strongdm 15.22.0 → 15.25.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: aa8fc9ea08bf2b9ca6e753658fbaf88c28e9c501dbdcd8e91bbaf901133912e4
4
- data.tar.gz: 72a2b523cb8a1fe63c3c33b3c1fd39b4a8f259f260be8c6a2ceba34ffb333414
3
+ metadata.gz: 1b3ee8403b96900984ff1b6a5b5e80bef413d633a538ebd5db04af7cc84d0ea9
4
+ data.tar.gz: c00dccaa63df6126e060fcfe5ff74678567cadb82d323375748b51fd2290bfb5
5
5
  SHA512:
6
- metadata.gz: 70ce82e399099e5d9d2075d9c56250c1acc200fdb418ceceec6a2aeaeaca1a37c02589250397a4b067a749a5cb65357e7881f9759e8f837a3906c707f26098f1
7
- data.tar.gz: ac0ed67c94900e5c10cb30a684257303960bbc3094352a3c8fe95bd8c9cb0ace169730003d5c4a96c54f8dd847eb599607005fb9de8a6ee0fcefd4e4e4c8a0e8
6
+ metadata.gz: 58126539def4f8328fceed2e0587f77ed1f1617f55284ec8ab7f5cae44cfebc7550c24afc663dcb0605a6da41a9c052d52092647fd59f5b21779e0c0e67ed243
7
+ data.tar.gz: ae3295116b34c358c16bd6b983358002d89d2942088ead582d1a837cdc90b07126c1ee089907394a5359da536f49abf0ca852d6a742aa9151dcf19b2f622c627
data/.git/ORIG_HEAD CHANGED
@@ -1 +1 @@
1
- 229557ff8902458028f43d084b6fdff298486d99
1
+ 1fb12400f09101921542776d3887b93103dd9c5f
data/.git/index CHANGED
Binary file
data/.git/logs/HEAD CHANGED
@@ -1,3 +1,3 @@
1
- 0000000000000000000000000000000000000000 229557ff8902458028f43d084b6fdff298486d99 root <root@999b4da96dac.(none)> 1760346076 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- 229557ff8902458028f43d084b6fdff298486d99 229557ff8902458028f43d084b6fdff298486d99 root <root@999b4da96dac.(none)> 1760346076 +0000 checkout: moving from master to master
3
- 229557ff8902458028f43d084b6fdff298486d99 dbc1e295841d51376c44f987d9eecf5c8427c478 root <root@999b4da96dac.(none)> 1760346076 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 1fb12400f09101921542776d3887b93103dd9c5f root <root@02efd9f1f92d.(none)> 1760946048 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 1fb12400f09101921542776d3887b93103dd9c5f 1fb12400f09101921542776d3887b93103dd9c5f root <root@02efd9f1f92d.(none)> 1760946048 +0000 checkout: moving from master to master
3
+ 1fb12400f09101921542776d3887b93103dd9c5f a4fd017725511cf32effc6426ca74b714644d37d root <root@02efd9f1f92d.(none)> 1760946048 +0000 merge origin/development: Fast-forward
@@ -1,2 +1,2 @@
1
- 0000000000000000000000000000000000000000 229557ff8902458028f43d084b6fdff298486d99 root <root@999b4da96dac.(none)> 1760346076 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- 229557ff8902458028f43d084b6fdff298486d99 dbc1e295841d51376c44f987d9eecf5c8427c478 root <root@999b4da96dac.(none)> 1760346076 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 1fb12400f09101921542776d3887b93103dd9c5f root <root@02efd9f1f92d.(none)> 1760946048 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 1fb12400f09101921542776d3887b93103dd9c5f a4fd017725511cf32effc6426ca74b714644d37d root <root@02efd9f1f92d.(none)> 1760946048 +0000 merge origin/development: Fast-forward
@@ -1 +1 @@
1
- 0000000000000000000000000000000000000000 229557ff8902458028f43d084b6fdff298486d99 root <root@999b4da96dac.(none)> 1760346076 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
1
+ 0000000000000000000000000000000000000000 1fb12400f09101921542776d3887b93103dd9c5f root <root@02efd9f1f92d.(none)> 1760946048 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
data/.git/packed-refs CHANGED
@@ -1,6 +1,6 @@
1
1
  # pack-refs with: peeled fully-peeled sorted
2
- dbc1e295841d51376c44f987d9eecf5c8427c478 refs/remotes/origin/development
3
- 229557ff8902458028f43d084b6fdff298486d99 refs/remotes/origin/master
2
+ a4fd017725511cf32effc6426ca74b714644d37d refs/remotes/origin/development
3
+ 1fb12400f09101921542776d3887b93103dd9c5f refs/remotes/origin/master
4
4
  2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
5
5
  04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
6
6
  6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
@@ -113,6 +113,8 @@ ac9b86121b9542f28b614f897f7a61f34363410b refs/tags/v15.10.0
113
113
  95ca84ab082b3f19fa3b0d1799ac55e4beebea64 refs/tags/v15.2.0
114
114
  7cf936aad61c58434bf735f826e7cfcf71b9ce8a refs/tags/v15.20.0
115
115
  229557ff8902458028f43d084b6fdff298486d99 refs/tags/v15.21.0
116
+ dbc1e295841d51376c44f987d9eecf5c8427c478 refs/tags/v15.22.0
117
+ 1fb12400f09101921542776d3887b93103dd9c5f refs/tags/v15.23.0
116
118
  cf3b15b82cb0c4229609c07c870c6cb4fd38ef75 refs/tags/v15.4.0
117
119
  0be2c5e7f7a90c49077548cb3a9bce234219b9f0 refs/tags/v15.5.0
118
120
  4b9cd43c5dda3f369b82b6a56132a5470ff9ff53 refs/tags/v15.6.0
@@ -1 +1 @@
1
- dbc1e295841d51376c44f987d9eecf5c8427c478
1
+ a4fd017725511cf32effc6426ca74b714644d37d
data/lib/grpc/plumbing.rb CHANGED
@@ -927,6 +927,8 @@ module SDM
927
927
  porcelain.id = (plumbing.id)
928
928
  porcelain.name = (plumbing.name)
929
929
  porcelain.region = (plumbing.region)
930
+ porcelain.role_arn = (plumbing.role_arn)
931
+ porcelain.role_external_id = (plumbing.role_external_id)
930
932
  porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
931
933
  porcelain
932
934
  end
@@ -939,6 +941,8 @@ module SDM
939
941
  plumbing.id = (porcelain.id)
940
942
  plumbing.name = (porcelain.name)
941
943
  plumbing.region = (porcelain.region)
944
+ plumbing.role_arn = (porcelain.role_arn)
945
+ plumbing.role_external_id = (porcelain.role_external_id)
942
946
  plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
943
947
  plumbing
944
948
  end
@@ -16730,6 +16734,9 @@ module SDM
16730
16734
  if porcelain.instance_of? KeyfactorX509Store
16731
16735
  plumbing.keyfactor_x_509 = convert_keyfactor_x_509_store_to_plumbing(porcelain)
16732
16736
  end
16737
+ if porcelain.instance_of? StrongVaultStore
16738
+ plumbing.strong_vault = convert_strong_vault_store_to_plumbing(porcelain)
16739
+ end
16733
16740
  if porcelain.instance_of? VaultAppRoleStore
16734
16741
  plumbing.vault_app_role = convert_vault_app_role_store_to_plumbing(porcelain)
16735
16742
  end
@@ -16742,9 +16749,21 @@ module SDM
16742
16749
  if porcelain.instance_of? VaultAWSEC2Store
16743
16750
  plumbing.vault_awsec_2 = convert_vault_awsec_2_store_to_plumbing(porcelain)
16744
16751
  end
16752
+ if porcelain.instance_of? VaultAWSEC2CertSSHStore
16753
+ plumbing.vault_awsec_2_cert_ssh = convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
16754
+ end
16755
+ if porcelain.instance_of? VaultAWSEC2CertX509Store
16756
+ plumbing.vault_awsec_2_cert_x_509 = convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
16757
+ end
16745
16758
  if porcelain.instance_of? VaultAWSIAMStore
16746
16759
  plumbing.vault_awsiam = convert_vault_awsiam_store_to_plumbing(porcelain)
16747
16760
  end
16761
+ if porcelain.instance_of? VaultAWSIAMCertSSHStore
16762
+ plumbing.vault_awsiam_cert_ssh = convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
16763
+ end
16764
+ if porcelain.instance_of? VaultAWSIAMCertX509Store
16765
+ plumbing.vault_awsiam_cert_x_509 = convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
16766
+ end
16748
16767
  if porcelain.instance_of? VaultTLSStore
16749
16768
  plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
16750
16769
  end
@@ -16806,6 +16825,9 @@ module SDM
16806
16825
  if plumbing.keyfactor_x_509 != nil
16807
16826
  return convert_keyfactor_x_509_store_to_porcelain(plumbing.keyfactor_x_509)
16808
16827
  end
16828
+ if plumbing.strong_vault != nil
16829
+ return convert_strong_vault_store_to_porcelain(plumbing.strong_vault)
16830
+ end
16809
16831
  if plumbing.vault_app_role != nil
16810
16832
  return convert_vault_app_role_store_to_porcelain(plumbing.vault_app_role)
16811
16833
  end
@@ -16818,9 +16840,21 @@ module SDM
16818
16840
  if plumbing.vault_awsec_2 != nil
16819
16841
  return convert_vault_awsec_2_store_to_porcelain(plumbing.vault_awsec_2)
16820
16842
  end
16843
+ if plumbing.vault_awsec_2_cert_ssh != nil
16844
+ return convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing.vault_awsec_2_cert_ssh)
16845
+ end
16846
+ if plumbing.vault_awsec_2_cert_x_509 != nil
16847
+ return convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing.vault_awsec_2_cert_x_509)
16848
+ end
16821
16849
  if plumbing.vault_awsiam != nil
16822
16850
  return convert_vault_awsiam_store_to_porcelain(plumbing.vault_awsiam)
16823
16851
  end
16852
+ if plumbing.vault_awsiam_cert_ssh != nil
16853
+ return convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing.vault_awsiam_cert_ssh)
16854
+ end
16855
+ if plumbing.vault_awsiam_cert_x_509 != nil
16856
+ return convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing.vault_awsiam_cert_x_509)
16857
+ end
16824
16858
  if plumbing.vault_tls != nil
16825
16859
  return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
16826
16860
  end
@@ -17392,6 +17426,44 @@ module SDM
17392
17426
  end
17393
17427
  items
17394
17428
  end
17429
+ def self.convert_strong_vault_store_to_porcelain(plumbing)
17430
+ if plumbing == nil
17431
+ return nil
17432
+ end
17433
+ porcelain = StrongVaultStore.new()
17434
+ porcelain.id = (plumbing.id)
17435
+ porcelain.name = (plumbing.name)
17436
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
17437
+ porcelain
17438
+ end
17439
+
17440
+ def self.convert_strong_vault_store_to_plumbing(porcelain)
17441
+ if porcelain == nil
17442
+ return nil
17443
+ end
17444
+ plumbing = V1::StrongVaultStore.new()
17445
+ plumbing.id = (porcelain.id)
17446
+ plumbing.name = (porcelain.name)
17447
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
17448
+ plumbing
17449
+ end
17450
+ def self.convert_repeated_strong_vault_store_to_plumbing(porcelains)
17451
+ items = Array.new
17452
+ porcelains.each do |porcelain|
17453
+ plumbing = convert_strong_vault_store_to_plumbing(porcelain)
17454
+ items.append(plumbing)
17455
+ end
17456
+ items
17457
+ end
17458
+
17459
+ def self.convert_repeated_strong_vault_store_to_porcelain(plumbings)
17460
+ items = Array.new
17461
+ plumbings.each do |plumbing|
17462
+ porcelain = convert_strong_vault_store_to_porcelain(plumbing)
17463
+ items.append(porcelain)
17464
+ end
17465
+ items
17466
+ end
17395
17467
  def self.convert_sybase_to_porcelain(plumbing)
17396
17468
  if plumbing == nil
17397
17469
  return nil
@@ -17810,6 +17882,102 @@ module SDM
17810
17882
  end
17811
17883
  items
17812
17884
  end
17885
+ def self.convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing)
17886
+ if plumbing == nil
17887
+ return nil
17888
+ end
17889
+ porcelain = VaultAWSEC2CertSSHStore.new()
17890
+ porcelain.id = (plumbing.id)
17891
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
17892
+ porcelain.name = (plumbing.name)
17893
+ porcelain.namespace = (plumbing.namespace)
17894
+ porcelain.server_address = (plumbing.server_address)
17895
+ porcelain.signing_role = (plumbing.signing_role)
17896
+ porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
17897
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
17898
+ porcelain
17899
+ end
17900
+
17901
+ def self.convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
17902
+ if porcelain == nil
17903
+ return nil
17904
+ end
17905
+ plumbing = V1::VaultAWSEC2CertSSHStore.new()
17906
+ plumbing.id = (porcelain.id)
17907
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
17908
+ plumbing.name = (porcelain.name)
17909
+ plumbing.namespace = (porcelain.namespace)
17910
+ plumbing.server_address = (porcelain.server_address)
17911
+ plumbing.signing_role = (porcelain.signing_role)
17912
+ plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
17913
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
17914
+ plumbing
17915
+ end
17916
+ def self.convert_repeated_vault_awsec_2_cert_ssh_store_to_plumbing(porcelains)
17917
+ items = Array.new
17918
+ porcelains.each do |porcelain|
17919
+ plumbing = convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
17920
+ items.append(plumbing)
17921
+ end
17922
+ items
17923
+ end
17924
+
17925
+ def self.convert_repeated_vault_awsec_2_cert_ssh_store_to_porcelain(plumbings)
17926
+ items = Array.new
17927
+ plumbings.each do |plumbing|
17928
+ porcelain = convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing)
17929
+ items.append(porcelain)
17930
+ end
17931
+ items
17932
+ end
17933
+ def self.convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing)
17934
+ if plumbing == nil
17935
+ return nil
17936
+ end
17937
+ porcelain = VaultAWSEC2CertX509Store.new()
17938
+ porcelain.id = (plumbing.id)
17939
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
17940
+ porcelain.name = (plumbing.name)
17941
+ porcelain.namespace = (plumbing.namespace)
17942
+ porcelain.pki_mount_point = (plumbing.pki_mount_point)
17943
+ porcelain.server_address = (plumbing.server_address)
17944
+ porcelain.signing_role = (plumbing.signing_role)
17945
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
17946
+ porcelain
17947
+ end
17948
+
17949
+ def self.convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
17950
+ if porcelain == nil
17951
+ return nil
17952
+ end
17953
+ plumbing = V1::VaultAWSEC2CertX509Store.new()
17954
+ plumbing.id = (porcelain.id)
17955
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
17956
+ plumbing.name = (porcelain.name)
17957
+ plumbing.namespace = (porcelain.namespace)
17958
+ plumbing.pki_mount_point = (porcelain.pki_mount_point)
17959
+ plumbing.server_address = (porcelain.server_address)
17960
+ plumbing.signing_role = (porcelain.signing_role)
17961
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
17962
+ plumbing
17963
+ end
17964
+ def self.convert_repeated_vault_awsec_2_cert_x_509_store_to_plumbing(porcelains)
17965
+ items = Array.new
17966
+ porcelains.each do |porcelain|
17967
+ plumbing = convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
17968
+ items.append(plumbing)
17969
+ end
17970
+ items
17971
+ end
17972
+
17973
+ def self.convert_repeated_vault_awsec_2_cert_x_509_store_to_porcelain(plumbings)
17974
+ items = Array.new
17975
+ plumbings.each do |plumbing|
17976
+ porcelain = convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing)
17977
+ items.append(porcelain)
17978
+ end
17979
+ items
17980
+ end
17813
17981
  def self.convert_vault_awsec_2_store_to_porcelain(plumbing)
17814
17982
  if plumbing == nil
17815
17983
  return nil
@@ -17852,6 +18020,102 @@ module SDM
17852
18020
  end
17853
18021
  items
17854
18022
  end
18023
+ def self.convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing)
18024
+ if plumbing == nil
18025
+ return nil
18026
+ end
18027
+ porcelain = VaultAWSIAMCertSSHStore.new()
18028
+ porcelain.id = (plumbing.id)
18029
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
18030
+ porcelain.name = (plumbing.name)
18031
+ porcelain.namespace = (plumbing.namespace)
18032
+ porcelain.server_address = (plumbing.server_address)
18033
+ porcelain.signing_role = (plumbing.signing_role)
18034
+ porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
18035
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
18036
+ porcelain
18037
+ end
18038
+
18039
+ def self.convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
18040
+ if porcelain == nil
18041
+ return nil
18042
+ end
18043
+ plumbing = V1::VaultAWSIAMCertSSHStore.new()
18044
+ plumbing.id = (porcelain.id)
18045
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
18046
+ plumbing.name = (porcelain.name)
18047
+ plumbing.namespace = (porcelain.namespace)
18048
+ plumbing.server_address = (porcelain.server_address)
18049
+ plumbing.signing_role = (porcelain.signing_role)
18050
+ plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
18051
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
18052
+ plumbing
18053
+ end
18054
+ def self.convert_repeated_vault_awsiam_cert_ssh_store_to_plumbing(porcelains)
18055
+ items = Array.new
18056
+ porcelains.each do |porcelain|
18057
+ plumbing = convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
18058
+ items.append(plumbing)
18059
+ end
18060
+ items
18061
+ end
18062
+
18063
+ def self.convert_repeated_vault_awsiam_cert_ssh_store_to_porcelain(plumbings)
18064
+ items = Array.new
18065
+ plumbings.each do |plumbing|
18066
+ porcelain = convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing)
18067
+ items.append(porcelain)
18068
+ end
18069
+ items
18070
+ end
18071
+ def self.convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing)
18072
+ if plumbing == nil
18073
+ return nil
18074
+ end
18075
+ porcelain = VaultAWSIAMCertX509Store.new()
18076
+ porcelain.id = (plumbing.id)
18077
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
18078
+ porcelain.name = (plumbing.name)
18079
+ porcelain.namespace = (plumbing.namespace)
18080
+ porcelain.pki_mount_point = (plumbing.pki_mount_point)
18081
+ porcelain.server_address = (plumbing.server_address)
18082
+ porcelain.signing_role = (plumbing.signing_role)
18083
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
18084
+ porcelain
18085
+ end
18086
+
18087
+ def self.convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
18088
+ if porcelain == nil
18089
+ return nil
18090
+ end
18091
+ plumbing = V1::VaultAWSIAMCertX509Store.new()
18092
+ plumbing.id = (porcelain.id)
18093
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
18094
+ plumbing.name = (porcelain.name)
18095
+ plumbing.namespace = (porcelain.namespace)
18096
+ plumbing.pki_mount_point = (porcelain.pki_mount_point)
18097
+ plumbing.server_address = (porcelain.server_address)
18098
+ plumbing.signing_role = (porcelain.signing_role)
18099
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
18100
+ plumbing
18101
+ end
18102
+ def self.convert_repeated_vault_awsiam_cert_x_509_store_to_plumbing(porcelains)
18103
+ items = Array.new
18104
+ porcelains.each do |porcelain|
18105
+ plumbing = convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
18106
+ items.append(plumbing)
18107
+ end
18108
+ items
18109
+ end
18110
+
18111
+ def self.convert_repeated_vault_awsiam_cert_x_509_store_to_porcelain(plumbings)
18112
+ items = Array.new
18113
+ plumbings.each do |plumbing|
18114
+ porcelain = convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing)
18115
+ items.append(porcelain)
18116
+ end
18117
+ items
18118
+ end
17855
18119
  def self.convert_vault_awsiam_store_to_porcelain(plumbing)
17856
18120
  if plumbing == nil
17857
18121
  return nil
@@ -36,8 +36,13 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
36
36
  optional :gcp_cert_x_509, :message, 202, "v1.GCPCertX509Store"
37
37
  optional :keyfactor_ssh, :message, 210, "v1.KeyfactorSSHStore"
38
38
  optional :keyfactor_x_509, :message, 200, "v1.KeyfactorX509Store"
39
+ optional :strong_vault, :message, 400, "v1.StrongVaultStore"
39
40
  optional :vault_awsec_2, :message, 97, "v1.VaultAWSEC2Store"
41
+ optional :vault_awsec_2_cert_ssh, :message, 98, "v1.VaultAWSEC2CertSSHStore"
42
+ optional :vault_awsec_2_cert_x_509, :message, 100, "v1.VaultAWSEC2CertX509Store"
40
43
  optional :vault_awsiam, :message, 96, "v1.VaultAWSIAMStore"
44
+ optional :vault_awsiam_cert_ssh, :message, 99, "v1.VaultAWSIAMCertSSHStore"
45
+ optional :vault_awsiam_cert_x_509, :message, 102, "v1.VaultAWSIAMCertX509Store"
41
46
  optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
42
47
  optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
43
48
  optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
@@ -53,6 +58,8 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
53
58
  optional :id, :string, 1
54
59
  optional :name, :string, 2
55
60
  optional :region, :string, 3
61
+ optional :role_arn, :string, 5
62
+ optional :role_external_id, :string, 6
56
63
  optional :tags, :message, 4, "v1.Tags"
57
64
  end
58
65
  add_message "v1.AWSCertX509Store" do
@@ -146,6 +153,11 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
146
153
  optional :server_address, :string, 3
147
154
  optional :tags, :message, 32771, "v1.Tags"
148
155
  end
156
+ add_message "v1.StrongVaultStore" do
157
+ optional :id, :string, 1
158
+ optional :name, :string, 2
159
+ optional :tags, :message, 3, "v1.Tags"
160
+ end
149
161
  add_message "v1.VaultAWSEC2Store" do
150
162
  optional :id, :string, 1
151
163
  optional :name, :string, 2
@@ -153,6 +165,26 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
153
165
  optional :server_address, :string, 3
154
166
  optional :tags, :message, 8, "v1.Tags"
155
167
  end
168
+ add_message "v1.VaultAWSEC2CertSSHStore" do
169
+ optional :id, :string, 1
170
+ optional :name, :string, 2
171
+ optional :issuedCertTTLMinutes, :int32, 9
172
+ optional :namespace, :string, 5
173
+ optional :server_address, :string, 3
174
+ optional :signing_role, :string, 7
175
+ optional :ssh_mount_point, :string, 6
176
+ optional :tags, :message, 4, "v1.Tags"
177
+ end
178
+ add_message "v1.VaultAWSEC2CertX509Store" do
179
+ optional :id, :string, 1
180
+ optional :name, :string, 2
181
+ optional :issuedCertTTLMinutes, :int32, 9
182
+ optional :namespace, :string, 5
183
+ optional :pki_mount_point, :string, 6
184
+ optional :server_address, :string, 3
185
+ optional :signing_role, :string, 7
186
+ optional :tags, :message, 4, "v1.Tags"
187
+ end
156
188
  add_message "v1.VaultAWSIAMStore" do
157
189
  optional :id, :string, 1
158
190
  optional :name, :string, 2
@@ -160,6 +192,26 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
160
192
  optional :server_address, :string, 3
161
193
  optional :tags, :message, 8, "v1.Tags"
162
194
  end
195
+ add_message "v1.VaultAWSIAMCertSSHStore" do
196
+ optional :id, :string, 1
197
+ optional :name, :string, 2
198
+ optional :issuedCertTTLMinutes, :int32, 9
199
+ optional :namespace, :string, 5
200
+ optional :server_address, :string, 3
201
+ optional :signing_role, :string, 7
202
+ optional :ssh_mount_point, :string, 6
203
+ optional :tags, :message, 4, "v1.Tags"
204
+ end
205
+ add_message "v1.VaultAWSIAMCertX509Store" do
206
+ optional :id, :string, 1
207
+ optional :name, :string, 2
208
+ optional :issuedCertTTLMinutes, :int32, 9
209
+ optional :namespace, :string, 5
210
+ optional :pki_mount_point, :string, 6
211
+ optional :server_address, :string, 3
212
+ optional :signing_role, :string, 7
213
+ optional :tags, :message, 4, "v1.Tags"
214
+ end
163
215
  add_message "v1.VaultAppRoleStore" do
164
216
  optional :id, :string, 1
165
217
  optional :name, :string, 2
@@ -267,8 +319,13 @@ module V1
267
319
  GCPCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPCertX509Store").msgclass
268
320
  KeyfactorSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorSSHStore").msgclass
269
321
  KeyfactorX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorX509Store").msgclass
322
+ StrongVaultStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.StrongVaultStore").msgclass
270
323
  VaultAWSEC2Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2Store").msgclass
324
+ VaultAWSEC2CertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2CertSSHStore").msgclass
325
+ VaultAWSEC2CertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2CertX509Store").msgclass
271
326
  VaultAWSIAMStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMStore").msgclass
327
+ VaultAWSIAMCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMCertSSHStore").msgclass
328
+ VaultAWSIAMCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMCertX509Store").msgclass
272
329
  VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
273
330
  VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
274
331
  VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
@@ -884,6 +884,10 @@ module SDM
884
884
  attr_accessor :name
885
885
  # The AWS region to target e.g. us-east-1
886
886
  attr_accessor :region
887
+ # The role to assume after logging in.
888
+ attr_accessor :role_arn
889
+ # The external ID to associate with assume role requests. Does nothing if a role ARN is not provided.
890
+ attr_accessor :role_external_id
887
891
  # Tags is a map of key, value pairs.
888
892
  attr_accessor :tags
889
893
 
@@ -891,11 +895,15 @@ module SDM
891
895
  id: nil,
892
896
  name: nil,
893
897
  region: nil,
898
+ role_arn: nil,
899
+ role_external_id: nil,
894
900
  tags: nil
895
901
  )
896
902
  @id = id == nil ? "" : id
897
903
  @name = name == nil ? "" : name
898
904
  @region = region == nil ? "" : region
905
+ @role_arn = role_arn == nil ? "" : role_arn
906
+ @role_external_id = role_external_id == nil ? "" : role_external_id
899
907
  @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
900
908
  end
901
909
 
@@ -15814,6 +15822,34 @@ module SDM
15814
15822
  end
15815
15823
  end
15816
15824
 
15825
+ # StrongVaultStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
15826
+ class StrongVaultStore
15827
+ # Unique identifier of the SecretStore.
15828
+ attr_accessor :id
15829
+ # Unique human-readable name of the SecretStore.
15830
+ attr_accessor :name
15831
+ # Tags is a map of key, value pairs.
15832
+ attr_accessor :tags
15833
+
15834
+ def initialize(
15835
+ id: nil,
15836
+ name: nil,
15837
+ tags: nil
15838
+ )
15839
+ @id = id == nil ? "" : id
15840
+ @name = name == nil ? "" : name
15841
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
15842
+ end
15843
+
15844
+ def to_json(options = {})
15845
+ hash = {}
15846
+ self.instance_variables.each do |var|
15847
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
15848
+ end
15849
+ hash.to_json
15850
+ end
15851
+ end
15852
+
15817
15853
  class Sybase
15818
15854
  # The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided and may also be set to one of the ResourceIPAllocationMode constants to select between VNM, loopback, or default allocation.
15819
15855
  attr_accessor :bind_interface
@@ -16264,6 +16300,102 @@ module SDM
16264
16300
  end
16265
16301
  end
16266
16302
 
16303
+ # VaultAWSEC2CertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
16304
+ class VaultAWSEC2CertSSHStore
16305
+ # Unique identifier of the SecretStore.
16306
+ attr_accessor :id
16307
+ # The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
16308
+ attr_accessor :issuedcertttlminutes
16309
+ # Unique human-readable name of the SecretStore.
16310
+ attr_accessor :name
16311
+ # The namespace to make requests within
16312
+ attr_accessor :namespace
16313
+ # The URL of the Vault to target
16314
+ attr_accessor :server_address
16315
+ # The signing role to be used for signing certificates
16316
+ attr_accessor :signing_role
16317
+ # The mount point of the SSH engine configured with the desired CA
16318
+ attr_accessor :ssh_mount_point
16319
+ # Tags is a map of key, value pairs.
16320
+ attr_accessor :tags
16321
+
16322
+ def initialize(
16323
+ id: nil,
16324
+ issuedcertttlminutes: nil,
16325
+ name: nil,
16326
+ namespace: nil,
16327
+ server_address: nil,
16328
+ signing_role: nil,
16329
+ ssh_mount_point: nil,
16330
+ tags: nil
16331
+ )
16332
+ @id = id == nil ? "" : id
16333
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
16334
+ @name = name == nil ? "" : name
16335
+ @namespace = namespace == nil ? "" : namespace
16336
+ @server_address = server_address == nil ? "" : server_address
16337
+ @signing_role = signing_role == nil ? "" : signing_role
16338
+ @ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
16339
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
16340
+ end
16341
+
16342
+ def to_json(options = {})
16343
+ hash = {}
16344
+ self.instance_variables.each do |var|
16345
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
16346
+ end
16347
+ hash.to_json
16348
+ end
16349
+ end
16350
+
16351
+ # VaultAWSEC2CertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
16352
+ class VaultAWSEC2CertX509Store
16353
+ # Unique identifier of the SecretStore.
16354
+ attr_accessor :id
16355
+ # The lifetime of certificates issued by this CA represented in minutes.
16356
+ attr_accessor :issuedcertttlminutes
16357
+ # Unique human-readable name of the SecretStore.
16358
+ attr_accessor :name
16359
+ # The namespace to make requests within
16360
+ attr_accessor :namespace
16361
+ # The mount point of the PKI engine configured with the desired CA
16362
+ attr_accessor :pki_mount_point
16363
+ # The URL of the Vault to target
16364
+ attr_accessor :server_address
16365
+ # The signing role to be used for signing certificates
16366
+ attr_accessor :signing_role
16367
+ # Tags is a map of key, value pairs.
16368
+ attr_accessor :tags
16369
+
16370
+ def initialize(
16371
+ id: nil,
16372
+ issuedcertttlminutes: nil,
16373
+ name: nil,
16374
+ namespace: nil,
16375
+ pki_mount_point: nil,
16376
+ server_address: nil,
16377
+ signing_role: nil,
16378
+ tags: nil
16379
+ )
16380
+ @id = id == nil ? "" : id
16381
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
16382
+ @name = name == nil ? "" : name
16383
+ @namespace = namespace == nil ? "" : namespace
16384
+ @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
16385
+ @server_address = server_address == nil ? "" : server_address
16386
+ @signing_role = signing_role == nil ? "" : signing_role
16387
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
16388
+ end
16389
+
16390
+ def to_json(options = {})
16391
+ hash = {}
16392
+ self.instance_variables.each do |var|
16393
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
16394
+ end
16395
+ hash.to_json
16396
+ end
16397
+ end
16398
+
16267
16399
  class VaultAWSEC2Store
16268
16400
  # Unique identifier of the SecretStore.
16269
16401
  attr_accessor :id
@@ -16299,6 +16431,102 @@ module SDM
16299
16431
  end
16300
16432
  end
16301
16433
 
16434
+ # VaultAWSIAMCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
16435
+ class VaultAWSIAMCertSSHStore
16436
+ # Unique identifier of the SecretStore.
16437
+ attr_accessor :id
16438
+ # The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
16439
+ attr_accessor :issuedcertttlminutes
16440
+ # Unique human-readable name of the SecretStore.
16441
+ attr_accessor :name
16442
+ # The namespace to make requests within
16443
+ attr_accessor :namespace
16444
+ # The URL of the Vault to target
16445
+ attr_accessor :server_address
16446
+ # The signing role to be used for signing certificates
16447
+ attr_accessor :signing_role
16448
+ # The mount point of the SSH engine configured with the desired CA
16449
+ attr_accessor :ssh_mount_point
16450
+ # Tags is a map of key, value pairs.
16451
+ attr_accessor :tags
16452
+
16453
+ def initialize(
16454
+ id: nil,
16455
+ issuedcertttlminutes: nil,
16456
+ name: nil,
16457
+ namespace: nil,
16458
+ server_address: nil,
16459
+ signing_role: nil,
16460
+ ssh_mount_point: nil,
16461
+ tags: nil
16462
+ )
16463
+ @id = id == nil ? "" : id
16464
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
16465
+ @name = name == nil ? "" : name
16466
+ @namespace = namespace == nil ? "" : namespace
16467
+ @server_address = server_address == nil ? "" : server_address
16468
+ @signing_role = signing_role == nil ? "" : signing_role
16469
+ @ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
16470
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
16471
+ end
16472
+
16473
+ def to_json(options = {})
16474
+ hash = {}
16475
+ self.instance_variables.each do |var|
16476
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
16477
+ end
16478
+ hash.to_json
16479
+ end
16480
+ end
16481
+
16482
+ # VaultAWSIAMCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
16483
+ class VaultAWSIAMCertX509Store
16484
+ # Unique identifier of the SecretStore.
16485
+ attr_accessor :id
16486
+ # The lifetime of certificates issued by this CA represented in minutes.
16487
+ attr_accessor :issuedcertttlminutes
16488
+ # Unique human-readable name of the SecretStore.
16489
+ attr_accessor :name
16490
+ # The namespace to make requests within
16491
+ attr_accessor :namespace
16492
+ # The mount point of the PKI engine configured with the desired CA
16493
+ attr_accessor :pki_mount_point
16494
+ # The URL of the Vault to target
16495
+ attr_accessor :server_address
16496
+ # The signing role to be used for signing certificates
16497
+ attr_accessor :signing_role
16498
+ # Tags is a map of key, value pairs.
16499
+ attr_accessor :tags
16500
+
16501
+ def initialize(
16502
+ id: nil,
16503
+ issuedcertttlminutes: nil,
16504
+ name: nil,
16505
+ namespace: nil,
16506
+ pki_mount_point: nil,
16507
+ server_address: nil,
16508
+ signing_role: nil,
16509
+ tags: nil
16510
+ )
16511
+ @id = id == nil ? "" : id
16512
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
16513
+ @name = name == nil ? "" : name
16514
+ @namespace = namespace == nil ? "" : namespace
16515
+ @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
16516
+ @server_address = server_address == nil ? "" : server_address
16517
+ @signing_role = signing_role == nil ? "" : signing_role
16518
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
16519
+ end
16520
+
16521
+ def to_json(options = {})
16522
+ hash = {}
16523
+ self.instance_variables.each do |var|
16524
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
16525
+ end
16526
+ hash.to_json
16527
+ end
16528
+ end
16529
+
16302
16530
  class VaultAWSIAMStore
16303
16531
  # Unique identifier of the SecretStore.
16304
16532
  attr_accessor :id
data/lib/strongdm.rb CHANGED
@@ -30,7 +30,7 @@ module SDM #:nodoc:
30
30
  DEFAULT_RETRY_FACTOR = 1.6
31
31
  DEFAULT_RETRY_JITTER = 0.2
32
32
  API_VERSION = "2025-04-14"
33
- USER_AGENT = "strongdm-sdk-ruby/15.22.0"
33
+ USER_AGENT = "strongdm-sdk-ruby/15.25.0"
34
34
  private_constant :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :DEFAULT_RETRY_FACTOR, :DEFAULT_RETRY_JITTER, :API_VERSION, :USER_AGENT
35
35
 
36
36
  # Creates a new strongDM API client.
data/lib/svc.rb CHANGED
@@ -6642,11 +6642,16 @@ module SDM #:nodoc:
6642
6642
  # {GCPCertX509Store}
6643
6643
  # {KeyfactorSSHStore}
6644
6644
  # {KeyfactorX509Store}
6645
+ # {StrongVaultStore}
6645
6646
  # {VaultAppRoleStore}
6646
6647
  # {VaultAppRoleCertSSHStore}
6647
6648
  # {VaultAppRoleCertX509Store}
6648
6649
  # {VaultAWSEC2Store}
6650
+ # {VaultAWSEC2CertSSHStore}
6651
+ # {VaultAWSEC2CertX509Store}
6649
6652
  # {VaultAWSIAMStore}
6653
+ # {VaultAWSIAMCertSSHStore}
6654
+ # {VaultAWSIAMCertX509Store}
6650
6655
  # {VaultTLSStore}
6651
6656
  # {VaultTLSCertSSHStore}
6652
6657
  # {VaultTLSCertX509Store}
data/lib/version CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "15.22.0"
16
+ VERSION = "15.25.0"
17
17
  end
data/lib/version.rb CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "15.22.0"
16
+ VERSION = "15.25.0"
17
17
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: strongdm
3
3
  version: !ruby/object:Gem::Version
4
- version: 15.22.0
4
+ version: 15.25.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - strongDM Team
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2025-10-13 00:00:00.000000000 Z
11
+ date: 2025-10-20 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: grpc
@@ -81,8 +81,8 @@ files:
81
81
  - "./.git/logs/HEAD"
82
82
  - "./.git/logs/refs/heads/master"
83
83
  - "./.git/logs/refs/remotes/origin/HEAD"
84
- - "./.git/objects/pack/pack-102044dd10f7a14cf9558e47f1b2bf49750dce45.idx"
85
- - "./.git/objects/pack/pack-102044dd10f7a14cf9558e47f1b2bf49750dce45.pack"
84
+ - "./.git/objects/pack/pack-e9a6bf671b19a0423972e795cd3ba2b74e58d27d.idx"
85
+ - "./.git/objects/pack/pack-e9a6bf671b19a0423972e795cd3ba2b74e58d27d.pack"
86
86
  - "./.git/packed-refs"
87
87
  - "./.git/refs/heads/master"
88
88
  - "./.git/refs/remotes/origin/HEAD"