: null,
secret_id: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleLoginResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **role** | **String** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleLoginResponse.new(
role: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleLookUpSecretIdByAccessorRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id_accessor** | **String** | Accessor of the SecretID | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleLookUpSecretIdByAccessorRequest.new(
secret_id_accessor: null
)
```

View File

@ -1,34 +0,0 @@
# OpenbaoClient::AppRoleLookUpSecretIdByAccessorResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **cidr_list** | **Array&lt;String&gt;** | List of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If &#39;bound_cidr_list&#39; is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. | [optional] |
| **creation_time** | **Time** | | [optional] |
| **expiration_time** | **Time** | | [optional] |
| **last_updated_time** | **Time** | | [optional] |
| **metadata** | **Object** | | [optional] |
| **secret_id_accessor** | **String** | Accessor of the secret ID | [optional] |
| **secret_id_num_uses** | **Integer** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] |
| **secret_id_ttl** | **Integer** | Duration in seconds after which the issued secret ID expires. | [optional] |
| **token_bound_cidrs** | **Array&lt;String&gt;** | List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleLookUpSecretIdByAccessorResponse.new(
cidr_list: null,
creation_time: null,
expiration_time: null,
last_updated_time: null,
metadata: null,
secret_id_accessor: null,
secret_id_num_uses: null,
secret_id_ttl: null,
token_bound_cidrs: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleLookUpSecretIdRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id** | **String** | SecretID attached to the role. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleLookUpSecretIdRequest.new(
secret_id: null
)
```

View File

@ -1,34 +0,0 @@
# OpenbaoClient::AppRoleLookUpSecretIdResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **cidr_list** | **Array&lt;String&gt;** | List of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If &#39;bound_cidr_list&#39; is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. | [optional] |
| **creation_time** | **Time** | | [optional] |
| **expiration_time** | **Time** | | [optional] |
| **last_updated_time** | **Time** | | [optional] |
| **metadata** | **Object** | | [optional] |
| **secret_id_accessor** | **String** | Accessor of the secret ID | [optional] |
| **secret_id_num_uses** | **Integer** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] |
| **secret_id_ttl** | **Integer** | Duration in seconds after which the issued secret ID expires. | [optional] |
| **token_bound_cidrs** | **Array&lt;String&gt;** | List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleLookUpSecretIdResponse.new(
cidr_list: null,
creation_time: null,
expiration_time: null,
last_updated_time: null,
metadata: null,
secret_id_accessor: null,
secret_id_num_uses: null,
secret_id_ttl: null,
token_bound_cidrs: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadBindSecretIdResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **bind_secret_id** | **Boolean** | Impose secret_id to be presented when logging in using this role. Defaults to &#39;true&#39;. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadBindSecretIdResponse.new(
bind_secret_id: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadBoundCidrListResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **bound_cidr_list** | **Array&lt;String&gt;** | Deprecated: Please use \&quot;secret_id_bound_cidrs\&quot; instead. Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadBoundCidrListResponse.new(
bound_cidr_list: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadLocalSecretIdsResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **local_secret_ids** | **Boolean** | If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can&#39;t be reset later | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadLocalSecretIdsResponse.new(
local_secret_ids: null
)
```

View File

@ -1,20 +0,0 @@
# OpenbaoClient::AppRoleReadPeriodResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **period** | **Integer** | Use \&quot;token_period\&quot; instead. If this and \&quot;token_period\&quot; are both specified, only \&quot;token_period\&quot; will be used. | [optional] |
| **token_period** | **Integer** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \&quot;24h\&quot;). | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadPeriodResponse.new(
period: null,
token_period: null
)
```

View File

@ -1,20 +0,0 @@
# OpenbaoClient::AppRoleReadPoliciesResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **policies** | **Array&lt;String&gt;** | Use \&quot;token_policies\&quot; instead. If this and \&quot;token_policies\&quot; are both specified, only \&quot;token_policies\&quot; will be used. | [optional] |
| **token_policies** | **Array&lt;String&gt;** | Comma-separated list of policies | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadPoliciesResponse.new(
policies: null,
token_policies: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadRoleIdResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **role_id** | **String** | Identifier of the role. Defaults to a UUID. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadRoleIdResponse.new(
role_id: null
)
```

View File

@ -1,50 +0,0 @@
# OpenbaoClient::AppRoleReadRoleResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **bind_secret_id** | **Boolean** | Impose secret ID to be presented when logging in using this role. | [optional] |
| **local_secret_ids** | **Boolean** | If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can&#39;t be reset later | [optional] |
| **period** | **Integer** | Use \&quot;token_period\&quot; instead. If this and \&quot;token_period\&quot; are both specified, only \&quot;token_period\&quot; will be used. | [optional] |
| **policies** | **Array&lt;String&gt;** | Use \&quot;token_policies\&quot; instead. If this and \&quot;token_policies\&quot; are both specified, only \&quot;token_policies\&quot; will be used. | [optional] |
| **secret_id_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. | [optional] |
| **secret_id_num_uses** | **Integer** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] |
| **secret_id_ttl** | **Integer** | Duration in seconds after which the issued secret ID expires. | [optional] |
| **token_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. | [optional] |
| **token_explicit_max_ttl** | **Integer** | If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. | [optional] |
| **token_max_ttl** | **Integer** | The maximum lifetime of the generated token | [optional] |
| **token_no_default_policy** | **Boolean** | If true, the &#39;default&#39; policy will not automatically be added to generated tokens | [optional] |
| **token_num_uses** | **Integer** | The maximum number of times a token may be used, a value of zero means unlimited | [optional] |
| **token_period** | **Integer** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. | [optional] |
| **token_policies** | **Array&lt;String&gt;** | Comma-separated list of policies | [optional] |
| **token_strictly_bind_ip** | **Boolean** | If true, CIDRs for the token will be strictly bound to the source IP address of the login request | [optional] |
| **token_ttl** | **Integer** | The initial ttl of the token to generate | [optional] |
| **token_type** | **String** | The type of token to generate, service or batch | [optional][default to &#39;default-service&#39;] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadRoleResponse.new(
bind_secret_id: null,
local_secret_ids: null,
period: null,
policies: null,
secret_id_bound_cidrs: null,
secret_id_num_uses: null,
secret_id_ttl: null,
token_bound_cidrs: null,
token_explicit_max_ttl: null,
token_max_ttl: null,
token_no_default_policy: null,
token_num_uses: null,
token_period: null,
token_policies: null,
token_strictly_bind_ip: null,
token_ttl: null,
token_type: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadSecretIdBoundCidrsResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadSecretIdBoundCidrsResponse.new(
secret_id_bound_cidrs: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadSecretIdNumUsesResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id_num_uses** | **Integer** | Number of times a secret ID can access the role, after which the SecretID will expire. Defaults to 0 meaning that the secret ID is of unlimited use. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadSecretIdNumUsesResponse.new(
secret_id_num_uses: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadSecretIdTtlResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id_ttl** | **Integer** | Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadSecretIdTtlResponse.new(
secret_id_ttl: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadTokenBoundCidrsResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **token_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadTokenBoundCidrsResponse.new(
token_bound_cidrs: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadTokenMaxTtlResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **token_max_ttl** | **Integer** | The maximum lifetime of the generated token | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadTokenMaxTtlResponse.new(
token_max_ttl: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadTokenNumUsesResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **token_num_uses** | **Integer** | The maximum number of times a token may be used, a value of zero means unlimited | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadTokenNumUsesResponse.new(
token_num_uses: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleReadTokenTtlResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **token_ttl** | **Integer** | The initial ttl of the token to generate | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleReadTokenTtlResponse.new(
token_ttl: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleWriteBindSecretIdRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **bind_secret_id** | **Boolean** | Impose secret_id to be presented when logging in using this role. | [optional][default to true] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteBindSecretIdRequest.new(
bind_secret_id: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleWriteBoundCidrListRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **bound_cidr_list** | **Array&lt;String&gt;** | Deprecated: Please use \&quot;secret_id_bound_cidrs\&quot; instead. Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteBoundCidrListRequest.new(
bound_cidr_list: null
)
```

View File

@ -1,28 +0,0 @@
# OpenbaoClient::AppRoleWriteCustomSecretIdRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **cidr_list** | **Array&lt;String&gt;** | Comma separated string or list of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If &#39;bound_cidr_list&#39; is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. | [optional] |
| **metadata** | **String** | Metadata to be tied to the SecretID. This should be a JSON formatted string containing metadata in key value pairs. | [optional] |
| **num_uses** | **Integer** | Number of times this SecretID can be used, after which the SecretID expires. Overrides secret_id_num_uses role option when supplied. May not be higher than role&#39;s secret_id_num_uses. | [optional] |
| **secret_id** | **String** | SecretID to be attached to the role. | [optional] |
| **token_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. | [optional] |
| **ttl** | **Integer** | Duration in seconds after which this SecretID expires. Overrides secret_id_ttl role option when supplied. May not be longer than role&#39;s secret_id_ttl. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteCustomSecretIdRequest.new(
cidr_list: null,
metadata: null,
num_uses: null,
secret_id: null,
token_bound_cidrs: null,
ttl: null
)
```

View File

@ -1,24 +0,0 @@
# OpenbaoClient::AppRoleWriteCustomSecretIdResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id** | **String** | Secret ID attached to the role. | [optional] |
| **secret_id_accessor** | **String** | Accessor of the secret ID | [optional] |
| **secret_id_num_uses** | **Integer** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] |
| **secret_id_ttl** | **Integer** | Duration in seconds after which the issued secret ID expires. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteCustomSecretIdResponse.new(
secret_id: null,
secret_id_accessor: null,
secret_id_num_uses: null,
secret_id_ttl: null
)
```

View File

@ -1,20 +0,0 @@
# OpenbaoClient::AppRoleWritePeriodRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **period** | **Integer** | Use \&quot;token_period\&quot; instead. If this and \&quot;token_period\&quot; are both specified, only \&quot;token_period\&quot; will be used. | [optional] |
| **token_period** | **Integer** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \&quot;24h\&quot;). | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWritePeriodRequest.new(
period: null,
token_period: null
)
```

View File

@ -1,20 +0,0 @@
# OpenbaoClient::AppRoleWritePoliciesRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **policies** | **Array&lt;String&gt;** | Use \&quot;token_policies\&quot; instead. If this and \&quot;token_policies\&quot; are both specified, only \&quot;token_policies\&quot; will be used. | [optional] |
| **token_policies** | **Array&lt;String&gt;** | Comma-separated list of policies | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWritePoliciesRequest.new(
policies: null,
token_policies: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleWriteRoleIdRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **role_id** | **String** | Identifier of the role. Defaults to a UUID. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteRoleIdRequest.new(
role_id: null
)
```

View File

@ -1,54 +0,0 @@
# OpenbaoClient::AppRoleWriteRoleRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **bind_secret_id** | **Boolean** | Impose secret_id to be presented when logging in using this role. Defaults to &#39;true&#39;. | [optional][default to true] |
| **bound_cidr_list** | **Array&lt;String&gt;** | Use \&quot;secret_id_bound_cidrs\&quot; instead. | [optional] |
| **local_secret_ids** | **Boolean** | If set, the secret IDs generated using this role will be cluster local. This can only be set during role creation and once set, it can&#39;t be reset later. | [optional] |
| **period** | **Integer** | Use \&quot;token_period\&quot; instead. If this and \&quot;token_period\&quot; are both specified, only \&quot;token_period\&quot; will be used. | [optional] |
| **policies** | **Array&lt;String&gt;** | Use \&quot;token_policies\&quot; instead. If this and \&quot;token_policies\&quot; are both specified, only \&quot;token_policies\&quot; will be used. | [optional] |
| **role_id** | **String** | Identifier of the role. Defaults to a UUID. | [optional] |
| **secret_id_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. | [optional] |
| **secret_id_num_uses** | **Integer** | Number of times a SecretID can access the role, after which the SecretID will expire. Defaults to 0 meaning that the the secret_id is of unlimited use. | [optional] |
| **secret_id_ttl** | **Integer** | Duration in seconds after which the issued SecretID should expire. Defaults to 0, meaning no expiration. | [optional] |
| **token_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. | [optional] |
| **token_explicit_max_ttl** | **Integer** | If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. | [optional] |
| **token_max_ttl** | **Integer** | The maximum lifetime of the generated token | [optional] |
| **token_no_default_policy** | **Boolean** | If true, the &#39;default&#39; policy will not automatically be added to generated tokens | [optional] |
| **token_num_uses** | **Integer** | The maximum number of times a token may be used, a value of zero means unlimited | [optional] |
| **token_period** | **Integer** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \&quot;24h\&quot;). | [optional] |
| **token_policies** | **Array&lt;String&gt;** | Comma-separated list of policies | [optional] |
| **token_strictly_bind_ip** | **Boolean** | If true, CIDRs for the token will be strictly bound to the source IP address of the login request | [optional] |
| **token_ttl** | **Integer** | The initial ttl of the token to generate | [optional] |
| **token_type** | **String** | The type of token to generate, service or batch | [optional][default to &#39;default-service&#39;] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteRoleRequest.new(
bind_secret_id: null,
bound_cidr_list: null,
local_secret_ids: null,
period: null,
policies: null,
role_id: null,
secret_id_bound_cidrs: null,
secret_id_num_uses: null,
secret_id_ttl: null,
token_bound_cidrs: null,
token_explicit_max_ttl: null,
token_max_ttl: null,
token_no_default_policy: null,
token_num_uses: null,
token_period: null,
token_policies: null,
token_strictly_bind_ip: null,
token_ttl: null,
token_type: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleWriteSecretIdBoundCidrsRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteSecretIdBoundCidrsRequest.new(
secret_id_bound_cidrs: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleWriteSecretIdNumUsesRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id_num_uses** | **Integer** | Number of times a SecretID can access the role, after which the SecretID will expire. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteSecretIdNumUsesRequest.new(
secret_id_num_uses: null
)
```

View File

@ -1,30 +0,0 @@
# OpenbaoClient::AppRoleWriteSecretIdRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **after** | **String** | Optional entry to list begin listing after, not required to exist. Only used in list operations. | [optional] |
| **cidr_list** | **Array&lt;String&gt;** | Comma separated string or list of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If &#39;bound_cidr_list&#39; is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. | [optional] |
| **limit** | **Integer** | Optional number of entries to return; defaults to all entries. Only used in list operations. | [optional] |
| **metadata** | **String** | Metadata to be tied to the SecretID. This should be a JSON formatted string containing the metadata in key value pairs. | [optional] |
| **num_uses** | **Integer** | Number of times this SecretID can be used, after which the SecretID expires. Overrides secret_id_num_uses role option when supplied. May not be higher than role&#39;s secret_id_num_uses. | [optional] |
| **token_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. | [optional] |
| **ttl** | **Integer** | Duration in seconds after which this SecretID expires. Overrides secret_id_ttl role option when supplied. May not be longer than role&#39;s secret_id_ttl. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteSecretIdRequest.new(
after: null,
cidr_list: null,
limit: null,
metadata: null,
num_uses: null,
token_bound_cidrs: null,
ttl: null
)
```

View File

@ -1,24 +0,0 @@
# OpenbaoClient::AppRoleWriteSecretIdResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id** | **String** | Secret ID attached to the role. | [optional] |
| **secret_id_accessor** | **String** | Accessor of the secret ID | [optional] |
| **secret_id_num_uses** | **Integer** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] |
| **secret_id_ttl** | **Integer** | Duration in seconds after which the issued secret ID expires. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteSecretIdResponse.new(
secret_id: null,
secret_id_accessor: null,
secret_id_num_uses: null,
secret_id_ttl: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleWriteSecretIdTtlRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **secret_id_ttl** | **Integer** | Duration in seconds after which the issued SecretID should expire. Defaults to 0, meaning no expiration. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteSecretIdTtlRequest.new(
secret_id_ttl: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleWriteTokenBoundCidrsRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **token_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteTokenBoundCidrsRequest.new(
token_bound_cidrs: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleWriteTokenMaxTtlRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **token_max_ttl** | **Integer** | The maximum lifetime of the generated token | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteTokenMaxTtlRequest.new(
token_max_ttl: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleWriteTokenNumUsesRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **token_num_uses** | **Integer** | The maximum number of times a token may be used, a value of zero means unlimited | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteTokenNumUsesRequest.new(
token_num_uses: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AppRoleWriteTokenTtlRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **token_ttl** | **Integer** | The initial ttl of the token to generate | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AppRoleWriteTokenTtlRequest.new(
token_ttl: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AuditingCalculateHashRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **input** | **String** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AuditingCalculateHashRequest.new(
input: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AuditingCalculateHashResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **hash** | **String** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AuditingCalculateHashResponse.new(
hash: null
)
```

View File

@ -1,24 +0,0 @@
# OpenbaoClient::AuditingEnableDeviceRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **description** | **String** | User-friendly description for this audit backend. | [optional] |
| **local** | **Boolean** | Mark the mount as a local mount, which is not replicated and is unaffected by replication. | [optional][default to false] |
| **options** | **Object** | Configuration options for the audit backend. | [optional] |
| **type** | **String** | The type of the backend. Example: \&quot;mysql\&quot; | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AuditingEnableDeviceRequest.new(
description: null,
local: null,
options: null,
type: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AuditingEnableRequestHeaderRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **hmac** | **Boolean** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AuditingEnableRequestHeaderRequest.new(
hmac: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::AuditingListRequestHeadersResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **headers** | **Object** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AuditingListRequestHeadersResponse.new(
headers: null
)
```

File diff suppressed because it is too large Load Diff

View File

@ -1,34 +0,0 @@
# OpenbaoClient::AuthEnableMethodRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **config** | **Object** | Configuration for this mount, such as plugin_name. | [optional] |
| **description** | **String** | User-friendly description for this credential backend. | [optional] |
| **external_entropy_access** | **Boolean** | Whether to give the mount access to OpenBao&#39;s external entropy. | [optional][default to false] |
| **local** | **Boolean** | Mark the mount as a local mount, which is not replicated and is unaffected by replication. | [optional][default to false] |
| **options** | **Object** | The options to pass into the backend. Should be a json object with string keys and values. | [optional] |
| **plugin_name** | **String** | Name of the auth plugin to use based from the name in the plugin catalog. | [optional] |
| **plugin_version** | **String** | The semantic version of the plugin to use. | [optional] |
| **seal_wrap** | **Boolean** | Whether to turn on seal wrapping for the mount. | [optional][default to false] |
| **type** | **String** | The type of the backend. Example: \&quot;userpass\&quot; | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AuthEnableMethodRequest.new(
config: null,
description: null,
external_entropy_access: null,
local: null,
options: null,
plugin_name: null,
plugin_version: null,
seal_wrap: null,
type: null
)
```

View File

@ -1,42 +0,0 @@
# OpenbaoClient::AuthReadConfigurationResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **accessor** | **String** | | [optional] |
| **config** | **Object** | | [optional] |
| **deprecation_status** | **String** | | [optional] |
| **description** | **String** | | [optional] |
| **external_entropy_access** | **Boolean** | | [optional] |
| **local** | **Boolean** | | [optional] |
| **options** | **Object** | | [optional] |
| **plugin_version** | **String** | | [optional] |
| **running_plugin_version** | **String** | | [optional] |
| **running_sha256** | **String** | | [optional] |
| **seal_wrap** | **Boolean** | | [optional] |
| **type** | **String** | | [optional] |
| **uuid** | **String** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AuthReadConfigurationResponse.new(
accessor: null,
config: null,
deprecation_status: null,
description: null,
external_entropy_access: null,
local: null,
options: null,
plugin_version: null,
running_plugin_version: null,
running_sha256: null,
seal_wrap: null,
type: null,
uuid: null
)
```

View File

@ -1,52 +0,0 @@
# OpenbaoClient::AuthReadTuningInformationResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **allowed_managed_keys** | **Array&lt;String&gt;** | | [optional] |
| **allowed_response_headers** | **Array&lt;String&gt;** | | [optional] |
| **audit_non_hmac_request_keys** | **Array&lt;String&gt;** | | [optional] |
| **audit_non_hmac_response_keys** | **Array&lt;String&gt;** | | [optional] |
| **default_lease_ttl** | **Integer** | | [optional] |
| **description** | **String** | | [optional] |
| **external_entropy_access** | **Boolean** | | [optional] |
| **force_no_cache** | **Boolean** | | [optional] |
| **listing_visibility** | **String** | | [optional] |
| **max_lease_ttl** | **Integer** | | [optional] |
| **options** | **Object** | | [optional] |
| **passthrough_request_headers** | **Array&lt;String&gt;** | | [optional] |
| **plugin_version** | **String** | | [optional] |
| **token_type** | **String** | | [optional] |
| **user_lockout_counter_reset_duration** | **Integer** | | [optional] |
| **user_lockout_disable** | **Boolean** | | [optional] |
| **user_lockout_duration** | **Integer** | | [optional] |
| **user_lockout_threshold** | **Integer** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AuthReadTuningInformationResponse.new(
allowed_managed_keys: null,
allowed_response_headers: null,
audit_non_hmac_request_keys: null,
audit_non_hmac_response_keys: null,
default_lease_ttl: null,
description: null,
external_entropy_access: null,
force_no_cache: null,
listing_visibility: null,
max_lease_ttl: null,
options: null,
passthrough_request_headers: null,
plugin_version: null,
token_type: null,
user_lockout_counter_reset_duration: null,
user_lockout_disable: null,
user_lockout_duration: null,
user_lockout_threshold: null
)
```

View File

@ -1,40 +0,0 @@
# OpenbaoClient::AuthTuneConfigurationParametersRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **allowed_response_headers** | **Array&lt;String&gt;** | A list of headers to whitelist and allow a plugin to set on responses. | [optional] |
| **audit_non_hmac_request_keys** | **Array&lt;String&gt;** | The list of keys in the request data object that will not be HMAC&#39;ed by audit devices. | [optional] |
| **audit_non_hmac_response_keys** | **Array&lt;String&gt;** | The list of keys in the response data object that will not be HMAC&#39;ed by audit devices. | [optional] |
| **default_lease_ttl** | **String** | The default lease TTL for this mount. | [optional] |
| **description** | **String** | User-friendly description for this credential backend. | [optional] |
| **listing_visibility** | **String** | Determines the visibility of the mount in the UI-specific listing endpoint. Accepted value are &#39;unauth&#39; and &#39;hidden&#39;, with the empty default (&#39;&#39;) behaving like &#39;hidden&#39;. | [optional] |
| **max_lease_ttl** | **String** | The max lease TTL for this mount. | [optional] |
| **options** | **Object** | The options to pass into the backend. Should be a json object with string keys and values. | [optional] |
| **passthrough_request_headers** | **Array&lt;String&gt;** | A list of headers to whitelist and pass from the request to the plugin. | [optional] |
| **plugin_version** | **String** | The semantic version of the plugin to use. | [optional] |
| **token_type** | **String** | The type of token to issue (service or batch). | [optional] |
| **user_lockout_config** | **Object** | The user lockout configuration to pass into the backend. Should be a json object with string keys and values. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::AuthTuneConfigurationParametersRequest.new(
allowed_response_headers: null,
audit_non_hmac_request_keys: null,
audit_non_hmac_response_keys: null,
default_lease_ttl: null,
description: null,
listing_visibility: null,
max_lease_ttl: null,
options: null,
passthrough_request_headers: null,
plugin_version: null,
token_type: null,
user_lockout_config: null
)
```

View File

@ -1,22 +0,0 @@
# OpenbaoClient::CertConfigureRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **disable_binding** | **Boolean** | If set, during renewal, skips the matching of presented client identity with the client identity used during login. Defaults to false. | [optional][default to false] |
| **enable_identity_alias_metadata** | **Boolean** | If set, metadata of the certificate including the metadata corresponding to allowed_metadata_extensions will be stored in the alias. Defaults to false. | [optional][default to false] |
| **ocsp_cache_size** | **Integer** | The size of the in memory OCSP response cache, shared by all configured certs | [optional][default to 100] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::CertConfigureRequest.new(
disable_binding: null,
enable_identity_alias_metadata: null,
ocsp_cache_size: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::CertLoginRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **name** | **String** | The name of the certificate role to authenticate against. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::CertLoginRequest.new(
name: null
)
```

View File

@ -1,78 +0,0 @@
# OpenbaoClient::CertWriteCertificateRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **allowed_common_names** | **Array&lt;String&gt;** | A comma-separated list of names. At least one must exist in the Common Name. Supports globbing. | [optional] |
| **allowed_dns_sans** | **Array&lt;String&gt;** | A comma-separated list of DNS names. At least one must exist in the SANs. Supports globbing. | [optional] |
| **allowed_email_sans** | **Array&lt;String&gt;** | A comma-separated list of Email Addresses. At least one must exist in the SANs. Supports globbing. | [optional] |
| **allowed_metadata_extensions** | **Array&lt;String&gt;** | A comma-separated string or array of oid extensions. Upon successful authentication, these extensions will be added as metadata if they are present in the certificate. The metadata key will be the string consisting of the oid numbers separated by a dash (-) instead of a dot (.) to allow usage in ACL templates. | [optional] |
| **allowed_names** | **Array&lt;String&gt;** | A comma-separated list of names. At least one must exist in either the Common Name or SANs. Supports globbing. This parameter is deprecated, please use allowed_common_names, allowed_dns_sans, allowed_email_sans, allowed_uri_sans. | [optional] |
| **allowed_organizational_units** | **Array&lt;String&gt;** | A comma-separated list of Organizational Units names. At least one must exist in the OU field. | [optional] |
| **allowed_uri_sans** | **Array&lt;String&gt;** | A comma-separated list of URIs. At least one must exist in the SANs. Supports globbing. | [optional] |
| **bound_cidrs** | **Array&lt;String&gt;** | Use \&quot;token_bound_cidrs\&quot; instead. If this and \&quot;token_bound_cidrs\&quot; are both specified, only \&quot;token_bound_cidrs\&quot; will be used. | [optional] |
| **certificate** | **String** | The public certificate that should be trusted. Must be x509 PEM encoded. | [optional] |
| **display_name** | **String** | The display name to use for clients using this certificate. | [optional] |
| **lease** | **Integer** | Use \&quot;token_ttl\&quot; instead. If this and \&quot;token_ttl\&quot; are both specified, only \&quot;token_ttl\&quot; will be used. | [optional] |
| **max_ttl** | **Integer** | Use \&quot;token_max_ttl\&quot; instead. If this and \&quot;token_max_ttl\&quot; are both specified, only \&quot;token_max_ttl\&quot; will be used. | [optional] |
| **ocsp_ca_certificates** | **String** | Any additional CA certificates needed to communicate with OCSP servers | [optional] |
| **ocsp_enabled** | **Boolean** | Whether to attempt OCSP verification of certificates at login | [optional] |
| **ocsp_fail_open** | **Boolean** | If set to true, if an OCSP revocation cannot be made successfully, login will proceed rather than failing. If false, failing to get an OCSP status fails the request. | [optional][default to false] |
| **ocsp_query_all_servers** | **Boolean** | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | [optional][default to false] |
| **ocsp_servers_override** | **Array&lt;String&gt;** | A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. | [optional] |
| **period** | **Integer** | Use \&quot;token_period\&quot; instead. If this and \&quot;token_period\&quot; are both specified, only \&quot;token_period\&quot; will be used. | [optional] |
| **policies** | **Array&lt;String&gt;** | Use \&quot;token_policies\&quot; instead. If this and \&quot;token_policies\&quot; are both specified, only \&quot;token_policies\&quot; will be used. | [optional] |
| **required_extensions** | **Array&lt;String&gt;** | A comma-separated string or array of extensions formatted as \&quot;oid:value\&quot;. Expects the extension value to be some type of ASN1 encoded string. All values much match. Supports globbing on \&quot;value\&quot;. | [optional] |
| **token_bound_cidrs** | **Array&lt;String&gt;** | Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. | [optional] |
| **token_explicit_max_ttl** | **Integer** | If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. | [optional] |
| **token_max_ttl** | **Integer** | The maximum lifetime of the generated token | [optional] |
| **token_no_default_policy** | **Boolean** | If true, the &#39;default&#39; policy will not automatically be added to generated tokens | [optional] |
| **token_num_uses** | **Integer** | The maximum number of times a token may be used, a value of zero means unlimited | [optional] |
| **token_period** | **Integer** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \&quot;24h\&quot;). | [optional] |
| **token_policies** | **Array&lt;String&gt;** | Comma-separated list of policies | [optional] |
| **token_strictly_bind_ip** | **Boolean** | If true, CIDRs for the token will be strictly bound to the source IP address of the login request | [optional] |
| **token_ttl** | **Integer** | The initial ttl of the token to generate | [optional] |
| **token_type** | **String** | The type of token to generate, service or batch | [optional][default to &#39;default-service&#39;] |
| **ttl** | **Integer** | Use \&quot;token_ttl\&quot; instead. If this and \&quot;token_ttl\&quot; are both specified, only \&quot;token_ttl\&quot; will be used. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::CertWriteCertificateRequest.new(
allowed_common_names: null,
allowed_dns_sans: null,
allowed_email_sans: null,
allowed_metadata_extensions: null,
allowed_names: null,
allowed_organizational_units: null,
allowed_uri_sans: null,
bound_cidrs: null,
certificate: null,
display_name: null,
lease: null,
max_ttl: null,
ocsp_ca_certificates: null,
ocsp_enabled: null,
ocsp_fail_open: null,
ocsp_query_all_servers: null,
ocsp_servers_override: null,
period: null,
policies: null,
required_extensions: null,
token_bound_cidrs: null,
token_explicit_max_ttl: null,
token_max_ttl: null,
token_no_default_policy: null,
token_num_uses: null,
token_period: null,
token_policies: null,
token_strictly_bind_ip: null,
token_ttl: null,
token_type: null,
ttl: null
)
```

View File

@ -1,20 +0,0 @@
# OpenbaoClient::CertWriteCrlRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **crl** | **String** | The public CRL that should be trusted to attest to certificates&#39; validity statuses. May be DER or PEM encoded. Note: the expiration time is ignored; if the CRL is no longer valid, delete it using the same name as specified here. | [optional] |
| **url** | **String** | The URL of a CRL distribution point. Only one of &#39;crl&#39; or &#39;url&#39; parameters should be specified. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::CertWriteCrlRequest.new(
crl: null,
url: null
)
```

View File

@ -1,28 +0,0 @@
# OpenbaoClient::CollectHostInformationResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **cpu** | **Array&lt;Object&gt;** | | [optional] |
| **cpu_times** | **Array&lt;Object&gt;** | | [optional] |
| **disk** | **Array&lt;Object&gt;** | | [optional] |
| **host** | **Object** | | [optional] |
| **memory** | **Object** | | [optional] |
| **timestamp** | **Time** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::CollectHostInformationResponse.new(
cpu: null,
cpu_times: null,
disk: null,
host: null,
memory: null,
timestamp: null
)
```

View File

@ -1,22 +0,0 @@
# OpenbaoClient::CorsConfigureRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **allowed_headers** | **Array&lt;String&gt;** | A comma-separated string or array of strings indicating headers that are allowed on cross-origin requests. | [optional] |
| **allowed_origins** | **Array&lt;String&gt;** | A comma-separated string or array of strings indicating origins that may make cross-origin requests. | [optional] |
| **enable** | **Boolean** | Enables or disables CORS headers on requests. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::CorsConfigureRequest.new(
allowed_headers: null,
allowed_origins: null,
enable: null
)
```

View File

@ -1,22 +0,0 @@
# OpenbaoClient::CorsReadConfigurationResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **allowed_headers** | **Array&lt;String&gt;** | | [optional] |
| **allowed_origins** | **Array&lt;String&gt;** | | [optional] |
| **enabled** | **Boolean** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::CorsReadConfigurationResponse.new(
allowed_headers: null,
allowed_origins: null,
enabled: null
)
```

View File

@ -1,28 +0,0 @@
# OpenbaoClient::DatabaseConfigureConnectionRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **allowed_roles** | **Array&lt;String&gt;** | Comma separated string or array of the role names allowed to get creds from this database connection. If empty no roles are allowed. If \&quot;*\&quot; all roles are allowed. | [optional] |
| **password_policy** | **String** | Password policy to use when generating passwords. | [optional] |
| **plugin_name** | **String** | The name of a builtin or previously registered plugin known to OpenBao. This endpoint will create an instance of that plugin type. | [optional] |
| **plugin_version** | **String** | The version of the plugin to use. | [optional] |
| **root_rotation_statements** | **Array&lt;String&gt;** | Specifies the database statements to be executed to rotate the root user&#39;s credentials. See the plugin&#39;s API page for more information on support and formatting for this parameter. | [optional] |
| **verify_connection** | **Boolean** | If true, the connection details are verified by actually connecting to the database. Defaults to true. | [optional][default to true] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::DatabaseConfigureConnectionRequest.new(
allowed_roles: null,
password_policy: null,
plugin_name: null,
plugin_version: null,
root_rotation_statements: null,
verify_connection: null
)
```

View File

@ -1,34 +0,0 @@
# OpenbaoClient::DatabaseWriteRoleRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **creation_statements** | **Array&lt;String&gt;** | Specifies the database statements executed to create and configure a user. See the plugin&#39;s API page for more information on support and formatting for this parameter. | [optional] |
| **credential_config** | **Object** | The configuration for the given credential_type. | [optional] |
| **credential_type** | **String** | The type of credential to manage. Options include: &#39;password&#39;, &#39;rsa_private_key&#39;. Defaults to &#39;password&#39;. | [optional][default to &#39;password&#39;] |
| **db_name** | **String** | Name of the database this role acts on. | [optional] |
| **default_ttl** | **Integer** | Default ttl for role. | [optional] |
| **max_ttl** | **Integer** | Maximum time a credential is valid for | [optional] |
| **renew_statements** | **Array&lt;String&gt;** | Specifies the database statements to be executed to renew a user. Not every plugin type will support this functionality. See the plugin&#39;s API page for more information on support and formatting for this parameter. | [optional] |
| **revocation_statements** | **Array&lt;String&gt;** | Specifies the database statements to be executed to revoke a user. See the plugin&#39;s API page for more information on support and formatting for this parameter. | [optional] |
| **rollback_statements** | **Array&lt;String&gt;** | Specifies the database statements to be executed rollback a create operation in the event of an error. Not every plugin type will support this functionality. See the plugin&#39;s API page for more information on support and formatting for this parameter. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::DatabaseWriteRoleRequest.new(
creation_statements: null,
credential_config: null,
credential_type: null,
db_name: null,
default_ttl: null,
max_ttl: null,
renew_statements: null,
revocation_statements: null,
rollback_statements: null
)
```

View File

@ -1,28 +0,0 @@
# OpenbaoClient::DatabaseWriteStaticRoleRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **credential_config** | **Object** | The configuration for the given credential_type. | [optional] |
| **credential_type** | **String** | The type of credential to manage. Options include: &#39;password&#39;, &#39;rsa_private_key&#39;. Defaults to &#39;password&#39;. | [optional][default to &#39;password&#39;] |
| **db_name** | **String** | Name of the database this role acts on. | [optional] |
| **rotation_period** | **Integer** | Period for automatic credential rotation of the given username. Not valid unless used with \&quot;username\&quot;. | [optional] |
| **rotation_statements** | **Array&lt;String&gt;** | Specifies the database statements to be executed to rotate the accounts credentials. Not every plugin type will support this functionality. See the plugin&#39;s API page for more information on support and formatting for this parameter. | [optional] |
| **username** | **String** | Name of the static user account for OpenBao to manage. Requires \&quot;rotation_period\&quot; to be specified | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::DatabaseWriteStaticRoleRequest.new(
credential_config: null,
credential_type: null,
db_name: null,
rotation_period: null,
rotation_statements: null,
username: null
)
```

View File

@ -1,20 +0,0 @@
# OpenbaoClient::DecodeRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **encoded_token** | **String** | Specifies the encoded token (result from generate-root). | [optional] |
| **otp** | **String** | Specifies the otp code for decode. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::DecodeRequest.new(
encoded_token: null,
otp: null
)
```

View File

@ -1,22 +0,0 @@
# OpenbaoClient::EncryptionKeyConfigureRotationRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **enabled** | **Boolean** | Whether automatic rotation is enabled. | [optional] |
| **interval** | **Integer** | How long after installation of an active key term that the key will be automatically rotated. | [optional] |
| **max_operations** | **Integer** | The number of encryption operations performed before the barrier key is automatically rotated. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::EncryptionKeyConfigureRotationRequest.new(
enabled: null,
interval: null,
max_operations: null
)
```

View File

@ -1,22 +0,0 @@
# OpenbaoClient::EncryptionKeyReadRotationConfigurationResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **enabled** | **Boolean** | | [optional] |
| **interval** | **Integer** | | [optional] |
| **max_operations** | **Integer** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::EncryptionKeyReadRotationConfigurationResponse.new(
enabled: null,
interval: null,
max_operations: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::EntityBatchDeleteRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **entity_ids** | **Array&lt;String&gt;** | Entity IDs to delete | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::EntityBatchDeleteRequest.new(
entity_ids: null
)
```

View File

@ -1,28 +0,0 @@
# OpenbaoClient::EntityCreateAliasRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **canonical_id** | **String** | Entity ID to which this alias belongs | [optional] |
| **custom_metadata** | **Object** | User provided key-value pairs | [optional] |
| **entity_id** | **String** | Entity ID to which this alias belongs. This field is deprecated, use canonical_id. | [optional] |
| **id** | **String** | ID of the entity alias. If set, updates the corresponding entity alias. | [optional] |
| **mount_accessor** | **String** | Mount accessor to which this alias belongs to; unused for a modify | [optional] |
| **name** | **String** | Name of the alias; unused for a modify | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::EntityCreateAliasRequest.new(
canonical_id: null,
custom_metadata: null,
entity_id: null,
id: null,
mount_accessor: null,
name: null
)
```

View File

@ -1,26 +0,0 @@
# OpenbaoClient::EntityCreateRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **disabled** | **Boolean** | If set true, tokens tied to this identity will not be able to be used (but will not be revoked). | [optional] |
| **id** | **String** | ID of the entity. If set, updates the corresponding existing entity. | [optional] |
| **metadata** | **Object** | Metadata to be associated with the entity. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: bao &lt;command&gt; &lt;path&gt; metadata&#x3D;key1&#x3D;value1 metadata&#x3D;key2&#x3D;value2 | [optional] |
| **name** | **String** | Name of the entity | [optional] |
| **policies** | **Array&lt;String&gt;** | Policies to be tied to the entity. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::EntityCreateRequest.new(
disabled: null,
id: null,
metadata: null,
name: null,
policies: null
)
```

View File

@ -1,26 +0,0 @@
# OpenbaoClient::EntityLookUpRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **alias_id** | **String** | ID of the alias. | [optional] |
| **alias_mount_accessor** | **String** | Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with &#39;alias_name&#39;. | [optional] |
| **alias_name** | **String** | Name of the alias. This should be supplied in conjunction with &#39;alias_mount_accessor&#39;. | [optional] |
| **id** | **String** | ID of the entity. | [optional] |
| **name** | **String** | Name of the entity. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::EntityLookUpRequest.new(
alias_id: null,
alias_mount_accessor: null,
alias_name: null,
id: null,
name: null
)
```

View File

@ -1,24 +0,0 @@
# OpenbaoClient::EntityMergeRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **conflicting_alias_ids_to_keep** | **Array&lt;String&gt;** | Alias IDs to keep in case of conflicting aliases. Ignored if no conflicting aliases found | [optional] |
| **force** | **Boolean** | Setting this will follow the &#39;mine&#39; strategy for merging MFA secrets. If there are secrets of the same type both in entities that are merged from and in entity into which all others are getting merged, secrets in the destination will be unaltered. If not set, this API will throw an error containing all the conflicts. | [optional] |
| **from_entity_ids** | **Array&lt;String&gt;** | Entity IDs which need to get merged | [optional] |
| **to_entity_id** | **String** | Entity ID into which all the other entities need to get merged | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::EntityMergeRequest.new(
conflicting_alias_ids_to_keep: null,
force: null,
from_entity_ids: null,
to_entity_id: null
)
```

View File

@ -1,26 +0,0 @@
# OpenbaoClient::EntityUpdateAliasByIdRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **canonical_id** | **String** | Entity ID to which this alias should be tied to | [optional] |
| **custom_metadata** | **Object** | User provided key-value pairs | [optional] |
| **entity_id** | **String** | Entity ID to which this alias belongs to. This field is deprecated, use canonical_id. | [optional] |
| **mount_accessor** | **String** | (Unused) | [optional] |
| **name** | **String** | (Unused) | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::EntityUpdateAliasByIdRequest.new(
canonical_id: null,
custom_metadata: null,
entity_id: null,
mount_accessor: null,
name: null
)
```

View File

@ -1,24 +0,0 @@
# OpenbaoClient::EntityUpdateByIdRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **disabled** | **Boolean** | If set true, tokens tied to this identity will not be able to be used (but will not be revoked). | [optional] |
| **metadata** | **Object** | Metadata to be associated with the entity. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: bao &lt;command&gt; &lt;path&gt; metadata&#x3D;key1&#x3D;value1 metadata&#x3D;key2&#x3D;value2 | [optional] |
| **name** | **String** | Name of the entity | [optional] |
| **policies** | **Array&lt;String&gt;** | Policies to be tied to the entity. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::EntityUpdateByIdRequest.new(
disabled: null,
metadata: null,
name: null,
policies: null
)
```

View File

@ -1,24 +0,0 @@
# OpenbaoClient::EntityUpdateByNameRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **disabled** | **Boolean** | If set true, tokens tied to this identity will not be able to be used (but will not be revoked). | [optional] |
| **id** | **String** | ID of the entity. If set, updates the corresponding existing entity. | [optional] |
| **metadata** | **Object** | Metadata to be associated with the entity. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: bao &lt;command&gt; &lt;path&gt; metadata&#x3D;key1&#x3D;value1 metadata&#x3D;key2&#x3D;value2 | [optional] |
| **policies** | **Array&lt;String&gt;** | Policies to be tied to the entity. | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::EntityUpdateByNameRequest.new(
disabled: null,
id: null,
metadata: null,
policies: null
)
```

View File

@ -1,24 +0,0 @@
# OpenbaoClient::GenerateHashRequest
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **algorithm** | **String** | Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 Defaults to \&quot;sha2-256\&quot;. | [optional][default to &#39;sha2-256&#39;] |
| **format** | **String** | Encoding format to use. Can be \&quot;hex\&quot; or \&quot;base64\&quot;. Defaults to \&quot;hex\&quot;. | [optional][default to &#39;hex&#39;] |
| **input** | **String** | The base64-encoded input data | [optional] |
| **urlalgorithm** | **String** | Algorithm to use (POST URL parameter) | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::GenerateHashRequest.new(
algorithm: null,
format: null,
input: null,
urlalgorithm: null
)
```

View File

@ -1,18 +0,0 @@
# OpenbaoClient::GenerateHashResponse
## Properties
| Name | Type | Description | Notes |
| ---- | ---- | ----------- | ----- |
| **sum** | **String** | | [optional] |
## Example
```ruby
require 'openbao_client'
instance = OpenbaoClient::GenerateHashResponse.new(
sum: null
)
```

Some files were not shown because too many files have changed in this diff Show More