Skip to content

Commit 65c8ca0

Browse files
committed
"Release v5.0.16"
1 parent 63e41ad commit 65c8ca0

10 files changed

Lines changed: 151 additions & 9 deletions

File tree

api/openapi.yaml

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24300,6 +24300,8 @@ components:
2430024300
allowed_bastion_urls:
2430124301
- allowed_bastion_urls
2430224302
- allowed_bastion_urls
24303+
allowed_ssh_url: allowed_ssh_url
24304+
default_session_ttl_minutes: 1
2430324305
ssh_username_sub_claim: ssh_username_sub_claim
2430424306
legacy_signing_alg: true
2430524307
rdp_username_sub_claim: rdp_username_sub_claim
@@ -24405,6 +24407,8 @@ components:
2440524407
allowed_bastion_urls:
2440624408
- allowed_bastion_urls
2440724409
- allowed_bastion_urls
24410+
allowed_ssh_url: allowed_ssh_url
24411+
default_session_ttl_minutes: 1
2440824412
ssh_username_sub_claim: ssh_username_sub_claim
2440924413
legacy_signing_alg: true
2441024414
rdp_username_sub_claim: rdp_username_sub_claim
@@ -24414,6 +24418,13 @@ components:
2441424418
type: string
2441524419
type: array
2441624420
x-go-name: AllowedBastionUrls
24421+
allowed_ssh_url:
24422+
type: string
24423+
x-go-name: AllowedSSHURL
24424+
default_session_ttl_minutes:
24425+
format: int64
24426+
type: integer
24427+
x-go-name: DefaultSessionTTLMinutes
2441724428
legacy_signing_alg:
2441824429
type: boolean
2441924430
x-go-name: LegacySigningAlg
@@ -24422,7 +24433,7 @@ components:
2442224433
x-go-name: RdpUsernameSubClaim
2442324434
ssh_username_sub_claim:
2442424435
type: string
24425-
x-go-name: SshUsernameSubClaim
24436+
x-go-name: SSHUsernameSubClaim
2442624437
type: object
2442724438
x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/akeyless-api/gator
2442824439
BastionListEntry:
@@ -97432,12 +97443,22 @@ components:
9743297443
description: gatewayUpdateRemoteAccess is a command that update remote access
9743397444
config
9743497445
properties:
97446+
allowed-ssh-url:
97447+
default: use-existing
97448+
description: Specify a valid SSH-URL to tunnel to SSH session
97449+
type: string
97450+
x-go-name: AllowedSSHURL
9743597451
allowed-urls:
9743697452
default: use-existing
9743797453
description: List of valid URLs to redirect from the Portal back to the
9743897454
remote access server (in a comma-delimited list)
9743997455
type: string
9744097456
x-go-name: AllowedBastionUrls
97457+
default-session-ttl-minutes:
97458+
default: use-existing
97459+
description: Default session TTL in minutes
97460+
type: string
97461+
x-go-name: DefaultSessionTTLMinutes
9744197462
hide-session-recording:
9744297463
description: "Specifies whether to show/hide if the session is currently\
9744397464
\ recorded [true/false]"

build.gradle

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ apply plugin: 'java'
44
apply plugin: 'com.diffplug.spotless'
55

66
group = 'io.akeyless'
7-
version = '5.0.15'
7+
version = '5.0.16'
88

99
buildscript {
1010
repositories {

build.sbt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ lazy val root = (project in file(".")).
22
settings(
33
organization := "io.akeyless",
44
name := "akeyless-java",
5-
version := "5.0.15",
5+
version := "5.0.16",
66
scalaVersion := "2.11.4",
77
scalacOptions ++= Seq("-feature"),
88
javacOptions in compile ++= Seq("-Xlint:deprecation"),

docs/BastionGlobalConf.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@
88
| Name | Type | Description | Notes |
99
|------------ | ------------- | ------------- | -------------|
1010
|**allowedBastionUrls** | **List<String>** | | [optional] |
11+
|**allowedSshUrl** | **String** | | [optional] |
12+
|**defaultSessionTtlMinutes** | **Long** | | [optional] |
1113
|**legacySigningAlg** | **Boolean** | | [optional] |
1214
|**rdpUsernameSubClaim** | **String** | | [optional] |
1315
|**sshUsernameSubClaim** | **String** | | [optional] |

docs/GatewayUpdateRemoteAccess.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,9 @@ gatewayUpdateRemoteAccess is a command that update remote access config
88

99
| Name | Type | Description | Notes |
1010
|------------ | ------------- | ------------- | -------------|
11+
|**allowedSshUrl** | **String** | Specify a valid SSH-URL to tunnel to SSH session | [optional] |
1112
|**allowedUrls** | **String** | List of valid URLs to redirect from the Portal back to the remote access server (in a comma-delimited list) | [optional] |
13+
|**defaultSessionTtlMinutes** | **String** | Default session TTL in minutes | [optional] |
1214
|**hideSessionRecording** | **String** | Specifies whether to show/hide if the session is currently recorded [true/false] | [optional] |
1315
|**json** | **Boolean** | Set output format to JSON | [optional] |
1416
|**kexalgs** | **String** | Decide which algorithm will be used as part of the SSH initial hand-shake process | [optional] |

pom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
<artifactId>akeyless-java</artifactId>
66
<packaging>jar</packaging>
77
<name>akeyless-java</name>
8-
<version>5.0.15</version>
8+
<version>5.0.16</version>
99
<url>https://github.com/akeylesslabs/akeyless-java</url>
1010
<description>Akeyless Java SDK</description>
1111
<scm>

src/main/java/io/akeyless/client/ApiClient.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ private void init() {
139139
json = new JSON();
140140

141141
// Set default User-Agent.
142-
setUserAgent("OpenAPI-Generator/5.0.15/java");
142+
setUserAgent("OpenAPI-Generator/5.0.16/java");
143143

144144
authentications = new HashMap<String, Authentication>();
145145
}

src/main/java/io/akeyless/client/Configuration.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515

1616
@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen", comments = "Generator version: 7.10.0")
1717
public class Configuration {
18-
public static final String VERSION = "5.0.15";
18+
public static final String VERSION = "5.0.16";
1919

2020
private static ApiClient defaultApiClient = new ApiClient();
2121

src/main/java/io/akeyless/client/model/BastionGlobalConf.java

Lines changed: 58 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,16 @@ public class BastionGlobalConf {
5757
@javax.annotation.Nullable
5858
private List<String> allowedBastionUrls = new ArrayList<>();
5959

60+
public static final String SERIALIZED_NAME_ALLOWED_SSH_URL = "allowed_ssh_url";
61+
@SerializedName(SERIALIZED_NAME_ALLOWED_SSH_URL)
62+
@javax.annotation.Nullable
63+
private String allowedSshUrl;
64+
65+
public static final String SERIALIZED_NAME_DEFAULT_SESSION_TTL_MINUTES = "default_session_ttl_minutes";
66+
@SerializedName(SERIALIZED_NAME_DEFAULT_SESSION_TTL_MINUTES)
67+
@javax.annotation.Nullable
68+
private Long defaultSessionTtlMinutes;
69+
6070
public static final String SERIALIZED_NAME_LEGACY_SIGNING_ALG = "legacy_signing_alg";
6171
@SerializedName(SERIALIZED_NAME_LEGACY_SIGNING_ALG)
6272
@javax.annotation.Nullable
@@ -102,6 +112,44 @@ public void setAllowedBastionUrls(@javax.annotation.Nullable List<String> allowe
102112
}
103113

104114

115+
public BastionGlobalConf allowedSshUrl(@javax.annotation.Nullable String allowedSshUrl) {
116+
this.allowedSshUrl = allowedSshUrl;
117+
return this;
118+
}
119+
120+
/**
121+
* Get allowedSshUrl
122+
* @return allowedSshUrl
123+
*/
124+
@javax.annotation.Nullable
125+
public String getAllowedSshUrl() {
126+
return allowedSshUrl;
127+
}
128+
129+
public void setAllowedSshUrl(@javax.annotation.Nullable String allowedSshUrl) {
130+
this.allowedSshUrl = allowedSshUrl;
131+
}
132+
133+
134+
public BastionGlobalConf defaultSessionTtlMinutes(@javax.annotation.Nullable Long defaultSessionTtlMinutes) {
135+
this.defaultSessionTtlMinutes = defaultSessionTtlMinutes;
136+
return this;
137+
}
138+
139+
/**
140+
* Get defaultSessionTtlMinutes
141+
* @return defaultSessionTtlMinutes
142+
*/
143+
@javax.annotation.Nullable
144+
public Long getDefaultSessionTtlMinutes() {
145+
return defaultSessionTtlMinutes;
146+
}
147+
148+
public void setDefaultSessionTtlMinutes(@javax.annotation.Nullable Long defaultSessionTtlMinutes) {
149+
this.defaultSessionTtlMinutes = defaultSessionTtlMinutes;
150+
}
151+
152+
105153
public BastionGlobalConf legacySigningAlg(@javax.annotation.Nullable Boolean legacySigningAlg) {
106154
this.legacySigningAlg = legacySigningAlg;
107155
return this;
@@ -170,21 +218,25 @@ public boolean equals(Object o) {
170218
}
171219
BastionGlobalConf bastionGlobalConf = (BastionGlobalConf) o;
172220
return Objects.equals(this.allowedBastionUrls, bastionGlobalConf.allowedBastionUrls) &&
221+
Objects.equals(this.allowedSshUrl, bastionGlobalConf.allowedSshUrl) &&
222+
Objects.equals(this.defaultSessionTtlMinutes, bastionGlobalConf.defaultSessionTtlMinutes) &&
173223
Objects.equals(this.legacySigningAlg, bastionGlobalConf.legacySigningAlg) &&
174224
Objects.equals(this.rdpUsernameSubClaim, bastionGlobalConf.rdpUsernameSubClaim) &&
175225
Objects.equals(this.sshUsernameSubClaim, bastionGlobalConf.sshUsernameSubClaim);
176226
}
177227

178228
@Override
179229
public int hashCode() {
180-
return Objects.hash(allowedBastionUrls, legacySigningAlg, rdpUsernameSubClaim, sshUsernameSubClaim);
230+
return Objects.hash(allowedBastionUrls, allowedSshUrl, defaultSessionTtlMinutes, legacySigningAlg, rdpUsernameSubClaim, sshUsernameSubClaim);
181231
}
182232

183233
@Override
184234
public String toString() {
185235
StringBuilder sb = new StringBuilder();
186236
sb.append("class BastionGlobalConf {\n");
187237
sb.append(" allowedBastionUrls: ").append(toIndentedString(allowedBastionUrls)).append("\n");
238+
sb.append(" allowedSshUrl: ").append(toIndentedString(allowedSshUrl)).append("\n");
239+
sb.append(" defaultSessionTtlMinutes: ").append(toIndentedString(defaultSessionTtlMinutes)).append("\n");
188240
sb.append(" legacySigningAlg: ").append(toIndentedString(legacySigningAlg)).append("\n");
189241
sb.append(" rdpUsernameSubClaim: ").append(toIndentedString(rdpUsernameSubClaim)).append("\n");
190242
sb.append(" sshUsernameSubClaim: ").append(toIndentedString(sshUsernameSubClaim)).append("\n");
@@ -211,6 +263,8 @@ private String toIndentedString(Object o) {
211263
// a set of all properties/fields (JSON key names)
212264
openapiFields = new HashSet<String>();
213265
openapiFields.add("allowed_bastion_urls");
266+
openapiFields.add("allowed_ssh_url");
267+
openapiFields.add("default_session_ttl_minutes");
214268
openapiFields.add("legacy_signing_alg");
215269
openapiFields.add("rdp_username_sub_claim");
216270
openapiFields.add("ssh_username_sub_claim");
@@ -244,6 +298,9 @@ public static void validateJsonElement(JsonElement jsonElement) throws IOExcepti
244298
if (jsonObj.get("allowed_bastion_urls") != null && !jsonObj.get("allowed_bastion_urls").isJsonNull() && !jsonObj.get("allowed_bastion_urls").isJsonArray()) {
245299
throw new IllegalArgumentException(String.format("Expected the field `allowed_bastion_urls` to be an array in the JSON string but got `%s`", jsonObj.get("allowed_bastion_urls").toString()));
246300
}
301+
if ((jsonObj.get("allowed_ssh_url") != null && !jsonObj.get("allowed_ssh_url").isJsonNull()) && !jsonObj.get("allowed_ssh_url").isJsonPrimitive()) {
302+
throw new IllegalArgumentException(String.format("Expected the field `allowed_ssh_url` to be a primitive type in the JSON string but got `%s`", jsonObj.get("allowed_ssh_url").toString()));
303+
}
247304
if ((jsonObj.get("rdp_username_sub_claim") != null && !jsonObj.get("rdp_username_sub_claim").isJsonNull()) && !jsonObj.get("rdp_username_sub_claim").isJsonPrimitive()) {
248305
throw new IllegalArgumentException(String.format("Expected the field `rdp_username_sub_claim` to be a primitive type in the JSON string but got `%s`", jsonObj.get("rdp_username_sub_claim").toString()));
249306
}

src/main/java/io/akeyless/client/model/GatewayUpdateRemoteAccess.java

Lines changed: 62 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,21 @@
5050
*/
5151
@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen", comments = "Generator version: 7.10.0")
5252
public class GatewayUpdateRemoteAccess {
53+
public static final String SERIALIZED_NAME_ALLOWED_SSH_URL = "allowed-ssh-url";
54+
@SerializedName(SERIALIZED_NAME_ALLOWED_SSH_URL)
55+
@javax.annotation.Nullable
56+
private String allowedSshUrl = "use-existing";
57+
5358
public static final String SERIALIZED_NAME_ALLOWED_URLS = "allowed-urls";
5459
@SerializedName(SERIALIZED_NAME_ALLOWED_URLS)
5560
@javax.annotation.Nullable
5661
private String allowedUrls = "use-existing";
5762

63+
public static final String SERIALIZED_NAME_DEFAULT_SESSION_TTL_MINUTES = "default-session-ttl-minutes";
64+
@SerializedName(SERIALIZED_NAME_DEFAULT_SESSION_TTL_MINUTES)
65+
@javax.annotation.Nullable
66+
private String defaultSessionTtlMinutes = "use-existing";
67+
5868
public static final String SERIALIZED_NAME_HIDE_SESSION_RECORDING = "hide-session-recording";
5969
@SerializedName(SERIALIZED_NAME_HIDE_SESSION_RECORDING)
6070
@javax.annotation.Nullable
@@ -103,6 +113,25 @@ public class GatewayUpdateRemoteAccess {
103113
public GatewayUpdateRemoteAccess() {
104114
}
105115

116+
public GatewayUpdateRemoteAccess allowedSshUrl(@javax.annotation.Nullable String allowedSshUrl) {
117+
this.allowedSshUrl = allowedSshUrl;
118+
return this;
119+
}
120+
121+
/**
122+
* Specify a valid SSH-URL to tunnel to SSH session
123+
* @return allowedSshUrl
124+
*/
125+
@javax.annotation.Nullable
126+
public String getAllowedSshUrl() {
127+
return allowedSshUrl;
128+
}
129+
130+
public void setAllowedSshUrl(@javax.annotation.Nullable String allowedSshUrl) {
131+
this.allowedSshUrl = allowedSshUrl;
132+
}
133+
134+
106135
public GatewayUpdateRemoteAccess allowedUrls(@javax.annotation.Nullable String allowedUrls) {
107136
this.allowedUrls = allowedUrls;
108137
return this;
@@ -122,6 +151,25 @@ public void setAllowedUrls(@javax.annotation.Nullable String allowedUrls) {
122151
}
123152

124153

154+
public GatewayUpdateRemoteAccess defaultSessionTtlMinutes(@javax.annotation.Nullable String defaultSessionTtlMinutes) {
155+
this.defaultSessionTtlMinutes = defaultSessionTtlMinutes;
156+
return this;
157+
}
158+
159+
/**
160+
* Default session TTL in minutes
161+
* @return defaultSessionTtlMinutes
162+
*/
163+
@javax.annotation.Nullable
164+
public String getDefaultSessionTtlMinutes() {
165+
return defaultSessionTtlMinutes;
166+
}
167+
168+
public void setDefaultSessionTtlMinutes(@javax.annotation.Nullable String defaultSessionTtlMinutes) {
169+
this.defaultSessionTtlMinutes = defaultSessionTtlMinutes;
170+
}
171+
172+
125173
public GatewayUpdateRemoteAccess hideSessionRecording(@javax.annotation.Nullable String hideSessionRecording) {
126174
this.hideSessionRecording = hideSessionRecording;
127175
return this;
@@ -303,7 +351,9 @@ public boolean equals(Object o) {
303351
return false;
304352
}
305353
GatewayUpdateRemoteAccess gatewayUpdateRemoteAccess = (GatewayUpdateRemoteAccess) o;
306-
return Objects.equals(this.allowedUrls, gatewayUpdateRemoteAccess.allowedUrls) &&
354+
return Objects.equals(this.allowedSshUrl, gatewayUpdateRemoteAccess.allowedSshUrl) &&
355+
Objects.equals(this.allowedUrls, gatewayUpdateRemoteAccess.allowedUrls) &&
356+
Objects.equals(this.defaultSessionTtlMinutes, gatewayUpdateRemoteAccess.defaultSessionTtlMinutes) &&
307357
Objects.equals(this.hideSessionRecording, gatewayUpdateRemoteAccess.hideSessionRecording) &&
308358
Objects.equals(this.json, gatewayUpdateRemoteAccess.json) &&
309359
Objects.equals(this.kexalgs, gatewayUpdateRemoteAccess.kexalgs) &&
@@ -317,14 +367,16 @@ public boolean equals(Object o) {
317367

318368
@Override
319369
public int hashCode() {
320-
return Objects.hash(allowedUrls, hideSessionRecording, json, kexalgs, keyboardLayout, legacySshAlgorithm, rdpTargetConfiguration, sshTargetConfiguration, token, uidToken);
370+
return Objects.hash(allowedSshUrl, allowedUrls, defaultSessionTtlMinutes, hideSessionRecording, json, kexalgs, keyboardLayout, legacySshAlgorithm, rdpTargetConfiguration, sshTargetConfiguration, token, uidToken);
321371
}
322372

323373
@Override
324374
public String toString() {
325375
StringBuilder sb = new StringBuilder();
326376
sb.append("class GatewayUpdateRemoteAccess {\n");
377+
sb.append(" allowedSshUrl: ").append(toIndentedString(allowedSshUrl)).append("\n");
327378
sb.append(" allowedUrls: ").append(toIndentedString(allowedUrls)).append("\n");
379+
sb.append(" defaultSessionTtlMinutes: ").append(toIndentedString(defaultSessionTtlMinutes)).append("\n");
328380
sb.append(" hideSessionRecording: ").append(toIndentedString(hideSessionRecording)).append("\n");
329381
sb.append(" json: ").append(toIndentedString(json)).append("\n");
330382
sb.append(" kexalgs: ").append(toIndentedString(kexalgs)).append("\n");
@@ -356,7 +408,9 @@ private String toIndentedString(Object o) {
356408
static {
357409
// a set of all properties/fields (JSON key names)
358410
openapiFields = new HashSet<String>();
411+
openapiFields.add("allowed-ssh-url");
359412
openapiFields.add("allowed-urls");
413+
openapiFields.add("default-session-ttl-minutes");
360414
openapiFields.add("hide-session-recording");
361415
openapiFields.add("json");
362416
openapiFields.add("kexalgs");
@@ -392,9 +446,15 @@ public static void validateJsonElement(JsonElement jsonElement) throws IOExcepti
392446
}
393447
}
394448
JsonObject jsonObj = jsonElement.getAsJsonObject();
449+
if ((jsonObj.get("allowed-ssh-url") != null && !jsonObj.get("allowed-ssh-url").isJsonNull()) && !jsonObj.get("allowed-ssh-url").isJsonPrimitive()) {
450+
throw new IllegalArgumentException(String.format("Expected the field `allowed-ssh-url` to be a primitive type in the JSON string but got `%s`", jsonObj.get("allowed-ssh-url").toString()));
451+
}
395452
if ((jsonObj.get("allowed-urls") != null && !jsonObj.get("allowed-urls").isJsonNull()) && !jsonObj.get("allowed-urls").isJsonPrimitive()) {
396453
throw new IllegalArgumentException(String.format("Expected the field `allowed-urls` to be a primitive type in the JSON string but got `%s`", jsonObj.get("allowed-urls").toString()));
397454
}
455+
if ((jsonObj.get("default-session-ttl-minutes") != null && !jsonObj.get("default-session-ttl-minutes").isJsonNull()) && !jsonObj.get("default-session-ttl-minutes").isJsonPrimitive()) {
456+
throw new IllegalArgumentException(String.format("Expected the field `default-session-ttl-minutes` to be a primitive type in the JSON string but got `%s`", jsonObj.get("default-session-ttl-minutes").toString()));
457+
}
398458
if ((jsonObj.get("hide-session-recording") != null && !jsonObj.get("hide-session-recording").isJsonNull()) && !jsonObj.get("hide-session-recording").isJsonPrimitive()) {
399459
throw new IllegalArgumentException(String.format("Expected the field `hide-session-recording` to be a primitive type in the JSON string but got `%s`", jsonObj.get("hide-session-recording").toString()));
400460
}

0 commit comments

Comments
 (0)