diff --git a/docs/AppRoleLookUpSecretIdByAccessorResponse.md b/docs/AppRoleLookUpSecretIdByAccessorResponse.md index 2f788621..a3c37fc8 100644 --- a/docs/AppRoleLookUpSecretIdByAccessorResponse.md +++ b/docs/AppRoleLookUpSecretIdByAccessorResponse.md @@ -12,7 +12,7 @@ Name | Type | Description | Notes **Metadata** | Pointer to **map[string]interface{}** | | [optional] **SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional] **SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional] **TokenBoundCidrs** | Pointer to **[]string** | List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. | [optional] diff --git a/docs/AppRoleLookUpSecretIdResponse.md b/docs/AppRoleLookUpSecretIdResponse.md index a73fb041..3bc04947 100644 --- a/docs/AppRoleLookUpSecretIdResponse.md +++ b/docs/AppRoleLookUpSecretIdResponse.md @@ -12,7 +12,7 @@ Name | Type | Description | Notes **Metadata** | Pointer to **map[string]interface{}** | | [optional] **SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional] **SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional] **TokenBoundCidrs** | Pointer to **[]string** | List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. | [optional] diff --git a/docs/AppRoleReadPeriodResponse.md b/docs/AppRoleReadPeriodResponse.md index e03811b7..4bb58ce3 100644 --- a/docs/AppRoleReadPeriodResponse.md +++ b/docs/AppRoleReadPeriodResponse.md @@ -5,8 +5,8 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**Period** | Pointer to **string** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional] -**TokenPeriod** | Pointer to **string** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). | [optional] +**Period** | Pointer to **int64** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional] +**TokenPeriod** | Pointer to **int64** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds. | [optional] diff --git a/docs/AppRoleReadRoleResponse.md b/docs/AppRoleReadRoleResponse.md index 31f62128..1dbdbf4f 100644 --- a/docs/AppRoleReadRoleResponse.md +++ b/docs/AppRoleReadRoleResponse.md @@ -7,19 +7,19 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **BindSecretId** | Pointer to **bool** | Impose secret ID to be presented when logging in using this role. | [optional] **LocalSecretIds** | Pointer to **bool** | If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later | [optional] -**Period** | Pointer to **string** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional] +**Period** | Pointer to **int64** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional] **Policies** | Pointer to **[]string** | Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. | [optional] **SecretIdBoundCidrs** | Pointer to **[]string** | Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. | [optional] **SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional] **TokenBoundCidrs** | Pointer to **[]string** | Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. | [optional] -**TokenExplicitMaxTtl** | Pointer to **string** | If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. | [optional] -**TokenMaxTtl** | Pointer to **string** | The maximum lifetime of the generated token | [optional] +**TokenExplicitMaxTtl** | Pointer to **int64** | If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. | [optional] +**TokenMaxTtl** | Pointer to **int64** | The maximum lifetime of the generated token | [optional] **TokenNoDefaultPolicy** | Pointer to **bool** | If true, the 'default' policy will not automatically be added to generated tokens | [optional] **TokenNumUses** | Pointer to **int32** | The maximum number of times a token may be used, a value of zero means unlimited | [optional] -**TokenPeriod** | Pointer to **string** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. | [optional] +**TokenPeriod** | Pointer to **int64** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. | [optional] **TokenPolicies** | Pointer to **[]string** | Comma-separated list of policies | [optional] -**TokenTtl** | Pointer to **string** | The initial ttl of the token to generate | [optional] +**TokenTtl** | Pointer to **int64** | The initial ttl of the token to generate | [optional] **TokenType** | Pointer to **string** | The type of token to generate, service or batch | [optional] [default to "default-service"] diff --git a/docs/AppRoleReadSecretIdTtlResponse.md b/docs/AppRoleReadSecretIdTtlResponse.md index ab4f7a53..443e6493 100644 --- a/docs/AppRoleReadSecretIdTtlResponse.md +++ b/docs/AppRoleReadSecretIdTtlResponse.md @@ -5,7 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. | [optional] diff --git a/docs/AppRoleReadTokenMaxTtlResponse.md b/docs/AppRoleReadTokenMaxTtlResponse.md index ce27507f..fe4b4025 100644 --- a/docs/AppRoleReadTokenMaxTtlResponse.md +++ b/docs/AppRoleReadTokenMaxTtlResponse.md @@ -5,7 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**TokenMaxTtl** | Pointer to **string** | The maximum lifetime of the generated token | [optional] +**TokenMaxTtl** | Pointer to **int64** | The maximum lifetime of the generated token | [optional] diff --git a/docs/AppRoleReadTokenTtlResponse.md b/docs/AppRoleReadTokenTtlResponse.md index babeaa6a..bd40a546 100644 --- a/docs/AppRoleReadTokenTtlResponse.md +++ b/docs/AppRoleReadTokenTtlResponse.md @@ -5,7 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**TokenTtl** | Pointer to **string** | The initial ttl of the token to generate | [optional] +**TokenTtl** | Pointer to **int64** | The initial ttl of the token to generate | [optional] diff --git a/docs/AppRoleWriteCustomSecretIdResponse.md b/docs/AppRoleWriteCustomSecretIdResponse.md index 746b2601..182a7afd 100644 --- a/docs/AppRoleWriteCustomSecretIdResponse.md +++ b/docs/AppRoleWriteCustomSecretIdResponse.md @@ -8,7 +8,7 @@ Name | Type | Description | Notes **SecretId** | Pointer to **string** | Secret ID attached to the role. | [optional] **SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional] **SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional] diff --git a/docs/AppRoleWriteSecretIdResponse.md b/docs/AppRoleWriteSecretIdResponse.md index f19ce226..8f7f95db 100644 --- a/docs/AppRoleWriteSecretIdResponse.md +++ b/docs/AppRoleWriteSecretIdResponse.md @@ -8,7 +8,7 @@ Name | Type | Description | Notes **SecretId** | Pointer to **string** | Secret ID attached to the role. | [optional] **SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional] **SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional] -**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional] +**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional] diff --git a/openapi.json b/openapi.json index accc85f1..478cfbd8 100644 --- a/openapi.json +++ b/openapi.json @@ -30968,9 +30968,9 @@ "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID expires.", - "format": "duration" + "format": "int64" }, "token_bound_cidrs": { "type": "array", @@ -31025,9 +31025,9 @@ "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID expires.", - "format": "duration" + "format": "int64" }, "token_bound_cidrs": { "type": "array", @@ -31073,15 +31073,15 @@ "type": "object", "properties": { "period": { - "type": "string", + "type": "integer", "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", - "format": "duration", + "format": "int64", "deprecated": true }, "token_period": { - "type": "string", - "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").", - "format": "duration" + "type": "integer", + "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds.", + "format": "int64" } } }, @@ -31126,9 +31126,9 @@ "description": "If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later" }, "period": { - "type": "string", + "type": "integer", "description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.", - "format": "duration", + "format": "int64", "deprecated": true }, "policies": { @@ -31151,9 +31151,9 @@ "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID expires.", - "format": "duration" + "format": "int64" }, "token_bound_cidrs": { "type": "array", @@ -31163,14 +31163,14 @@ } }, "token_explicit_max_ttl": { - "type": "string", + "type": "integer", "description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.", - "format": "duration" + "format": "int64" }, "token_max_ttl": { - "type": "string", + "type": "integer", "description": "The maximum lifetime of the generated token", - "format": "duration" + "format": "int64" }, "token_no_default_policy": { "type": "boolean", @@ -31181,9 +31181,9 @@ "description": "The maximum number of times a token may be used, a value of zero means unlimited" }, "token_period": { - "type": "string", + "type": "integer", "description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value.", - "format": "duration" + "format": "int64" }, "token_policies": { "type": "array", @@ -31193,9 +31193,9 @@ } }, "token_ttl": { - "type": "string", + "type": "integer", "description": "The initial ttl of the token to generate", - "format": "duration" + "format": "int64" }, "token_type": { "type": "string", @@ -31229,9 +31229,9 @@ "type": "object", "properties": { "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration.", - "format": "duration" + "format": "int64" } } }, @@ -31251,9 +31251,9 @@ "type": "object", "properties": { "token_max_ttl": { - "type": "string", + "type": "integer", "description": "The maximum lifetime of the generated token", - "format": "duration" + "format": "int64" } } }, @@ -31270,9 +31270,9 @@ "type": "object", "properties": { "token_ttl": { - "type": "string", + "type": "integer", "description": "The initial ttl of the token to generate", - "format": "duration" + "format": "int64" } } }, @@ -31350,9 +31350,9 @@ "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID expires.", - "format": "duration" + "format": "int64" } } }, @@ -31611,9 +31611,9 @@ "description": "Number of times a secret ID can access the role, after which the secret ID will expire." }, "secret_id_ttl": { - "type": "string", + "type": "integer", "description": "Duration in seconds after which the issued secret ID expires.", - "format": "duration" + "format": "int64" } } }, diff --git a/schema/model_app_role_look_up_secret_id_by_accessor_response.go b/schema/model_app_role_look_up_secret_id_by_accessor_response.go index 7f778bbb..e58fe226 100644 --- a/schema/model_app_role_look_up_secret_id_by_accessor_response.go +++ b/schema/model_app_role_look_up_secret_id_by_accessor_response.go @@ -27,7 +27,7 @@ type AppRoleLookUpSecretIdByAccessorResponse struct { SecretIdNumUses int32 `json:"secret_id_num_uses,omitempty"` // Duration in seconds after which the issued secret ID expires. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` // List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. TokenBoundCidrs []string `json:"token_bound_cidrs,omitempty"` diff --git a/schema/model_app_role_look_up_secret_id_response.go b/schema/model_app_role_look_up_secret_id_response.go index 378c1f3e..a164bfe3 100644 --- a/schema/model_app_role_look_up_secret_id_response.go +++ b/schema/model_app_role_look_up_secret_id_response.go @@ -27,7 +27,7 @@ type AppRoleLookUpSecretIdResponse struct { SecretIdNumUses int32 `json:"secret_id_num_uses,omitempty"` // Duration in seconds after which the issued secret ID expires. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` // List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. TokenBoundCidrs []string `json:"token_bound_cidrs,omitempty"` diff --git a/schema/model_app_role_read_period_response.go b/schema/model_app_role_read_period_response.go index c990907e..afd19200 100644 --- a/schema/model_app_role_read_period_response.go +++ b/schema/model_app_role_read_period_response.go @@ -9,8 +9,8 @@ package schema type AppRoleReadPeriodResponse struct { // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated - Period string `json:"period,omitempty"` + Period int64 `json:"period,omitempty"` - // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). - TokenPeriod string `json:"token_period,omitempty"` + // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds. + TokenPeriod int64 `json:"token_period,omitempty"` } diff --git a/schema/model_app_role_read_role_response.go b/schema/model_app_role_read_role_response.go index 1cfa637e..0df7a311 100644 --- a/schema/model_app_role_read_role_response.go +++ b/schema/model_app_role_read_role_response.go @@ -15,7 +15,7 @@ type AppRoleReadRoleResponse struct { // Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. // Deprecated - Period string `json:"period,omitempty"` + Period int64 `json:"period,omitempty"` // Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. // Deprecated @@ -28,16 +28,16 @@ type AppRoleReadRoleResponse struct { SecretIdNumUses int32 `json:"secret_id_num_uses,omitempty"` // Duration in seconds after which the issued secret ID expires. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` // Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. TokenBoundCidrs []string `json:"token_bound_cidrs,omitempty"` // If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. - TokenExplicitMaxTtl string `json:"token_explicit_max_ttl,omitempty"` + TokenExplicitMaxTtl int64 `json:"token_explicit_max_ttl,omitempty"` // The maximum lifetime of the generated token - TokenMaxTtl string `json:"token_max_ttl,omitempty"` + TokenMaxTtl int64 `json:"token_max_ttl,omitempty"` // If true, the 'default' policy will not automatically be added to generated tokens TokenNoDefaultPolicy bool `json:"token_no_default_policy,omitempty"` @@ -46,13 +46,13 @@ type AppRoleReadRoleResponse struct { TokenNumUses int32 `json:"token_num_uses,omitempty"` // If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. - TokenPeriod string `json:"token_period,omitempty"` + TokenPeriod int64 `json:"token_period,omitempty"` // Comma-separated list of policies TokenPolicies []string `json:"token_policies,omitempty"` // The initial ttl of the token to generate - TokenTtl string `json:"token_ttl,omitempty"` + TokenTtl int64 `json:"token_ttl,omitempty"` // The type of token to generate, service or batch TokenType string `json:"token_type,omitempty"` diff --git a/schema/model_app_role_read_secret_id_ttl_response.go b/schema/model_app_role_read_secret_id_ttl_response.go index 97a6cacd..57acee33 100644 --- a/schema/model_app_role_read_secret_id_ttl_response.go +++ b/schema/model_app_role_read_secret_id_ttl_response.go @@ -8,5 +8,5 @@ package schema // AppRoleReadSecretIdTtlResponse struct for AppRoleReadSecretIdTtlResponse type AppRoleReadSecretIdTtlResponse struct { // Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` } diff --git a/schema/model_app_role_read_token_max_ttl_response.go b/schema/model_app_role_read_token_max_ttl_response.go index 03474e06..5213ad9f 100644 --- a/schema/model_app_role_read_token_max_ttl_response.go +++ b/schema/model_app_role_read_token_max_ttl_response.go @@ -8,5 +8,5 @@ package schema // AppRoleReadTokenMaxTtlResponse struct for AppRoleReadTokenMaxTtlResponse type AppRoleReadTokenMaxTtlResponse struct { // The maximum lifetime of the generated token - TokenMaxTtl string `json:"token_max_ttl,omitempty"` + TokenMaxTtl int64 `json:"token_max_ttl,omitempty"` } diff --git a/schema/model_app_role_read_token_ttl_response.go b/schema/model_app_role_read_token_ttl_response.go index df36bf5b..e1c3ee5b 100644 --- a/schema/model_app_role_read_token_ttl_response.go +++ b/schema/model_app_role_read_token_ttl_response.go @@ -8,5 +8,5 @@ package schema // AppRoleReadTokenTtlResponse struct for AppRoleReadTokenTtlResponse type AppRoleReadTokenTtlResponse struct { // The initial ttl of the token to generate - TokenTtl string `json:"token_ttl,omitempty"` + TokenTtl int64 `json:"token_ttl,omitempty"` } diff --git a/schema/model_app_role_write_custom_secret_id_response.go b/schema/model_app_role_write_custom_secret_id_response.go index 92b09687..a8e979b5 100644 --- a/schema/model_app_role_write_custom_secret_id_response.go +++ b/schema/model_app_role_write_custom_secret_id_response.go @@ -17,5 +17,5 @@ type AppRoleWriteCustomSecretIdResponse struct { SecretIdNumUses int32 `json:"secret_id_num_uses,omitempty"` // Duration in seconds after which the issued secret ID expires. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` } diff --git a/schema/model_app_role_write_secret_id_response.go b/schema/model_app_role_write_secret_id_response.go index ee8e913e..4f53a5c8 100644 --- a/schema/model_app_role_write_secret_id_response.go +++ b/schema/model_app_role_write_secret_id_response.go @@ -17,5 +17,5 @@ type AppRoleWriteSecretIdResponse struct { SecretIdNumUses int32 `json:"secret_id_num_uses,omitempty"` // Duration in seconds after which the issued secret ID expires. - SecretIdTtl string `json:"secret_id_ttl,omitempty"` + SecretIdTtl int64 `json:"secret_id_ttl,omitempty"` }