strongdm 13.11.0 → 14.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.git/ORIG_HEAD +1 -1
- data/.git/index +0 -0
- data/.git/logs/HEAD +3 -3
- data/.git/logs/refs/heads/master +2 -2
- data/.git/logs/refs/remotes/origin/HEAD +1 -1
- data/.git/objects/pack/{pack-1d9fc140c6d5e5a873af3b9499b2cf070fc0bd1e.idx → pack-506fd68e43b73695be77ec3d6e0aef9ecb46e913.idx} +0 -0
- data/.git/objects/pack/{pack-1d9fc140c6d5e5a873af3b9499b2cf070fc0bd1e.pack → pack-506fd68e43b73695be77ec3d6e0aef9ecb46e913.pack} +0 -0
- data/.git/packed-refs +4 -2
- data/.git/refs/heads/master +1 -1
- data/lib/grpc/accounts_pb.rb +2 -0
- data/lib/grpc/approval_workflow_approvers_services_pb.rb +4 -4
- data/lib/grpc/approval_workflow_steps_pb.rb +4 -0
- data/lib/grpc/approval_workflow_steps_services_pb.rb +4 -4
- data/lib/grpc/managed_secrets_pb.rb +171 -0
- data/lib/grpc/managed_secrets_services_pb.rb +59 -0
- data/lib/grpc/plumbing.rb +4265 -2492
- data/lib/grpc/secret_engine_policy_pb.rb +41 -0
- data/lib/grpc/secret_engine_types_pb.rb +75 -0
- data/lib/grpc/secret_engines_pb.rb +124 -0
- data/lib/grpc/secret_engines_services_pb.rb +53 -0
- data/lib/models/porcelain.rb +1304 -60
- data/lib/strongdm.rb +15 -1
- data/lib/svc.rb +668 -12
- data/lib/version +1 -1
- data/lib/version.rb +1 -1
- metadata +10 -4
@@ -0,0 +1,41 @@
|
|
1
|
+
# Copyright 2020 StrongDM Inc
|
2
|
+
#
|
3
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
4
|
+
# you may not use this file except in compliance with the License.
|
5
|
+
# You may obtain a copy of the License at
|
6
|
+
#
|
7
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
8
|
+
#
|
9
|
+
# Unless required by applicable law or agreed to in writing, software
|
10
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
11
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
12
|
+
# See the License for the specific language governing permissions and
|
13
|
+
# limitations under the License.
|
14
|
+
#
|
15
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
16
|
+
# source: secret_engine_policy.proto
|
17
|
+
|
18
|
+
require "google/protobuf"
|
19
|
+
|
20
|
+
require "options_pb"
|
21
|
+
|
22
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
23
|
+
add_file("secret_engine_policy.proto", :syntax => :proto3) do
|
24
|
+
add_message "v1.SecretEnginePasswordPolicy" do
|
25
|
+
optional :length, :uint32, 1
|
26
|
+
optional :exclude_upper_case, :bool, 2
|
27
|
+
optional :num_digits, :uint32, 3
|
28
|
+
optional :num_symbols, :uint32, 4
|
29
|
+
optional :allow_repeat, :bool, 5
|
30
|
+
optional :exclude_characters, :string, 6
|
31
|
+
end
|
32
|
+
add_message "v1.SecretEnginePolicy" do
|
33
|
+
optional :password_policy, :message, 1, "v1.SecretEnginePasswordPolicy"
|
34
|
+
end
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
module V1
|
39
|
+
SecretEnginePasswordPolicy = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEnginePasswordPolicy").msgclass
|
40
|
+
SecretEnginePolicy = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEnginePolicy").msgclass
|
41
|
+
end
|
@@ -0,0 +1,75 @@
|
|
1
|
+
# Copyright 2020 StrongDM Inc
|
2
|
+
#
|
3
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
4
|
+
# you may not use this file except in compliance with the License.
|
5
|
+
# You may obtain a copy of the License at
|
6
|
+
#
|
7
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
8
|
+
#
|
9
|
+
# Unless required by applicable law or agreed to in writing, software
|
10
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
11
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
12
|
+
# See the License for the specific language governing permissions and
|
13
|
+
# limitations under the License.
|
14
|
+
#
|
15
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
16
|
+
# source: secret_engine_types.proto
|
17
|
+
|
18
|
+
require "google/protobuf"
|
19
|
+
|
20
|
+
require "options_pb"
|
21
|
+
require "tags_pb"
|
22
|
+
require "secret_engine_policy_pb"
|
23
|
+
require "google/protobuf/duration_pb"
|
24
|
+
|
25
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
26
|
+
add_file("secret_engine_types.proto", :syntax => :proto3) do
|
27
|
+
add_message "v1.SecretEngine" do
|
28
|
+
oneof :secret_engine do
|
29
|
+
optional :active_directory, :message, 332, "v1.ActiveDirectoryEngine"
|
30
|
+
optional :key_value, :message, 331, "v1.KeyValueEngine"
|
31
|
+
end
|
32
|
+
end
|
33
|
+
add_message "v1.ActiveDirectoryEngine" do
|
34
|
+
optional :after_read_ttl, :message, 1012, "google.protobuf.Duration"
|
35
|
+
optional :binddn, :string, 108
|
36
|
+
optional :bindpass, :string, 109
|
37
|
+
optional :certificate, :string, 107
|
38
|
+
optional :connection_timeout, :uint32, 103
|
39
|
+
optional :do_not_validate_timestamps, :bool, 1015
|
40
|
+
optional :insecure_tls, :bool, 106
|
41
|
+
optional :max_backoff_duration, :message, 1016, "google.protobuf.Duration"
|
42
|
+
optional :policy, :message, 1014, "v1.SecretEnginePolicy"
|
43
|
+
optional :request_timeout, :uint32, 104
|
44
|
+
optional :start_tls, :bool, 105
|
45
|
+
optional :ttl, :message, 1013, "google.protobuf.Duration"
|
46
|
+
optional :upndomain, :string, 1011
|
47
|
+
optional :url, :string, 102
|
48
|
+
optional :userdn, :string, 1010
|
49
|
+
optional :id, :string, 1
|
50
|
+
optional :name, :string, 2
|
51
|
+
optional :type, :string, 3
|
52
|
+
optional :secret_store_id, :string, 5
|
53
|
+
optional :secret_store_root_path, :string, 6
|
54
|
+
optional :tags, :message, 7, "v1.Tags"
|
55
|
+
optional :public_key, :bytes, 8
|
56
|
+
optional :key_rotation_interval_days, :int32, 9
|
57
|
+
end
|
58
|
+
add_message "v1.KeyValueEngine" do
|
59
|
+
optional :id, :string, 1
|
60
|
+
optional :name, :string, 2
|
61
|
+
optional :type, :string, 3
|
62
|
+
optional :secret_store_id, :string, 5
|
63
|
+
optional :secret_store_root_path, :string, 6
|
64
|
+
optional :tags, :message, 7, "v1.Tags"
|
65
|
+
optional :public_key, :bytes, 8
|
66
|
+
optional :key_rotation_interval_days, :int32, 9
|
67
|
+
end
|
68
|
+
end
|
69
|
+
end
|
70
|
+
|
71
|
+
module V1
|
72
|
+
SecretEngine = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngine").msgclass
|
73
|
+
ActiveDirectoryEngine = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.ActiveDirectoryEngine").msgclass
|
74
|
+
KeyValueEngine = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyValueEngine").msgclass
|
75
|
+
end
|
@@ -0,0 +1,124 @@
|
|
1
|
+
# Copyright 2020 StrongDM Inc
|
2
|
+
#
|
3
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
4
|
+
# you may not use this file except in compliance with the License.
|
5
|
+
# You may obtain a copy of the License at
|
6
|
+
#
|
7
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
8
|
+
#
|
9
|
+
# Unless required by applicable law or agreed to in writing, software
|
10
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
11
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
12
|
+
# See the License for the specific language governing permissions and
|
13
|
+
# limitations under the License.
|
14
|
+
#
|
15
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
16
|
+
# source: secret_engines.proto
|
17
|
+
|
18
|
+
require "google/protobuf"
|
19
|
+
|
20
|
+
require "options_pb"
|
21
|
+
require "spec_pb"
|
22
|
+
require "secret_stores_pb"
|
23
|
+
require "secret_engine_types_pb"
|
24
|
+
require "secret_engine_policy_pb"
|
25
|
+
|
26
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
27
|
+
add_file("secret_engines.proto", :syntax => :proto3) do
|
28
|
+
add_message "v1.SecretEngineListRequest" do
|
29
|
+
optional :meta, :message, 1, "v1.ListRequestMetadata"
|
30
|
+
optional :filter, :string, 2
|
31
|
+
end
|
32
|
+
add_message "v1.SecretEngineListResponse" do
|
33
|
+
optional :meta, :message, 1, "v1.ListResponseMetadata"
|
34
|
+
repeated :secret_engines, :message, 2, "v1.SecretEngine"
|
35
|
+
optional :rate_limit, :message, 3, "v1.RateLimitMetadata"
|
36
|
+
end
|
37
|
+
add_message "v1.SecretEngineGetRequest" do
|
38
|
+
optional :meta, :message, 1, "v1.GetRequestMetadata"
|
39
|
+
optional :id, :string, 2
|
40
|
+
end
|
41
|
+
add_message "v1.SecretEngineGetResponse" do
|
42
|
+
optional :meta, :message, 1, "v1.GetResponseMetadata"
|
43
|
+
optional :secret_engine, :message, 2, "v1.SecretEngine"
|
44
|
+
optional :rate_limit, :message, 3, "v1.RateLimitMetadata"
|
45
|
+
end
|
46
|
+
add_message "v1.SecretEngineCreateRequest" do
|
47
|
+
optional :meta, :message, 1, "v1.CreateRequestMetadata"
|
48
|
+
optional :secret_engine, :message, 2, "v1.SecretEngine"
|
49
|
+
end
|
50
|
+
add_message "v1.SecretEngineCreateResponse" do
|
51
|
+
optional :meta, :message, 1, "v1.CreateResponseMetadata"
|
52
|
+
optional :secret_engine, :message, 2, "v1.SecretEngine"
|
53
|
+
optional :rate_limit, :message, 3, "v1.RateLimitMetadata"
|
54
|
+
end
|
55
|
+
add_message "v1.SecretEngineUpdateRequest" do
|
56
|
+
optional :meta, :message, 1, "v1.UpdateRequestMetadata"
|
57
|
+
optional :id, :string, 2
|
58
|
+
optional :secret_engine, :message, 3, "v1.SecretEngine"
|
59
|
+
end
|
60
|
+
add_message "v1.SecretEngineUpdateResponse" do
|
61
|
+
optional :meta, :message, 1, "v1.UpdateResponseMetadata"
|
62
|
+
optional :secret_engine, :message, 2, "v1.SecretEngine"
|
63
|
+
optional :rate_limit, :message, 3, "v1.RateLimitMetadata"
|
64
|
+
end
|
65
|
+
add_message "v1.SecretEngineDeleteRequest" do
|
66
|
+
optional :meta, :message, 1, "v1.UpdateRequestMetadata"
|
67
|
+
optional :id, :string, 2
|
68
|
+
end
|
69
|
+
add_message "v1.SecretEngineDeleteResponse" do
|
70
|
+
optional :meta, :message, 1, "v1.DeleteResponseMetadata"
|
71
|
+
optional :rate_limit, :message, 2, "v1.RateLimitMetadata"
|
72
|
+
end
|
73
|
+
add_message "v1.GenerateKeysRequest" do
|
74
|
+
optional :meta, :message, 1, "v1.UpdateRequestMetadata"
|
75
|
+
optional :secret_engine_id, :string, 2
|
76
|
+
end
|
77
|
+
add_message "v1.GenerateKeysResponse" do
|
78
|
+
optional :meta, :message, 1, "v1.UpdateResponseMetadata"
|
79
|
+
optional :rate_limit, :message, 3, "v1.RateLimitMetadata"
|
80
|
+
end
|
81
|
+
add_message "v1.HealthcheckRequest" do
|
82
|
+
optional :meta, :message, 1, "v1.GetRequestMetadata"
|
83
|
+
optional :secret_engine_id, :string, 2
|
84
|
+
end
|
85
|
+
add_message "v1.HealthcheckStatus" do
|
86
|
+
optional :node_id, :string, 1
|
87
|
+
optional :status, :string, 2
|
88
|
+
end
|
89
|
+
add_message "v1.HealthcheckResponse" do
|
90
|
+
optional :meta, :message, 1, "v1.GetRequestMetadata"
|
91
|
+
optional :rate_limit, :message, 3, "v1.RateLimitMetadata"
|
92
|
+
repeated :status, :message, 2, "v1.HealthcheckStatus"
|
93
|
+
end
|
94
|
+
add_message "v1.SecretEngineRotateRequest" do
|
95
|
+
optional :meta, :message, 1, "v1.UpdateRequestMetadata"
|
96
|
+
optional :id, :string, 2
|
97
|
+
optional :password_policy, :message, 3, "v1.SecretEnginePasswordPolicy"
|
98
|
+
end
|
99
|
+
add_message "v1.SecretEngineRotateResponse" do
|
100
|
+
optional :meta, :message, 1, "v1.UpdateRequestMetadata"
|
101
|
+
optional :rate_limit, :message, 2, "v1.RateLimitMetadata"
|
102
|
+
end
|
103
|
+
end
|
104
|
+
end
|
105
|
+
|
106
|
+
module V1
|
107
|
+
SecretEngineListRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineListRequest").msgclass
|
108
|
+
SecretEngineListResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineListResponse").msgclass
|
109
|
+
SecretEngineGetRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineGetRequest").msgclass
|
110
|
+
SecretEngineGetResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineGetResponse").msgclass
|
111
|
+
SecretEngineCreateRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineCreateRequest").msgclass
|
112
|
+
SecretEngineCreateResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineCreateResponse").msgclass
|
113
|
+
SecretEngineUpdateRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineUpdateRequest").msgclass
|
114
|
+
SecretEngineUpdateResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineUpdateResponse").msgclass
|
115
|
+
SecretEngineDeleteRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineDeleteRequest").msgclass
|
116
|
+
SecretEngineDeleteResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineDeleteResponse").msgclass
|
117
|
+
GenerateKeysRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GenerateKeysRequest").msgclass
|
118
|
+
GenerateKeysResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GenerateKeysResponse").msgclass
|
119
|
+
HealthcheckRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.HealthcheckRequest").msgclass
|
120
|
+
HealthcheckStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.HealthcheckStatus").msgclass
|
121
|
+
HealthcheckResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.HealthcheckResponse").msgclass
|
122
|
+
SecretEngineRotateRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineRotateRequest").msgclass
|
123
|
+
SecretEngineRotateResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.SecretEngineRotateResponse").msgclass
|
124
|
+
end
|
@@ -0,0 +1,53 @@
|
|
1
|
+
# Copyright 2020 StrongDM Inc
|
2
|
+
#
|
3
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
4
|
+
# you may not use this file except in compliance with the License.
|
5
|
+
# You may obtain a copy of the License at
|
6
|
+
#
|
7
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
8
|
+
#
|
9
|
+
# Unless required by applicable law or agreed to in writing, software
|
10
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
11
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
12
|
+
# See the License for the specific language governing permissions and
|
13
|
+
# limitations under the License.
|
14
|
+
#
|
15
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
16
|
+
# Source: secret_engines.proto for package 'v1'
|
17
|
+
|
18
|
+
require "grpc"
|
19
|
+
require "secret_engines_pb"
|
20
|
+
|
21
|
+
module V1
|
22
|
+
module SecretEngines
|
23
|
+
class Service
|
24
|
+
include ::GRPC::GenericService
|
25
|
+
|
26
|
+
self.marshal_class_method = :encode
|
27
|
+
self.unmarshal_class_method = :decode
|
28
|
+
self.service_name = "v1.SecretEngines"
|
29
|
+
|
30
|
+
# List returns a list of Secret Engines
|
31
|
+
rpc :List, ::V1::SecretEngineListRequest, ::V1::SecretEngineListResponse
|
32
|
+
# Get returns a secret engine details
|
33
|
+
rpc :Get, ::V1::SecretEngineGetRequest, ::V1::SecretEngineGetResponse
|
34
|
+
# Create creates a secret engine
|
35
|
+
rpc :Create, ::V1::SecretEngineCreateRequest, ::V1::SecretEngineCreateResponse
|
36
|
+
# Update updates a secret engine
|
37
|
+
rpc :Update, ::V1::SecretEngineUpdateRequest, ::V1::SecretEngineUpdateResponse
|
38
|
+
# Delete deletes a secret engine
|
39
|
+
rpc :Delete, ::V1::SecretEngineDeleteRequest, ::V1::SecretEngineDeleteResponse
|
40
|
+
# ListSecretStores returns a list of Secret Stores that can be used as a backing store
|
41
|
+
# for Secret Engine
|
42
|
+
rpc :ListSecretStores, ::V1::SecretStoreListRequest, ::V1::SecretStoreListResponse
|
43
|
+
# GenerateKeys generates a private key, stores it in a secret store and stores a public key in a secret engine
|
44
|
+
rpc :GenerateKeys, ::V1::GenerateKeysRequest, ::V1::GenerateKeysResponse
|
45
|
+
# Healthcheck triggers a healthcheck for all nodes serving a secret engine
|
46
|
+
rpc :Healthcheck, ::V1::HealthcheckRequest, ::V1::HealthcheckResponse
|
47
|
+
# Rotate rotates secret engine's credentials
|
48
|
+
rpc :Rotate, ::V1::SecretEngineRotateRequest, ::V1::SecretEngineRotateResponse
|
49
|
+
end
|
50
|
+
|
51
|
+
Stub = Service.rpc_stub_class
|
52
|
+
end
|
53
|
+
end
|