strongdm 6.3.0 → 6.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.git/ORIG_HEAD +1 -1
- data/.git/index +0 -0
- data/.git/logs/HEAD +3 -3
- data/.git/logs/refs/heads/master +2 -2
- data/.git/logs/refs/remotes/origin/HEAD +1 -1
- data/.git/objects/pack/{pack-937ee306e3b4fe54045c0d7b71751845270470b4.idx → pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.idx} +0 -0
- data/.git/objects/pack/{pack-937ee306e3b4fe54045c0d7b71751845270470b4.pack → pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.pack} +0 -0
- data/.git/packed-refs +3 -2
- data/.git/refs/heads/master +1 -1
- data/lib/grpc/plumbing.rb +324 -0
- data/lib/grpc/secret_store_types_pb.rb +72 -0
- data/lib/models/porcelain.rb +288 -0
- data/lib/strongdm.rb +1 -1
- data/lib/svc.rb +6 -0
- data/lib/version +1 -1
- data/lib/version.rb +1 -1
- metadata +3 -3
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: cc7306aea1eca0729a25187d1a302d86b6550d6f09ac9be7c4ec4f7f7bc4d00b
|
|
4
|
+
data.tar.gz: 63e886822320f0f357df5d222e7bdd7a8955b120df25ada378a80ecd57ce4203
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: cc96479400b7be955e2647aff3f13d95bf5c5446bacb88f7dee356f5c98e3b0c7ef392147ad0b46384ea15a335cb33b1890e5bffdacb11bf1a8d91ce2ffa9889
|
|
7
|
+
data.tar.gz: 1d1035ab4594cc376b92863906f81a0a20ba11441e8eee17eaeca209c799f77e14c627b753c979159637872d766b6d81380b823f42b4be6d88fbd017822c35f8
|
data/.git/ORIG_HEAD
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149
|
data/.git/index
CHANGED
|
Binary file
|
data/.git/logs/HEAD
CHANGED
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
2
|
-
|
|
3
|
-
|
|
1
|
+
0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
2
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 checkout: moving from master to master
|
|
3
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149 3ca1e977d66e0fb0232024c33a223a789453031c sdmrelease <support@strongdm.com> 1706211540 +0000 merge origin/development: Fast-forward
|
data/.git/logs/refs/heads/master
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
2
|
-
|
|
1
|
+
0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
2
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149 3ca1e977d66e0fb0232024c33a223a789453031c sdmrelease <support@strongdm.com> 1706211540 +0000 merge origin/development: Fast-forward
|
|
@@ -1 +1 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
1
|
+
0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
Binary file
|
|
Binary file
|
data/.git/packed-refs
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
# pack-refs with: peeled fully-peeled sorted
|
|
2
|
-
|
|
3
|
-
|
|
2
|
+
3ca1e977d66e0fb0232024c33a223a789453031c refs/remotes/origin/development
|
|
3
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149 refs/remotes/origin/master
|
|
4
4
|
2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
|
|
5
5
|
04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
|
|
6
6
|
6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
|
|
@@ -93,3 +93,4 @@ da1cd910d138b56624af0d2fa2d92d8acec5edca refs/tags/v6.0.1
|
|
|
93
93
|
296fd9e80fd98a5dd3dcaaccde49e33ea5578967 refs/tags/v6.1.0
|
|
94
94
|
d8f6c24d93d0cf5e48ccc7bf7a5ead950a7b0614 refs/tags/v6.2.0
|
|
95
95
|
f4af6ebad8174f8e5aeec63536db9290597a3982 refs/tags/v6.2.1
|
|
96
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149 refs/tags/v6.3.0
|
data/.git/refs/heads/master
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
3ca1e977d66e0fb0232024c33a223a789453031c
|
data/lib/grpc/plumbing.rb
CHANGED
|
@@ -9449,12 +9449,30 @@ module SDM
|
|
|
9449
9449
|
if porcelain.instance_of? VaultAppRoleStore
|
|
9450
9450
|
plumbing.vault_app_role = convert_vault_app_role_store_to_plumbing(porcelain)
|
|
9451
9451
|
end
|
|
9452
|
+
if porcelain.instance_of? VaultAppRoleCertSSHStore
|
|
9453
|
+
plumbing.vault_app_role_cert_ssh = convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
|
|
9454
|
+
end
|
|
9455
|
+
if porcelain.instance_of? VaultAppRoleCertX509Store
|
|
9456
|
+
plumbing.vault_app_role_cert_x_509 = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
|
|
9457
|
+
end
|
|
9452
9458
|
if porcelain.instance_of? VaultTLSStore
|
|
9453
9459
|
plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
|
|
9454
9460
|
end
|
|
9461
|
+
if porcelain.instance_of? VaultTLSCertSSHStore
|
|
9462
|
+
plumbing.vault_tls_cert_ssh = convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
|
|
9463
|
+
end
|
|
9464
|
+
if porcelain.instance_of? VaultTLSCertX509Store
|
|
9465
|
+
plumbing.vault_tls_cert_x_509 = convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
|
|
9466
|
+
end
|
|
9455
9467
|
if porcelain.instance_of? VaultTokenStore
|
|
9456
9468
|
plumbing.vault_token = convert_vault_token_store_to_plumbing(porcelain)
|
|
9457
9469
|
end
|
|
9470
|
+
if porcelain.instance_of? VaultTokenCertSSHStore
|
|
9471
|
+
plumbing.vault_token_cert_ssh = convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
|
|
9472
|
+
end
|
|
9473
|
+
if porcelain.instance_of? VaultTokenCertX509Store
|
|
9474
|
+
plumbing.vault_token_cert_x_509 = convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
|
|
9475
|
+
end
|
|
9458
9476
|
plumbing
|
|
9459
9477
|
end
|
|
9460
9478
|
|
|
@@ -9486,12 +9504,30 @@ module SDM
|
|
|
9486
9504
|
if plumbing.vault_app_role != nil
|
|
9487
9505
|
return convert_vault_app_role_store_to_porcelain(plumbing.vault_app_role)
|
|
9488
9506
|
end
|
|
9507
|
+
if plumbing.vault_app_role_cert_ssh != nil
|
|
9508
|
+
return convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing.vault_app_role_cert_ssh)
|
|
9509
|
+
end
|
|
9510
|
+
if plumbing.vault_app_role_cert_x_509 != nil
|
|
9511
|
+
return convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing.vault_app_role_cert_x_509)
|
|
9512
|
+
end
|
|
9489
9513
|
if plumbing.vault_tls != nil
|
|
9490
9514
|
return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
|
|
9491
9515
|
end
|
|
9516
|
+
if plumbing.vault_tls_cert_ssh != nil
|
|
9517
|
+
return convert_vault_tls_cert_ssh_store_to_porcelain(plumbing.vault_tls_cert_ssh)
|
|
9518
|
+
end
|
|
9519
|
+
if plumbing.vault_tls_cert_x_509 != nil
|
|
9520
|
+
return convert_vault_tls_cert_x_509_store_to_porcelain(plumbing.vault_tls_cert_x_509)
|
|
9521
|
+
end
|
|
9492
9522
|
if plumbing.vault_token != nil
|
|
9493
9523
|
return convert_vault_token_store_to_porcelain(plumbing.vault_token)
|
|
9494
9524
|
end
|
|
9525
|
+
if plumbing.vault_token_cert_ssh != nil
|
|
9526
|
+
return convert_vault_token_cert_ssh_store_to_porcelain(plumbing.vault_token_cert_ssh)
|
|
9527
|
+
end
|
|
9528
|
+
if plumbing.vault_token_cert_x_509 != nil
|
|
9529
|
+
return convert_vault_token_cert_x_509_store_to_porcelain(plumbing.vault_token_cert_x_509)
|
|
9530
|
+
end
|
|
9495
9531
|
raise UnknownError.new("unknown polymorphic type, please upgrade your SDK")
|
|
9496
9532
|
end
|
|
9497
9533
|
def self.convert_repeated_secret_store_to_plumbing(porcelains)
|
|
@@ -10393,6 +10429,98 @@ module SDM
|
|
|
10393
10429
|
end
|
|
10394
10430
|
items
|
|
10395
10431
|
end
|
|
10432
|
+
def self.convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
|
|
10433
|
+
if plumbing == nil
|
|
10434
|
+
return nil
|
|
10435
|
+
end
|
|
10436
|
+
porcelain = VaultAppRoleCertSSHStore.new()
|
|
10437
|
+
porcelain.id = (plumbing.id)
|
|
10438
|
+
porcelain.name = (plumbing.name)
|
|
10439
|
+
porcelain.namespace = (plumbing.namespace)
|
|
10440
|
+
porcelain.server_address = (plumbing.server_address)
|
|
10441
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
10442
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
|
10443
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
10444
|
+
porcelain
|
|
10445
|
+
end
|
|
10446
|
+
|
|
10447
|
+
def self.convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
|
|
10448
|
+
if porcelain == nil
|
|
10449
|
+
return nil
|
|
10450
|
+
end
|
|
10451
|
+
plumbing = V1::VaultAppRoleCertSSHStore.new()
|
|
10452
|
+
plumbing.id = (porcelain.id)
|
|
10453
|
+
plumbing.name = (porcelain.name)
|
|
10454
|
+
plumbing.namespace = (porcelain.namespace)
|
|
10455
|
+
plumbing.server_address = (porcelain.server_address)
|
|
10456
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
10457
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
|
10458
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
10459
|
+
plumbing
|
|
10460
|
+
end
|
|
10461
|
+
def self.convert_repeated_vault_app_role_cert_ssh_store_to_plumbing(porcelains)
|
|
10462
|
+
items = Array.new
|
|
10463
|
+
porcelains.each do |porcelain|
|
|
10464
|
+
plumbing = convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
|
|
10465
|
+
items.append(plumbing)
|
|
10466
|
+
end
|
|
10467
|
+
items
|
|
10468
|
+
end
|
|
10469
|
+
|
|
10470
|
+
def self.convert_repeated_vault_app_role_cert_ssh_store_to_porcelain(plumbings)
|
|
10471
|
+
items = Array.new
|
|
10472
|
+
plumbings.each do |plumbing|
|
|
10473
|
+
porcelain = convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
|
|
10474
|
+
items.append(porcelain)
|
|
10475
|
+
end
|
|
10476
|
+
items
|
|
10477
|
+
end
|
|
10478
|
+
def self.convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing)
|
|
10479
|
+
if plumbing == nil
|
|
10480
|
+
return nil
|
|
10481
|
+
end
|
|
10482
|
+
porcelain = VaultAppRoleCertX509Store.new()
|
|
10483
|
+
porcelain.id = (plumbing.id)
|
|
10484
|
+
porcelain.name = (plumbing.name)
|
|
10485
|
+
porcelain.namespace = (plumbing.namespace)
|
|
10486
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
|
10487
|
+
porcelain.server_address = (plumbing.server_address)
|
|
10488
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
10489
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
10490
|
+
porcelain
|
|
10491
|
+
end
|
|
10492
|
+
|
|
10493
|
+
def self.convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
|
|
10494
|
+
if porcelain == nil
|
|
10495
|
+
return nil
|
|
10496
|
+
end
|
|
10497
|
+
plumbing = V1::VaultAppRoleCertX509Store.new()
|
|
10498
|
+
plumbing.id = (porcelain.id)
|
|
10499
|
+
plumbing.name = (porcelain.name)
|
|
10500
|
+
plumbing.namespace = (porcelain.namespace)
|
|
10501
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
|
10502
|
+
plumbing.server_address = (porcelain.server_address)
|
|
10503
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
10504
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
10505
|
+
plumbing
|
|
10506
|
+
end
|
|
10507
|
+
def self.convert_repeated_vault_app_role_cert_x_509_store_to_plumbing(porcelains)
|
|
10508
|
+
items = Array.new
|
|
10509
|
+
porcelains.each do |porcelain|
|
|
10510
|
+
plumbing = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
|
|
10511
|
+
items.append(plumbing)
|
|
10512
|
+
end
|
|
10513
|
+
items
|
|
10514
|
+
end
|
|
10515
|
+
|
|
10516
|
+
def self.convert_repeated_vault_app_role_cert_x_509_store_to_porcelain(plumbings)
|
|
10517
|
+
items = Array.new
|
|
10518
|
+
plumbings.each do |plumbing|
|
|
10519
|
+
porcelain = convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing)
|
|
10520
|
+
items.append(porcelain)
|
|
10521
|
+
end
|
|
10522
|
+
items
|
|
10523
|
+
end
|
|
10396
10524
|
def self.convert_vault_app_role_store_to_porcelain(plumbing)
|
|
10397
10525
|
if plumbing == nil
|
|
10398
10526
|
return nil
|
|
@@ -10435,6 +10563,110 @@ module SDM
|
|
|
10435
10563
|
end
|
|
10436
10564
|
items
|
|
10437
10565
|
end
|
|
10566
|
+
def self.convert_vault_tls_cert_ssh_store_to_porcelain(plumbing)
|
|
10567
|
+
if plumbing == nil
|
|
10568
|
+
return nil
|
|
10569
|
+
end
|
|
10570
|
+
porcelain = VaultTLSCertSSHStore.new()
|
|
10571
|
+
porcelain.ca_cert_path = (plumbing.CA_cert_path)
|
|
10572
|
+
porcelain.client_cert_path = (plumbing.client_cert_path)
|
|
10573
|
+
porcelain.client_key_path = (plumbing.client_key_path)
|
|
10574
|
+
porcelain.id = (plumbing.id)
|
|
10575
|
+
porcelain.name = (plumbing.name)
|
|
10576
|
+
porcelain.namespace = (plumbing.namespace)
|
|
10577
|
+
porcelain.server_address = (plumbing.server_address)
|
|
10578
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
10579
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
|
10580
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
10581
|
+
porcelain
|
|
10582
|
+
end
|
|
10583
|
+
|
|
10584
|
+
def self.convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
|
|
10585
|
+
if porcelain == nil
|
|
10586
|
+
return nil
|
|
10587
|
+
end
|
|
10588
|
+
plumbing = V1::VaultTLSCertSSHStore.new()
|
|
10589
|
+
plumbing.CA_cert_path = (porcelain.ca_cert_path)
|
|
10590
|
+
plumbing.client_cert_path = (porcelain.client_cert_path)
|
|
10591
|
+
plumbing.client_key_path = (porcelain.client_key_path)
|
|
10592
|
+
plumbing.id = (porcelain.id)
|
|
10593
|
+
plumbing.name = (porcelain.name)
|
|
10594
|
+
plumbing.namespace = (porcelain.namespace)
|
|
10595
|
+
plumbing.server_address = (porcelain.server_address)
|
|
10596
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
10597
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
|
10598
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
10599
|
+
plumbing
|
|
10600
|
+
end
|
|
10601
|
+
def self.convert_repeated_vault_tls_cert_ssh_store_to_plumbing(porcelains)
|
|
10602
|
+
items = Array.new
|
|
10603
|
+
porcelains.each do |porcelain|
|
|
10604
|
+
plumbing = convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
|
|
10605
|
+
items.append(plumbing)
|
|
10606
|
+
end
|
|
10607
|
+
items
|
|
10608
|
+
end
|
|
10609
|
+
|
|
10610
|
+
def self.convert_repeated_vault_tls_cert_ssh_store_to_porcelain(plumbings)
|
|
10611
|
+
items = Array.new
|
|
10612
|
+
plumbings.each do |plumbing|
|
|
10613
|
+
porcelain = convert_vault_tls_cert_ssh_store_to_porcelain(plumbing)
|
|
10614
|
+
items.append(porcelain)
|
|
10615
|
+
end
|
|
10616
|
+
items
|
|
10617
|
+
end
|
|
10618
|
+
def self.convert_vault_tls_cert_x_509_store_to_porcelain(plumbing)
|
|
10619
|
+
if plumbing == nil
|
|
10620
|
+
return nil
|
|
10621
|
+
end
|
|
10622
|
+
porcelain = VaultTLSCertX509Store.new()
|
|
10623
|
+
porcelain.ca_cert_path = (plumbing.CA_cert_path)
|
|
10624
|
+
porcelain.client_cert_path = (plumbing.client_cert_path)
|
|
10625
|
+
porcelain.client_key_path = (plumbing.client_key_path)
|
|
10626
|
+
porcelain.id = (plumbing.id)
|
|
10627
|
+
porcelain.name = (plumbing.name)
|
|
10628
|
+
porcelain.namespace = (plumbing.namespace)
|
|
10629
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
|
10630
|
+
porcelain.server_address = (plumbing.server_address)
|
|
10631
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
10632
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
10633
|
+
porcelain
|
|
10634
|
+
end
|
|
10635
|
+
|
|
10636
|
+
def self.convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
|
|
10637
|
+
if porcelain == nil
|
|
10638
|
+
return nil
|
|
10639
|
+
end
|
|
10640
|
+
plumbing = V1::VaultTLSCertX509Store.new()
|
|
10641
|
+
plumbing.CA_cert_path = (porcelain.ca_cert_path)
|
|
10642
|
+
plumbing.client_cert_path = (porcelain.client_cert_path)
|
|
10643
|
+
plumbing.client_key_path = (porcelain.client_key_path)
|
|
10644
|
+
plumbing.id = (porcelain.id)
|
|
10645
|
+
plumbing.name = (porcelain.name)
|
|
10646
|
+
plumbing.namespace = (porcelain.namespace)
|
|
10647
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
|
10648
|
+
plumbing.server_address = (porcelain.server_address)
|
|
10649
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
10650
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
10651
|
+
plumbing
|
|
10652
|
+
end
|
|
10653
|
+
def self.convert_repeated_vault_tls_cert_x_509_store_to_plumbing(porcelains)
|
|
10654
|
+
items = Array.new
|
|
10655
|
+
porcelains.each do |porcelain|
|
|
10656
|
+
plumbing = convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
|
|
10657
|
+
items.append(plumbing)
|
|
10658
|
+
end
|
|
10659
|
+
items
|
|
10660
|
+
end
|
|
10661
|
+
|
|
10662
|
+
def self.convert_repeated_vault_tls_cert_x_509_store_to_porcelain(plumbings)
|
|
10663
|
+
items = Array.new
|
|
10664
|
+
plumbings.each do |plumbing|
|
|
10665
|
+
porcelain = convert_vault_tls_cert_x_509_store_to_porcelain(plumbing)
|
|
10666
|
+
items.append(porcelain)
|
|
10667
|
+
end
|
|
10668
|
+
items
|
|
10669
|
+
end
|
|
10438
10670
|
def self.convert_vault_tls_store_to_porcelain(plumbing)
|
|
10439
10671
|
if plumbing == nil
|
|
10440
10672
|
return nil
|
|
@@ -10483,6 +10715,98 @@ module SDM
|
|
|
10483
10715
|
end
|
|
10484
10716
|
items
|
|
10485
10717
|
end
|
|
10718
|
+
def self.convert_vault_token_cert_ssh_store_to_porcelain(plumbing)
|
|
10719
|
+
if plumbing == nil
|
|
10720
|
+
return nil
|
|
10721
|
+
end
|
|
10722
|
+
porcelain = VaultTokenCertSSHStore.new()
|
|
10723
|
+
porcelain.id = (plumbing.id)
|
|
10724
|
+
porcelain.name = (plumbing.name)
|
|
10725
|
+
porcelain.namespace = (plumbing.namespace)
|
|
10726
|
+
porcelain.server_address = (plumbing.server_address)
|
|
10727
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
10728
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
|
10729
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
10730
|
+
porcelain
|
|
10731
|
+
end
|
|
10732
|
+
|
|
10733
|
+
def self.convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
|
|
10734
|
+
if porcelain == nil
|
|
10735
|
+
return nil
|
|
10736
|
+
end
|
|
10737
|
+
plumbing = V1::VaultTokenCertSSHStore.new()
|
|
10738
|
+
plumbing.id = (porcelain.id)
|
|
10739
|
+
plumbing.name = (porcelain.name)
|
|
10740
|
+
plumbing.namespace = (porcelain.namespace)
|
|
10741
|
+
plumbing.server_address = (porcelain.server_address)
|
|
10742
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
10743
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
|
10744
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
10745
|
+
plumbing
|
|
10746
|
+
end
|
|
10747
|
+
def self.convert_repeated_vault_token_cert_ssh_store_to_plumbing(porcelains)
|
|
10748
|
+
items = Array.new
|
|
10749
|
+
porcelains.each do |porcelain|
|
|
10750
|
+
plumbing = convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
|
|
10751
|
+
items.append(plumbing)
|
|
10752
|
+
end
|
|
10753
|
+
items
|
|
10754
|
+
end
|
|
10755
|
+
|
|
10756
|
+
def self.convert_repeated_vault_token_cert_ssh_store_to_porcelain(plumbings)
|
|
10757
|
+
items = Array.new
|
|
10758
|
+
plumbings.each do |plumbing|
|
|
10759
|
+
porcelain = convert_vault_token_cert_ssh_store_to_porcelain(plumbing)
|
|
10760
|
+
items.append(porcelain)
|
|
10761
|
+
end
|
|
10762
|
+
items
|
|
10763
|
+
end
|
|
10764
|
+
def self.convert_vault_token_cert_x_509_store_to_porcelain(plumbing)
|
|
10765
|
+
if plumbing == nil
|
|
10766
|
+
return nil
|
|
10767
|
+
end
|
|
10768
|
+
porcelain = VaultTokenCertX509Store.new()
|
|
10769
|
+
porcelain.id = (plumbing.id)
|
|
10770
|
+
porcelain.name = (plumbing.name)
|
|
10771
|
+
porcelain.namespace = (plumbing.namespace)
|
|
10772
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
|
10773
|
+
porcelain.server_address = (plumbing.server_address)
|
|
10774
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
10775
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
10776
|
+
porcelain
|
|
10777
|
+
end
|
|
10778
|
+
|
|
10779
|
+
def self.convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
|
|
10780
|
+
if porcelain == nil
|
|
10781
|
+
return nil
|
|
10782
|
+
end
|
|
10783
|
+
plumbing = V1::VaultTokenCertX509Store.new()
|
|
10784
|
+
plumbing.id = (porcelain.id)
|
|
10785
|
+
plumbing.name = (porcelain.name)
|
|
10786
|
+
plumbing.namespace = (porcelain.namespace)
|
|
10787
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
|
10788
|
+
plumbing.server_address = (porcelain.server_address)
|
|
10789
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
10790
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
10791
|
+
plumbing
|
|
10792
|
+
end
|
|
10793
|
+
def self.convert_repeated_vault_token_cert_x_509_store_to_plumbing(porcelains)
|
|
10794
|
+
items = Array.new
|
|
10795
|
+
porcelains.each do |porcelain|
|
|
10796
|
+
plumbing = convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
|
|
10797
|
+
items.append(plumbing)
|
|
10798
|
+
end
|
|
10799
|
+
items
|
|
10800
|
+
end
|
|
10801
|
+
|
|
10802
|
+
def self.convert_repeated_vault_token_cert_x_509_store_to_porcelain(plumbings)
|
|
10803
|
+
items = Array.new
|
|
10804
|
+
plumbings.each do |plumbing|
|
|
10805
|
+
porcelain = convert_vault_token_cert_x_509_store_to_porcelain(plumbing)
|
|
10806
|
+
items.append(porcelain)
|
|
10807
|
+
end
|
|
10808
|
+
items
|
|
10809
|
+
end
|
|
10486
10810
|
def self.convert_vault_token_store_to_porcelain(plumbing)
|
|
10487
10811
|
if plumbing == nil
|
|
10488
10812
|
return nil
|
|
@@ -32,8 +32,14 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
32
32
|
optional :delinea, :message, 2900, "v1.DelineaStore"
|
|
33
33
|
optional :gcp, :message, 201, "v1.GCPStore"
|
|
34
34
|
optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
|
|
35
|
+
optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
|
|
36
|
+
optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
|
|
35
37
|
optional :vault_tls, :message, 1, "v1.VaultTLSStore"
|
|
38
|
+
optional :vault_tls_cert_ssh, :message, 92, "v1.VaultTLSCertSSHStore"
|
|
39
|
+
optional :vault_tls_cert_x_509, :message, 93, "v1.VaultTLSCertX509Store"
|
|
36
40
|
optional :vault_token, :message, 2, "v1.VaultTokenStore"
|
|
41
|
+
optional :vault_token_cert_ssh, :message, 90, "v1.VaultTokenCertSSHStore"
|
|
42
|
+
optional :vault_token_cert_x_509, :message, 91, "v1.VaultTokenCertX509Store"
|
|
37
43
|
end
|
|
38
44
|
end
|
|
39
45
|
add_message "v1.AWSStore" do
|
|
@@ -86,6 +92,24 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
86
92
|
optional :server_address, :string, 3
|
|
87
93
|
optional :tags, :message, 8, "v1.Tags"
|
|
88
94
|
end
|
|
95
|
+
add_message "v1.VaultAppRoleCertSSHStore" do
|
|
96
|
+
optional :id, :string, 1
|
|
97
|
+
optional :name, :string, 2
|
|
98
|
+
optional :namespace, :string, 5
|
|
99
|
+
optional :server_address, :string, 3
|
|
100
|
+
optional :signing_role, :string, 7
|
|
101
|
+
optional :ssh_mount_point, :string, 6
|
|
102
|
+
optional :tags, :message, 8, "v1.Tags"
|
|
103
|
+
end
|
|
104
|
+
add_message "v1.VaultAppRoleCertX509Store" do
|
|
105
|
+
optional :id, :string, 1
|
|
106
|
+
optional :name, :string, 2
|
|
107
|
+
optional :namespace, :string, 5
|
|
108
|
+
optional :pki_mount_point, :string, 6
|
|
109
|
+
optional :server_address, :string, 3
|
|
110
|
+
optional :signing_role, :string, 7
|
|
111
|
+
optional :tags, :message, 8, "v1.Tags"
|
|
112
|
+
end
|
|
89
113
|
add_message "v1.VaultTLSStore" do
|
|
90
114
|
optional :id, :string, 1
|
|
91
115
|
optional :name, :string, 2
|
|
@@ -96,6 +120,30 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
96
120
|
optional :server_address, :string, 3
|
|
97
121
|
optional :tags, :message, 7, "v1.Tags"
|
|
98
122
|
end
|
|
123
|
+
add_message "v1.VaultTLSCertSSHStore" do
|
|
124
|
+
optional :id, :string, 1
|
|
125
|
+
optional :name, :string, 2
|
|
126
|
+
optional :CA_cert_path, :string, 4
|
|
127
|
+
optional :client_cert_path, :string, 5
|
|
128
|
+
optional :client_key_path, :string, 6
|
|
129
|
+
optional :namespace, :string, 8
|
|
130
|
+
optional :server_address, :string, 3
|
|
131
|
+
optional :signing_role, :string, 10
|
|
132
|
+
optional :ssh_mount_point, :string, 9
|
|
133
|
+
optional :tags, :message, 7, "v1.Tags"
|
|
134
|
+
end
|
|
135
|
+
add_message "v1.VaultTLSCertX509Store" do
|
|
136
|
+
optional :id, :string, 1
|
|
137
|
+
optional :name, :string, 2
|
|
138
|
+
optional :CA_cert_path, :string, 4
|
|
139
|
+
optional :client_cert_path, :string, 5
|
|
140
|
+
optional :client_key_path, :string, 6
|
|
141
|
+
optional :namespace, :string, 8
|
|
142
|
+
optional :pki_mount_point, :string, 9
|
|
143
|
+
optional :server_address, :string, 3
|
|
144
|
+
optional :signing_role, :string, 10
|
|
145
|
+
optional :tags, :message, 7, "v1.Tags"
|
|
146
|
+
end
|
|
99
147
|
add_message "v1.VaultTokenStore" do
|
|
100
148
|
optional :id, :string, 1
|
|
101
149
|
optional :name, :string, 2
|
|
@@ -103,6 +151,24 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
103
151
|
optional :server_address, :string, 3
|
|
104
152
|
optional :tags, :message, 4, "v1.Tags"
|
|
105
153
|
end
|
|
154
|
+
add_message "v1.VaultTokenCertSSHStore" do
|
|
155
|
+
optional :id, :string, 1
|
|
156
|
+
optional :name, :string, 2
|
|
157
|
+
optional :namespace, :string, 5
|
|
158
|
+
optional :server_address, :string, 3
|
|
159
|
+
optional :signing_role, :string, 7
|
|
160
|
+
optional :ssh_mount_point, :string, 6
|
|
161
|
+
optional :tags, :message, 4, "v1.Tags"
|
|
162
|
+
end
|
|
163
|
+
add_message "v1.VaultTokenCertX509Store" do
|
|
164
|
+
optional :id, :string, 1
|
|
165
|
+
optional :name, :string, 2
|
|
166
|
+
optional :namespace, :string, 5
|
|
167
|
+
optional :pki_mount_point, :string, 6
|
|
168
|
+
optional :server_address, :string, 3
|
|
169
|
+
optional :signing_role, :string, 7
|
|
170
|
+
optional :tags, :message, 4, "v1.Tags"
|
|
171
|
+
end
|
|
106
172
|
end
|
|
107
173
|
end
|
|
108
174
|
|
|
@@ -116,6 +182,12 @@ module V1
|
|
|
116
182
|
DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
|
|
117
183
|
GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
|
|
118
184
|
VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
|
|
185
|
+
VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
|
|
186
|
+
VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
|
|
119
187
|
VaultTLSStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSStore").msgclass
|
|
188
|
+
VaultTLSCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSCertSSHStore").msgclass
|
|
189
|
+
VaultTLSCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSCertX509Store").msgclass
|
|
120
190
|
VaultTokenStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenStore").msgclass
|
|
191
|
+
VaultTokenCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenCertSSHStore").msgclass
|
|
192
|
+
VaultTokenCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenCertX509Store").msgclass
|
|
121
193
|
end
|
data/lib/models/porcelain.rb
CHANGED
|
@@ -9833,6 +9833,94 @@ module SDM
|
|
|
9833
9833
|
end
|
|
9834
9834
|
end
|
|
9835
9835
|
|
|
9836
|
+
# VaultAppRoleCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
9837
|
+
class VaultAppRoleCertSSHStore
|
|
9838
|
+
# Unique identifier of the SecretStore.
|
|
9839
|
+
attr_accessor :id
|
|
9840
|
+
# Unique human-readable name of the SecretStore.
|
|
9841
|
+
attr_accessor :name
|
|
9842
|
+
# The namespace to make requests within
|
|
9843
|
+
attr_accessor :namespace
|
|
9844
|
+
# The URL of the Vault to target
|
|
9845
|
+
attr_accessor :server_address
|
|
9846
|
+
# The signing role to be used for signing certificates
|
|
9847
|
+
attr_accessor :signing_role
|
|
9848
|
+
# The mount point of the SSH engine configured with the desired CA
|
|
9849
|
+
attr_accessor :ssh_mount_point
|
|
9850
|
+
# Tags is a map of key, value pairs.
|
|
9851
|
+
attr_accessor :tags
|
|
9852
|
+
|
|
9853
|
+
def initialize(
|
|
9854
|
+
id: nil,
|
|
9855
|
+
name: nil,
|
|
9856
|
+
namespace: nil,
|
|
9857
|
+
server_address: nil,
|
|
9858
|
+
signing_role: nil,
|
|
9859
|
+
ssh_mount_point: nil,
|
|
9860
|
+
tags: nil
|
|
9861
|
+
)
|
|
9862
|
+
@id = id == nil ? "" : id
|
|
9863
|
+
@name = name == nil ? "" : name
|
|
9864
|
+
@namespace = namespace == nil ? "" : namespace
|
|
9865
|
+
@server_address = server_address == nil ? "" : server_address
|
|
9866
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
|
9867
|
+
@ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
|
|
9868
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
9869
|
+
end
|
|
9870
|
+
|
|
9871
|
+
def to_json(options = {})
|
|
9872
|
+
hash = {}
|
|
9873
|
+
self.instance_variables.each do |var|
|
|
9874
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
9875
|
+
end
|
|
9876
|
+
hash.to_json
|
|
9877
|
+
end
|
|
9878
|
+
end
|
|
9879
|
+
|
|
9880
|
+
# VaultAppRoleCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
9881
|
+
class VaultAppRoleCertX509Store
|
|
9882
|
+
# Unique identifier of the SecretStore.
|
|
9883
|
+
attr_accessor :id
|
|
9884
|
+
# Unique human-readable name of the SecretStore.
|
|
9885
|
+
attr_accessor :name
|
|
9886
|
+
# The namespace to make requests within
|
|
9887
|
+
attr_accessor :namespace
|
|
9888
|
+
# The mount point of the PKI engine configured with the desired CA
|
|
9889
|
+
attr_accessor :pki_mount_point
|
|
9890
|
+
# The URL of the Vault to target
|
|
9891
|
+
attr_accessor :server_address
|
|
9892
|
+
# The signing role to be used for signing certificates
|
|
9893
|
+
attr_accessor :signing_role
|
|
9894
|
+
# Tags is a map of key, value pairs.
|
|
9895
|
+
attr_accessor :tags
|
|
9896
|
+
|
|
9897
|
+
def initialize(
|
|
9898
|
+
id: nil,
|
|
9899
|
+
name: nil,
|
|
9900
|
+
namespace: nil,
|
|
9901
|
+
pki_mount_point: nil,
|
|
9902
|
+
server_address: nil,
|
|
9903
|
+
signing_role: nil,
|
|
9904
|
+
tags: nil
|
|
9905
|
+
)
|
|
9906
|
+
@id = id == nil ? "" : id
|
|
9907
|
+
@name = name == nil ? "" : name
|
|
9908
|
+
@namespace = namespace == nil ? "" : namespace
|
|
9909
|
+
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
|
9910
|
+
@server_address = server_address == nil ? "" : server_address
|
|
9911
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
|
9912
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
9913
|
+
end
|
|
9914
|
+
|
|
9915
|
+
def to_json(options = {})
|
|
9916
|
+
hash = {}
|
|
9917
|
+
self.instance_variables.each do |var|
|
|
9918
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
9919
|
+
end
|
|
9920
|
+
hash.to_json
|
|
9921
|
+
end
|
|
9922
|
+
end
|
|
9923
|
+
|
|
9836
9924
|
class VaultAppRoleStore
|
|
9837
9925
|
# Unique identifier of the SecretStore.
|
|
9838
9926
|
attr_accessor :id
|
|
@@ -9868,6 +9956,118 @@ module SDM
|
|
|
9868
9956
|
end
|
|
9869
9957
|
end
|
|
9870
9958
|
|
|
9959
|
+
# VaultTLSCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
9960
|
+
class VaultTLSCertSSHStore
|
|
9961
|
+
# A path to a CA file accessible by a Node
|
|
9962
|
+
attr_accessor :ca_cert_path
|
|
9963
|
+
# A path to a client certificate file accessible by a Node
|
|
9964
|
+
attr_accessor :client_cert_path
|
|
9965
|
+
# A path to a client key file accessible by a Node
|
|
9966
|
+
attr_accessor :client_key_path
|
|
9967
|
+
# Unique identifier of the SecretStore.
|
|
9968
|
+
attr_accessor :id
|
|
9969
|
+
# Unique human-readable name of the SecretStore.
|
|
9970
|
+
attr_accessor :name
|
|
9971
|
+
# The namespace to make requests within
|
|
9972
|
+
attr_accessor :namespace
|
|
9973
|
+
# The URL of the Vault to target
|
|
9974
|
+
attr_accessor :server_address
|
|
9975
|
+
# The signing role to be used for signing certificates
|
|
9976
|
+
attr_accessor :signing_role
|
|
9977
|
+
# The mount point of the SSH engine configured with the desired CA
|
|
9978
|
+
attr_accessor :ssh_mount_point
|
|
9979
|
+
# Tags is a map of key, value pairs.
|
|
9980
|
+
attr_accessor :tags
|
|
9981
|
+
|
|
9982
|
+
def initialize(
|
|
9983
|
+
ca_cert_path: nil,
|
|
9984
|
+
client_cert_path: nil,
|
|
9985
|
+
client_key_path: nil,
|
|
9986
|
+
id: nil,
|
|
9987
|
+
name: nil,
|
|
9988
|
+
namespace: nil,
|
|
9989
|
+
server_address: nil,
|
|
9990
|
+
signing_role: nil,
|
|
9991
|
+
ssh_mount_point: nil,
|
|
9992
|
+
tags: nil
|
|
9993
|
+
)
|
|
9994
|
+
@ca_cert_path = ca_cert_path == nil ? "" : ca_cert_path
|
|
9995
|
+
@client_cert_path = client_cert_path == nil ? "" : client_cert_path
|
|
9996
|
+
@client_key_path = client_key_path == nil ? "" : client_key_path
|
|
9997
|
+
@id = id == nil ? "" : id
|
|
9998
|
+
@name = name == nil ? "" : name
|
|
9999
|
+
@namespace = namespace == nil ? "" : namespace
|
|
10000
|
+
@server_address = server_address == nil ? "" : server_address
|
|
10001
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
|
10002
|
+
@ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
|
|
10003
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
10004
|
+
end
|
|
10005
|
+
|
|
10006
|
+
def to_json(options = {})
|
|
10007
|
+
hash = {}
|
|
10008
|
+
self.instance_variables.each do |var|
|
|
10009
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
10010
|
+
end
|
|
10011
|
+
hash.to_json
|
|
10012
|
+
end
|
|
10013
|
+
end
|
|
10014
|
+
|
|
10015
|
+
# VaultTLSCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
10016
|
+
class VaultTLSCertX509Store
|
|
10017
|
+
# A path to a CA file accessible by a Node
|
|
10018
|
+
attr_accessor :ca_cert_path
|
|
10019
|
+
# A path to a client certificate file accessible by a Node
|
|
10020
|
+
attr_accessor :client_cert_path
|
|
10021
|
+
# A path to a client key file accessible by a Node
|
|
10022
|
+
attr_accessor :client_key_path
|
|
10023
|
+
# Unique identifier of the SecretStore.
|
|
10024
|
+
attr_accessor :id
|
|
10025
|
+
# Unique human-readable name of the SecretStore.
|
|
10026
|
+
attr_accessor :name
|
|
10027
|
+
# The namespace to make requests within
|
|
10028
|
+
attr_accessor :namespace
|
|
10029
|
+
# The mount point of the PKI engine configured with the desired CA
|
|
10030
|
+
attr_accessor :pki_mount_point
|
|
10031
|
+
# The URL of the Vault to target
|
|
10032
|
+
attr_accessor :server_address
|
|
10033
|
+
# The signing role to be used for signing certificates
|
|
10034
|
+
attr_accessor :signing_role
|
|
10035
|
+
# Tags is a map of key, value pairs.
|
|
10036
|
+
attr_accessor :tags
|
|
10037
|
+
|
|
10038
|
+
def initialize(
|
|
10039
|
+
ca_cert_path: nil,
|
|
10040
|
+
client_cert_path: nil,
|
|
10041
|
+
client_key_path: nil,
|
|
10042
|
+
id: nil,
|
|
10043
|
+
name: nil,
|
|
10044
|
+
namespace: nil,
|
|
10045
|
+
pki_mount_point: nil,
|
|
10046
|
+
server_address: nil,
|
|
10047
|
+
signing_role: nil,
|
|
10048
|
+
tags: nil
|
|
10049
|
+
)
|
|
10050
|
+
@ca_cert_path = ca_cert_path == nil ? "" : ca_cert_path
|
|
10051
|
+
@client_cert_path = client_cert_path == nil ? "" : client_cert_path
|
|
10052
|
+
@client_key_path = client_key_path == nil ? "" : client_key_path
|
|
10053
|
+
@id = id == nil ? "" : id
|
|
10054
|
+
@name = name == nil ? "" : name
|
|
10055
|
+
@namespace = namespace == nil ? "" : namespace
|
|
10056
|
+
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
|
10057
|
+
@server_address = server_address == nil ? "" : server_address
|
|
10058
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
|
10059
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
10060
|
+
end
|
|
10061
|
+
|
|
10062
|
+
def to_json(options = {})
|
|
10063
|
+
hash = {}
|
|
10064
|
+
self.instance_variables.each do |var|
|
|
10065
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
10066
|
+
end
|
|
10067
|
+
hash.to_json
|
|
10068
|
+
end
|
|
10069
|
+
end
|
|
10070
|
+
|
|
9871
10071
|
class VaultTLSStore
|
|
9872
10072
|
# A path to a CA file accessible by a Node
|
|
9873
10073
|
attr_accessor :ca_cert_path
|
|
@@ -9915,6 +10115,94 @@ module SDM
|
|
|
9915
10115
|
end
|
|
9916
10116
|
end
|
|
9917
10117
|
|
|
10118
|
+
# VaultTokenCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
10119
|
+
class VaultTokenCertSSHStore
|
|
10120
|
+
# Unique identifier of the SecretStore.
|
|
10121
|
+
attr_accessor :id
|
|
10122
|
+
# Unique human-readable name of the SecretStore.
|
|
10123
|
+
attr_accessor :name
|
|
10124
|
+
# The namespace to make requests within
|
|
10125
|
+
attr_accessor :namespace
|
|
10126
|
+
# The URL of the Vault to target
|
|
10127
|
+
attr_accessor :server_address
|
|
10128
|
+
# The signing role to be used for signing certificates
|
|
10129
|
+
attr_accessor :signing_role
|
|
10130
|
+
# The mount point of the SSH engine configured with the desired CA
|
|
10131
|
+
attr_accessor :ssh_mount_point
|
|
10132
|
+
# Tags is a map of key, value pairs.
|
|
10133
|
+
attr_accessor :tags
|
|
10134
|
+
|
|
10135
|
+
def initialize(
|
|
10136
|
+
id: nil,
|
|
10137
|
+
name: nil,
|
|
10138
|
+
namespace: nil,
|
|
10139
|
+
server_address: nil,
|
|
10140
|
+
signing_role: nil,
|
|
10141
|
+
ssh_mount_point: nil,
|
|
10142
|
+
tags: nil
|
|
10143
|
+
)
|
|
10144
|
+
@id = id == nil ? "" : id
|
|
10145
|
+
@name = name == nil ? "" : name
|
|
10146
|
+
@namespace = namespace == nil ? "" : namespace
|
|
10147
|
+
@server_address = server_address == nil ? "" : server_address
|
|
10148
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
|
10149
|
+
@ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
|
|
10150
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
10151
|
+
end
|
|
10152
|
+
|
|
10153
|
+
def to_json(options = {})
|
|
10154
|
+
hash = {}
|
|
10155
|
+
self.instance_variables.each do |var|
|
|
10156
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
10157
|
+
end
|
|
10158
|
+
hash.to_json
|
|
10159
|
+
end
|
|
10160
|
+
end
|
|
10161
|
+
|
|
10162
|
+
# VaultTokenCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
10163
|
+
class VaultTokenCertX509Store
|
|
10164
|
+
# Unique identifier of the SecretStore.
|
|
10165
|
+
attr_accessor :id
|
|
10166
|
+
# Unique human-readable name of the SecretStore.
|
|
10167
|
+
attr_accessor :name
|
|
10168
|
+
# The namespace to make requests within
|
|
10169
|
+
attr_accessor :namespace
|
|
10170
|
+
# The mount point of the PKI engine configured with the desired CA
|
|
10171
|
+
attr_accessor :pki_mount_point
|
|
10172
|
+
# The URL of the Vault to target
|
|
10173
|
+
attr_accessor :server_address
|
|
10174
|
+
# The signing role to be used for signing certificates
|
|
10175
|
+
attr_accessor :signing_role
|
|
10176
|
+
# Tags is a map of key, value pairs.
|
|
10177
|
+
attr_accessor :tags
|
|
10178
|
+
|
|
10179
|
+
def initialize(
|
|
10180
|
+
id: nil,
|
|
10181
|
+
name: nil,
|
|
10182
|
+
namespace: nil,
|
|
10183
|
+
pki_mount_point: nil,
|
|
10184
|
+
server_address: nil,
|
|
10185
|
+
signing_role: nil,
|
|
10186
|
+
tags: nil
|
|
10187
|
+
)
|
|
10188
|
+
@id = id == nil ? "" : id
|
|
10189
|
+
@name = name == nil ? "" : name
|
|
10190
|
+
@namespace = namespace == nil ? "" : namespace
|
|
10191
|
+
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
|
10192
|
+
@server_address = server_address == nil ? "" : server_address
|
|
10193
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
|
10194
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
10195
|
+
end
|
|
10196
|
+
|
|
10197
|
+
def to_json(options = {})
|
|
10198
|
+
hash = {}
|
|
10199
|
+
self.instance_variables.each do |var|
|
|
10200
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
10201
|
+
end
|
|
10202
|
+
hash.to_json
|
|
10203
|
+
end
|
|
10204
|
+
end
|
|
10205
|
+
|
|
9918
10206
|
class VaultTokenStore
|
|
9919
10207
|
# Unique identifier of the SecretStore.
|
|
9920
10208
|
attr_accessor :id
|
data/lib/strongdm.rb
CHANGED
|
@@ -29,7 +29,7 @@ module SDM #:nodoc:
|
|
|
29
29
|
DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
|
|
30
30
|
DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
|
|
31
31
|
API_VERSION = "2021-08-23"
|
|
32
|
-
USER_AGENT = "strongdm-sdk-ruby/6.3.
|
|
32
|
+
USER_AGENT = "strongdm-sdk-ruby/6.3.1"
|
|
33
33
|
private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
|
|
34
34
|
|
|
35
35
|
# Creates a new strongDM API client.
|
data/lib/svc.rb
CHANGED
|
@@ -3763,8 +3763,14 @@ module SDM #:nodoc:
|
|
|
3763
3763
|
# {DelineaStore}
|
|
3764
3764
|
# {GCPStore}
|
|
3765
3765
|
# {VaultAppRoleStore}
|
|
3766
|
+
# {VaultAppRoleCertSSHStore}
|
|
3767
|
+
# {VaultAppRoleCertX509Store}
|
|
3766
3768
|
# {VaultTLSStore}
|
|
3769
|
+
# {VaultTLSCertSSHStore}
|
|
3770
|
+
# {VaultTLSCertX509Store}
|
|
3767
3771
|
# {VaultTokenStore}
|
|
3772
|
+
# {VaultTokenCertSSHStore}
|
|
3773
|
+
# {VaultTokenCertX509Store}
|
|
3768
3774
|
class SecretStores
|
|
3769
3775
|
extend Gem::Deprecate
|
|
3770
3776
|
|
data/lib/version
CHANGED
data/lib/version.rb
CHANGED
metadata
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: strongdm
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 6.3.
|
|
4
|
+
version: 6.3.1
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- strongDM Team
|
|
@@ -81,8 +81,8 @@ files:
|
|
|
81
81
|
- "./.git/logs/HEAD"
|
|
82
82
|
- "./.git/logs/refs/heads/master"
|
|
83
83
|
- "./.git/logs/refs/remotes/origin/HEAD"
|
|
84
|
-
- "./.git/objects/pack/pack-
|
|
85
|
-
- "./.git/objects/pack/pack-
|
|
84
|
+
- "./.git/objects/pack/pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.idx"
|
|
85
|
+
- "./.git/objects/pack/pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.pack"
|
|
86
86
|
- "./.git/packed-refs"
|
|
87
87
|
- "./.git/refs/heads/master"
|
|
88
88
|
- "./.git/refs/remotes/origin/HEAD"
|