Documentation
¶
Index ¶
- type AWSConfigWriteCertificateRequest
- type AWSConfigWriteClientRequest
- type AWSConfigWriteIdentityAccessListRequest
- type AWSConfigWriteIdentityRequest
- type AWSConfigWriteIdentityWhiteListRequest
- type AWSConfigWriteLeaseRequest
- type AWSConfigWriteRoleTagBlackListRequest
- type AWSConfigWriteRoleTagDenyListRequest
- type AWSConfigWriteRootIAMCredentialsRequest
- type AWSConfigWriteSecurityTokenServiceAccountRequest
- type AWSLoginRequest
- type AWSWriteAuthRoleRequest
- type AWSWriteAuthRoleTagRequest
- type AWSWriteCredentialsRequest
- type AWSWriteIdentityAccessListTidySettingsRequest
- type AWSWriteIdentityWhiteListTidySettingsRequest
- type AWSWriteRoleRequest
- type AWSWriteRoleTagBlackListTidySettingsRequest
- type AWSWriteRoleTagDenyListTidySettingsRequest
- type AWSWriteSecurityTokenServiceRequest
- type ActiveDirectoryCheckInLibraryRequest
- type ActiveDirectoryCheckInManageLibraryRequest
- type ActiveDirectoryCheckOutLibraryRequest
- type ActiveDirectoryWriteConfigRequest
- type ActiveDirectoryWriteLibraryRequest
- type ActiveDirectoryWriteRoleRequest
- type AliCloudLoginRequest
- type AliCloudWriteAuthRoleRequest
- type AliCloudWriteConfigRequest
- type AliCloudWriteRoleRequest
- type AliasWriteByIDRequest
- type AliasWriteRequest
- type AppRoleListRolesResponse
- type AppRoleListSecretIDResponse
- type AppRoleLoginRequest
- type AppRoleReadBindSecretIDResponse
- type AppRoleReadBoundCIDRListResponse
- type AppRoleReadLocalSecretIDsResponse
- type AppRoleReadPeriodResponse
- type AppRoleReadPoliciesResponse
- type AppRoleReadRoleIDResponse
- type AppRoleReadRoleResponse
- type AppRoleReadSecretIDBoundCIDRsResponse
- type AppRoleReadSecretIDNumUsesResponse
- type AppRoleReadSecretIDTTLResponse
- type AppRoleReadTokenBoundCIDRsResponse
- type AppRoleReadTokenMaxTTLResponse
- type AppRoleReadTokenNumUsesResponse
- type AppRoleReadTokenTTLResponse
- type AppRoleWriteBindSecretIDRequest
- type AppRoleWriteBoundCIDRListRequest
- type AppRoleWriteCustomSecretIDRequest
- type AppRoleWriteCustomSecretIDResponse
- type AppRoleWritePeriodRequest
- type AppRoleWritePoliciesRequest
- type AppRoleWriteRoleIDRequest
- type AppRoleWriteRoleRequest
- type AppRoleWriteSecretIDAccessorDestroyRequest
- type AppRoleWriteSecretIDAccessorLookupRequest
- type AppRoleWriteSecretIDAccessorLookupResponse
- type AppRoleWriteSecretIDBoundCIDRsRequest
- type AppRoleWriteSecretIDDestroyRequest
- type AppRoleWriteSecretIDLookupRequest
- type AppRoleWriteSecretIDLookupResponse
- type AppRoleWriteSecretIDNumUsesRequest
- type AppRoleWriteSecretIDRequest
- type AppRoleWriteSecretIDResponse
- type AppRoleWriteSecretIDTTLRequest
- type AppRoleWriteTokenBoundCIDRsRequest
- type AppRoleWriteTokenMaxTTLRequest
- type AppRoleWriteTokenNumUsesRequest
- type AppRoleWriteTokenTTLRequest
- type AzureLoginRequest
- type AzureWriteAuthConfigRequest
- type AzureWriteAuthRoleRequest
- type AzureWriteConfigRequest
- type AzureWriteRoleRequest
- type CalculateAuditHashRequest
- type CentrifyLoginRequest
- type CentrifyWriteConfigRequest
- type CertificatesLoginRequest
- type CertificatesWriteCRLRequest
- type CertificatesWriteConfigRequest
- type CertificatesWriteRequest
- type CloudFoundryLoginRequest
- type CloudFoundryWriteConfigRequest
- type CloudFoundryWriteRoleRequest
- type ConsulWriteAccessConfigRequest
- type ConsulWriteRoleRequest
- type DatabaseWriteConfigRequest
- type DatabaseWriteRoleRequest
- type DatabaseWriteStaticRoleRequest
- type EntityBatchDeleteRequest
- type EntityLookupRequest
- type EntityMergeRequest
- type EntityWriteAliasByIDRequest
- type EntityWriteAliasRequest
- type EntityWriteByIDRequest
- type EntityWriteByNameRequest
- type EntityWriteRequest
- type GitHubLoginRequest
- type GitHubWriteConfigRequest
- type GitHubWriteMapTeamRequest
- type GitHubWriteMapUserRequest
- type GoogleCloudKMSDecryptRequest
- type GoogleCloudKMSEncryptRequest
- type GoogleCloudKMSReencryptRequest
- type GoogleCloudKMSRegisterKeyRequest
- type GoogleCloudKMSSignRequest
- type GoogleCloudKMSVerifyRequest
- type GoogleCloudKMSWriteConfigRequest
- type GoogleCloudKMSWriteKeyConfigRequest
- type GoogleCloudKMSWriteKeyRequest
- type GoogleCloudLoginRequest
- type GoogleCloudWriteAuthConfigRequest
- type GoogleCloudWriteConfigRequest
- type GoogleCloudWriteKeyRequest
- type GoogleCloudWriteRoleLabelsRequest
- type GoogleCloudWriteRoleRequest
- type GoogleCloudWriteRoleServiceAccountsRequest
- type GoogleCloudWriteRolesetKeyRequest
- type GoogleCloudWriteRolesetRequest
- type GoogleCloudWriteStaticAccountKeyRequest
- type GoogleCloudWriteStaticAccountRequest
- type GroupLookupRequest
- type GroupWriteAliasByIDRequest
- type GroupWriteAliasRequest
- type GroupWriteByIDRequest
- type GroupWriteByNameRequest
- type GroupWriteRequest
- type JWTLoginRequest
- type JWTWriteConfigRequest
- type JWTWriteOIDCAuthURLRequest
- type JWTWriteOIDCCallbackRequest
- type JWTWriteRoleRequest
- type KVv2DeleteVersionsRequest
- type KVv2DestroyVersionsRequest
- type KVv2UndeleteVersionsRequest
- type KVv2WriteConfigRequest
- type KVv2WriteMetadataRequest
- type KVv2WriteRequest
- type KerberosLoginRequest
- type KerberosWriteConfigRequest
- type KerberosWriteGroupRequest
- type KerberosWriteLDAPConfigRequest
- type KubernetesLoginRequest
- type KubernetesWriteAuthConfigRequest
- type KubernetesWriteAuthRoleRequest
- type KubernetesWriteConfigRequest
- type KubernetesWriteCredentialsRequest
- type KubernetesWriteRoleRequest
- type LDAPCheckInLibraryRequest
- type LDAPCheckInManageLibraryRequest
- type LDAPCheckOutLibraryRequest
- type LDAPLoginRequest
- type LDAPWriteAuthConfigRequest
- type LDAPWriteConfigRequest
- type LDAPWriteGroupRequest
- type LDAPWriteLibraryRequest
- type LDAPWriteRoleRequest
- type LDAPWriteStaticRoleRequest
- type LDAPWriteUserRequest
- type MFAMethodAdminDestroyTOTPRequest
- type MFAMethodAdminGenerateTOTPRequest
- type MFAMethodGenerateTOTPRequest
- type MFAMethodWriteDuoRequest
- type MFAMethodWriteOktaRequest
- type MFAMethodWritePingIDRequest
- type MFAMethodWriteTOTPRequest
- type MFAValidateRequest
- type MFAWriteLoginEnforcementRequest
- type MongoDBAtlasWriteConfigRequest
- type MongoDBAtlasWriteRoleRequest
- type NomadWriteAccessConfigRequest
- type NomadWriteLeaseConfigRequest
- type NomadWriteRoleRequest
- type OCILoginWithRoleRequest
- type OCIWriteConfigRequest
- type OCIWriteRoleRequest
- type OIDCIntrospectRequest
- type OIDCLoginRequest
- type OIDCRotateKeyRequest
- type OIDCWriteAssignmentRequest
- type OIDCWriteAuthConfigRequest
- type OIDCWriteAuthRoleRequest
- type OIDCWriteAuthURLRequest
- type OIDCWriteCallbackRequest
- type OIDCWriteClientRequest
- type OIDCWriteConfigRequest
- type OIDCWriteKeyRequest
- type OIDCWriteProviderAuthorizeRequest
- type OIDCWriteProviderRequest
- type OIDCWriteProviderTokenRequest
- type OIDCWriteRoleRequest
- type OIDCWriteScopeRequest
- type OktaLoginRequest
- type OktaWriteConfigRequest
- type OktaWriteGroupRequest
- type OktaWriteUserRequest
- type OpenLDAPCheckInLibraryRequest
- type OpenLDAPCheckInManageLibraryRequest
- type OpenLDAPCheckOutLibraryRequest
- type OpenLDAPWriteConfigRequest
- type OpenLDAPWriteLibraryRequest
- type OpenLDAPWriteRoleRequest
- type OpenLDAPWriteStaticRoleRequest
- type PKIBundleWriteRequest
- type PKIGenerateRootRequest
- type PKIImportKeysRequest
- type PKIIssuerIssueRoleRequest
- type PKIIssuerResignCRLsRequest
- type PKIIssuerSignIntermediateRequest
- type PKIIssuerSignRevocationListRequest
- type PKIIssuerSignRoleRequest
- type PKIIssuerSignSelfIssuedRequest
- type PKIIssuerSignVerbatimRequest
- type PKIIssuerSignVerbatimRoleRequest
- type PKIIssuersGenerateIntermediateRequest
- type PKIIssuersGenerateRootRequest
- type PKIReplaceRootRequest
- type PKIRevokeRequest
- type PKIRevokeWithKeyRequest
- type PKIRootSignIntermediateRequest
- type PKIRootSignSelfIssuedRequest
- type PKIRotateRootRequest
- type PKISignRoleRequest
- type PKISignVerbatimRequest
- type PKISignVerbatimRoleRequest
- type PKITidyRequest
- type PKIWriteAutoTidyConfigRequest
- type PKIWriteCAConfigRequest
- type PKIWriteCRLConfigRequest
- type PKIWriteCertsRequest
- type PKIWriteClusterConfigRequest
- type PKIWriteIntermediateCrossSignRequest
- type PKIWriteIntermediateGenerateRequest
- type PKIWriteIntermediateSetSignedRequest
- type PKIWriteInternalExportedRequest
- type PKIWriteIssueRoleRequest
- type PKIWriteIssuersConfigRequest
- type PKIWriteKMSRequest
- type PKIWriteKeyRequest
- type PKIWriteKeysConfigRequest
- type PKIWriteRoleRequest
- type PKIWriteURLConfigRequest
- type PersonaIDWriteByIDRequest
- type PersonaWriteRequest
- type PkiWriteIssuerRefDerPemRequest
- type PkiWriteJsonRequest
- type RabbitMQWriteConnectionConfigRequest
- type RabbitMQWriteLeaseConfigRequest
- type RabbitMQWriteRoleRequest
- type RadiusLoginRequest
- type RadiusLoginWithUsernameRequest
- type RadiusWriteConfigRequest
- type RadiusWriteUserRequest
- type RemountRequest
- type RenewForRequest
- type RenewRequest
- type RevokeLeaseRequest
- type RevokePrefixRequest
- type RevokeRequest
- type SSHLookupRequest
- type SSHSignRequest
- type SSHVerifyRequest
- type SSHWriteCAConfigRequest
- type SSHWriteCredentialsRequest
- type SSHWriteIssueRequest
- type SSHWriteKeysRequest
- type SSHWriteRoleRequest
- type SSHWriteZeroAddressConfigRequest
- type SysWritePluginsCatalogNameRequest
- type SysWriteToolsRandomUrlbytesRequest
- type TOTPWriteCodeRequest
- type TOTPWriteKeyRequest
- type TerraformWriteConfigRequest
- type TerraformWriteRoleRequest
- type TokenRenewAccessorRequest
- type TokenRenewRequest
- type TokenRenewSelfRequest
- type TokenRevokeAccessorRequest
- type TokenRevokeOrphanRequest
- type TokenRevokeRequest
- type TokenWriteCreateOrphanRequest
- type TokenWriteCreateRequest
- type TokenWriteCreateWithRoleRequest
- type TokenWriteLookupAccessorRequest
- type TokenWriteLookupRequest
- type TokenWriteLookupSelfRequest
- type TokenWriteRoleRequest
- type ToolsGenerateRandomRequest
- type ToolsGenerateRandomSourceBytesRequest
- type ToolsGenerateRandomSourceRequest
- type ToolsHashRequest
- type ToolsHashWithRequest
- type TransitDecryptRequest
- type TransitEncryptRequest
- type TransitGenerateDataKeyRequest
- type TransitGenerateHMACRequest
- type TransitGenerateHMACWithAlgorithmRequest
- type TransitGenerateRandomRequest
- type TransitGenerateRandomSourceBytesRequest
- type TransitGenerateRandomSourceRequest
- type TransitHashRequest
- type TransitHashWithAlgorithmRequest
- type TransitImportKeyRequest
- type TransitImportKeyVersionRequest
- type TransitRestoreKeyRequest
- type TransitRestoreRequest
- type TransitRewrapRequest
- type TransitSignRequest
- type TransitSignWithAlgorithmRequest
- type TransitTrimKeyRequest
- type TransitVerifyRequest
- type TransitVerifyWithAlgorithmRequest
- type TransitWriteCacheConfigRequest
- type TransitWriteConfigKeysRequest
- type TransitWriteKeyConfigRequest
- type TransitWriteKeyRequest
- type TransitWriteRandomUrlbytesRequest
- type UnsealRequest
- type UserpassLoginRequest
- type UserpassWriteUserPasswordRequest
- type UserpassWriteUserPoliciesRequest
- type UserpassWriteUserRequest
- type WrappingRewrapRequest
- type WrappingUnwrapRequest
- type WrappingWriteLookupRequest
- type WriteAuditDeviceRequest
- type WriteAuthMethodRequest
- type WriteAuthMethodTuneRequest
- type WriteCapabilitiesAccessorRequest
- type WriteCapabilitiesRequest
- type WriteCapabilitiesSelfRequest
- type WriteConfigAuditingRequestHeaderRequest
- type WriteConfigCORSRequest
- type WriteConfigUIHeaderRequest
- type WriteGenerateRootAttemptRequest
- type WriteGenerateRootRequest
- type WriteGenerateRootUpdateRequest
- type WriteInitRequest
- type WriteInternalCountersConfigRequest
- type WriteInternalSpecsOpenAPIRequest
- type WriteLeasesLookupRequest
- type WriteLeasesRenew2Request
- type WriteLeasesRenewRequest
- type WriteLeasesRevoke2Request
- type WriteLeasesRevokePrefixRequest
- type WriteLeasesRevokeRequest
- type WriteLoggerRequest
- type WriteLoggersRequest
- type WriteMountRequest
- type WriteMountsConfigRequest
- type WritePluginsCatalogByTypeByNameRequest
- type WritePluginsReloadBackendRequest
- type WritePoliciesACLRequest
- type WritePoliciesPasswordRequest
- type WritePolicyRequest
- type WriteQuotasConfigRequest
- type WriteQuotasRateLimitRequest
- type WriteRawPathRequest
- type WriteRawRequest
- type WriteRekeyInitRequest
- type WriteRekeyUpdateRequest
- type WriteRekeyVerifyRequest
- type WriteRotateConfigRequest
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type AWSConfigWriteCertificateRequest ¶
type AWSConfigWriteCertificateRequest struct { // Base64 encoded AWS Public cert required to verify PKCS7 signature of the EC2 instance metadata. AwsPublicCert string `json:"aws_public_cert"` // Takes the value of either \"pkcs7\" or \"identity\", indicating the type of document which can be verified using the given certificate. The reason is that the PKCS#7 document will have a DSA digest and the identity signature will have an RSA signature, and accordingly the public certificates to verify those also vary. Defaults to \"pkcs7\". Type string `json:"type"` }
AWSConfigWriteCertificateRequest struct for AWSConfigWriteCertificateRequest
func NewAWSConfigWriteCertificateRequestWithDefaults ¶
func NewAWSConfigWriteCertificateRequestWithDefaults() *AWSConfigWriteCertificateRequest
NewAWSConfigWriteCertificateRequestWithDefaults instantiates a new AWSConfigWriteCertificateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSConfigWriteCertificateRequest) MarshalJSON ¶
func (o AWSConfigWriteCertificateRequest) MarshalJSON() ([]byte, error)
type AWSConfigWriteClientRequest ¶
type AWSConfigWriteClientRequest struct { // AWS Access Key ID for the account used to make AWS API requests. AccessKey string `json:"access_key"` // List of additional headers that are allowed to be in AWS STS request headers AllowedStsHeaderValues []string `json:"allowed_sts_header_values"` // URL to override the default generated endpoint for making AWS EC2 API calls. Endpoint string `json:"endpoint"` // URL to override the default generated endpoint for making AWS IAM API calls. IamEndpoint string `json:"iam_endpoint"` // Value to require in the X-Vault-AWS-IAM-Server-ID request header IamServerIdHeaderValue string `json:"iam_server_id_header_value"` // Maximum number of retries for recoverable exceptions of AWS APIs MaxRetries int32 `json:"max_retries"` // AWS Secret Access Key for the account used to make AWS API requests. SecretKey string `json:"secret_key"` // URL to override the default generated endpoint for making AWS STS API calls. StsEndpoint string `json:"sts_endpoint"` // The region ID for the sts_endpoint, if set. StsRegion string `json:"sts_region"` }
AWSConfigWriteClientRequest struct for AWSConfigWriteClientRequest
func NewAWSConfigWriteClientRequestWithDefaults ¶
func NewAWSConfigWriteClientRequestWithDefaults() *AWSConfigWriteClientRequest
NewAWSConfigWriteClientRequestWithDefaults instantiates a new AWSConfigWriteClientRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSConfigWriteClientRequest) MarshalJSON ¶
func (o AWSConfigWriteClientRequest) MarshalJSON() ([]byte, error)
type AWSConfigWriteIdentityAccessListRequest ¶
type AWSConfigWriteIdentityAccessListRequest struct { // If set to 'true', disables the periodic tidying of the 'identity-accesslist/<instance_id>' entries. DisablePeriodicTidy bool `json:"disable_periodic_tidy"` // The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage. SafetyBuffer int32 `json:"safety_buffer"` }
AWSConfigWriteIdentityAccessListRequest struct for AWSConfigWriteIdentityAccessListRequest
func NewAWSConfigWriteIdentityAccessListRequestWithDefaults ¶
func NewAWSConfigWriteIdentityAccessListRequestWithDefaults() *AWSConfigWriteIdentityAccessListRequest
NewAWSConfigWriteIdentityAccessListRequestWithDefaults instantiates a new AWSConfigWriteIdentityAccessListRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSConfigWriteIdentityAccessListRequest) MarshalJSON ¶
func (o AWSConfigWriteIdentityAccessListRequest) MarshalJSON() ([]byte, error)
type AWSConfigWriteIdentityRequest ¶
type AWSConfigWriteIdentityRequest struct { // Configure how the AWS auth method generates entity alias when using EC2 auth. Valid values are \"role_id\", \"instance_id\", and \"image_id\". Defaults to \"role_id\". Ec2Alias string `json:"ec2_alias"` // The metadata to include on the aliases and audit logs generated by this plugin. When set to 'default', includes: account_id, auth_type. These fields are available to add: ami_id, instance_id, region. Not editing this field means the 'default' fields are included. Explicitly setting this field to empty overrides the 'default' and means no metadata will be included. If not using 'default', explicit fields must be sent like: 'field1,field2'. Ec2Metadata []string `json:"ec2_metadata"` // Configure how the AWS auth method generates entity aliases when using IAM auth. Valid values are \"role_id\", \"unique_id\", and \"full_arn\". Defaults to \"role_id\". IamAlias string `json:"iam_alias"` // The metadata to include on the aliases and audit logs generated by this plugin. When set to 'default', includes: account_id, auth_type. These fields are available to add: canonical_arn, client_arn, client_user_id, inferred_aws_region, inferred_entity_id, inferred_entity_type. Not editing this field means the 'default' fields are included. Explicitly setting this field to empty overrides the 'default' and means no metadata will be included. If not using 'default', explicit fields must be sent like: 'field1,field2'. IamMetadata []string `json:"iam_metadata"` }
AWSConfigWriteIdentityRequest struct for AWSConfigWriteIdentityRequest
func NewAWSConfigWriteIdentityRequestWithDefaults ¶
func NewAWSConfigWriteIdentityRequestWithDefaults() *AWSConfigWriteIdentityRequest
NewAWSConfigWriteIdentityRequestWithDefaults instantiates a new AWSConfigWriteIdentityRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSConfigWriteIdentityRequest) MarshalJSON ¶
func (o AWSConfigWriteIdentityRequest) MarshalJSON() ([]byte, error)
type AWSConfigWriteIdentityWhiteListRequest ¶
type AWSConfigWriteIdentityWhiteListRequest struct { // If set to 'true', disables the periodic tidying of the 'identity-accesslist/<instance_id>' entries. DisablePeriodicTidy bool `json:"disable_periodic_tidy"` // The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage. SafetyBuffer int32 `json:"safety_buffer"` }
AWSConfigWriteIdentityWhiteListRequest struct for AWSConfigWriteIdentityWhiteListRequest
func NewAWSConfigWriteIdentityWhiteListRequestWithDefaults ¶
func NewAWSConfigWriteIdentityWhiteListRequestWithDefaults() *AWSConfigWriteIdentityWhiteListRequest
NewAWSConfigWriteIdentityWhiteListRequestWithDefaults instantiates a new AWSConfigWriteIdentityWhiteListRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSConfigWriteIdentityWhiteListRequest) MarshalJSON ¶
func (o AWSConfigWriteIdentityWhiteListRequest) MarshalJSON() ([]byte, error)
type AWSConfigWriteLeaseRequest ¶
type AWSConfigWriteLeaseRequest struct { // Default lease for roles. Lease string `json:"lease"` // Maximum time a credential is valid for. LeaseMax string `json:"lease_max"` }
AWSConfigWriteLeaseRequest struct for AWSConfigWriteLeaseRequest
func NewAWSConfigWriteLeaseRequestWithDefaults ¶
func NewAWSConfigWriteLeaseRequestWithDefaults() *AWSConfigWriteLeaseRequest
NewAWSConfigWriteLeaseRequestWithDefaults instantiates a new AWSConfigWriteLeaseRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSConfigWriteLeaseRequest) MarshalJSON ¶
func (o AWSConfigWriteLeaseRequest) MarshalJSON() ([]byte, error)
type AWSConfigWriteRoleTagBlackListRequest ¶
type AWSConfigWriteRoleTagBlackListRequest struct { // If set to 'true', disables the periodic tidying of deny listed entries. DisablePeriodicTidy bool `json:"disable_periodic_tidy"` // The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage. Defaults to 4320h (180 days). SafetyBuffer int32 `json:"safety_buffer"` }
AWSConfigWriteRoleTagBlackListRequest struct for AWSConfigWriteRoleTagBlackListRequest
func NewAWSConfigWriteRoleTagBlackListRequestWithDefaults ¶
func NewAWSConfigWriteRoleTagBlackListRequestWithDefaults() *AWSConfigWriteRoleTagBlackListRequest
NewAWSConfigWriteRoleTagBlackListRequestWithDefaults instantiates a new AWSConfigWriteRoleTagBlackListRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSConfigWriteRoleTagBlackListRequest) MarshalJSON ¶
func (o AWSConfigWriteRoleTagBlackListRequest) MarshalJSON() ([]byte, error)
type AWSConfigWriteRoleTagDenyListRequest ¶
type AWSConfigWriteRoleTagDenyListRequest struct { // If set to 'true', disables the periodic tidying of deny listed entries. DisablePeriodicTidy bool `json:"disable_periodic_tidy"` // The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage. Defaults to 4320h (180 days). SafetyBuffer int32 `json:"safety_buffer"` }
AWSConfigWriteRoleTagDenyListRequest struct for AWSConfigWriteRoleTagDenyListRequest
func NewAWSConfigWriteRoleTagDenyListRequestWithDefaults ¶
func NewAWSConfigWriteRoleTagDenyListRequestWithDefaults() *AWSConfigWriteRoleTagDenyListRequest
NewAWSConfigWriteRoleTagDenyListRequestWithDefaults instantiates a new AWSConfigWriteRoleTagDenyListRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSConfigWriteRoleTagDenyListRequest) MarshalJSON ¶
func (o AWSConfigWriteRoleTagDenyListRequest) MarshalJSON() ([]byte, error)
type AWSConfigWriteRootIAMCredentialsRequest ¶
type AWSConfigWriteRootIAMCredentialsRequest struct { // Access key with permission to create new keys. AccessKey string `json:"access_key"` // Endpoint to custom IAM server URL IamEndpoint string `json:"iam_endpoint"` // Maximum number of retries for recoverable exceptions of AWS APIs MaxRetries int32 `json:"max_retries"` // Region for API calls. Region string `json:"region"` // Secret key with permission to create new keys. SecretKey string `json:"secret_key"` // Endpoint to custom STS server URL StsEndpoint string `json:"sts_endpoint"` // Template to generate custom IAM usernames UsernameTemplate string `json:"username_template"` }
AWSConfigWriteRootIAMCredentialsRequest struct for AWSConfigWriteRootIAMCredentialsRequest
func NewAWSConfigWriteRootIAMCredentialsRequestWithDefaults ¶
func NewAWSConfigWriteRootIAMCredentialsRequestWithDefaults() *AWSConfigWriteRootIAMCredentialsRequest
NewAWSConfigWriteRootIAMCredentialsRequestWithDefaults instantiates a new AWSConfigWriteRootIAMCredentialsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSConfigWriteRootIAMCredentialsRequest) MarshalJSON ¶
func (o AWSConfigWriteRootIAMCredentialsRequest) MarshalJSON() ([]byte, error)
type AWSConfigWriteSecurityTokenServiceAccountRequest ¶
type AWSConfigWriteSecurityTokenServiceAccountRequest struct { // AWS ARN for STS role to be assumed when interacting with the account specified. The Vault server must have permissions to assume this role. StsRole string `json:"sts_role"` }
AWSConfigWriteSecurityTokenServiceAccountRequest struct for AWSConfigWriteSecurityTokenServiceAccountRequest
func NewAWSConfigWriteSecurityTokenServiceAccountRequestWithDefaults ¶
func NewAWSConfigWriteSecurityTokenServiceAccountRequestWithDefaults() *AWSConfigWriteSecurityTokenServiceAccountRequest
NewAWSConfigWriteSecurityTokenServiceAccountRequestWithDefaults instantiates a new AWSConfigWriteSecurityTokenServiceAccountRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSConfigWriteSecurityTokenServiceAccountRequest) MarshalJSON ¶
func (o AWSConfigWriteSecurityTokenServiceAccountRequest) MarshalJSON() ([]byte, error)
type AWSLoginRequest ¶
type AWSLoginRequest struct { // HTTP method to use for the AWS request when auth_type is iam. This must match what has been signed in the presigned request. Currently, POST is the only supported value IamHttpRequestMethod string `json:"iam_http_request_method"` // Base64-encoded request body when auth_type is iam. This must match the request body included in the signature. IamRequestBody string `json:"iam_request_body"` // Key/value pairs of headers for use in the sts:GetCallerIdentity HTTP requests headers when auth_type is iam. Can be either a Base64-encoded, JSON-serialized string, or a JSON object of key/value pairs. This must at a minimum include the headers over which AWS has included a signature. IamRequestHeaders string `json:"iam_request_headers"` // Base64-encoded full URL against which to make the AWS request when using iam auth_type. IamRequestUrl string `json:"iam_request_url"` // Base64 encoded EC2 instance identity document. This needs to be supplied along with the 'signature' parameter. If using 'curl' for fetching the identity document, consider using the option '-w 0' while piping the output to 'base64' binary. Identity string `json:"identity"` // The nonce to be used for subsequent login requests when auth_type is ec2. If this parameter is not specified at all and if reauthentication is allowed, then the backend will generate a random nonce, attaches it to the instance's identity access list entry and returns the nonce back as part of auth metadata. This value should be used with further login requests, to establish client authenticity. Clients can choose to set a custom nonce if preferred, in which case, it is recommended that clients provide a strong nonce. If a nonce is provided but with an empty value, it indicates intent to disable reauthentication. Note that, when 'disallow_reauthentication' option is enabled on either the role or the role tag, the 'nonce' holds no significance. Nonce string `json:"nonce"` // PKCS7 signature of the identity document when using an auth_type of ec2. Pkcs7 string `json:"pkcs7"` // Name of the role against which the login is being attempted. If 'role' is not specified, then the login endpoint looks for a role bearing the name of the AMI ID of the EC2 instance that is trying to login. If a matching role is not found, login fails. Role string `json:"role"` // Base64 encoded SHA256 RSA signature of the instance identity document. This needs to be supplied along with 'identity' parameter. Signature string `json:"signature"` }
AWSLoginRequest struct for AWSLoginRequest
func NewAWSLoginRequestWithDefaults ¶
func NewAWSLoginRequestWithDefaults() *AWSLoginRequest
NewAWSLoginRequestWithDefaults instantiates a new AWSLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSLoginRequest) MarshalJSON ¶
func (o AWSLoginRequest) MarshalJSON() ([]byte, error)
type AWSWriteAuthRoleRequest ¶
type AWSWriteAuthRoleRequest struct { // If set, allows migration of the underlying instance where the client resides. This keys off of pendingTime in the metadata document, so essentially, this disables the client nonce check whenever the instance is migrated to a new host and pendingTime is newer than the previously-remembered time. Use with caution. This is only checked when auth_type is ec2. AllowInstanceMigration bool `json:"allow_instance_migration"` // The auth_type permitted to authenticate to this role. Must be one of iam or ec2 and cannot be changed after role creation. AuthType string `json:"auth_type"` // If set, defines a constraint on the EC2 instances that the account ID in its identity document to match one of the IDs specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance. BoundAccountId []string `json:"bound_account_id"` // If set, defines a constraint on the EC2 instances that they should be using one of the AMI IDs specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance. BoundAmiId []string `json:"bound_ami_id"` // If set, defines a constraint on the EC2 instances to have one of the given instance IDs. Can be a list or comma-separated string of EC2 instance IDs. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance. BoundEc2InstanceId []string `json:"bound_ec2_instance_id"` // If set, defines a constraint on the EC2 instances to be associated with an IAM instance profile ARN which has a prefix that matches one of the values specified by this parameter. The value is prefix-matched (as though it were a glob ending in '*'). This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance. BoundIamInstanceProfileArn []string `json:"bound_iam_instance_profile_arn"` // ARN of the IAM principals to bind to this role. Only applicable when auth_type is iam. BoundIamPrincipalArn []string `json:"bound_iam_principal_arn"` // If set, defines a constraint on the authenticating EC2 instance that it must match one of the IAM role ARNs specified by this parameter. The value is prefix-matched (as though it were a glob ending in '*'). The configured IAM user or EC2 instance role must be allowed to execute the 'iam:GetInstanceProfile' action if this is specified. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance. BoundIamRoleArn []string `json:"bound_iam_role_arn"` // If set, defines a constraint on the EC2 instances that the region in its identity document match one of the regions specified by this parameter. This is only applicable when auth_type is ec2. BoundRegion []string `json:"bound_region"` // If set, defines a constraint on the EC2 instance to be associated with the subnet ID that matches one of the values specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance. BoundSubnetId []string `json:"bound_subnet_id"` // If set, defines a constraint on the EC2 instance to be associated with a VPC ID that matches one of the value specified by this parameter. This is only applicable when auth_type is ec2 or inferred_entity_type is ec2_instance. BoundVpcId []string `json:"bound_vpc_id"` // If set, only allows a single token to be granted per instance ID. In order to perform a fresh login, the entry in the access list for the instance ID needs to be cleared using 'auth/aws-ec2/identity-accesslist/<instance_id>' endpoint. This is only applicable when auth_type is ec2. DisallowReauthentication bool `json:"disallow_reauthentication"` // When auth_type is iam and inferred_entity_type is set, the region to assume the inferred entity exists in. InferredAwsRegion string `json:"inferred_aws_region"` // When auth_type is iam, the AWS entity type to infer from the authenticated principal. The only supported value is ec2_instance, which will extract the EC2 instance ID from the authenticated role and apply the following restrictions specific to EC2 instances: bound_ami_id, bound_account_id, bound_iam_role_arn, bound_iam_instance_profile_arn, bound_vpc_id, bound_subnet_id. The configured EC2 client must be able to find the inferred instance ID in the results, and the instance must be running. If unable to determine the EC2 instance ID or unable to find the EC2 instance ID among running instances, then authentication will fail. InferredEntityType string `json:"inferred_entity_type"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // If set, resolve all AWS IAM ARNs into AWS's internal unique IDs. When an IAM entity (e.g., user, role, or instance profile) is deleted, then all references to it within the role will be invalidated, which prevents a new IAM entity from being created with the same name and matching the role's IAM binds. Once set, this cannot be unset. ResolveAwsUniqueIds bool `json:"resolve_aws_unique_ids"` // If set, enables the role tags for this role. The value set for this field should be the 'key' of the tag on the EC2 instance. The 'value' of the tag should be generated using 'role/<role>/tag' endpoint. Defaults to an empty string, meaning that role tags are disabled. This is only allowed if auth_type is ec2. RoleTag string `json:"role_tag"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` }
AWSWriteAuthRoleRequest struct for AWSWriteAuthRoleRequest
func NewAWSWriteAuthRoleRequestWithDefaults ¶
func NewAWSWriteAuthRoleRequestWithDefaults() *AWSWriteAuthRoleRequest
NewAWSWriteAuthRoleRequestWithDefaults instantiates a new AWSWriteAuthRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSWriteAuthRoleRequest) MarshalJSON ¶
func (o AWSWriteAuthRoleRequest) MarshalJSON() ([]byte, error)
type AWSWriteAuthRoleTagRequest ¶
type AWSWriteAuthRoleTagRequest struct { // If set, allows migration of the underlying instance where the client resides. This keys off of pendingTime in the metadata document, so essentially, this disables the client nonce check whenever the instance is migrated to a new host and pendingTime is newer than the previously-remembered time. Use with caution. AllowInstanceMigration bool `json:"allow_instance_migration"` // If set, only allows a single token to be granted per instance ID. In order to perform a fresh login, the entry in access list for the instance ID needs to be cleared using the 'auth/aws-ec2/identity-accesslist/<instance_id>' endpoint. DisallowReauthentication bool `json:"disallow_reauthentication"` // Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID. InstanceId string `json:"instance_id"` // If set, specifies the maximum allowed token lifetime. MaxTtl int32 `json:"max_ttl"` // Policies to be associated with the tag. If set, must be a subset of the role's policies. If set, but set to an empty value, only the 'default' policy will be given to issued tokens. Policies []string `json:"policies"` }
AWSWriteAuthRoleTagRequest struct for AWSWriteAuthRoleTagRequest
func NewAWSWriteAuthRoleTagRequestWithDefaults ¶
func NewAWSWriteAuthRoleTagRequestWithDefaults() *AWSWriteAuthRoleTagRequest
NewAWSWriteAuthRoleTagRequestWithDefaults instantiates a new AWSWriteAuthRoleTagRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSWriteAuthRoleTagRequest) MarshalJSON ¶
func (o AWSWriteAuthRoleTagRequest) MarshalJSON() ([]byte, error)
type AWSWriteCredentialsRequest ¶
type AWSWriteCredentialsRequest struct { // Name of the role Name string `json:"name"` // ARN of role to assume when credential_type is assumed_role RoleArn string `json:"role_arn"` // Session name to use when assuming role. Max chars: 64 RoleSessionName string `json:"role_session_name"` // Lifetime of the returned credentials in seconds Ttl int32 `json:"ttl"` }
AWSWriteCredentialsRequest struct for AWSWriteCredentialsRequest
func NewAWSWriteCredentialsRequestWithDefaults ¶
func NewAWSWriteCredentialsRequestWithDefaults() *AWSWriteCredentialsRequest
NewAWSWriteCredentialsRequestWithDefaults instantiates a new AWSWriteCredentialsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSWriteCredentialsRequest) MarshalJSON ¶
func (o AWSWriteCredentialsRequest) MarshalJSON() ([]byte, error)
type AWSWriteIdentityAccessListTidySettingsRequest ¶
type AWSWriteIdentityAccessListTidySettingsRequest struct { // The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage. SafetyBuffer int32 `json:"safety_buffer"` }
AWSWriteIdentityAccessListTidySettingsRequest struct for AWSWriteIdentityAccessListTidySettingsRequest
func NewAWSWriteIdentityAccessListTidySettingsRequestWithDefaults ¶
func NewAWSWriteIdentityAccessListTidySettingsRequestWithDefaults() *AWSWriteIdentityAccessListTidySettingsRequest
NewAWSWriteIdentityAccessListTidySettingsRequestWithDefaults instantiates a new AWSWriteIdentityAccessListTidySettingsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSWriteIdentityAccessListTidySettingsRequest) MarshalJSON ¶
func (o AWSWriteIdentityAccessListTidySettingsRequest) MarshalJSON() ([]byte, error)
type AWSWriteIdentityWhiteListTidySettingsRequest ¶
type AWSWriteIdentityWhiteListTidySettingsRequest struct { // The amount of extra time that must have passed beyond the identity's expiration, before it is removed from the backend storage. SafetyBuffer int32 `json:"safety_buffer"` }
AWSWriteIdentityWhiteListTidySettingsRequest struct for AWSWriteIdentityWhiteListTidySettingsRequest
func NewAWSWriteIdentityWhiteListTidySettingsRequestWithDefaults ¶
func NewAWSWriteIdentityWhiteListTidySettingsRequestWithDefaults() *AWSWriteIdentityWhiteListTidySettingsRequest
NewAWSWriteIdentityWhiteListTidySettingsRequestWithDefaults instantiates a new AWSWriteIdentityWhiteListTidySettingsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSWriteIdentityWhiteListTidySettingsRequest) MarshalJSON ¶
func (o AWSWriteIdentityWhiteListTidySettingsRequest) MarshalJSON() ([]byte, error)
type AWSWriteRoleRequest ¶
type AWSWriteRoleRequest struct { // Use role_arns or policy_arns instead. // Deprecated Arn string `json:"arn"` // Type of credential to retrieve. Must be one of assumed_role, iam_user, or federation_token CredentialType string `json:"credential_type"` // Default TTL for assumed_role and federation_token credential types when no TTL is explicitly requested with the credentials DefaultStsTtl int32 `json:"default_sts_ttl"` // Names of IAM groups that generated IAM users will be added to. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. IamGroups []string `json:"iam_groups"` // IAM tags to be set for any users created by this role. These must be presented as Key-Value pairs. This can be represented as a map or a list of equal sign delimited key pairs. IamTags map[string]interface{} `json:"iam_tags"` // Max allowed TTL for assumed_role and federation_token credential types MaxStsTtl int32 `json:"max_sts_ttl"` // ARN of an IAM policy to attach as a permissions boundary on IAM user credentials; only valid when credential_type isiam_user PermissionsBoundaryArn string `json:"permissions_boundary_arn"` // Use policy_document instead. // Deprecated Policy string `json:"policy"` // ARNs of AWS policies. Behavior varies by credential_type. When credential_type is iam_user, then it will attach the specified policies to the generated IAM user. When credential_type is assumed_role or federation_token, the policies will be passed as the PolicyArns parameter, acting as a filter on permissions available. PolicyArns []string `json:"policy_arns"` // JSON-encoded IAM policy document. Behavior varies by credential_type. When credential_type is iam_user, then it will attach the contents of the policy_document to the IAM user generated. When credential_type is assumed_role or federation_token, this will be passed in as the Policy parameter to the AssumeRole or GetFederationToken API call, acting as a filter on permissions available. PolicyDocument string `json:"policy_document"` // ARNs of AWS roles allowed to be assumed. Only valid when credential_type is assumed_role RoleArns []string `json:"role_arns"` // Path for IAM User. Only valid when credential_type is iam_user UserPath string `json:"user_path"` }
AWSWriteRoleRequest struct for AWSWriteRoleRequest
func NewAWSWriteRoleRequestWithDefaults ¶
func NewAWSWriteRoleRequestWithDefaults() *AWSWriteRoleRequest
NewAWSWriteRoleRequestWithDefaults instantiates a new AWSWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSWriteRoleRequest) MarshalJSON ¶
func (o AWSWriteRoleRequest) MarshalJSON() ([]byte, error)
type AWSWriteRoleTagBlackListTidySettingsRequest ¶
type AWSWriteRoleTagBlackListTidySettingsRequest struct { // The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage. SafetyBuffer int32 `json:"safety_buffer"` }
AWSWriteRoleTagBlackListTidySettingsRequest struct for AWSWriteRoleTagBlackListTidySettingsRequest
func NewAWSWriteRoleTagBlackListTidySettingsRequestWithDefaults ¶
func NewAWSWriteRoleTagBlackListTidySettingsRequestWithDefaults() *AWSWriteRoleTagBlackListTidySettingsRequest
NewAWSWriteRoleTagBlackListTidySettingsRequestWithDefaults instantiates a new AWSWriteRoleTagBlackListTidySettingsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSWriteRoleTagBlackListTidySettingsRequest) MarshalJSON ¶
func (o AWSWriteRoleTagBlackListTidySettingsRequest) MarshalJSON() ([]byte, error)
type AWSWriteRoleTagDenyListTidySettingsRequest ¶
type AWSWriteRoleTagDenyListTidySettingsRequest struct { // The amount of extra time that must have passed beyond the roletag expiration, before it is removed from the backend storage. SafetyBuffer int32 `json:"safety_buffer"` }
AWSWriteRoleTagDenyListTidySettingsRequest struct for AWSWriteRoleTagDenyListTidySettingsRequest
func NewAWSWriteRoleTagDenyListTidySettingsRequestWithDefaults ¶
func NewAWSWriteRoleTagDenyListTidySettingsRequestWithDefaults() *AWSWriteRoleTagDenyListTidySettingsRequest
NewAWSWriteRoleTagDenyListTidySettingsRequestWithDefaults instantiates a new AWSWriteRoleTagDenyListTidySettingsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSWriteRoleTagDenyListTidySettingsRequest) MarshalJSON ¶
func (o AWSWriteRoleTagDenyListTidySettingsRequest) MarshalJSON() ([]byte, error)
type AWSWriteSecurityTokenServiceRequest ¶
type AWSWriteSecurityTokenServiceRequest struct { // ARN of role to assume when credential_type is assumed_role RoleArn string `json:"role_arn"` // Session name to use when assuming role. Max chars: 64 RoleSessionName string `json:"role_session_name"` // Lifetime of the returned credentials in seconds Ttl int32 `json:"ttl"` }
AWSWriteSecurityTokenServiceRequest struct for AWSWriteSecurityTokenServiceRequest
func NewAWSWriteSecurityTokenServiceRequestWithDefaults ¶
func NewAWSWriteSecurityTokenServiceRequestWithDefaults() *AWSWriteSecurityTokenServiceRequest
NewAWSWriteSecurityTokenServiceRequestWithDefaults instantiates a new AWSWriteSecurityTokenServiceRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AWSWriteSecurityTokenServiceRequest) MarshalJSON ¶
func (o AWSWriteSecurityTokenServiceRequest) MarshalJSON() ([]byte, error)
type ActiveDirectoryCheckInLibraryRequest ¶
type ActiveDirectoryCheckInLibraryRequest struct { // The username/logon name for the service accounts to check in. ServiceAccountNames []string `json:"service_account_names"` }
ActiveDirectoryCheckInLibraryRequest struct for ActiveDirectoryCheckInLibraryRequest
func NewActiveDirectoryCheckInLibraryRequestWithDefaults ¶
func NewActiveDirectoryCheckInLibraryRequestWithDefaults() *ActiveDirectoryCheckInLibraryRequest
NewActiveDirectoryCheckInLibraryRequestWithDefaults instantiates a new ActiveDirectoryCheckInLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ActiveDirectoryCheckInLibraryRequest) MarshalJSON ¶
func (o ActiveDirectoryCheckInLibraryRequest) MarshalJSON() ([]byte, error)
type ActiveDirectoryCheckInManageLibraryRequest ¶
type ActiveDirectoryCheckInManageLibraryRequest struct { // The username/logon name for the service accounts to check in. ServiceAccountNames []string `json:"service_account_names"` }
ActiveDirectoryCheckInManageLibraryRequest struct for ActiveDirectoryCheckInManageLibraryRequest
func NewActiveDirectoryCheckInManageLibraryRequestWithDefaults ¶
func NewActiveDirectoryCheckInManageLibraryRequestWithDefaults() *ActiveDirectoryCheckInManageLibraryRequest
NewActiveDirectoryCheckInManageLibraryRequestWithDefaults instantiates a new ActiveDirectoryCheckInManageLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ActiveDirectoryCheckInManageLibraryRequest) MarshalJSON ¶
func (o ActiveDirectoryCheckInManageLibraryRequest) MarshalJSON() ([]byte, error)
type ActiveDirectoryCheckOutLibraryRequest ¶
type ActiveDirectoryCheckOutLibraryRequest struct { // The length of time before the check-out will expire, in seconds. Ttl int32 `json:"ttl"` }
ActiveDirectoryCheckOutLibraryRequest struct for ActiveDirectoryCheckOutLibraryRequest
func NewActiveDirectoryCheckOutLibraryRequestWithDefaults ¶
func NewActiveDirectoryCheckOutLibraryRequestWithDefaults() *ActiveDirectoryCheckOutLibraryRequest
NewActiveDirectoryCheckOutLibraryRequestWithDefaults instantiates a new ActiveDirectoryCheckOutLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ActiveDirectoryCheckOutLibraryRequest) MarshalJSON ¶
func (o ActiveDirectoryCheckOutLibraryRequest) MarshalJSON() ([]byte, error)
type ActiveDirectoryWriteConfigRequest ¶
type ActiveDirectoryWriteConfigRequest struct { // Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). AnonymousGroupSearch bool `json:"anonymous_group_search"` // LDAP DN for searching for the user DN (optional) Binddn string `json:"binddn"` // LDAP password for searching for the user DN (optional) Bindpass string `json:"bindpass"` // If true, case sensitivity will be used when comparing usernames and groups for matching policies. CaseSensitiveNames bool `json:"case_sensitive_names"` // CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) Certificate string `json:"certificate"` // Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsCert string `json:"client_tls_cert"` // Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsKey string `json:"client_tls_key"` // Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true DenyNullBind bool `json:"deny_null_bind"` // Use anonymous bind to discover the bind DN of a user (optional) Discoverdn bool `json:"discoverdn"` // Text to insert the password into, ex. \"customPrefix{{PASSWORD}}customSuffix\". // Deprecated Formatter string `json:"formatter"` // LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn Groupattr string `json:"groupattr"` // LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) Groupdn string `json:"groupdn"` // Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) Groupfilter string `json:"groupfilter"` // Skip LDAP server SSL Certificate verification - VERY insecure (optional) InsecureTls bool `json:"insecure_tls"` // The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. LastRotationTolerance int32 `json:"last_rotation_tolerance"` // The desired length of passwords that Vault generates. // Deprecated Length int32 `json:"length"` // In seconds, the maximum password time-to-live. MaxTtl int32 `json:"max_ttl"` // Name of the password policy to use to generate passwords. PasswordPolicy string `json:"password_policy"` // Timeout, in seconds, for the connection when making requests against the server before returning back an error. RequestTimeout int32 `json:"request_timeout"` // Issue a StartTLS command after establishing unencrypted connection (optional) Starttls bool `json:"starttls"` // Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' TlsMaxVersion string `json:"tls_max_version"` // Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' TlsMinVersion string `json:"tls_min_version"` // In seconds, the default password time-to-live. Ttl int32 `json:"ttl"` // Enables userPrincipalDomain login with [username]@UPNDomain (optional) Upndomain string `json:"upndomain"` // LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. Url string `json:"url"` // In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. UsePre111GroupCnBehavior bool `json:"use_pre111_group_cn_behavior"` // If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones. UseTokenGroups bool `json:"use_token_groups"` // Attribute used for users (default: cn) Userattr string `json:"userattr"` // LDAP domain to use for users (eg: ou=People,dc=example,dc=org) Userdn string `json:"userdn"` // Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}}) Userfilter string `json:"userfilter"` // If true, sets the alias name to the username UsernameAsAlias bool `json:"username_as_alias"` }
ActiveDirectoryWriteConfigRequest struct for ActiveDirectoryWriteConfigRequest
func NewActiveDirectoryWriteConfigRequestWithDefaults ¶
func NewActiveDirectoryWriteConfigRequestWithDefaults() *ActiveDirectoryWriteConfigRequest
NewActiveDirectoryWriteConfigRequestWithDefaults instantiates a new ActiveDirectoryWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ActiveDirectoryWriteConfigRequest) MarshalJSON ¶
func (o ActiveDirectoryWriteConfigRequest) MarshalJSON() ([]byte, error)
type ActiveDirectoryWriteLibraryRequest ¶
type ActiveDirectoryWriteLibraryRequest struct { // Disable the default behavior of requiring that check-ins are performed by the entity that checked them out. DisableCheckInEnforcement bool `json:"disable_check_in_enforcement"` // In seconds, the max amount of time a check-out's renewals should last. Defaults to 24 hours. MaxTtl int32 `json:"max_ttl"` // The username/logon name for the service accounts with which this set will be associated. ServiceAccountNames []string `json:"service_account_names"` // In seconds, the amount of time a check-out should last. Defaults to 24 hours. Ttl int32 `json:"ttl"` }
ActiveDirectoryWriteLibraryRequest struct for ActiveDirectoryWriteLibraryRequest
func NewActiveDirectoryWriteLibraryRequestWithDefaults ¶
func NewActiveDirectoryWriteLibraryRequestWithDefaults() *ActiveDirectoryWriteLibraryRequest
NewActiveDirectoryWriteLibraryRequestWithDefaults instantiates a new ActiveDirectoryWriteLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ActiveDirectoryWriteLibraryRequest) MarshalJSON ¶
func (o ActiveDirectoryWriteLibraryRequest) MarshalJSON() ([]byte, error)
type ActiveDirectoryWriteRoleRequest ¶
type ActiveDirectoryWriteRoleRequest struct { // The username/logon name for the service account with which this role will be associated. ServiceAccountName string `json:"service_account_name"` // In seconds, the default password time-to-live. Ttl int32 `json:"ttl"` }
ActiveDirectoryWriteRoleRequest struct for ActiveDirectoryWriteRoleRequest
func NewActiveDirectoryWriteRoleRequestWithDefaults ¶
func NewActiveDirectoryWriteRoleRequestWithDefaults() *ActiveDirectoryWriteRoleRequest
NewActiveDirectoryWriteRoleRequestWithDefaults instantiates a new ActiveDirectoryWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ActiveDirectoryWriteRoleRequest) MarshalJSON ¶
func (o ActiveDirectoryWriteRoleRequest) MarshalJSON() ([]byte, error)
type AliCloudLoginRequest ¶
type AliCloudLoginRequest struct { // The request headers. This must include the headers over which AliCloud has included a signature. IdentityRequestHeaders string `json:"identity_request_headers"` // Base64-encoded full URL against which to make the AliCloud request. IdentityRequestUrl string `json:"identity_request_url"` // Name of the role against which the login is being attempted. If 'role' is not specified, then the login endpoint looks for a role name in the ARN returned by the GetCallerIdentity request. If a matching role is not found, login fails. Role string `json:"role"` }
AliCloudLoginRequest struct for AliCloudLoginRequest
func NewAliCloudLoginRequestWithDefaults ¶
func NewAliCloudLoginRequestWithDefaults() *AliCloudLoginRequest
NewAliCloudLoginRequestWithDefaults instantiates a new AliCloudLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AliCloudLoginRequest) MarshalJSON ¶
func (o AliCloudLoginRequest) MarshalJSON() ([]byte, error)
type AliCloudWriteAuthRoleRequest ¶
type AliCloudWriteAuthRoleRequest struct { // ARN of the RAM to bind to this role. Arn string `json:"arn"` // Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used. // Deprecated BoundCidrs []string `json:"bound_cidrs"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` }
AliCloudWriteAuthRoleRequest struct for AliCloudWriteAuthRoleRequest
func NewAliCloudWriteAuthRoleRequestWithDefaults ¶
func NewAliCloudWriteAuthRoleRequestWithDefaults() *AliCloudWriteAuthRoleRequest
NewAliCloudWriteAuthRoleRequestWithDefaults instantiates a new AliCloudWriteAuthRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AliCloudWriteAuthRoleRequest) MarshalJSON ¶
func (o AliCloudWriteAuthRoleRequest) MarshalJSON() ([]byte, error)
type AliCloudWriteConfigRequest ¶
type AliCloudWriteConfigRequest struct { // Access key with appropriate permissions. AccessKey string `json:"access_key"` // Secret key with appropriate permissions. SecretKey string `json:"secret_key"` }
AliCloudWriteConfigRequest struct for AliCloudWriteConfigRequest
func NewAliCloudWriteConfigRequestWithDefaults ¶
func NewAliCloudWriteConfigRequestWithDefaults() *AliCloudWriteConfigRequest
NewAliCloudWriteConfigRequestWithDefaults instantiates a new AliCloudWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AliCloudWriteConfigRequest) MarshalJSON ¶
func (o AliCloudWriteConfigRequest) MarshalJSON() ([]byte, error)
type AliCloudWriteRoleRequest ¶
type AliCloudWriteRoleRequest struct { // JSON of policies to be dynamically applied to users of this role. InlinePolicies string `json:"inline_policies"` // The maximum allowed lifetime of tokens issued using this role. MaxTtl int32 `json:"max_ttl"` // The name and type of each remote policy to be applied. Example: \"name:AliyunRDSReadOnlyAccess,type:System\". RemotePolicies []string `json:"remote_policies"` // ARN of the role to be assumed. If provided, inline_policies and remote_policies should be blank. At creation time, this role must have configured trusted actors, and the access key and secret that will be used to assume the role (in /config) must qualify as a trusted actor. RoleArn string `json:"role_arn"` // Duration in seconds after which the issued token should expire. Defaults to 0, in which case the value will fallback to the system/mount defaults. Ttl int32 `json:"ttl"` }
AliCloudWriteRoleRequest struct for AliCloudWriteRoleRequest
func NewAliCloudWriteRoleRequestWithDefaults ¶
func NewAliCloudWriteRoleRequestWithDefaults() *AliCloudWriteRoleRequest
NewAliCloudWriteRoleRequestWithDefaults instantiates a new AliCloudWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AliCloudWriteRoleRequest) MarshalJSON ¶
func (o AliCloudWriteRoleRequest) MarshalJSON() ([]byte, error)
type AliasWriteByIDRequest ¶
type AliasWriteByIDRequest struct { // Entity ID to which this alias should be tied to CanonicalId string `json:"canonical_id"` // Entity ID to which this alias should be tied to. This field is deprecated in favor of 'canonical_id'. EntityId string `json:"entity_id"` // Mount accessor to which this alias belongs to MountAccessor string `json:"mount_accessor"` // Name of the alias Name string `json:"name"` }
AliasWriteByIDRequest struct for AliasWriteByIDRequest
func NewAliasWriteByIDRequestWithDefaults ¶
func NewAliasWriteByIDRequestWithDefaults() *AliasWriteByIDRequest
NewAliasWriteByIDRequestWithDefaults instantiates a new AliasWriteByIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AliasWriteByIDRequest) MarshalJSON ¶
func (o AliasWriteByIDRequest) MarshalJSON() ([]byte, error)
type AliasWriteRequest ¶
type AliasWriteRequest struct { // Entity ID to which this alias belongs to CanonicalId string `json:"canonical_id"` // Entity ID to which this alias belongs to. This field is deprecated in favor of 'canonical_id'. EntityId string `json:"entity_id"` // ID of the alias Id string `json:"id"` // Mount accessor to which this alias belongs to MountAccessor string `json:"mount_accessor"` // Name of the alias Name string `json:"name"` }
AliasWriteRequest struct for AliasWriteRequest
func NewAliasWriteRequestWithDefaults ¶
func NewAliasWriteRequestWithDefaults() *AliasWriteRequest
NewAliasWriteRequestWithDefaults instantiates a new AliasWriteRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AliasWriteRequest) MarshalJSON ¶
func (o AliasWriteRequest) MarshalJSON() ([]byte, error)
type AppRoleListRolesResponse ¶
type AppRoleListRolesResponse struct {
Keys []string `json:"keys"`
}
AppRoleListRolesResponse struct for AppRoleListRolesResponse
func NewAppRoleListRolesResponseWithDefaults ¶
func NewAppRoleListRolesResponseWithDefaults() *AppRoleListRolesResponse
NewAppRoleListRolesResponseWithDefaults instantiates a new AppRoleListRolesResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleListRolesResponse) MarshalJSON ¶
func (o AppRoleListRolesResponse) MarshalJSON() ([]byte, error)
type AppRoleListSecretIDResponse ¶
type AppRoleListSecretIDResponse struct {
Keys []string `json:"keys"`
}
AppRoleListSecretIDResponse struct for AppRoleListSecretIDResponse
func NewAppRoleListSecretIDResponseWithDefaults ¶
func NewAppRoleListSecretIDResponseWithDefaults() *AppRoleListSecretIDResponse
NewAppRoleListSecretIDResponseWithDefaults instantiates a new AppRoleListSecretIDResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleListSecretIDResponse) MarshalJSON ¶
func (o AppRoleListSecretIDResponse) MarshalJSON() ([]byte, error)
type AppRoleLoginRequest ¶
type AppRoleLoginRequest struct { // Unique identifier of the Role. Required to be supplied when the 'bind_secret_id' constraint is set. RoleId string `json:"role_id"` // SecretID belong to the App role SecretId string `json:"secret_id"` }
AppRoleLoginRequest struct for AppRoleLoginRequest
func NewAppRoleLoginRequestWithDefaults ¶
func NewAppRoleLoginRequestWithDefaults() *AppRoleLoginRequest
NewAppRoleLoginRequestWithDefaults instantiates a new AppRoleLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleLoginRequest) MarshalJSON ¶
func (o AppRoleLoginRequest) MarshalJSON() ([]byte, error)
type AppRoleReadBindSecretIDResponse ¶
type AppRoleReadBindSecretIDResponse struct { // Impose secret_id to be presented when logging in using this role. Defaults to 'true'. BindSecretId bool `json:"bind_secret_id"` }
AppRoleReadBindSecretIDResponse struct for AppRoleReadBindSecretIDResponse
func NewAppRoleReadBindSecretIDResponseWithDefaults ¶
func NewAppRoleReadBindSecretIDResponseWithDefaults() *AppRoleReadBindSecretIDResponse
NewAppRoleReadBindSecretIDResponseWithDefaults instantiates a new AppRoleReadBindSecretIDResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadBindSecretIDResponse) MarshalJSON ¶
func (o AppRoleReadBindSecretIDResponse) MarshalJSON() ([]byte, error)
type AppRoleReadBoundCIDRListResponse ¶
type AppRoleReadBoundCIDRListResponse struct { // Deprecated: Please use \"secret_id_bound_cidrs\" instead. Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. // Deprecated BoundCidrList []string `json:"bound_cidr_list"` }
AppRoleReadBoundCIDRListResponse struct for AppRoleReadBoundCIDRListResponse
func NewAppRoleReadBoundCIDRListResponseWithDefaults ¶
func NewAppRoleReadBoundCIDRListResponseWithDefaults() *AppRoleReadBoundCIDRListResponse
NewAppRoleReadBoundCIDRListResponseWithDefaults instantiates a new AppRoleReadBoundCIDRListResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadBoundCIDRListResponse) MarshalJSON ¶
func (o AppRoleReadBoundCIDRListResponse) MarshalJSON() ([]byte, error)
type AppRoleReadLocalSecretIDsResponse ¶
type AppRoleReadLocalSecretIDsResponse struct { // If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later LocalSecretIds bool `json:"local_secret_ids"` }
AppRoleReadLocalSecretIDsResponse struct for AppRoleReadLocalSecretIDsResponse
func NewAppRoleReadLocalSecretIDsResponseWithDefaults ¶
func NewAppRoleReadLocalSecretIDsResponseWithDefaults() *AppRoleReadLocalSecretIDsResponse
NewAppRoleReadLocalSecretIDsResponseWithDefaults instantiates a new AppRoleReadLocalSecretIDsResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadLocalSecretIDsResponse) MarshalJSON ¶
func (o AppRoleReadLocalSecretIDsResponse) MarshalJSON() ([]byte, error)
type AppRoleReadPeriodResponse ¶
type AppRoleReadPeriodResponse struct { // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` }
AppRoleReadPeriodResponse struct for AppRoleReadPeriodResponse
func NewAppRoleReadPeriodResponseWithDefaults ¶
func NewAppRoleReadPeriodResponseWithDefaults() *AppRoleReadPeriodResponse
NewAppRoleReadPeriodResponseWithDefaults instantiates a new AppRoleReadPeriodResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadPeriodResponse) MarshalJSON ¶
func (o AppRoleReadPeriodResponse) MarshalJSON() ([]byte, error)
type AppRoleReadPoliciesResponse ¶
type AppRoleReadPoliciesResponse struct { // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` }
AppRoleReadPoliciesResponse struct for AppRoleReadPoliciesResponse
func NewAppRoleReadPoliciesResponseWithDefaults ¶
func NewAppRoleReadPoliciesResponseWithDefaults() *AppRoleReadPoliciesResponse
NewAppRoleReadPoliciesResponseWithDefaults instantiates a new AppRoleReadPoliciesResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadPoliciesResponse) MarshalJSON ¶
func (o AppRoleReadPoliciesResponse) MarshalJSON() ([]byte, error)
type AppRoleReadRoleIDResponse ¶
type AppRoleReadRoleIDResponse struct { // Identifier of the role. Defaults to a UUID. RoleId string `json:"role_id"` }
AppRoleReadRoleIDResponse struct for AppRoleReadRoleIDResponse
func NewAppRoleReadRoleIDResponseWithDefaults ¶
func NewAppRoleReadRoleIDResponseWithDefaults() *AppRoleReadRoleIDResponse
NewAppRoleReadRoleIDResponseWithDefaults instantiates a new AppRoleReadRoleIDResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadRoleIDResponse) MarshalJSON ¶
func (o AppRoleReadRoleIDResponse) MarshalJSON() ([]byte, error)
type AppRoleReadRoleResponse ¶
type AppRoleReadRoleResponse struct { // Impose secret ID to be presented when logging in using this role. BindSecretId bool `json:"bind_secret_id"` // If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later LocalSecretIds bool `json:"local_secret_ids"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. SecretIdBoundCidrs []string `json:"secret_id_bound_cidrs"` // Number of times a secret ID can access the role, after which the secret ID will expire. SecretIdNumUses int32 `json:"secret_id_num_uses"` // Duration in seconds after which the issued secret ID expires. SecretIdTtl int32 `json:"secret_id_ttl"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` }
AppRoleReadRoleResponse struct for AppRoleReadRoleResponse
func NewAppRoleReadRoleResponseWithDefaults ¶
func NewAppRoleReadRoleResponseWithDefaults() *AppRoleReadRoleResponse
NewAppRoleReadRoleResponseWithDefaults instantiates a new AppRoleReadRoleResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadRoleResponse) MarshalJSON ¶
func (o AppRoleReadRoleResponse) MarshalJSON() ([]byte, error)
type AppRoleReadSecretIDBoundCIDRsResponse ¶
type AppRoleReadSecretIDBoundCIDRsResponse struct { // Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. SecretIdBoundCidrs []string `json:"secret_id_bound_cidrs"` }
AppRoleReadSecretIDBoundCIDRsResponse struct for AppRoleReadSecretIDBoundCIDRsResponse
func NewAppRoleReadSecretIDBoundCIDRsResponseWithDefaults ¶
func NewAppRoleReadSecretIDBoundCIDRsResponseWithDefaults() *AppRoleReadSecretIDBoundCIDRsResponse
NewAppRoleReadSecretIDBoundCIDRsResponseWithDefaults instantiates a new AppRoleReadSecretIDBoundCIDRsResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadSecretIDBoundCIDRsResponse) MarshalJSON ¶
func (o AppRoleReadSecretIDBoundCIDRsResponse) MarshalJSON() ([]byte, error)
type AppRoleReadSecretIDNumUsesResponse ¶
type AppRoleReadSecretIDNumUsesResponse struct { // Number of times a secret ID can access the role, after which the SecretID will expire. Defaults to 0 meaning that the secret ID is of unlimited use. SecretIdNumUses int32 `json:"secret_id_num_uses"` }
AppRoleReadSecretIDNumUsesResponse struct for AppRoleReadSecretIDNumUsesResponse
func NewAppRoleReadSecretIDNumUsesResponseWithDefaults ¶
func NewAppRoleReadSecretIDNumUsesResponseWithDefaults() *AppRoleReadSecretIDNumUsesResponse
NewAppRoleReadSecretIDNumUsesResponseWithDefaults instantiates a new AppRoleReadSecretIDNumUsesResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadSecretIDNumUsesResponse) MarshalJSON ¶
func (o AppRoleReadSecretIDNumUsesResponse) MarshalJSON() ([]byte, error)
type AppRoleReadSecretIDTTLResponse ¶
type AppRoleReadSecretIDTTLResponse struct { // Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. SecretIdTtl int32 `json:"secret_id_ttl"` }
AppRoleReadSecretIDTTLResponse struct for AppRoleReadSecretIDTTLResponse
func NewAppRoleReadSecretIDTTLResponseWithDefaults ¶
func NewAppRoleReadSecretIDTTLResponseWithDefaults() *AppRoleReadSecretIDTTLResponse
NewAppRoleReadSecretIDTTLResponseWithDefaults instantiates a new AppRoleReadSecretIDTTLResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadSecretIDTTLResponse) MarshalJSON ¶
func (o AppRoleReadSecretIDTTLResponse) MarshalJSON() ([]byte, error)
type AppRoleReadTokenBoundCIDRsResponse ¶
type AppRoleReadTokenBoundCIDRsResponse struct { // Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. TokenBoundCidrs []string `json:"token_bound_cidrs"` }
AppRoleReadTokenBoundCIDRsResponse struct for AppRoleReadTokenBoundCIDRsResponse
func NewAppRoleReadTokenBoundCIDRsResponseWithDefaults ¶
func NewAppRoleReadTokenBoundCIDRsResponseWithDefaults() *AppRoleReadTokenBoundCIDRsResponse
NewAppRoleReadTokenBoundCIDRsResponseWithDefaults instantiates a new AppRoleReadTokenBoundCIDRsResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadTokenBoundCIDRsResponse) MarshalJSON ¶
func (o AppRoleReadTokenBoundCIDRsResponse) MarshalJSON() ([]byte, error)
type AppRoleReadTokenMaxTTLResponse ¶
type AppRoleReadTokenMaxTTLResponse struct { // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` }
AppRoleReadTokenMaxTTLResponse struct for AppRoleReadTokenMaxTTLResponse
func NewAppRoleReadTokenMaxTTLResponseWithDefaults ¶
func NewAppRoleReadTokenMaxTTLResponseWithDefaults() *AppRoleReadTokenMaxTTLResponse
NewAppRoleReadTokenMaxTTLResponseWithDefaults instantiates a new AppRoleReadTokenMaxTTLResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadTokenMaxTTLResponse) MarshalJSON ¶
func (o AppRoleReadTokenMaxTTLResponse) MarshalJSON() ([]byte, error)
type AppRoleReadTokenNumUsesResponse ¶
type AppRoleReadTokenNumUsesResponse struct { // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` }
AppRoleReadTokenNumUsesResponse struct for AppRoleReadTokenNumUsesResponse
func NewAppRoleReadTokenNumUsesResponseWithDefaults ¶
func NewAppRoleReadTokenNumUsesResponseWithDefaults() *AppRoleReadTokenNumUsesResponse
NewAppRoleReadTokenNumUsesResponseWithDefaults instantiates a new AppRoleReadTokenNumUsesResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadTokenNumUsesResponse) MarshalJSON ¶
func (o AppRoleReadTokenNumUsesResponse) MarshalJSON() ([]byte, error)
type AppRoleReadTokenTTLResponse ¶
type AppRoleReadTokenTTLResponse struct { // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` }
AppRoleReadTokenTTLResponse struct for AppRoleReadTokenTTLResponse
func NewAppRoleReadTokenTTLResponseWithDefaults ¶
func NewAppRoleReadTokenTTLResponseWithDefaults() *AppRoleReadTokenTTLResponse
NewAppRoleReadTokenTTLResponseWithDefaults instantiates a new AppRoleReadTokenTTLResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleReadTokenTTLResponse) MarshalJSON ¶
func (o AppRoleReadTokenTTLResponse) MarshalJSON() ([]byte, error)
type AppRoleWriteBindSecretIDRequest ¶
type AppRoleWriteBindSecretIDRequest struct { // Impose secret_id to be presented when logging in using this role. BindSecretId bool `json:"bind_secret_id"` }
AppRoleWriteBindSecretIDRequest struct for AppRoleWriteBindSecretIDRequest
func NewAppRoleWriteBindSecretIDRequestWithDefaults ¶
func NewAppRoleWriteBindSecretIDRequestWithDefaults() *AppRoleWriteBindSecretIDRequest
NewAppRoleWriteBindSecretIDRequestWithDefaults instantiates a new AppRoleWriteBindSecretIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteBindSecretIDRequest) MarshalJSON ¶
func (o AppRoleWriteBindSecretIDRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteBoundCIDRListRequest ¶
type AppRoleWriteBoundCIDRListRequest struct { // Deprecated: Please use \"secret_id_bound_cidrs\" instead. Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. BoundCidrList []string `json:"bound_cidr_list"` }
AppRoleWriteBoundCIDRListRequest struct for AppRoleWriteBoundCIDRListRequest
func NewAppRoleWriteBoundCIDRListRequestWithDefaults ¶
func NewAppRoleWriteBoundCIDRListRequestWithDefaults() *AppRoleWriteBoundCIDRListRequest
NewAppRoleWriteBoundCIDRListRequestWithDefaults instantiates a new AppRoleWriteBoundCIDRListRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteBoundCIDRListRequest) MarshalJSON ¶
func (o AppRoleWriteBoundCIDRListRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteCustomSecretIDRequest ¶
type AppRoleWriteCustomSecretIDRequest struct { // Comma separated string or list of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. CidrList []string `json:"cidr_list"` // Metadata to be tied to the SecretID. This should be a JSON formatted string containing metadata in key value pairs. Metadata string `json:"metadata"` // Number of times this SecretID can be used, after which the SecretID expires. Overrides secret_id_num_uses role option when supplied. May not be higher than role's secret_id_num_uses. NumUses int32 `json:"num_uses"` // SecretID to be attached to the role. SecretId string `json:"secret_id"` // Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. TokenBoundCidrs []string `json:"token_bound_cidrs"` // Duration in seconds after which this SecretID expires. Overrides secret_id_ttl role option when supplied. May not be longer than role's secret_id_ttl. Ttl int32 `json:"ttl"` }
AppRoleWriteCustomSecretIDRequest struct for AppRoleWriteCustomSecretIDRequest
func NewAppRoleWriteCustomSecretIDRequestWithDefaults ¶
func NewAppRoleWriteCustomSecretIDRequestWithDefaults() *AppRoleWriteCustomSecretIDRequest
NewAppRoleWriteCustomSecretIDRequestWithDefaults instantiates a new AppRoleWriteCustomSecretIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteCustomSecretIDRequest) MarshalJSON ¶
func (o AppRoleWriteCustomSecretIDRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteCustomSecretIDResponse ¶
type AppRoleWriteCustomSecretIDResponse struct { // Secret ID attached to the role. SecretId string `json:"secret_id"` // Accessor of the secret ID SecretIdAccessor string `json:"secret_id_accessor"` // Number of times a secret ID can access the role, after which the secret ID will expire. SecretIdNumUses int32 `json:"secret_id_num_uses"` // Duration in seconds after which the issued secret ID expires. SecretIdTtl int32 `json:"secret_id_ttl"` }
AppRoleWriteCustomSecretIDResponse struct for AppRoleWriteCustomSecretIDResponse
func NewAppRoleWriteCustomSecretIDResponseWithDefaults ¶
func NewAppRoleWriteCustomSecretIDResponseWithDefaults() *AppRoleWriteCustomSecretIDResponse
NewAppRoleWriteCustomSecretIDResponseWithDefaults instantiates a new AppRoleWriteCustomSecretIDResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteCustomSecretIDResponse) MarshalJSON ¶
func (o AppRoleWriteCustomSecretIDResponse) MarshalJSON() ([]byte, error)
type AppRoleWritePeriodRequest ¶
type AppRoleWritePeriodRequest struct { // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` }
AppRoleWritePeriodRequest struct for AppRoleWritePeriodRequest
func NewAppRoleWritePeriodRequestWithDefaults ¶
func NewAppRoleWritePeriodRequestWithDefaults() *AppRoleWritePeriodRequest
NewAppRoleWritePeriodRequestWithDefaults instantiates a new AppRoleWritePeriodRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWritePeriodRequest) MarshalJSON ¶
func (o AppRoleWritePeriodRequest) MarshalJSON() ([]byte, error)
type AppRoleWritePoliciesRequest ¶
type AppRoleWritePoliciesRequest struct { // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` }
AppRoleWritePoliciesRequest struct for AppRoleWritePoliciesRequest
func NewAppRoleWritePoliciesRequestWithDefaults ¶
func NewAppRoleWritePoliciesRequestWithDefaults() *AppRoleWritePoliciesRequest
NewAppRoleWritePoliciesRequestWithDefaults instantiates a new AppRoleWritePoliciesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWritePoliciesRequest) MarshalJSON ¶
func (o AppRoleWritePoliciesRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteRoleIDRequest ¶
type AppRoleWriteRoleIDRequest struct { // Identifier of the role. Defaults to a UUID. RoleId string `json:"role_id"` }
AppRoleWriteRoleIDRequest struct for AppRoleWriteRoleIDRequest
func NewAppRoleWriteRoleIDRequestWithDefaults ¶
func NewAppRoleWriteRoleIDRequestWithDefaults() *AppRoleWriteRoleIDRequest
NewAppRoleWriteRoleIDRequestWithDefaults instantiates a new AppRoleWriteRoleIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteRoleIDRequest) MarshalJSON ¶
func (o AppRoleWriteRoleIDRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteRoleRequest ¶
type AppRoleWriteRoleRequest struct { // Impose secret_id to be presented when logging in using this role. Defaults to 'true'. BindSecretId bool `json:"bind_secret_id"` // Use \"secret_id_bound_cidrs\" instead. // Deprecated BoundCidrList []string `json:"bound_cidr_list"` // If set, the secret IDs generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later. LocalSecretIds bool `json:"local_secret_ids"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Identifier of the role. Defaults to a UUID. RoleId string `json:"role_id"` // Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. SecretIdBoundCidrs []string `json:"secret_id_bound_cidrs"` // Number of times a SecretID can access the role, after which the SecretID will expire. Defaults to 0 meaning that the the secret_id is of unlimited use. SecretIdNumUses int32 `json:"secret_id_num_uses"` // Duration in seconds after which the issued SecretID should expire. Defaults to 0, meaning no expiration. SecretIdTtl int32 `json:"secret_id_ttl"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` }
AppRoleWriteRoleRequest struct for AppRoleWriteRoleRequest
func NewAppRoleWriteRoleRequestWithDefaults ¶
func NewAppRoleWriteRoleRequestWithDefaults() *AppRoleWriteRoleRequest
NewAppRoleWriteRoleRequestWithDefaults instantiates a new AppRoleWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteRoleRequest) MarshalJSON ¶
func (o AppRoleWriteRoleRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDAccessorDestroyRequest ¶
type AppRoleWriteSecretIDAccessorDestroyRequest struct { // Accessor of the SecretID SecretIdAccessor string `json:"secret_id_accessor"` }
AppRoleWriteSecretIDAccessorDestroyRequest struct for AppRoleWriteSecretIDAccessorDestroyRequest
func NewAppRoleWriteSecretIDAccessorDestroyRequestWithDefaults ¶
func NewAppRoleWriteSecretIDAccessorDestroyRequestWithDefaults() *AppRoleWriteSecretIDAccessorDestroyRequest
NewAppRoleWriteSecretIDAccessorDestroyRequestWithDefaults instantiates a new AppRoleWriteSecretIDAccessorDestroyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDAccessorDestroyRequest) MarshalJSON ¶
func (o AppRoleWriteSecretIDAccessorDestroyRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDAccessorLookupRequest ¶
type AppRoleWriteSecretIDAccessorLookupRequest struct { // Accessor of the SecretID SecretIdAccessor string `json:"secret_id_accessor"` }
AppRoleWriteSecretIDAccessorLookupRequest struct for AppRoleWriteSecretIDAccessorLookupRequest
func NewAppRoleWriteSecretIDAccessorLookupRequestWithDefaults ¶
func NewAppRoleWriteSecretIDAccessorLookupRequestWithDefaults() *AppRoleWriteSecretIDAccessorLookupRequest
NewAppRoleWriteSecretIDAccessorLookupRequestWithDefaults instantiates a new AppRoleWriteSecretIDAccessorLookupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDAccessorLookupRequest) MarshalJSON ¶
func (o AppRoleWriteSecretIDAccessorLookupRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDAccessorLookupResponse ¶
type AppRoleWriteSecretIDAccessorLookupResponse struct { // List of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. CidrList []string `json:"cidr_list"` CreationTime time.Time `json:"creation_time"` ExpirationTime time.Time `json:"expiration_time"` LastUpdatedTime time.Time `json:"last_updated_time"` Metadata map[string]interface{} `json:"metadata"` // Accessor of the secret ID SecretIdAccessor string `json:"secret_id_accessor"` // Number of times a secret ID can access the role, after which the secret ID will expire. SecretIdNumUses int32 `json:"secret_id_num_uses"` // Duration in seconds after which the issued secret ID expires. SecretIdTtl int32 `json:"secret_id_ttl"` // List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. TokenBoundCidrs []string `json:"token_bound_cidrs"` }
AppRoleWriteSecretIDAccessorLookupResponse struct for AppRoleWriteSecretIDAccessorLookupResponse
func NewAppRoleWriteSecretIDAccessorLookupResponseWithDefaults ¶
func NewAppRoleWriteSecretIDAccessorLookupResponseWithDefaults() *AppRoleWriteSecretIDAccessorLookupResponse
NewAppRoleWriteSecretIDAccessorLookupResponseWithDefaults instantiates a new AppRoleWriteSecretIDAccessorLookupResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDAccessorLookupResponse) MarshalJSON ¶
func (o AppRoleWriteSecretIDAccessorLookupResponse) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDBoundCIDRsRequest ¶
type AppRoleWriteSecretIDBoundCIDRsRequest struct { // Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. SecretIdBoundCidrs []string `json:"secret_id_bound_cidrs"` }
AppRoleWriteSecretIDBoundCIDRsRequest struct for AppRoleWriteSecretIDBoundCIDRsRequest
func NewAppRoleWriteSecretIDBoundCIDRsRequestWithDefaults ¶
func NewAppRoleWriteSecretIDBoundCIDRsRequestWithDefaults() *AppRoleWriteSecretIDBoundCIDRsRequest
NewAppRoleWriteSecretIDBoundCIDRsRequestWithDefaults instantiates a new AppRoleWriteSecretIDBoundCIDRsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDBoundCIDRsRequest) MarshalJSON ¶
func (o AppRoleWriteSecretIDBoundCIDRsRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDDestroyRequest ¶
type AppRoleWriteSecretIDDestroyRequest struct { // SecretID attached to the role. SecretId string `json:"secret_id"` }
AppRoleWriteSecretIDDestroyRequest struct for AppRoleWriteSecretIDDestroyRequest
func NewAppRoleWriteSecretIDDestroyRequestWithDefaults ¶
func NewAppRoleWriteSecretIDDestroyRequestWithDefaults() *AppRoleWriteSecretIDDestroyRequest
NewAppRoleWriteSecretIDDestroyRequestWithDefaults instantiates a new AppRoleWriteSecretIDDestroyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDDestroyRequest) MarshalJSON ¶
func (o AppRoleWriteSecretIDDestroyRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDLookupRequest ¶
type AppRoleWriteSecretIDLookupRequest struct { // SecretID attached to the role. SecretId string `json:"secret_id"` }
AppRoleWriteSecretIDLookupRequest struct for AppRoleWriteSecretIDLookupRequest
func NewAppRoleWriteSecretIDLookupRequestWithDefaults ¶
func NewAppRoleWriteSecretIDLookupRequestWithDefaults() *AppRoleWriteSecretIDLookupRequest
NewAppRoleWriteSecretIDLookupRequestWithDefaults instantiates a new AppRoleWriteSecretIDLookupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDLookupRequest) MarshalJSON ¶
func (o AppRoleWriteSecretIDLookupRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDLookupResponse ¶
type AppRoleWriteSecretIDLookupResponse struct { // List of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. CidrList []string `json:"cidr_list"` CreationTime time.Time `json:"creation_time"` ExpirationTime time.Time `json:"expiration_time"` LastUpdatedTime time.Time `json:"last_updated_time"` Metadata map[string]interface{} `json:"metadata"` // Accessor of the secret ID SecretIdAccessor string `json:"secret_id_accessor"` // Number of times a secret ID can access the role, after which the secret ID will expire. SecretIdNumUses int32 `json:"secret_id_num_uses"` // Duration in seconds after which the issued secret ID expires. SecretIdTtl int32 `json:"secret_id_ttl"` // List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. TokenBoundCidrs []string `json:"token_bound_cidrs"` }
AppRoleWriteSecretIDLookupResponse struct for AppRoleWriteSecretIDLookupResponse
func NewAppRoleWriteSecretIDLookupResponseWithDefaults ¶
func NewAppRoleWriteSecretIDLookupResponseWithDefaults() *AppRoleWriteSecretIDLookupResponse
NewAppRoleWriteSecretIDLookupResponseWithDefaults instantiates a new AppRoleWriteSecretIDLookupResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDLookupResponse) MarshalJSON ¶
func (o AppRoleWriteSecretIDLookupResponse) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDNumUsesRequest ¶
type AppRoleWriteSecretIDNumUsesRequest struct { // Number of times a SecretID can access the role, after which the SecretID will expire. SecretIdNumUses int32 `json:"secret_id_num_uses"` }
AppRoleWriteSecretIDNumUsesRequest struct for AppRoleWriteSecretIDNumUsesRequest
func NewAppRoleWriteSecretIDNumUsesRequestWithDefaults ¶
func NewAppRoleWriteSecretIDNumUsesRequestWithDefaults() *AppRoleWriteSecretIDNumUsesRequest
NewAppRoleWriteSecretIDNumUsesRequestWithDefaults instantiates a new AppRoleWriteSecretIDNumUsesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDNumUsesRequest) MarshalJSON ¶
func (o AppRoleWriteSecretIDNumUsesRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDRequest ¶
type AppRoleWriteSecretIDRequest struct { // Comma separated string or list of CIDR blocks enforcing secret IDs to be used from specific set of IP addresses. If 'bound_cidr_list' is set on the role, then the list of CIDR blocks listed here should be a subset of the CIDR blocks listed on the role. CidrList []string `json:"cidr_list"` // Metadata to be tied to the SecretID. This should be a JSON formatted string containing the metadata in key value pairs. Metadata string `json:"metadata"` // Number of times this SecretID can be used, after which the SecretID expires. Overrides secret_id_num_uses role option when supplied. May not be higher than role's secret_id_num_uses. NumUses int32 `json:"num_uses"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // Duration in seconds after which this SecretID expires. Overrides secret_id_ttl role option when supplied. May not be longer than role's secret_id_ttl. Ttl int32 `json:"ttl"` }
AppRoleWriteSecretIDRequest struct for AppRoleWriteSecretIDRequest
func NewAppRoleWriteSecretIDRequestWithDefaults ¶
func NewAppRoleWriteSecretIDRequestWithDefaults() *AppRoleWriteSecretIDRequest
NewAppRoleWriteSecretIDRequestWithDefaults instantiates a new AppRoleWriteSecretIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDRequest) MarshalJSON ¶
func (o AppRoleWriteSecretIDRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDResponse ¶
type AppRoleWriteSecretIDResponse struct { // Secret ID attached to the role. SecretId string `json:"secret_id"` // Accessor of the secret ID SecretIdAccessor string `json:"secret_id_accessor"` // Number of times a secret ID can access the role, after which the secret ID will expire. SecretIdNumUses int32 `json:"secret_id_num_uses"` // Duration in seconds after which the issued secret ID expires. SecretIdTtl int32 `json:"secret_id_ttl"` }
AppRoleWriteSecretIDResponse struct for AppRoleWriteSecretIDResponse
func NewAppRoleWriteSecretIDResponseWithDefaults ¶
func NewAppRoleWriteSecretIDResponseWithDefaults() *AppRoleWriteSecretIDResponse
NewAppRoleWriteSecretIDResponseWithDefaults instantiates a new AppRoleWriteSecretIDResponse object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDResponse) MarshalJSON ¶
func (o AppRoleWriteSecretIDResponse) MarshalJSON() ([]byte, error)
type AppRoleWriteSecretIDTTLRequest ¶
type AppRoleWriteSecretIDTTLRequest struct { // Duration in seconds after which the issued SecretID should expire. Defaults to 0, meaning no expiration. SecretIdTtl int32 `json:"secret_id_ttl"` }
AppRoleWriteSecretIDTTLRequest struct for AppRoleWriteSecretIDTTLRequest
func NewAppRoleWriteSecretIDTTLRequestWithDefaults ¶
func NewAppRoleWriteSecretIDTTLRequestWithDefaults() *AppRoleWriteSecretIDTTLRequest
NewAppRoleWriteSecretIDTTLRequestWithDefaults instantiates a new AppRoleWriteSecretIDTTLRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteSecretIDTTLRequest) MarshalJSON ¶
func (o AppRoleWriteSecretIDTTLRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteTokenBoundCIDRsRequest ¶
type AppRoleWriteTokenBoundCIDRsRequest struct { // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` }
AppRoleWriteTokenBoundCIDRsRequest struct for AppRoleWriteTokenBoundCIDRsRequest
func NewAppRoleWriteTokenBoundCIDRsRequestWithDefaults ¶
func NewAppRoleWriteTokenBoundCIDRsRequestWithDefaults() *AppRoleWriteTokenBoundCIDRsRequest
NewAppRoleWriteTokenBoundCIDRsRequestWithDefaults instantiates a new AppRoleWriteTokenBoundCIDRsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteTokenBoundCIDRsRequest) MarshalJSON ¶
func (o AppRoleWriteTokenBoundCIDRsRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteTokenMaxTTLRequest ¶
type AppRoleWriteTokenMaxTTLRequest struct { // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` }
AppRoleWriteTokenMaxTTLRequest struct for AppRoleWriteTokenMaxTTLRequest
func NewAppRoleWriteTokenMaxTTLRequestWithDefaults ¶
func NewAppRoleWriteTokenMaxTTLRequestWithDefaults() *AppRoleWriteTokenMaxTTLRequest
NewAppRoleWriteTokenMaxTTLRequestWithDefaults instantiates a new AppRoleWriteTokenMaxTTLRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteTokenMaxTTLRequest) MarshalJSON ¶
func (o AppRoleWriteTokenMaxTTLRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteTokenNumUsesRequest ¶
type AppRoleWriteTokenNumUsesRequest struct { // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` }
AppRoleWriteTokenNumUsesRequest struct for AppRoleWriteTokenNumUsesRequest
func NewAppRoleWriteTokenNumUsesRequestWithDefaults ¶
func NewAppRoleWriteTokenNumUsesRequestWithDefaults() *AppRoleWriteTokenNumUsesRequest
NewAppRoleWriteTokenNumUsesRequestWithDefaults instantiates a new AppRoleWriteTokenNumUsesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteTokenNumUsesRequest) MarshalJSON ¶
func (o AppRoleWriteTokenNumUsesRequest) MarshalJSON() ([]byte, error)
type AppRoleWriteTokenTTLRequest ¶
type AppRoleWriteTokenTTLRequest struct { // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` }
AppRoleWriteTokenTTLRequest struct for AppRoleWriteTokenTTLRequest
func NewAppRoleWriteTokenTTLRequestWithDefaults ¶
func NewAppRoleWriteTokenTTLRequestWithDefaults() *AppRoleWriteTokenTTLRequest
NewAppRoleWriteTokenTTLRequestWithDefaults instantiates a new AppRoleWriteTokenTTLRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AppRoleWriteTokenTTLRequest) MarshalJSON ¶
func (o AppRoleWriteTokenTTLRequest) MarshalJSON() ([]byte, error)
type AzureLoginRequest ¶
type AzureLoginRequest struct { // A signed JWT Jwt string `json:"jwt"` // The resource group from the instance. ResourceGroupName string `json:"resource_group_name"` // The token role. Role string `json:"role"` // The subscription id for the instance. SubscriptionId string `json:"subscription_id"` // The name of the virtual machine. This value is ignored if vmss_name is specified. VmName string `json:"vm_name"` // The name of the virtual machine scale set the instance is in. VmssName string `json:"vmss_name"` }
AzureLoginRequest struct for AzureLoginRequest
func NewAzureLoginRequestWithDefaults ¶
func NewAzureLoginRequestWithDefaults() *AzureLoginRequest
NewAzureLoginRequestWithDefaults instantiates a new AzureLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AzureLoginRequest) MarshalJSON ¶
func (o AzureLoginRequest) MarshalJSON() ([]byte, error)
type AzureWriteAuthConfigRequest ¶
type AzureWriteAuthConfigRequest struct { // The OAuth2 client id to connection to Azure. This value can also be provided with the AZURE_CLIENT_ID environment variable. ClientId string `json:"client_id"` // The OAuth2 client secret to connection to Azure. This value can also be provided with the AZURE_CLIENT_SECRET environment variable. ClientSecret string `json:"client_secret"` // The Azure environment name. If not provided, AzurePublicCloud is used. This value can also be provided with the AZURE_ENVIRONMENT environment variable. Environment string `json:"environment"` // The resource URL for the vault application in Azure Active Directory. This value can also be provided with the AZURE_AD_RESOURCE environment variable. Resource string `json:"resource"` // The tenant id for the Azure Active Directory. This is sometimes referred to as Directory ID in AD. This value can also be provided with the AZURE_TENANT_ID environment variable. TenantId string `json:"tenant_id"` }
AzureWriteAuthConfigRequest struct for AzureWriteAuthConfigRequest
func NewAzureWriteAuthConfigRequestWithDefaults ¶
func NewAzureWriteAuthConfigRequestWithDefaults() *AzureWriteAuthConfigRequest
NewAzureWriteAuthConfigRequestWithDefaults instantiates a new AzureWriteAuthConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AzureWriteAuthConfigRequest) MarshalJSON ¶
func (o AzureWriteAuthConfigRequest) MarshalJSON() ([]byte, error)
type AzureWriteAuthRoleRequest ¶
type AzureWriteAuthRoleRequest struct { // Comma-separated list of group ids that login is restricted to. BoundGroupIds []string `json:"bound_group_ids"` // Comma-separated list of locations that login is restricted to. BoundLocations []string `json:"bound_locations"` // Comma-separated list of resource groups that login is restricted to. BoundResourceGroups []string `json:"bound_resource_groups"` // Comma-separated list of scale sets that login is restricted to. BoundScaleSets []string `json:"bound_scale_sets"` // Comma-separated list of service principal ids that login is restricted to. BoundServicePrincipalIds []string `json:"bound_service_principal_ids"` // Comma-separated list of subscription ids that login is restricted to. BoundSubscriptionIds []string `json:"bound_subscription_ids"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Use \"token_num_uses\" instead. If this and \"token_num_uses\" are both specified, only \"token_num_uses\" will be used. // Deprecated NumUses int32 `json:"num_uses"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` }
AzureWriteAuthRoleRequest struct for AzureWriteAuthRoleRequest
func NewAzureWriteAuthRoleRequestWithDefaults ¶
func NewAzureWriteAuthRoleRequestWithDefaults() *AzureWriteAuthRoleRequest
NewAzureWriteAuthRoleRequestWithDefaults instantiates a new AzureWriteAuthRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AzureWriteAuthRoleRequest) MarshalJSON ¶
func (o AzureWriteAuthRoleRequest) MarshalJSON() ([]byte, error)
type AzureWriteConfigRequest ¶
type AzureWriteConfigRequest struct { // The OAuth2 client id to connect to Azure. This value can also be provided with the AZURE_CLIENT_ID environment variable. ClientId string `json:"client_id"` // The OAuth2 client secret to connect to Azure. This value can also be provided with the AZURE_CLIENT_SECRET environment variable. ClientSecret string `json:"client_secret"` // The Azure environment name. If not provided, AzurePublicCloud is used. This value can also be provided with the AZURE_ENVIRONMENT environment variable. Environment string `json:"environment"` // Name of the password policy to use to generate passwords for dynamic credentials. PasswordPolicy string `json:"password_policy"` // The TTL of the root password in Azure. This can be either a number of seconds or a time formatted duration (ex: 24h, 48ds) RootPasswordTtl int32 `json:"root_password_ttl"` // The subscription id for the Azure Active Directory. This value can also be provided with the AZURE_SUBSCRIPTION_ID environment variable. SubscriptionId string `json:"subscription_id"` // The tenant id for the Azure Active Directory. This value can also be provided with the AZURE_TENANT_ID environment variable. TenantId string `json:"tenant_id"` }
AzureWriteConfigRequest struct for AzureWriteConfigRequest
func NewAzureWriteConfigRequestWithDefaults ¶
func NewAzureWriteConfigRequestWithDefaults() *AzureWriteConfigRequest
NewAzureWriteConfigRequestWithDefaults instantiates a new AzureWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AzureWriteConfigRequest) MarshalJSON ¶
func (o AzureWriteConfigRequest) MarshalJSON() ([]byte, error)
type AzureWriteRoleRequest ¶
type AzureWriteRoleRequest struct { // Application Object ID to use for static service principal credentials. ApplicationObjectId string `json:"application_object_id"` // JSON list of Azure groups to add the service principal to. AzureGroups string `json:"azure_groups"` // JSON list of Azure roles to assign. AzureRoles string `json:"azure_roles"` // Maximum time a service principal. If not set or set to 0, will use system default. MaxTtl int32 `json:"max_ttl"` // Indicates whether new application objects should be permanently deleted. If not set, objects will not be permanently deleted. PermanentlyDelete bool `json:"permanently_delete"` // Default lease for generated credentials. If not set or set to 0, will use system default. Ttl int32 `json:"ttl"` }
AzureWriteRoleRequest struct for AzureWriteRoleRequest
func NewAzureWriteRoleRequestWithDefaults ¶
func NewAzureWriteRoleRequestWithDefaults() *AzureWriteRoleRequest
NewAzureWriteRoleRequestWithDefaults instantiates a new AzureWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (AzureWriteRoleRequest) MarshalJSON ¶
func (o AzureWriteRoleRequest) MarshalJSON() ([]byte, error)
type CalculateAuditHashRequest ¶
type CalculateAuditHashRequest struct {
Input string `json:"input"`
}
CalculateAuditHashRequest struct for CalculateAuditHashRequest
func NewCalculateAuditHashRequestWithDefaults ¶
func NewCalculateAuditHashRequestWithDefaults() *CalculateAuditHashRequest
NewCalculateAuditHashRequestWithDefaults instantiates a new CalculateAuditHashRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (CalculateAuditHashRequest) MarshalJSON ¶
func (o CalculateAuditHashRequest) MarshalJSON() ([]byte, error)
type CentrifyLoginRequest ¶
type CentrifyLoginRequest struct { // Auth mode ('ro' for resource owner, 'cc' for credential client). Mode string `json:"mode"` // Password for this user. Password string `json:"password"` // Username of the user. Username string `json:"username"` }
CentrifyLoginRequest struct for CentrifyLoginRequest
func NewCentrifyLoginRequestWithDefaults ¶
func NewCentrifyLoginRequestWithDefaults() *CentrifyLoginRequest
NewCentrifyLoginRequestWithDefaults instantiates a new CentrifyLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (CentrifyLoginRequest) MarshalJSON ¶
func (o CentrifyLoginRequest) MarshalJSON() ([]byte, error)
type CentrifyWriteConfigRequest ¶
type CentrifyWriteConfigRequest struct { // OAuth2 App ID AppId string `json:"app_id"` // OAuth2 Client ID ClientId string `json:"client_id"` // OAuth2 Client Secret ClientSecret string `json:"client_secret"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // OAuth2 App Scope Scope string `json:"scope"` // Service URL (https://<tenant>.my.centrify.com) ServiceUrl string `json:"service_url"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` }
CentrifyWriteConfigRequest struct for CentrifyWriteConfigRequest
func NewCentrifyWriteConfigRequestWithDefaults ¶
func NewCentrifyWriteConfigRequestWithDefaults() *CentrifyWriteConfigRequest
NewCentrifyWriteConfigRequestWithDefaults instantiates a new CentrifyWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (CentrifyWriteConfigRequest) MarshalJSON ¶
func (o CentrifyWriteConfigRequest) MarshalJSON() ([]byte, error)
type CertificatesLoginRequest ¶
type CertificatesLoginRequest struct { // The name of the certificate role to authenticate against. Name string `json:"name"` }
CertificatesLoginRequest struct for CertificatesLoginRequest
func NewCertificatesLoginRequestWithDefaults ¶
func NewCertificatesLoginRequestWithDefaults() *CertificatesLoginRequest
NewCertificatesLoginRequestWithDefaults instantiates a new CertificatesLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (CertificatesLoginRequest) MarshalJSON ¶
func (o CertificatesLoginRequest) MarshalJSON() ([]byte, error)
type CertificatesWriteCRLRequest ¶
type CertificatesWriteCRLRequest struct { // The public CRL that should be trusted to attest to certificates' validity statuses. May be DER or PEM encoded. Note: the expiration time is ignored; if the CRL is no longer valid, delete it using the same name as specified here. Crl string `json:"crl"` // The URL of a CRL distribution point. Only one of 'crl' or 'url' parameters should be specified. Url string `json:"url"` }
CertificatesWriteCRLRequest struct for CertificatesWriteCRLRequest
func NewCertificatesWriteCRLRequestWithDefaults ¶
func NewCertificatesWriteCRLRequestWithDefaults() *CertificatesWriteCRLRequest
NewCertificatesWriteCRLRequestWithDefaults instantiates a new CertificatesWriteCRLRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (CertificatesWriteCRLRequest) MarshalJSON ¶
func (o CertificatesWriteCRLRequest) MarshalJSON() ([]byte, error)
type CertificatesWriteConfigRequest ¶
type CertificatesWriteConfigRequest struct { // If set, during renewal, skips the matching of presented client identity with the client identity used during login. Defaults to false. DisableBinding bool `json:"disable_binding"` // If set, metadata of the certificate including the metadata corresponding to allowed_metadata_extensions will be stored in the alias. Defaults to false. EnableIdentityAliasMetadata bool `json:"enable_identity_alias_metadata"` // The size of the in memory OCSP response cache, shared by all configured certs OcspCacheSize int32 `json:"ocsp_cache_size"` }
CertificatesWriteConfigRequest struct for CertificatesWriteConfigRequest
func NewCertificatesWriteConfigRequestWithDefaults ¶
func NewCertificatesWriteConfigRequestWithDefaults() *CertificatesWriteConfigRequest
NewCertificatesWriteConfigRequestWithDefaults instantiates a new CertificatesWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (CertificatesWriteConfigRequest) MarshalJSON ¶
func (o CertificatesWriteConfigRequest) MarshalJSON() ([]byte, error)
type CertificatesWriteRequest ¶
type CertificatesWriteRequest struct { // A comma-separated list of names. At least one must exist in the Common Name. Supports globbing. AllowedCommonNames []string `json:"allowed_common_names"` // A comma-separated list of DNS names. At least one must exist in the SANs. Supports globbing. AllowedDnsSans []string `json:"allowed_dns_sans"` // A comma-separated list of Email Addresses. At least one must exist in the SANs. Supports globbing. AllowedEmailSans []string `json:"allowed_email_sans"` // A comma-separated string or array of oid extensions. Upon successful authentication, these extensions will be added as metadata if they are present in the certificate. The metadata key will be the string consisting of the oid numbers separated by a dash (-) instead of a dot (.) to allow usage in ACL templates. AllowedMetadataExtensions []string `json:"allowed_metadata_extensions"` // A comma-separated list of names. At least one must exist in either the Common Name or SANs. Supports globbing. This parameter is deprecated, please use allowed_common_names, allowed_dns_sans, allowed_email_sans, allowed_uri_sans. AllowedNames []string `json:"allowed_names"` // A comma-separated list of Organizational Units names. At least one must exist in the OU field. AllowedOrganizationalUnits []string `json:"allowed_organizational_units"` // A comma-separated list of URIs. At least one must exist in the SANs. Supports globbing. AllowedUriSans []string `json:"allowed_uri_sans"` // Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used. // Deprecated BoundCidrs []string `json:"bound_cidrs"` // The public certificate that should be trusted. Must be x509 PEM encoded. Certificate string `json:"certificate"` // The display name to use for clients using this certificate. DisplayName string `json:"display_name"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Lease int32 `json:"lease"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Any additional CA certificates needed to communicate with OCSP servers OcspCaCertificates string `json:"ocsp_ca_certificates"` // Whether to attempt OCSP verification of certificates at login OcspEnabled bool `json:"ocsp_enabled"` // If set to true, if an OCSP revocation cannot be made successfully, login will proceed rather than failing. If false, failing to get an OCSP status fails the request. OcspFailOpen bool `json:"ocsp_fail_open"` // If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. OcspQueryAllServers bool `json:"ocsp_query_all_servers"` // A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. OcspServersOverride []string `json:"ocsp_servers_override"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // A comma-separated string or array of extensions formatted as \"oid:value\". Expects the extension value to be some type of ASN1 encoded string. All values much match. Supports globbing on \"value\". RequiredExtensions []string `json:"required_extensions"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` }
CertificatesWriteRequest struct for CertificatesWriteRequest
func NewCertificatesWriteRequestWithDefaults ¶
func NewCertificatesWriteRequestWithDefaults() *CertificatesWriteRequest
NewCertificatesWriteRequestWithDefaults instantiates a new CertificatesWriteRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (CertificatesWriteRequest) MarshalJSON ¶
func (o CertificatesWriteRequest) MarshalJSON() ([]byte, error)
type CloudFoundryLoginRequest ¶
type CloudFoundryLoginRequest struct { // The full body of the file available at the CF_INSTANCE_CERT path on the CF instance. CfInstanceCert string `json:"cf_instance_cert"` // The name of the role to authenticate against. Role string `json:"role"` // The signature generated by the client certificate's private key. Signature string `json:"signature"` // The date and time used to construct the signature. SigningTime string `json:"signing_time"` }
CloudFoundryLoginRequest struct for CloudFoundryLoginRequest
func NewCloudFoundryLoginRequestWithDefaults ¶
func NewCloudFoundryLoginRequestWithDefaults() *CloudFoundryLoginRequest
NewCloudFoundryLoginRequestWithDefaults instantiates a new CloudFoundryLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (CloudFoundryLoginRequest) MarshalJSON ¶
func (o CloudFoundryLoginRequest) MarshalJSON() ([]byte, error)
type CloudFoundryWriteConfigRequest ¶
type CloudFoundryWriteConfigRequest struct { // CF’s API address. CfApiAddr string `json:"cf_api_addr"` // The PEM-format certificates that are presented for mutual TLS with the CloudFoundry API. If not set, mutual TLS is not used CfApiMutualTlsCertificate string `json:"cf_api_mutual_tls_certificate"` // The PEM-format private key that are used for mutual TLS with the CloudFoundry API. If not set, mutual TLS is not used CfApiMutualTlsKey string `json:"cf_api_mutual_tls_key"` // The PEM-format CA certificates that are acceptable for the CF API to present. CfApiTrustedCertificates []string `json:"cf_api_trusted_certificates"` // The client id for CF’s API. CfClientId string `json:"cf_client_id"` // The client secret for CF’s API. CfClientSecret string `json:"cf_client_secret"` // The password for CF’s API. CfPassword string `json:"cf_password"` // The username for CF’s API. CfUsername string `json:"cf_username"` // The PEM-format CA certificates that are required to have issued the instance certificates presented for logging in. IdentityCaCertificates []string `json:"identity_ca_certificates"` // Duration in seconds for the maximum acceptable length in the future a \"signing_time\" can be. Useful for clock drift. Set low to reduce the opportunity for replay attacks. LoginMaxSecondsNotAfter int32 `json:"login_max_seconds_not_after"` // Duration in seconds for the maximum acceptable age of a \"signing_time\". Useful for clock drift. Set low to reduce the opportunity for replay attacks. LoginMaxSecondsNotBefore int32 `json:"login_max_seconds_not_before"` // Deprecated. Please use \"cf_api_addr\". // Deprecated PcfApiAddr string `json:"pcf_api_addr"` // Deprecated. Please use \"cf_api_trusted_certificates\". // Deprecated PcfApiTrustedCertificates []string `json:"pcf_api_trusted_certificates"` // Deprecated. Please use \"cf_password\". // Deprecated PcfPassword string `json:"pcf_password"` // Deprecated. Please use \"cf_username\". // Deprecated PcfUsername string `json:"pcf_username"` }
CloudFoundryWriteConfigRequest struct for CloudFoundryWriteConfigRequest
func NewCloudFoundryWriteConfigRequestWithDefaults ¶
func NewCloudFoundryWriteConfigRequestWithDefaults() *CloudFoundryWriteConfigRequest
NewCloudFoundryWriteConfigRequestWithDefaults instantiates a new CloudFoundryWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (CloudFoundryWriteConfigRequest) MarshalJSON ¶
func (o CloudFoundryWriteConfigRequest) MarshalJSON() ([]byte, error)
type CloudFoundryWriteRoleRequest ¶
type CloudFoundryWriteRoleRequest struct { // Require that the client certificate presented has at least one of these app IDs. BoundApplicationIds []string `json:"bound_application_ids"` // Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used. // Deprecated BoundCidrs []string `json:"bound_cidrs"` // Require that the client certificate presented has at least one of these instance IDs. BoundInstanceIds []string `json:"bound_instance_ids"` // Require that the client certificate presented has at least one of these org IDs. BoundOrganizationIds []string `json:"bound_organization_ids"` // Require that the client certificate presented has at least one of these space IDs. BoundSpaceIds []string `json:"bound_space_ids"` // If set to true, disables the default behavior that logging in must be performed from an acceptable IP address described by the certificate presented. DisableIpMatching bool `json:"disable_ip_matching"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` }
CloudFoundryWriteRoleRequest struct for CloudFoundryWriteRoleRequest
func NewCloudFoundryWriteRoleRequestWithDefaults ¶
func NewCloudFoundryWriteRoleRequestWithDefaults() *CloudFoundryWriteRoleRequest
NewCloudFoundryWriteRoleRequestWithDefaults instantiates a new CloudFoundryWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (CloudFoundryWriteRoleRequest) MarshalJSON ¶
func (o CloudFoundryWriteRoleRequest) MarshalJSON() ([]byte, error)
type ConsulWriteAccessConfigRequest ¶
type ConsulWriteAccessConfigRequest struct { // Consul server address Address string `json:"address"` // CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. CaCert string `json:"ca_cert"` // Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. ClientCert string `json:"client_cert"` // Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. ClientKey string `json:"client_key"` // URI scheme for the Consul address Scheme string `json:"scheme"` // Token for API calls Token string `json:"token"` }
ConsulWriteAccessConfigRequest struct for ConsulWriteAccessConfigRequest
func NewConsulWriteAccessConfigRequestWithDefaults ¶
func NewConsulWriteAccessConfigRequestWithDefaults() *ConsulWriteAccessConfigRequest
NewConsulWriteAccessConfigRequestWithDefaults instantiates a new ConsulWriteAccessConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ConsulWriteAccessConfigRequest) MarshalJSON ¶
func (o ConsulWriteAccessConfigRequest) MarshalJSON() ([]byte, error)
type ConsulWriteRoleRequest ¶
type ConsulWriteRoleRequest struct { // Indicates which namespace that the token will be created within. Defaults to 'default'. Available in Consul 1.7 and above. ConsulNamespace string `json:"consul_namespace"` // List of policies to attach to the token. Either \"consul_policies\" or \"consul_roles\" are required for Consul 1.5 and above, or just \"consul_policies\" if using Consul 1.4. ConsulPolicies []string `json:"consul_policies"` // List of Consul roles to attach to the token. Either \"policies\" or \"consul_roles\" are required for Consul 1.5 and above. ConsulRoles []string `json:"consul_roles"` // Use \"ttl\" instead. // Deprecated Lease int32 `json:"lease"` // Indicates that the token should not be replicated globally and instead be local to the current datacenter. Available in Consul 1.4 and above. Local bool `json:"local"` // Max TTL for the Consul token created from the role. MaxTtl int32 `json:"max_ttl"` // List of Node Identities to attach to the token. Available in Consul 1.8.1 or above. NodeIdentities []string `json:"node_identities"` // Indicates which admin partition that the token will be created within. Defaults to 'default'. Available in Consul 1.11 and above. Partition string `json:"partition"` // Use \"consul_policies\" instead. // Deprecated Policies []string `json:"policies"` // Policy document, base64 encoded. Required for 'client' tokens. Required for Consul pre-1.4. // Deprecated Policy string `json:"policy"` // List of Service Identities to attach to the token, separated by semicolons. Available in Consul 1.5 or above. ServiceIdentities []string `json:"service_identities"` // Which type of token to create: 'client' or 'management'. If a 'management' token, the \"policy\", \"policies\", and \"consul_roles\" parameters are not required. Defaults to 'client'. // Deprecated TokenType string `json:"token_type"` // TTL for the Consul token created from the role. Ttl int32 `json:"ttl"` }
ConsulWriteRoleRequest struct for ConsulWriteRoleRequest
func NewConsulWriteRoleRequestWithDefaults ¶
func NewConsulWriteRoleRequestWithDefaults() *ConsulWriteRoleRequest
NewConsulWriteRoleRequestWithDefaults instantiates a new ConsulWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ConsulWriteRoleRequest) MarshalJSON ¶
func (o ConsulWriteRoleRequest) MarshalJSON() ([]byte, error)
type DatabaseWriteConfigRequest ¶
type DatabaseWriteConfigRequest struct { // Comma separated string or array of the role names allowed to get creds from this database connection. If empty no roles are allowed. If \"*\" all roles are allowed. AllowedRoles []string `json:"allowed_roles"` // Password policy to use when generating passwords. PasswordPolicy string `json:"password_policy"` // The name of a builtin or previously registered plugin known to vault. This endpoint will create an instance of that plugin type. PluginName string `json:"plugin_name"` // The version of the plugin to use. PluginVersion string `json:"plugin_version"` // Specifies the database statements to be executed to rotate the root user's credentials. See the plugin's API page for more information on support and formatting for this parameter. RootRotationStatements []string `json:"root_rotation_statements"` // If true, the connection details are verified by actually connecting to the database. Defaults to true. VerifyConnection bool `json:"verify_connection"` }
DatabaseWriteConfigRequest struct for DatabaseWriteConfigRequest
func NewDatabaseWriteConfigRequestWithDefaults ¶
func NewDatabaseWriteConfigRequestWithDefaults() *DatabaseWriteConfigRequest
NewDatabaseWriteConfigRequestWithDefaults instantiates a new DatabaseWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (DatabaseWriteConfigRequest) MarshalJSON ¶
func (o DatabaseWriteConfigRequest) MarshalJSON() ([]byte, error)
type DatabaseWriteRoleRequest ¶
type DatabaseWriteRoleRequest struct { // Specifies the database statements executed to create and configure a user. See the plugin's API page for more information on support and formatting for this parameter. CreationStatements []string `json:"creation_statements"` // The configuration for the given credential_type. CredentialConfig map[string]interface{} `json:"credential_config"` // The type of credential to manage. Options include: 'password', 'rsa_private_key'. Defaults to 'password'. CredentialType string `json:"credential_type"` // Name of the database this role acts on. DbName string `json:"db_name"` // Default ttl for role. DefaultTtl int32 `json:"default_ttl"` // Maximum time a credential is valid for MaxTtl int32 `json:"max_ttl"` // Specifies the database statements to be executed to renew a user. Not every plugin type will support this functionality. See the plugin's API page for more information on support and formatting for this parameter. RenewStatements []string `json:"renew_statements"` // Specifies the database statements to be executed to revoke a user. See the plugin's API page for more information on support and formatting for this parameter. RevocationStatements []string `json:"revocation_statements"` // Specifies the database statements to be executed rollback a create operation in the event of an error. Not every plugin type will support this functionality. See the plugin's API page for more information on support and formatting for this parameter. RollbackStatements []string `json:"rollback_statements"` }
DatabaseWriteRoleRequest struct for DatabaseWriteRoleRequest
func NewDatabaseWriteRoleRequestWithDefaults ¶
func NewDatabaseWriteRoleRequestWithDefaults() *DatabaseWriteRoleRequest
NewDatabaseWriteRoleRequestWithDefaults instantiates a new DatabaseWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (DatabaseWriteRoleRequest) MarshalJSON ¶
func (o DatabaseWriteRoleRequest) MarshalJSON() ([]byte, error)
type DatabaseWriteStaticRoleRequest ¶
type DatabaseWriteStaticRoleRequest struct { // The configuration for the given credential_type. CredentialConfig map[string]interface{} `json:"credential_config"` // The type of credential to manage. Options include: 'password', 'rsa_private_key'. Defaults to 'password'. CredentialType string `json:"credential_type"` // Name of the database this role acts on. DbName string `json:"db_name"` // Period for automatic credential rotation of the given username. Not valid unless used with \"username\". RotationPeriod int32 `json:"rotation_period"` // Specifies the database statements to be executed to rotate the accounts credentials. Not every plugin type will support this functionality. See the plugin's API page for more information on support and formatting for this parameter. RotationStatements []string `json:"rotation_statements"` // Name of the static user account for Vault to manage. Requires \"rotation_period\" to be specified Username string `json:"username"` }
DatabaseWriteStaticRoleRequest struct for DatabaseWriteStaticRoleRequest
func NewDatabaseWriteStaticRoleRequestWithDefaults ¶
func NewDatabaseWriteStaticRoleRequestWithDefaults() *DatabaseWriteStaticRoleRequest
NewDatabaseWriteStaticRoleRequestWithDefaults instantiates a new DatabaseWriteStaticRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (DatabaseWriteStaticRoleRequest) MarshalJSON ¶
func (o DatabaseWriteStaticRoleRequest) MarshalJSON() ([]byte, error)
type EntityBatchDeleteRequest ¶
type EntityBatchDeleteRequest struct { // Entity IDs to delete EntityIds []string `json:"entity_ids"` }
EntityBatchDeleteRequest struct for EntityBatchDeleteRequest
func NewEntityBatchDeleteRequestWithDefaults ¶
func NewEntityBatchDeleteRequestWithDefaults() *EntityBatchDeleteRequest
NewEntityBatchDeleteRequestWithDefaults instantiates a new EntityBatchDeleteRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (EntityBatchDeleteRequest) MarshalJSON ¶
func (o EntityBatchDeleteRequest) MarshalJSON() ([]byte, error)
type EntityLookupRequest ¶
type EntityLookupRequest struct { // ID of the alias. AliasId string `json:"alias_id"` // Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with 'alias_name'. AliasMountAccessor string `json:"alias_mount_accessor"` // Name of the alias. This should be supplied in conjunction with 'alias_mount_accessor'. AliasName string `json:"alias_name"` // ID of the entity. Id string `json:"id"` // Name of the entity. Name string `json:"name"` }
EntityLookupRequest struct for EntityLookupRequest
func NewEntityLookupRequestWithDefaults ¶
func NewEntityLookupRequestWithDefaults() *EntityLookupRequest
NewEntityLookupRequestWithDefaults instantiates a new EntityLookupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (EntityLookupRequest) MarshalJSON ¶
func (o EntityLookupRequest) MarshalJSON() ([]byte, error)
type EntityMergeRequest ¶
type EntityMergeRequest struct { // Alias IDs to keep in case of conflicting aliases. Ignored if no conflicting aliases found ConflictingAliasIdsToKeep []string `json:"conflicting_alias_ids_to_keep"` // Setting this will follow the 'mine' strategy for merging MFA secrets. If there are secrets of the same type both in entities that are merged from and in entity into which all others are getting merged, secrets in the destination will be unaltered. If not set, this API will throw an error containing all the conflicts. Force bool `json:"force"` // Entity IDs which need to get merged FromEntityIds []string `json:"from_entity_ids"` // Entity ID into which all the other entities need to get merged ToEntityId string `json:"to_entity_id"` }
EntityMergeRequest struct for EntityMergeRequest
func NewEntityMergeRequestWithDefaults ¶
func NewEntityMergeRequestWithDefaults() *EntityMergeRequest
NewEntityMergeRequestWithDefaults instantiates a new EntityMergeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (EntityMergeRequest) MarshalJSON ¶
func (o EntityMergeRequest) MarshalJSON() ([]byte, error)
type EntityWriteAliasByIDRequest ¶
type EntityWriteAliasByIDRequest struct { // Entity ID to which this alias should be tied to CanonicalId string `json:"canonical_id"` // User provided key-value pairs CustomMetadata map[string]interface{} `json:"custom_metadata"` // Entity ID to which this alias belongs to. This field is deprecated, use canonical_id. EntityId string `json:"entity_id"` // (Unused) MountAccessor string `json:"mount_accessor"` // (Unused) Name string `json:"name"` }
EntityWriteAliasByIDRequest struct for EntityWriteAliasByIDRequest
func NewEntityWriteAliasByIDRequestWithDefaults ¶
func NewEntityWriteAliasByIDRequestWithDefaults() *EntityWriteAliasByIDRequest
NewEntityWriteAliasByIDRequestWithDefaults instantiates a new EntityWriteAliasByIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (EntityWriteAliasByIDRequest) MarshalJSON ¶
func (o EntityWriteAliasByIDRequest) MarshalJSON() ([]byte, error)
type EntityWriteAliasRequest ¶
type EntityWriteAliasRequest struct { // Entity ID to which this alias belongs CanonicalId string `json:"canonical_id"` // User provided key-value pairs CustomMetadata map[string]interface{} `json:"custom_metadata"` // Entity ID to which this alias belongs. This field is deprecated, use canonical_id. EntityId string `json:"entity_id"` // ID of the entity alias. If set, updates the corresponding entity alias. Id string `json:"id"` // Mount accessor to which this alias belongs to; unused for a modify MountAccessor string `json:"mount_accessor"` // Name of the alias; unused for a modify Name string `json:"name"` }
EntityWriteAliasRequest struct for EntityWriteAliasRequest
func NewEntityWriteAliasRequestWithDefaults ¶
func NewEntityWriteAliasRequestWithDefaults() *EntityWriteAliasRequest
NewEntityWriteAliasRequestWithDefaults instantiates a new EntityWriteAliasRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (EntityWriteAliasRequest) MarshalJSON ¶
func (o EntityWriteAliasRequest) MarshalJSON() ([]byte, error)
type EntityWriteByIDRequest ¶
type EntityWriteByIDRequest struct { // If set true, tokens tied to this identity will not be able to be used (but will not be revoked). Disabled bool `json:"disabled"` // Metadata to be associated with the entity. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault <command> <path> metadata=key1=value1 metadata=key2=value2 Metadata map[string]interface{} `json:"metadata"` // Name of the entity Name string `json:"name"` // Policies to be tied to the entity. Policies []string `json:"policies"` }
EntityWriteByIDRequest struct for EntityWriteByIDRequest
func NewEntityWriteByIDRequestWithDefaults ¶
func NewEntityWriteByIDRequestWithDefaults() *EntityWriteByIDRequest
NewEntityWriteByIDRequestWithDefaults instantiates a new EntityWriteByIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (EntityWriteByIDRequest) MarshalJSON ¶
func (o EntityWriteByIDRequest) MarshalJSON() ([]byte, error)
type EntityWriteByNameRequest ¶
type EntityWriteByNameRequest struct { // If set true, tokens tied to this identity will not be able to be used (but will not be revoked). Disabled bool `json:"disabled"` // ID of the entity. If set, updates the corresponding existing entity. Id string `json:"id"` // Metadata to be associated with the entity. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault <command> <path> metadata=key1=value1 metadata=key2=value2 Metadata map[string]interface{} `json:"metadata"` // Policies to be tied to the entity. Policies []string `json:"policies"` }
EntityWriteByNameRequest struct for EntityWriteByNameRequest
func NewEntityWriteByNameRequestWithDefaults ¶
func NewEntityWriteByNameRequestWithDefaults() *EntityWriteByNameRequest
NewEntityWriteByNameRequestWithDefaults instantiates a new EntityWriteByNameRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (EntityWriteByNameRequest) MarshalJSON ¶
func (o EntityWriteByNameRequest) MarshalJSON() ([]byte, error)
type EntityWriteRequest ¶
type EntityWriteRequest struct { // If set true, tokens tied to this identity will not be able to be used (but will not be revoked). Disabled bool `json:"disabled"` // ID of the entity. If set, updates the corresponding existing entity. Id string `json:"id"` // Metadata to be associated with the entity. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault <command> <path> metadata=key1=value1 metadata=key2=value2 Metadata map[string]interface{} `json:"metadata"` // Name of the entity Name string `json:"name"` // Policies to be tied to the entity. Policies []string `json:"policies"` }
EntityWriteRequest struct for EntityWriteRequest
func NewEntityWriteRequestWithDefaults ¶
func NewEntityWriteRequestWithDefaults() *EntityWriteRequest
NewEntityWriteRequestWithDefaults instantiates a new EntityWriteRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (EntityWriteRequest) MarshalJSON ¶
func (o EntityWriteRequest) MarshalJSON() ([]byte, error)
type GitHubLoginRequest ¶
type GitHubLoginRequest struct { // GitHub personal API token Token string `json:"token"` }
GitHubLoginRequest struct for GitHubLoginRequest
func NewGitHubLoginRequestWithDefaults ¶
func NewGitHubLoginRequestWithDefaults() *GitHubLoginRequest
NewGitHubLoginRequestWithDefaults instantiates a new GitHubLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GitHubLoginRequest) MarshalJSON ¶
func (o GitHubLoginRequest) MarshalJSON() ([]byte, error)
type GitHubWriteConfigRequest ¶
type GitHubWriteConfigRequest struct { // The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. BaseUrl string `json:"base_url"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // The organization users must be part of Organization string `json:"organization"` // The ID of the organization users must be part of OrganizationId int64 `json:"organization_id"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies. This will apply to all tokens generated by this auth method, in addition to any policies configured for specific users/groups. TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` }
GitHubWriteConfigRequest struct for GitHubWriteConfigRequest
func NewGitHubWriteConfigRequestWithDefaults ¶
func NewGitHubWriteConfigRequestWithDefaults() *GitHubWriteConfigRequest
NewGitHubWriteConfigRequestWithDefaults instantiates a new GitHubWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GitHubWriteConfigRequest) MarshalJSON ¶
func (o GitHubWriteConfigRequest) MarshalJSON() ([]byte, error)
type GitHubWriteMapTeamRequest ¶
type GitHubWriteMapTeamRequest struct { // Value for teams mapping Value string `json:"value"` }
GitHubWriteMapTeamRequest struct for GitHubWriteMapTeamRequest
func NewGitHubWriteMapTeamRequestWithDefaults ¶
func NewGitHubWriteMapTeamRequestWithDefaults() *GitHubWriteMapTeamRequest
NewGitHubWriteMapTeamRequestWithDefaults instantiates a new GitHubWriteMapTeamRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GitHubWriteMapTeamRequest) MarshalJSON ¶
func (o GitHubWriteMapTeamRequest) MarshalJSON() ([]byte, error)
type GitHubWriteMapUserRequest ¶
type GitHubWriteMapUserRequest struct { // Value for users mapping Value string `json:"value"` }
GitHubWriteMapUserRequest struct for GitHubWriteMapUserRequest
func NewGitHubWriteMapUserRequestWithDefaults ¶
func NewGitHubWriteMapUserRequestWithDefaults() *GitHubWriteMapUserRequest
NewGitHubWriteMapUserRequestWithDefaults instantiates a new GitHubWriteMapUserRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GitHubWriteMapUserRequest) MarshalJSON ¶
func (o GitHubWriteMapUserRequest) MarshalJSON() ([]byte, error)
type GoogleCloudKMSDecryptRequest ¶
type GoogleCloudKMSDecryptRequest struct { // Optional data that was specified during encryption of this payload. AdditionalAuthenticatedData string `json:"additional_authenticated_data"` // Ciphertext to decrypt as previously returned from an encrypt operation. This must be base64-encoded ciphertext as previously returned from an encrypt operation. Ciphertext string `json:"ciphertext"` // Integer version of the crypto key version to use for decryption. This is required for asymmetric keys. For symmetric keys, Cloud KMS will choose the correct version automatically. KeyVersion int32 `json:"key_version"` }
GoogleCloudKMSDecryptRequest struct for GoogleCloudKMSDecryptRequest
func NewGoogleCloudKMSDecryptRequestWithDefaults ¶
func NewGoogleCloudKMSDecryptRequestWithDefaults() *GoogleCloudKMSDecryptRequest
NewGoogleCloudKMSDecryptRequestWithDefaults instantiates a new GoogleCloudKMSDecryptRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudKMSDecryptRequest) MarshalJSON ¶
func (o GoogleCloudKMSDecryptRequest) MarshalJSON() ([]byte, error)
type GoogleCloudKMSEncryptRequest ¶
type GoogleCloudKMSEncryptRequest struct { // Optional base64-encoded data that, if specified, must also be provided to decrypt this payload. AdditionalAuthenticatedData string `json:"additional_authenticated_data"` // Integer version of the crypto key version to use for encryption. If unspecified, this defaults to the latest active crypto key version. KeyVersion int32 `json:"key_version"` // Plaintext value to be encrypted. This can be a string or binary, but the size is limited. See the Google Cloud KMS documentation for information on size limitations by key types. Plaintext string `json:"plaintext"` }
GoogleCloudKMSEncryptRequest struct for GoogleCloudKMSEncryptRequest
func NewGoogleCloudKMSEncryptRequestWithDefaults ¶
func NewGoogleCloudKMSEncryptRequestWithDefaults() *GoogleCloudKMSEncryptRequest
NewGoogleCloudKMSEncryptRequestWithDefaults instantiates a new GoogleCloudKMSEncryptRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudKMSEncryptRequest) MarshalJSON ¶
func (o GoogleCloudKMSEncryptRequest) MarshalJSON() ([]byte, error)
type GoogleCloudKMSReencryptRequest ¶
type GoogleCloudKMSReencryptRequest struct { // Optional data that, if specified, must also be provided during decryption. AdditionalAuthenticatedData string `json:"additional_authenticated_data"` // Ciphertext to be re-encrypted to the latest key version. This must be ciphertext that Vault previously generated for this named key. Ciphertext string `json:"ciphertext"` // Integer version of the crypto key version to use for the new encryption. If unspecified, this defaults to the latest active crypto key version. KeyVersion int32 `json:"key_version"` }
GoogleCloudKMSReencryptRequest struct for GoogleCloudKMSReencryptRequest
func NewGoogleCloudKMSReencryptRequestWithDefaults ¶
func NewGoogleCloudKMSReencryptRequestWithDefaults() *GoogleCloudKMSReencryptRequest
NewGoogleCloudKMSReencryptRequestWithDefaults instantiates a new GoogleCloudKMSReencryptRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudKMSReencryptRequest) MarshalJSON ¶
func (o GoogleCloudKMSReencryptRequest) MarshalJSON() ([]byte, error)
type GoogleCloudKMSRegisterKeyRequest ¶
type GoogleCloudKMSRegisterKeyRequest struct { // Full resource ID of the crypto key including the project, location, key ring, and crypto key like \"projects/%s/locations/%s/keyRings/%s/cryptoKeys/%s\". This crypto key must already exist in Google Cloud KMS unless verify is set to \"false\". CryptoKey string `json:"crypto_key"` // Verify that the given Google Cloud KMS crypto key exists and is accessible before creating the storage entry in Vault. Set this to \"false\" if the key will not exist at creation time. Verify bool `json:"verify"` }
GoogleCloudKMSRegisterKeyRequest struct for GoogleCloudKMSRegisterKeyRequest
func NewGoogleCloudKMSRegisterKeyRequestWithDefaults ¶
func NewGoogleCloudKMSRegisterKeyRequestWithDefaults() *GoogleCloudKMSRegisterKeyRequest
NewGoogleCloudKMSRegisterKeyRequestWithDefaults instantiates a new GoogleCloudKMSRegisterKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudKMSRegisterKeyRequest) MarshalJSON ¶
func (o GoogleCloudKMSRegisterKeyRequest) MarshalJSON() ([]byte, error)
type GoogleCloudKMSSignRequest ¶
type GoogleCloudKMSSignRequest struct { // Digest to sign. This digest must use the same SHA algorithm as the underlying Cloud KMS key. The digest must be the base64-encoded binary value. This field is required. Digest string `json:"digest"` // Integer version of the crypto key version to use for signing. This field is required. KeyVersion int32 `json:"key_version"` }
GoogleCloudKMSSignRequest struct for GoogleCloudKMSSignRequest
func NewGoogleCloudKMSSignRequestWithDefaults ¶
func NewGoogleCloudKMSSignRequestWithDefaults() *GoogleCloudKMSSignRequest
NewGoogleCloudKMSSignRequestWithDefaults instantiates a new GoogleCloudKMSSignRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudKMSSignRequest) MarshalJSON ¶
func (o GoogleCloudKMSSignRequest) MarshalJSON() ([]byte, error)
type GoogleCloudKMSVerifyRequest ¶
type GoogleCloudKMSVerifyRequest struct { // Digest to verify. This digest must use the same SHA algorithm as the underlying Cloud KMS key. The digest must be the base64-encoded binary value. This field is required. Digest string `json:"digest"` // Integer version of the crypto key version to use for verification. This field is required. KeyVersion int32 `json:"key_version"` // Base64-encoded signature to use for verification. This field is required. Signature string `json:"signature"` }
GoogleCloudKMSVerifyRequest struct for GoogleCloudKMSVerifyRequest
func NewGoogleCloudKMSVerifyRequestWithDefaults ¶
func NewGoogleCloudKMSVerifyRequestWithDefaults() *GoogleCloudKMSVerifyRequest
NewGoogleCloudKMSVerifyRequestWithDefaults instantiates a new GoogleCloudKMSVerifyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudKMSVerifyRequest) MarshalJSON ¶
func (o GoogleCloudKMSVerifyRequest) MarshalJSON() ([]byte, error)
type GoogleCloudKMSWriteConfigRequest ¶
type GoogleCloudKMSWriteConfigRequest struct { // The credentials to use for authenticating to Google Cloud. Leave this blank to use the Default Application Credentials or instance metadata authentication. Credentials string `json:"credentials"` // The list of full-URL scopes to request when authenticating. By default, this requests https://www.googleapis.com/auth/cloudkms. Scopes []string `json:"scopes"` }
GoogleCloudKMSWriteConfigRequest struct for GoogleCloudKMSWriteConfigRequest
func NewGoogleCloudKMSWriteConfigRequestWithDefaults ¶
func NewGoogleCloudKMSWriteConfigRequestWithDefaults() *GoogleCloudKMSWriteConfigRequest
NewGoogleCloudKMSWriteConfigRequestWithDefaults instantiates a new GoogleCloudKMSWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudKMSWriteConfigRequest) MarshalJSON ¶
func (o GoogleCloudKMSWriteConfigRequest) MarshalJSON() ([]byte, error)
type GoogleCloudKMSWriteKeyConfigRequest ¶
type GoogleCloudKMSWriteKeyConfigRequest struct { // Maximum allowed crypto key version. If set to a positive value, key versions greater than the given value are not permitted to be used. If set to 0 or a negative value, there is no maximum key version. MaxVersion int32 `json:"max_version"` // Minimum allowed crypto key version. If set to a positive value, key versions less than the given value are not permitted to be used. If set to 0 or a negative value, there is no minimum key version. This value only affects encryption/re-encryption, not decryption. To restrict old values from being decrypted, increase this value and then perform a trim operation. MinVersion int32 `json:"min_version"` }
GoogleCloudKMSWriteKeyConfigRequest struct for GoogleCloudKMSWriteKeyConfigRequest
func NewGoogleCloudKMSWriteKeyConfigRequestWithDefaults ¶
func NewGoogleCloudKMSWriteKeyConfigRequestWithDefaults() *GoogleCloudKMSWriteKeyConfigRequest
NewGoogleCloudKMSWriteKeyConfigRequestWithDefaults instantiates a new GoogleCloudKMSWriteKeyConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudKMSWriteKeyConfigRequest) MarshalJSON ¶
func (o GoogleCloudKMSWriteKeyConfigRequest) MarshalJSON() ([]byte, error)
type GoogleCloudKMSWriteKeyRequest ¶
type GoogleCloudKMSWriteKeyRequest struct { // Algorithm to use for encryption, decryption, or signing. The value depends on the key purpose. The value cannot be changed after creation. For a key purpose of \"encrypt_decrypt\", the valid values are: - symmetric_encryption (default) For a key purpose of \"asymmetric_sign\", valid values are: - rsa_sign_pss_2048_sha256 - rsa_sign_pss_3072_sha256 - rsa_sign_pss_4096_sha256 - rsa_sign_pkcs1_2048_sha256 - rsa_sign_pkcs1_3072_sha256 - rsa_sign_pkcs1_4096_sha256 - ec_sign_p256_sha256 - ec_sign_p384_sha384 For a key purpose of \"asymmetric_decrypt\", valid values are: - rsa_decrypt_oaep_2048_sha256 - rsa_decrypt_oaep_3072_sha256 - rsa_decrypt_oaep_4096_sha256 Algorithm string `json:"algorithm"` // Name of the crypto key to use. If the given crypto key does not exist, Vault will try to create it. This defaults to the name of the key given to Vault as the parameter if unspecified. CryptoKey string `json:"crypto_key"` // Full Google Cloud resource ID of the key ring with the project and location (e.g. projects/my-project/locations/global/keyRings/my-keyring). If the given key ring does not exist, Vault will try to create it during a create operation. KeyRing string `json:"key_ring"` // Arbitrary key=value label to apply to the crypto key. To specify multiple labels, specify this argument multiple times (e.g. labels=\"a=b\" labels=\"c=d\"). Labels map[string]interface{} `json:"labels"` // Level of protection to use for the key management. Valid values are \"software\" and \"hsm\". The default value is \"software\". The value cannot be changed after creation. ProtectionLevel string `json:"protection_level"` // Purpose of the key. Valid options are \"asymmetric_decrypt\", \"asymmetric_sign\", and \"encrypt_decrypt\". The default value is \"encrypt_decrypt\". The value cannot be changed after creation. Purpose string `json:"purpose"` // Amount of time between crypto key version rotations. This is specified as a time duration value like 72h (72 hours). The smallest possible value is 24h. This value only applies to keys with a purpose of \"encrypt_decrypt\". RotationPeriod int32 `json:"rotation_period"` }
GoogleCloudKMSWriteKeyRequest struct for GoogleCloudKMSWriteKeyRequest
func NewGoogleCloudKMSWriteKeyRequestWithDefaults ¶
func NewGoogleCloudKMSWriteKeyRequestWithDefaults() *GoogleCloudKMSWriteKeyRequest
NewGoogleCloudKMSWriteKeyRequestWithDefaults instantiates a new GoogleCloudKMSWriteKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudKMSWriteKeyRequest) MarshalJSON ¶
func (o GoogleCloudKMSWriteKeyRequest) MarshalJSON() ([]byte, error)
type GoogleCloudLoginRequest ¶
type GoogleCloudLoginRequest struct { // A signed JWT. This is either a self-signed service account JWT ('iam' roles only) or a GCE identity metadata token ('iam', 'gce' roles). Jwt string `json:"jwt"` // Name of the role against which the login is being attempted. Required. Role string `json:"role"` }
GoogleCloudLoginRequest struct for GoogleCloudLoginRequest
func NewGoogleCloudLoginRequestWithDefaults ¶
func NewGoogleCloudLoginRequestWithDefaults() *GoogleCloudLoginRequest
NewGoogleCloudLoginRequestWithDefaults instantiates a new GoogleCloudLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudLoginRequest) MarshalJSON ¶
func (o GoogleCloudLoginRequest) MarshalJSON() ([]byte, error)
type GoogleCloudWriteAuthConfigRequest ¶
type GoogleCloudWriteAuthConfigRequest struct { // Google credentials JSON that Vault will use to verify users against GCP APIs. If not specified, will use application default credentials Credentials string `json:"credentials"` // Specifies overrides for various Google API Service Endpoints used in requests. CustomEndpoint map[string]interface{} `json:"custom_endpoint"` // Indicates what value to use when generating an alias for GCE authentications. GceAlias string `json:"gce_alias"` // The metadata to include on the aliases and audit logs generated by this plugin. When set to 'default', includes: instance_creation_timestamp, instance_id, instance_name, project_id, project_number, role, service_account_id, service_account_email, zone. Not editing this field means the 'default' fields are included. Explicitly setting this field to empty overrides the 'default' and means no metadata will be included. If not using 'default', explicit fields must be sent like: 'field1,field2'. GceMetadata []string `json:"gce_metadata"` // Deprecated. This field does nothing and be removed in a future release // Deprecated GoogleCertsEndpoint string `json:"google_certs_endpoint"` // Indicates what value to use when generating an alias for IAM authentications. IamAlias string `json:"iam_alias"` // The metadata to include on the aliases and audit logs generated by this plugin. When set to 'default', includes: project_id, role, service_account_id, service_account_email. Not editing this field means the 'default' fields are included. Explicitly setting this field to empty overrides the 'default' and means no metadata will be included. If not using 'default', explicit fields must be sent like: 'field1,field2'. IamMetadata []string `json:"iam_metadata"` }
GoogleCloudWriteAuthConfigRequest struct for GoogleCloudWriteAuthConfigRequest
func NewGoogleCloudWriteAuthConfigRequestWithDefaults ¶
func NewGoogleCloudWriteAuthConfigRequestWithDefaults() *GoogleCloudWriteAuthConfigRequest
NewGoogleCloudWriteAuthConfigRequestWithDefaults instantiates a new GoogleCloudWriteAuthConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudWriteAuthConfigRequest) MarshalJSON ¶
func (o GoogleCloudWriteAuthConfigRequest) MarshalJSON() ([]byte, error)
type GoogleCloudWriteConfigRequest ¶
type GoogleCloudWriteConfigRequest struct { // GCP IAM service account credentials JSON with permissions to create new service accounts and set IAM policies Credentials string `json:"credentials"` // Maximum time a service account key is valid for. If <= 0, will use system default. MaxTtl int32 `json:"max_ttl"` // Default lease for generated keys. If <= 0, will use system default. Ttl int32 `json:"ttl"` }
GoogleCloudWriteConfigRequest struct for GoogleCloudWriteConfigRequest
func NewGoogleCloudWriteConfigRequestWithDefaults ¶
func NewGoogleCloudWriteConfigRequestWithDefaults() *GoogleCloudWriteConfigRequest
NewGoogleCloudWriteConfigRequestWithDefaults instantiates a new GoogleCloudWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudWriteConfigRequest) MarshalJSON ¶
func (o GoogleCloudWriteConfigRequest) MarshalJSON() ([]byte, error)
type GoogleCloudWriteKeyRequest ¶
type GoogleCloudWriteKeyRequest struct { // Private key algorithm for service account key - defaults to KEY_ALG_RSA_2048\" KeyAlgorithm string `json:"key_algorithm"` // Private key type for service account key - defaults to TYPE_GOOGLE_CREDENTIALS_FILE\" KeyType string `json:"key_type"` // Lifetime of the service account key Ttl int32 `json:"ttl"` }
GoogleCloudWriteKeyRequest struct for GoogleCloudWriteKeyRequest
func NewGoogleCloudWriteKeyRequestWithDefaults ¶
func NewGoogleCloudWriteKeyRequestWithDefaults() *GoogleCloudWriteKeyRequest
NewGoogleCloudWriteKeyRequestWithDefaults instantiates a new GoogleCloudWriteKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudWriteKeyRequest) MarshalJSON ¶
func (o GoogleCloudWriteKeyRequest) MarshalJSON() ([]byte, error)
type GoogleCloudWriteRoleLabelsRequest ¶
type GoogleCloudWriteRoleLabelsRequest struct { // BoundLabels to add (in $key:$value) Add []string `json:"add"` // Label key values to remove Remove []string `json:"remove"` }
GoogleCloudWriteRoleLabelsRequest struct for GoogleCloudWriteRoleLabelsRequest
func NewGoogleCloudWriteRoleLabelsRequestWithDefaults ¶
func NewGoogleCloudWriteRoleLabelsRequestWithDefaults() *GoogleCloudWriteRoleLabelsRequest
NewGoogleCloudWriteRoleLabelsRequestWithDefaults instantiates a new GoogleCloudWriteRoleLabelsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudWriteRoleLabelsRequest) MarshalJSON ¶
func (o GoogleCloudWriteRoleLabelsRequest) MarshalJSON() ([]byte, error)
type GoogleCloudWriteRoleRequest ¶
type GoogleCloudWriteRoleRequest struct { // If true, will add group aliases to auth tokens generated under this role. This will add the full list of ancestors (projects, folders, organizations) for the given entity's project. Requires IAM permission `resourcemanager.projects.get` on this project. AddGroupAliases bool `json:"add_group_aliases"` // 'iam' roles only. If false, Vault will not not allow GCE instances to login in against this role AllowGceInference bool `json:"allow_gce_inference"` // Deprecated: use \"bound_instance_groups\" instead. BoundInstanceGroup string `json:"bound_instance_group"` // Comma-separated list of permitted instance groups to which the GCE instance must belong. This option only applies to \"gce\" roles. BoundInstanceGroups []string `json:"bound_instance_groups"` // Comma-separated list of GCP labels formatted as\"key:value\" strings that must be present on the GCE instance in order to authenticate. This option only applies to \"gce\" roles. BoundLabels []string `json:"bound_labels"` // GCP Projects that authenticating entities must belong to. BoundProjects []string `json:"bound_projects"` // Deprecated: use \"bound_regions\" instead. BoundRegion string `json:"bound_region"` // Comma-separated list of permitted regions to which the GCE instance must belong. If a group is provided, it is assumed to be a regional group. If \"zone\" is provided, this option is ignored. This can be a self-link or region name. This option only applies to \"gce\" roles. BoundRegions []string `json:"bound_regions"` // Can be set for both 'iam' and 'gce' roles (required for 'iam'). A comma-seperated list of authorized service accounts. If the single value \"*\" is given, this is assumed to be all service accounts under the role's project. If this is set on a GCE role, the inferred service account from the instance metadata token will be used. BoundServiceAccounts []string `json:"bound_service_accounts"` // Deprecated: use \"bound_zones\" instead. BoundZone string `json:"bound_zone"` // Comma-separated list of permitted zones to which the GCE instance must belong. If a group is provided, it is assumed to be a zonal group. This can be a self-link or zone name. This option only applies to \"gce\" roles. BoundZones []string `json:"bound_zones"` // Currently enabled for 'iam' only. Duration in seconds from time of validation that a JWT must expire within. MaxJwtExp int32 `json:"max_jwt_exp"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Deprecated: use \"bound_projects\" instead ProjectId string `json:"project_id"` // Deprecated: use \"bound_service_accounts\" instead. ServiceAccounts []string `json:"service_accounts"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` // Type of the role. Currently supported: iam, gce Type string `json:"type"` }
GoogleCloudWriteRoleRequest struct for GoogleCloudWriteRoleRequest
func NewGoogleCloudWriteRoleRequestWithDefaults ¶
func NewGoogleCloudWriteRoleRequestWithDefaults() *GoogleCloudWriteRoleRequest
NewGoogleCloudWriteRoleRequestWithDefaults instantiates a new GoogleCloudWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudWriteRoleRequest) MarshalJSON ¶
func (o GoogleCloudWriteRoleRequest) MarshalJSON() ([]byte, error)
type GoogleCloudWriteRoleServiceAccountsRequest ¶
type GoogleCloudWriteRoleServiceAccountsRequest struct { // Service-account emails or IDs to add. Add []string `json:"add"` // Service-account emails or IDs to remove. Remove []string `json:"remove"` }
GoogleCloudWriteRoleServiceAccountsRequest struct for GoogleCloudWriteRoleServiceAccountsRequest
func NewGoogleCloudWriteRoleServiceAccountsRequestWithDefaults ¶
func NewGoogleCloudWriteRoleServiceAccountsRequestWithDefaults() *GoogleCloudWriteRoleServiceAccountsRequest
NewGoogleCloudWriteRoleServiceAccountsRequestWithDefaults instantiates a new GoogleCloudWriteRoleServiceAccountsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudWriteRoleServiceAccountsRequest) MarshalJSON ¶
func (o GoogleCloudWriteRoleServiceAccountsRequest) MarshalJSON() ([]byte, error)
type GoogleCloudWriteRolesetKeyRequest ¶
type GoogleCloudWriteRolesetKeyRequest struct { // Private key algorithm for service account key - defaults to KEY_ALG_RSA_2048\" KeyAlgorithm string `json:"key_algorithm"` // Private key type for service account key - defaults to TYPE_GOOGLE_CREDENTIALS_FILE\" KeyType string `json:"key_type"` // Lifetime of the service account key Ttl int32 `json:"ttl"` }
GoogleCloudWriteRolesetKeyRequest struct for GoogleCloudWriteRolesetKeyRequest
func NewGoogleCloudWriteRolesetKeyRequestWithDefaults ¶
func NewGoogleCloudWriteRolesetKeyRequestWithDefaults() *GoogleCloudWriteRolesetKeyRequest
NewGoogleCloudWriteRolesetKeyRequestWithDefaults instantiates a new GoogleCloudWriteRolesetKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudWriteRolesetKeyRequest) MarshalJSON ¶
func (o GoogleCloudWriteRolesetKeyRequest) MarshalJSON() ([]byte, error)
type GoogleCloudWriteRolesetRequest ¶
type GoogleCloudWriteRolesetRequest struct { // Bindings configuration string. Bindings string `json:"bindings"` // Name of the GCP project that this roleset's service account will belong to. Project string `json:"project"` // Type of secret generated for this role set. Defaults to 'access_token' SecretType string `json:"secret_type"` // List of OAuth scopes to assign to credentials generated under this role set TokenScopes []string `json:"token_scopes"` }
GoogleCloudWriteRolesetRequest struct for GoogleCloudWriteRolesetRequest
func NewGoogleCloudWriteRolesetRequestWithDefaults ¶
func NewGoogleCloudWriteRolesetRequestWithDefaults() *GoogleCloudWriteRolesetRequest
NewGoogleCloudWriteRolesetRequestWithDefaults instantiates a new GoogleCloudWriteRolesetRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudWriteRolesetRequest) MarshalJSON ¶
func (o GoogleCloudWriteRolesetRequest) MarshalJSON() ([]byte, error)
type GoogleCloudWriteStaticAccountKeyRequest ¶
type GoogleCloudWriteStaticAccountKeyRequest struct { // Private key algorithm for service account key. Defaults to KEY_ALG_RSA_2048.\" KeyAlgorithm string `json:"key_algorithm"` // Private key type for service account key. Defaults to TYPE_GOOGLE_CREDENTIALS_FILE.\" KeyType string `json:"key_type"` // Lifetime of the service account key Ttl int32 `json:"ttl"` }
GoogleCloudWriteStaticAccountKeyRequest struct for GoogleCloudWriteStaticAccountKeyRequest
func NewGoogleCloudWriteStaticAccountKeyRequestWithDefaults ¶
func NewGoogleCloudWriteStaticAccountKeyRequestWithDefaults() *GoogleCloudWriteStaticAccountKeyRequest
NewGoogleCloudWriteStaticAccountKeyRequestWithDefaults instantiates a new GoogleCloudWriteStaticAccountKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudWriteStaticAccountKeyRequest) MarshalJSON ¶
func (o GoogleCloudWriteStaticAccountKeyRequest) MarshalJSON() ([]byte, error)
type GoogleCloudWriteStaticAccountRequest ¶
type GoogleCloudWriteStaticAccountRequest struct { // Bindings configuration string. Bindings string `json:"bindings"` // Type of secret generated for this account. Cannot be updated. Defaults to \"access_token\" SecretType string `json:"secret_type"` // Required. Email of the GCP service account to manage. Cannot be updated. ServiceAccountEmail string `json:"service_account_email"` // List of OAuth scopes to assign to access tokens generated under this account. Ignored if \"secret_type\" is not \"\"access_token\"\" TokenScopes []string `json:"token_scopes"` }
GoogleCloudWriteStaticAccountRequest struct for GoogleCloudWriteStaticAccountRequest
func NewGoogleCloudWriteStaticAccountRequestWithDefaults ¶
func NewGoogleCloudWriteStaticAccountRequestWithDefaults() *GoogleCloudWriteStaticAccountRequest
NewGoogleCloudWriteStaticAccountRequestWithDefaults instantiates a new GoogleCloudWriteStaticAccountRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GoogleCloudWriteStaticAccountRequest) MarshalJSON ¶
func (o GoogleCloudWriteStaticAccountRequest) MarshalJSON() ([]byte, error)
type GroupLookupRequest ¶
type GroupLookupRequest struct { // ID of the alias. AliasId string `json:"alias_id"` // Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with 'alias_name'. AliasMountAccessor string `json:"alias_mount_accessor"` // Name of the alias. This should be supplied in conjunction with 'alias_mount_accessor'. AliasName string `json:"alias_name"` // ID of the group. Id string `json:"id"` // Name of the group. Name string `json:"name"` }
GroupLookupRequest struct for GroupLookupRequest
func NewGroupLookupRequestWithDefaults ¶
func NewGroupLookupRequestWithDefaults() *GroupLookupRequest
NewGroupLookupRequestWithDefaults instantiates a new GroupLookupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GroupLookupRequest) MarshalJSON ¶
func (o GroupLookupRequest) MarshalJSON() ([]byte, error)
type GroupWriteAliasByIDRequest ¶
type GroupWriteAliasByIDRequest struct { // ID of the group to which this is an alias. CanonicalId string `json:"canonical_id"` // Mount accessor to which this alias belongs to. MountAccessor string `json:"mount_accessor"` // Alias of the group. Name string `json:"name"` }
GroupWriteAliasByIDRequest struct for GroupWriteAliasByIDRequest
func NewGroupWriteAliasByIDRequestWithDefaults ¶
func NewGroupWriteAliasByIDRequestWithDefaults() *GroupWriteAliasByIDRequest
NewGroupWriteAliasByIDRequestWithDefaults instantiates a new GroupWriteAliasByIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GroupWriteAliasByIDRequest) MarshalJSON ¶
func (o GroupWriteAliasByIDRequest) MarshalJSON() ([]byte, error)
type GroupWriteAliasRequest ¶
type GroupWriteAliasRequest struct { // ID of the group to which this is an alias. CanonicalId string `json:"canonical_id"` // ID of the group alias. Id string `json:"id"` // Mount accessor to which this alias belongs to. MountAccessor string `json:"mount_accessor"` // Alias of the group. Name string `json:"name"` }
GroupWriteAliasRequest struct for GroupWriteAliasRequest
func NewGroupWriteAliasRequestWithDefaults ¶
func NewGroupWriteAliasRequestWithDefaults() *GroupWriteAliasRequest
NewGroupWriteAliasRequestWithDefaults instantiates a new GroupWriteAliasRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GroupWriteAliasRequest) MarshalJSON ¶
func (o GroupWriteAliasRequest) MarshalJSON() ([]byte, error)
type GroupWriteByIDRequest ¶
type GroupWriteByIDRequest struct { // Entity IDs to be assigned as group members. MemberEntityIds []string `json:"member_entity_ids"` // Group IDs to be assigned as group members. MemberGroupIds []string `json:"member_group_ids"` // Metadata to be associated with the group. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault <command> <path> metadata=key1=value1 metadata=key2=value2 Metadata map[string]interface{} `json:"metadata"` // Name of the group. Name string `json:"name"` // Policies to be tied to the group. Policies []string `json:"policies"` // Type of the group, 'internal' or 'external'. Defaults to 'internal' Type string `json:"type"` }
GroupWriteByIDRequest struct for GroupWriteByIDRequest
func NewGroupWriteByIDRequestWithDefaults ¶
func NewGroupWriteByIDRequestWithDefaults() *GroupWriteByIDRequest
NewGroupWriteByIDRequestWithDefaults instantiates a new GroupWriteByIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GroupWriteByIDRequest) MarshalJSON ¶
func (o GroupWriteByIDRequest) MarshalJSON() ([]byte, error)
type GroupWriteByNameRequest ¶
type GroupWriteByNameRequest struct { // ID of the group. If set, updates the corresponding existing group. Id string `json:"id"` // Entity IDs to be assigned as group members. MemberEntityIds []string `json:"member_entity_ids"` // Group IDs to be assigned as group members. MemberGroupIds []string `json:"member_group_ids"` // Metadata to be associated with the group. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault <command> <path> metadata=key1=value1 metadata=key2=value2 Metadata map[string]interface{} `json:"metadata"` // Policies to be tied to the group. Policies []string `json:"policies"` // Type of the group, 'internal' or 'external'. Defaults to 'internal' Type string `json:"type"` }
GroupWriteByNameRequest struct for GroupWriteByNameRequest
func NewGroupWriteByNameRequestWithDefaults ¶
func NewGroupWriteByNameRequestWithDefaults() *GroupWriteByNameRequest
NewGroupWriteByNameRequestWithDefaults instantiates a new GroupWriteByNameRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GroupWriteByNameRequest) MarshalJSON ¶
func (o GroupWriteByNameRequest) MarshalJSON() ([]byte, error)
type GroupWriteRequest ¶
type GroupWriteRequest struct { // ID of the group. If set, updates the corresponding existing group. Id string `json:"id"` // Entity IDs to be assigned as group members. MemberEntityIds []string `json:"member_entity_ids"` // Group IDs to be assigned as group members. MemberGroupIds []string `json:"member_group_ids"` // Metadata to be associated with the group. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault <command> <path> metadata=key1=value1 metadata=key2=value2 Metadata map[string]interface{} `json:"metadata"` // Name of the group. Name string `json:"name"` // Policies to be tied to the group. Policies []string `json:"policies"` // Type of the group, 'internal' or 'external'. Defaults to 'internal' Type string `json:"type"` }
GroupWriteRequest struct for GroupWriteRequest
func NewGroupWriteRequestWithDefaults ¶
func NewGroupWriteRequestWithDefaults() *GroupWriteRequest
NewGroupWriteRequestWithDefaults instantiates a new GroupWriteRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (GroupWriteRequest) MarshalJSON ¶
func (o GroupWriteRequest) MarshalJSON() ([]byte, error)
type JWTLoginRequest ¶
type JWTLoginRequest struct { // The signed JWT to validate. Jwt string `json:"jwt"` // The role to log in against. Role string `json:"role"` }
JWTLoginRequest struct for JWTLoginRequest
func NewJWTLoginRequestWithDefaults ¶
func NewJWTLoginRequestWithDefaults() *JWTLoginRequest
NewJWTLoginRequestWithDefaults instantiates a new JWTLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (JWTLoginRequest) MarshalJSON ¶
func (o JWTLoginRequest) MarshalJSON() ([]byte, error)
type JWTWriteConfigRequest ¶
type JWTWriteConfigRequest struct { // The value against which to match the 'iss' claim in a JWT. Optional. BoundIssuer string `json:"bound_issuer"` // The default role to use if none is provided during login. If not set, a role is required during login. DefaultRole string `json:"default_role"` // The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used. JwksCaPem string `json:"jwks_ca_pem"` // JWKS URL to use to authenticate signatures. Cannot be used with \"oidc_discovery_url\" or \"jwt_validation_pubkeys\". JwksUrl string `json:"jwks_url"` // A list of supported signing algorithms. Defaults to RS256. JwtSupportedAlgs []string `json:"jwt_supported_algs"` // A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with \"jwks_url\" or \"oidc_discovery_url\". JwtValidationPubkeys []string `json:"jwt_validation_pubkeys"` // Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. NamespaceInState bool `json:"namespace_in_state"` // The OAuth Client ID configured with your OIDC provider. OidcClientId string `json:"oidc_client_id"` // The OAuth Client Secret configured with your OIDC provider. OidcClientSecret string `json:"oidc_client_secret"` // The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used. OidcDiscoveryCaPem string `json:"oidc_discovery_ca_pem"` // OIDC Discovery URL, without any .well-known component (base path). Cannot be used with \"jwks_url\" or \"jwt_validation_pubkeys\". OidcDiscoveryUrl string `json:"oidc_discovery_url"` // The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. OidcResponseMode string `json:"oidc_response_mode"` // The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. OidcResponseTypes []string `json:"oidc_response_types"` // Provider-specific configuration. Optional. ProviderConfig map[string]interface{} `json:"provider_config"` }
JWTWriteConfigRequest struct for JWTWriteConfigRequest
func NewJWTWriteConfigRequestWithDefaults ¶
func NewJWTWriteConfigRequestWithDefaults() *JWTWriteConfigRequest
NewJWTWriteConfigRequestWithDefaults instantiates a new JWTWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (JWTWriteConfigRequest) MarshalJSON ¶
func (o JWTWriteConfigRequest) MarshalJSON() ([]byte, error)
type JWTWriteOIDCAuthURLRequest ¶
type JWTWriteOIDCAuthURLRequest struct { // Optional client-provided nonce that must match during callback, if present. ClientNonce string `json:"client_nonce"` // The OAuth redirect_uri to use in the authorization URL. RedirectUri string `json:"redirect_uri"` // The role to issue an OIDC authorization URL against. Role string `json:"role"` }
JWTWriteOIDCAuthURLRequest struct for JWTWriteOIDCAuthURLRequest
func NewJWTWriteOIDCAuthURLRequestWithDefaults ¶
func NewJWTWriteOIDCAuthURLRequestWithDefaults() *JWTWriteOIDCAuthURLRequest
NewJWTWriteOIDCAuthURLRequestWithDefaults instantiates a new JWTWriteOIDCAuthURLRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (JWTWriteOIDCAuthURLRequest) MarshalJSON ¶
func (o JWTWriteOIDCAuthURLRequest) MarshalJSON() ([]byte, error)
type JWTWriteOIDCCallbackRequest ¶
type JWTWriteOIDCCallbackRequest struct { ClientNonce string `json:"client_nonce"` Code string `json:"code"` IdToken string `json:"id_token"` State string `json:"state"` }
JWTWriteOIDCCallbackRequest struct for JWTWriteOIDCCallbackRequest
func NewJWTWriteOIDCCallbackRequestWithDefaults ¶
func NewJWTWriteOIDCCallbackRequestWithDefaults() *JWTWriteOIDCCallbackRequest
NewJWTWriteOIDCCallbackRequestWithDefaults instantiates a new JWTWriteOIDCCallbackRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (JWTWriteOIDCCallbackRequest) MarshalJSON ¶
func (o JWTWriteOIDCCallbackRequest) MarshalJSON() ([]byte, error)
type JWTWriteRoleRequest ¶
type JWTWriteRoleRequest struct { // Comma-separated list of allowed values for redirect_uri AllowedRedirectUris []string `json:"allowed_redirect_uris"` // Comma-separated list of 'aud' claims that are valid for login; any match is sufficient BoundAudiences []string `json:"bound_audiences"` // Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used. // Deprecated BoundCidrs []string `json:"bound_cidrs"` // Map of claims/values which must match for login BoundClaims map[string]interface{} `json:"bound_claims"` // How to interpret values in the map of claims/values (which must match for login): allowed values are 'string' or 'glob' BoundClaimsType string `json:"bound_claims_type"` // The 'sub' claim that is valid for login. Optional. BoundSubject string `json:"bound_subject"` // Mappings of claims (key) that will be copied to a metadata field (value) ClaimMappings map[string]interface{} `json:"claim_mappings"` // Duration in seconds of leeway when validating all claims to account for clock skew. Defaults to 60 (1 minute) if set to 0 and can be disabled if set to -1. ClockSkewLeeway int32 `json:"clock_skew_leeway"` // Duration in seconds of leeway when validating expiration of a token to account for clock skew. Defaults to 150 (2.5 minutes) if set to 0 and can be disabled if set to -1. ExpirationLeeway int32 `json:"expiration_leeway"` // The claim to use for the Identity group alias names GroupsClaim string `json:"groups_claim"` // Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. MaxAge int32 `json:"max_age"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Duration in seconds of leeway when validating not before values of a token to account for clock skew. Defaults to 150 (2.5 minutes) if set to 0 and can be disabled if set to -1. NotBeforeLeeway int32 `json:"not_before_leeway"` // Use \"token_num_uses\" instead. If this and \"token_num_uses\" are both specified, only \"token_num_uses\" will be used. // Deprecated NumUses int32 `json:"num_uses"` // Comma-separated list of OIDC scopes OidcScopes []string `json:"oidc_scopes"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Type of the role, either 'jwt' or 'oidc'. RoleType string `json:"role_type"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` // The claim to use for the Identity entity alias name UserClaim string `json:"user_claim"` // If true, the user_claim value will use JSON pointer syntax for referencing claims. UserClaimJsonPointer bool `json:"user_claim_json_pointer"` // Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. VerboseOidcLogging bool `json:"verbose_oidc_logging"` }
JWTWriteRoleRequest struct for JWTWriteRoleRequest
func NewJWTWriteRoleRequestWithDefaults ¶
func NewJWTWriteRoleRequestWithDefaults() *JWTWriteRoleRequest
NewJWTWriteRoleRequestWithDefaults instantiates a new JWTWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (JWTWriteRoleRequest) MarshalJSON ¶
func (o JWTWriteRoleRequest) MarshalJSON() ([]byte, error)
type KVv2DeleteVersionsRequest ¶
type KVv2DeleteVersionsRequest struct { // The versions to be archived. The versioned data will not be deleted, but it will no longer be returned in normal get requests. Versions []int32 `json:"versions"` }
KVv2DeleteVersionsRequest struct for KVv2DeleteVersionsRequest
func NewKVv2DeleteVersionsRequestWithDefaults ¶
func NewKVv2DeleteVersionsRequestWithDefaults() *KVv2DeleteVersionsRequest
NewKVv2DeleteVersionsRequestWithDefaults instantiates a new KVv2DeleteVersionsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KVv2DeleteVersionsRequest) MarshalJSON ¶
func (o KVv2DeleteVersionsRequest) MarshalJSON() ([]byte, error)
type KVv2DestroyVersionsRequest ¶
type KVv2DestroyVersionsRequest struct { // The versions to destroy. Their data will be permanently deleted. Versions []int32 `json:"versions"` }
KVv2DestroyVersionsRequest struct for KVv2DestroyVersionsRequest
func NewKVv2DestroyVersionsRequestWithDefaults ¶
func NewKVv2DestroyVersionsRequestWithDefaults() *KVv2DestroyVersionsRequest
NewKVv2DestroyVersionsRequestWithDefaults instantiates a new KVv2DestroyVersionsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KVv2DestroyVersionsRequest) MarshalJSON ¶
func (o KVv2DestroyVersionsRequest) MarshalJSON() ([]byte, error)
type KVv2UndeleteVersionsRequest ¶
type KVv2UndeleteVersionsRequest struct { // The versions to unarchive. The versions will be restored and their data will be returned on normal get requests. Versions []int32 `json:"versions"` }
KVv2UndeleteVersionsRequest struct for KVv2UndeleteVersionsRequest
func NewKVv2UndeleteVersionsRequestWithDefaults ¶
func NewKVv2UndeleteVersionsRequestWithDefaults() *KVv2UndeleteVersionsRequest
NewKVv2UndeleteVersionsRequestWithDefaults instantiates a new KVv2UndeleteVersionsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KVv2UndeleteVersionsRequest) MarshalJSON ¶
func (o KVv2UndeleteVersionsRequest) MarshalJSON() ([]byte, error)
type KVv2WriteConfigRequest ¶
type KVv2WriteConfigRequest struct { // If true, the backend will require the cas parameter to be set for each write CasRequired bool `json:"cas_required"` // If set, the length of time before a version is deleted. A negative duration disables the use of delete_version_after on all keys. A zero duration clears the current setting. Accepts a Go duration format string. DeleteVersionAfter int32 `json:"delete_version_after"` // The number of versions to keep for each key. Defaults to 10 MaxVersions int32 `json:"max_versions"` }
KVv2WriteConfigRequest struct for KVv2WriteConfigRequest
func NewKVv2WriteConfigRequestWithDefaults ¶
func NewKVv2WriteConfigRequestWithDefaults() *KVv2WriteConfigRequest
NewKVv2WriteConfigRequestWithDefaults instantiates a new KVv2WriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KVv2WriteConfigRequest) MarshalJSON ¶
func (o KVv2WriteConfigRequest) MarshalJSON() ([]byte, error)
type KVv2WriteMetadataRequest ¶
type KVv2WriteMetadataRequest struct { // If true the key will require the cas parameter to be set on all write requests. If false, the backend’s configuration will be used. CasRequired bool `json:"cas_required"` // User-provided key-value pairs that are used to describe arbitrary and version-agnostic information about a secret. CustomMetadata map[string]interface{} `json:"custom_metadata"` // The length of time before a version is deleted. If not set, the backend's configured delete_version_after is used. Cannot be greater than the backend's delete_version_after. A zero duration clears the current setting. A negative duration will cause an error. DeleteVersionAfter int32 `json:"delete_version_after"` // The number of versions to keep. If not set, the backend’s configured max version is used. MaxVersions int32 `json:"max_versions"` }
KVv2WriteMetadataRequest struct for KVv2WriteMetadataRequest
func NewKVv2WriteMetadataRequestWithDefaults ¶
func NewKVv2WriteMetadataRequestWithDefaults() *KVv2WriteMetadataRequest
NewKVv2WriteMetadataRequestWithDefaults instantiates a new KVv2WriteMetadataRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KVv2WriteMetadataRequest) MarshalJSON ¶
func (o KVv2WriteMetadataRequest) MarshalJSON() ([]byte, error)
type KVv2WriteRequest ¶
type KVv2WriteRequest struct { // The contents of the data map will be stored and returned on read. Data map[string]interface{} `json:"data"` // Options for writing a KV entry. Set the \"cas\" value to use a Check-And-Set operation. If not set the write will be allowed. If set to 0 a write will only be allowed if the key doesn’t exist. If the index is non-zero the write will only be allowed if the key’s current version matches the version specified in the cas parameter. Options map[string]interface{} `json:"options"` // If provided during a read, the value at the version number will be returned Version int32 `json:"version"` }
KVv2WriteRequest struct for KVv2WriteRequest
func NewKVv2WriteRequestWithDefaults ¶
func NewKVv2WriteRequestWithDefaults() *KVv2WriteRequest
NewKVv2WriteRequestWithDefaults instantiates a new KVv2WriteRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KVv2WriteRequest) MarshalJSON ¶
func (o KVv2WriteRequest) MarshalJSON() ([]byte, error)
type KerberosLoginRequest ¶
type KerberosLoginRequest struct { // SPNEGO Authorization header. Required. Authorization string `json:"authorization"` }
KerberosLoginRequest struct for KerberosLoginRequest
func NewKerberosLoginRequestWithDefaults ¶
func NewKerberosLoginRequestWithDefaults() *KerberosLoginRequest
NewKerberosLoginRequestWithDefaults instantiates a new KerberosLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KerberosLoginRequest) MarshalJSON ¶
func (o KerberosLoginRequest) MarshalJSON() ([]byte, error)
type KerberosWriteConfigRequest ¶
type KerberosWriteConfigRequest struct { // If set to true, returns any groups found in LDAP as a group alias. AddGroupAliases bool `json:"add_group_aliases"` // Base64 encoded keytab Keytab string `json:"keytab"` // Remove instance/FQDN from keytab principal names. RemoveInstanceName bool `json:"remove_instance_name"` // Service Account ServiceAccount string `json:"service_account"` }
KerberosWriteConfigRequest struct for KerberosWriteConfigRequest
func NewKerberosWriteConfigRequestWithDefaults ¶
func NewKerberosWriteConfigRequestWithDefaults() *KerberosWriteConfigRequest
NewKerberosWriteConfigRequestWithDefaults instantiates a new KerberosWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KerberosWriteConfigRequest) MarshalJSON ¶
func (o KerberosWriteConfigRequest) MarshalJSON() ([]byte, error)
type KerberosWriteGroupRequest ¶
type KerberosWriteGroupRequest struct { // Comma-separated list of policies associated to the group. Policies []string `json:"policies"` }
KerberosWriteGroupRequest struct for KerberosWriteGroupRequest
func NewKerberosWriteGroupRequestWithDefaults ¶
func NewKerberosWriteGroupRequestWithDefaults() *KerberosWriteGroupRequest
NewKerberosWriteGroupRequestWithDefaults instantiates a new KerberosWriteGroupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KerberosWriteGroupRequest) MarshalJSON ¶
func (o KerberosWriteGroupRequest) MarshalJSON() ([]byte, error)
type KerberosWriteLDAPConfigRequest ¶
type KerberosWriteLDAPConfigRequest struct { // Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). AnonymousGroupSearch bool `json:"anonymous_group_search"` // LDAP DN for searching for the user DN (optional) Binddn string `json:"binddn"` // LDAP password for searching for the user DN (optional) Bindpass string `json:"bindpass"` // If true, case sensitivity will be used when comparing usernames and groups for matching policies. CaseSensitiveNames bool `json:"case_sensitive_names"` // CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) Certificate string `json:"certificate"` // Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsCert string `json:"client_tls_cert"` // Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsKey string `json:"client_tls_key"` // Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true DenyNullBind bool `json:"deny_null_bind"` // Use anonymous bind to discover the bind DN of a user (optional) Discoverdn bool `json:"discoverdn"` // LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn Groupattr string `json:"groupattr"` // LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) Groupdn string `json:"groupdn"` // Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) Groupfilter string `json:"groupfilter"` // Skip LDAP server SSL Certificate verification - VERY insecure (optional) InsecureTls bool `json:"insecure_tls"` // Timeout, in seconds, for the connection when making requests against the server before returning back an error. RequestTimeout int32 `json:"request_timeout"` // Issue a StartTLS command after establishing unencrypted connection (optional) Starttls bool `json:"starttls"` // Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' TlsMaxVersion string `json:"tls_max_version"` // Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' TlsMinVersion string `json:"tls_min_version"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies. This will apply to all tokens generated by this auth method, in addition to any configured for specific users/groups. TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Enables userPrincipalDomain login with [username]@UPNDomain (optional) Upndomain string `json:"upndomain"` // LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. Url string `json:"url"` // In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. UsePre111GroupCnBehavior bool `json:"use_pre111_group_cn_behavior"` // If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones. UseTokenGroups bool `json:"use_token_groups"` // Attribute used for users (default: cn) Userattr string `json:"userattr"` // LDAP domain to use for users (eg: ou=People,dc=example,dc=org) Userdn string `json:"userdn"` // Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}}) Userfilter string `json:"userfilter"` // If true, sets the alias name to the username UsernameAsAlias bool `json:"username_as_alias"` }
KerberosWriteLDAPConfigRequest struct for KerberosWriteLDAPConfigRequest
func NewKerberosWriteLDAPConfigRequestWithDefaults ¶
func NewKerberosWriteLDAPConfigRequestWithDefaults() *KerberosWriteLDAPConfigRequest
NewKerberosWriteLDAPConfigRequestWithDefaults instantiates a new KerberosWriteLDAPConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KerberosWriteLDAPConfigRequest) MarshalJSON ¶
func (o KerberosWriteLDAPConfigRequest) MarshalJSON() ([]byte, error)
type KubernetesLoginRequest ¶
type KubernetesLoginRequest struct { // A signed JWT for authenticating a service account. This field is required. Jwt string `json:"jwt"` // Name of the role against which the login is being attempted. This field is required Role string `json:"role"` }
KubernetesLoginRequest struct for KubernetesLoginRequest
func NewKubernetesLoginRequestWithDefaults ¶
func NewKubernetesLoginRequestWithDefaults() *KubernetesLoginRequest
NewKubernetesLoginRequestWithDefaults instantiates a new KubernetesLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KubernetesLoginRequest) MarshalJSON ¶
func (o KubernetesLoginRequest) MarshalJSON() ([]byte, error)
type KubernetesWriteAuthConfigRequest ¶
type KubernetesWriteAuthConfigRequest struct { // Disable JWT issuer validation (Deprecated, will be removed in a future release) // Deprecated DisableIssValidation bool `json:"disable_iss_validation"` // Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod DisableLocalCaJwt bool `json:"disable_local_ca_jwt"` // Optional JWT issuer. If no issuer is specified, then this plugin will use kubernetes.io/serviceaccount as the default issuer. (Deprecated, will be removed in a future release) // Deprecated Issuer string `json:"issuer"` // PEM encoded CA cert for use by the TLS client used to talk with the API. KubernetesCaCert string `json:"kubernetes_ca_cert"` // Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. KubernetesHost string `json:"kubernetes_host"` // Optional list of PEM-formated public keys or certificates used to verify the signatures of kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. PemKeys []string `json:"pem_keys"` // A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API. TokenReviewerJwt string `json:"token_reviewer_jwt"` }
KubernetesWriteAuthConfigRequest struct for KubernetesWriteAuthConfigRequest
func NewKubernetesWriteAuthConfigRequestWithDefaults ¶
func NewKubernetesWriteAuthConfigRequestWithDefaults() *KubernetesWriteAuthConfigRequest
NewKubernetesWriteAuthConfigRequestWithDefaults instantiates a new KubernetesWriteAuthConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KubernetesWriteAuthConfigRequest) MarshalJSON ¶
func (o KubernetesWriteAuthConfigRequest) MarshalJSON() ([]byte, error)
type KubernetesWriteAuthRoleRequest ¶
type KubernetesWriteAuthRoleRequest struct { // Source to use when deriving the Alias name. valid choices: \"serviceaccount_uid\" : <token.uid> e.g. 474b11b5-0f20-4f9d-8ca5-65715ab325e0 (most secure choice) \"serviceaccount_name\" : <namespace>/<serviceaccount> e.g. vault/vault-agent default: \"serviceaccount_uid\" AliasNameSource string `json:"alias_name_source"` // Optional Audience claim to verify in the jwt. Audience string `json:"audience"` // Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used. // Deprecated BoundCidrs []string `json:"bound_cidrs"` // List of service account names able to access this role. If set to \"*\" all names are allowed. BoundServiceAccountNames []string `json:"bound_service_account_names"` // List of namespaces allowed to access this role. If set to \"*\" all namespaces are allowed. BoundServiceAccountNamespaces []string `json:"bound_service_account_namespaces"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Use \"token_num_uses\" instead. If this and \"token_num_uses\" are both specified, only \"token_num_uses\" will be used. // Deprecated NumUses int32 `json:"num_uses"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` }
KubernetesWriteAuthRoleRequest struct for KubernetesWriteAuthRoleRequest
func NewKubernetesWriteAuthRoleRequestWithDefaults ¶
func NewKubernetesWriteAuthRoleRequestWithDefaults() *KubernetesWriteAuthRoleRequest
NewKubernetesWriteAuthRoleRequestWithDefaults instantiates a new KubernetesWriteAuthRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KubernetesWriteAuthRoleRequest) MarshalJSON ¶
func (o KubernetesWriteAuthRoleRequest) MarshalJSON() ([]byte, error)
type KubernetesWriteConfigRequest ¶
type KubernetesWriteConfigRequest struct { // Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. DisableLocalCaJwt bool `json:"disable_local_ca_jwt"` // PEM encoded CA certificate to use to verify the Kubernetes API server certificate. Defaults to the local pod's CA if found. KubernetesCaCert string `json:"kubernetes_ca_cert"` // Kubernetes API URL to connect to. Defaults to https://$KUBERNETES_SERVICE_HOST:KUBERNETES_SERVICE_PORT if those environment variables are set. KubernetesHost string `json:"kubernetes_host"` // The JSON web token of the service account used by the secret engine to manage Kubernetes credentials. Defaults to the local pod's JWT if found. ServiceAccountJwt string `json:"service_account_jwt"` }
KubernetesWriteConfigRequest struct for KubernetesWriteConfigRequest
func NewKubernetesWriteConfigRequestWithDefaults ¶
func NewKubernetesWriteConfigRequestWithDefaults() *KubernetesWriteConfigRequest
NewKubernetesWriteConfigRequestWithDefaults instantiates a new KubernetesWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KubernetesWriteConfigRequest) MarshalJSON ¶
func (o KubernetesWriteConfigRequest) MarshalJSON() ([]byte, error)
type KubernetesWriteCredentialsRequest ¶
type KubernetesWriteCredentialsRequest struct { // If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. Requires the Vault role to have kubernetes_role_type set to ClusterRole. ClusterRoleBinding bool `json:"cluster_role_binding"` // The name of the Kubernetes namespace in which to generate the credentials KubernetesNamespace string `json:"kubernetes_namespace"` // The TTL of the generated credentials Ttl int32 `json:"ttl"` }
KubernetesWriteCredentialsRequest struct for KubernetesWriteCredentialsRequest
func NewKubernetesWriteCredentialsRequestWithDefaults ¶
func NewKubernetesWriteCredentialsRequestWithDefaults() *KubernetesWriteCredentialsRequest
NewKubernetesWriteCredentialsRequestWithDefaults instantiates a new KubernetesWriteCredentialsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KubernetesWriteCredentialsRequest) MarshalJSON ¶
func (o KubernetesWriteCredentialsRequest) MarshalJSON() ([]byte, error)
type KubernetesWriteRoleRequest ¶
type KubernetesWriteRoleRequest struct { // A label selector for Kubernetes namespaces in which credentials can be generated. Accepts either a JSON or YAML object. If set with allowed_kubernetes_namespaces, the conditions are conjuncted. AllowedKubernetesNamespaceSelector string `json:"allowed_kubernetes_namespace_selector"` // A list of the Kubernetes namespaces in which credentials can be generated. If set to \"*\" all namespaces are allowed. AllowedKubernetesNamespaces []string `json:"allowed_kubernetes_namespaces"` // Additional annotations to apply to all generated Kubernetes objects. ExtraAnnotations map[string]interface{} `json:"extra_annotations"` // Additional labels to apply to all generated Kubernetes objects. ExtraLabels map[string]interface{} `json:"extra_labels"` // The Role or ClusterRole rules to use when generating a role. Accepts either a JSON or YAML object. If set, the entire chain of Kubernetes objects will be generated. GeneratedRoleRules string `json:"generated_role_rules"` // The pre-existing Role or ClusterRole to bind a generated service account to. If set, Kubernetes token, service account, and role binding objects will be created. KubernetesRoleName string `json:"kubernetes_role_name"` // Specifies whether the Kubernetes role is a Role or ClusterRole. KubernetesRoleType string `json:"kubernetes_role_type"` // The name template to use when generating service accounts, roles and role bindings. If unset, a default template is used. NameTemplate string `json:"name_template"` // The pre-existing service account to generate tokens for. Mutually exclusive with all role parameters. If set, only a Kubernetes service account token will be created. ServiceAccountName string `json:"service_account_name"` // The default ttl for generated Kubernetes service account tokens. If not set or set to 0, will use system default. TokenDefaultTtl int32 `json:"token_default_ttl"` // The maximum ttl for generated Kubernetes service account tokens. If not set or set to 0, will use system default. TokenMaxTtl int32 `json:"token_max_ttl"` }
KubernetesWriteRoleRequest struct for KubernetesWriteRoleRequest
func NewKubernetesWriteRoleRequestWithDefaults ¶
func NewKubernetesWriteRoleRequestWithDefaults() *KubernetesWriteRoleRequest
NewKubernetesWriteRoleRequestWithDefaults instantiates a new KubernetesWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (KubernetesWriteRoleRequest) MarshalJSON ¶
func (o KubernetesWriteRoleRequest) MarshalJSON() ([]byte, error)
type LDAPCheckInLibraryRequest ¶
type LDAPCheckInLibraryRequest struct { // The username/logon name for the service accounts to check in. ServiceAccountNames []string `json:"service_account_names"` }
LDAPCheckInLibraryRequest struct for LDAPCheckInLibraryRequest
func NewLDAPCheckInLibraryRequestWithDefaults ¶
func NewLDAPCheckInLibraryRequestWithDefaults() *LDAPCheckInLibraryRequest
NewLDAPCheckInLibraryRequestWithDefaults instantiates a new LDAPCheckInLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPCheckInLibraryRequest) MarshalJSON ¶
func (o LDAPCheckInLibraryRequest) MarshalJSON() ([]byte, error)
type LDAPCheckInManageLibraryRequest ¶
type LDAPCheckInManageLibraryRequest struct { // The username/logon name for the service accounts to check in. ServiceAccountNames []string `json:"service_account_names"` }
LDAPCheckInManageLibraryRequest struct for LDAPCheckInManageLibraryRequest
func NewLDAPCheckInManageLibraryRequestWithDefaults ¶
func NewLDAPCheckInManageLibraryRequestWithDefaults() *LDAPCheckInManageLibraryRequest
NewLDAPCheckInManageLibraryRequestWithDefaults instantiates a new LDAPCheckInManageLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPCheckInManageLibraryRequest) MarshalJSON ¶
func (o LDAPCheckInManageLibraryRequest) MarshalJSON() ([]byte, error)
type LDAPCheckOutLibraryRequest ¶
type LDAPCheckOutLibraryRequest struct { // The length of time before the check-out will expire, in seconds. Ttl int32 `json:"ttl"` }
LDAPCheckOutLibraryRequest struct for LDAPCheckOutLibraryRequest
func NewLDAPCheckOutLibraryRequestWithDefaults ¶
func NewLDAPCheckOutLibraryRequestWithDefaults() *LDAPCheckOutLibraryRequest
NewLDAPCheckOutLibraryRequestWithDefaults instantiates a new LDAPCheckOutLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPCheckOutLibraryRequest) MarshalJSON ¶
func (o LDAPCheckOutLibraryRequest) MarshalJSON() ([]byte, error)
type LDAPLoginRequest ¶
type LDAPLoginRequest struct { // Password for this user. Password string `json:"password"` }
LDAPLoginRequest struct for LDAPLoginRequest
func NewLDAPLoginRequestWithDefaults ¶
func NewLDAPLoginRequestWithDefaults() *LDAPLoginRequest
NewLDAPLoginRequestWithDefaults instantiates a new LDAPLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPLoginRequest) MarshalJSON ¶
func (o LDAPLoginRequest) MarshalJSON() ([]byte, error)
type LDAPWriteAuthConfigRequest ¶
type LDAPWriteAuthConfigRequest struct { // Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). AnonymousGroupSearch bool `json:"anonymous_group_search"` // LDAP DN for searching for the user DN (optional) Binddn string `json:"binddn"` // LDAP password for searching for the user DN (optional) Bindpass string `json:"bindpass"` // If true, case sensitivity will be used when comparing usernames and groups for matching policies. CaseSensitiveNames bool `json:"case_sensitive_names"` // CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) Certificate string `json:"certificate"` // Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsCert string `json:"client_tls_cert"` // Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsKey string `json:"client_tls_key"` // Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true DenyNullBind bool `json:"deny_null_bind"` // Use anonymous bind to discover the bind DN of a user (optional) Discoverdn bool `json:"discoverdn"` // LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn Groupattr string `json:"groupattr"` // LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) Groupdn string `json:"groupdn"` // Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) Groupfilter string `json:"groupfilter"` // Skip LDAP server SSL Certificate verification - VERY insecure (optional) InsecureTls bool `json:"insecure_tls"` // Timeout, in seconds, for the connection when making requests against the server before returning back an error. RequestTimeout int32 `json:"request_timeout"` // Issue a StartTLS command after establishing unencrypted connection (optional) Starttls bool `json:"starttls"` // Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' TlsMaxVersion string `json:"tls_max_version"` // Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' TlsMinVersion string `json:"tls_min_version"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies. This will apply to all tokens generated by this auth method, in addition to any configured for specific users/groups. TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Enables userPrincipalDomain login with [username]@UPNDomain (optional) Upndomain string `json:"upndomain"` // LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. Url string `json:"url"` // In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. UsePre111GroupCnBehavior bool `json:"use_pre111_group_cn_behavior"` // If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones. UseTokenGroups bool `json:"use_token_groups"` // Attribute used for users (default: cn) Userattr string `json:"userattr"` // LDAP domain to use for users (eg: ou=People,dc=example,dc=org) Userdn string `json:"userdn"` // Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}}) Userfilter string `json:"userfilter"` // If true, sets the alias name to the username UsernameAsAlias bool `json:"username_as_alias"` }
LDAPWriteAuthConfigRequest struct for LDAPWriteAuthConfigRequest
func NewLDAPWriteAuthConfigRequestWithDefaults ¶
func NewLDAPWriteAuthConfigRequestWithDefaults() *LDAPWriteAuthConfigRequest
NewLDAPWriteAuthConfigRequestWithDefaults instantiates a new LDAPWriteAuthConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPWriteAuthConfigRequest) MarshalJSON ¶
func (o LDAPWriteAuthConfigRequest) MarshalJSON() ([]byte, error)
type LDAPWriteConfigRequest ¶
type LDAPWriteConfigRequest struct { // Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). AnonymousGroupSearch bool `json:"anonymous_group_search"` // LDAP DN for searching for the user DN (optional) Binddn string `json:"binddn"` // LDAP password for searching for the user DN (optional) Bindpass string `json:"bindpass"` // If true, case sensitivity will be used when comparing usernames and groups for matching policies. CaseSensitiveNames bool `json:"case_sensitive_names"` // CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) Certificate string `json:"certificate"` // Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsCert string `json:"client_tls_cert"` // Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsKey string `json:"client_tls_key"` // Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true DenyNullBind bool `json:"deny_null_bind"` // Use anonymous bind to discover the bind DN of a user (optional) Discoverdn bool `json:"discoverdn"` // LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn Groupattr string `json:"groupattr"` // LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) Groupdn string `json:"groupdn"` // Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) Groupfilter string `json:"groupfilter"` // Skip LDAP server SSL Certificate verification - VERY insecure (optional) InsecureTls bool `json:"insecure_tls"` // The desired length of passwords that Vault generates. // Deprecated Length int32 `json:"length"` // The maximum password time-to-live. MaxTtl int32 `json:"max_ttl"` // Password policy to use to generate passwords PasswordPolicy string `json:"password_policy"` // Timeout, in seconds, for the connection when making requests against the server before returning back an error. RequestTimeout int32 `json:"request_timeout"` // The desired LDAP schema used when modifying user account passwords. Schema string `json:"schema"` // Issue a StartTLS command after establishing unencrypted connection (optional) Starttls bool `json:"starttls"` // Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' TlsMaxVersion string `json:"tls_max_version"` // Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' TlsMinVersion string `json:"tls_min_version"` // The default password time-to-live. Ttl int32 `json:"ttl"` // Enables userPrincipalDomain login with [username]@UPNDomain (optional) Upndomain string `json:"upndomain"` // LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. Url string `json:"url"` // In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. UsePre111GroupCnBehavior bool `json:"use_pre111_group_cn_behavior"` // If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones. UseTokenGroups bool `json:"use_token_groups"` // Attribute used for users (default: cn) Userattr string `json:"userattr"` // LDAP domain to use for users (eg: ou=People,dc=example,dc=org) Userdn string `json:"userdn"` // Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}}) Userfilter string `json:"userfilter"` // If true, sets the alias name to the username UsernameAsAlias bool `json:"username_as_alias"` }
LDAPWriteConfigRequest struct for LDAPWriteConfigRequest
func NewLDAPWriteConfigRequestWithDefaults ¶
func NewLDAPWriteConfigRequestWithDefaults() *LDAPWriteConfigRequest
NewLDAPWriteConfigRequestWithDefaults instantiates a new LDAPWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPWriteConfigRequest) MarshalJSON ¶
func (o LDAPWriteConfigRequest) MarshalJSON() ([]byte, error)
type LDAPWriteGroupRequest ¶
type LDAPWriteGroupRequest struct { // Comma-separated list of policies associated to the group. Policies []string `json:"policies"` }
LDAPWriteGroupRequest struct for LDAPWriteGroupRequest
func NewLDAPWriteGroupRequestWithDefaults ¶
func NewLDAPWriteGroupRequestWithDefaults() *LDAPWriteGroupRequest
NewLDAPWriteGroupRequestWithDefaults instantiates a new LDAPWriteGroupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPWriteGroupRequest) MarshalJSON ¶
func (o LDAPWriteGroupRequest) MarshalJSON() ([]byte, error)
type LDAPWriteLibraryRequest ¶
type LDAPWriteLibraryRequest struct { // Disable the default behavior of requiring that check-ins are performed by the entity that checked them out. DisableCheckInEnforcement bool `json:"disable_check_in_enforcement"` // In seconds, the max amount of time a check-out's renewals should last. Defaults to 24 hours. MaxTtl int32 `json:"max_ttl"` // The username/logon name for the service accounts with which this set will be associated. ServiceAccountNames []string `json:"service_account_names"` // In seconds, the amount of time a check-out should last. Defaults to 24 hours. Ttl int32 `json:"ttl"` }
LDAPWriteLibraryRequest struct for LDAPWriteLibraryRequest
func NewLDAPWriteLibraryRequestWithDefaults ¶
func NewLDAPWriteLibraryRequestWithDefaults() *LDAPWriteLibraryRequest
NewLDAPWriteLibraryRequestWithDefaults instantiates a new LDAPWriteLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPWriteLibraryRequest) MarshalJSON ¶
func (o LDAPWriteLibraryRequest) MarshalJSON() ([]byte, error)
type LDAPWriteRoleRequest ¶
type LDAPWriteRoleRequest struct { // LDIF string used to create new entities within the LDAP system. This LDIF can be templated. CreationLdif string `json:"creation_ldif"` // Default TTL for dynamic credentials DefaultTtl int32 `json:"default_ttl"` // LDIF string used to delete entities created within the LDAP system. This LDIF can be templated. DeletionLdif string `json:"deletion_ldif"` // Max TTL a dynamic credential can be extended to MaxTtl int32 `json:"max_ttl"` // LDIF string used to rollback changes in the event of a failure to create credentials. This LDIF can be templated. RollbackLdif string `json:"rollback_ldif"` // The template used to create a username UsernameTemplate string `json:"username_template"` }
LDAPWriteRoleRequest struct for LDAPWriteRoleRequest
func NewLDAPWriteRoleRequestWithDefaults ¶
func NewLDAPWriteRoleRequestWithDefaults() *LDAPWriteRoleRequest
NewLDAPWriteRoleRequestWithDefaults instantiates a new LDAPWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPWriteRoleRequest) MarshalJSON ¶
func (o LDAPWriteRoleRequest) MarshalJSON() ([]byte, error)
type LDAPWriteStaticRoleRequest ¶
type LDAPWriteStaticRoleRequest struct { // The distinguished name of the entry to manage. Dn string `json:"dn"` // Period for automatic credential rotation of the given entry. RotationPeriod int32 `json:"rotation_period"` // The username/logon name for the entry with which this role will be associated. Username string `json:"username"` }
LDAPWriteStaticRoleRequest struct for LDAPWriteStaticRoleRequest
func NewLDAPWriteStaticRoleRequestWithDefaults ¶
func NewLDAPWriteStaticRoleRequestWithDefaults() *LDAPWriteStaticRoleRequest
NewLDAPWriteStaticRoleRequestWithDefaults instantiates a new LDAPWriteStaticRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPWriteStaticRoleRequest) MarshalJSON ¶
func (o LDAPWriteStaticRoleRequest) MarshalJSON() ([]byte, error)
type LDAPWriteUserRequest ¶
type LDAPWriteUserRequest struct { // Comma-separated list of additional groups associated with the user. Groups []string `json:"groups"` // Comma-separated list of policies associated with the user. Policies []string `json:"policies"` }
LDAPWriteUserRequest struct for LDAPWriteUserRequest
func NewLDAPWriteUserRequestWithDefaults ¶
func NewLDAPWriteUserRequestWithDefaults() *LDAPWriteUserRequest
NewLDAPWriteUserRequestWithDefaults instantiates a new LDAPWriteUserRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (LDAPWriteUserRequest) MarshalJSON ¶
func (o LDAPWriteUserRequest) MarshalJSON() ([]byte, error)
type MFAMethodAdminDestroyTOTPRequest ¶
type MFAMethodAdminDestroyTOTPRequest struct { // Identifier of the entity from which the MFA method secret needs to be removed. EntityId string `json:"entity_id"` // The unique identifier for this MFA method. MethodId string `json:"method_id"` }
MFAMethodAdminDestroyTOTPRequest struct for MFAMethodAdminDestroyTOTPRequest
func NewMFAMethodAdminDestroyTOTPRequestWithDefaults ¶
func NewMFAMethodAdminDestroyTOTPRequestWithDefaults() *MFAMethodAdminDestroyTOTPRequest
NewMFAMethodAdminDestroyTOTPRequestWithDefaults instantiates a new MFAMethodAdminDestroyTOTPRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MFAMethodAdminDestroyTOTPRequest) MarshalJSON ¶
func (o MFAMethodAdminDestroyTOTPRequest) MarshalJSON() ([]byte, error)
type MFAMethodAdminGenerateTOTPRequest ¶
type MFAMethodAdminGenerateTOTPRequest struct { // Entity ID on which the generated secret needs to get stored. EntityId string `json:"entity_id"` // The unique identifier for this MFA method. MethodId string `json:"method_id"` }
MFAMethodAdminGenerateTOTPRequest struct for MFAMethodAdminGenerateTOTPRequest
func NewMFAMethodAdminGenerateTOTPRequestWithDefaults ¶
func NewMFAMethodAdminGenerateTOTPRequestWithDefaults() *MFAMethodAdminGenerateTOTPRequest
NewMFAMethodAdminGenerateTOTPRequestWithDefaults instantiates a new MFAMethodAdminGenerateTOTPRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MFAMethodAdminGenerateTOTPRequest) MarshalJSON ¶
func (o MFAMethodAdminGenerateTOTPRequest) MarshalJSON() ([]byte, error)
type MFAMethodGenerateTOTPRequest ¶
type MFAMethodGenerateTOTPRequest struct { // The unique identifier for this MFA method. MethodId string `json:"method_id"` }
MFAMethodGenerateTOTPRequest struct for MFAMethodGenerateTOTPRequest
func NewMFAMethodGenerateTOTPRequestWithDefaults ¶
func NewMFAMethodGenerateTOTPRequestWithDefaults() *MFAMethodGenerateTOTPRequest
NewMFAMethodGenerateTOTPRequestWithDefaults instantiates a new MFAMethodGenerateTOTPRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MFAMethodGenerateTOTPRequest) MarshalJSON ¶
func (o MFAMethodGenerateTOTPRequest) MarshalJSON() ([]byte, error)
type MFAMethodWriteDuoRequest ¶
type MFAMethodWriteDuoRequest struct { // API host name for Duo. ApiHostname string `json:"api_hostname"` // Integration key for Duo. IntegrationKey string `json:"integration_key"` // The unique identifier for this MFA method. MethodId string `json:"method_id"` // Push information for Duo. PushInfo string `json:"push_info"` // Secret key for Duo. SecretKey string `json:"secret_key"` // If true, the user is reminded to use the passcode upon MFA validation. This option does not enforce using the passcode. Defaults to false. UsePasscode bool `json:"use_passcode"` // A template string for mapping Identity names to MFA method names. Values to subtitute should be placed in {{}}. For example, \"{{alias.name}}@example.com\". Currently-supported mappings: alias.name: The name returned by the mount configured via the mount_accessor parameter If blank, the Alias's name field will be used as-is. UsernameFormat string `json:"username_format"` }
MFAMethodWriteDuoRequest struct for MFAMethodWriteDuoRequest
func NewMFAMethodWriteDuoRequestWithDefaults ¶
func NewMFAMethodWriteDuoRequestWithDefaults() *MFAMethodWriteDuoRequest
NewMFAMethodWriteDuoRequestWithDefaults instantiates a new MFAMethodWriteDuoRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MFAMethodWriteDuoRequest) MarshalJSON ¶
func (o MFAMethodWriteDuoRequest) MarshalJSON() ([]byte, error)
type MFAMethodWriteOktaRequest ¶
type MFAMethodWriteOktaRequest struct { // Okta API key. ApiToken string `json:"api_token"` // The base domain to use for the Okta API. When not specified in the configuration, \"okta.com\" is used. BaseUrl string `json:"base_url"` // The unique identifier for this MFA method. MethodId string `json:"method_id"` // Name of the organization to be used in the Okta API. OrgName string `json:"org_name"` // If true, the username will only match the primary email for the account. Defaults to false. PrimaryEmail bool `json:"primary_email"` // (DEPRECATED) Use base_url instead. Production bool `json:"production"` // A template string for mapping Identity names to MFA method names. Values to substitute should be placed in {{}}. For example, \"{{entity.name}}@example.com\". If blank, the Entity's name field will be used as-is. UsernameFormat string `json:"username_format"` }
MFAMethodWriteOktaRequest struct for MFAMethodWriteOktaRequest
func NewMFAMethodWriteOktaRequestWithDefaults ¶
func NewMFAMethodWriteOktaRequestWithDefaults() *MFAMethodWriteOktaRequest
NewMFAMethodWriteOktaRequestWithDefaults instantiates a new MFAMethodWriteOktaRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MFAMethodWriteOktaRequest) MarshalJSON ¶
func (o MFAMethodWriteOktaRequest) MarshalJSON() ([]byte, error)
type MFAMethodWritePingIDRequest ¶
type MFAMethodWritePingIDRequest struct { // The unique identifier for this MFA method. MethodId string `json:"method_id"` // The settings file provided by Ping, Base64-encoded. This must be a settings file suitable for third-party clients, not the PingID SDK or PingFederate. SettingsFileBase64 string `json:"settings_file_base64"` // A template string for mapping Identity names to MFA method names. Values to subtitute should be placed in {{}}. For example, \"{{alias.name}}@example.com\". Currently-supported mappings: alias.name: The name returned by the mount configured via the mount_accessor parameter If blank, the Alias's name field will be used as-is. UsernameFormat string `json:"username_format"` }
MFAMethodWritePingIDRequest struct for MFAMethodWritePingIDRequest
func NewMFAMethodWritePingIDRequestWithDefaults ¶
func NewMFAMethodWritePingIDRequestWithDefaults() *MFAMethodWritePingIDRequest
NewMFAMethodWritePingIDRequestWithDefaults instantiates a new MFAMethodWritePingIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MFAMethodWritePingIDRequest) MarshalJSON ¶
func (o MFAMethodWritePingIDRequest) MarshalJSON() ([]byte, error)
type MFAMethodWriteTOTPRequest ¶
type MFAMethodWriteTOTPRequest struct { // The hashing algorithm used to generate the TOTP token. Options include SHA1, SHA256 and SHA512. Algorithm string `json:"algorithm"` // The number of digits in the generated TOTP token. This value can either be 6 or 8. Digits int32 `json:"digits"` // The name of the key's issuing organization. Issuer string `json:"issuer"` // Determines the size in bytes of the generated key. KeySize int32 `json:"key_size"` // Max number of allowed validation attempts. MaxValidationAttempts int32 `json:"max_validation_attempts"` // The unique identifier for this MFA method. MethodId string `json:"method_id"` // The length of time used to generate a counter for the TOTP token calculation. Period int32 `json:"period"` // The pixel size of the generated square QR code. QrSize int32 `json:"qr_size"` // The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. Skew int32 `json:"skew"` }
MFAMethodWriteTOTPRequest struct for MFAMethodWriteTOTPRequest
func NewMFAMethodWriteTOTPRequestWithDefaults ¶
func NewMFAMethodWriteTOTPRequestWithDefaults() *MFAMethodWriteTOTPRequest
NewMFAMethodWriteTOTPRequestWithDefaults instantiates a new MFAMethodWriteTOTPRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MFAMethodWriteTOTPRequest) MarshalJSON ¶
func (o MFAMethodWriteTOTPRequest) MarshalJSON() ([]byte, error)
type MFAValidateRequest ¶
type MFAValidateRequest struct { // A map from MFA method ID to a slice of passcodes or an empty slice if the method does not use passcodes MfaPayload map[string]interface{} `json:"mfa_payload"` // ID for this MFA request MfaRequestId string `json:"mfa_request_id"` }
MFAValidateRequest struct for MFAValidateRequest
func NewMFAValidateRequestWithDefaults ¶
func NewMFAValidateRequestWithDefaults() *MFAValidateRequest
NewMFAValidateRequestWithDefaults instantiates a new MFAValidateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MFAValidateRequest) MarshalJSON ¶
func (o MFAValidateRequest) MarshalJSON() ([]byte, error)
type MFAWriteLoginEnforcementRequest ¶
type MFAWriteLoginEnforcementRequest struct { // Array of auth mount accessor IDs AuthMethodAccessors []string `json:"auth_method_accessors"` // Array of auth mount types AuthMethodTypes []string `json:"auth_method_types"` // Array of identity entity IDs IdentityEntityIds []string `json:"identity_entity_ids"` // Array of identity group IDs IdentityGroupIds []string `json:"identity_group_ids"` // Array of Method IDs that determine what methods will be enforced MfaMethodIds []string `json:"mfa_method_ids"` }
MFAWriteLoginEnforcementRequest struct for MFAWriteLoginEnforcementRequest
func NewMFAWriteLoginEnforcementRequestWithDefaults ¶
func NewMFAWriteLoginEnforcementRequestWithDefaults() *MFAWriteLoginEnforcementRequest
NewMFAWriteLoginEnforcementRequestWithDefaults instantiates a new MFAWriteLoginEnforcementRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MFAWriteLoginEnforcementRequest) MarshalJSON ¶
func (o MFAWriteLoginEnforcementRequest) MarshalJSON() ([]byte, error)
type MongoDBAtlasWriteConfigRequest ¶
type MongoDBAtlasWriteConfigRequest struct { // MongoDB Atlas Programmatic Private Key PrivateKey string `json:"private_key"` // MongoDB Atlas Programmatic Public Key PublicKey string `json:"public_key"` }
MongoDBAtlasWriteConfigRequest struct for MongoDBAtlasWriteConfigRequest
func NewMongoDBAtlasWriteConfigRequestWithDefaults ¶
func NewMongoDBAtlasWriteConfigRequestWithDefaults() *MongoDBAtlasWriteConfigRequest
NewMongoDBAtlasWriteConfigRequestWithDefaults instantiates a new MongoDBAtlasWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MongoDBAtlasWriteConfigRequest) MarshalJSON ¶
func (o MongoDBAtlasWriteConfigRequest) MarshalJSON() ([]byte, error)
type MongoDBAtlasWriteRoleRequest ¶
type MongoDBAtlasWriteRoleRequest struct { // Access list entry in CIDR notation to be added for the API key. Optional for organization and project keys. CidrBlocks []string `json:"cidr_blocks"` // IP address to be added to the access list for the API key. Optional for organization and project keys. IpAddresses []string `json:"ip_addresses"` // The maximum allowed lifetime of credentials issued using this role. MaxTtl int32 `json:"max_ttl"` // Organization ID required for an organization API key OrganizationId string `json:"organization_id"` // Project ID the project API key belongs to. ProjectId string `json:"project_id"` // Roles assigned when an organization API Key is assigned to a project API key ProjectRoles []string `json:"project_roles"` // List of roles that the API Key should be granted. A minimum of one role must be provided. Any roles provided must be valid for the assigned Project, required for organization and project keys. Roles []string `json:"roles"` // Duration in seconds after which the issued credential should expire. Defaults to 0, in which case the value will fallback to the system/mount defaults. Ttl int32 `json:"ttl"` }
MongoDBAtlasWriteRoleRequest struct for MongoDBAtlasWriteRoleRequest
func NewMongoDBAtlasWriteRoleRequestWithDefaults ¶
func NewMongoDBAtlasWriteRoleRequestWithDefaults() *MongoDBAtlasWriteRoleRequest
NewMongoDBAtlasWriteRoleRequestWithDefaults instantiates a new MongoDBAtlasWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (MongoDBAtlasWriteRoleRequest) MarshalJSON ¶
func (o MongoDBAtlasWriteRoleRequest) MarshalJSON() ([]byte, error)
type NomadWriteAccessConfigRequest ¶
type NomadWriteAccessConfigRequest struct { // Nomad server address Address string `json:"address"` // CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. CaCert string `json:"ca_cert"` // Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. ClientCert string `json:"client_cert"` // Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. ClientKey string `json:"client_key"` // Max length for name of generated Nomad tokens MaxTokenNameLength int32 `json:"max_token_name_length"` // Token for API calls Token string `json:"token"` }
NomadWriteAccessConfigRequest struct for NomadWriteAccessConfigRequest
func NewNomadWriteAccessConfigRequestWithDefaults ¶
func NewNomadWriteAccessConfigRequestWithDefaults() *NomadWriteAccessConfigRequest
NewNomadWriteAccessConfigRequestWithDefaults instantiates a new NomadWriteAccessConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (NomadWriteAccessConfigRequest) MarshalJSON ¶
func (o NomadWriteAccessConfigRequest) MarshalJSON() ([]byte, error)
type NomadWriteLeaseConfigRequest ¶
type NomadWriteLeaseConfigRequest struct { // Duration after which the issued token should not be allowed to be renewed MaxTtl int32 `json:"max_ttl"` // Duration before which the issued token needs renewal Ttl int32 `json:"ttl"` }
NomadWriteLeaseConfigRequest struct for NomadWriteLeaseConfigRequest
func NewNomadWriteLeaseConfigRequestWithDefaults ¶
func NewNomadWriteLeaseConfigRequestWithDefaults() *NomadWriteLeaseConfigRequest
NewNomadWriteLeaseConfigRequestWithDefaults instantiates a new NomadWriteLeaseConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (NomadWriteLeaseConfigRequest) MarshalJSON ¶
func (o NomadWriteLeaseConfigRequest) MarshalJSON() ([]byte, error)
type NomadWriteRoleRequest ¶
type NomadWriteRoleRequest struct { // Boolean value describing if the token should be global or not. Defaults to false. Global bool `json:"global"` // Comma-separated string or list of policies as previously created in Nomad. Required for 'client' token. Policies []string `json:"policies"` // Which type of token to create: 'client' or 'management'. If a 'management' token, the \"policies\" parameter is not required. Defaults to 'client'. Type string `json:"type"` }
NomadWriteRoleRequest struct for NomadWriteRoleRequest
func NewNomadWriteRoleRequestWithDefaults ¶
func NewNomadWriteRoleRequestWithDefaults() *NomadWriteRoleRequest
NewNomadWriteRoleRequestWithDefaults instantiates a new NomadWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (NomadWriteRoleRequest) MarshalJSON ¶
func (o NomadWriteRoleRequest) MarshalJSON() ([]byte, error)
type OCILoginWithRoleRequest ¶
type OCILoginWithRoleRequest struct { // The signed headers of the client RequestHeaders string `json:"request_headers"` }
OCILoginWithRoleRequest struct for OCILoginWithRoleRequest
func NewOCILoginWithRoleRequestWithDefaults ¶
func NewOCILoginWithRoleRequestWithDefaults() *OCILoginWithRoleRequest
NewOCILoginWithRoleRequestWithDefaults instantiates a new OCILoginWithRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OCILoginWithRoleRequest) MarshalJSON ¶
func (o OCILoginWithRoleRequest) MarshalJSON() ([]byte, error)
type OCIWriteConfigRequest ¶
type OCIWriteConfigRequest struct { // The tenancy id of the account. HomeTenancyId string `json:"home_tenancy_id"` }
OCIWriteConfigRequest struct for OCIWriteConfigRequest
func NewOCIWriteConfigRequestWithDefaults ¶
func NewOCIWriteConfigRequestWithDefaults() *OCIWriteConfigRequest
NewOCIWriteConfigRequestWithDefaults instantiates a new OCIWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OCIWriteConfigRequest) MarshalJSON ¶
func (o OCIWriteConfigRequest) MarshalJSON() ([]byte, error)
type OCIWriteRoleRequest ¶
type OCIWriteRoleRequest struct { // A comma separated list of Group or Dynamic Group OCIDs that are allowed to take this role. OcidList []string `json:"ocid_list"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` }
OCIWriteRoleRequest struct for OCIWriteRoleRequest
func NewOCIWriteRoleRequestWithDefaults ¶
func NewOCIWriteRoleRequestWithDefaults() *OCIWriteRoleRequest
NewOCIWriteRoleRequestWithDefaults instantiates a new OCIWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OCIWriteRoleRequest) MarshalJSON ¶
func (o OCIWriteRoleRequest) MarshalJSON() ([]byte, error)
type OIDCIntrospectRequest ¶
type OIDCIntrospectRequest struct { // Optional client_id to verify ClientId string `json:"client_id"` // Token to verify Token string `json:"token"` }
OIDCIntrospectRequest struct for OIDCIntrospectRequest
func NewOIDCIntrospectRequestWithDefaults ¶
func NewOIDCIntrospectRequestWithDefaults() *OIDCIntrospectRequest
NewOIDCIntrospectRequestWithDefaults instantiates a new OIDCIntrospectRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCIntrospectRequest) MarshalJSON ¶
func (o OIDCIntrospectRequest) MarshalJSON() ([]byte, error)
type OIDCLoginRequest ¶
type OIDCLoginRequest struct { // The signed JWT to validate. Jwt string `json:"jwt"` // The role to log in against. Role string `json:"role"` }
OIDCLoginRequest struct for OIDCLoginRequest
func NewOIDCLoginRequestWithDefaults ¶
func NewOIDCLoginRequestWithDefaults() *OIDCLoginRequest
NewOIDCLoginRequestWithDefaults instantiates a new OIDCLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCLoginRequest) MarshalJSON ¶
func (o OIDCLoginRequest) MarshalJSON() ([]byte, error)
type OIDCRotateKeyRequest ¶
type OIDCRotateKeyRequest struct { // Controls how long the public portion of a key will be available for verification after being rotated. Setting verification_ttl here will override the verification_ttl set on the key. VerificationTtl int32 `json:"verification_ttl"` }
OIDCRotateKeyRequest struct for OIDCRotateKeyRequest
func NewOIDCRotateKeyRequestWithDefaults ¶
func NewOIDCRotateKeyRequestWithDefaults() *OIDCRotateKeyRequest
NewOIDCRotateKeyRequestWithDefaults instantiates a new OIDCRotateKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCRotateKeyRequest) MarshalJSON ¶
func (o OIDCRotateKeyRequest) MarshalJSON() ([]byte, error)
type OIDCWriteAssignmentRequest ¶
type OIDCWriteAssignmentRequest struct { // Comma separated string or array of identity entity IDs EntityIds []string `json:"entity_ids"` // Comma separated string or array of identity group IDs GroupIds []string `json:"group_ids"` }
OIDCWriteAssignmentRequest struct for OIDCWriteAssignmentRequest
func NewOIDCWriteAssignmentRequestWithDefaults ¶
func NewOIDCWriteAssignmentRequestWithDefaults() *OIDCWriteAssignmentRequest
NewOIDCWriteAssignmentRequestWithDefaults instantiates a new OIDCWriteAssignmentRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteAssignmentRequest) MarshalJSON ¶
func (o OIDCWriteAssignmentRequest) MarshalJSON() ([]byte, error)
type OIDCWriteAuthConfigRequest ¶
type OIDCWriteAuthConfigRequest struct { // The value against which to match the 'iss' claim in a JWT. Optional. BoundIssuer string `json:"bound_issuer"` // The default role to use if none is provided during login. If not set, a role is required during login. DefaultRole string `json:"default_role"` // The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used. JwksCaPem string `json:"jwks_ca_pem"` // JWKS URL to use to authenticate signatures. Cannot be used with \"oidc_discovery_url\" or \"jwt_validation_pubkeys\". JwksUrl string `json:"jwks_url"` // A list of supported signing algorithms. Defaults to RS256. JwtSupportedAlgs []string `json:"jwt_supported_algs"` // A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with \"jwks_url\" or \"oidc_discovery_url\". JwtValidationPubkeys []string `json:"jwt_validation_pubkeys"` // Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. NamespaceInState bool `json:"namespace_in_state"` // The OAuth Client ID configured with your OIDC provider. OidcClientId string `json:"oidc_client_id"` // The OAuth Client Secret configured with your OIDC provider. OidcClientSecret string `json:"oidc_client_secret"` // The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used. OidcDiscoveryCaPem string `json:"oidc_discovery_ca_pem"` // OIDC Discovery URL, without any .well-known component (base path). Cannot be used with \"jwks_url\" or \"jwt_validation_pubkeys\". OidcDiscoveryUrl string `json:"oidc_discovery_url"` // The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. OidcResponseMode string `json:"oidc_response_mode"` // The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. OidcResponseTypes []string `json:"oidc_response_types"` // Provider-specific configuration. Optional. ProviderConfig map[string]interface{} `json:"provider_config"` }
OIDCWriteAuthConfigRequest struct for OIDCWriteAuthConfigRequest
func NewOIDCWriteAuthConfigRequestWithDefaults ¶
func NewOIDCWriteAuthConfigRequestWithDefaults() *OIDCWriteAuthConfigRequest
NewOIDCWriteAuthConfigRequestWithDefaults instantiates a new OIDCWriteAuthConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteAuthConfigRequest) MarshalJSON ¶
func (o OIDCWriteAuthConfigRequest) MarshalJSON() ([]byte, error)
type OIDCWriteAuthRoleRequest ¶
type OIDCWriteAuthRoleRequest struct { // Comma-separated list of allowed values for redirect_uri AllowedRedirectUris []string `json:"allowed_redirect_uris"` // Comma-separated list of 'aud' claims that are valid for login; any match is sufficient BoundAudiences []string `json:"bound_audiences"` // Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used. // Deprecated BoundCidrs []string `json:"bound_cidrs"` // Map of claims/values which must match for login BoundClaims map[string]interface{} `json:"bound_claims"` // How to interpret values in the map of claims/values (which must match for login): allowed values are 'string' or 'glob' BoundClaimsType string `json:"bound_claims_type"` // The 'sub' claim that is valid for login. Optional. BoundSubject string `json:"bound_subject"` // Mappings of claims (key) that will be copied to a metadata field (value) ClaimMappings map[string]interface{} `json:"claim_mappings"` // Duration in seconds of leeway when validating all claims to account for clock skew. Defaults to 60 (1 minute) if set to 0 and can be disabled if set to -1. ClockSkewLeeway int32 `json:"clock_skew_leeway"` // Duration in seconds of leeway when validating expiration of a token to account for clock skew. Defaults to 150 (2.5 minutes) if set to 0 and can be disabled if set to -1. ExpirationLeeway int32 `json:"expiration_leeway"` // The claim to use for the Identity group alias names GroupsClaim string `json:"groups_claim"` // Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. MaxAge int32 `json:"max_age"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Duration in seconds of leeway when validating not before values of a token to account for clock skew. Defaults to 150 (2.5 minutes) if set to 0 and can be disabled if set to -1. NotBeforeLeeway int32 `json:"not_before_leeway"` // Use \"token_num_uses\" instead. If this and \"token_num_uses\" are both specified, only \"token_num_uses\" will be used. // Deprecated NumUses int32 `json:"num_uses"` // Comma-separated list of OIDC scopes OidcScopes []string `json:"oidc_scopes"` // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated Period int32 `json:"period"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Type of the role, either 'jwt' or 'oidc'. RoleType string `json:"role_type"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` // The claim to use for the Identity entity alias name UserClaim string `json:"user_claim"` // If true, the user_claim value will use JSON pointer syntax for referencing claims. UserClaimJsonPointer bool `json:"user_claim_json_pointer"` // Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. VerboseOidcLogging bool `json:"verbose_oidc_logging"` }
OIDCWriteAuthRoleRequest struct for OIDCWriteAuthRoleRequest
func NewOIDCWriteAuthRoleRequestWithDefaults ¶
func NewOIDCWriteAuthRoleRequestWithDefaults() *OIDCWriteAuthRoleRequest
NewOIDCWriteAuthRoleRequestWithDefaults instantiates a new OIDCWriteAuthRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteAuthRoleRequest) MarshalJSON ¶
func (o OIDCWriteAuthRoleRequest) MarshalJSON() ([]byte, error)
type OIDCWriteAuthURLRequest ¶
type OIDCWriteAuthURLRequest struct { // Optional client-provided nonce that must match during callback, if present. ClientNonce string `json:"client_nonce"` // The OAuth redirect_uri to use in the authorization URL. RedirectUri string `json:"redirect_uri"` // The role to issue an OIDC authorization URL against. Role string `json:"role"` }
OIDCWriteAuthURLRequest struct for OIDCWriteAuthURLRequest
func NewOIDCWriteAuthURLRequestWithDefaults ¶
func NewOIDCWriteAuthURLRequestWithDefaults() *OIDCWriteAuthURLRequest
NewOIDCWriteAuthURLRequestWithDefaults instantiates a new OIDCWriteAuthURLRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteAuthURLRequest) MarshalJSON ¶
func (o OIDCWriteAuthURLRequest) MarshalJSON() ([]byte, error)
type OIDCWriteCallbackRequest ¶
type OIDCWriteCallbackRequest struct { ClientNonce string `json:"client_nonce"` Code string `json:"code"` IdToken string `json:"id_token"` State string `json:"state"` }
OIDCWriteCallbackRequest struct for OIDCWriteCallbackRequest
func NewOIDCWriteCallbackRequestWithDefaults ¶
func NewOIDCWriteCallbackRequestWithDefaults() *OIDCWriteCallbackRequest
NewOIDCWriteCallbackRequestWithDefaults instantiates a new OIDCWriteCallbackRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteCallbackRequest) MarshalJSON ¶
func (o OIDCWriteCallbackRequest) MarshalJSON() ([]byte, error)
type OIDCWriteClientRequest ¶
type OIDCWriteClientRequest struct { // The time-to-live for access tokens obtained by the client. AccessTokenTtl int32 `json:"access_token_ttl"` // Comma separated string or array of assignment resources. Assignments []string `json:"assignments"` // The client type based on its ability to maintain confidentiality of credentials. The following client types are supported: 'confidential', 'public'. Defaults to 'confidential'. ClientType string `json:"client_type"` // The time-to-live for ID tokens obtained by the client. IdTokenTtl int32 `json:"id_token_ttl"` // A reference to a named key resource. Cannot be modified after creation. Defaults to the 'default' key. Key string `json:"key"` // Comma separated string or array of redirect URIs used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. RedirectUris []string `json:"redirect_uris"` }
OIDCWriteClientRequest struct for OIDCWriteClientRequest
func NewOIDCWriteClientRequestWithDefaults ¶
func NewOIDCWriteClientRequestWithDefaults() *OIDCWriteClientRequest
NewOIDCWriteClientRequestWithDefaults instantiates a new OIDCWriteClientRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteClientRequest) MarshalJSON ¶
func (o OIDCWriteClientRequest) MarshalJSON() ([]byte, error)
type OIDCWriteConfigRequest ¶
type OIDCWriteConfigRequest struct { // Issuer URL to be used in the iss claim of the token. If not set, Vault's app_addr will be used. Issuer string `json:"issuer"` }
OIDCWriteConfigRequest struct for OIDCWriteConfigRequest
func NewOIDCWriteConfigRequestWithDefaults ¶
func NewOIDCWriteConfigRequestWithDefaults() *OIDCWriteConfigRequest
NewOIDCWriteConfigRequestWithDefaults instantiates a new OIDCWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteConfigRequest) MarshalJSON ¶
func (o OIDCWriteConfigRequest) MarshalJSON() ([]byte, error)
type OIDCWriteKeyRequest ¶
type OIDCWriteKeyRequest struct { // Signing algorithm to use. This will default to RS256. Algorithm string `json:"algorithm"` // Comma separated string or array of role client ids allowed to use this key for signing. If empty no roles are allowed. If \"*\" all roles are allowed. AllowedClientIds []string `json:"allowed_client_ids"` // How often to generate a new keypair. RotationPeriod int32 `json:"rotation_period"` // Controls how long the public portion of a key will be available for verification after being rotated. VerificationTtl int32 `json:"verification_ttl"` }
OIDCWriteKeyRequest struct for OIDCWriteKeyRequest
func NewOIDCWriteKeyRequestWithDefaults ¶
func NewOIDCWriteKeyRequestWithDefaults() *OIDCWriteKeyRequest
NewOIDCWriteKeyRequestWithDefaults instantiates a new OIDCWriteKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteKeyRequest) MarshalJSON ¶
func (o OIDCWriteKeyRequest) MarshalJSON() ([]byte, error)
type OIDCWriteProviderAuthorizeRequest ¶
type OIDCWriteProviderAuthorizeRequest struct { // The ID of the requesting client. ClientId string `json:"client_id"` // The code challenge derived from the code verifier. CodeChallenge string `json:"code_challenge"` // The method that was used to derive the code challenge. The following methods are supported: 'S256', 'plain'. Defaults to 'plain'. CodeChallengeMethod string `json:"code_challenge_method"` // The allowable elapsed time in seconds since the last time the end-user was actively authenticated. MaxAge int32 `json:"max_age"` // The value that will be returned in the ID token nonce claim after a token exchange. Nonce string `json:"nonce"` // The redirection URI to which the response will be sent. RedirectUri string `json:"redirect_uri"` // The OIDC authentication flow to be used. The following response types are supported: 'code' ResponseType string `json:"response_type"` // A space-delimited, case-sensitive list of scopes to be requested. The 'openid' scope is required. Scope string `json:"scope"` // The value used to maintain state between the authentication request and client. State string `json:"state"` }
OIDCWriteProviderAuthorizeRequest struct for OIDCWriteProviderAuthorizeRequest
func NewOIDCWriteProviderAuthorizeRequestWithDefaults ¶
func NewOIDCWriteProviderAuthorizeRequestWithDefaults() *OIDCWriteProviderAuthorizeRequest
NewOIDCWriteProviderAuthorizeRequestWithDefaults instantiates a new OIDCWriteProviderAuthorizeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteProviderAuthorizeRequest) MarshalJSON ¶
func (o OIDCWriteProviderAuthorizeRequest) MarshalJSON() ([]byte, error)
type OIDCWriteProviderRequest ¶
type OIDCWriteProviderRequest struct { // The client IDs that are permitted to use the provider AllowedClientIds []string `json:"allowed_client_ids"` // Specifies what will be used for the iss claim of ID tokens. Issuer string `json:"issuer"` // The scopes supported for requesting on the provider ScopesSupported []string `json:"scopes_supported"` }
OIDCWriteProviderRequest struct for OIDCWriteProviderRequest
func NewOIDCWriteProviderRequestWithDefaults ¶
func NewOIDCWriteProviderRequestWithDefaults() *OIDCWriteProviderRequest
NewOIDCWriteProviderRequestWithDefaults instantiates a new OIDCWriteProviderRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteProviderRequest) MarshalJSON ¶
func (o OIDCWriteProviderRequest) MarshalJSON() ([]byte, error)
type OIDCWriteProviderTokenRequest ¶
type OIDCWriteProviderTokenRequest struct { // The ID of the requesting client. ClientId string `json:"client_id"` // The secret of the requesting client. ClientSecret string `json:"client_secret"` // The authorization code received from the provider's authorization endpoint. Code string `json:"code"` // The code verifier associated with the authorization code. CodeVerifier string `json:"code_verifier"` // The authorization grant type. The following grant types are supported: 'authorization_code'. GrantType string `json:"grant_type"` // The callback location where the authentication response was sent. RedirectUri string `json:"redirect_uri"` }
OIDCWriteProviderTokenRequest struct for OIDCWriteProviderTokenRequest
func NewOIDCWriteProviderTokenRequestWithDefaults ¶
func NewOIDCWriteProviderTokenRequestWithDefaults() *OIDCWriteProviderTokenRequest
NewOIDCWriteProviderTokenRequestWithDefaults instantiates a new OIDCWriteProviderTokenRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteProviderTokenRequest) MarshalJSON ¶
func (o OIDCWriteProviderTokenRequest) MarshalJSON() ([]byte, error)
type OIDCWriteRoleRequest ¶
type OIDCWriteRoleRequest struct { // Optional client_id ClientId string `json:"client_id"` // The OIDC key to use for generating tokens. The specified key must already exist. Key string `json:"key"` // The template string to use for generating tokens. This may be in string-ified JSON or base64 format. Template string `json:"template"` // TTL of the tokens generated against the role. Ttl int32 `json:"ttl"` }
OIDCWriteRoleRequest struct for OIDCWriteRoleRequest
func NewOIDCWriteRoleRequestWithDefaults ¶
func NewOIDCWriteRoleRequestWithDefaults() *OIDCWriteRoleRequest
NewOIDCWriteRoleRequestWithDefaults instantiates a new OIDCWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteRoleRequest) MarshalJSON ¶
func (o OIDCWriteRoleRequest) MarshalJSON() ([]byte, error)
type OIDCWriteScopeRequest ¶
type OIDCWriteScopeRequest struct { // The description of the scope Description string `json:"description"` // The template string to use for the scope. This may be in string-ified JSON or base64 format. Template string `json:"template"` }
OIDCWriteScopeRequest struct for OIDCWriteScopeRequest
func NewOIDCWriteScopeRequestWithDefaults ¶
func NewOIDCWriteScopeRequestWithDefaults() *OIDCWriteScopeRequest
NewOIDCWriteScopeRequestWithDefaults instantiates a new OIDCWriteScopeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OIDCWriteScopeRequest) MarshalJSON ¶
func (o OIDCWriteScopeRequest) MarshalJSON() ([]byte, error)
type OktaLoginRequest ¶
type OktaLoginRequest struct { // Nonce provided if performing login that requires number verification challenge. Logins through the vault login CLI command will automatically generate a nonce. Nonce string `json:"nonce"` // Password for this user. Password string `json:"password"` // Preferred factor provider. Provider string `json:"provider"` // TOTP passcode. Totp string `json:"totp"` }
OktaLoginRequest struct for OktaLoginRequest
func NewOktaLoginRequestWithDefaults ¶
func NewOktaLoginRequestWithDefaults() *OktaLoginRequest
NewOktaLoginRequestWithDefaults instantiates a new OktaLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OktaLoginRequest) MarshalJSON ¶
func (o OktaLoginRequest) MarshalJSON() ([]byte, error)
type OktaWriteConfigRequest ¶
type OktaWriteConfigRequest struct { // Okta API key. ApiToken string `json:"api_token"` // The base domain to use for the Okta API. When not specified in the configuration, \"okta.com\" is used. BaseUrl string `json:"base_url"` // When set true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. BypassOktaMfa bool `json:"bypass_okta_mfa"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Name of the organization to be used in the Okta API. OrgName string `json:"org_name"` // Use org_name instead. // Deprecated Organization string `json:"organization"` // Use base_url instead. // Deprecated Production bool `json:"production"` // Use api_token instead. // Deprecated Token string `json:"token"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies. This will apply to all tokens generated by this auth method, in addition to any configured for specific users/groups. TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` }
OktaWriteConfigRequest struct for OktaWriteConfigRequest
func NewOktaWriteConfigRequestWithDefaults ¶
func NewOktaWriteConfigRequestWithDefaults() *OktaWriteConfigRequest
NewOktaWriteConfigRequestWithDefaults instantiates a new OktaWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OktaWriteConfigRequest) MarshalJSON ¶
func (o OktaWriteConfigRequest) MarshalJSON() ([]byte, error)
type OktaWriteGroupRequest ¶
type OktaWriteGroupRequest struct { // Comma-separated list of policies associated to the group. Policies []string `json:"policies"` }
OktaWriteGroupRequest struct for OktaWriteGroupRequest
func NewOktaWriteGroupRequestWithDefaults ¶
func NewOktaWriteGroupRequestWithDefaults() *OktaWriteGroupRequest
NewOktaWriteGroupRequestWithDefaults instantiates a new OktaWriteGroupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OktaWriteGroupRequest) MarshalJSON ¶
func (o OktaWriteGroupRequest) MarshalJSON() ([]byte, error)
type OktaWriteUserRequest ¶
type OktaWriteUserRequest struct { // List of groups associated with the user. Groups []string `json:"groups"` // List of policies associated with the user. Policies []string `json:"policies"` }
OktaWriteUserRequest struct for OktaWriteUserRequest
func NewOktaWriteUserRequestWithDefaults ¶
func NewOktaWriteUserRequestWithDefaults() *OktaWriteUserRequest
NewOktaWriteUserRequestWithDefaults instantiates a new OktaWriteUserRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OktaWriteUserRequest) MarshalJSON ¶
func (o OktaWriteUserRequest) MarshalJSON() ([]byte, error)
type OpenLDAPCheckInLibraryRequest ¶
type OpenLDAPCheckInLibraryRequest struct { // The username/logon name for the service accounts to check in. ServiceAccountNames []string `json:"service_account_names"` }
OpenLDAPCheckInLibraryRequest struct for OpenLDAPCheckInLibraryRequest
func NewOpenLDAPCheckInLibraryRequestWithDefaults ¶
func NewOpenLDAPCheckInLibraryRequestWithDefaults() *OpenLDAPCheckInLibraryRequest
NewOpenLDAPCheckInLibraryRequestWithDefaults instantiates a new OpenLDAPCheckInLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OpenLDAPCheckInLibraryRequest) MarshalJSON ¶
func (o OpenLDAPCheckInLibraryRequest) MarshalJSON() ([]byte, error)
type OpenLDAPCheckInManageLibraryRequest ¶
type OpenLDAPCheckInManageLibraryRequest struct { // The username/logon name for the service accounts to check in. ServiceAccountNames []string `json:"service_account_names"` }
OpenLDAPCheckInManageLibraryRequest struct for OpenLDAPCheckInManageLibraryRequest
func NewOpenLDAPCheckInManageLibraryRequestWithDefaults ¶
func NewOpenLDAPCheckInManageLibraryRequestWithDefaults() *OpenLDAPCheckInManageLibraryRequest
NewOpenLDAPCheckInManageLibraryRequestWithDefaults instantiates a new OpenLDAPCheckInManageLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OpenLDAPCheckInManageLibraryRequest) MarshalJSON ¶
func (o OpenLDAPCheckInManageLibraryRequest) MarshalJSON() ([]byte, error)
type OpenLDAPCheckOutLibraryRequest ¶
type OpenLDAPCheckOutLibraryRequest struct { // The length of time before the check-out will expire, in seconds. Ttl int32 `json:"ttl"` }
OpenLDAPCheckOutLibraryRequest struct for OpenLDAPCheckOutLibraryRequest
func NewOpenLDAPCheckOutLibraryRequestWithDefaults ¶
func NewOpenLDAPCheckOutLibraryRequestWithDefaults() *OpenLDAPCheckOutLibraryRequest
NewOpenLDAPCheckOutLibraryRequestWithDefaults instantiates a new OpenLDAPCheckOutLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OpenLDAPCheckOutLibraryRequest) MarshalJSON ¶
func (o OpenLDAPCheckOutLibraryRequest) MarshalJSON() ([]byte, error)
type OpenLDAPWriteConfigRequest ¶
type OpenLDAPWriteConfigRequest struct { // Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). AnonymousGroupSearch bool `json:"anonymous_group_search"` // LDAP DN for searching for the user DN (optional) Binddn string `json:"binddn"` // LDAP password for searching for the user DN (optional) Bindpass string `json:"bindpass"` // If true, case sensitivity will be used when comparing usernames and groups for matching policies. CaseSensitiveNames bool `json:"case_sensitive_names"` // CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded (optional) Certificate string `json:"certificate"` // Client certificate to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsCert string `json:"client_tls_cert"` // Client certificate key to provide to the LDAP server, must be x509 PEM encoded (optional) ClientTlsKey string `json:"client_tls_key"` // Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true DenyNullBind bool `json:"deny_null_bind"` // Use anonymous bind to discover the bind DN of a user (optional) Discoverdn bool `json:"discoverdn"` // LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate user group membership. Examples: \"cn\" or \"memberOf\", etc. Default: cn Groupattr string `json:"groupattr"` // LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org) Groupdn string `json:"groupdn"` // Go template for querying group membership of user (optional) The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) Groupfilter string `json:"groupfilter"` // Skip LDAP server SSL Certificate verification - VERY insecure (optional) InsecureTls bool `json:"insecure_tls"` // The desired length of passwords that Vault generates. // Deprecated Length int32 `json:"length"` // The maximum password time-to-live. MaxTtl int32 `json:"max_ttl"` // Password policy to use to generate passwords PasswordPolicy string `json:"password_policy"` // Timeout, in seconds, for the connection when making requests against the server before returning back an error. RequestTimeout int32 `json:"request_timeout"` // The desired LDAP schema used when modifying user account passwords. Schema string `json:"schema"` // Issue a StartTLS command after establishing unencrypted connection (optional) Starttls bool `json:"starttls"` // Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' TlsMaxVersion string `json:"tls_max_version"` // Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12' TlsMinVersion string `json:"tls_min_version"` // The default password time-to-live. Ttl int32 `json:"ttl"` // Enables userPrincipalDomain login with [username]@UPNDomain (optional) Upndomain string `json:"upndomain"` // LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. Url string `json:"url"` // In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. UsePre111GroupCnBehavior bool `json:"use_pre111_group_cn_behavior"` // If true, use the Active Directory tokenGroups constructed attribute of the user to find the group memberships. This will find all security groups including nested ones. UseTokenGroups bool `json:"use_token_groups"` // Attribute used for users (default: cn) Userattr string `json:"userattr"` // LDAP domain to use for users (eg: ou=People,dc=example,dc=org) Userdn string `json:"userdn"` // Go template for LDAP user search filer (optional) The template can access the following context variables: UserAttr, Username Default: ({{.UserAttr}}={{.Username}}) Userfilter string `json:"userfilter"` // If true, sets the alias name to the username UsernameAsAlias bool `json:"username_as_alias"` }
OpenLDAPWriteConfigRequest struct for OpenLDAPWriteConfigRequest
func NewOpenLDAPWriteConfigRequestWithDefaults ¶
func NewOpenLDAPWriteConfigRequestWithDefaults() *OpenLDAPWriteConfigRequest
NewOpenLDAPWriteConfigRequestWithDefaults instantiates a new OpenLDAPWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OpenLDAPWriteConfigRequest) MarshalJSON ¶
func (o OpenLDAPWriteConfigRequest) MarshalJSON() ([]byte, error)
type OpenLDAPWriteLibraryRequest ¶
type OpenLDAPWriteLibraryRequest struct { // Disable the default behavior of requiring that check-ins are performed by the entity that checked them out. DisableCheckInEnforcement bool `json:"disable_check_in_enforcement"` // In seconds, the max amount of time a check-out's renewals should last. Defaults to 24 hours. MaxTtl int32 `json:"max_ttl"` // The username/logon name for the service accounts with which this set will be associated. ServiceAccountNames []string `json:"service_account_names"` // In seconds, the amount of time a check-out should last. Defaults to 24 hours. Ttl int32 `json:"ttl"` }
OpenLDAPWriteLibraryRequest struct for OpenLDAPWriteLibraryRequest
func NewOpenLDAPWriteLibraryRequestWithDefaults ¶
func NewOpenLDAPWriteLibraryRequestWithDefaults() *OpenLDAPWriteLibraryRequest
NewOpenLDAPWriteLibraryRequestWithDefaults instantiates a new OpenLDAPWriteLibraryRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OpenLDAPWriteLibraryRequest) MarshalJSON ¶
func (o OpenLDAPWriteLibraryRequest) MarshalJSON() ([]byte, error)
type OpenLDAPWriteRoleRequest ¶
type OpenLDAPWriteRoleRequest struct { // LDIF string used to create new entities within the LDAP system. This LDIF can be templated. CreationLdif string `json:"creation_ldif"` // Default TTL for dynamic credentials DefaultTtl int32 `json:"default_ttl"` // LDIF string used to delete entities created within the LDAP system. This LDIF can be templated. DeletionLdif string `json:"deletion_ldif"` // Max TTL a dynamic credential can be extended to MaxTtl int32 `json:"max_ttl"` // LDIF string used to rollback changes in the event of a failure to create credentials. This LDIF can be templated. RollbackLdif string `json:"rollback_ldif"` // The template used to create a username UsernameTemplate string `json:"username_template"` }
OpenLDAPWriteRoleRequest struct for OpenLDAPWriteRoleRequest
func NewOpenLDAPWriteRoleRequestWithDefaults ¶
func NewOpenLDAPWriteRoleRequestWithDefaults() *OpenLDAPWriteRoleRequest
NewOpenLDAPWriteRoleRequestWithDefaults instantiates a new OpenLDAPWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OpenLDAPWriteRoleRequest) MarshalJSON ¶
func (o OpenLDAPWriteRoleRequest) MarshalJSON() ([]byte, error)
type OpenLDAPWriteStaticRoleRequest ¶
type OpenLDAPWriteStaticRoleRequest struct { // The distinguished name of the entry to manage. Dn string `json:"dn"` // Period for automatic credential rotation of the given entry. RotationPeriod int32 `json:"rotation_period"` // The username/logon name for the entry with which this role will be associated. Username string `json:"username"` }
OpenLDAPWriteStaticRoleRequest struct for OpenLDAPWriteStaticRoleRequest
func NewOpenLDAPWriteStaticRoleRequestWithDefaults ¶
func NewOpenLDAPWriteStaticRoleRequestWithDefaults() *OpenLDAPWriteStaticRoleRequest
NewOpenLDAPWriteStaticRoleRequestWithDefaults instantiates a new OpenLDAPWriteStaticRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (OpenLDAPWriteStaticRoleRequest) MarshalJSON ¶
func (o OpenLDAPWriteStaticRoleRequest) MarshalJSON() ([]byte, error)
type PKIBundleWriteRequest ¶
type PKIBundleWriteRequest struct { // PEM-format, concatenated unencrypted secret-key (optional) and certificates. PemBundle string `json:"pem_bundle"` }
PKIBundleWriteRequest struct for PKIBundleWriteRequest
func NewPKIBundleWriteRequestWithDefaults ¶
func NewPKIBundleWriteRequestWithDefaults() *PKIBundleWriteRequest
NewPKIBundleWriteRequestWithDefaults instantiates a new PKIBundleWriteRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIBundleWriteRequest) MarshalJSON ¶
func (o PKIBundleWriteRequest) MarshalJSON() ([]byte, error)
type PKIGenerateRootRequest ¶
type PKIGenerateRootRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans. CommonName string `json:"common_name"` // If set, Country will be set to this value. Country []string `json:"country"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' IssuerName string `json:"issuer_name"` // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` // Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default' KeyName string `json:"key_name"` // Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key. KeyRef string `json:"key_ref"` // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. KeyType string `json:"key_type"` // If set, Locality will be set to this value. Locality []string `json:"locality"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types. ManagedKeyId string `json:"managed_key_id"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types. ManagedKeyName string `json:"managed_key_name"` // The maximum allowable path length MaxPathLength int32 `json:"max_path_length"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // The duration before now which the certificate needs to be backdated by. NotBeforeDuration int32 `json:"not_before_duration"` // If set, O (Organization) will be set to this value. Organization []string `json:"organization"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // If set, OU (OrganizationalUnit) will be set to this value. Ou []string `json:"ou"` // Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10). PermittedDnsDomains []string `json:"permitted_dns_domains"` // If set, Postal Code will be set to this value. PostalCode []string `json:"postal_code"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // If set, Province will be set to this value. Province []string `json:"province"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // If set, Street Address will be set to this value. StreetAddress []string `json:"street_address"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` }
PKIGenerateRootRequest struct for PKIGenerateRootRequest
func NewPKIGenerateRootRequestWithDefaults ¶
func NewPKIGenerateRootRequestWithDefaults() *PKIGenerateRootRequest
NewPKIGenerateRootRequestWithDefaults instantiates a new PKIGenerateRootRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIGenerateRootRequest) MarshalJSON ¶
func (o PKIGenerateRootRequest) MarshalJSON() ([]byte, error)
type PKIImportKeysRequest ¶
type PKIImportKeysRequest struct { // Optional name to be used for this key KeyName string `json:"key_name"` // PEM-format, unencrypted secret key PemBundle string `json:"pem_bundle"` }
PKIImportKeysRequest struct for PKIImportKeysRequest
func NewPKIImportKeysRequestWithDefaults ¶
func NewPKIImportKeysRequestWithDefaults() *PKIImportKeysRequest
NewPKIImportKeysRequestWithDefaults instantiates a new PKIImportKeysRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIImportKeysRequest) MarshalJSON ¶
func (o PKIImportKeysRequest) MarshalJSON() ([]byte, error)
type PKIIssuerIssueRoleRequest ¶
type PKIIssuerIssueRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. CommonName string `json:"common_name"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // Whether or not to remove self-signed CA certificates in the output of the ca_chain field. RemoveRootsFromChain bool `json:"remove_roots_from_chain"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` }
PKIIssuerIssueRoleRequest struct for PKIIssuerIssueRoleRequest
func NewPKIIssuerIssueRoleRequestWithDefaults ¶
func NewPKIIssuerIssueRoleRequestWithDefaults() *PKIIssuerIssueRoleRequest
NewPKIIssuerIssueRoleRequestWithDefaults instantiates a new PKIIssuerIssueRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIIssuerIssueRoleRequest) MarshalJSON ¶
func (o PKIIssuerIssueRoleRequest) MarshalJSON() ([]byte, error)
type PKIIssuerResignCRLsRequest ¶
type PKIIssuerResignCRLsRequest struct { // The sequence number to be written within the CRL Number extension. CrlNumber int32 `json:"crl_number"` // A list of PEM encoded CRLs to combine, originally signed by the requested issuer. Crls []string `json:"crls"` // Using a zero or greater value specifies the base CRL revision number to encode within a Delta CRL indicator extension, otherwise the extension will not be added. DeltaCrlBaseNumber int32 `json:"delta_crl_base_number"` // The format of the combined CRL, can be \"pem\" or \"der\". If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The amount of time the generated CRL should be valid; defaults to 72 hours. NextUpdate string `json:"next_update"` }
PKIIssuerResignCRLsRequest struct for PKIIssuerResignCRLsRequest
func NewPKIIssuerResignCRLsRequestWithDefaults ¶
func NewPKIIssuerResignCRLsRequestWithDefaults() *PKIIssuerResignCRLsRequest
NewPKIIssuerResignCRLsRequestWithDefaults instantiates a new PKIIssuerResignCRLsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIIssuerResignCRLsRequest) MarshalJSON ¶
func (o PKIIssuerResignCRLsRequest) MarshalJSON() ([]byte, error)
type PKIIssuerSignIntermediateRequest ¶
type PKIIssuerSignIntermediateRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans. CommonName string `json:"common_name"` // If set, Country will be set to this value. Country []string `json:"country"` // PEM-format CSR to be signed. Csr string `json:"csr"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' IssuerName string `json:"issuer_name"` // If set, Locality will be set to this value. Locality []string `json:"locality"` // The maximum allowable path length MaxPathLength int32 `json:"max_path_length"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // The duration before now which the certificate needs to be backdated by. NotBeforeDuration int32 `json:"not_before_duration"` // If set, O (Organization) will be set to this value. Organization []string `json:"organization"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // If set, OU (OrganizationalUnit) will be set to this value. Ou []string `json:"ou"` // Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10). PermittedDnsDomains []string `json:"permitted_dns_domains"` // If set, Postal Code will be set to this value. PostalCode []string `json:"postal_code"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // If set, Province will be set to this value. Province []string `json:"province"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // Value for the Subject Key Identifier field (RFC 5280 Section 4.2.1.2). This value should ONLY be used when cross-signing to mimic the existing certificate's SKID value; this is necessary to allow certain TLS implementations (such as OpenSSL) which use SKID/AKID matches in chain building to restrict possible valid chains. Specified as a string in hex format. Default is empty, allowing Vault to automatically calculate the SKID according to method one in the above RFC section. Skid string `json:"skid"` // If set, Street Address will be set to this value. StreetAddress []string `json:"street_address"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` // If true, then: 1) Subject information, including names and alternate names, will be preserved from the CSR rather than using values provided in the other parameters to this path; 2) Any key usages requested in the CSR will be added to the basic set of key usages used for CA certs signed by this path; for instance, the non-repudiation flag; 3) Extensions requested in the CSR will be copied into the issued certificate. UseCsrValues bool `json:"use_csr_values"` // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` }
PKIIssuerSignIntermediateRequest struct for PKIIssuerSignIntermediateRequest
func NewPKIIssuerSignIntermediateRequestWithDefaults ¶
func NewPKIIssuerSignIntermediateRequestWithDefaults() *PKIIssuerSignIntermediateRequest
NewPKIIssuerSignIntermediateRequestWithDefaults instantiates a new PKIIssuerSignIntermediateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIIssuerSignIntermediateRequest) MarshalJSON ¶
func (o PKIIssuerSignIntermediateRequest) MarshalJSON() ([]byte, error)
type PKIIssuerSignRevocationListRequest ¶
type PKIIssuerSignRevocationListRequest struct { // The sequence number to be written within the CRL Number extension. CrlNumber int32 `json:"crl_number"` // Using a zero or greater value specifies the base CRL revision number to encode within a Delta CRL indicator extension, otherwise the extension will not be added. DeltaCrlBaseNumber int32 `json:"delta_crl_base_number"` // A list of maps containing extensions with keys id (string), critical (bool), value (string) Extensions []map[string]interface{} `json:"extensions"` // The format of the combined CRL, can be \"pem\" or \"der\". If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The amount of time the generated CRL should be valid; defaults to 72 hours. NextUpdate string `json:"next_update"` // A list of maps containing the keys serial_number (string), revocation_time (string), and extensions (map with keys id (string), critical (bool), value (string)) RevokedCerts []map[string]interface{} `json:"revoked_certs"` }
PKIIssuerSignRevocationListRequest struct for PKIIssuerSignRevocationListRequest
func NewPKIIssuerSignRevocationListRequestWithDefaults ¶
func NewPKIIssuerSignRevocationListRequestWithDefaults() *PKIIssuerSignRevocationListRequest
NewPKIIssuerSignRevocationListRequestWithDefaults instantiates a new PKIIssuerSignRevocationListRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIIssuerSignRevocationListRequest) MarshalJSON ¶
func (o PKIIssuerSignRevocationListRequest) MarshalJSON() ([]byte, error)
type PKIIssuerSignRoleRequest ¶
type PKIIssuerSignRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. CommonName string `json:"common_name"` // PEM-format CSR to be signed. Csr string `json:"csr"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // Whether or not to remove self-signed CA certificates in the output of the ca_chain field. RemoveRootsFromChain bool `json:"remove_roots_from_chain"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` }
PKIIssuerSignRoleRequest struct for PKIIssuerSignRoleRequest
func NewPKIIssuerSignRoleRequestWithDefaults ¶
func NewPKIIssuerSignRoleRequestWithDefaults() *PKIIssuerSignRoleRequest
NewPKIIssuerSignRoleRequestWithDefaults instantiates a new PKIIssuerSignRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIIssuerSignRoleRequest) MarshalJSON ¶
func (o PKIIssuerSignRoleRequest) MarshalJSON() ([]byte, error)
type PKIIssuerSignSelfIssuedRequest ¶
type PKIIssuerSignSelfIssuedRequest struct { // PEM-format self-issued certificate to be signed. Certificate string `json:"certificate"` // If true, require the public key algorithm of the signer to match that of the self issued certificate. RequireMatchingCertificateAlgorithms bool `json:"require_matching_certificate_algorithms"` }
PKIIssuerSignSelfIssuedRequest struct for PKIIssuerSignSelfIssuedRequest
func NewPKIIssuerSignSelfIssuedRequestWithDefaults ¶
func NewPKIIssuerSignSelfIssuedRequestWithDefaults() *PKIIssuerSignSelfIssuedRequest
NewPKIIssuerSignSelfIssuedRequestWithDefaults instantiates a new PKIIssuerSignSelfIssuedRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIIssuerSignSelfIssuedRequest) MarshalJSON ¶
func (o PKIIssuerSignSelfIssuedRequest) MarshalJSON() ([]byte, error)
type PKIIssuerSignVerbatimRequest ¶
type PKIIssuerSignVerbatimRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. CommonName string `json:"common_name"` // PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints. Csr string `json:"csr"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. ExtKeyUsage []string `json:"ext_key_usage"` // A comma-separated string or list of extended key usage oids. ExtKeyUsageOids []string `json:"ext_key_usage_oids"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. KeyUsage []string `json:"key_usage"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // Whether or not to remove self-signed CA certificates in the output of the ca_chain field. RemoveRootsFromChain bool `json:"remove_roots_from_chain"` // The desired role with configuration for this request Role string `json:"role"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` }
PKIIssuerSignVerbatimRequest struct for PKIIssuerSignVerbatimRequest
func NewPKIIssuerSignVerbatimRequestWithDefaults ¶
func NewPKIIssuerSignVerbatimRequestWithDefaults() *PKIIssuerSignVerbatimRequest
NewPKIIssuerSignVerbatimRequestWithDefaults instantiates a new PKIIssuerSignVerbatimRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIIssuerSignVerbatimRequest) MarshalJSON ¶
func (o PKIIssuerSignVerbatimRequest) MarshalJSON() ([]byte, error)
type PKIIssuerSignVerbatimRoleRequest ¶
type PKIIssuerSignVerbatimRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. CommonName string `json:"common_name"` // PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints. Csr string `json:"csr"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. ExtKeyUsage []string `json:"ext_key_usage"` // A comma-separated string or list of extended key usage oids. ExtKeyUsageOids []string `json:"ext_key_usage_oids"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. KeyUsage []string `json:"key_usage"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // Whether or not to remove self-signed CA certificates in the output of the ca_chain field. RemoveRootsFromChain bool `json:"remove_roots_from_chain"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` }
PKIIssuerSignVerbatimRoleRequest struct for PKIIssuerSignVerbatimRoleRequest
func NewPKIIssuerSignVerbatimRoleRequestWithDefaults ¶
func NewPKIIssuerSignVerbatimRoleRequestWithDefaults() *PKIIssuerSignVerbatimRoleRequest
NewPKIIssuerSignVerbatimRoleRequestWithDefaults instantiates a new PKIIssuerSignVerbatimRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIIssuerSignVerbatimRoleRequest) MarshalJSON ¶
func (o PKIIssuerSignVerbatimRoleRequest) MarshalJSON() ([]byte, error)
type PKIIssuersGenerateIntermediateRequest ¶
type PKIIssuersGenerateIntermediateRequest struct { // Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. AddBasicConstraints bool `json:"add_basic_constraints"` // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans. CommonName string `json:"common_name"` // If set, Country will be set to this value. Country []string `json:"country"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` // Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default' KeyName string `json:"key_name"` // Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key. KeyRef string `json:"key_ref"` // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. KeyType string `json:"key_type"` // If set, Locality will be set to this value. Locality []string `json:"locality"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types. ManagedKeyId string `json:"managed_key_id"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types. ManagedKeyName string `json:"managed_key_name"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // The duration before now which the certificate needs to be backdated by. NotBeforeDuration int32 `json:"not_before_duration"` // If set, O (Organization) will be set to this value. Organization []string `json:"organization"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // If set, OU (OrganizationalUnit) will be set to this value. Ou []string `json:"ou"` // If set, Postal Code will be set to this value. PostalCode []string `json:"postal_code"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // If set, Province will be set to this value. Province []string `json:"province"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // If set, Street Address will be set to this value. StreetAddress []string `json:"street_address"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` }
PKIIssuersGenerateIntermediateRequest struct for PKIIssuersGenerateIntermediateRequest
func NewPKIIssuersGenerateIntermediateRequestWithDefaults ¶
func NewPKIIssuersGenerateIntermediateRequestWithDefaults() *PKIIssuersGenerateIntermediateRequest
NewPKIIssuersGenerateIntermediateRequestWithDefaults instantiates a new PKIIssuersGenerateIntermediateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIIssuersGenerateIntermediateRequest) MarshalJSON ¶
func (o PKIIssuersGenerateIntermediateRequest) MarshalJSON() ([]byte, error)
type PKIIssuersGenerateRootRequest ¶
type PKIIssuersGenerateRootRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans. CommonName string `json:"common_name"` // If set, Country will be set to this value. Country []string `json:"country"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' IssuerName string `json:"issuer_name"` // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` // Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default' KeyName string `json:"key_name"` // Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key. KeyRef string `json:"key_ref"` // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. KeyType string `json:"key_type"` // If set, Locality will be set to this value. Locality []string `json:"locality"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types. ManagedKeyId string `json:"managed_key_id"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types. ManagedKeyName string `json:"managed_key_name"` // The maximum allowable path length MaxPathLength int32 `json:"max_path_length"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // The duration before now which the certificate needs to be backdated by. NotBeforeDuration int32 `json:"not_before_duration"` // If set, O (Organization) will be set to this value. Organization []string `json:"organization"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // If set, OU (OrganizationalUnit) will be set to this value. Ou []string `json:"ou"` // Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10). PermittedDnsDomains []string `json:"permitted_dns_domains"` // If set, Postal Code will be set to this value. PostalCode []string `json:"postal_code"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // If set, Province will be set to this value. Province []string `json:"province"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // If set, Street Address will be set to this value. StreetAddress []string `json:"street_address"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` }
PKIIssuersGenerateRootRequest struct for PKIIssuersGenerateRootRequest
func NewPKIIssuersGenerateRootRequestWithDefaults ¶
func NewPKIIssuersGenerateRootRequestWithDefaults() *PKIIssuersGenerateRootRequest
NewPKIIssuersGenerateRootRequestWithDefaults instantiates a new PKIIssuersGenerateRootRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIIssuersGenerateRootRequest) MarshalJSON ¶
func (o PKIIssuersGenerateRootRequest) MarshalJSON() ([]byte, error)
type PKIReplaceRootRequest ¶
type PKIReplaceRootRequest struct { // Reference (name or identifier) to the default issuer. Default string `json:"default"` }
PKIReplaceRootRequest struct for PKIReplaceRootRequest
func NewPKIReplaceRootRequestWithDefaults ¶
func NewPKIReplaceRootRequestWithDefaults() *PKIReplaceRootRequest
NewPKIReplaceRootRequestWithDefaults instantiates a new PKIReplaceRootRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIReplaceRootRequest) MarshalJSON ¶
func (o PKIReplaceRootRequest) MarshalJSON() ([]byte, error)
type PKIRevokeRequest ¶
type PKIRevokeRequest struct { // Certificate to revoke in PEM format; must be signed by an issuer in this mount. Certificate string `json:"certificate"` // Certificate serial number, in colon- or hyphen-separated octal SerialNumber string `json:"serial_number"` }
PKIRevokeRequest struct for PKIRevokeRequest
func NewPKIRevokeRequestWithDefaults ¶
func NewPKIRevokeRequestWithDefaults() *PKIRevokeRequest
NewPKIRevokeRequestWithDefaults instantiates a new PKIRevokeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIRevokeRequest) MarshalJSON ¶
func (o PKIRevokeRequest) MarshalJSON() ([]byte, error)
type PKIRevokeWithKeyRequest ¶
type PKIRevokeWithKeyRequest struct { // Certificate to revoke in PEM format; must be signed by an issuer in this mount. Certificate string `json:"certificate"` // Key to use to verify revocation permission; must be in PEM format. PrivateKey string `json:"private_key"` // Certificate serial number, in colon- or hyphen-separated octal SerialNumber string `json:"serial_number"` }
PKIRevokeWithKeyRequest struct for PKIRevokeWithKeyRequest
func NewPKIRevokeWithKeyRequestWithDefaults ¶
func NewPKIRevokeWithKeyRequestWithDefaults() *PKIRevokeWithKeyRequest
NewPKIRevokeWithKeyRequestWithDefaults instantiates a new PKIRevokeWithKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIRevokeWithKeyRequest) MarshalJSON ¶
func (o PKIRevokeWithKeyRequest) MarshalJSON() ([]byte, error)
type PKIRootSignIntermediateRequest ¶
type PKIRootSignIntermediateRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans. CommonName string `json:"common_name"` // If set, Country will be set to this value. Country []string `json:"country"` // PEM-format CSR to be signed. Csr string `json:"csr"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' IssuerName string `json:"issuer_name"` // Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. IssuerRef string `json:"issuer_ref"` // If set, Locality will be set to this value. Locality []string `json:"locality"` // The maximum allowable path length MaxPathLength int32 `json:"max_path_length"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // The duration before now which the certificate needs to be backdated by. NotBeforeDuration int32 `json:"not_before_duration"` // If set, O (Organization) will be set to this value. Organization []string `json:"organization"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // If set, OU (OrganizationalUnit) will be set to this value. Ou []string `json:"ou"` // Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10). PermittedDnsDomains []string `json:"permitted_dns_domains"` // If set, Postal Code will be set to this value. PostalCode []string `json:"postal_code"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // If set, Province will be set to this value. Province []string `json:"province"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // Value for the Subject Key Identifier field (RFC 5280 Section 4.2.1.2). This value should ONLY be used when cross-signing to mimic the existing certificate's SKID value; this is necessary to allow certain TLS implementations (such as OpenSSL) which use SKID/AKID matches in chain building to restrict possible valid chains. Specified as a string in hex format. Default is empty, allowing Vault to automatically calculate the SKID according to method one in the above RFC section. Skid string `json:"skid"` // If set, Street Address will be set to this value. StreetAddress []string `json:"street_address"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` // If true, then: 1) Subject information, including names and alternate names, will be preserved from the CSR rather than using values provided in the other parameters to this path; 2) Any key usages requested in the CSR will be added to the basic set of key usages used for CA certs signed by this path; for instance, the non-repudiation flag; 3) Extensions requested in the CSR will be copied into the issued certificate. UseCsrValues bool `json:"use_csr_values"` // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` }
PKIRootSignIntermediateRequest struct for PKIRootSignIntermediateRequest
func NewPKIRootSignIntermediateRequestWithDefaults ¶
func NewPKIRootSignIntermediateRequestWithDefaults() *PKIRootSignIntermediateRequest
NewPKIRootSignIntermediateRequestWithDefaults instantiates a new PKIRootSignIntermediateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIRootSignIntermediateRequest) MarshalJSON ¶
func (o PKIRootSignIntermediateRequest) MarshalJSON() ([]byte, error)
type PKIRootSignSelfIssuedRequest ¶
type PKIRootSignSelfIssuedRequest struct { // PEM-format self-issued certificate to be signed. Certificate string `json:"certificate"` // Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. IssuerRef string `json:"issuer_ref"` // If true, require the public key algorithm of the signer to match that of the self issued certificate. RequireMatchingCertificateAlgorithms bool `json:"require_matching_certificate_algorithms"` }
PKIRootSignSelfIssuedRequest struct for PKIRootSignSelfIssuedRequest
func NewPKIRootSignSelfIssuedRequestWithDefaults ¶
func NewPKIRootSignSelfIssuedRequestWithDefaults() *PKIRootSignSelfIssuedRequest
NewPKIRootSignSelfIssuedRequestWithDefaults instantiates a new PKIRootSignSelfIssuedRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIRootSignSelfIssuedRequest) MarshalJSON ¶
func (o PKIRootSignSelfIssuedRequest) MarshalJSON() ([]byte, error)
type PKIRotateRootRequest ¶
type PKIRotateRootRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans. CommonName string `json:"common_name"` // If set, Country will be set to this value. Country []string `json:"country"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' IssuerName string `json:"issuer_name"` // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` // Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default' KeyName string `json:"key_name"` // Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key. KeyRef string `json:"key_ref"` // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. KeyType string `json:"key_type"` // If set, Locality will be set to this value. Locality []string `json:"locality"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types. ManagedKeyId string `json:"managed_key_id"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types. ManagedKeyName string `json:"managed_key_name"` // The maximum allowable path length MaxPathLength int32 `json:"max_path_length"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // The duration before now which the certificate needs to be backdated by. NotBeforeDuration int32 `json:"not_before_duration"` // If set, O (Organization) will be set to this value. Organization []string `json:"organization"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // If set, OU (OrganizationalUnit) will be set to this value. Ou []string `json:"ou"` // Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10). PermittedDnsDomains []string `json:"permitted_dns_domains"` // If set, Postal Code will be set to this value. PostalCode []string `json:"postal_code"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // If set, Province will be set to this value. Province []string `json:"province"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // If set, Street Address will be set to this value. StreetAddress []string `json:"street_address"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` }
PKIRotateRootRequest struct for PKIRotateRootRequest
func NewPKIRotateRootRequestWithDefaults ¶
func NewPKIRotateRootRequestWithDefaults() *PKIRotateRootRequest
NewPKIRotateRootRequestWithDefaults instantiates a new PKIRotateRootRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIRotateRootRequest) MarshalJSON ¶
func (o PKIRotateRootRequest) MarshalJSON() ([]byte, error)
type PKISignRoleRequest ¶
type PKISignRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. CommonName string `json:"common_name"` // PEM-format CSR to be signed. Csr string `json:"csr"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. IssuerRef string `json:"issuer_ref"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // Whether or not to remove self-signed CA certificates in the output of the ca_chain field. RemoveRootsFromChain bool `json:"remove_roots_from_chain"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` }
PKISignRoleRequest struct for PKISignRoleRequest
func NewPKISignRoleRequestWithDefaults ¶
func NewPKISignRoleRequestWithDefaults() *PKISignRoleRequest
NewPKISignRoleRequestWithDefaults instantiates a new PKISignRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKISignRoleRequest) MarshalJSON ¶
func (o PKISignRoleRequest) MarshalJSON() ([]byte, error)
type PKISignVerbatimRequest ¶
type PKISignVerbatimRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. CommonName string `json:"common_name"` // PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints. Csr string `json:"csr"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. ExtKeyUsage []string `json:"ext_key_usage"` // A comma-separated string or list of extended key usage oids. ExtKeyUsageOids []string `json:"ext_key_usage_oids"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. IssuerRef string `json:"issuer_ref"` // A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. KeyUsage []string `json:"key_usage"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // Whether or not to remove self-signed CA certificates in the output of the ca_chain field. RemoveRootsFromChain bool `json:"remove_roots_from_chain"` // The desired role with configuration for this request Role string `json:"role"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` }
PKISignVerbatimRequest struct for PKISignVerbatimRequest
func NewPKISignVerbatimRequestWithDefaults ¶
func NewPKISignVerbatimRequestWithDefaults() *PKISignVerbatimRequest
NewPKISignVerbatimRequestWithDefaults instantiates a new PKISignVerbatimRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKISignVerbatimRequest) MarshalJSON ¶
func (o PKISignVerbatimRequest) MarshalJSON() ([]byte, error)
type PKISignVerbatimRoleRequest ¶
type PKISignVerbatimRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. CommonName string `json:"common_name"` // PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints. Csr string `json:"csr"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. ExtKeyUsage []string `json:"ext_key_usage"` // A comma-separated string or list of extended key usage oids. ExtKeyUsageOids []string `json:"ext_key_usage_oids"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. IssuerRef string `json:"issuer_ref"` // A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. KeyUsage []string `json:"key_usage"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // Whether or not to remove self-signed CA certificates in the output of the ca_chain field. RemoveRootsFromChain bool `json:"remove_roots_from_chain"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` }
PKISignVerbatimRoleRequest struct for PKISignVerbatimRoleRequest
func NewPKISignVerbatimRoleRequestWithDefaults ¶
func NewPKISignVerbatimRoleRequestWithDefaults() *PKISignVerbatimRoleRequest
NewPKISignVerbatimRoleRequestWithDefaults instantiates a new PKISignVerbatimRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKISignVerbatimRoleRequest) MarshalJSON ¶
func (o PKISignVerbatimRoleRequest) MarshalJSON() ([]byte, error)
type PKITidyRequest ¶
type PKITidyRequest struct { // The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year). IssuerSafetyBuffer int32 `json:"issuer_safety_buffer"` // The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds. PauseDuration string `json:"pause_duration"` // The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours. SafetyBuffer int32 `json:"safety_buffer"` // Set to true to enable tidying up the certificate store TidyCertStore bool `json:"tidy_cert_store"` // Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation. TidyExpiredIssuers bool `json:"tidy_expired_issuers"` // Deprecated; synonym for 'tidy_revoked_certs TidyRevocationList bool `json:"tidy_revocation_list"` // Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses. TidyRevokedCertIssuerAssociations bool `json:"tidy_revoked_cert_issuer_associations"` // Set to true to expire all revoked and expired certificates, removing them both from the CRL and from storage. The CRL will be rotated if this causes any values to be removed. TidyRevokedCerts bool `json:"tidy_revoked_certs"` }
PKITidyRequest struct for PKITidyRequest
func NewPKITidyRequestWithDefaults ¶
func NewPKITidyRequestWithDefaults() *PKITidyRequest
NewPKITidyRequestWithDefaults instantiates a new PKITidyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKITidyRequest) MarshalJSON ¶
func (o PKITidyRequest) MarshalJSON() ([]byte, error)
type PKIWriteAutoTidyConfigRequest ¶
type PKIWriteAutoTidyConfigRequest struct { // Set to true to enable automatic tidy operations. Enabled bool `json:"enabled"` // Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next). Running a manual tidy will reset this duration. IntervalDuration int32 `json:"interval_duration"` // The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage. Defaults to 8760 hours (1 year). IssuerSafetyBuffer int32 `json:"issuer_safety_buffer"` // The amount of time to wait between processing certificates. This allows operators to change the execution profile of tidy to take consume less resources by slowing down how long it takes to run. Note that the entire list of certificates will be stored in memory during the entire tidy operation, but resources to read/process/update existing entries will be spread out over a greater period of time. By default this is zero seconds. PauseDuration string `json:"pause_duration"` // The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list. Defaults to 72 hours. SafetyBuffer int32 `json:"safety_buffer"` // Set to true to enable tidying up the certificate store TidyCertStore bool `json:"tidy_cert_store"` // Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation. TidyExpiredIssuers bool `json:"tidy_expired_issuers"` // Deprecated; synonym for 'tidy_revoked_certs TidyRevocationList bool `json:"tidy_revocation_list"` // Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses. TidyRevokedCertIssuerAssociations bool `json:"tidy_revoked_cert_issuer_associations"` // Set to true to expire all revoked and expired certificates, removing them both from the CRL and from storage. The CRL will be rotated if this causes any values to be removed. TidyRevokedCerts bool `json:"tidy_revoked_certs"` }
PKIWriteAutoTidyConfigRequest struct for PKIWriteAutoTidyConfigRequest
func NewPKIWriteAutoTidyConfigRequestWithDefaults ¶
func NewPKIWriteAutoTidyConfigRequestWithDefaults() *PKIWriteAutoTidyConfigRequest
NewPKIWriteAutoTidyConfigRequestWithDefaults instantiates a new PKIWriteAutoTidyConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteAutoTidyConfigRequest) MarshalJSON ¶
func (o PKIWriteAutoTidyConfigRequest) MarshalJSON() ([]byte, error)
type PKIWriteCAConfigRequest ¶
type PKIWriteCAConfigRequest struct { // PEM-format, concatenated unencrypted secret key and certificate. PemBundle string `json:"pem_bundle"` }
PKIWriteCAConfigRequest struct for PKIWriteCAConfigRequest
func NewPKIWriteCAConfigRequestWithDefaults ¶
func NewPKIWriteCAConfigRequestWithDefaults() *PKIWriteCAConfigRequest
NewPKIWriteCAConfigRequestWithDefaults instantiates a new PKIWriteCAConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteCAConfigRequest) MarshalJSON ¶
func (o PKIWriteCAConfigRequest) MarshalJSON() ([]byte, error)
type PKIWriteCRLConfigRequest ¶
type PKIWriteCRLConfigRequest struct { // If set to true, enables automatic rebuilding of the CRL AutoRebuild bool `json:"auto_rebuild"` // The time before the CRL expires to automatically rebuild it, when enabled. Must be shorter than the CRL expiry. Defaults to 12h. AutoRebuildGracePeriod string `json:"auto_rebuild_grace_period"` // The time between delta CRL rebuilds if a new revocation has occurred. Must be shorter than the CRL expiry. Defaults to 15m. DeltaRebuildInterval string `json:"delta_rebuild_interval"` // If set to true, disables generating the CRL entirely. Disable bool `json:"disable"` // Whether to enable delta CRLs between authoritative CRL rebuilds EnableDelta bool `json:"enable_delta"` // The amount of time the generated CRL should be valid; defaults to 72 hours Expiry string `json:"expiry"` // If set to true, ocsp unauthorized responses will be returned. OcspDisable bool `json:"ocsp_disable"` // The amount of time an OCSP response will be valid (controls the NextUpdate field); defaults to 12 hours OcspExpiry string `json:"ocsp_expiry"` }
PKIWriteCRLConfigRequest struct for PKIWriteCRLConfigRequest
func NewPKIWriteCRLConfigRequestWithDefaults ¶
func NewPKIWriteCRLConfigRequestWithDefaults() *PKIWriteCRLConfigRequest
NewPKIWriteCRLConfigRequestWithDefaults instantiates a new PKIWriteCRLConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteCRLConfigRequest) MarshalJSON ¶
func (o PKIWriteCRLConfigRequest) MarshalJSON() ([]byte, error)
type PKIWriteCertsRequest ¶
type PKIWriteCertsRequest struct { // PEM-format, concatenated unencrypted secret-key (optional) and certificates. PemBundle string `json:"pem_bundle"` }
PKIWriteCertsRequest struct for PKIWriteCertsRequest
func NewPKIWriteCertsRequestWithDefaults ¶
func NewPKIWriteCertsRequestWithDefaults() *PKIWriteCertsRequest
NewPKIWriteCertsRequestWithDefaults instantiates a new PKIWriteCertsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteCertsRequest) MarshalJSON ¶
func (o PKIWriteCertsRequest) MarshalJSON() ([]byte, error)
type PKIWriteClusterConfigRequest ¶
type PKIWriteClusterConfigRequest struct { // Canonical URI to this mount on this performance replication cluster's external address. This is for resolving AIA URLs and providing the {{cluster_path}} template parameter but might be used for other purposes in the future. This should only point back to this particular PR replica and should not ever point to another PR cluster. It may point to any node in the PR replica, including standby nodes, and need not always point to the active node. For example: https://pr1.vault.example.com:8200/v1/pki Path string `json:"path"` }
PKIWriteClusterConfigRequest struct for PKIWriteClusterConfigRequest
func NewPKIWriteClusterConfigRequestWithDefaults ¶
func NewPKIWriteClusterConfigRequestWithDefaults() *PKIWriteClusterConfigRequest
NewPKIWriteClusterConfigRequestWithDefaults instantiates a new PKIWriteClusterConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteClusterConfigRequest) MarshalJSON ¶
func (o PKIWriteClusterConfigRequest) MarshalJSON() ([]byte, error)
type PKIWriteIntermediateCrossSignRequest ¶
type PKIWriteIntermediateCrossSignRequest struct { // Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. AddBasicConstraints bool `json:"add_basic_constraints"` // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans. CommonName string `json:"common_name"` // If set, Country will be set to this value. Country []string `json:"country"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! Exported string `json:"exported"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` // Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default' KeyName string `json:"key_name"` // Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key. KeyRef string `json:"key_ref"` // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. KeyType string `json:"key_type"` // If set, Locality will be set to this value. Locality []string `json:"locality"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types. ManagedKeyId string `json:"managed_key_id"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types. ManagedKeyName string `json:"managed_key_name"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // The duration before now which the certificate needs to be backdated by. NotBeforeDuration int32 `json:"not_before_duration"` // If set, O (Organization) will be set to this value. Organization []string `json:"organization"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // If set, OU (OrganizationalUnit) will be set to this value. Ou []string `json:"ou"` // If set, Postal Code will be set to this value. PostalCode []string `json:"postal_code"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // If set, Province will be set to this value. Province []string `json:"province"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // If set, Street Address will be set to this value. StreetAddress []string `json:"street_address"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` }
PKIWriteIntermediateCrossSignRequest struct for PKIWriteIntermediateCrossSignRequest
func NewPKIWriteIntermediateCrossSignRequestWithDefaults ¶
func NewPKIWriteIntermediateCrossSignRequestWithDefaults() *PKIWriteIntermediateCrossSignRequest
NewPKIWriteIntermediateCrossSignRequestWithDefaults instantiates a new PKIWriteIntermediateCrossSignRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteIntermediateCrossSignRequest) MarshalJSON ¶
func (o PKIWriteIntermediateCrossSignRequest) MarshalJSON() ([]byte, error)
type PKIWriteIntermediateGenerateRequest ¶
type PKIWriteIntermediateGenerateRequest struct { // Whether to add a Basic Constraints extension with CA: true. Only needed as a workaround in some compatibility scenarios with Active Directory Certificate Services. AddBasicConstraints bool `json:"add_basic_constraints"` // The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans. CommonName string `json:"common_name"` // If set, Country will be set to this value. Country []string `json:"country"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` // Provide a name to the generated or existing key, the name must be unique across all keys and not be the reserved value 'default' KeyName string `json:"key_name"` // Reference to a existing key; either \"default\" for the configured default key, an identifier or the name assigned to the key. KeyRef string `json:"key_ref"` // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. KeyType string `json:"key_type"` // If set, Locality will be set to this value. Locality []string `json:"locality"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types. ManagedKeyId string `json:"managed_key_id"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types. ManagedKeyName string `json:"managed_key_name"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // The duration before now which the certificate needs to be backdated by. NotBeforeDuration int32 `json:"not_before_duration"` // If set, O (Organization) will be set to this value. Organization []string `json:"organization"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // If set, OU (OrganizationalUnit) will be set to this value. Ou []string `json:"ou"` // If set, Postal Code will be set to this value. PostalCode []string `json:"postal_code"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // If set, Province will be set to this value. Province []string `json:"province"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // If set, Street Address will be set to this value. StreetAddress []string `json:"street_address"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` }
PKIWriteIntermediateGenerateRequest struct for PKIWriteIntermediateGenerateRequest
func NewPKIWriteIntermediateGenerateRequestWithDefaults ¶
func NewPKIWriteIntermediateGenerateRequestWithDefaults() *PKIWriteIntermediateGenerateRequest
NewPKIWriteIntermediateGenerateRequestWithDefaults instantiates a new PKIWriteIntermediateGenerateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteIntermediateGenerateRequest) MarshalJSON ¶
func (o PKIWriteIntermediateGenerateRequest) MarshalJSON() ([]byte, error)
type PKIWriteIntermediateSetSignedRequest ¶
type PKIWriteIntermediateSetSignedRequest struct { // PEM-format certificate. This must be a CA certificate with a public key matching the previously-generated key from the generation endpoint. Additional parent CAs may be optionally appended to the bundle. Certificate string `json:"certificate"` }
PKIWriteIntermediateSetSignedRequest struct for PKIWriteIntermediateSetSignedRequest
func NewPKIWriteIntermediateSetSignedRequestWithDefaults ¶
func NewPKIWriteIntermediateSetSignedRequestWithDefaults() *PKIWriteIntermediateSetSignedRequest
NewPKIWriteIntermediateSetSignedRequestWithDefaults instantiates a new PKIWriteIntermediateSetSignedRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteIntermediateSetSignedRequest) MarshalJSON ¶
func (o PKIWriteIntermediateSetSignedRequest) MarshalJSON() ([]byte, error)
type PKIWriteInternalExportedRequest ¶
type PKIWriteInternalExportedRequest struct { // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` // Optional name to be used for this key KeyName string `json:"key_name"` // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. KeyType string `json:"key_type"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types. ManagedKeyId string `json:"managed_key_id"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types. ManagedKeyName string `json:"managed_key_name"` }
PKIWriteInternalExportedRequest struct for PKIWriteInternalExportedRequest
func NewPKIWriteInternalExportedRequestWithDefaults ¶
func NewPKIWriteInternalExportedRequestWithDefaults() *PKIWriteInternalExportedRequest
NewPKIWriteInternalExportedRequestWithDefaults instantiates a new PKIWriteInternalExportedRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteInternalExportedRequest) MarshalJSON ¶
func (o PKIWriteInternalExportedRequest) MarshalJSON() ([]byte, error)
type PKIWriteIssueRoleRequest ¶
type PKIWriteIssueRoleRequest struct { // The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. AltNames string `json:"alt_names"` // The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. CommonName string `json:"common_name"` // If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). ExcludeCnFromSans bool `json:"exclude_cn_from_sans"` // Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\". Format string `json:"format"` // The requested IP SANs, if any, in a comma-delimited list IpSans []string `json:"ip_sans"` // Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. IssuerRef string `json:"issuer_ref"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ NotAfter string `json:"not_after"` // Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry. OtherSans []string `json:"other_sans"` // Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\". PrivateKeyFormat string `json:"private_key_format"` // Whether or not to remove self-signed CA certificates in the output of the ca_chain field. RemoveRootsFromChain bool `json:"remove_roots_from_chain"` // The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. SerialNumber string `json:"serial_number"` // The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. Ttl int32 `json:"ttl"` // The requested URI SANs, if any, in a comma-delimited list. UriSans []string `json:"uri_sans"` }
PKIWriteIssueRoleRequest struct for PKIWriteIssueRoleRequest
func NewPKIWriteIssueRoleRequestWithDefaults ¶
func NewPKIWriteIssueRoleRequestWithDefaults() *PKIWriteIssueRoleRequest
NewPKIWriteIssueRoleRequestWithDefaults instantiates a new PKIWriteIssueRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteIssueRoleRequest) MarshalJSON ¶
func (o PKIWriteIssueRoleRequest) MarshalJSON() ([]byte, error)
type PKIWriteIssuersConfigRequest ¶
type PKIWriteIssuersConfigRequest struct { // Reference (name or identifier) to the default issuer. Default string `json:"default"` // Whether the default issuer should automatically follow the latest generated or imported issuer. Defaults to false. DefaultFollowsLatestIssuer bool `json:"default_follows_latest_issuer"` }
PKIWriteIssuersConfigRequest struct for PKIWriteIssuersConfigRequest
func NewPKIWriteIssuersConfigRequestWithDefaults ¶
func NewPKIWriteIssuersConfigRequestWithDefaults() *PKIWriteIssuersConfigRequest
NewPKIWriteIssuersConfigRequestWithDefaults instantiates a new PKIWriteIssuersConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteIssuersConfigRequest) MarshalJSON ¶
func (o PKIWriteIssuersConfigRequest) MarshalJSON() ([]byte, error)
type PKIWriteKMSRequest ¶
type PKIWriteKMSRequest struct { // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` // Optional name to be used for this key KeyName string `json:"key_name"` // The type of key to use; defaults to RSA. \"rsa\" \"ec\" and \"ed25519\" are the only valid values. KeyType string `json:"key_type"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_name is required. Ignored for other types. ManagedKeyId string `json:"managed_key_id"` // The name of the managed key to use when the exported type is kms. When kms type is the key type, this field or managed_key_id is required. Ignored for other types. ManagedKeyName string `json:"managed_key_name"` }
PKIWriteKMSRequest struct for PKIWriteKMSRequest
func NewPKIWriteKMSRequestWithDefaults ¶
func NewPKIWriteKMSRequestWithDefaults() *PKIWriteKMSRequest
NewPKIWriteKMSRequestWithDefaults instantiates a new PKIWriteKMSRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteKMSRequest) MarshalJSON ¶
func (o PKIWriteKMSRequest) MarshalJSON() ([]byte, error)
type PKIWriteKeyRequest ¶
type PKIWriteKeyRequest struct { // Human-readable name for this key. KeyName string `json:"key_name"` }
PKIWriteKeyRequest struct for PKIWriteKeyRequest
func NewPKIWriteKeyRequestWithDefaults ¶
func NewPKIWriteKeyRequestWithDefaults() *PKIWriteKeyRequest
NewPKIWriteKeyRequestWithDefaults instantiates a new PKIWriteKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteKeyRequest) MarshalJSON ¶
func (o PKIWriteKeyRequest) MarshalJSON() ([]byte, error)
type PKIWriteKeysConfigRequest ¶
type PKIWriteKeysConfigRequest struct { // Reference (name or identifier) of the default key. Default string `json:"default"` }
PKIWriteKeysConfigRequest struct for PKIWriteKeysConfigRequest
func NewPKIWriteKeysConfigRequestWithDefaults ¶
func NewPKIWriteKeysConfigRequestWithDefaults() *PKIWriteKeysConfigRequest
NewPKIWriteKeysConfigRequestWithDefaults instantiates a new PKIWriteKeysConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteKeysConfigRequest) MarshalJSON ¶
func (o PKIWriteKeysConfigRequest) MarshalJSON() ([]byte, error)
type PKIWriteRoleRequest ¶
type PKIWriteRoleRequest struct { // If set, clients can request certificates for any domain, regardless of allowed_domains restrictions. See the documentation for more information. AllowAnyName bool `json:"allow_any_name"` // If set, clients can request certificates for the base domains themselves, e.g. \"example.com\" of domains listed in allowed_domains. This is a separate option as in some cases this can be considered a security threat. See the documentation for more information. AllowBareDomains bool `json:"allow_bare_domains"` // If set, domains specified in allowed_domains can include shell-style glob patterns, e.g. \"ftp*.example.com\". See the documentation for more information. AllowGlobDomains bool `json:"allow_glob_domains"` // If set, IP Subject Alternative Names are allowed. Any valid IP is accepted and No authorization checking is performed. AllowIpSans bool `json:"allow_ip_sans"` // Whether to allow \"localhost\" and \"localdomain\" as a valid common name in a request, independent of allowed_domains value. AllowLocalhost bool `json:"allow_localhost"` // If set, clients can request certificates for subdomains of domains listed in allowed_domains, including wildcard subdomains. See the documentation for more information. AllowSubdomains bool `json:"allow_subdomains"` // If set, allows certificates with wildcards in the common name to be issued, conforming to RFC 6125's Section 6.4.3; e.g., \"*.example.net\" or \"b*z.example.net\". See the documentation for more information. AllowWildcardCertificates bool `json:"allow_wildcard_certificates"` // Specifies the domains this role is allowed to issue certificates for. This is used with the allow_bare_domains, allow_subdomains, and allow_glob_domains to determine matches for the common name, DNS-typed SAN entries, and Email-typed SAN entries of certificates. See the documentation for more information. This parameter accepts a comma-separated string or list of domains. AllowedDomains []string `json:"allowed_domains"` // If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. AllowedDomainsTemplate bool `json:"allowed_domains_template"` // If set, an array of allowed other names to put in SANs. These values support globbing and must be in the format <oid>;<type>:<value>. Currently only \"utf8\" is a valid type. All values, including globbing values, must use this syntax, with the exception being a single \"*\" which allows any OID and any value (but type must still be utf8). AllowedOtherSans []string `json:"allowed_other_sans"` // If set, an array of allowed serial numbers to put in Subject. These values support globbing. AllowedSerialNumbers []string `json:"allowed_serial_numbers"` // If set, an array of allowed URIs for URI Subject Alternative Names. Any valid URI is accepted, these values support globbing. AllowedUriSans []string `json:"allowed_uri_sans"` // If set, Allowed URI SANs can be specified using identity template policies. Non-templated URI SANs are also permitted. AllowedUriSansTemplate bool `json:"allowed_uri_sans_template"` // Backend Type Backend string `json:"backend"` // Mark Basic Constraints valid when issuing non-CA certificates. BasicConstraintsValidForNonCa bool `json:"basic_constraints_valid_for_non_ca"` // If set, certificates are flagged for client auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. ClientFlag bool `json:"client_flag"` // List of allowed validations to run against the Common Name field. Values can include 'email' to validate the CN is a email address, 'hostname' to validate the CN is a valid hostname (potentially including wildcards). When multiple validations are specified, these take OR semantics (either email OR hostname are allowed). The special value 'disabled' allows disabling all CN name validations, allowing for arbitrary non-Hostname, non-Email address CNs. CnValidations []string `json:"cn_validations"` // If set, certificates are flagged for code signing use. Defaults to false. See also RFC 5280 Section 4.2.1.12. CodeSigningFlag bool `json:"code_signing_flag"` // If set, Country will be set to this value in certificates issued by this role. Country []string `json:"country"` // If set, certificates are flagged for email protection use. Defaults to false. See also RFC 5280 Section 4.2.1.12. EmailProtectionFlag bool `json:"email_protection_flag"` // If set, only valid host names are allowed for CN and DNS SANs, and the host part of email addresses. Defaults to true. EnforceHostnames bool `json:"enforce_hostnames"` // A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the \"ExtKeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.12. ExtKeyUsage []string `json:"ext_key_usage"` // A comma-separated string or list of extended key usage oids. ExtKeyUsageOids []string `json:"ext_key_usage_oids"` // If set, certificates issued/signed against this role will have Vault leases attached to them. Defaults to \"false\". Certificates can be added to the CRL by \"vault revoke <lease_id>\" when certificates are associated with leases. It can also be done using the \"pki/revoke\" endpoint. However, when lease generation is disabled, invoking \"pki/revoke\" would be the only way to add the certificates to the CRL. When large number of certificates are generated with long lifetimes, it is recommended that lease generation be disabled, as large amount of leases adversely affect the startup time of Vault. GenerateLease bool `json:"generate_lease"` // Reference to the issuer used to sign requests serviced by this role. IssuerRef string `json:"issuer_ref"` // The number of bits to use. Allowed values are 0 (universal default); with rsa key_type: 2048 (default), 3072, or 4096; with ec key_type: 224, 256 (default), 384, or 521; ignored with ed25519. KeyBits int32 `json:"key_bits"` // The type of key to use; defaults to RSA. \"rsa\" \"ec\", \"ed25519\" and \"any\" are the only valid values. KeyType string `json:"key_type"` // A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the \"KeyUsage\" part of the name. To remove all key usages from being set, set this value to an empty list. See also RFC 5280 Section 4.2.1.3. KeyUsage []string `json:"key_usage"` // If set, Locality will be set to this value in certificates issued by this role. Locality []string `json:"locality"` // The maximum allowed lease duration. If not set, defaults to the system maximum lease TTL. MaxTtl int32 `json:"max_ttl"` // If set, certificates issued/signed against this role will not be stored in the storage backend. This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked, so this option is recommended only for certificates that are non-sensitive, or extremely short-lived. This option implies a value of \"false\" for \"generate_lease\". NoStore bool `json:"no_store"` // Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. NotAfter string `json:"not_after"` // The duration before now which the certificate needs to be backdated by. NotBeforeDuration int32 `json:"not_before_duration"` // If set, O (Organization) will be set to this value in certificates issued by this role. Organization []string `json:"organization"` // If set, OU (OrganizationalUnit) will be set to this value in certificates issued by this role. Ou []string `json:"ou"` // A comma-separated string or list of policy OIDs, or a JSON list of qualified policy information, which must include an oid, and may include a notice and/or cps url, using the form [{\"oid\"=\"1.3.6.1.4.1.7.8\",\"notice\"=\"I am a user Notice\"}, {\"oid\"=\"1.3.6.1.4.1.44947.1.2.4 \",\"cps\"=\"https://example.com\"}]. PolicyIdentifiers []string `json:"policy_identifiers"` // If set, Postal Code will be set to this value in certificates issued by this role. PostalCode []string `json:"postal_code"` // If set, Province will be set to this value in certificates issued by this role. Province []string `json:"province"` // If set to false, makes the 'common_name' field optional while generating a certificate. RequireCn bool `json:"require_cn"` // If set, certificates are flagged for server auth use. Defaults to true. See also RFC 5280 Section 4.2.1.12. ServerFlag bool `json:"server_flag"` // The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). SignatureBits int32 `json:"signature_bits"` // If set, Street Address will be set to this value in certificates issued by this role. StreetAddress []string `json:"street_address"` // The lease duration (validity period of the certificate) if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the system default value or the value of max_ttl, whichever is shorter. Ttl int32 `json:"ttl"` // If set, when used with a signing profile, the common name in the CSR will be used. This does *not* include any requested Subject Alternative Names; use use_csr_sans for that. Defaults to true. UseCsrCommonName bool `json:"use_csr_common_name"` // If set, when used with a signing profile, the SANs in the CSR will be used. This does *not* include the Common Name (cn); use use_csr_common_name for that. Defaults to true. UseCsrSans bool `json:"use_csr_sans"` // Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. UsePss bool `json:"use_pss"` }
PKIWriteRoleRequest struct for PKIWriteRoleRequest
func NewPKIWriteRoleRequestWithDefaults ¶
func NewPKIWriteRoleRequestWithDefaults() *PKIWriteRoleRequest
NewPKIWriteRoleRequestWithDefaults instantiates a new PKIWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteRoleRequest) MarshalJSON ¶
func (o PKIWriteRoleRequest) MarshalJSON() ([]byte, error)
type PKIWriteURLConfigRequest ¶
type PKIWriteURLConfigRequest struct { // Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. CrlDistributionPoints []string `json:"crl_distribution_points"` // Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URI validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters. EnableTemplating bool `json:"enable_templating"` // Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1. IssuingCertificates []string `json:"issuing_certificates"` // Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1. OcspServers []string `json:"ocsp_servers"` }
PKIWriteURLConfigRequest struct for PKIWriteURLConfigRequest
func NewPKIWriteURLConfigRequestWithDefaults ¶
func NewPKIWriteURLConfigRequestWithDefaults() *PKIWriteURLConfigRequest
NewPKIWriteURLConfigRequestWithDefaults instantiates a new PKIWriteURLConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PKIWriteURLConfigRequest) MarshalJSON ¶
func (o PKIWriteURLConfigRequest) MarshalJSON() ([]byte, error)
type PersonaIDWriteByIDRequest ¶
type PersonaIDWriteByIDRequest struct { // Entity ID to which this persona should be tied to EntityId string `json:"entity_id"` // Metadata to be associated with the persona. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault <command> <path> metadata=key1=value1 metadata=key2=value2 Metadata map[string]interface{} `json:"metadata"` // Mount accessor to which this persona belongs to MountAccessor string `json:"mount_accessor"` // Name of the persona Name string `json:"name"` }
PersonaIDWriteByIDRequest struct for PersonaIDWriteByIDRequest
func NewPersonaIDWriteByIDRequestWithDefaults ¶
func NewPersonaIDWriteByIDRequestWithDefaults() *PersonaIDWriteByIDRequest
NewPersonaIDWriteByIDRequestWithDefaults instantiates a new PersonaIDWriteByIDRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PersonaIDWriteByIDRequest) MarshalJSON ¶
func (o PersonaIDWriteByIDRequest) MarshalJSON() ([]byte, error)
type PersonaWriteRequest ¶
type PersonaWriteRequest struct { // Entity ID to which this persona belongs to EntityId string `json:"entity_id"` // ID of the persona Id string `json:"id"` // Metadata to be associated with the persona. In CLI, this parameter can be repeated multiple times, and it all gets merged together. For example: vault <command> <path> metadata=key1=value1 metadata=key2=value2 Metadata map[string]interface{} `json:"metadata"` // Mount accessor to which this persona belongs to MountAccessor string `json:"mount_accessor"` // Name of the persona Name string `json:"name"` }
PersonaWriteRequest struct for PersonaWriteRequest
func NewPersonaWriteRequestWithDefaults ¶
func NewPersonaWriteRequestWithDefaults() *PersonaWriteRequest
NewPersonaWriteRequestWithDefaults instantiates a new PersonaWriteRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PersonaWriteRequest) MarshalJSON ¶
func (o PersonaWriteRequest) MarshalJSON() ([]byte, error)
type PkiWriteIssuerRefDerPemRequest ¶
type PkiWriteIssuerRefDerPemRequest struct { // Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. CrlDistributionPoints []string `json:"crl_distribution_points"` // Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URL validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters. EnableAiaUrlTemplating bool `json:"enable_aia_url_templating"` // Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' IssuerName string `json:"issuer_name"` // Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1. IssuingCertificates []string `json:"issuing_certificates"` // Behavior of leaf's NotAfter fields: \"err\" to error if the computed NotAfter date exceeds that of this issuer; \"truncate\" to silently truncate to that of this issuer; or \"permit\" to allow this issuance to succeed (with NotAfter exceeding that of an issuer). Note that not all values will results in certificates that can be validated through the entire validity period. It is suggested to use \"truncate\" for intermediate CAs and \"permit\" only for root CAs. LeafNotAfterBehavior string `json:"leaf_not_after_behavior"` // Chain of issuer references to use to build this issuer's computed CAChain field, when non-empty. ManualChain []string `json:"manual_chain"` // Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1. OcspServers []string `json:"ocsp_servers"` // Which x509.SignatureAlgorithm name to use for signing CRLs. This parameter allows differentiation between PKCS#1v1.5 and PSS keys and choice of signature hash algorithm. The default (empty string) value is for Go to select the signature algorithm. This can fail if the underlying key does not support the requested signature algorithm, which may not be known at modification time (such as with PKCS#11 managed RSA keys). RevocationSignatureAlgorithm string `json:"revocation_signature_algorithm"` // Comma-separated list (or string slice) of usages for this issuer; valid values are \"read-only\", \"issuing-certificates\", \"crl-signing\", and \"ocsp-signing\". Multiple values may be specified. Read-only is implicit and always set. Usage []string `json:"usage"` }
PkiWriteIssuerRefDerPemRequest struct for PkiWriteIssuerRefDerPemRequest
func NewPkiWriteIssuerRefDerPemRequestWithDefaults ¶
func NewPkiWriteIssuerRefDerPemRequestWithDefaults() *PkiWriteIssuerRefDerPemRequest
NewPkiWriteIssuerRefDerPemRequestWithDefaults instantiates a new PkiWriteIssuerRefDerPemRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PkiWriteIssuerRefDerPemRequest) MarshalJSON ¶
func (o PkiWriteIssuerRefDerPemRequest) MarshalJSON() ([]byte, error)
type PkiWriteJsonRequest ¶
type PkiWriteJsonRequest struct { // Comma-separated list of URLs to be used for the CRL distribution points attribute. See also RFC 5280 Section 4.2.1.13. CrlDistributionPoints []string `json:"crl_distribution_points"` // Whether or not to enabling templating of the above AIA fields. When templating is enabled the special values '{{issuer_id}}' and '{{cluster_path}}' are available, but the addresses are not checked for URL validity until issuance time. This requires /config/cluster's path to be set on all PR Secondary clusters. EnableAiaUrlTemplating bool `json:"enable_aia_url_templating"` // Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default' IssuerName string `json:"issuer_name"` // Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. IssuerRef string `json:"issuer_ref"` // Comma-separated list of URLs to be used for the issuing certificate attribute. See also RFC 5280 Section 4.2.2.1. IssuingCertificates []string `json:"issuing_certificates"` // Behavior of leaf's NotAfter fields: \"err\" to error if the computed NotAfter date exceeds that of this issuer; \"truncate\" to silently truncate to that of this issuer; or \"permit\" to allow this issuance to succeed (with NotAfter exceeding that of an issuer). Note that not all values will results in certificates that can be validated through the entire validity period. It is suggested to use \"truncate\" for intermediate CAs and \"permit\" only for root CAs. LeafNotAfterBehavior string `json:"leaf_not_after_behavior"` // Chain of issuer references to use to build this issuer's computed CAChain field, when non-empty. ManualChain []string `json:"manual_chain"` // Comma-separated list of URLs to be used for the OCSP servers attribute. See also RFC 5280 Section 4.2.2.1. OcspServers []string `json:"ocsp_servers"` // Which x509.SignatureAlgorithm name to use for signing CRLs. This parameter allows differentiation between PKCS#1v1.5 and PSS keys and choice of signature hash algorithm. The default (empty string) value is for Go to select the signature algorithm. This can fail if the underlying key does not support the requested signature algorithm, which may not be known at modification time (such as with PKCS#11 managed RSA keys). RevocationSignatureAlgorithm string `json:"revocation_signature_algorithm"` // Comma-separated list (or string slice) of usages for this issuer; valid values are \"read-only\", \"issuing-certificates\", \"crl-signing\", and \"ocsp-signing\". Multiple values may be specified. Read-only is implicit and always set. Usage []string `json:"usage"` }
PkiWriteJsonRequest struct for PkiWriteJsonRequest
func NewPkiWriteJsonRequestWithDefaults ¶
func NewPkiWriteJsonRequestWithDefaults() *PkiWriteJsonRequest
NewPkiWriteJsonRequestWithDefaults instantiates a new PkiWriteJsonRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (PkiWriteJsonRequest) MarshalJSON ¶
func (o PkiWriteJsonRequest) MarshalJSON() ([]byte, error)
type RabbitMQWriteConnectionConfigRequest ¶
type RabbitMQWriteConnectionConfigRequest struct { // RabbitMQ Management URI ConnectionUri string `json:"connection_uri"` // Password of the provided RabbitMQ management user Password string `json:"password"` // Name of the password policy to use to generate passwords for dynamic credentials. PasswordPolicy string `json:"password_policy"` // Username of a RabbitMQ management administrator Username string `json:"username"` // Template describing how dynamic usernames are generated. UsernameTemplate string `json:"username_template"` // If set, connection_uri is verified by actually connecting to the RabbitMQ management API VerifyConnection bool `json:"verify_connection"` }
RabbitMQWriteConnectionConfigRequest struct for RabbitMQWriteConnectionConfigRequest
func NewRabbitMQWriteConnectionConfigRequestWithDefaults ¶
func NewRabbitMQWriteConnectionConfigRequestWithDefaults() *RabbitMQWriteConnectionConfigRequest
NewRabbitMQWriteConnectionConfigRequestWithDefaults instantiates a new RabbitMQWriteConnectionConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RabbitMQWriteConnectionConfigRequest) MarshalJSON ¶
func (o RabbitMQWriteConnectionConfigRequest) MarshalJSON() ([]byte, error)
type RabbitMQWriteLeaseConfigRequest ¶
type RabbitMQWriteLeaseConfigRequest struct { // Duration after which the issued credentials should not be allowed to be renewed MaxTtl int32 `json:"max_ttl"` // Duration before which the issued credentials needs renewal Ttl int32 `json:"ttl"` }
RabbitMQWriteLeaseConfigRequest struct for RabbitMQWriteLeaseConfigRequest
func NewRabbitMQWriteLeaseConfigRequestWithDefaults ¶
func NewRabbitMQWriteLeaseConfigRequestWithDefaults() *RabbitMQWriteLeaseConfigRequest
NewRabbitMQWriteLeaseConfigRequestWithDefaults instantiates a new RabbitMQWriteLeaseConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RabbitMQWriteLeaseConfigRequest) MarshalJSON ¶
func (o RabbitMQWriteLeaseConfigRequest) MarshalJSON() ([]byte, error)
type RabbitMQWriteRoleRequest ¶
type RabbitMQWriteRoleRequest struct { // Comma-separated list of tags for this role. Tags string `json:"tags"` // A nested map of virtual hosts and exchanges to topic permissions. VhostTopics string `json:"vhost_topics"` // A map of virtual hosts to permissions. Vhosts string `json:"vhosts"` }
RabbitMQWriteRoleRequest struct for RabbitMQWriteRoleRequest
func NewRabbitMQWriteRoleRequestWithDefaults ¶
func NewRabbitMQWriteRoleRequestWithDefaults() *RabbitMQWriteRoleRequest
NewRabbitMQWriteRoleRequestWithDefaults instantiates a new RabbitMQWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RabbitMQWriteRoleRequest) MarshalJSON ¶
func (o RabbitMQWriteRoleRequest) MarshalJSON() ([]byte, error)
type RadiusLoginRequest ¶
type RadiusLoginRequest struct { // Password for this user. Password string `json:"password"` // Username to be used for login. (URL parameter) Urlusername string `json:"urlusername"` // Username to be used for login. (POST request body) Username string `json:"username"` }
RadiusLoginRequest struct for RadiusLoginRequest
func NewRadiusLoginRequestWithDefaults ¶
func NewRadiusLoginRequestWithDefaults() *RadiusLoginRequest
NewRadiusLoginRequestWithDefaults instantiates a new RadiusLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RadiusLoginRequest) MarshalJSON ¶
func (o RadiusLoginRequest) MarshalJSON() ([]byte, error)
type RadiusLoginWithUsernameRequest ¶
type RadiusLoginWithUsernameRequest struct { // Password for this user. Password string `json:"password"` // Username to be used for login. (POST request body) Username string `json:"username"` }
RadiusLoginWithUsernameRequest struct for RadiusLoginWithUsernameRequest
func NewRadiusLoginWithUsernameRequestWithDefaults ¶
func NewRadiusLoginWithUsernameRequestWithDefaults() *RadiusLoginWithUsernameRequest
NewRadiusLoginWithUsernameRequestWithDefaults instantiates a new RadiusLoginWithUsernameRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RadiusLoginWithUsernameRequest) MarshalJSON ¶
func (o RadiusLoginWithUsernameRequest) MarshalJSON() ([]byte, error)
type RadiusWriteConfigRequest ¶
type RadiusWriteConfigRequest struct { // Number of seconds before connect times out (default: 10) DialTimeout int32 `json:"dial_timeout"` // RADIUS server host Host string `json:"host"` // RADIUS NAS Identifier field (optional) NasIdentifier string `json:"nas_identifier"` // RADIUS NAS port field (default: 10) NasPort int32 `json:"nas_port"` // RADIUS server port (default: 1812) Port int32 `json:"port"` // Number of seconds before response times out (default: 10) ReadTimeout int32 `json:"read_timeout"` // Secret shared with the RADIUS server Secret string `json:"secret"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies. This will apply to all tokens generated by this auth method, in addition to any configured for specific users. TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Comma-separated list of policies to grant upon successful RADIUS authentication of an unregisted user (default: empty) UnregisteredUserPolicies string `json:"unregistered_user_policies"` }
RadiusWriteConfigRequest struct for RadiusWriteConfigRequest
func NewRadiusWriteConfigRequestWithDefaults ¶
func NewRadiusWriteConfigRequestWithDefaults() *RadiusWriteConfigRequest
NewRadiusWriteConfigRequestWithDefaults instantiates a new RadiusWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RadiusWriteConfigRequest) MarshalJSON ¶
func (o RadiusWriteConfigRequest) MarshalJSON() ([]byte, error)
type RadiusWriteUserRequest ¶
type RadiusWriteUserRequest struct { // Comma-separated list of policies associated to the user. Policies []string `json:"policies"` }
RadiusWriteUserRequest struct for RadiusWriteUserRequest
func NewRadiusWriteUserRequestWithDefaults ¶
func NewRadiusWriteUserRequestWithDefaults() *RadiusWriteUserRequest
NewRadiusWriteUserRequestWithDefaults instantiates a new RadiusWriteUserRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RadiusWriteUserRequest) MarshalJSON ¶
func (o RadiusWriteUserRequest) MarshalJSON() ([]byte, error)
type RemountRequest ¶
type RemountRequest struct { // The previous mount point. From string `json:"from"` // The new mount point. To string `json:"to"` }
RemountRequest struct for RemountRequest
func NewRemountRequestWithDefaults ¶
func NewRemountRequestWithDefaults() *RemountRequest
NewRemountRequestWithDefaults instantiates a new RemountRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RemountRequest) MarshalJSON ¶
func (o RemountRequest) MarshalJSON() ([]byte, error)
type RenewForRequest ¶
type RenewForRequest struct { // The desired increment in seconds to the lease Increment int32 `json:"increment"` // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` }
RenewForRequest struct for RenewForRequest
func NewRenewForRequestWithDefaults ¶
func NewRenewForRequestWithDefaults() *RenewForRequest
NewRenewForRequestWithDefaults instantiates a new RenewForRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RenewForRequest) MarshalJSON ¶
func (o RenewForRequest) MarshalJSON() ([]byte, error)
type RenewRequest ¶
type RenewRequest struct { // The desired increment in seconds to the lease Increment int32 `json:"increment"` // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` // The lease identifier to renew. This is included with a lease. UrlLeaseId string `json:"url_lease_id"` }
RenewRequest struct for RenewRequest
func NewRenewRequestWithDefaults ¶
func NewRenewRequestWithDefaults() *RenewRequest
NewRenewRequestWithDefaults instantiates a new RenewRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RenewRequest) MarshalJSON ¶
func (o RenewRequest) MarshalJSON() ([]byte, error)
type RevokeLeaseRequest ¶
type RevokeLeaseRequest struct { // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` // Whether or not to perform the revocation synchronously Sync bool `json:"sync"` }
RevokeLeaseRequest struct for RevokeLeaseRequest
func NewRevokeLeaseRequestWithDefaults ¶
func NewRevokeLeaseRequestWithDefaults() *RevokeLeaseRequest
NewRevokeLeaseRequestWithDefaults instantiates a new RevokeLeaseRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RevokeLeaseRequest) MarshalJSON ¶
func (o RevokeLeaseRequest) MarshalJSON() ([]byte, error)
type RevokePrefixRequest ¶
type RevokePrefixRequest struct { // Whether or not to perform the revocation synchronously Sync bool `json:"sync"` }
RevokePrefixRequest struct for RevokePrefixRequest
func NewRevokePrefixRequestWithDefaults ¶
func NewRevokePrefixRequestWithDefaults() *RevokePrefixRequest
NewRevokePrefixRequestWithDefaults instantiates a new RevokePrefixRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RevokePrefixRequest) MarshalJSON ¶
func (o RevokePrefixRequest) MarshalJSON() ([]byte, error)
type RevokeRequest ¶
type RevokeRequest struct { // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` // Whether or not to perform the revocation synchronously Sync bool `json:"sync"` // The lease identifier to renew. This is included with a lease. UrlLeaseId string `json:"url_lease_id"` }
RevokeRequest struct for RevokeRequest
func NewRevokeRequestWithDefaults ¶
func NewRevokeRequestWithDefaults() *RevokeRequest
NewRevokeRequestWithDefaults instantiates a new RevokeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (RevokeRequest) MarshalJSON ¶
func (o RevokeRequest) MarshalJSON() ([]byte, error)
type SSHLookupRequest ¶
type SSHLookupRequest struct { // [Required] IP address of remote host Ip string `json:"ip"` }
SSHLookupRequest struct for SSHLookupRequest
func NewSSHLookupRequestWithDefaults ¶
func NewSSHLookupRequestWithDefaults() *SSHLookupRequest
NewSSHLookupRequestWithDefaults instantiates a new SSHLookupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SSHLookupRequest) MarshalJSON ¶
func (o SSHLookupRequest) MarshalJSON() ([]byte, error)
type SSHSignRequest ¶
type SSHSignRequest struct { // Type of certificate to be created; either \"user\" or \"host\". CertType string `json:"cert_type"` // Critical options that the certificate should be signed for. CriticalOptions map[string]interface{} `json:"critical_options"` // Extensions that the certificate should be signed for. Extensions map[string]interface{} `json:"extensions"` // Key id that the created certificate should have. If not specified, the display name of the token will be used. KeyId string `json:"key_id"` // SSH public key that should be signed. PublicKey string `json:"public_key"` // The requested Time To Live for the SSH certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be later than the role max TTL. Ttl int32 `json:"ttl"` // Valid principals, either usernames or hostnames, that the certificate should be signed for. ValidPrincipals string `json:"valid_principals"` }
SSHSignRequest struct for SSHSignRequest
func NewSSHSignRequestWithDefaults ¶
func NewSSHSignRequestWithDefaults() *SSHSignRequest
NewSSHSignRequestWithDefaults instantiates a new SSHSignRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SSHSignRequest) MarshalJSON ¶
func (o SSHSignRequest) MarshalJSON() ([]byte, error)
type SSHVerifyRequest ¶
type SSHVerifyRequest struct { // [Required] One-Time-Key that needs to be validated Otp string `json:"otp"` }
SSHVerifyRequest struct for SSHVerifyRequest
func NewSSHVerifyRequestWithDefaults ¶
func NewSSHVerifyRequestWithDefaults() *SSHVerifyRequest
NewSSHVerifyRequestWithDefaults instantiates a new SSHVerifyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SSHVerifyRequest) MarshalJSON ¶
func (o SSHVerifyRequest) MarshalJSON() ([]byte, error)
type SSHWriteCAConfigRequest ¶
type SSHWriteCAConfigRequest struct { // Generate SSH key pair internally rather than use the private_key and public_key fields. GenerateSigningKey bool `json:"generate_signing_key"` // Specifies the desired key bits when generating variable-length keys (such as when key_type=\"ssh-rsa\") or which NIST P-curve to use when key_type=\"ec\" (256, 384, or 521). KeyBits int32 `json:"key_bits"` // Specifies the desired key type when generating; could be a OpenSSH key type identifier (ssh-rsa, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, or ssh-ed25519) or an algorithm (rsa, ec, ed25519). KeyType string `json:"key_type"` // Private half of the SSH key that will be used to sign certificates. PrivateKey string `json:"private_key"` // Public half of the SSH key that will be used to sign certificates. PublicKey string `json:"public_key"` }
SSHWriteCAConfigRequest struct for SSHWriteCAConfigRequest
func NewSSHWriteCAConfigRequestWithDefaults ¶
func NewSSHWriteCAConfigRequestWithDefaults() *SSHWriteCAConfigRequest
NewSSHWriteCAConfigRequestWithDefaults instantiates a new SSHWriteCAConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SSHWriteCAConfigRequest) MarshalJSON ¶
func (o SSHWriteCAConfigRequest) MarshalJSON() ([]byte, error)
type SSHWriteCredentialsRequest ¶
type SSHWriteCredentialsRequest struct { // [Required] IP of the remote host Ip string `json:"ip"` // [Optional] Username in remote host Username string `json:"username"` }
SSHWriteCredentialsRequest struct for SSHWriteCredentialsRequest
func NewSSHWriteCredentialsRequestWithDefaults ¶
func NewSSHWriteCredentialsRequestWithDefaults() *SSHWriteCredentialsRequest
NewSSHWriteCredentialsRequestWithDefaults instantiates a new SSHWriteCredentialsRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SSHWriteCredentialsRequest) MarshalJSON ¶
func (o SSHWriteCredentialsRequest) MarshalJSON() ([]byte, error)
type SSHWriteIssueRequest ¶
type SSHWriteIssueRequest struct { // Type of certificate to be created; either \"user\" or \"host\". CertType string `json:"cert_type"` // Critical options that the certificate should be signed for. CriticalOptions map[string]interface{} `json:"critical_options"` // Extensions that the certificate should be signed for. Extensions map[string]interface{} `json:"extensions"` // Specifies the number of bits to use for the generated keys. KeyBits int32 `json:"key_bits"` // Key id that the created certificate should have. If not specified, the display name of the token will be used. KeyId string `json:"key_id"` // Specifies the desired key type; must be `rsa`, `ed25519` or `ec` KeyType string `json:"key_type"` // The requested Time To Live for the SSH certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be later than the role max TTL. Ttl int32 `json:"ttl"` // Valid principals, either usernames or hostnames, that the certificate should be signed for. ValidPrincipals string `json:"valid_principals"` }
SSHWriteIssueRequest struct for SSHWriteIssueRequest
func NewSSHWriteIssueRequestWithDefaults ¶
func NewSSHWriteIssueRequestWithDefaults() *SSHWriteIssueRequest
NewSSHWriteIssueRequestWithDefaults instantiates a new SSHWriteIssueRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SSHWriteIssueRequest) MarshalJSON ¶
func (o SSHWriteIssueRequest) MarshalJSON() ([]byte, error)
type SSHWriteKeysRequest ¶
type SSHWriteKeysRequest struct { // [Required] SSH private key with super user privileges in host Key string `json:"key"` }
SSHWriteKeysRequest struct for SSHWriteKeysRequest
func NewSSHWriteKeysRequestWithDefaults ¶
func NewSSHWriteKeysRequestWithDefaults() *SSHWriteKeysRequest
NewSSHWriteKeysRequestWithDefaults instantiates a new SSHWriteKeysRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SSHWriteKeysRequest) MarshalJSON ¶
func (o SSHWriteKeysRequest) MarshalJSON() ([]byte, error)
type SSHWriteRoleRequest ¶
type SSHWriteRoleRequest struct { // [Required for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Admin user at remote host. The shared key being registered should be for this user and should have root privileges. Everytime a dynamic credential is being generated for other users, Vault uses this admin username to login to remote host and install the generated credential for the other user. AdminUser string `json:"admin_user"` // When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512, default, or the empty string. AlgorithmSigner string `json:"algorithm_signer"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use the base domains listed in \"allowed_domains\", e.g. \"example.com\". This is a separate option as in some cases this can be considered a security threat. AllowBareDomains bool `json:"allow_bare_domains"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'host'. AllowHostCertificates bool `json:"allow_host_certificates"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, host certificates that are requested are allowed to use subdomains of those listed in \"allowed_domains\". AllowSubdomains bool `json:"allow_subdomains"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, certificates are allowed to be signed for use as a 'user'. AllowUserCertificates bool `json:"allow_user_certificates"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If true, users can override the key ID for a signed certificate with the \"key_id\" field. When false, the key ID will always be the token display name. The key ID is logged by the SSH server and can be useful for auditing. AllowUserKeyIds bool `json:"allow_user_key_ids"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] A comma-separated list of critical options that certificates can have when signed. To allow any critical options, set this to an empty string. AllowedCriticalOptions string `json:"allowed_critical_options"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If this option is not specified, client can request for a signed certificate for any valid host. If only certain domains are allowed, then this list enforces it. AllowedDomains string `json:"allowed_domains"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Allowed domains can be specified using identity template policies. Non-templated domains are also permitted. AllowedDomainsTemplate bool `json:"allowed_domains_template"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] A comma-separated list of extensions that certificates can have when signed. An empty list means that no extension overrides are allowed by an end-user; explicitly specify '*' to allow any extensions to be set. AllowedExtensions string `json:"allowed_extensions"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, allows the enforcement of key types and minimum key sizes to be signed. AllowedUserKeyLengths map[string]interface{} `json:"allowed_user_key_lengths"` // [Optional for all types] [Works differently for CA type] If this option is not specified, or is '*', client can request a credential for any valid user at the remote host, including the admin user. If only certain usernames are to be allowed, then this list enforces it. If this field is set, then credentials can only be created for default_user and usernames present in this list. Setting this option will enable all the users with access to this role to fetch credentials for all other usernames in this list. Use with caution. N.B.: with the CA type, an empty list means that no users are allowed; explicitly specify '*' to allow any user. AllowedUsers string `json:"allowed_users"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Allowed users can be specified using identity template policies. Non-templated users are also permitted. AllowedUsersTemplate bool `json:"allowed_users_template"` // [Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks for which the role is applicable for. CIDR blocks can belong to more than one role. CidrList string `json:"cidr_list"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] Critical options certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_critical_options\". Defaults to none. DefaultCriticalOptions map[string]interface{} `json:"default_critical_options"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] Extensions certificates should have if none are provided when signing. This field takes in key value pairs in JSON format. Note that these are not restricted by \"allowed_extensions\". Defaults to none. DefaultExtensions map[string]interface{} `json:"default_extensions"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Default extension values can be specified using identity template policies. Non-templated extension values are also permitted. DefaultExtensionsTemplate bool `json:"default_extensions_template"` // [Required for Dynamic type] [Required for OTP type] [Optional for CA type] Default username for which a credential will be generated. When the endpoint 'creds/' is used without a username, this value will be used as default username. DefaultUser string `json:"default_user"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] If set, Default user can be specified using identity template policies. Non-templated users are also permitted. DefaultUserTemplate bool `json:"default_user_template"` // [Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Comma separated list of CIDR blocks. IP addresses belonging to these blocks are not accepted by the role. This is particularly useful when big CIDR blocks are being used by the role and certain parts of it needs to be kept out. ExcludeCidrList string `json:"exclude_cidr_list"` // [Optional for Dynamic type] [Not-applicable for OTP type] [Not applicable for CA type] Script used to install and uninstall public keys in the target machine. The inbuilt default install script will be for Linux hosts. For sample script, refer the project documentation website. InstallScript string `json:"install_script"` // [Required for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Name of the registered key in Vault. Before creating the role, use the 'keys/' endpoint to create a named key. Key string `json:"key"` // [Optional for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Length of the RSA dynamic key in bits. It is 1024 by default or it can be 2048. KeyBits int32 `json:"key_bits"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] When supplied, this value specifies a custom format for the key id of a signed certificate. The following variables are available for use: '{{token_display_name}}' - The display name of the token used to make the request. '{{role_name}}' - The name of the role signing the request. '{{public_key_hash}}' - A SHA256 checksum of the public key that is being signed. KeyIdFormat string `json:"key_id_format"` // [Optional for Dynamic type] [Not applicable for OTP type] [Not applicable for CA type] Comma separated option specifications which will be prefixed to RSA key in authorized_keys file. Options should be valid and comply with authorized_keys file format and should not contain spaces. KeyOptionSpecs string `json:"key_option_specs"` // [Required for all types] Type of key used to login to hosts. It can be either 'otp', 'dynamic' or 'ca'. 'otp' type requires agent to be installed in remote hosts. KeyType string `json:"key_type"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] The maximum allowed lease duration MaxTtl int32 `json:"max_ttl"` // The duration that the SSH certificate should be backdated by at issuance. NotBeforeDuration int32 `json:"not_before_duration"` // [Optional for Dynamic type] [Optional for OTP type] [Not applicable for CA type] Port number for SSH connection. Default is '22'. Port number does not play any role in creation of OTP. For 'otp' type, this is just a way to inform client about the port number to use. Port number will be returned to client by Vault server along with OTP. Port int32 `json:"port"` // [Not applicable for Dynamic type] [Not applicable for OTP type] [Optional for CA type] The lease duration if no specific lease duration is requested. The lease duration controls the expiration of certificates issued by this backend. Defaults to the value of max_ttl. Ttl int32 `json:"ttl"` }
SSHWriteRoleRequest struct for SSHWriteRoleRequest
func NewSSHWriteRoleRequestWithDefaults ¶
func NewSSHWriteRoleRequestWithDefaults() *SSHWriteRoleRequest
NewSSHWriteRoleRequestWithDefaults instantiates a new SSHWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SSHWriteRoleRequest) MarshalJSON ¶
func (o SSHWriteRoleRequest) MarshalJSON() ([]byte, error)
type SSHWriteZeroAddressConfigRequest ¶
type SSHWriteZeroAddressConfigRequest struct { // [Required] Comma separated list of role names which allows credentials to be requested for any IP address. CIDR blocks previously registered under these roles will be ignored. Roles []string `json:"roles"` }
SSHWriteZeroAddressConfigRequest struct for SSHWriteZeroAddressConfigRequest
func NewSSHWriteZeroAddressConfigRequestWithDefaults ¶
func NewSSHWriteZeroAddressConfigRequestWithDefaults() *SSHWriteZeroAddressConfigRequest
NewSSHWriteZeroAddressConfigRequestWithDefaults instantiates a new SSHWriteZeroAddressConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SSHWriteZeroAddressConfigRequest) MarshalJSON ¶
func (o SSHWriteZeroAddressConfigRequest) MarshalJSON() ([]byte, error)
type SysWritePluginsCatalogNameRequest ¶
type SysWritePluginsCatalogNameRequest struct { // The args passed to plugin command. Args []string `json:"args"` // The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory. Command string `json:"command"` // The environment variables passed to plugin command. Each entry is of the form \"key=value\". Env []string `json:"env"` // The SHA256 sum of the executable used in the command field. This should be HEX encoded. Sha256 string `json:"sha256"` // The type of the plugin, may be auth, secret, or database Type string `json:"type"` // The semantic version of the plugin to use. Version string `json:"version"` }
SysWritePluginsCatalogNameRequest struct for SysWritePluginsCatalogNameRequest
func NewSysWritePluginsCatalogNameRequestWithDefaults ¶
func NewSysWritePluginsCatalogNameRequestWithDefaults() *SysWritePluginsCatalogNameRequest
NewSysWritePluginsCatalogNameRequestWithDefaults instantiates a new SysWritePluginsCatalogNameRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SysWritePluginsCatalogNameRequest) MarshalJSON ¶
func (o SysWritePluginsCatalogNameRequest) MarshalJSON() ([]byte, error)
type SysWriteToolsRandomUrlbytesRequest ¶
type SysWriteToolsRandomUrlbytesRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\". Format string `json:"format"` // Which system to source random data from, ether \"platform\", \"seal\", or \"all\". Source string `json:"source"` }
SysWriteToolsRandomUrlbytesRequest struct for SysWriteToolsRandomUrlbytesRequest
func NewSysWriteToolsRandomUrlbytesRequestWithDefaults ¶
func NewSysWriteToolsRandomUrlbytesRequestWithDefaults() *SysWriteToolsRandomUrlbytesRequest
NewSysWriteToolsRandomUrlbytesRequestWithDefaults instantiates a new SysWriteToolsRandomUrlbytesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (SysWriteToolsRandomUrlbytesRequest) MarshalJSON ¶
func (o SysWriteToolsRandomUrlbytesRequest) MarshalJSON() ([]byte, error)
type TOTPWriteCodeRequest ¶
type TOTPWriteCodeRequest struct { // TOTP code to be validated. Code string `json:"code"` }
TOTPWriteCodeRequest struct for TOTPWriteCodeRequest
func NewTOTPWriteCodeRequestWithDefaults ¶
func NewTOTPWriteCodeRequestWithDefaults() *TOTPWriteCodeRequest
NewTOTPWriteCodeRequestWithDefaults instantiates a new TOTPWriteCodeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TOTPWriteCodeRequest) MarshalJSON ¶
func (o TOTPWriteCodeRequest) MarshalJSON() ([]byte, error)
type TOTPWriteKeyRequest ¶
type TOTPWriteKeyRequest struct { // The name of the account associated with the key. Required if generate is true. AccountName string `json:"account_name"` // The hashing algorithm used to generate the TOTP token. Options include SHA1, SHA256 and SHA512. Algorithm string `json:"algorithm"` // The number of digits in the generated TOTP token. This value can either be 6 or 8. Digits int32 `json:"digits"` // Determines if a QR code and url are returned upon generating a key. Only used if generate is true. Exported bool `json:"exported"` // Determines if a key should be generated by Vault or if a key is being passed from another service. Generate bool `json:"generate"` // The name of the key's issuing organization. Required if generate is true. Issuer string `json:"issuer"` // The shared master key used to generate a TOTP token. Only used if generate is false. Key string `json:"key"` // Determines the size in bytes of the generated key. Only used if generate is true. KeySize int32 `json:"key_size"` // The length of time used to generate a counter for the TOTP token calculation. Period int32 `json:"period"` // The pixel size of the generated square QR code. Only used if generate is true and exported is true. If this value is 0, a QR code will not be returned. QrSize int32 `json:"qr_size"` // The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. Only used if generate is true. Skew int32 `json:"skew"` // A TOTP url string containing all of the parameters for key setup. Only used if generate is false. Url string `json:"url"` }
TOTPWriteKeyRequest struct for TOTPWriteKeyRequest
func NewTOTPWriteKeyRequestWithDefaults ¶
func NewTOTPWriteKeyRequestWithDefaults() *TOTPWriteKeyRequest
NewTOTPWriteKeyRequestWithDefaults instantiates a new TOTPWriteKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TOTPWriteKeyRequest) MarshalJSON ¶
func (o TOTPWriteKeyRequest) MarshalJSON() ([]byte, error)
type TerraformWriteConfigRequest ¶
type TerraformWriteConfigRequest struct { // The address to access Terraform Cloud or Enterprise. Default is \"https://app.terraform.io\". Address string `json:"address"` // The base path for the Terraform Cloud or Enterprise API. Default is \"/api/v2/\". BasePath string `json:"base_path"` // The token to access Terraform Cloud Token string `json:"token"` }
TerraformWriteConfigRequest struct for TerraformWriteConfigRequest
func NewTerraformWriteConfigRequestWithDefaults ¶
func NewTerraformWriteConfigRequestWithDefaults() *TerraformWriteConfigRequest
NewTerraformWriteConfigRequestWithDefaults instantiates a new TerraformWriteConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TerraformWriteConfigRequest) MarshalJSON ¶
func (o TerraformWriteConfigRequest) MarshalJSON() ([]byte, error)
type TerraformWriteRoleRequest ¶
type TerraformWriteRoleRequest struct { // Maximum time for role. If not set or set to 0, will use system default. MaxTtl int32 `json:"max_ttl"` // Name of the Terraform Cloud or Enterprise organization Organization string `json:"organization"` // ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx) TeamId string `json:"team_id"` // Default lease for generated credentials. If not set or set to 0, will use system default. Ttl int32 `json:"ttl"` // ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx) UserId string `json:"user_id"` }
TerraformWriteRoleRequest struct for TerraformWriteRoleRequest
func NewTerraformWriteRoleRequestWithDefaults ¶
func NewTerraformWriteRoleRequestWithDefaults() *TerraformWriteRoleRequest
NewTerraformWriteRoleRequestWithDefaults instantiates a new TerraformWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TerraformWriteRoleRequest) MarshalJSON ¶
func (o TerraformWriteRoleRequest) MarshalJSON() ([]byte, error)
type TokenRenewAccessorRequest ¶
type TokenRenewAccessorRequest struct { // Accessor of the token to renew (request body) Accessor string `json:"accessor"` // The desired increment in seconds to the token expiration Increment int32 `json:"increment"` }
TokenRenewAccessorRequest struct for TokenRenewAccessorRequest
func NewTokenRenewAccessorRequestWithDefaults ¶
func NewTokenRenewAccessorRequestWithDefaults() *TokenRenewAccessorRequest
NewTokenRenewAccessorRequestWithDefaults instantiates a new TokenRenewAccessorRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenRenewAccessorRequest) MarshalJSON ¶
func (o TokenRenewAccessorRequest) MarshalJSON() ([]byte, error)
type TokenRenewRequest ¶
type TokenRenewRequest struct { // The desired increment in seconds to the token expiration Increment int32 `json:"increment"` // Token to renew (request body) Token string `json:"token"` }
TokenRenewRequest struct for TokenRenewRequest
func NewTokenRenewRequestWithDefaults ¶
func NewTokenRenewRequestWithDefaults() *TokenRenewRequest
NewTokenRenewRequestWithDefaults instantiates a new TokenRenewRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenRenewRequest) MarshalJSON ¶
func (o TokenRenewRequest) MarshalJSON() ([]byte, error)
type TokenRenewSelfRequest ¶
type TokenRenewSelfRequest struct { // The desired increment in seconds to the token expiration Increment int32 `json:"increment"` // Token to renew (unused, does not need to be set) Token string `json:"token"` }
TokenRenewSelfRequest struct for TokenRenewSelfRequest
func NewTokenRenewSelfRequestWithDefaults ¶
func NewTokenRenewSelfRequestWithDefaults() *TokenRenewSelfRequest
NewTokenRenewSelfRequestWithDefaults instantiates a new TokenRenewSelfRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenRenewSelfRequest) MarshalJSON ¶
func (o TokenRenewSelfRequest) MarshalJSON() ([]byte, error)
type TokenRevokeAccessorRequest ¶
type TokenRevokeAccessorRequest struct { // Accessor of the token (request body) Accessor string `json:"accessor"` }
TokenRevokeAccessorRequest struct for TokenRevokeAccessorRequest
func NewTokenRevokeAccessorRequestWithDefaults ¶
func NewTokenRevokeAccessorRequestWithDefaults() *TokenRevokeAccessorRequest
NewTokenRevokeAccessorRequestWithDefaults instantiates a new TokenRevokeAccessorRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenRevokeAccessorRequest) MarshalJSON ¶
func (o TokenRevokeAccessorRequest) MarshalJSON() ([]byte, error)
type TokenRevokeOrphanRequest ¶
type TokenRevokeOrphanRequest struct { // Token to revoke (request body) Token string `json:"token"` }
TokenRevokeOrphanRequest struct for TokenRevokeOrphanRequest
func NewTokenRevokeOrphanRequestWithDefaults ¶
func NewTokenRevokeOrphanRequestWithDefaults() *TokenRevokeOrphanRequest
NewTokenRevokeOrphanRequestWithDefaults instantiates a new TokenRevokeOrphanRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenRevokeOrphanRequest) MarshalJSON ¶
func (o TokenRevokeOrphanRequest) MarshalJSON() ([]byte, error)
type TokenRevokeRequest ¶
type TokenRevokeRequest struct { // Token to revoke (request body) Token string `json:"token"` }
TokenRevokeRequest struct for TokenRevokeRequest
func NewTokenRevokeRequestWithDefaults ¶
func NewTokenRevokeRequestWithDefaults() *TokenRevokeRequest
NewTokenRevokeRequestWithDefaults instantiates a new TokenRevokeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenRevokeRequest) MarshalJSON ¶
func (o TokenRevokeRequest) MarshalJSON() ([]byte, error)
type TokenWriteCreateOrphanRequest ¶
type TokenWriteCreateOrphanRequest struct { // Name to associate with this token DisplayName string `json:"display_name"` // Name of the entity alias to associate with this token EntityAlias string `json:"entity_alias"` // Explicit Max TTL of this token ExplicitMaxTtl string `json:"explicit_max_ttl"` // Value for the token Id string `json:"id"` // Arbitrary key=value metadata to associate with the token Metadata map[string]interface{} `json:"metadata"` // Do not include default policy for this token NoDefaultPolicy bool `json:"no_default_policy"` // Create the token with no parent NoParent bool `json:"no_parent"` // Max number of uses for this token NumUses int32 `json:"num_uses"` // Renew period Period string `json:"period"` // List of policies for the token Policies []string `json:"policies"` // Allow token to be renewed past its initial TTL up to system/mount maximum TTL Renewable bool `json:"renewable"` // Name of the role RoleName string `json:"role_name"` // Time to live for this token Ttl string `json:"ttl"` // Token type Type string `json:"type"` }
TokenWriteCreateOrphanRequest struct for TokenWriteCreateOrphanRequest
func NewTokenWriteCreateOrphanRequestWithDefaults ¶
func NewTokenWriteCreateOrphanRequestWithDefaults() *TokenWriteCreateOrphanRequest
NewTokenWriteCreateOrphanRequestWithDefaults instantiates a new TokenWriteCreateOrphanRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenWriteCreateOrphanRequest) MarshalJSON ¶
func (o TokenWriteCreateOrphanRequest) MarshalJSON() ([]byte, error)
type TokenWriteCreateRequest ¶
type TokenWriteCreateRequest struct { // Name to associate with this token DisplayName string `json:"display_name"` // Name of the entity alias to associate with this token EntityAlias string `json:"entity_alias"` // Explicit Max TTL of this token ExplicitMaxTtl string `json:"explicit_max_ttl"` // Value for the token Id string `json:"id"` // Arbitrary key=value metadata to associate with the token Metadata map[string]interface{} `json:"metadata"` // Do not include default policy for this token NoDefaultPolicy bool `json:"no_default_policy"` // Create the token with no parent NoParent bool `json:"no_parent"` // Max number of uses for this token NumUses int32 `json:"num_uses"` // Renew period Period string `json:"period"` // List of policies for the token Policies []string `json:"policies"` // Allow token to be renewed past its initial TTL up to system/mount maximum TTL Renewable bool `json:"renewable"` // Time to live for this token Ttl string `json:"ttl"` // Token type Type string `json:"type"` }
TokenWriteCreateRequest struct for TokenWriteCreateRequest
func NewTokenWriteCreateRequestWithDefaults ¶
func NewTokenWriteCreateRequestWithDefaults() *TokenWriteCreateRequest
NewTokenWriteCreateRequestWithDefaults instantiates a new TokenWriteCreateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenWriteCreateRequest) MarshalJSON ¶
func (o TokenWriteCreateRequest) MarshalJSON() ([]byte, error)
type TokenWriteCreateWithRoleRequest ¶
type TokenWriteCreateWithRoleRequest struct { // Name to associate with this token DisplayName string `json:"display_name"` // Name of the entity alias to associate with this token EntityAlias string `json:"entity_alias"` // Explicit Max TTL of this token ExplicitMaxTtl string `json:"explicit_max_ttl"` // Value for the token Id string `json:"id"` // Arbitrary key=value metadata to associate with the token Metadata map[string]interface{} `json:"metadata"` // Do not include default policy for this token NoDefaultPolicy bool `json:"no_default_policy"` // Create the token with no parent NoParent bool `json:"no_parent"` // Max number of uses for this token NumUses int32 `json:"num_uses"` // Renew period Period string `json:"period"` // List of policies for the token Policies []string `json:"policies"` // Allow token to be renewed past its initial TTL up to system/mount maximum TTL Renewable bool `json:"renewable"` // Time to live for this token Ttl string `json:"ttl"` // Token type Type string `json:"type"` }
TokenWriteCreateWithRoleRequest struct for TokenWriteCreateWithRoleRequest
func NewTokenWriteCreateWithRoleRequestWithDefaults ¶
func NewTokenWriteCreateWithRoleRequestWithDefaults() *TokenWriteCreateWithRoleRequest
NewTokenWriteCreateWithRoleRequestWithDefaults instantiates a new TokenWriteCreateWithRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenWriteCreateWithRoleRequest) MarshalJSON ¶
func (o TokenWriteCreateWithRoleRequest) MarshalJSON() ([]byte, error)
type TokenWriteLookupAccessorRequest ¶
type TokenWriteLookupAccessorRequest struct { // Accessor of the token to look up (request body) Accessor string `json:"accessor"` }
TokenWriteLookupAccessorRequest struct for TokenWriteLookupAccessorRequest
func NewTokenWriteLookupAccessorRequestWithDefaults ¶
func NewTokenWriteLookupAccessorRequestWithDefaults() *TokenWriteLookupAccessorRequest
NewTokenWriteLookupAccessorRequestWithDefaults instantiates a new TokenWriteLookupAccessorRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenWriteLookupAccessorRequest) MarshalJSON ¶
func (o TokenWriteLookupAccessorRequest) MarshalJSON() ([]byte, error)
type TokenWriteLookupRequest ¶
type TokenWriteLookupRequest struct { // Token to lookup (POST request body) Token string `json:"token"` }
TokenWriteLookupRequest struct for TokenWriteLookupRequest
func NewTokenWriteLookupRequestWithDefaults ¶
func NewTokenWriteLookupRequestWithDefaults() *TokenWriteLookupRequest
NewTokenWriteLookupRequestWithDefaults instantiates a new TokenWriteLookupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenWriteLookupRequest) MarshalJSON ¶
func (o TokenWriteLookupRequest) MarshalJSON() ([]byte, error)
type TokenWriteLookupSelfRequest ¶
type TokenWriteLookupSelfRequest struct { // Token to look up (unused, does not need to be set) Token string `json:"token"` }
TokenWriteLookupSelfRequest struct for TokenWriteLookupSelfRequest
func NewTokenWriteLookupSelfRequestWithDefaults ¶
func NewTokenWriteLookupSelfRequestWithDefaults() *TokenWriteLookupSelfRequest
NewTokenWriteLookupSelfRequestWithDefaults instantiates a new TokenWriteLookupSelfRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenWriteLookupSelfRequest) MarshalJSON ¶
func (o TokenWriteLookupSelfRequest) MarshalJSON() ([]byte, error)
type TokenWriteRoleRequest ¶
type TokenWriteRoleRequest struct { // String or JSON list of allowed entity aliases. If set, specifies the entity aliases which are allowed to be used during token generation. This field supports globbing. AllowedEntityAliases []string `json:"allowed_entity_aliases"` // If set, tokens can be created with any subset of the policies in this list, rather than the normal semantics of tokens being a subset of the calling token's policies. The parameter is a comma-delimited string of policy names. AllowedPolicies []string `json:"allowed_policies"` // If set, tokens can be created with any subset of glob matched policies in this list, rather than the normal semantics of tokens being a subset of the calling token's policies. The parameter is a comma-delimited string of policy name globs. AllowedPoliciesGlob []string `json:"allowed_policies_glob"` // Use 'token_bound_cidrs' instead. // Deprecated BoundCidrs []string `json:"bound_cidrs"` // If set, successful token creation via this role will require that no policies in the given list are requested. The parameter is a comma-delimited string of policy names. DisallowedPolicies []string `json:"disallowed_policies"` // If set, successful token creation via this role will require that no requested policies glob match any of policies in this list. The parameter is a comma-delimited string of policy name globs. DisallowedPoliciesGlob []string `json:"disallowed_policies_glob"` // Use 'token_explicit_max_ttl' instead. // Deprecated ExplicitMaxTtl int32 `json:"explicit_max_ttl"` // If true, tokens created via this role will be orphan tokens (have no parent) Orphan bool `json:"orphan"` // If set, tokens created via this role will contain the given suffix as a part of their path. This can be used to assist use of the 'revoke-prefix' endpoint later on. The given suffix must match the regular expression.\\w[\\w-.]+\\w PathSuffix string `json:"path_suffix"` // Use 'token_period' instead. // Deprecated Period int32 `json:"period"` // Tokens created via this role will be renewable or not according to this value. Defaults to \"true\". Renewable bool `json:"renewable"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // The type of token to generate, service or batch TokenType string `json:"token_type"` }
TokenWriteRoleRequest struct for TokenWriteRoleRequest
func NewTokenWriteRoleRequestWithDefaults ¶
func NewTokenWriteRoleRequestWithDefaults() *TokenWriteRoleRequest
NewTokenWriteRoleRequestWithDefaults instantiates a new TokenWriteRoleRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TokenWriteRoleRequest) MarshalJSON ¶
func (o TokenWriteRoleRequest) MarshalJSON() ([]byte, error)
type ToolsGenerateRandomRequest ¶
type ToolsGenerateRandomRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\". Format string `json:"format"` // Which system to source random data from, ether \"platform\", \"seal\", or \"all\". Source string `json:"source"` // The number of bytes to generate (POST URL parameter) Urlbytes string `json:"urlbytes"` }
ToolsGenerateRandomRequest struct for ToolsGenerateRandomRequest
func NewToolsGenerateRandomRequestWithDefaults ¶
func NewToolsGenerateRandomRequestWithDefaults() *ToolsGenerateRandomRequest
NewToolsGenerateRandomRequestWithDefaults instantiates a new ToolsGenerateRandomRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ToolsGenerateRandomRequest) MarshalJSON ¶
func (o ToolsGenerateRandomRequest) MarshalJSON() ([]byte, error)
type ToolsGenerateRandomSourceBytesRequest ¶
type ToolsGenerateRandomSourceBytesRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\". Format string `json:"format"` }
ToolsGenerateRandomSourceBytesRequest struct for ToolsGenerateRandomSourceBytesRequest
func NewToolsGenerateRandomSourceBytesRequestWithDefaults ¶
func NewToolsGenerateRandomSourceBytesRequestWithDefaults() *ToolsGenerateRandomSourceBytesRequest
NewToolsGenerateRandomSourceBytesRequestWithDefaults instantiates a new ToolsGenerateRandomSourceBytesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ToolsGenerateRandomSourceBytesRequest) MarshalJSON ¶
func (o ToolsGenerateRandomSourceBytesRequest) MarshalJSON() ([]byte, error)
type ToolsGenerateRandomSourceRequest ¶
type ToolsGenerateRandomSourceRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\". Format string `json:"format"` // The number of bytes to generate (POST URL parameter) Urlbytes string `json:"urlbytes"` }
ToolsGenerateRandomSourceRequest struct for ToolsGenerateRandomSourceRequest
func NewToolsGenerateRandomSourceRequestWithDefaults ¶
func NewToolsGenerateRandomSourceRequestWithDefaults() *ToolsGenerateRandomSourceRequest
NewToolsGenerateRandomSourceRequestWithDefaults instantiates a new ToolsGenerateRandomSourceRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ToolsGenerateRandomSourceRequest) MarshalJSON ¶
func (o ToolsGenerateRandomSourceRequest) MarshalJSON() ([]byte, error)
type ToolsHashRequest ¶
type ToolsHashRequest struct { // Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 Defaults to \"sha2-256\". Algorithm string `json:"algorithm"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\". Format string `json:"format"` // The base64-encoded input data Input string `json:"input"` // Algorithm to use (POST URL parameter) Urlalgorithm string `json:"urlalgorithm"` }
ToolsHashRequest struct for ToolsHashRequest
func NewToolsHashRequestWithDefaults ¶
func NewToolsHashRequestWithDefaults() *ToolsHashRequest
NewToolsHashRequestWithDefaults instantiates a new ToolsHashRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ToolsHashRequest) MarshalJSON ¶
func (o ToolsHashRequest) MarshalJSON() ([]byte, error)
type ToolsHashWithRequest ¶
type ToolsHashWithRequest struct { // Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 Defaults to \"sha2-256\". Algorithm string `json:"algorithm"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\". Format string `json:"format"` // The base64-encoded input data Input string `json:"input"` }
ToolsHashWithRequest struct for ToolsHashWithRequest
func NewToolsHashWithRequestWithDefaults ¶
func NewToolsHashWithRequestWithDefaults() *ToolsHashWithRequest
NewToolsHashWithRequestWithDefaults instantiates a new ToolsHashWithRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (ToolsHashWithRequest) MarshalJSON ¶
func (o ToolsHashWithRequest) MarshalJSON() ([]byte, error)
type TransitDecryptRequest ¶
type TransitDecryptRequest struct { // When using an AEAD cipher mode, such as AES-GCM, this parameter allows passing associated data (AD/AAD) into the encryption function; this data must be passed on subsequent decryption requests but can be transited in plaintext. On successful decryption, both the ciphertext and the associated data are attested not to have been tampered with. AssociatedData string `json:"associated_data"` // The ciphertext to decrypt, provided as returned by encrypt. Ciphertext string `json:"ciphertext"` // Base64 encoded context for key derivation. Required if key derivation is enabled. Context string `json:"context"` // Base64 encoded nonce value used during encryption. Must be provided if convergent encryption is enabled for this key and the key was generated with Vault 0.6.1. Not required for keys created in 0.6.2+. Nonce string `json:"nonce"` // Ordinarily, if a batch item fails to decrypt due to a bad input, but other batch items succeed, the HTTP response code is 400 (Bad Request). Some applications may want to treat partial failures differently. Providing the parameter returns the given response code integer instead of a 400 in this case. If all values fail HTTP 400 is still returned. PartialFailureResponseCode int32 `json:"partial_failure_response_code"` }
TransitDecryptRequest struct for TransitDecryptRequest
func NewTransitDecryptRequestWithDefaults ¶
func NewTransitDecryptRequestWithDefaults() *TransitDecryptRequest
NewTransitDecryptRequestWithDefaults instantiates a new TransitDecryptRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitDecryptRequest) MarshalJSON ¶
func (o TransitDecryptRequest) MarshalJSON() ([]byte, error)
type TransitEncryptRequest ¶
type TransitEncryptRequest struct { // When using an AEAD cipher mode, such as AES-GCM, this parameter allows passing associated data (AD/AAD) into the encryption function; this data must be passed on subsequent decryption requests but can be transited in plaintext. On successful decryption, both the ciphertext and the associated data are attested not to have been tampered with. AssociatedData string `json:"associated_data"` // Base64 encoded context for key derivation. Required if key derivation is enabled Context string `json:"context"` // This parameter will only be used when a key is expected to be created. Whether to support convergent encryption. This is only supported when using a key with key derivation enabled and will require all requests to carry both a context and 96-bit (12-byte) nonce. The given nonce will be used in place of a randomly generated nonce. As a result, when the same context and nonce are supplied, the same ciphertext is generated. It is *very important* when using this mode that you ensure that all nonces are unique for a given context. Failing to do so will severely impact the ciphertext's security. ConvergentEncryption bool `json:"convergent_encryption"` // The version of the key to use for encryption. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. KeyVersion int32 `json:"key_version"` // Base64 encoded nonce value. Must be provided if convergent encryption is enabled for this key and the key was generated with Vault 0.6.1. Not required for keys created in 0.6.2+. The value must be exactly 96 bits (12 bytes) long and the user must ensure that for any given context (and thus, any given encryption key) this nonce value is **never reused**. Nonce string `json:"nonce"` // Ordinarily, if a batch item fails to encrypt due to a bad input, but other batch items succeed, the HTTP response code is 400 (Bad Request). Some applications may want to treat partial failures differently. Providing the parameter returns the given response code integer instead of a 400 in this case. If all values fail HTTP 400 is still returned. PartialFailureResponseCode int32 `json:"partial_failure_response_code"` // Base64 encoded plaintext value to be encrypted Plaintext string `json:"plaintext"` // This parameter is required when encryption key is expected to be created. When performing an upsert operation, the type of key to create. Currently, \"aes128-gcm96\" (symmetric) and \"aes256-gcm96\" (symmetric) are the only types supported. Defaults to \"aes256-gcm96\". Type string `json:"type"` }
TransitEncryptRequest struct for TransitEncryptRequest
func NewTransitEncryptRequestWithDefaults ¶
func NewTransitEncryptRequestWithDefaults() *TransitEncryptRequest
NewTransitEncryptRequestWithDefaults instantiates a new TransitEncryptRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitEncryptRequest) MarshalJSON ¶
func (o TransitEncryptRequest) MarshalJSON() ([]byte, error)
type TransitGenerateDataKeyRequest ¶
type TransitGenerateDataKeyRequest struct { // Number of bits for the key; currently 128, 256, and 512 bits are supported. Defaults to 256. Bits int32 `json:"bits"` // Context for key derivation. Required for derived keys. Context string `json:"context"` // The version of the Vault key to use for encryption of the data key. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. KeyVersion int32 `json:"key_version"` // Nonce for when convergent encryption v1 is used (only in Vault 0.6.1) Nonce string `json:"nonce"` }
TransitGenerateDataKeyRequest struct for TransitGenerateDataKeyRequest
func NewTransitGenerateDataKeyRequestWithDefaults ¶
func NewTransitGenerateDataKeyRequestWithDefaults() *TransitGenerateDataKeyRequest
NewTransitGenerateDataKeyRequestWithDefaults instantiates a new TransitGenerateDataKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitGenerateDataKeyRequest) MarshalJSON ¶
func (o TransitGenerateDataKeyRequest) MarshalJSON() ([]byte, error)
type TransitGenerateHMACRequest ¶
type TransitGenerateHMACRequest struct { // Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\". Algorithm string `json:"algorithm"` // The base64-encoded input data Input string `json:"input"` // The version of the key to use for generating the HMAC. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. KeyVersion int32 `json:"key_version"` // Algorithm to use (POST URL parameter) Urlalgorithm string `json:"urlalgorithm"` }
TransitGenerateHMACRequest struct for TransitGenerateHMACRequest
func NewTransitGenerateHMACRequestWithDefaults ¶
func NewTransitGenerateHMACRequestWithDefaults() *TransitGenerateHMACRequest
NewTransitGenerateHMACRequestWithDefaults instantiates a new TransitGenerateHMACRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitGenerateHMACRequest) MarshalJSON ¶
func (o TransitGenerateHMACRequest) MarshalJSON() ([]byte, error)
type TransitGenerateHMACWithAlgorithmRequest ¶
type TransitGenerateHMACWithAlgorithmRequest struct { // Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\". Algorithm string `json:"algorithm"` // The base64-encoded input data Input string `json:"input"` // The version of the key to use for generating the HMAC. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. KeyVersion int32 `json:"key_version"` }
TransitGenerateHMACWithAlgorithmRequest struct for TransitGenerateHMACWithAlgorithmRequest
func NewTransitGenerateHMACWithAlgorithmRequestWithDefaults ¶
func NewTransitGenerateHMACWithAlgorithmRequestWithDefaults() *TransitGenerateHMACWithAlgorithmRequest
NewTransitGenerateHMACWithAlgorithmRequestWithDefaults instantiates a new TransitGenerateHMACWithAlgorithmRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitGenerateHMACWithAlgorithmRequest) MarshalJSON ¶
func (o TransitGenerateHMACWithAlgorithmRequest) MarshalJSON() ([]byte, error)
type TransitGenerateRandomRequest ¶
type TransitGenerateRandomRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\". Format string `json:"format"` // Which system to source random data from, ether \"platform\", \"seal\", or \"all\". Source string `json:"source"` // The number of bytes to generate (POST URL parameter) Urlbytes string `json:"urlbytes"` }
TransitGenerateRandomRequest struct for TransitGenerateRandomRequest
func NewTransitGenerateRandomRequestWithDefaults ¶
func NewTransitGenerateRandomRequestWithDefaults() *TransitGenerateRandomRequest
NewTransitGenerateRandomRequestWithDefaults instantiates a new TransitGenerateRandomRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitGenerateRandomRequest) MarshalJSON ¶
func (o TransitGenerateRandomRequest) MarshalJSON() ([]byte, error)
type TransitGenerateRandomSourceBytesRequest ¶
type TransitGenerateRandomSourceBytesRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\". Format string `json:"format"` }
TransitGenerateRandomSourceBytesRequest struct for TransitGenerateRandomSourceBytesRequest
func NewTransitGenerateRandomSourceBytesRequestWithDefaults ¶
func NewTransitGenerateRandomSourceBytesRequestWithDefaults() *TransitGenerateRandomSourceBytesRequest
NewTransitGenerateRandomSourceBytesRequestWithDefaults instantiates a new TransitGenerateRandomSourceBytesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitGenerateRandomSourceBytesRequest) MarshalJSON ¶
func (o TransitGenerateRandomSourceBytesRequest) MarshalJSON() ([]byte, error)
type TransitGenerateRandomSourceRequest ¶
type TransitGenerateRandomSourceRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\". Format string `json:"format"` // The number of bytes to generate (POST URL parameter) Urlbytes string `json:"urlbytes"` }
TransitGenerateRandomSourceRequest struct for TransitGenerateRandomSourceRequest
func NewTransitGenerateRandomSourceRequestWithDefaults ¶
func NewTransitGenerateRandomSourceRequestWithDefaults() *TransitGenerateRandomSourceRequest
NewTransitGenerateRandomSourceRequestWithDefaults instantiates a new TransitGenerateRandomSourceRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitGenerateRandomSourceRequest) MarshalJSON ¶
func (o TransitGenerateRandomSourceRequest) MarshalJSON() ([]byte, error)
type TransitHashRequest ¶
type TransitHashRequest struct { // Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\". Algorithm string `json:"algorithm"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\". Format string `json:"format"` // The base64-encoded input data Input string `json:"input"` // Algorithm to use (POST URL parameter) Urlalgorithm string `json:"urlalgorithm"` }
TransitHashRequest struct for TransitHashRequest
func NewTransitHashRequestWithDefaults ¶
func NewTransitHashRequestWithDefaults() *TransitHashRequest
NewTransitHashRequestWithDefaults instantiates a new TransitHashRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitHashRequest) MarshalJSON ¶
func (o TransitHashRequest) MarshalJSON() ([]byte, error)
type TransitHashWithAlgorithmRequest ¶
type TransitHashWithAlgorithmRequest struct { // Algorithm to use (POST body parameter). Valid values are: * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 Defaults to \"sha2-256\". Algorithm string `json:"algorithm"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"hex\". Format string `json:"format"` // The base64-encoded input data Input string `json:"input"` }
TransitHashWithAlgorithmRequest struct for TransitHashWithAlgorithmRequest
func NewTransitHashWithAlgorithmRequestWithDefaults ¶
func NewTransitHashWithAlgorithmRequestWithDefaults() *TransitHashWithAlgorithmRequest
NewTransitHashWithAlgorithmRequestWithDefaults instantiates a new TransitHashWithAlgorithmRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitHashWithAlgorithmRequest) MarshalJSON ¶
func (o TransitHashWithAlgorithmRequest) MarshalJSON() ([]byte, error)
type TransitImportKeyRequest ¶
type TransitImportKeyRequest struct { // Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled. AllowPlaintextBackup bool `json:"allow_plaintext_backup"` // True if the imported key may be rotated within Vault; false otherwise. AllowRotation bool `json:"allow_rotation"` // Amount of time the key should live before being automatically rotated. A value of 0 (default) disables automatic rotation for the key. AutoRotatePeriod int32 `json:"auto_rotate_period"` // The base64-encoded ciphertext of the keys. The AES key should be encrypted using OAEP with the wrapping key and then concatenated with the import key, wrapped by the AES key. Ciphertext string `json:"ciphertext"` // Base64 encoded context for key derivation. When reading a key with key derivation enabled, if the key type supports public keys, this will return the public key for the given context. Context string `json:"context"` // Enables key derivation mode. This allows for per-transaction unique keys for encryption operations. Derived bool `json:"derived"` // Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Exportable bool `json:"exportable"` // The hash function used as a random oracle in the OAEP wrapping of the user-generated, ephemeral AES key. Can be one of \"SHA1\", \"SHA224\", \"SHA256\" (default), \"SHA384\", or \"SHA512\" HashFunction string `json:"hash_function"` // The type of key being imported. Currently, \"aes128-gcm96\" (symmetric), \"aes256-gcm96\" (symmetric), \"ecdsa-p256\" (asymmetric), \"ecdsa-p384\" (asymmetric), \"ecdsa-p521\" (asymmetric), \"ed25519\" (asymmetric), \"rsa-2048\" (asymmetric), \"rsa-3072\" (asymmetric), \"rsa-4096\" (asymmetric) are supported. Defaults to \"aes256-gcm96\". Type string `json:"type"` }
TransitImportKeyRequest struct for TransitImportKeyRequest
func NewTransitImportKeyRequestWithDefaults ¶
func NewTransitImportKeyRequestWithDefaults() *TransitImportKeyRequest
NewTransitImportKeyRequestWithDefaults instantiates a new TransitImportKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitImportKeyRequest) MarshalJSON ¶
func (o TransitImportKeyRequest) MarshalJSON() ([]byte, error)
type TransitImportKeyVersionRequest ¶
type TransitImportKeyVersionRequest struct { // The base64-encoded ciphertext of the keys. The AES key should be encrypted using OAEP with the wrapping key and then concatenated with the import key, wrapped by the AES key. Ciphertext string `json:"ciphertext"` // The hash function used as a random oracle in the OAEP wrapping of the user-generated, ephemeral AES key. Can be one of \"SHA1\", \"SHA224\", \"SHA256\" (default), \"SHA384\", or \"SHA512\" HashFunction string `json:"hash_function"` }
TransitImportKeyVersionRequest struct for TransitImportKeyVersionRequest
func NewTransitImportKeyVersionRequestWithDefaults ¶
func NewTransitImportKeyVersionRequestWithDefaults() *TransitImportKeyVersionRequest
NewTransitImportKeyVersionRequestWithDefaults instantiates a new TransitImportKeyVersionRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitImportKeyVersionRequest) MarshalJSON ¶
func (o TransitImportKeyVersionRequest) MarshalJSON() ([]byte, error)
type TransitRestoreKeyRequest ¶
type TransitRestoreKeyRequest struct { // Backed up key data to be restored. This should be the output from the 'backup/' endpoint. Backup string `json:"backup"` // If set and a key by the given name exists, force the restore operation and override the key. Force bool `json:"force"` }
TransitRestoreKeyRequest struct for TransitRestoreKeyRequest
func NewTransitRestoreKeyRequestWithDefaults ¶
func NewTransitRestoreKeyRequestWithDefaults() *TransitRestoreKeyRequest
NewTransitRestoreKeyRequestWithDefaults instantiates a new TransitRestoreKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitRestoreKeyRequest) MarshalJSON ¶
func (o TransitRestoreKeyRequest) MarshalJSON() ([]byte, error)
type TransitRestoreRequest ¶
type TransitRestoreRequest struct { // Backed up key data to be restored. This should be the output from the 'backup/' endpoint. Backup string `json:"backup"` // If set and a key by the given name exists, force the restore operation and override the key. Force bool `json:"force"` // If set, this will be the name of the restored key. Name string `json:"name"` }
TransitRestoreRequest struct for TransitRestoreRequest
func NewTransitRestoreRequestWithDefaults ¶
func NewTransitRestoreRequestWithDefaults() *TransitRestoreRequest
NewTransitRestoreRequestWithDefaults instantiates a new TransitRestoreRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitRestoreRequest) MarshalJSON ¶
func (o TransitRestoreRequest) MarshalJSON() ([]byte, error)
type TransitRewrapRequest ¶
type TransitRewrapRequest struct { // Ciphertext value to rewrap Ciphertext string `json:"ciphertext"` // Base64 encoded context for key derivation. Required for derived keys. Context string `json:"context"` // The version of the key to use for encryption. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. KeyVersion int32 `json:"key_version"` // Nonce for when convergent encryption is used Nonce string `json:"nonce"` }
TransitRewrapRequest struct for TransitRewrapRequest
func NewTransitRewrapRequestWithDefaults ¶
func NewTransitRewrapRequestWithDefaults() *TransitRewrapRequest
NewTransitRewrapRequestWithDefaults instantiates a new TransitRewrapRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitRewrapRequest) MarshalJSON ¶
func (o TransitRewrapRequest) MarshalJSON() ([]byte, error)
type TransitSignRequest ¶
type TransitSignRequest struct { // Deprecated: use \"hash_algorithm\" instead. Algorithm string `json:"algorithm"` // Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. Context string `json:"context"` // Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types, including ed25519. Using none requires setting prehashed=true and signature_algorithm=pkcs1v15, yielding a PKCSv1_5_NoOID instead of the usual PKCSv1_5_DERnull signature. HashAlgorithm string `json:"hash_algorithm"` // The base64-encoded input data Input string `json:"input"` // The version of the key to use for signing. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. KeyVersion int32 `json:"key_version"` // The method by which to marshal the signature. The default is 'asn1' which is used by openssl and X.509. It can also be set to 'jws' which is used for JWT signatures; setting it to this will also cause the encoding of the signature to be url-safe base64 instead of using standard base64 encoding. Currently only valid for ECDSA P-256 key types\". MarshalingAlgorithm string `json:"marshaling_algorithm"` // Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter. Prehashed bool `json:"prehashed"` // The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'. SaltLength string `json:"salt_length"` // The signature algorithm to use for signing. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss' SignatureAlgorithm string `json:"signature_algorithm"` // Hash algorithm to use (POST URL parameter) Urlalgorithm string `json:"urlalgorithm"` }
TransitSignRequest struct for TransitSignRequest
func NewTransitSignRequestWithDefaults ¶
func NewTransitSignRequestWithDefaults() *TransitSignRequest
NewTransitSignRequestWithDefaults instantiates a new TransitSignRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitSignRequest) MarshalJSON ¶
func (o TransitSignRequest) MarshalJSON() ([]byte, error)
type TransitSignWithAlgorithmRequest ¶
type TransitSignWithAlgorithmRequest struct { // Deprecated: use \"hash_algorithm\" instead. Algorithm string `json:"algorithm"` // Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. Context string `json:"context"` // Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types, including ed25519. Using none requires setting prehashed=true and signature_algorithm=pkcs1v15, yielding a PKCSv1_5_NoOID instead of the usual PKCSv1_5_DERnull signature. HashAlgorithm string `json:"hash_algorithm"` // The base64-encoded input data Input string `json:"input"` // The version of the key to use for signing. Must be 0 (for latest) or a value greater than or equal to the min_encryption_version configured on the key. KeyVersion int32 `json:"key_version"` // The method by which to marshal the signature. The default is 'asn1' which is used by openssl and X.509. It can also be set to 'jws' which is used for JWT signatures; setting it to this will also cause the encoding of the signature to be url-safe base64 instead of using standard base64 encoding. Currently only valid for ECDSA P-256 key types\". MarshalingAlgorithm string `json:"marshaling_algorithm"` // Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter. Prehashed bool `json:"prehashed"` // The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'. SaltLength string `json:"salt_length"` // The signature algorithm to use for signing. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss' SignatureAlgorithm string `json:"signature_algorithm"` }
TransitSignWithAlgorithmRequest struct for TransitSignWithAlgorithmRequest
func NewTransitSignWithAlgorithmRequestWithDefaults ¶
func NewTransitSignWithAlgorithmRequestWithDefaults() *TransitSignWithAlgorithmRequest
NewTransitSignWithAlgorithmRequestWithDefaults instantiates a new TransitSignWithAlgorithmRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitSignWithAlgorithmRequest) MarshalJSON ¶
func (o TransitSignWithAlgorithmRequest) MarshalJSON() ([]byte, error)
type TransitTrimKeyRequest ¶
type TransitTrimKeyRequest struct { // The minimum available version for the key ring. All versions before this version will be permanently deleted. This value can at most be equal to the lesser of 'min_decryption_version' and 'min_encryption_version'. This is not allowed to be set when either 'min_encryption_version' or 'min_decryption_version' is set to zero. MinAvailableVersion int32 `json:"min_available_version"` }
TransitTrimKeyRequest struct for TransitTrimKeyRequest
func NewTransitTrimKeyRequestWithDefaults ¶
func NewTransitTrimKeyRequestWithDefaults() *TransitTrimKeyRequest
NewTransitTrimKeyRequestWithDefaults instantiates a new TransitTrimKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitTrimKeyRequest) MarshalJSON ¶
func (o TransitTrimKeyRequest) MarshalJSON() ([]byte, error)
type TransitVerifyRequest ¶
type TransitVerifyRequest struct { // Deprecated: use \"hash_algorithm\" instead. Algorithm string `json:"algorithm"` // Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. Context string `json:"context"` // Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types. See note about none on signing path. HashAlgorithm string `json:"hash_algorithm"` // The HMAC, including vault header/key version Hmac string `json:"hmac"` // The base64-encoded input data to verify Input string `json:"input"` // The method by which to unmarshal the signature when verifying. The default is 'asn1' which is used by openssl and X.509; can also be set to 'jws' which is used for JWT signatures in which case the signature is also expected to be url-safe base64 encoding instead of standard base64 encoding. Currently only valid for ECDSA P-256 key types\". MarshalingAlgorithm string `json:"marshaling_algorithm"` // Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter. Prehashed bool `json:"prehashed"` // The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'. SaltLength string `json:"salt_length"` // The signature, including vault header/key version Signature string `json:"signature"` // The signature algorithm to use for signature verification. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss' SignatureAlgorithm string `json:"signature_algorithm"` // Hash algorithm to use (POST URL parameter) Urlalgorithm string `json:"urlalgorithm"` }
TransitVerifyRequest struct for TransitVerifyRequest
func NewTransitVerifyRequestWithDefaults ¶
func NewTransitVerifyRequestWithDefaults() *TransitVerifyRequest
NewTransitVerifyRequestWithDefaults instantiates a new TransitVerifyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitVerifyRequest) MarshalJSON ¶
func (o TransitVerifyRequest) MarshalJSON() ([]byte, error)
type TransitVerifyWithAlgorithmRequest ¶
type TransitVerifyWithAlgorithmRequest struct { // Deprecated: use \"hash_algorithm\" instead. Algorithm string `json:"algorithm"` // Base64 encoded context for key derivation. Required if key derivation is enabled; currently only available with ed25519 keys. Context string `json:"context"` // Hash algorithm to use (POST body parameter). Valid values are: * sha1 * sha2-224 * sha2-256 * sha2-384 * sha2-512 * sha3-224 * sha3-256 * sha3-384 * sha3-512 * none Defaults to \"sha2-256\". Not valid for all key types. See note about none on signing path. HashAlgorithm string `json:"hash_algorithm"` // The HMAC, including vault header/key version Hmac string `json:"hmac"` // The base64-encoded input data to verify Input string `json:"input"` // The method by which to unmarshal the signature when verifying. The default is 'asn1' which is used by openssl and X.509; can also be set to 'jws' which is used for JWT signatures in which case the signature is also expected to be url-safe base64 encoding instead of standard base64 encoding. Currently only valid for ECDSA P-256 key types\". MarshalingAlgorithm string `json:"marshaling_algorithm"` // Set to 'true' when the input is already hashed. If the key type is 'rsa-2048', 'rsa-3072' or 'rsa-4096', then the algorithm used to hash the input should be indicated by the 'algorithm' parameter. Prehashed bool `json:"prehashed"` // The salt length used to sign. Currently only applies to the RSA PSS signature scheme. Options are 'auto' (the default used by Golang, causing the salt to be as large as possible when signing), 'hash' (causes the salt length to equal the length of the hash used in the signature), or an integer between the minimum and the maximum permissible salt lengths for the given RSA key size. Defaults to 'auto'. SaltLength string `json:"salt_length"` // The signature, including vault header/key version Signature string `json:"signature"` // The signature algorithm to use for signature verification. Currently only applies to RSA key types. Options are 'pss' or 'pkcs1v15'. Defaults to 'pss' SignatureAlgorithm string `json:"signature_algorithm"` }
TransitVerifyWithAlgorithmRequest struct for TransitVerifyWithAlgorithmRequest
func NewTransitVerifyWithAlgorithmRequestWithDefaults ¶
func NewTransitVerifyWithAlgorithmRequestWithDefaults() *TransitVerifyWithAlgorithmRequest
NewTransitVerifyWithAlgorithmRequestWithDefaults instantiates a new TransitVerifyWithAlgorithmRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitVerifyWithAlgorithmRequest) MarshalJSON ¶
func (o TransitVerifyWithAlgorithmRequest) MarshalJSON() ([]byte, error)
type TransitWriteCacheConfigRequest ¶
type TransitWriteCacheConfigRequest struct { // Size of cache, use 0 for an unlimited cache size, defaults to 0 Size int32 `json:"size"` }
TransitWriteCacheConfigRequest struct for TransitWriteCacheConfigRequest
func NewTransitWriteCacheConfigRequestWithDefaults ¶
func NewTransitWriteCacheConfigRequestWithDefaults() *TransitWriteCacheConfigRequest
NewTransitWriteCacheConfigRequestWithDefaults instantiates a new TransitWriteCacheConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitWriteCacheConfigRequest) MarshalJSON ¶
func (o TransitWriteCacheConfigRequest) MarshalJSON() ([]byte, error)
type TransitWriteConfigKeysRequest ¶
type TransitWriteConfigKeysRequest struct { // Whether to allow automatic upserting (creation) of keys on the encrypt endpoint. DisableUpsert bool `json:"disable_upsert"` }
TransitWriteConfigKeysRequest struct for TransitWriteConfigKeysRequest
func NewTransitWriteConfigKeysRequestWithDefaults ¶
func NewTransitWriteConfigKeysRequestWithDefaults() *TransitWriteConfigKeysRequest
NewTransitWriteConfigKeysRequestWithDefaults instantiates a new TransitWriteConfigKeysRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitWriteConfigKeysRequest) MarshalJSON ¶
func (o TransitWriteConfigKeysRequest) MarshalJSON() ([]byte, error)
type TransitWriteKeyConfigRequest ¶
type TransitWriteKeyConfigRequest struct { // Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled. AllowPlaintextBackup bool `json:"allow_plaintext_backup"` // Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key. AutoRotatePeriod int32 `json:"auto_rotate_period"` // Whether to allow deletion of the key DeletionAllowed bool `json:"deletion_allowed"` // Enables export of the key. Once set, this cannot be disabled. Exportable bool `json:"exportable"` // If set, the minimum version of the key allowed to be decrypted. For signing keys, the minimum version allowed to be used for verification. MinDecryptionVersion int32 `json:"min_decryption_version"` // If set, the minimum version of the key allowed to be used for encryption; or for signing keys, to be used for signing. If set to zero, only the latest version of the key is allowed. MinEncryptionVersion int32 `json:"min_encryption_version"` }
TransitWriteKeyConfigRequest struct for TransitWriteKeyConfigRequest
func NewTransitWriteKeyConfigRequestWithDefaults ¶
func NewTransitWriteKeyConfigRequestWithDefaults() *TransitWriteKeyConfigRequest
NewTransitWriteKeyConfigRequestWithDefaults instantiates a new TransitWriteKeyConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitWriteKeyConfigRequest) MarshalJSON ¶
func (o TransitWriteKeyConfigRequest) MarshalJSON() ([]byte, error)
type TransitWriteKeyRequest ¶
type TransitWriteKeyRequest struct { // Enables taking a backup of the named key in plaintext format. Once set, this cannot be disabled. AllowPlaintextBackup bool `json:"allow_plaintext_backup"` // Amount of time the key should live before being automatically rotated. A value of 0 (default) disables automatic rotation for the key. AutoRotatePeriod int32 `json:"auto_rotate_period"` // Base64 encoded context for key derivation. When reading a key with key derivation enabled, if the key type supports public keys, this will return the public key for the given context. Context string `json:"context"` // Whether to support convergent encryption. This is only supported when using a key with key derivation enabled and will require all requests to carry both a context and 96-bit (12-byte) nonce. The given nonce will be used in place of a randomly generated nonce. As a result, when the same context and nonce are supplied, the same ciphertext is generated. It is *very important* when using this mode that you ensure that all nonces are unique for a given context. Failing to do so will severely impact the ciphertext's security. ConvergentEncryption bool `json:"convergent_encryption"` // Enables key derivation mode. This allows for per-transaction unique keys for encryption operations. Derived bool `json:"derived"` // Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Exportable bool `json:"exportable"` // The key size in bytes for the algorithm. Only applies to HMAC and must be no fewer than 32 bytes and no more than 512 KeySize int32 `json:"key_size"` // The type of key to create. Currently, \"aes128-gcm96\" (symmetric), \"aes256-gcm96\" (symmetric), \"ecdsa-p256\" (asymmetric), \"ecdsa-p384\" (asymmetric), \"ecdsa-p521\" (asymmetric), \"ed25519\" (asymmetric), \"rsa-2048\" (asymmetric), \"rsa-3072\" (asymmetric), \"rsa-4096\" (asymmetric) are supported. Defaults to \"aes256-gcm96\". Type string `json:"type"` }
TransitWriteKeyRequest struct for TransitWriteKeyRequest
func NewTransitWriteKeyRequestWithDefaults ¶
func NewTransitWriteKeyRequestWithDefaults() *TransitWriteKeyRequest
NewTransitWriteKeyRequestWithDefaults instantiates a new TransitWriteKeyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitWriteKeyRequest) MarshalJSON ¶
func (o TransitWriteKeyRequest) MarshalJSON() ([]byte, error)
type TransitWriteRandomUrlbytesRequest ¶
type TransitWriteRandomUrlbytesRequest struct { // The number of bytes to generate (POST body parameter). Defaults to 32 (256 bits). Bytes int32 `json:"bytes"` // Encoding format to use. Can be \"hex\" or \"base64\". Defaults to \"base64\". Format string `json:"format"` // Which system to source random data from, ether \"platform\", \"seal\", or \"all\". Source string `json:"source"` }
TransitWriteRandomUrlbytesRequest struct for TransitWriteRandomUrlbytesRequest
func NewTransitWriteRandomUrlbytesRequestWithDefaults ¶
func NewTransitWriteRandomUrlbytesRequestWithDefaults() *TransitWriteRandomUrlbytesRequest
NewTransitWriteRandomUrlbytesRequestWithDefaults instantiates a new TransitWriteRandomUrlbytesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (TransitWriteRandomUrlbytesRequest) MarshalJSON ¶
func (o TransitWriteRandomUrlbytesRequest) MarshalJSON() ([]byte, error)
type UnsealRequest ¶
type UnsealRequest struct { // Specifies a single unseal key share. This is required unless reset is true. Key string `json:"key"` // Specifies if previously-provided unseal keys are discarded and the unseal process is reset. Reset bool `json:"reset"` }
UnsealRequest struct for UnsealRequest
func NewUnsealRequestWithDefaults ¶
func NewUnsealRequestWithDefaults() *UnsealRequest
NewUnsealRequestWithDefaults instantiates a new UnsealRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (UnsealRequest) MarshalJSON ¶
func (o UnsealRequest) MarshalJSON() ([]byte, error)
type UserpassLoginRequest ¶
type UserpassLoginRequest struct { // Password for this user. Password string `json:"password"` }
UserpassLoginRequest struct for UserpassLoginRequest
func NewUserpassLoginRequestWithDefaults ¶
func NewUserpassLoginRequestWithDefaults() *UserpassLoginRequest
NewUserpassLoginRequestWithDefaults instantiates a new UserpassLoginRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (UserpassLoginRequest) MarshalJSON ¶
func (o UserpassLoginRequest) MarshalJSON() ([]byte, error)
type UserpassWriteUserPasswordRequest ¶
type UserpassWriteUserPasswordRequest struct { // Password for this user. Password string `json:"password"` }
UserpassWriteUserPasswordRequest struct for UserpassWriteUserPasswordRequest
func NewUserpassWriteUserPasswordRequestWithDefaults ¶
func NewUserpassWriteUserPasswordRequestWithDefaults() *UserpassWriteUserPasswordRequest
NewUserpassWriteUserPasswordRequestWithDefaults instantiates a new UserpassWriteUserPasswordRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (UserpassWriteUserPasswordRequest) MarshalJSON ¶
func (o UserpassWriteUserPasswordRequest) MarshalJSON() ([]byte, error)
type UserpassWriteUserPoliciesRequest ¶
type UserpassWriteUserPoliciesRequest struct { // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` }
UserpassWriteUserPoliciesRequest struct for UserpassWriteUserPoliciesRequest
func NewUserpassWriteUserPoliciesRequestWithDefaults ¶
func NewUserpassWriteUserPoliciesRequestWithDefaults() *UserpassWriteUserPoliciesRequest
NewUserpassWriteUserPoliciesRequestWithDefaults instantiates a new UserpassWriteUserPoliciesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (UserpassWriteUserPoliciesRequest) MarshalJSON ¶
func (o UserpassWriteUserPoliciesRequest) MarshalJSON() ([]byte, error)
type UserpassWriteUserRequest ¶
type UserpassWriteUserRequest struct { // Use \"token_bound_cidrs\" instead. If this and \"token_bound_cidrs\" are both specified, only \"token_bound_cidrs\" will be used. // Deprecated BoundCidrs []string `json:"bound_cidrs"` // Use \"token_max_ttl\" instead. If this and \"token_max_ttl\" are both specified, only \"token_max_ttl\" will be used. // Deprecated MaxTtl int32 `json:"max_ttl"` // Password for this user. Password string `json:"password"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated Policies []string `json:"policies"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. TokenExplicitMaxTtl int32 `json:"token_explicit_max_ttl"` // The maximum lifetime of the generated token TokenMaxTtl int32 `json:"token_max_ttl"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy"` // The maximum number of times a token may be used, a value of zero means unlimited TokenNumUses int32 `json:"token_num_uses"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). TokenPeriod int32 `json:"token_period"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies"` // The initial ttl of the token to generate TokenTtl int32 `json:"token_ttl"` // The type of token to generate, service or batch TokenType string `json:"token_type"` // Use \"token_ttl\" instead. If this and \"token_ttl\" are both specified, only \"token_ttl\" will be used. // Deprecated Ttl int32 `json:"ttl"` }
UserpassWriteUserRequest struct for UserpassWriteUserRequest
func NewUserpassWriteUserRequestWithDefaults ¶
func NewUserpassWriteUserRequestWithDefaults() *UserpassWriteUserRequest
NewUserpassWriteUserRequestWithDefaults instantiates a new UserpassWriteUserRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (UserpassWriteUserRequest) MarshalJSON ¶
func (o UserpassWriteUserRequest) MarshalJSON() ([]byte, error)
type WrappingRewrapRequest ¶
type WrappingRewrapRequest struct {
Token string `json:"token"`
}
WrappingRewrapRequest struct for WrappingRewrapRequest
func NewWrappingRewrapRequestWithDefaults ¶
func NewWrappingRewrapRequestWithDefaults() *WrappingRewrapRequest
NewWrappingRewrapRequestWithDefaults instantiates a new WrappingRewrapRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WrappingRewrapRequest) MarshalJSON ¶
func (o WrappingRewrapRequest) MarshalJSON() ([]byte, error)
type WrappingUnwrapRequest ¶
type WrappingUnwrapRequest struct {
Token string `json:"token"`
}
WrappingUnwrapRequest struct for WrappingUnwrapRequest
func NewWrappingUnwrapRequestWithDefaults ¶
func NewWrappingUnwrapRequestWithDefaults() *WrappingUnwrapRequest
NewWrappingUnwrapRequestWithDefaults instantiates a new WrappingUnwrapRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WrappingUnwrapRequest) MarshalJSON ¶
func (o WrappingUnwrapRequest) MarshalJSON() ([]byte, error)
type WrappingWriteLookupRequest ¶
type WrappingWriteLookupRequest struct {
Token string `json:"token"`
}
WrappingWriteLookupRequest struct for WrappingWriteLookupRequest
func NewWrappingWriteLookupRequestWithDefaults ¶
func NewWrappingWriteLookupRequestWithDefaults() *WrappingWriteLookupRequest
NewWrappingWriteLookupRequestWithDefaults instantiates a new WrappingWriteLookupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WrappingWriteLookupRequest) MarshalJSON ¶
func (o WrappingWriteLookupRequest) MarshalJSON() ([]byte, error)
type WriteAuditDeviceRequest ¶
type WriteAuditDeviceRequest struct { // User-friendly description for this audit backend. Description string `json:"description"` // Mark the mount as a local mount, which is not replicated and is unaffected by replication. Local bool `json:"local"` // Configuration options for the audit backend. Options map[string]interface{} `json:"options"` // The type of the backend. Example: \"mysql\" Type string `json:"type"` }
WriteAuditDeviceRequest struct for WriteAuditDeviceRequest
func NewWriteAuditDeviceRequestWithDefaults ¶
func NewWriteAuditDeviceRequestWithDefaults() *WriteAuditDeviceRequest
NewWriteAuditDeviceRequestWithDefaults instantiates a new WriteAuditDeviceRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteAuditDeviceRequest) MarshalJSON ¶
func (o WriteAuditDeviceRequest) MarshalJSON() ([]byte, error)
type WriteAuthMethodRequest ¶
type WriteAuthMethodRequest struct { // Configuration for this mount, such as plugin_name. Config map[string]interface{} `json:"config"` // User-friendly description for this credential backend. Description string `json:"description"` // Whether to give the mount access to Vault's external entropy. ExternalEntropyAccess bool `json:"external_entropy_access"` // Mark the mount as a local mount, which is not replicated and is unaffected by replication. Local bool `json:"local"` // The options to pass into the backend. Should be a json object with string keys and values. Options map[string]interface{} `json:"options"` // Name of the auth plugin to use based from the name in the plugin catalog. PluginName string `json:"plugin_name"` // The semantic version of the plugin to use. PluginVersion string `json:"plugin_version"` // Whether to turn on seal wrapping for the mount. SealWrap bool `json:"seal_wrap"` // The type of the backend. Example: \"userpass\" Type string `json:"type"` }
WriteAuthMethodRequest struct for WriteAuthMethodRequest
func NewWriteAuthMethodRequestWithDefaults ¶
func NewWriteAuthMethodRequestWithDefaults() *WriteAuthMethodRequest
NewWriteAuthMethodRequestWithDefaults instantiates a new WriteAuthMethodRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteAuthMethodRequest) MarshalJSON ¶
func (o WriteAuthMethodRequest) MarshalJSON() ([]byte, error)
type WriteAuthMethodTuneRequest ¶
type WriteAuthMethodTuneRequest struct { // A list of headers to whitelist and allow a plugin to set on responses. AllowedResponseHeaders []string `json:"allowed_response_headers"` // The list of keys in the request data object that will not be HMAC'ed by audit devices. AuditNonHmacRequestKeys []string `json:"audit_non_hmac_request_keys"` // The list of keys in the response data object that will not be HMAC'ed by audit devices. AuditNonHmacResponseKeys []string `json:"audit_non_hmac_response_keys"` // The default lease TTL for this mount. DefaultLeaseTtl string `json:"default_lease_ttl"` // User-friendly description for this credential backend. Description string `json:"description"` // Determines the visibility of the mount in the UI-specific listing endpoint. Accepted value are 'unauth' and 'hidden', with the empty default (”) behaving like 'hidden'. ListingVisibility string `json:"listing_visibility"` // The max lease TTL for this mount. MaxLeaseTtl string `json:"max_lease_ttl"` // The options to pass into the backend. Should be a json object with string keys and values. Options map[string]interface{} `json:"options"` // A list of headers to whitelist and pass from the request to the plugin. PassthroughRequestHeaders []string `json:"passthrough_request_headers"` // The semantic version of the plugin to use. PluginVersion string `json:"plugin_version"` // The type of token to issue (service or batch). TokenType string `json:"token_type"` // The user lockout configuration to pass into the backend. Should be a json object with string keys and values. UserLockoutConfig map[string]interface{} `json:"user_lockout_config"` }
WriteAuthMethodTuneRequest struct for WriteAuthMethodTuneRequest
func NewWriteAuthMethodTuneRequestWithDefaults ¶
func NewWriteAuthMethodTuneRequestWithDefaults() *WriteAuthMethodTuneRequest
NewWriteAuthMethodTuneRequestWithDefaults instantiates a new WriteAuthMethodTuneRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteAuthMethodTuneRequest) MarshalJSON ¶
func (o WriteAuthMethodTuneRequest) MarshalJSON() ([]byte, error)
type WriteCapabilitiesAccessorRequest ¶
type WriteCapabilitiesAccessorRequest struct { // Accessor of the token for which capabilities are being queried. Accessor string `json:"accessor"` // Use 'paths' instead. // Deprecated Path []string `json:"path"` // Paths on which capabilities are being queried. Paths []string `json:"paths"` }
WriteCapabilitiesAccessorRequest struct for WriteCapabilitiesAccessorRequest
func NewWriteCapabilitiesAccessorRequestWithDefaults ¶
func NewWriteCapabilitiesAccessorRequestWithDefaults() *WriteCapabilitiesAccessorRequest
NewWriteCapabilitiesAccessorRequestWithDefaults instantiates a new WriteCapabilitiesAccessorRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteCapabilitiesAccessorRequest) MarshalJSON ¶
func (o WriteCapabilitiesAccessorRequest) MarshalJSON() ([]byte, error)
type WriteCapabilitiesRequest ¶
type WriteCapabilitiesRequest struct { // Use 'paths' instead. // Deprecated Path []string `json:"path"` // Paths on which capabilities are being queried. Paths []string `json:"paths"` // Token for which capabilities are being queried. Token string `json:"token"` }
WriteCapabilitiesRequest struct for WriteCapabilitiesRequest
func NewWriteCapabilitiesRequestWithDefaults ¶
func NewWriteCapabilitiesRequestWithDefaults() *WriteCapabilitiesRequest
NewWriteCapabilitiesRequestWithDefaults instantiates a new WriteCapabilitiesRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteCapabilitiesRequest) MarshalJSON ¶
func (o WriteCapabilitiesRequest) MarshalJSON() ([]byte, error)
type WriteCapabilitiesSelfRequest ¶
type WriteCapabilitiesSelfRequest struct { // Use 'paths' instead. // Deprecated Path []string `json:"path"` // Paths on which capabilities are being queried. Paths []string `json:"paths"` // Token for which capabilities are being queried. Token string `json:"token"` }
WriteCapabilitiesSelfRequest struct for WriteCapabilitiesSelfRequest
func NewWriteCapabilitiesSelfRequestWithDefaults ¶
func NewWriteCapabilitiesSelfRequestWithDefaults() *WriteCapabilitiesSelfRequest
NewWriteCapabilitiesSelfRequestWithDefaults instantiates a new WriteCapabilitiesSelfRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteCapabilitiesSelfRequest) MarshalJSON ¶
func (o WriteCapabilitiesSelfRequest) MarshalJSON() ([]byte, error)
type WriteConfigAuditingRequestHeaderRequest ¶
type WriteConfigAuditingRequestHeaderRequest struct {
Hmac bool `json:"hmac"`
}
WriteConfigAuditingRequestHeaderRequest struct for WriteConfigAuditingRequestHeaderRequest
func NewWriteConfigAuditingRequestHeaderRequestWithDefaults ¶
func NewWriteConfigAuditingRequestHeaderRequestWithDefaults() *WriteConfigAuditingRequestHeaderRequest
NewWriteConfigAuditingRequestHeaderRequestWithDefaults instantiates a new WriteConfigAuditingRequestHeaderRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteConfigAuditingRequestHeaderRequest) MarshalJSON ¶
func (o WriteConfigAuditingRequestHeaderRequest) MarshalJSON() ([]byte, error)
type WriteConfigCORSRequest ¶
type WriteConfigCORSRequest struct { // A comma-separated string or array of strings indicating headers that are allowed on cross-origin requests. AllowedHeaders []string `json:"allowed_headers"` // A comma-separated string or array of strings indicating origins that may make cross-origin requests. AllowedOrigins []string `json:"allowed_origins"` // Enables or disables CORS headers on requests. Enable bool `json:"enable"` }
WriteConfigCORSRequest struct for WriteConfigCORSRequest
func NewWriteConfigCORSRequestWithDefaults ¶
func NewWriteConfigCORSRequestWithDefaults() *WriteConfigCORSRequest
NewWriteConfigCORSRequestWithDefaults instantiates a new WriteConfigCORSRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteConfigCORSRequest) MarshalJSON ¶
func (o WriteConfigCORSRequest) MarshalJSON() ([]byte, error)
type WriteConfigUIHeaderRequest ¶
type WriteConfigUIHeaderRequest struct { // Returns multiple values if true Multivalue bool `json:"multivalue"` // The values to set the header. Values []string `json:"values"` }
WriteConfigUIHeaderRequest struct for WriteConfigUIHeaderRequest
func NewWriteConfigUIHeaderRequestWithDefaults ¶
func NewWriteConfigUIHeaderRequestWithDefaults() *WriteConfigUIHeaderRequest
NewWriteConfigUIHeaderRequestWithDefaults instantiates a new WriteConfigUIHeaderRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteConfigUIHeaderRequest) MarshalJSON ¶
func (o WriteConfigUIHeaderRequest) MarshalJSON() ([]byte, error)
type WriteGenerateRootAttemptRequest ¶
type WriteGenerateRootAttemptRequest struct { // Specifies a base64-encoded PGP public key. PgpKey string `json:"pgp_key"` }
WriteGenerateRootAttemptRequest struct for WriteGenerateRootAttemptRequest
func NewWriteGenerateRootAttemptRequestWithDefaults ¶
func NewWriteGenerateRootAttemptRequestWithDefaults() *WriteGenerateRootAttemptRequest
NewWriteGenerateRootAttemptRequestWithDefaults instantiates a new WriteGenerateRootAttemptRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteGenerateRootAttemptRequest) MarshalJSON ¶
func (o WriteGenerateRootAttemptRequest) MarshalJSON() ([]byte, error)
type WriteGenerateRootRequest ¶
type WriteGenerateRootRequest struct { // Specifies a base64-encoded PGP public key. PgpKey string `json:"pgp_key"` }
WriteGenerateRootRequest struct for WriteGenerateRootRequest
func NewWriteGenerateRootRequestWithDefaults ¶
func NewWriteGenerateRootRequestWithDefaults() *WriteGenerateRootRequest
NewWriteGenerateRootRequestWithDefaults instantiates a new WriteGenerateRootRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteGenerateRootRequest) MarshalJSON ¶
func (o WriteGenerateRootRequest) MarshalJSON() ([]byte, error)
type WriteGenerateRootUpdateRequest ¶
type WriteGenerateRootUpdateRequest struct { // Specifies a single unseal key share. Key string `json:"key"` // Specifies the nonce of the attempt. Nonce string `json:"nonce"` }
WriteGenerateRootUpdateRequest struct for WriteGenerateRootUpdateRequest
func NewWriteGenerateRootUpdateRequestWithDefaults ¶
func NewWriteGenerateRootUpdateRequestWithDefaults() *WriteGenerateRootUpdateRequest
NewWriteGenerateRootUpdateRequestWithDefaults instantiates a new WriteGenerateRootUpdateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteGenerateRootUpdateRequest) MarshalJSON ¶
func (o WriteGenerateRootUpdateRequest) MarshalJSON() ([]byte, error)
type WriteInitRequest ¶
type WriteInitRequest struct { // Specifies an array of PGP public keys used to encrypt the output unseal keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as `secret_shares`. PgpKeys []string `json:"pgp_keys"` // Specifies an array of PGP public keys used to encrypt the output recovery keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as `recovery_shares`. RecoveryPgpKeys []string `json:"recovery_pgp_keys"` RecoveryShares int32 `json:"recovery_shares"` // Specifies the number of shares required to reconstruct the recovery key. This must be less than or equal to `recovery_shares`. RecoveryThreshold int32 `json:"recovery_threshold"` // Specifies a PGP public key used to encrypt the initial root token. The key must be base64-encoded from its original binary representation. RootTokenPgpKey string `json:"root_token_pgp_key"` SecretShares int32 `json:"secret_shares"` // Specifies the number of shares required to reconstruct the unseal key. This must be less than or equal secret_shares. If using Vault HSM with auto-unsealing, this value must be the same as `secret_shares`. SecretThreshold int32 `json:"secret_threshold"` StoredShares int32 `json:"stored_shares"` }
WriteInitRequest struct for WriteInitRequest
func NewWriteInitRequestWithDefaults ¶
func NewWriteInitRequestWithDefaults() *WriteInitRequest
NewWriteInitRequestWithDefaults instantiates a new WriteInitRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteInitRequest) MarshalJSON ¶
func (o WriteInitRequest) MarshalJSON() ([]byte, error)
type WriteInternalCountersConfigRequest ¶
type WriteInternalCountersConfigRequest struct { // Number of months to report if no start date specified. DefaultReportMonths int32 `json:"default_report_months"` // Enable or disable collection of client count: enable, disable, or default. Enabled string `json:"enabled"` // Number of months of client data to retain. Setting to 0 will clear all existing data. RetentionMonths int32 `json:"retention_months"` }
WriteInternalCountersConfigRequest struct for WriteInternalCountersConfigRequest
func NewWriteInternalCountersConfigRequestWithDefaults ¶
func NewWriteInternalCountersConfigRequestWithDefaults() *WriteInternalCountersConfigRequest
NewWriteInternalCountersConfigRequestWithDefaults instantiates a new WriteInternalCountersConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteInternalCountersConfigRequest) MarshalJSON ¶
func (o WriteInternalCountersConfigRequest) MarshalJSON() ([]byte, error)
type WriteInternalSpecsOpenAPIRequest ¶
type WriteInternalSpecsOpenAPIRequest struct { // Context string appended to every operationId Context string `json:"context"` }
WriteInternalSpecsOpenAPIRequest struct for WriteInternalSpecsOpenAPIRequest
func NewWriteInternalSpecsOpenAPIRequestWithDefaults ¶
func NewWriteInternalSpecsOpenAPIRequestWithDefaults() *WriteInternalSpecsOpenAPIRequest
NewWriteInternalSpecsOpenAPIRequestWithDefaults instantiates a new WriteInternalSpecsOpenAPIRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteInternalSpecsOpenAPIRequest) MarshalJSON ¶
func (o WriteInternalSpecsOpenAPIRequest) MarshalJSON() ([]byte, error)
type WriteLeasesLookupRequest ¶
type WriteLeasesLookupRequest struct { // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` }
WriteLeasesLookupRequest struct for WriteLeasesLookupRequest
func NewWriteLeasesLookupRequestWithDefaults ¶
func NewWriteLeasesLookupRequestWithDefaults() *WriteLeasesLookupRequest
NewWriteLeasesLookupRequestWithDefaults instantiates a new WriteLeasesLookupRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteLeasesLookupRequest) MarshalJSON ¶
func (o WriteLeasesLookupRequest) MarshalJSON() ([]byte, error)
type WriteLeasesRenew2Request ¶
type WriteLeasesRenew2Request struct { // The desired increment in seconds to the lease Increment int32 `json:"increment"` // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` }
WriteLeasesRenew2Request struct for WriteLeasesRenew2Request
func NewWriteLeasesRenew2RequestWithDefaults ¶
func NewWriteLeasesRenew2RequestWithDefaults() *WriteLeasesRenew2Request
NewWriteLeasesRenew2RequestWithDefaults instantiates a new WriteLeasesRenew2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteLeasesRenew2Request) MarshalJSON ¶
func (o WriteLeasesRenew2Request) MarshalJSON() ([]byte, error)
type WriteLeasesRenewRequest ¶
type WriteLeasesRenewRequest struct { // The desired increment in seconds to the lease Increment int32 `json:"increment"` // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` // The lease identifier to renew. This is included with a lease. UrlLeaseId string `json:"url_lease_id"` }
WriteLeasesRenewRequest struct for WriteLeasesRenewRequest
func NewWriteLeasesRenewRequestWithDefaults ¶
func NewWriteLeasesRenewRequestWithDefaults() *WriteLeasesRenewRequest
NewWriteLeasesRenewRequestWithDefaults instantiates a new WriteLeasesRenewRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteLeasesRenewRequest) MarshalJSON ¶
func (o WriteLeasesRenewRequest) MarshalJSON() ([]byte, error)
type WriteLeasesRevoke2Request ¶
type WriteLeasesRevoke2Request struct { // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` // Whether or not to perform the revocation synchronously Sync bool `json:"sync"` }
WriteLeasesRevoke2Request struct for WriteLeasesRevoke2Request
func NewWriteLeasesRevoke2RequestWithDefaults ¶
func NewWriteLeasesRevoke2RequestWithDefaults() *WriteLeasesRevoke2Request
NewWriteLeasesRevoke2RequestWithDefaults instantiates a new WriteLeasesRevoke2Request object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteLeasesRevoke2Request) MarshalJSON ¶
func (o WriteLeasesRevoke2Request) MarshalJSON() ([]byte, error)
type WriteLeasesRevokePrefixRequest ¶
type WriteLeasesRevokePrefixRequest struct { // Whether or not to perform the revocation synchronously Sync bool `json:"sync"` }
WriteLeasesRevokePrefixRequest struct for WriteLeasesRevokePrefixRequest
func NewWriteLeasesRevokePrefixRequestWithDefaults ¶
func NewWriteLeasesRevokePrefixRequestWithDefaults() *WriteLeasesRevokePrefixRequest
NewWriteLeasesRevokePrefixRequestWithDefaults instantiates a new WriteLeasesRevokePrefixRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteLeasesRevokePrefixRequest) MarshalJSON ¶
func (o WriteLeasesRevokePrefixRequest) MarshalJSON() ([]byte, error)
type WriteLeasesRevokeRequest ¶
type WriteLeasesRevokeRequest struct { // The lease identifier to renew. This is included with a lease. LeaseId string `json:"lease_id"` // Whether or not to perform the revocation synchronously Sync bool `json:"sync"` // The lease identifier to renew. This is included with a lease. UrlLeaseId string `json:"url_lease_id"` }
WriteLeasesRevokeRequest struct for WriteLeasesRevokeRequest
func NewWriteLeasesRevokeRequestWithDefaults ¶
func NewWriteLeasesRevokeRequestWithDefaults() *WriteLeasesRevokeRequest
NewWriteLeasesRevokeRequestWithDefaults instantiates a new WriteLeasesRevokeRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteLeasesRevokeRequest) MarshalJSON ¶
func (o WriteLeasesRevokeRequest) MarshalJSON() ([]byte, error)
type WriteLoggerRequest ¶
type WriteLoggerRequest struct { // Log verbosity level. Supported values (in order of detail) are \"trace\", \"debug\", \"info\", \"warn\", and \"error\". Level string `json:"level"` }
WriteLoggerRequest struct for WriteLoggerRequest
func NewWriteLoggerRequestWithDefaults ¶
func NewWriteLoggerRequestWithDefaults() *WriteLoggerRequest
NewWriteLoggerRequestWithDefaults instantiates a new WriteLoggerRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteLoggerRequest) MarshalJSON ¶
func (o WriteLoggerRequest) MarshalJSON() ([]byte, error)
type WriteLoggersRequest ¶
type WriteLoggersRequest struct { // Log verbosity level. Supported values (in order of detail) are \"trace\", \"debug\", \"info\", \"warn\", and \"error\". Level string `json:"level"` }
WriteLoggersRequest struct for WriteLoggersRequest
func NewWriteLoggersRequestWithDefaults ¶
func NewWriteLoggersRequestWithDefaults() *WriteLoggersRequest
NewWriteLoggersRequestWithDefaults instantiates a new WriteLoggersRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteLoggersRequest) MarshalJSON ¶
func (o WriteLoggersRequest) MarshalJSON() ([]byte, error)
type WriteMountRequest ¶
type WriteMountRequest struct { // Configuration for this mount, such as default_lease_ttl and max_lease_ttl. Config map[string]interface{} `json:"config"` // User-friendly description for this mount. Description string `json:"description"` // Whether to give the mount access to Vault's external entropy. ExternalEntropyAccess bool `json:"external_entropy_access"` // Mark the mount as a local mount, which is not replicated and is unaffected by replication. Local bool `json:"local"` // The options to pass into the backend. Should be a json object with string keys and values. Options map[string]interface{} `json:"options"` // Name of the plugin to mount based from the name registered in the plugin catalog. PluginName string `json:"plugin_name"` // The semantic version of the plugin to use. PluginVersion string `json:"plugin_version"` // Whether to turn on seal wrapping for the mount. SealWrap bool `json:"seal_wrap"` // The type of the backend. Example: \"passthrough\" Type string `json:"type"` }
WriteMountRequest struct for WriteMountRequest
func NewWriteMountRequestWithDefaults ¶
func NewWriteMountRequestWithDefaults() *WriteMountRequest
NewWriteMountRequestWithDefaults instantiates a new WriteMountRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteMountRequest) MarshalJSON ¶
func (o WriteMountRequest) MarshalJSON() ([]byte, error)
type WriteMountsConfigRequest ¶
type WriteMountsConfigRequest struct { AllowedManagedKeys []string `json:"allowed_managed_keys"` // A list of headers to whitelist and allow a plugin to set on responses. AllowedResponseHeaders []string `json:"allowed_response_headers"` // The list of keys in the request data object that will not be HMAC'ed by audit devices. AuditNonHmacRequestKeys []string `json:"audit_non_hmac_request_keys"` // The list of keys in the response data object that will not be HMAC'ed by audit devices. AuditNonHmacResponseKeys []string `json:"audit_non_hmac_response_keys"` // The default lease TTL for this mount. DefaultLeaseTtl string `json:"default_lease_ttl"` // User-friendly description for this credential backend. Description string `json:"description"` // Determines the visibility of the mount in the UI-specific listing endpoint. Accepted value are 'unauth' and 'hidden', with the empty default (”) behaving like 'hidden'. ListingVisibility string `json:"listing_visibility"` // The max lease TTL for this mount. MaxLeaseTtl string `json:"max_lease_ttl"` // The options to pass into the backend. Should be a json object with string keys and values. Options map[string]interface{} `json:"options"` // A list of headers to whitelist and pass from the request to the plugin. PassthroughRequestHeaders []string `json:"passthrough_request_headers"` // The semantic version of the plugin to use. PluginVersion string `json:"plugin_version"` // The type of token to issue (service or batch). TokenType string `json:"token_type"` // The user lockout configuration to pass into the backend. Should be a json object with string keys and values. UserLockoutConfig map[string]interface{} `json:"user_lockout_config"` }
WriteMountsConfigRequest struct for WriteMountsConfigRequest
func NewWriteMountsConfigRequestWithDefaults ¶
func NewWriteMountsConfigRequestWithDefaults() *WriteMountsConfigRequest
NewWriteMountsConfigRequestWithDefaults instantiates a new WriteMountsConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteMountsConfigRequest) MarshalJSON ¶
func (o WriteMountsConfigRequest) MarshalJSON() ([]byte, error)
type WritePluginsCatalogByTypeByNameRequest ¶
type WritePluginsCatalogByTypeByNameRequest struct { // The args passed to plugin command. Args []string `json:"args"` // The command used to start the plugin. The executable defined in this command must exist in vault's plugin directory. Command string `json:"command"` // The environment variables passed to plugin command. Each entry is of the form \"key=value\". Env []string `json:"env"` // The SHA256 sum of the executable used in the command field. This should be HEX encoded. Sha256 string `json:"sha256"` // The semantic version of the plugin to use. Version string `json:"version"` }
WritePluginsCatalogByTypeByNameRequest struct for WritePluginsCatalogByTypeByNameRequest
func NewWritePluginsCatalogByTypeByNameRequestWithDefaults ¶
func NewWritePluginsCatalogByTypeByNameRequestWithDefaults() *WritePluginsCatalogByTypeByNameRequest
NewWritePluginsCatalogByTypeByNameRequestWithDefaults instantiates a new WritePluginsCatalogByTypeByNameRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WritePluginsCatalogByTypeByNameRequest) MarshalJSON ¶
func (o WritePluginsCatalogByTypeByNameRequest) MarshalJSON() ([]byte, error)
type WritePluginsReloadBackendRequest ¶
type WritePluginsReloadBackendRequest struct { // The mount paths of the plugin backends to reload. Mounts []string `json:"mounts"` // The name of the plugin to reload, as registered in the plugin catalog. Plugin string `json:"plugin"` Scope string `json:"scope"` }
WritePluginsReloadBackendRequest struct for WritePluginsReloadBackendRequest
func NewWritePluginsReloadBackendRequestWithDefaults ¶
func NewWritePluginsReloadBackendRequestWithDefaults() *WritePluginsReloadBackendRequest
NewWritePluginsReloadBackendRequestWithDefaults instantiates a new WritePluginsReloadBackendRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WritePluginsReloadBackendRequest) MarshalJSON ¶
func (o WritePluginsReloadBackendRequest) MarshalJSON() ([]byte, error)
type WritePoliciesACLRequest ¶
type WritePoliciesACLRequest struct { // The rules of the policy. Policy string `json:"policy"` }
WritePoliciesACLRequest struct for WritePoliciesACLRequest
func NewWritePoliciesACLRequestWithDefaults ¶
func NewWritePoliciesACLRequestWithDefaults() *WritePoliciesACLRequest
NewWritePoliciesACLRequestWithDefaults instantiates a new WritePoliciesACLRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WritePoliciesACLRequest) MarshalJSON ¶
func (o WritePoliciesACLRequest) MarshalJSON() ([]byte, error)
type WritePoliciesPasswordRequest ¶
type WritePoliciesPasswordRequest struct { // The password policy Policy string `json:"policy"` }
WritePoliciesPasswordRequest struct for WritePoliciesPasswordRequest
func NewWritePoliciesPasswordRequestWithDefaults ¶
func NewWritePoliciesPasswordRequestWithDefaults() *WritePoliciesPasswordRequest
NewWritePoliciesPasswordRequestWithDefaults instantiates a new WritePoliciesPasswordRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WritePoliciesPasswordRequest) MarshalJSON ¶
func (o WritePoliciesPasswordRequest) MarshalJSON() ([]byte, error)
type WritePolicyRequest ¶
type WritePolicyRequest struct { // The rules of the policy. Policy string `json:"policy"` // The rules of the policy. // Deprecated Rules string `json:"rules"` }
WritePolicyRequest struct for WritePolicyRequest
func NewWritePolicyRequestWithDefaults ¶
func NewWritePolicyRequestWithDefaults() *WritePolicyRequest
NewWritePolicyRequestWithDefaults instantiates a new WritePolicyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WritePolicyRequest) MarshalJSON ¶
func (o WritePolicyRequest) MarshalJSON() ([]byte, error)
type WriteQuotasConfigRequest ¶
type WriteQuotasConfigRequest struct { // If set, starts audit logging of requests that get rejected due to rate limit quota rule violations. EnableRateLimitAuditLogging bool `json:"enable_rate_limit_audit_logging"` // If set, additional rate limit quota HTTP headers will be added to responses. EnableRateLimitResponseHeaders bool `json:"enable_rate_limit_response_headers"` // Specifies the list of exempt paths from all rate limit quotas. If empty no paths will be exempt. RateLimitExemptPaths []string `json:"rate_limit_exempt_paths"` }
WriteQuotasConfigRequest struct for WriteQuotasConfigRequest
func NewWriteQuotasConfigRequestWithDefaults ¶
func NewWriteQuotasConfigRequestWithDefaults() *WriteQuotasConfigRequest
NewWriteQuotasConfigRequestWithDefaults instantiates a new WriteQuotasConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteQuotasConfigRequest) MarshalJSON ¶
func (o WriteQuotasConfigRequest) MarshalJSON() ([]byte, error)
type WriteQuotasRateLimitRequest ¶
type WriteQuotasRateLimitRequest struct { // If set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the 'block_interval' has elapsed. BlockInterval int32 `json:"block_interval"` // The duration to enforce rate limiting for (default '1s'). Interval int32 `json:"interval"` // Path of the mount or namespace to apply the quota. A blank path configures a global quota. For example namespace1/ adds a quota to a full namespace, namespace1/auth/userpass adds a quota to userpass in namespace1. Path string `json:"path"` // The maximum number of requests in a given interval to be allowed by the quota rule. The 'rate' must be positive. Rate float32 `json:"rate"` // Login role to apply this quota to. Note that when set, path must be configured to a valid auth method with a concept of roles. Role string `json:"role"` // Type of the quota rule. Type string `json:"type"` }
WriteQuotasRateLimitRequest struct for WriteQuotasRateLimitRequest
func NewWriteQuotasRateLimitRequestWithDefaults ¶
func NewWriteQuotasRateLimitRequestWithDefaults() *WriteQuotasRateLimitRequest
NewWriteQuotasRateLimitRequestWithDefaults instantiates a new WriteQuotasRateLimitRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteQuotasRateLimitRequest) MarshalJSON ¶
func (o WriteQuotasRateLimitRequest) MarshalJSON() ([]byte, error)
type WriteRawPathRequest ¶
type WriteRawPathRequest struct { Compressed bool `json:"compressed"` CompressionType string `json:"compression_type"` Encoding string `json:"encoding"` Value string `json:"value"` }
WriteRawPathRequest struct for WriteRawPathRequest
func NewWriteRawPathRequestWithDefaults ¶
func NewWriteRawPathRequestWithDefaults() *WriteRawPathRequest
NewWriteRawPathRequestWithDefaults instantiates a new WriteRawPathRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteRawPathRequest) MarshalJSON ¶
func (o WriteRawPathRequest) MarshalJSON() ([]byte, error)
type WriteRawRequest ¶
type WriteRawRequest struct { Compressed bool `json:"compressed"` CompressionType string `json:"compression_type"` Encoding string `json:"encoding"` Path string `json:"path"` Value string `json:"value"` }
WriteRawRequest struct for WriteRawRequest
func NewWriteRawRequestWithDefaults ¶
func NewWriteRawRequestWithDefaults() *WriteRawRequest
NewWriteRawRequestWithDefaults instantiates a new WriteRawRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteRawRequest) MarshalJSON ¶
func (o WriteRawRequest) MarshalJSON() ([]byte, error)
type WriteRekeyInitRequest ¶
type WriteRekeyInitRequest struct { // Specifies if using PGP-encrypted keys, whether Vault should also store a plaintext backup of the PGP-encrypted keys. Backup bool `json:"backup"` // Specifies an array of PGP public keys used to encrypt the output unseal keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as secret_shares. PgpKeys []string `json:"pgp_keys"` // Turns on verification functionality RequireVerification bool `json:"require_verification"` SecretShares int32 `json:"secret_shares"` // Specifies the number of shares required to reconstruct the unseal key. This must be less than or equal secret_shares. If using Vault HSM with auto-unsealing, this value must be the same as secret_shares. SecretThreshold int32 `json:"secret_threshold"` }
WriteRekeyInitRequest struct for WriteRekeyInitRequest
func NewWriteRekeyInitRequestWithDefaults ¶
func NewWriteRekeyInitRequestWithDefaults() *WriteRekeyInitRequest
NewWriteRekeyInitRequestWithDefaults instantiates a new WriteRekeyInitRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteRekeyInitRequest) MarshalJSON ¶
func (o WriteRekeyInitRequest) MarshalJSON() ([]byte, error)
type WriteRekeyUpdateRequest ¶
type WriteRekeyUpdateRequest struct { // Specifies a single unseal key share. Key string `json:"key"` // Specifies the nonce of the rekey attempt. Nonce string `json:"nonce"` }
WriteRekeyUpdateRequest struct for WriteRekeyUpdateRequest
func NewWriteRekeyUpdateRequestWithDefaults ¶
func NewWriteRekeyUpdateRequestWithDefaults() *WriteRekeyUpdateRequest
NewWriteRekeyUpdateRequestWithDefaults instantiates a new WriteRekeyUpdateRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteRekeyUpdateRequest) MarshalJSON ¶
func (o WriteRekeyUpdateRequest) MarshalJSON() ([]byte, error)
type WriteRekeyVerifyRequest ¶
type WriteRekeyVerifyRequest struct { // Specifies a single unseal share key from the new set of shares. Key string `json:"key"` // Specifies the nonce of the rekey verification operation. Nonce string `json:"nonce"` }
WriteRekeyVerifyRequest struct for WriteRekeyVerifyRequest
func NewWriteRekeyVerifyRequestWithDefaults ¶
func NewWriteRekeyVerifyRequestWithDefaults() *WriteRekeyVerifyRequest
NewWriteRekeyVerifyRequestWithDefaults instantiates a new WriteRekeyVerifyRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteRekeyVerifyRequest) MarshalJSON ¶
func (o WriteRekeyVerifyRequest) MarshalJSON() ([]byte, error)
type WriteRotateConfigRequest ¶
type WriteRotateConfigRequest struct { // Whether automatic rotation is enabled. Enabled bool `json:"enabled"` // How long after installation of an active key term that the key will be automatically rotated. Interval int32 `json:"interval"` // The number of encryption operations performed before the barrier key is automatically rotated. MaxOperations int64 `json:"max_operations"` }
WriteRotateConfigRequest struct for WriteRotateConfigRequest
func NewWriteRotateConfigRequestWithDefaults ¶
func NewWriteRotateConfigRequestWithDefaults() *WriteRotateConfigRequest
NewWriteRotateConfigRequestWithDefaults instantiates a new WriteRotateConfigRequest object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func (WriteRotateConfigRequest) MarshalJSON ¶
func (o WriteRotateConfigRequest) MarshalJSON() ([]byte, error)
Source Files
¶
- model_active_directory_check_in_library_request.go
- model_active_directory_check_in_manage_library_request.go
- model_active_directory_check_out_library_request.go
- model_active_directory_write_config_request.go
- model_active_directory_write_library_request.go
- model_active_directory_write_role_request.go
- model_ali_cloud_login_request.go
- model_ali_cloud_write_auth_role_request.go
- model_ali_cloud_write_config_request.go
- model_ali_cloud_write_role_request.go
- model_alias_write_by_id_request.go
- model_alias_write_request.go
- model_app_role_list_roles_response.go
- model_app_role_list_secret_id_response.go
- model_app_role_login_request.go
- model_app_role_read_bind_secret_id_response.go
- model_app_role_read_bound_cidr_list_response.go
- model_app_role_read_local_secret_ids_response.go
- model_app_role_read_period_response.go
- model_app_role_read_policies_response.go
- model_app_role_read_role_id_response.go
- model_app_role_read_role_response.go
- model_app_role_read_secret_id_bound_cidrs_response.go
- model_app_role_read_secret_id_num_uses_response.go
- model_app_role_read_secret_idttl_response.go
- model_app_role_read_token_bound_cidrs_response.go
- model_app_role_read_token_max_ttl_response.go
- model_app_role_read_token_num_uses_response.go
- model_app_role_read_token_ttl_response.go
- model_app_role_write_bind_secret_id_request.go
- model_app_role_write_bound_cidr_list_request.go
- model_app_role_write_custom_secret_id_request.go
- model_app_role_write_custom_secret_id_response.go
- model_app_role_write_period_request.go
- model_app_role_write_policies_request.go
- model_app_role_write_role_id_request.go
- model_app_role_write_role_request.go
- model_app_role_write_secret_id_accessor_destroy_request.go
- model_app_role_write_secret_id_accessor_lookup_request.go
- model_app_role_write_secret_id_accessor_lookup_response.go
- model_app_role_write_secret_id_bound_cidrs_request.go
- model_app_role_write_secret_id_destroy_request.go
- model_app_role_write_secret_id_lookup_request.go
- model_app_role_write_secret_id_lookup_response.go
- model_app_role_write_secret_id_num_uses_request.go
- model_app_role_write_secret_id_request.go
- model_app_role_write_secret_id_response.go
- model_app_role_write_secret_idttl_request.go
- model_app_role_write_token_bound_cidrs_request.go
- model_app_role_write_token_max_ttl_request.go
- model_app_role_write_token_num_uses_request.go
- model_app_role_write_token_ttl_request.go
- model_aws_config_write_certificate_request.go
- model_aws_config_write_client_request.go
- model_aws_config_write_identity_access_list_request.go
- model_aws_config_write_identity_request.go
- model_aws_config_write_identity_white_list_request.go
- model_aws_config_write_lease_request.go
- model_aws_config_write_role_tag_black_list_request.go
- model_aws_config_write_role_tag_deny_list_request.go
- model_aws_config_write_root_iam_credentials_request.go
- model_aws_config_write_security_token_service_account_request.go
- model_aws_login_request.go
- model_aws_write_auth_role_request.go
- model_aws_write_auth_role_tag_request.go
- model_aws_write_credentials_request.go
- model_aws_write_identity_access_list_tidy_settings_request.go
- model_aws_write_identity_white_list_tidy_settings_request.go
- model_aws_write_role_request.go
- model_aws_write_role_tag_black_list_tidy_settings_request.go
- model_aws_write_role_tag_deny_list_tidy_settings_request.go
- model_aws_write_security_token_service_request.go
- model_azure_login_request.go
- model_azure_write_auth_config_request.go
- model_azure_write_auth_role_request.go
- model_azure_write_config_request.go
- model_azure_write_role_request.go
- model_calculate_audit_hash_request.go
- model_centrify_login_request.go
- model_centrify_write_config_request.go
- model_certificates_login_request.go
- model_certificates_write_config_request.go
- model_certificates_write_crl_request.go
- model_certificates_write_request.go
- model_cloud_foundry_login_request.go
- model_cloud_foundry_write_config_request.go
- model_cloud_foundry_write_role_request.go
- model_consul_write_access_config_request.go
- model_consul_write_role_request.go
- model_database_write_config_request.go
- model_database_write_role_request.go
- model_database_write_static_role_request.go
- model_entity_batch_delete_request.go
- model_entity_lookup_request.go
- model_entity_merge_request.go
- model_entity_write_alias_by_id_request.go
- model_entity_write_alias_request.go
- model_entity_write_by_id_request.go
- model_entity_write_by_name_request.go
- model_entity_write_request.go
- model_git_hub_login_request.go
- model_git_hub_write_config_request.go
- model_git_hub_write_map_team_request.go
- model_git_hub_write_map_user_request.go
- model_google_cloud_kms_decrypt_request.go
- model_google_cloud_kms_encrypt_request.go
- model_google_cloud_kms_reencrypt_request.go
- model_google_cloud_kms_register_key_request.go
- model_google_cloud_kms_sign_request.go
- model_google_cloud_kms_verify_request.go
- model_google_cloud_kms_write_config_request.go
- model_google_cloud_kms_write_key_config_request.go
- model_google_cloud_kms_write_key_request.go
- model_google_cloud_login_request.go
- model_google_cloud_write_auth_config_request.go
- model_google_cloud_write_config_request.go
- model_google_cloud_write_key_request.go
- model_google_cloud_write_role_labels_request.go
- model_google_cloud_write_role_request.go
- model_google_cloud_write_role_service_accounts_request.go
- model_google_cloud_write_roleset_key_request.go
- model_google_cloud_write_roleset_request.go
- model_google_cloud_write_static_account_key_request.go
- model_google_cloud_write_static_account_request.go
- model_group_lookup_request.go
- model_group_write_alias_by_id_request.go
- model_group_write_alias_request.go
- model_group_write_by_id_request.go
- model_group_write_by_name_request.go
- model_group_write_request.go
- model_jwt_login_request.go
- model_jwt_write_config_request.go
- model_jwt_write_oidc_auth_url_request.go
- model_jwt_write_oidc_callback_request.go
- model_jwt_write_role_request.go
- model_kerberos_login_request.go
- model_kerberos_write_config_request.go
- model_kerberos_write_group_request.go
- model_kerberos_write_ldap_config_request.go
- model_kubernetes_login_request.go
- model_kubernetes_write_auth_config_request.go
- model_kubernetes_write_auth_role_request.go
- model_kubernetes_write_config_request.go
- model_kubernetes_write_credentials_request.go
- model_kubernetes_write_role_request.go
- model_kvv2_delete_versions_request.go
- model_kvv2_destroy_versions_request.go
- model_kvv2_undelete_versions_request.go
- model_kvv2_write_config_request.go
- model_kvv2_write_metadata_request.go
- model_kvv2_write_request.go
- model_ldap_check_in_library_request.go
- model_ldap_check_in_manage_library_request.go
- model_ldap_check_out_library_request.go
- model_ldap_login_request.go
- model_ldap_write_auth_config_request.go
- model_ldap_write_config_request.go
- model_ldap_write_group_request.go
- model_ldap_write_library_request.go
- model_ldap_write_role_request.go
- model_ldap_write_static_role_request.go
- model_ldap_write_user_request.go
- model_mfa_method_admin_destroy_totp_request.go
- model_mfa_method_admin_generate_totp_request.go
- model_mfa_method_generate_totp_request.go
- model_mfa_method_write_duo_request.go
- model_mfa_method_write_okta_request.go
- model_mfa_method_write_ping_id_request.go
- model_mfa_method_write_totp_request.go
- model_mfa_validate_request.go
- model_mfa_write_login_enforcement_request.go
- model_mongo_db_atlas_write_config_request.go
- model_mongo_db_atlas_write_role_request.go
- model_nomad_write_access_config_request.go
- model_nomad_write_lease_config_request.go
- model_nomad_write_role_request.go
- model_oci_login_with_role_request.go
- model_oci_write_config_request.go
- model_oci_write_role_request.go
- model_oidc_introspect_request.go
- model_oidc_login_request.go
- model_oidc_rotate_key_request.go
- model_oidc_write_assignment_request.go
- model_oidc_write_auth_config_request.go
- model_oidc_write_auth_role_request.go
- model_oidc_write_auth_url_request.go
- model_oidc_write_callback_request.go
- model_oidc_write_client_request.go
- model_oidc_write_config_request.go
- model_oidc_write_key_request.go
- model_oidc_write_provider_authorize_request.go
- model_oidc_write_provider_request.go
- model_oidc_write_provider_token_request.go
- model_oidc_write_role_request.go
- model_oidc_write_scope_request.go
- model_okta_login_request.go
- model_okta_write_config_request.go
- model_okta_write_group_request.go
- model_okta_write_user_request.go
- model_open_ldap_check_in_library_request.go
- model_open_ldap_check_in_manage_library_request.go
- model_open_ldap_check_out_library_request.go
- model_open_ldap_write_config_request.go
- model_open_ldap_write_library_request.go
- model_open_ldap_write_role_request.go
- model_open_ldap_write_static_role_request.go
- model_persona_id_write_by_id_request.go
- model_persona_write_request.go
- model_pki_bundle_write_request.go
- model_pki_generate_root_request.go
- model_pki_import_keys_request.go
- model_pki_issuer_issue_role_request.go
- model_pki_issuer_resign_crls_request.go
- model_pki_issuer_sign_intermediate_request.go
- model_pki_issuer_sign_revocation_list_request.go
- model_pki_issuer_sign_role_request.go
- model_pki_issuer_sign_self_issued_request.go
- model_pki_issuer_sign_verbatim_request.go
- model_pki_issuer_sign_verbatim_role_request.go
- model_pki_issuers_generate_intermediate_request.go
- model_pki_issuers_generate_root_request.go
- model_pki_replace_root_request.go
- model_pki_revoke_request.go
- model_pki_revoke_with_key_request.go
- model_pki_root_sign_intermediate_request.go
- model_pki_root_sign_self_issued_request.go
- model_pki_rotate_root_request.go
- model_pki_sign_role_request.go
- model_pki_sign_verbatim_request.go
- model_pki_sign_verbatim_role_request.go
- model_pki_tidy_request.go
- model_pki_write_auto_tidy_config_request.go
- model_pki_write_ca_config_request.go
- model_pki_write_certs_request.go
- model_pki_write_cluster_config_request.go
- model_pki_write_crl_config_request.go
- model_pki_write_intermediate_cross_sign_request.go
- model_pki_write_intermediate_generate_request.go
- model_pki_write_intermediate_set_signed_request.go
- model_pki_write_internal_exported_request.go
- model_pki_write_issue_role_request.go
- model_pki_write_issuer_ref_der_pem_request.go
- model_pki_write_issuers_config_request.go
- model_pki_write_json_request.go
- model_pki_write_key_request.go
- model_pki_write_keys_config_request.go
- model_pki_write_kms_request.go
- model_pki_write_role_request.go
- model_pki_write_url_config_request.go
- model_rabbit_mq_write_connection_config_request.go
- model_rabbit_mq_write_lease_config_request.go
- model_rabbit_mq_write_role_request.go
- model_radius_login_request.go
- model_radius_login_with_username_request.go
- model_radius_write_config_request.go
- model_radius_write_user_request.go
- model_remount_request.go
- model_renew_for_request.go
- model_renew_request.go
- model_revoke_lease_request.go
- model_revoke_prefix_request.go
- model_revoke_request.go
- model_ssh_lookup_request.go
- model_ssh_sign_request.go
- model_ssh_verify_request.go
- model_ssh_write_ca_config_request.go
- model_ssh_write_credentials_request.go
- model_ssh_write_issue_request.go
- model_ssh_write_keys_request.go
- model_ssh_write_role_request.go
- model_ssh_write_zero_address_config_request.go
- model_sys_write_plugins_catalog_name_request.go
- model_sys_write_tools_random_urlbytes_request.go
- model_terraform_write_config_request.go
- model_terraform_write_role_request.go
- model_token_renew_accessor_request.go
- model_token_renew_request.go
- model_token_renew_self_request.go
- model_token_revoke_accessor_request.go
- model_token_revoke_orphan_request.go
- model_token_revoke_request.go
- model_token_write_create_orphan_request.go
- model_token_write_create_request.go
- model_token_write_create_with_role_request.go
- model_token_write_lookup_accessor_request.go
- model_token_write_lookup_request.go
- model_token_write_lookup_self_request.go
- model_token_write_role_request.go
- model_tools_generate_random_request.go
- model_tools_generate_random_source_bytes_request.go
- model_tools_generate_random_source_request.go
- model_tools_hash_request.go
- model_tools_hash_with_request.go
- model_totp_write_code_request.go
- model_totp_write_key_request.go
- model_transit_decrypt_request.go
- model_transit_encrypt_request.go
- model_transit_generate_data_key_request.go
- model_transit_generate_hmac_request.go
- model_transit_generate_hmac_with_algorithm_request.go
- model_transit_generate_random_request.go
- model_transit_generate_random_source_bytes_request.go
- model_transit_generate_random_source_request.go
- model_transit_hash_request.go
- model_transit_hash_with_algorithm_request.go
- model_transit_import_key_request.go
- model_transit_import_key_version_request.go
- model_transit_restore_key_request.go
- model_transit_restore_request.go
- model_transit_rewrap_request.go
- model_transit_sign_request.go
- model_transit_sign_with_algorithm_request.go
- model_transit_trim_key_request.go
- model_transit_verify_request.go
- model_transit_verify_with_algorithm_request.go
- model_transit_write_cache_config_request.go
- model_transit_write_config_keys_request.go
- model_transit_write_key_config_request.go
- model_transit_write_key_request.go
- model_transit_write_random_urlbytes_request.go
- model_unseal_request.go
- model_userpass_login_request.go
- model_userpass_write_user_password_request.go
- model_userpass_write_user_policies_request.go
- model_userpass_write_user_request.go
- model_wrapping_rewrap_request.go
- model_wrapping_unwrap_request.go
- model_wrapping_write_lookup_request.go
- model_write_audit_device_request.go
- model_write_auth_method_request.go
- model_write_auth_method_tune_request.go
- model_write_capabilities_accessor_request.go
- model_write_capabilities_request.go
- model_write_capabilities_self_request.go
- model_write_config_auditing_request_header_request.go
- model_write_config_cors_request.go
- model_write_config_ui_header_request.go
- model_write_generate_root_attempt_request.go
- model_write_generate_root_request.go
- model_write_generate_root_update_request.go
- model_write_init_request.go
- model_write_internal_counters_config_request.go
- model_write_internal_specs_open_api_request.go
- model_write_leases_lookup_request.go
- model_write_leases_renew2_request.go
- model_write_leases_renew_request.go
- model_write_leases_revoke2_request.go
- model_write_leases_revoke_prefix_request.go
- model_write_leases_revoke_request.go
- model_write_logger_request.go
- model_write_loggers_request.go
- model_write_mount_request.go
- model_write_mounts_config_request.go
- model_write_plugins_catalog_by_type_by_name_request.go
- model_write_plugins_reload_backend_request.go
- model_write_policies_acl_request.go
- model_write_policies_password_request.go
- model_write_policy_request.go
- model_write_quotas_config_request.go
- model_write_quotas_rate_limit_request.go
- model_write_raw_path_request.go
- model_write_raw_request.go
- model_write_rekey_init_request.go
- model_write_rekey_update_request.go
- model_write_rekey_verify_request.go
- model_write_rotate_config_request.go