strongdm 15.22.0 → 15.25.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.git/ORIG_HEAD +1 -1
- data/.git/index +0 -0
- data/.git/logs/HEAD +3 -3
- data/.git/logs/refs/heads/master +2 -2
- data/.git/logs/refs/remotes/origin/HEAD +1 -1
- data/.git/objects/pack/{pack-102044dd10f7a14cf9558e47f1b2bf49750dce45.idx → pack-e9a6bf671b19a0423972e795cd3ba2b74e58d27d.idx} +0 -0
- data/.git/objects/pack/{pack-102044dd10f7a14cf9558e47f1b2bf49750dce45.pack → pack-e9a6bf671b19a0423972e795cd3ba2b74e58d27d.pack} +0 -0
- data/.git/packed-refs +4 -2
- data/.git/refs/heads/master +1 -1
- data/lib/grpc/plumbing.rb +264 -0
- data/lib/grpc/secret_store_types_pb.rb +57 -0
- data/lib/models/porcelain.rb +228 -0
- data/lib/strongdm.rb +1 -1
- data/lib/svc.rb +5 -0
- data/lib/version +1 -1
- data/lib/version.rb +1 -1
- metadata +4 -4
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 1b3ee8403b96900984ff1b6a5b5e80bef413d633a538ebd5db04af7cc84d0ea9
|
|
4
|
+
data.tar.gz: c00dccaa63df6126e060fcfe5ff74678567cadb82d323375748b51fd2290bfb5
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 58126539def4f8328fceed2e0587f77ed1f1617f55284ec8ab7f5cae44cfebc7550c24afc663dcb0605a6da41a9c052d52092647fd59f5b21779e0c0e67ed243
|
|
7
|
+
data.tar.gz: ae3295116b34c358c16bd6b983358002d89d2942088ead582d1a837cdc90b07126c1ee089907394a5359da536f49abf0ca852d6a742aa9151dcf19b2f622c627
|
data/.git/ORIG_HEAD
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
1fb12400f09101921542776d3887b93103dd9c5f
|
data/.git/index
CHANGED
|
Binary file
|
data/.git/logs/HEAD
CHANGED
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
2
|
-
|
|
3
|
-
|
|
1
|
+
0000000000000000000000000000000000000000 1fb12400f09101921542776d3887b93103dd9c5f root <root@02efd9f1f92d.(none)> 1760946048 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
2
|
+
1fb12400f09101921542776d3887b93103dd9c5f 1fb12400f09101921542776d3887b93103dd9c5f root <root@02efd9f1f92d.(none)> 1760946048 +0000 checkout: moving from master to master
|
|
3
|
+
1fb12400f09101921542776d3887b93103dd9c5f a4fd017725511cf32effc6426ca74b714644d37d root <root@02efd9f1f92d.(none)> 1760946048 +0000 merge origin/development: Fast-forward
|
data/.git/logs/refs/heads/master
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
2
|
-
|
|
1
|
+
0000000000000000000000000000000000000000 1fb12400f09101921542776d3887b93103dd9c5f root <root@02efd9f1f92d.(none)> 1760946048 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
2
|
+
1fb12400f09101921542776d3887b93103dd9c5f a4fd017725511cf32effc6426ca74b714644d37d root <root@02efd9f1f92d.(none)> 1760946048 +0000 merge origin/development: Fast-forward
|
|
@@ -1 +1 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
1
|
+
0000000000000000000000000000000000000000 1fb12400f09101921542776d3887b93103dd9c5f root <root@02efd9f1f92d.(none)> 1760946048 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
Binary file
|
|
Binary file
|
data/.git/packed-refs
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
# pack-refs with: peeled fully-peeled sorted
|
|
2
|
-
|
|
3
|
-
|
|
2
|
+
a4fd017725511cf32effc6426ca74b714644d37d refs/remotes/origin/development
|
|
3
|
+
1fb12400f09101921542776d3887b93103dd9c5f refs/remotes/origin/master
|
|
4
4
|
2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
|
|
5
5
|
04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
|
|
6
6
|
6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
|
|
@@ -113,6 +113,8 @@ ac9b86121b9542f28b614f897f7a61f34363410b refs/tags/v15.10.0
|
|
|
113
113
|
95ca84ab082b3f19fa3b0d1799ac55e4beebea64 refs/tags/v15.2.0
|
|
114
114
|
7cf936aad61c58434bf735f826e7cfcf71b9ce8a refs/tags/v15.20.0
|
|
115
115
|
229557ff8902458028f43d084b6fdff298486d99 refs/tags/v15.21.0
|
|
116
|
+
dbc1e295841d51376c44f987d9eecf5c8427c478 refs/tags/v15.22.0
|
|
117
|
+
1fb12400f09101921542776d3887b93103dd9c5f refs/tags/v15.23.0
|
|
116
118
|
cf3b15b82cb0c4229609c07c870c6cb4fd38ef75 refs/tags/v15.4.0
|
|
117
119
|
0be2c5e7f7a90c49077548cb3a9bce234219b9f0 refs/tags/v15.5.0
|
|
118
120
|
4b9cd43c5dda3f369b82b6a56132a5470ff9ff53 refs/tags/v15.6.0
|
data/.git/refs/heads/master
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
a4fd017725511cf32effc6426ca74b714644d37d
|
data/lib/grpc/plumbing.rb
CHANGED
|
@@ -927,6 +927,8 @@ module SDM
|
|
|
927
927
|
porcelain.id = (plumbing.id)
|
|
928
928
|
porcelain.name = (plumbing.name)
|
|
929
929
|
porcelain.region = (plumbing.region)
|
|
930
|
+
porcelain.role_arn = (plumbing.role_arn)
|
|
931
|
+
porcelain.role_external_id = (plumbing.role_external_id)
|
|
930
932
|
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
931
933
|
porcelain
|
|
932
934
|
end
|
|
@@ -939,6 +941,8 @@ module SDM
|
|
|
939
941
|
plumbing.id = (porcelain.id)
|
|
940
942
|
plumbing.name = (porcelain.name)
|
|
941
943
|
plumbing.region = (porcelain.region)
|
|
944
|
+
plumbing.role_arn = (porcelain.role_arn)
|
|
945
|
+
plumbing.role_external_id = (porcelain.role_external_id)
|
|
942
946
|
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
943
947
|
plumbing
|
|
944
948
|
end
|
|
@@ -16730,6 +16734,9 @@ module SDM
|
|
|
16730
16734
|
if porcelain.instance_of? KeyfactorX509Store
|
|
16731
16735
|
plumbing.keyfactor_x_509 = convert_keyfactor_x_509_store_to_plumbing(porcelain)
|
|
16732
16736
|
end
|
|
16737
|
+
if porcelain.instance_of? StrongVaultStore
|
|
16738
|
+
plumbing.strong_vault = convert_strong_vault_store_to_plumbing(porcelain)
|
|
16739
|
+
end
|
|
16733
16740
|
if porcelain.instance_of? VaultAppRoleStore
|
|
16734
16741
|
plumbing.vault_app_role = convert_vault_app_role_store_to_plumbing(porcelain)
|
|
16735
16742
|
end
|
|
@@ -16742,9 +16749,21 @@ module SDM
|
|
|
16742
16749
|
if porcelain.instance_of? VaultAWSEC2Store
|
|
16743
16750
|
plumbing.vault_awsec_2 = convert_vault_awsec_2_store_to_plumbing(porcelain)
|
|
16744
16751
|
end
|
|
16752
|
+
if porcelain.instance_of? VaultAWSEC2CertSSHStore
|
|
16753
|
+
plumbing.vault_awsec_2_cert_ssh = convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
|
|
16754
|
+
end
|
|
16755
|
+
if porcelain.instance_of? VaultAWSEC2CertX509Store
|
|
16756
|
+
plumbing.vault_awsec_2_cert_x_509 = convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
|
|
16757
|
+
end
|
|
16745
16758
|
if porcelain.instance_of? VaultAWSIAMStore
|
|
16746
16759
|
plumbing.vault_awsiam = convert_vault_awsiam_store_to_plumbing(porcelain)
|
|
16747
16760
|
end
|
|
16761
|
+
if porcelain.instance_of? VaultAWSIAMCertSSHStore
|
|
16762
|
+
plumbing.vault_awsiam_cert_ssh = convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
|
|
16763
|
+
end
|
|
16764
|
+
if porcelain.instance_of? VaultAWSIAMCertX509Store
|
|
16765
|
+
plumbing.vault_awsiam_cert_x_509 = convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
|
|
16766
|
+
end
|
|
16748
16767
|
if porcelain.instance_of? VaultTLSStore
|
|
16749
16768
|
plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
|
|
16750
16769
|
end
|
|
@@ -16806,6 +16825,9 @@ module SDM
|
|
|
16806
16825
|
if plumbing.keyfactor_x_509 != nil
|
|
16807
16826
|
return convert_keyfactor_x_509_store_to_porcelain(plumbing.keyfactor_x_509)
|
|
16808
16827
|
end
|
|
16828
|
+
if plumbing.strong_vault != nil
|
|
16829
|
+
return convert_strong_vault_store_to_porcelain(plumbing.strong_vault)
|
|
16830
|
+
end
|
|
16809
16831
|
if plumbing.vault_app_role != nil
|
|
16810
16832
|
return convert_vault_app_role_store_to_porcelain(plumbing.vault_app_role)
|
|
16811
16833
|
end
|
|
@@ -16818,9 +16840,21 @@ module SDM
|
|
|
16818
16840
|
if plumbing.vault_awsec_2 != nil
|
|
16819
16841
|
return convert_vault_awsec_2_store_to_porcelain(plumbing.vault_awsec_2)
|
|
16820
16842
|
end
|
|
16843
|
+
if plumbing.vault_awsec_2_cert_ssh != nil
|
|
16844
|
+
return convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing.vault_awsec_2_cert_ssh)
|
|
16845
|
+
end
|
|
16846
|
+
if plumbing.vault_awsec_2_cert_x_509 != nil
|
|
16847
|
+
return convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing.vault_awsec_2_cert_x_509)
|
|
16848
|
+
end
|
|
16821
16849
|
if plumbing.vault_awsiam != nil
|
|
16822
16850
|
return convert_vault_awsiam_store_to_porcelain(plumbing.vault_awsiam)
|
|
16823
16851
|
end
|
|
16852
|
+
if plumbing.vault_awsiam_cert_ssh != nil
|
|
16853
|
+
return convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing.vault_awsiam_cert_ssh)
|
|
16854
|
+
end
|
|
16855
|
+
if plumbing.vault_awsiam_cert_x_509 != nil
|
|
16856
|
+
return convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing.vault_awsiam_cert_x_509)
|
|
16857
|
+
end
|
|
16824
16858
|
if plumbing.vault_tls != nil
|
|
16825
16859
|
return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
|
|
16826
16860
|
end
|
|
@@ -17392,6 +17426,44 @@ module SDM
|
|
|
17392
17426
|
end
|
|
17393
17427
|
items
|
|
17394
17428
|
end
|
|
17429
|
+
def self.convert_strong_vault_store_to_porcelain(plumbing)
|
|
17430
|
+
if plumbing == nil
|
|
17431
|
+
return nil
|
|
17432
|
+
end
|
|
17433
|
+
porcelain = StrongVaultStore.new()
|
|
17434
|
+
porcelain.id = (plumbing.id)
|
|
17435
|
+
porcelain.name = (plumbing.name)
|
|
17436
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
17437
|
+
porcelain
|
|
17438
|
+
end
|
|
17439
|
+
|
|
17440
|
+
def self.convert_strong_vault_store_to_plumbing(porcelain)
|
|
17441
|
+
if porcelain == nil
|
|
17442
|
+
return nil
|
|
17443
|
+
end
|
|
17444
|
+
plumbing = V1::StrongVaultStore.new()
|
|
17445
|
+
plumbing.id = (porcelain.id)
|
|
17446
|
+
plumbing.name = (porcelain.name)
|
|
17447
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
17448
|
+
plumbing
|
|
17449
|
+
end
|
|
17450
|
+
def self.convert_repeated_strong_vault_store_to_plumbing(porcelains)
|
|
17451
|
+
items = Array.new
|
|
17452
|
+
porcelains.each do |porcelain|
|
|
17453
|
+
plumbing = convert_strong_vault_store_to_plumbing(porcelain)
|
|
17454
|
+
items.append(plumbing)
|
|
17455
|
+
end
|
|
17456
|
+
items
|
|
17457
|
+
end
|
|
17458
|
+
|
|
17459
|
+
def self.convert_repeated_strong_vault_store_to_porcelain(plumbings)
|
|
17460
|
+
items = Array.new
|
|
17461
|
+
plumbings.each do |plumbing|
|
|
17462
|
+
porcelain = convert_strong_vault_store_to_porcelain(plumbing)
|
|
17463
|
+
items.append(porcelain)
|
|
17464
|
+
end
|
|
17465
|
+
items
|
|
17466
|
+
end
|
|
17395
17467
|
def self.convert_sybase_to_porcelain(plumbing)
|
|
17396
17468
|
if plumbing == nil
|
|
17397
17469
|
return nil
|
|
@@ -17810,6 +17882,102 @@ module SDM
|
|
|
17810
17882
|
end
|
|
17811
17883
|
items
|
|
17812
17884
|
end
|
|
17885
|
+
def self.convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing)
|
|
17886
|
+
if plumbing == nil
|
|
17887
|
+
return nil
|
|
17888
|
+
end
|
|
17889
|
+
porcelain = VaultAWSEC2CertSSHStore.new()
|
|
17890
|
+
porcelain.id = (plumbing.id)
|
|
17891
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
|
17892
|
+
porcelain.name = (plumbing.name)
|
|
17893
|
+
porcelain.namespace = (plumbing.namespace)
|
|
17894
|
+
porcelain.server_address = (plumbing.server_address)
|
|
17895
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
17896
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
|
17897
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
17898
|
+
porcelain
|
|
17899
|
+
end
|
|
17900
|
+
|
|
17901
|
+
def self.convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
|
|
17902
|
+
if porcelain == nil
|
|
17903
|
+
return nil
|
|
17904
|
+
end
|
|
17905
|
+
plumbing = V1::VaultAWSEC2CertSSHStore.new()
|
|
17906
|
+
plumbing.id = (porcelain.id)
|
|
17907
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
|
17908
|
+
plumbing.name = (porcelain.name)
|
|
17909
|
+
plumbing.namespace = (porcelain.namespace)
|
|
17910
|
+
plumbing.server_address = (porcelain.server_address)
|
|
17911
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
17912
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
|
17913
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
17914
|
+
plumbing
|
|
17915
|
+
end
|
|
17916
|
+
def self.convert_repeated_vault_awsec_2_cert_ssh_store_to_plumbing(porcelains)
|
|
17917
|
+
items = Array.new
|
|
17918
|
+
porcelains.each do |porcelain|
|
|
17919
|
+
plumbing = convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
|
|
17920
|
+
items.append(plumbing)
|
|
17921
|
+
end
|
|
17922
|
+
items
|
|
17923
|
+
end
|
|
17924
|
+
|
|
17925
|
+
def self.convert_repeated_vault_awsec_2_cert_ssh_store_to_porcelain(plumbings)
|
|
17926
|
+
items = Array.new
|
|
17927
|
+
plumbings.each do |plumbing|
|
|
17928
|
+
porcelain = convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing)
|
|
17929
|
+
items.append(porcelain)
|
|
17930
|
+
end
|
|
17931
|
+
items
|
|
17932
|
+
end
|
|
17933
|
+
def self.convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing)
|
|
17934
|
+
if plumbing == nil
|
|
17935
|
+
return nil
|
|
17936
|
+
end
|
|
17937
|
+
porcelain = VaultAWSEC2CertX509Store.new()
|
|
17938
|
+
porcelain.id = (plumbing.id)
|
|
17939
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
|
17940
|
+
porcelain.name = (plumbing.name)
|
|
17941
|
+
porcelain.namespace = (plumbing.namespace)
|
|
17942
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
|
17943
|
+
porcelain.server_address = (plumbing.server_address)
|
|
17944
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
17945
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
17946
|
+
porcelain
|
|
17947
|
+
end
|
|
17948
|
+
|
|
17949
|
+
def self.convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
|
|
17950
|
+
if porcelain == nil
|
|
17951
|
+
return nil
|
|
17952
|
+
end
|
|
17953
|
+
plumbing = V1::VaultAWSEC2CertX509Store.new()
|
|
17954
|
+
plumbing.id = (porcelain.id)
|
|
17955
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
|
17956
|
+
plumbing.name = (porcelain.name)
|
|
17957
|
+
plumbing.namespace = (porcelain.namespace)
|
|
17958
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
|
17959
|
+
plumbing.server_address = (porcelain.server_address)
|
|
17960
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
17961
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
17962
|
+
plumbing
|
|
17963
|
+
end
|
|
17964
|
+
def self.convert_repeated_vault_awsec_2_cert_x_509_store_to_plumbing(porcelains)
|
|
17965
|
+
items = Array.new
|
|
17966
|
+
porcelains.each do |porcelain|
|
|
17967
|
+
plumbing = convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
|
|
17968
|
+
items.append(plumbing)
|
|
17969
|
+
end
|
|
17970
|
+
items
|
|
17971
|
+
end
|
|
17972
|
+
|
|
17973
|
+
def self.convert_repeated_vault_awsec_2_cert_x_509_store_to_porcelain(plumbings)
|
|
17974
|
+
items = Array.new
|
|
17975
|
+
plumbings.each do |plumbing|
|
|
17976
|
+
porcelain = convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing)
|
|
17977
|
+
items.append(porcelain)
|
|
17978
|
+
end
|
|
17979
|
+
items
|
|
17980
|
+
end
|
|
17813
17981
|
def self.convert_vault_awsec_2_store_to_porcelain(plumbing)
|
|
17814
17982
|
if plumbing == nil
|
|
17815
17983
|
return nil
|
|
@@ -17852,6 +18020,102 @@ module SDM
|
|
|
17852
18020
|
end
|
|
17853
18021
|
items
|
|
17854
18022
|
end
|
|
18023
|
+
def self.convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing)
|
|
18024
|
+
if plumbing == nil
|
|
18025
|
+
return nil
|
|
18026
|
+
end
|
|
18027
|
+
porcelain = VaultAWSIAMCertSSHStore.new()
|
|
18028
|
+
porcelain.id = (plumbing.id)
|
|
18029
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
|
18030
|
+
porcelain.name = (plumbing.name)
|
|
18031
|
+
porcelain.namespace = (plumbing.namespace)
|
|
18032
|
+
porcelain.server_address = (plumbing.server_address)
|
|
18033
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
18034
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
|
18035
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
18036
|
+
porcelain
|
|
18037
|
+
end
|
|
18038
|
+
|
|
18039
|
+
def self.convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
|
|
18040
|
+
if porcelain == nil
|
|
18041
|
+
return nil
|
|
18042
|
+
end
|
|
18043
|
+
plumbing = V1::VaultAWSIAMCertSSHStore.new()
|
|
18044
|
+
plumbing.id = (porcelain.id)
|
|
18045
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
|
18046
|
+
plumbing.name = (porcelain.name)
|
|
18047
|
+
plumbing.namespace = (porcelain.namespace)
|
|
18048
|
+
plumbing.server_address = (porcelain.server_address)
|
|
18049
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
18050
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
|
18051
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
18052
|
+
plumbing
|
|
18053
|
+
end
|
|
18054
|
+
def self.convert_repeated_vault_awsiam_cert_ssh_store_to_plumbing(porcelains)
|
|
18055
|
+
items = Array.new
|
|
18056
|
+
porcelains.each do |porcelain|
|
|
18057
|
+
plumbing = convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
|
|
18058
|
+
items.append(plumbing)
|
|
18059
|
+
end
|
|
18060
|
+
items
|
|
18061
|
+
end
|
|
18062
|
+
|
|
18063
|
+
def self.convert_repeated_vault_awsiam_cert_ssh_store_to_porcelain(plumbings)
|
|
18064
|
+
items = Array.new
|
|
18065
|
+
plumbings.each do |plumbing|
|
|
18066
|
+
porcelain = convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing)
|
|
18067
|
+
items.append(porcelain)
|
|
18068
|
+
end
|
|
18069
|
+
items
|
|
18070
|
+
end
|
|
18071
|
+
def self.convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing)
|
|
18072
|
+
if plumbing == nil
|
|
18073
|
+
return nil
|
|
18074
|
+
end
|
|
18075
|
+
porcelain = VaultAWSIAMCertX509Store.new()
|
|
18076
|
+
porcelain.id = (plumbing.id)
|
|
18077
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
|
18078
|
+
porcelain.name = (plumbing.name)
|
|
18079
|
+
porcelain.namespace = (plumbing.namespace)
|
|
18080
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
|
18081
|
+
porcelain.server_address = (plumbing.server_address)
|
|
18082
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
18083
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
18084
|
+
porcelain
|
|
18085
|
+
end
|
|
18086
|
+
|
|
18087
|
+
def self.convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
|
|
18088
|
+
if porcelain == nil
|
|
18089
|
+
return nil
|
|
18090
|
+
end
|
|
18091
|
+
plumbing = V1::VaultAWSIAMCertX509Store.new()
|
|
18092
|
+
plumbing.id = (porcelain.id)
|
|
18093
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
|
18094
|
+
plumbing.name = (porcelain.name)
|
|
18095
|
+
plumbing.namespace = (porcelain.namespace)
|
|
18096
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
|
18097
|
+
plumbing.server_address = (porcelain.server_address)
|
|
18098
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
18099
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
18100
|
+
plumbing
|
|
18101
|
+
end
|
|
18102
|
+
def self.convert_repeated_vault_awsiam_cert_x_509_store_to_plumbing(porcelains)
|
|
18103
|
+
items = Array.new
|
|
18104
|
+
porcelains.each do |porcelain|
|
|
18105
|
+
plumbing = convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
|
|
18106
|
+
items.append(plumbing)
|
|
18107
|
+
end
|
|
18108
|
+
items
|
|
18109
|
+
end
|
|
18110
|
+
|
|
18111
|
+
def self.convert_repeated_vault_awsiam_cert_x_509_store_to_porcelain(plumbings)
|
|
18112
|
+
items = Array.new
|
|
18113
|
+
plumbings.each do |plumbing|
|
|
18114
|
+
porcelain = convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing)
|
|
18115
|
+
items.append(porcelain)
|
|
18116
|
+
end
|
|
18117
|
+
items
|
|
18118
|
+
end
|
|
17855
18119
|
def self.convert_vault_awsiam_store_to_porcelain(plumbing)
|
|
17856
18120
|
if plumbing == nil
|
|
17857
18121
|
return nil
|
|
@@ -36,8 +36,13 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
36
36
|
optional :gcp_cert_x_509, :message, 202, "v1.GCPCertX509Store"
|
|
37
37
|
optional :keyfactor_ssh, :message, 210, "v1.KeyfactorSSHStore"
|
|
38
38
|
optional :keyfactor_x_509, :message, 200, "v1.KeyfactorX509Store"
|
|
39
|
+
optional :strong_vault, :message, 400, "v1.StrongVaultStore"
|
|
39
40
|
optional :vault_awsec_2, :message, 97, "v1.VaultAWSEC2Store"
|
|
41
|
+
optional :vault_awsec_2_cert_ssh, :message, 98, "v1.VaultAWSEC2CertSSHStore"
|
|
42
|
+
optional :vault_awsec_2_cert_x_509, :message, 100, "v1.VaultAWSEC2CertX509Store"
|
|
40
43
|
optional :vault_awsiam, :message, 96, "v1.VaultAWSIAMStore"
|
|
44
|
+
optional :vault_awsiam_cert_ssh, :message, 99, "v1.VaultAWSIAMCertSSHStore"
|
|
45
|
+
optional :vault_awsiam_cert_x_509, :message, 102, "v1.VaultAWSIAMCertX509Store"
|
|
41
46
|
optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
|
|
42
47
|
optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
|
|
43
48
|
optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
|
|
@@ -53,6 +58,8 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
53
58
|
optional :id, :string, 1
|
|
54
59
|
optional :name, :string, 2
|
|
55
60
|
optional :region, :string, 3
|
|
61
|
+
optional :role_arn, :string, 5
|
|
62
|
+
optional :role_external_id, :string, 6
|
|
56
63
|
optional :tags, :message, 4, "v1.Tags"
|
|
57
64
|
end
|
|
58
65
|
add_message "v1.AWSCertX509Store" do
|
|
@@ -146,6 +153,11 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
146
153
|
optional :server_address, :string, 3
|
|
147
154
|
optional :tags, :message, 32771, "v1.Tags"
|
|
148
155
|
end
|
|
156
|
+
add_message "v1.StrongVaultStore" do
|
|
157
|
+
optional :id, :string, 1
|
|
158
|
+
optional :name, :string, 2
|
|
159
|
+
optional :tags, :message, 3, "v1.Tags"
|
|
160
|
+
end
|
|
149
161
|
add_message "v1.VaultAWSEC2Store" do
|
|
150
162
|
optional :id, :string, 1
|
|
151
163
|
optional :name, :string, 2
|
|
@@ -153,6 +165,26 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
153
165
|
optional :server_address, :string, 3
|
|
154
166
|
optional :tags, :message, 8, "v1.Tags"
|
|
155
167
|
end
|
|
168
|
+
add_message "v1.VaultAWSEC2CertSSHStore" do
|
|
169
|
+
optional :id, :string, 1
|
|
170
|
+
optional :name, :string, 2
|
|
171
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
|
172
|
+
optional :namespace, :string, 5
|
|
173
|
+
optional :server_address, :string, 3
|
|
174
|
+
optional :signing_role, :string, 7
|
|
175
|
+
optional :ssh_mount_point, :string, 6
|
|
176
|
+
optional :tags, :message, 4, "v1.Tags"
|
|
177
|
+
end
|
|
178
|
+
add_message "v1.VaultAWSEC2CertX509Store" do
|
|
179
|
+
optional :id, :string, 1
|
|
180
|
+
optional :name, :string, 2
|
|
181
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
|
182
|
+
optional :namespace, :string, 5
|
|
183
|
+
optional :pki_mount_point, :string, 6
|
|
184
|
+
optional :server_address, :string, 3
|
|
185
|
+
optional :signing_role, :string, 7
|
|
186
|
+
optional :tags, :message, 4, "v1.Tags"
|
|
187
|
+
end
|
|
156
188
|
add_message "v1.VaultAWSIAMStore" do
|
|
157
189
|
optional :id, :string, 1
|
|
158
190
|
optional :name, :string, 2
|
|
@@ -160,6 +192,26 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
160
192
|
optional :server_address, :string, 3
|
|
161
193
|
optional :tags, :message, 8, "v1.Tags"
|
|
162
194
|
end
|
|
195
|
+
add_message "v1.VaultAWSIAMCertSSHStore" do
|
|
196
|
+
optional :id, :string, 1
|
|
197
|
+
optional :name, :string, 2
|
|
198
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
|
199
|
+
optional :namespace, :string, 5
|
|
200
|
+
optional :server_address, :string, 3
|
|
201
|
+
optional :signing_role, :string, 7
|
|
202
|
+
optional :ssh_mount_point, :string, 6
|
|
203
|
+
optional :tags, :message, 4, "v1.Tags"
|
|
204
|
+
end
|
|
205
|
+
add_message "v1.VaultAWSIAMCertX509Store" do
|
|
206
|
+
optional :id, :string, 1
|
|
207
|
+
optional :name, :string, 2
|
|
208
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
|
209
|
+
optional :namespace, :string, 5
|
|
210
|
+
optional :pki_mount_point, :string, 6
|
|
211
|
+
optional :server_address, :string, 3
|
|
212
|
+
optional :signing_role, :string, 7
|
|
213
|
+
optional :tags, :message, 4, "v1.Tags"
|
|
214
|
+
end
|
|
163
215
|
add_message "v1.VaultAppRoleStore" do
|
|
164
216
|
optional :id, :string, 1
|
|
165
217
|
optional :name, :string, 2
|
|
@@ -267,8 +319,13 @@ module V1
|
|
|
267
319
|
GCPCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPCertX509Store").msgclass
|
|
268
320
|
KeyfactorSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorSSHStore").msgclass
|
|
269
321
|
KeyfactorX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorX509Store").msgclass
|
|
322
|
+
StrongVaultStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.StrongVaultStore").msgclass
|
|
270
323
|
VaultAWSEC2Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2Store").msgclass
|
|
324
|
+
VaultAWSEC2CertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2CertSSHStore").msgclass
|
|
325
|
+
VaultAWSEC2CertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2CertX509Store").msgclass
|
|
271
326
|
VaultAWSIAMStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMStore").msgclass
|
|
327
|
+
VaultAWSIAMCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMCertSSHStore").msgclass
|
|
328
|
+
VaultAWSIAMCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMCertX509Store").msgclass
|
|
272
329
|
VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
|
|
273
330
|
VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
|
|
274
331
|
VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
|
data/lib/models/porcelain.rb
CHANGED
|
@@ -884,6 +884,10 @@ module SDM
|
|
|
884
884
|
attr_accessor :name
|
|
885
885
|
# The AWS region to target e.g. us-east-1
|
|
886
886
|
attr_accessor :region
|
|
887
|
+
# The role to assume after logging in.
|
|
888
|
+
attr_accessor :role_arn
|
|
889
|
+
# The external ID to associate with assume role requests. Does nothing if a role ARN is not provided.
|
|
890
|
+
attr_accessor :role_external_id
|
|
887
891
|
# Tags is a map of key, value pairs.
|
|
888
892
|
attr_accessor :tags
|
|
889
893
|
|
|
@@ -891,11 +895,15 @@ module SDM
|
|
|
891
895
|
id: nil,
|
|
892
896
|
name: nil,
|
|
893
897
|
region: nil,
|
|
898
|
+
role_arn: nil,
|
|
899
|
+
role_external_id: nil,
|
|
894
900
|
tags: nil
|
|
895
901
|
)
|
|
896
902
|
@id = id == nil ? "" : id
|
|
897
903
|
@name = name == nil ? "" : name
|
|
898
904
|
@region = region == nil ? "" : region
|
|
905
|
+
@role_arn = role_arn == nil ? "" : role_arn
|
|
906
|
+
@role_external_id = role_external_id == nil ? "" : role_external_id
|
|
899
907
|
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
900
908
|
end
|
|
901
909
|
|
|
@@ -15814,6 +15822,34 @@ module SDM
|
|
|
15814
15822
|
end
|
|
15815
15823
|
end
|
|
15816
15824
|
|
|
15825
|
+
# StrongVaultStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
15826
|
+
class StrongVaultStore
|
|
15827
|
+
# Unique identifier of the SecretStore.
|
|
15828
|
+
attr_accessor :id
|
|
15829
|
+
# Unique human-readable name of the SecretStore.
|
|
15830
|
+
attr_accessor :name
|
|
15831
|
+
# Tags is a map of key, value pairs.
|
|
15832
|
+
attr_accessor :tags
|
|
15833
|
+
|
|
15834
|
+
def initialize(
|
|
15835
|
+
id: nil,
|
|
15836
|
+
name: nil,
|
|
15837
|
+
tags: nil
|
|
15838
|
+
)
|
|
15839
|
+
@id = id == nil ? "" : id
|
|
15840
|
+
@name = name == nil ? "" : name
|
|
15841
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
15842
|
+
end
|
|
15843
|
+
|
|
15844
|
+
def to_json(options = {})
|
|
15845
|
+
hash = {}
|
|
15846
|
+
self.instance_variables.each do |var|
|
|
15847
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
15848
|
+
end
|
|
15849
|
+
hash.to_json
|
|
15850
|
+
end
|
|
15851
|
+
end
|
|
15852
|
+
|
|
15817
15853
|
class Sybase
|
|
15818
15854
|
# The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided and may also be set to one of the ResourceIPAllocationMode constants to select between VNM, loopback, or default allocation.
|
|
15819
15855
|
attr_accessor :bind_interface
|
|
@@ -16264,6 +16300,102 @@ module SDM
|
|
|
16264
16300
|
end
|
|
16265
16301
|
end
|
|
16266
16302
|
|
|
16303
|
+
# VaultAWSEC2CertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
16304
|
+
class VaultAWSEC2CertSSHStore
|
|
16305
|
+
# Unique identifier of the SecretStore.
|
|
16306
|
+
attr_accessor :id
|
|
16307
|
+
# The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
|
16308
|
+
attr_accessor :issuedcertttlminutes
|
|
16309
|
+
# Unique human-readable name of the SecretStore.
|
|
16310
|
+
attr_accessor :name
|
|
16311
|
+
# The namespace to make requests within
|
|
16312
|
+
attr_accessor :namespace
|
|
16313
|
+
# The URL of the Vault to target
|
|
16314
|
+
attr_accessor :server_address
|
|
16315
|
+
# The signing role to be used for signing certificates
|
|
16316
|
+
attr_accessor :signing_role
|
|
16317
|
+
# The mount point of the SSH engine configured with the desired CA
|
|
16318
|
+
attr_accessor :ssh_mount_point
|
|
16319
|
+
# Tags is a map of key, value pairs.
|
|
16320
|
+
attr_accessor :tags
|
|
16321
|
+
|
|
16322
|
+
def initialize(
|
|
16323
|
+
id: nil,
|
|
16324
|
+
issuedcertttlminutes: nil,
|
|
16325
|
+
name: nil,
|
|
16326
|
+
namespace: nil,
|
|
16327
|
+
server_address: nil,
|
|
16328
|
+
signing_role: nil,
|
|
16329
|
+
ssh_mount_point: nil,
|
|
16330
|
+
tags: nil
|
|
16331
|
+
)
|
|
16332
|
+
@id = id == nil ? "" : id
|
|
16333
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
|
16334
|
+
@name = name == nil ? "" : name
|
|
16335
|
+
@namespace = namespace == nil ? "" : namespace
|
|
16336
|
+
@server_address = server_address == nil ? "" : server_address
|
|
16337
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
|
16338
|
+
@ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
|
|
16339
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
16340
|
+
end
|
|
16341
|
+
|
|
16342
|
+
def to_json(options = {})
|
|
16343
|
+
hash = {}
|
|
16344
|
+
self.instance_variables.each do |var|
|
|
16345
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
16346
|
+
end
|
|
16347
|
+
hash.to_json
|
|
16348
|
+
end
|
|
16349
|
+
end
|
|
16350
|
+
|
|
16351
|
+
# VaultAWSEC2CertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
16352
|
+
class VaultAWSEC2CertX509Store
|
|
16353
|
+
# Unique identifier of the SecretStore.
|
|
16354
|
+
attr_accessor :id
|
|
16355
|
+
# The lifetime of certificates issued by this CA represented in minutes.
|
|
16356
|
+
attr_accessor :issuedcertttlminutes
|
|
16357
|
+
# Unique human-readable name of the SecretStore.
|
|
16358
|
+
attr_accessor :name
|
|
16359
|
+
# The namespace to make requests within
|
|
16360
|
+
attr_accessor :namespace
|
|
16361
|
+
# The mount point of the PKI engine configured with the desired CA
|
|
16362
|
+
attr_accessor :pki_mount_point
|
|
16363
|
+
# The URL of the Vault to target
|
|
16364
|
+
attr_accessor :server_address
|
|
16365
|
+
# The signing role to be used for signing certificates
|
|
16366
|
+
attr_accessor :signing_role
|
|
16367
|
+
# Tags is a map of key, value pairs.
|
|
16368
|
+
attr_accessor :tags
|
|
16369
|
+
|
|
16370
|
+
def initialize(
|
|
16371
|
+
id: nil,
|
|
16372
|
+
issuedcertttlminutes: nil,
|
|
16373
|
+
name: nil,
|
|
16374
|
+
namespace: nil,
|
|
16375
|
+
pki_mount_point: nil,
|
|
16376
|
+
server_address: nil,
|
|
16377
|
+
signing_role: nil,
|
|
16378
|
+
tags: nil
|
|
16379
|
+
)
|
|
16380
|
+
@id = id == nil ? "" : id
|
|
16381
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
|
16382
|
+
@name = name == nil ? "" : name
|
|
16383
|
+
@namespace = namespace == nil ? "" : namespace
|
|
16384
|
+
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
|
16385
|
+
@server_address = server_address == nil ? "" : server_address
|
|
16386
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
|
16387
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
16388
|
+
end
|
|
16389
|
+
|
|
16390
|
+
def to_json(options = {})
|
|
16391
|
+
hash = {}
|
|
16392
|
+
self.instance_variables.each do |var|
|
|
16393
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
16394
|
+
end
|
|
16395
|
+
hash.to_json
|
|
16396
|
+
end
|
|
16397
|
+
end
|
|
16398
|
+
|
|
16267
16399
|
class VaultAWSEC2Store
|
|
16268
16400
|
# Unique identifier of the SecretStore.
|
|
16269
16401
|
attr_accessor :id
|
|
@@ -16299,6 +16431,102 @@ module SDM
|
|
|
16299
16431
|
end
|
|
16300
16432
|
end
|
|
16301
16433
|
|
|
16434
|
+
# VaultAWSIAMCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
16435
|
+
class VaultAWSIAMCertSSHStore
|
|
16436
|
+
# Unique identifier of the SecretStore.
|
|
16437
|
+
attr_accessor :id
|
|
16438
|
+
# The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
|
16439
|
+
attr_accessor :issuedcertttlminutes
|
|
16440
|
+
# Unique human-readable name of the SecretStore.
|
|
16441
|
+
attr_accessor :name
|
|
16442
|
+
# The namespace to make requests within
|
|
16443
|
+
attr_accessor :namespace
|
|
16444
|
+
# The URL of the Vault to target
|
|
16445
|
+
attr_accessor :server_address
|
|
16446
|
+
# The signing role to be used for signing certificates
|
|
16447
|
+
attr_accessor :signing_role
|
|
16448
|
+
# The mount point of the SSH engine configured with the desired CA
|
|
16449
|
+
attr_accessor :ssh_mount_point
|
|
16450
|
+
# Tags is a map of key, value pairs.
|
|
16451
|
+
attr_accessor :tags
|
|
16452
|
+
|
|
16453
|
+
def initialize(
|
|
16454
|
+
id: nil,
|
|
16455
|
+
issuedcertttlminutes: nil,
|
|
16456
|
+
name: nil,
|
|
16457
|
+
namespace: nil,
|
|
16458
|
+
server_address: nil,
|
|
16459
|
+
signing_role: nil,
|
|
16460
|
+
ssh_mount_point: nil,
|
|
16461
|
+
tags: nil
|
|
16462
|
+
)
|
|
16463
|
+
@id = id == nil ? "" : id
|
|
16464
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
|
16465
|
+
@name = name == nil ? "" : name
|
|
16466
|
+
@namespace = namespace == nil ? "" : namespace
|
|
16467
|
+
@server_address = server_address == nil ? "" : server_address
|
|
16468
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
|
16469
|
+
@ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
|
|
16470
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
16471
|
+
end
|
|
16472
|
+
|
|
16473
|
+
def to_json(options = {})
|
|
16474
|
+
hash = {}
|
|
16475
|
+
self.instance_variables.each do |var|
|
|
16476
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
16477
|
+
end
|
|
16478
|
+
hash.to_json
|
|
16479
|
+
end
|
|
16480
|
+
end
|
|
16481
|
+
|
|
16482
|
+
# VaultAWSIAMCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
16483
|
+
class VaultAWSIAMCertX509Store
|
|
16484
|
+
# Unique identifier of the SecretStore.
|
|
16485
|
+
attr_accessor :id
|
|
16486
|
+
# The lifetime of certificates issued by this CA represented in minutes.
|
|
16487
|
+
attr_accessor :issuedcertttlminutes
|
|
16488
|
+
# Unique human-readable name of the SecretStore.
|
|
16489
|
+
attr_accessor :name
|
|
16490
|
+
# The namespace to make requests within
|
|
16491
|
+
attr_accessor :namespace
|
|
16492
|
+
# The mount point of the PKI engine configured with the desired CA
|
|
16493
|
+
attr_accessor :pki_mount_point
|
|
16494
|
+
# The URL of the Vault to target
|
|
16495
|
+
attr_accessor :server_address
|
|
16496
|
+
# The signing role to be used for signing certificates
|
|
16497
|
+
attr_accessor :signing_role
|
|
16498
|
+
# Tags is a map of key, value pairs.
|
|
16499
|
+
attr_accessor :tags
|
|
16500
|
+
|
|
16501
|
+
def initialize(
|
|
16502
|
+
id: nil,
|
|
16503
|
+
issuedcertttlminutes: nil,
|
|
16504
|
+
name: nil,
|
|
16505
|
+
namespace: nil,
|
|
16506
|
+
pki_mount_point: nil,
|
|
16507
|
+
server_address: nil,
|
|
16508
|
+
signing_role: nil,
|
|
16509
|
+
tags: nil
|
|
16510
|
+
)
|
|
16511
|
+
@id = id == nil ? "" : id
|
|
16512
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
|
16513
|
+
@name = name == nil ? "" : name
|
|
16514
|
+
@namespace = namespace == nil ? "" : namespace
|
|
16515
|
+
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
|
16516
|
+
@server_address = server_address == nil ? "" : server_address
|
|
16517
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
|
16518
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
16519
|
+
end
|
|
16520
|
+
|
|
16521
|
+
def to_json(options = {})
|
|
16522
|
+
hash = {}
|
|
16523
|
+
self.instance_variables.each do |var|
|
|
16524
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
16525
|
+
end
|
|
16526
|
+
hash.to_json
|
|
16527
|
+
end
|
|
16528
|
+
end
|
|
16529
|
+
|
|
16302
16530
|
class VaultAWSIAMStore
|
|
16303
16531
|
# Unique identifier of the SecretStore.
|
|
16304
16532
|
attr_accessor :id
|
data/lib/strongdm.rb
CHANGED
|
@@ -30,7 +30,7 @@ module SDM #:nodoc:
|
|
|
30
30
|
DEFAULT_RETRY_FACTOR = 1.6
|
|
31
31
|
DEFAULT_RETRY_JITTER = 0.2
|
|
32
32
|
API_VERSION = "2025-04-14"
|
|
33
|
-
USER_AGENT = "strongdm-sdk-ruby/15.
|
|
33
|
+
USER_AGENT = "strongdm-sdk-ruby/15.25.0"
|
|
34
34
|
private_constant :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :DEFAULT_RETRY_FACTOR, :DEFAULT_RETRY_JITTER, :API_VERSION, :USER_AGENT
|
|
35
35
|
|
|
36
36
|
# Creates a new strongDM API client.
|
data/lib/svc.rb
CHANGED
|
@@ -6642,11 +6642,16 @@ module SDM #:nodoc:
|
|
|
6642
6642
|
# {GCPCertX509Store}
|
|
6643
6643
|
# {KeyfactorSSHStore}
|
|
6644
6644
|
# {KeyfactorX509Store}
|
|
6645
|
+
# {StrongVaultStore}
|
|
6645
6646
|
# {VaultAppRoleStore}
|
|
6646
6647
|
# {VaultAppRoleCertSSHStore}
|
|
6647
6648
|
# {VaultAppRoleCertX509Store}
|
|
6648
6649
|
# {VaultAWSEC2Store}
|
|
6650
|
+
# {VaultAWSEC2CertSSHStore}
|
|
6651
|
+
# {VaultAWSEC2CertX509Store}
|
|
6649
6652
|
# {VaultAWSIAMStore}
|
|
6653
|
+
# {VaultAWSIAMCertSSHStore}
|
|
6654
|
+
# {VaultAWSIAMCertX509Store}
|
|
6650
6655
|
# {VaultTLSStore}
|
|
6651
6656
|
# {VaultTLSCertSSHStore}
|
|
6652
6657
|
# {VaultTLSCertX509Store}
|
data/lib/version
CHANGED
data/lib/version.rb
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: strongdm
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 15.
|
|
4
|
+
version: 15.25.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- strongDM Team
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2025-10-
|
|
11
|
+
date: 2025-10-20 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: grpc
|
|
@@ -81,8 +81,8 @@ files:
|
|
|
81
81
|
- "./.git/logs/HEAD"
|
|
82
82
|
- "./.git/logs/refs/heads/master"
|
|
83
83
|
- "./.git/logs/refs/remotes/origin/HEAD"
|
|
84
|
-
- "./.git/objects/pack/pack-
|
|
85
|
-
- "./.git/objects/pack/pack-
|
|
84
|
+
- "./.git/objects/pack/pack-e9a6bf671b19a0423972e795cd3ba2b74e58d27d.idx"
|
|
85
|
+
- "./.git/objects/pack/pack-e9a6bf671b19a0423972e795cd3ba2b74e58d27d.pack"
|
|
86
86
|
- "./.git/packed-refs"
|
|
87
87
|
- "./.git/refs/heads/master"
|
|
88
88
|
- "./.git/refs/remotes/origin/HEAD"
|