strongdm 6.3.0 → 6.3.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.git/ORIG_HEAD +1 -1
- data/.git/index +0 -0
- data/.git/logs/HEAD +3 -3
- data/.git/logs/refs/heads/master +2 -2
- data/.git/logs/refs/remotes/origin/HEAD +1 -1
- data/.git/objects/pack/{pack-937ee306e3b4fe54045c0d7b71751845270470b4.idx → pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.idx} +0 -0
- data/.git/objects/pack/{pack-937ee306e3b4fe54045c0d7b71751845270470b4.pack → pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.pack} +0 -0
- data/.git/packed-refs +3 -2
- data/.git/refs/heads/master +1 -1
- data/lib/grpc/plumbing.rb +324 -0
- data/lib/grpc/secret_store_types_pb.rb +72 -0
- data/lib/models/porcelain.rb +288 -0
- data/lib/strongdm.rb +1 -1
- data/lib/svc.rb +6 -0
- data/lib/version +1 -1
- data/lib/version.rb +1 -1
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: cc7306aea1eca0729a25187d1a302d86b6550d6f09ac9be7c4ec4f7f7bc4d00b
|
4
|
+
data.tar.gz: 63e886822320f0f357df5d222e7bdd7a8955b120df25ada378a80ecd57ce4203
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cc96479400b7be955e2647aff3f13d95bf5c5446bacb88f7dee356f5c98e3b0c7ef392147ad0b46384ea15a335cb33b1890e5bffdacb11bf1a8d91ce2ffa9889
|
7
|
+
data.tar.gz: 1d1035ab4594cc376b92863906f81a0a20ba11441e8eee17eaeca209c799f77e14c627b753c979159637872d766b6d81380b823f42b4be6d88fbd017822c35f8
|
data/.git/ORIG_HEAD
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149
|
data/.git/index
CHANGED
Binary file
|
data/.git/logs/HEAD
CHANGED
@@ -1,3 +1,3 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
2
|
-
|
3
|
-
|
1
|
+
0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
2
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 checkout: moving from master to master
|
3
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149 3ca1e977d66e0fb0232024c33a223a789453031c sdmrelease <support@strongdm.com> 1706211540 +0000 merge origin/development: Fast-forward
|
data/.git/logs/refs/heads/master
CHANGED
@@ -1,2 +1,2 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
2
|
-
|
1
|
+
0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
2
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149 3ca1e977d66e0fb0232024c33a223a789453031c sdmrelease <support@strongdm.com> 1706211540 +0000 merge origin/development: Fast-forward
|
@@ -1 +1 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
1
|
+
0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
Binary file
|
Binary file
|
data/.git/packed-refs
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
# pack-refs with: peeled fully-peeled sorted
|
2
|
-
|
3
|
-
|
2
|
+
3ca1e977d66e0fb0232024c33a223a789453031c refs/remotes/origin/development
|
3
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149 refs/remotes/origin/master
|
4
4
|
2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
|
5
5
|
04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
|
6
6
|
6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
|
@@ -93,3 +93,4 @@ da1cd910d138b56624af0d2fa2d92d8acec5edca refs/tags/v6.0.1
|
|
93
93
|
296fd9e80fd98a5dd3dcaaccde49e33ea5578967 refs/tags/v6.1.0
|
94
94
|
d8f6c24d93d0cf5e48ccc7bf7a5ead950a7b0614 refs/tags/v6.2.0
|
95
95
|
f4af6ebad8174f8e5aeec63536db9290597a3982 refs/tags/v6.2.1
|
96
|
+
59ba0e6392d2e7f5f4c053e663766157c9a9b149 refs/tags/v6.3.0
|
data/.git/refs/heads/master
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
3ca1e977d66e0fb0232024c33a223a789453031c
|
data/lib/grpc/plumbing.rb
CHANGED
@@ -9449,12 +9449,30 @@ module SDM
|
|
9449
9449
|
if porcelain.instance_of? VaultAppRoleStore
|
9450
9450
|
plumbing.vault_app_role = convert_vault_app_role_store_to_plumbing(porcelain)
|
9451
9451
|
end
|
9452
|
+
if porcelain.instance_of? VaultAppRoleCertSSHStore
|
9453
|
+
plumbing.vault_app_role_cert_ssh = convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
|
9454
|
+
end
|
9455
|
+
if porcelain.instance_of? VaultAppRoleCertX509Store
|
9456
|
+
plumbing.vault_app_role_cert_x_509 = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
|
9457
|
+
end
|
9452
9458
|
if porcelain.instance_of? VaultTLSStore
|
9453
9459
|
plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
|
9454
9460
|
end
|
9461
|
+
if porcelain.instance_of? VaultTLSCertSSHStore
|
9462
|
+
plumbing.vault_tls_cert_ssh = convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
|
9463
|
+
end
|
9464
|
+
if porcelain.instance_of? VaultTLSCertX509Store
|
9465
|
+
plumbing.vault_tls_cert_x_509 = convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
|
9466
|
+
end
|
9455
9467
|
if porcelain.instance_of? VaultTokenStore
|
9456
9468
|
plumbing.vault_token = convert_vault_token_store_to_plumbing(porcelain)
|
9457
9469
|
end
|
9470
|
+
if porcelain.instance_of? VaultTokenCertSSHStore
|
9471
|
+
plumbing.vault_token_cert_ssh = convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
|
9472
|
+
end
|
9473
|
+
if porcelain.instance_of? VaultTokenCertX509Store
|
9474
|
+
plumbing.vault_token_cert_x_509 = convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
|
9475
|
+
end
|
9458
9476
|
plumbing
|
9459
9477
|
end
|
9460
9478
|
|
@@ -9486,12 +9504,30 @@ module SDM
|
|
9486
9504
|
if plumbing.vault_app_role != nil
|
9487
9505
|
return convert_vault_app_role_store_to_porcelain(plumbing.vault_app_role)
|
9488
9506
|
end
|
9507
|
+
if plumbing.vault_app_role_cert_ssh != nil
|
9508
|
+
return convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing.vault_app_role_cert_ssh)
|
9509
|
+
end
|
9510
|
+
if plumbing.vault_app_role_cert_x_509 != nil
|
9511
|
+
return convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing.vault_app_role_cert_x_509)
|
9512
|
+
end
|
9489
9513
|
if plumbing.vault_tls != nil
|
9490
9514
|
return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
|
9491
9515
|
end
|
9516
|
+
if plumbing.vault_tls_cert_ssh != nil
|
9517
|
+
return convert_vault_tls_cert_ssh_store_to_porcelain(plumbing.vault_tls_cert_ssh)
|
9518
|
+
end
|
9519
|
+
if plumbing.vault_tls_cert_x_509 != nil
|
9520
|
+
return convert_vault_tls_cert_x_509_store_to_porcelain(plumbing.vault_tls_cert_x_509)
|
9521
|
+
end
|
9492
9522
|
if plumbing.vault_token != nil
|
9493
9523
|
return convert_vault_token_store_to_porcelain(plumbing.vault_token)
|
9494
9524
|
end
|
9525
|
+
if plumbing.vault_token_cert_ssh != nil
|
9526
|
+
return convert_vault_token_cert_ssh_store_to_porcelain(plumbing.vault_token_cert_ssh)
|
9527
|
+
end
|
9528
|
+
if plumbing.vault_token_cert_x_509 != nil
|
9529
|
+
return convert_vault_token_cert_x_509_store_to_porcelain(plumbing.vault_token_cert_x_509)
|
9530
|
+
end
|
9495
9531
|
raise UnknownError.new("unknown polymorphic type, please upgrade your SDK")
|
9496
9532
|
end
|
9497
9533
|
def self.convert_repeated_secret_store_to_plumbing(porcelains)
|
@@ -10393,6 +10429,98 @@ module SDM
|
|
10393
10429
|
end
|
10394
10430
|
items
|
10395
10431
|
end
|
10432
|
+
def self.convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
|
10433
|
+
if plumbing == nil
|
10434
|
+
return nil
|
10435
|
+
end
|
10436
|
+
porcelain = VaultAppRoleCertSSHStore.new()
|
10437
|
+
porcelain.id = (plumbing.id)
|
10438
|
+
porcelain.name = (plumbing.name)
|
10439
|
+
porcelain.namespace = (plumbing.namespace)
|
10440
|
+
porcelain.server_address = (plumbing.server_address)
|
10441
|
+
porcelain.signing_role = (plumbing.signing_role)
|
10442
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
10443
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
10444
|
+
porcelain
|
10445
|
+
end
|
10446
|
+
|
10447
|
+
def self.convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
|
10448
|
+
if porcelain == nil
|
10449
|
+
return nil
|
10450
|
+
end
|
10451
|
+
plumbing = V1::VaultAppRoleCertSSHStore.new()
|
10452
|
+
plumbing.id = (porcelain.id)
|
10453
|
+
plumbing.name = (porcelain.name)
|
10454
|
+
plumbing.namespace = (porcelain.namespace)
|
10455
|
+
plumbing.server_address = (porcelain.server_address)
|
10456
|
+
plumbing.signing_role = (porcelain.signing_role)
|
10457
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
10458
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
10459
|
+
plumbing
|
10460
|
+
end
|
10461
|
+
def self.convert_repeated_vault_app_role_cert_ssh_store_to_plumbing(porcelains)
|
10462
|
+
items = Array.new
|
10463
|
+
porcelains.each do |porcelain|
|
10464
|
+
plumbing = convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
|
10465
|
+
items.append(plumbing)
|
10466
|
+
end
|
10467
|
+
items
|
10468
|
+
end
|
10469
|
+
|
10470
|
+
def self.convert_repeated_vault_app_role_cert_ssh_store_to_porcelain(plumbings)
|
10471
|
+
items = Array.new
|
10472
|
+
plumbings.each do |plumbing|
|
10473
|
+
porcelain = convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
|
10474
|
+
items.append(porcelain)
|
10475
|
+
end
|
10476
|
+
items
|
10477
|
+
end
|
10478
|
+
def self.convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing)
|
10479
|
+
if plumbing == nil
|
10480
|
+
return nil
|
10481
|
+
end
|
10482
|
+
porcelain = VaultAppRoleCertX509Store.new()
|
10483
|
+
porcelain.id = (plumbing.id)
|
10484
|
+
porcelain.name = (plumbing.name)
|
10485
|
+
porcelain.namespace = (plumbing.namespace)
|
10486
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
10487
|
+
porcelain.server_address = (plumbing.server_address)
|
10488
|
+
porcelain.signing_role = (plumbing.signing_role)
|
10489
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
10490
|
+
porcelain
|
10491
|
+
end
|
10492
|
+
|
10493
|
+
def self.convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
|
10494
|
+
if porcelain == nil
|
10495
|
+
return nil
|
10496
|
+
end
|
10497
|
+
plumbing = V1::VaultAppRoleCertX509Store.new()
|
10498
|
+
plumbing.id = (porcelain.id)
|
10499
|
+
plumbing.name = (porcelain.name)
|
10500
|
+
plumbing.namespace = (porcelain.namespace)
|
10501
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
10502
|
+
plumbing.server_address = (porcelain.server_address)
|
10503
|
+
plumbing.signing_role = (porcelain.signing_role)
|
10504
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
10505
|
+
plumbing
|
10506
|
+
end
|
10507
|
+
def self.convert_repeated_vault_app_role_cert_x_509_store_to_plumbing(porcelains)
|
10508
|
+
items = Array.new
|
10509
|
+
porcelains.each do |porcelain|
|
10510
|
+
plumbing = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
|
10511
|
+
items.append(plumbing)
|
10512
|
+
end
|
10513
|
+
items
|
10514
|
+
end
|
10515
|
+
|
10516
|
+
def self.convert_repeated_vault_app_role_cert_x_509_store_to_porcelain(plumbings)
|
10517
|
+
items = Array.new
|
10518
|
+
plumbings.each do |plumbing|
|
10519
|
+
porcelain = convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing)
|
10520
|
+
items.append(porcelain)
|
10521
|
+
end
|
10522
|
+
items
|
10523
|
+
end
|
10396
10524
|
def self.convert_vault_app_role_store_to_porcelain(plumbing)
|
10397
10525
|
if plumbing == nil
|
10398
10526
|
return nil
|
@@ -10435,6 +10563,110 @@ module SDM
|
|
10435
10563
|
end
|
10436
10564
|
items
|
10437
10565
|
end
|
10566
|
+
def self.convert_vault_tls_cert_ssh_store_to_porcelain(plumbing)
|
10567
|
+
if plumbing == nil
|
10568
|
+
return nil
|
10569
|
+
end
|
10570
|
+
porcelain = VaultTLSCertSSHStore.new()
|
10571
|
+
porcelain.ca_cert_path = (plumbing.CA_cert_path)
|
10572
|
+
porcelain.client_cert_path = (plumbing.client_cert_path)
|
10573
|
+
porcelain.client_key_path = (plumbing.client_key_path)
|
10574
|
+
porcelain.id = (plumbing.id)
|
10575
|
+
porcelain.name = (plumbing.name)
|
10576
|
+
porcelain.namespace = (plumbing.namespace)
|
10577
|
+
porcelain.server_address = (plumbing.server_address)
|
10578
|
+
porcelain.signing_role = (plumbing.signing_role)
|
10579
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
10580
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
10581
|
+
porcelain
|
10582
|
+
end
|
10583
|
+
|
10584
|
+
def self.convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
|
10585
|
+
if porcelain == nil
|
10586
|
+
return nil
|
10587
|
+
end
|
10588
|
+
plumbing = V1::VaultTLSCertSSHStore.new()
|
10589
|
+
plumbing.CA_cert_path = (porcelain.ca_cert_path)
|
10590
|
+
plumbing.client_cert_path = (porcelain.client_cert_path)
|
10591
|
+
plumbing.client_key_path = (porcelain.client_key_path)
|
10592
|
+
plumbing.id = (porcelain.id)
|
10593
|
+
plumbing.name = (porcelain.name)
|
10594
|
+
plumbing.namespace = (porcelain.namespace)
|
10595
|
+
plumbing.server_address = (porcelain.server_address)
|
10596
|
+
plumbing.signing_role = (porcelain.signing_role)
|
10597
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
10598
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
10599
|
+
plumbing
|
10600
|
+
end
|
10601
|
+
def self.convert_repeated_vault_tls_cert_ssh_store_to_plumbing(porcelains)
|
10602
|
+
items = Array.new
|
10603
|
+
porcelains.each do |porcelain|
|
10604
|
+
plumbing = convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
|
10605
|
+
items.append(plumbing)
|
10606
|
+
end
|
10607
|
+
items
|
10608
|
+
end
|
10609
|
+
|
10610
|
+
def self.convert_repeated_vault_tls_cert_ssh_store_to_porcelain(plumbings)
|
10611
|
+
items = Array.new
|
10612
|
+
plumbings.each do |plumbing|
|
10613
|
+
porcelain = convert_vault_tls_cert_ssh_store_to_porcelain(plumbing)
|
10614
|
+
items.append(porcelain)
|
10615
|
+
end
|
10616
|
+
items
|
10617
|
+
end
|
10618
|
+
def self.convert_vault_tls_cert_x_509_store_to_porcelain(plumbing)
|
10619
|
+
if plumbing == nil
|
10620
|
+
return nil
|
10621
|
+
end
|
10622
|
+
porcelain = VaultTLSCertX509Store.new()
|
10623
|
+
porcelain.ca_cert_path = (plumbing.CA_cert_path)
|
10624
|
+
porcelain.client_cert_path = (plumbing.client_cert_path)
|
10625
|
+
porcelain.client_key_path = (plumbing.client_key_path)
|
10626
|
+
porcelain.id = (plumbing.id)
|
10627
|
+
porcelain.name = (plumbing.name)
|
10628
|
+
porcelain.namespace = (plumbing.namespace)
|
10629
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
10630
|
+
porcelain.server_address = (plumbing.server_address)
|
10631
|
+
porcelain.signing_role = (plumbing.signing_role)
|
10632
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
10633
|
+
porcelain
|
10634
|
+
end
|
10635
|
+
|
10636
|
+
def self.convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
|
10637
|
+
if porcelain == nil
|
10638
|
+
return nil
|
10639
|
+
end
|
10640
|
+
plumbing = V1::VaultTLSCertX509Store.new()
|
10641
|
+
plumbing.CA_cert_path = (porcelain.ca_cert_path)
|
10642
|
+
plumbing.client_cert_path = (porcelain.client_cert_path)
|
10643
|
+
plumbing.client_key_path = (porcelain.client_key_path)
|
10644
|
+
plumbing.id = (porcelain.id)
|
10645
|
+
plumbing.name = (porcelain.name)
|
10646
|
+
plumbing.namespace = (porcelain.namespace)
|
10647
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
10648
|
+
plumbing.server_address = (porcelain.server_address)
|
10649
|
+
plumbing.signing_role = (porcelain.signing_role)
|
10650
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
10651
|
+
plumbing
|
10652
|
+
end
|
10653
|
+
def self.convert_repeated_vault_tls_cert_x_509_store_to_plumbing(porcelains)
|
10654
|
+
items = Array.new
|
10655
|
+
porcelains.each do |porcelain|
|
10656
|
+
plumbing = convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
|
10657
|
+
items.append(plumbing)
|
10658
|
+
end
|
10659
|
+
items
|
10660
|
+
end
|
10661
|
+
|
10662
|
+
def self.convert_repeated_vault_tls_cert_x_509_store_to_porcelain(plumbings)
|
10663
|
+
items = Array.new
|
10664
|
+
plumbings.each do |plumbing|
|
10665
|
+
porcelain = convert_vault_tls_cert_x_509_store_to_porcelain(plumbing)
|
10666
|
+
items.append(porcelain)
|
10667
|
+
end
|
10668
|
+
items
|
10669
|
+
end
|
10438
10670
|
def self.convert_vault_tls_store_to_porcelain(plumbing)
|
10439
10671
|
if plumbing == nil
|
10440
10672
|
return nil
|
@@ -10483,6 +10715,98 @@ module SDM
|
|
10483
10715
|
end
|
10484
10716
|
items
|
10485
10717
|
end
|
10718
|
+
def self.convert_vault_token_cert_ssh_store_to_porcelain(plumbing)
|
10719
|
+
if plumbing == nil
|
10720
|
+
return nil
|
10721
|
+
end
|
10722
|
+
porcelain = VaultTokenCertSSHStore.new()
|
10723
|
+
porcelain.id = (plumbing.id)
|
10724
|
+
porcelain.name = (plumbing.name)
|
10725
|
+
porcelain.namespace = (plumbing.namespace)
|
10726
|
+
porcelain.server_address = (plumbing.server_address)
|
10727
|
+
porcelain.signing_role = (plumbing.signing_role)
|
10728
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
10729
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
10730
|
+
porcelain
|
10731
|
+
end
|
10732
|
+
|
10733
|
+
def self.convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
|
10734
|
+
if porcelain == nil
|
10735
|
+
return nil
|
10736
|
+
end
|
10737
|
+
plumbing = V1::VaultTokenCertSSHStore.new()
|
10738
|
+
plumbing.id = (porcelain.id)
|
10739
|
+
plumbing.name = (porcelain.name)
|
10740
|
+
plumbing.namespace = (porcelain.namespace)
|
10741
|
+
plumbing.server_address = (porcelain.server_address)
|
10742
|
+
plumbing.signing_role = (porcelain.signing_role)
|
10743
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
10744
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
10745
|
+
plumbing
|
10746
|
+
end
|
10747
|
+
def self.convert_repeated_vault_token_cert_ssh_store_to_plumbing(porcelains)
|
10748
|
+
items = Array.new
|
10749
|
+
porcelains.each do |porcelain|
|
10750
|
+
plumbing = convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
|
10751
|
+
items.append(plumbing)
|
10752
|
+
end
|
10753
|
+
items
|
10754
|
+
end
|
10755
|
+
|
10756
|
+
def self.convert_repeated_vault_token_cert_ssh_store_to_porcelain(plumbings)
|
10757
|
+
items = Array.new
|
10758
|
+
plumbings.each do |plumbing|
|
10759
|
+
porcelain = convert_vault_token_cert_ssh_store_to_porcelain(plumbing)
|
10760
|
+
items.append(porcelain)
|
10761
|
+
end
|
10762
|
+
items
|
10763
|
+
end
|
10764
|
+
def self.convert_vault_token_cert_x_509_store_to_porcelain(plumbing)
|
10765
|
+
if plumbing == nil
|
10766
|
+
return nil
|
10767
|
+
end
|
10768
|
+
porcelain = VaultTokenCertX509Store.new()
|
10769
|
+
porcelain.id = (plumbing.id)
|
10770
|
+
porcelain.name = (plumbing.name)
|
10771
|
+
porcelain.namespace = (plumbing.namespace)
|
10772
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
10773
|
+
porcelain.server_address = (plumbing.server_address)
|
10774
|
+
porcelain.signing_role = (plumbing.signing_role)
|
10775
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
10776
|
+
porcelain
|
10777
|
+
end
|
10778
|
+
|
10779
|
+
def self.convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
|
10780
|
+
if porcelain == nil
|
10781
|
+
return nil
|
10782
|
+
end
|
10783
|
+
plumbing = V1::VaultTokenCertX509Store.new()
|
10784
|
+
plumbing.id = (porcelain.id)
|
10785
|
+
plumbing.name = (porcelain.name)
|
10786
|
+
plumbing.namespace = (porcelain.namespace)
|
10787
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
10788
|
+
plumbing.server_address = (porcelain.server_address)
|
10789
|
+
plumbing.signing_role = (porcelain.signing_role)
|
10790
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
10791
|
+
plumbing
|
10792
|
+
end
|
10793
|
+
def self.convert_repeated_vault_token_cert_x_509_store_to_plumbing(porcelains)
|
10794
|
+
items = Array.new
|
10795
|
+
porcelains.each do |porcelain|
|
10796
|
+
plumbing = convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
|
10797
|
+
items.append(plumbing)
|
10798
|
+
end
|
10799
|
+
items
|
10800
|
+
end
|
10801
|
+
|
10802
|
+
def self.convert_repeated_vault_token_cert_x_509_store_to_porcelain(plumbings)
|
10803
|
+
items = Array.new
|
10804
|
+
plumbings.each do |plumbing|
|
10805
|
+
porcelain = convert_vault_token_cert_x_509_store_to_porcelain(plumbing)
|
10806
|
+
items.append(porcelain)
|
10807
|
+
end
|
10808
|
+
items
|
10809
|
+
end
|
10486
10810
|
def self.convert_vault_token_store_to_porcelain(plumbing)
|
10487
10811
|
if plumbing == nil
|
10488
10812
|
return nil
|
@@ -32,8 +32,14 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
32
32
|
optional :delinea, :message, 2900, "v1.DelineaStore"
|
33
33
|
optional :gcp, :message, 201, "v1.GCPStore"
|
34
34
|
optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
|
35
|
+
optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
|
36
|
+
optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
|
35
37
|
optional :vault_tls, :message, 1, "v1.VaultTLSStore"
|
38
|
+
optional :vault_tls_cert_ssh, :message, 92, "v1.VaultTLSCertSSHStore"
|
39
|
+
optional :vault_tls_cert_x_509, :message, 93, "v1.VaultTLSCertX509Store"
|
36
40
|
optional :vault_token, :message, 2, "v1.VaultTokenStore"
|
41
|
+
optional :vault_token_cert_ssh, :message, 90, "v1.VaultTokenCertSSHStore"
|
42
|
+
optional :vault_token_cert_x_509, :message, 91, "v1.VaultTokenCertX509Store"
|
37
43
|
end
|
38
44
|
end
|
39
45
|
add_message "v1.AWSStore" do
|
@@ -86,6 +92,24 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
86
92
|
optional :server_address, :string, 3
|
87
93
|
optional :tags, :message, 8, "v1.Tags"
|
88
94
|
end
|
95
|
+
add_message "v1.VaultAppRoleCertSSHStore" do
|
96
|
+
optional :id, :string, 1
|
97
|
+
optional :name, :string, 2
|
98
|
+
optional :namespace, :string, 5
|
99
|
+
optional :server_address, :string, 3
|
100
|
+
optional :signing_role, :string, 7
|
101
|
+
optional :ssh_mount_point, :string, 6
|
102
|
+
optional :tags, :message, 8, "v1.Tags"
|
103
|
+
end
|
104
|
+
add_message "v1.VaultAppRoleCertX509Store" do
|
105
|
+
optional :id, :string, 1
|
106
|
+
optional :name, :string, 2
|
107
|
+
optional :namespace, :string, 5
|
108
|
+
optional :pki_mount_point, :string, 6
|
109
|
+
optional :server_address, :string, 3
|
110
|
+
optional :signing_role, :string, 7
|
111
|
+
optional :tags, :message, 8, "v1.Tags"
|
112
|
+
end
|
89
113
|
add_message "v1.VaultTLSStore" do
|
90
114
|
optional :id, :string, 1
|
91
115
|
optional :name, :string, 2
|
@@ -96,6 +120,30 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
96
120
|
optional :server_address, :string, 3
|
97
121
|
optional :tags, :message, 7, "v1.Tags"
|
98
122
|
end
|
123
|
+
add_message "v1.VaultTLSCertSSHStore" do
|
124
|
+
optional :id, :string, 1
|
125
|
+
optional :name, :string, 2
|
126
|
+
optional :CA_cert_path, :string, 4
|
127
|
+
optional :client_cert_path, :string, 5
|
128
|
+
optional :client_key_path, :string, 6
|
129
|
+
optional :namespace, :string, 8
|
130
|
+
optional :server_address, :string, 3
|
131
|
+
optional :signing_role, :string, 10
|
132
|
+
optional :ssh_mount_point, :string, 9
|
133
|
+
optional :tags, :message, 7, "v1.Tags"
|
134
|
+
end
|
135
|
+
add_message "v1.VaultTLSCertX509Store" do
|
136
|
+
optional :id, :string, 1
|
137
|
+
optional :name, :string, 2
|
138
|
+
optional :CA_cert_path, :string, 4
|
139
|
+
optional :client_cert_path, :string, 5
|
140
|
+
optional :client_key_path, :string, 6
|
141
|
+
optional :namespace, :string, 8
|
142
|
+
optional :pki_mount_point, :string, 9
|
143
|
+
optional :server_address, :string, 3
|
144
|
+
optional :signing_role, :string, 10
|
145
|
+
optional :tags, :message, 7, "v1.Tags"
|
146
|
+
end
|
99
147
|
add_message "v1.VaultTokenStore" do
|
100
148
|
optional :id, :string, 1
|
101
149
|
optional :name, :string, 2
|
@@ -103,6 +151,24 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
103
151
|
optional :server_address, :string, 3
|
104
152
|
optional :tags, :message, 4, "v1.Tags"
|
105
153
|
end
|
154
|
+
add_message "v1.VaultTokenCertSSHStore" do
|
155
|
+
optional :id, :string, 1
|
156
|
+
optional :name, :string, 2
|
157
|
+
optional :namespace, :string, 5
|
158
|
+
optional :server_address, :string, 3
|
159
|
+
optional :signing_role, :string, 7
|
160
|
+
optional :ssh_mount_point, :string, 6
|
161
|
+
optional :tags, :message, 4, "v1.Tags"
|
162
|
+
end
|
163
|
+
add_message "v1.VaultTokenCertX509Store" do
|
164
|
+
optional :id, :string, 1
|
165
|
+
optional :name, :string, 2
|
166
|
+
optional :namespace, :string, 5
|
167
|
+
optional :pki_mount_point, :string, 6
|
168
|
+
optional :server_address, :string, 3
|
169
|
+
optional :signing_role, :string, 7
|
170
|
+
optional :tags, :message, 4, "v1.Tags"
|
171
|
+
end
|
106
172
|
end
|
107
173
|
end
|
108
174
|
|
@@ -116,6 +182,12 @@ module V1
|
|
116
182
|
DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
|
117
183
|
GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
|
118
184
|
VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
|
185
|
+
VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
|
186
|
+
VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
|
119
187
|
VaultTLSStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSStore").msgclass
|
188
|
+
VaultTLSCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSCertSSHStore").msgclass
|
189
|
+
VaultTLSCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSCertX509Store").msgclass
|
120
190
|
VaultTokenStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenStore").msgclass
|
191
|
+
VaultTokenCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenCertSSHStore").msgclass
|
192
|
+
VaultTokenCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenCertX509Store").msgclass
|
121
193
|
end
|
data/lib/models/porcelain.rb
CHANGED
@@ -9833,6 +9833,94 @@ module SDM
|
|
9833
9833
|
end
|
9834
9834
|
end
|
9835
9835
|
|
9836
|
+
# VaultAppRoleCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
9837
|
+
class VaultAppRoleCertSSHStore
|
9838
|
+
# Unique identifier of the SecretStore.
|
9839
|
+
attr_accessor :id
|
9840
|
+
# Unique human-readable name of the SecretStore.
|
9841
|
+
attr_accessor :name
|
9842
|
+
# The namespace to make requests within
|
9843
|
+
attr_accessor :namespace
|
9844
|
+
# The URL of the Vault to target
|
9845
|
+
attr_accessor :server_address
|
9846
|
+
# The signing role to be used for signing certificates
|
9847
|
+
attr_accessor :signing_role
|
9848
|
+
# The mount point of the SSH engine configured with the desired CA
|
9849
|
+
attr_accessor :ssh_mount_point
|
9850
|
+
# Tags is a map of key, value pairs.
|
9851
|
+
attr_accessor :tags
|
9852
|
+
|
9853
|
+
def initialize(
|
9854
|
+
id: nil,
|
9855
|
+
name: nil,
|
9856
|
+
namespace: nil,
|
9857
|
+
server_address: nil,
|
9858
|
+
signing_role: nil,
|
9859
|
+
ssh_mount_point: nil,
|
9860
|
+
tags: nil
|
9861
|
+
)
|
9862
|
+
@id = id == nil ? "" : id
|
9863
|
+
@name = name == nil ? "" : name
|
9864
|
+
@namespace = namespace == nil ? "" : namespace
|
9865
|
+
@server_address = server_address == nil ? "" : server_address
|
9866
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
9867
|
+
@ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
|
9868
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
9869
|
+
end
|
9870
|
+
|
9871
|
+
def to_json(options = {})
|
9872
|
+
hash = {}
|
9873
|
+
self.instance_variables.each do |var|
|
9874
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
9875
|
+
end
|
9876
|
+
hash.to_json
|
9877
|
+
end
|
9878
|
+
end
|
9879
|
+
|
9880
|
+
# VaultAppRoleCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
9881
|
+
class VaultAppRoleCertX509Store
|
9882
|
+
# Unique identifier of the SecretStore.
|
9883
|
+
attr_accessor :id
|
9884
|
+
# Unique human-readable name of the SecretStore.
|
9885
|
+
attr_accessor :name
|
9886
|
+
# The namespace to make requests within
|
9887
|
+
attr_accessor :namespace
|
9888
|
+
# The mount point of the PKI engine configured with the desired CA
|
9889
|
+
attr_accessor :pki_mount_point
|
9890
|
+
# The URL of the Vault to target
|
9891
|
+
attr_accessor :server_address
|
9892
|
+
# The signing role to be used for signing certificates
|
9893
|
+
attr_accessor :signing_role
|
9894
|
+
# Tags is a map of key, value pairs.
|
9895
|
+
attr_accessor :tags
|
9896
|
+
|
9897
|
+
def initialize(
|
9898
|
+
id: nil,
|
9899
|
+
name: nil,
|
9900
|
+
namespace: nil,
|
9901
|
+
pki_mount_point: nil,
|
9902
|
+
server_address: nil,
|
9903
|
+
signing_role: nil,
|
9904
|
+
tags: nil
|
9905
|
+
)
|
9906
|
+
@id = id == nil ? "" : id
|
9907
|
+
@name = name == nil ? "" : name
|
9908
|
+
@namespace = namespace == nil ? "" : namespace
|
9909
|
+
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
9910
|
+
@server_address = server_address == nil ? "" : server_address
|
9911
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
9912
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
9913
|
+
end
|
9914
|
+
|
9915
|
+
def to_json(options = {})
|
9916
|
+
hash = {}
|
9917
|
+
self.instance_variables.each do |var|
|
9918
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
9919
|
+
end
|
9920
|
+
hash.to_json
|
9921
|
+
end
|
9922
|
+
end
|
9923
|
+
|
9836
9924
|
class VaultAppRoleStore
|
9837
9925
|
# Unique identifier of the SecretStore.
|
9838
9926
|
attr_accessor :id
|
@@ -9868,6 +9956,118 @@ module SDM
|
|
9868
9956
|
end
|
9869
9957
|
end
|
9870
9958
|
|
9959
|
+
# VaultTLSCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
9960
|
+
class VaultTLSCertSSHStore
|
9961
|
+
# A path to a CA file accessible by a Node
|
9962
|
+
attr_accessor :ca_cert_path
|
9963
|
+
# A path to a client certificate file accessible by a Node
|
9964
|
+
attr_accessor :client_cert_path
|
9965
|
+
# A path to a client key file accessible by a Node
|
9966
|
+
attr_accessor :client_key_path
|
9967
|
+
# Unique identifier of the SecretStore.
|
9968
|
+
attr_accessor :id
|
9969
|
+
# Unique human-readable name of the SecretStore.
|
9970
|
+
attr_accessor :name
|
9971
|
+
# The namespace to make requests within
|
9972
|
+
attr_accessor :namespace
|
9973
|
+
# The URL of the Vault to target
|
9974
|
+
attr_accessor :server_address
|
9975
|
+
# The signing role to be used for signing certificates
|
9976
|
+
attr_accessor :signing_role
|
9977
|
+
# The mount point of the SSH engine configured with the desired CA
|
9978
|
+
attr_accessor :ssh_mount_point
|
9979
|
+
# Tags is a map of key, value pairs.
|
9980
|
+
attr_accessor :tags
|
9981
|
+
|
9982
|
+
def initialize(
|
9983
|
+
ca_cert_path: nil,
|
9984
|
+
client_cert_path: nil,
|
9985
|
+
client_key_path: nil,
|
9986
|
+
id: nil,
|
9987
|
+
name: nil,
|
9988
|
+
namespace: nil,
|
9989
|
+
server_address: nil,
|
9990
|
+
signing_role: nil,
|
9991
|
+
ssh_mount_point: nil,
|
9992
|
+
tags: nil
|
9993
|
+
)
|
9994
|
+
@ca_cert_path = ca_cert_path == nil ? "" : ca_cert_path
|
9995
|
+
@client_cert_path = client_cert_path == nil ? "" : client_cert_path
|
9996
|
+
@client_key_path = client_key_path == nil ? "" : client_key_path
|
9997
|
+
@id = id == nil ? "" : id
|
9998
|
+
@name = name == nil ? "" : name
|
9999
|
+
@namespace = namespace == nil ? "" : namespace
|
10000
|
+
@server_address = server_address == nil ? "" : server_address
|
10001
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
10002
|
+
@ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
|
10003
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
10004
|
+
end
|
10005
|
+
|
10006
|
+
def to_json(options = {})
|
10007
|
+
hash = {}
|
10008
|
+
self.instance_variables.each do |var|
|
10009
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
10010
|
+
end
|
10011
|
+
hash.to_json
|
10012
|
+
end
|
10013
|
+
end
|
10014
|
+
|
10015
|
+
# VaultTLSCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10016
|
+
class VaultTLSCertX509Store
|
10017
|
+
# A path to a CA file accessible by a Node
|
10018
|
+
attr_accessor :ca_cert_path
|
10019
|
+
# A path to a client certificate file accessible by a Node
|
10020
|
+
attr_accessor :client_cert_path
|
10021
|
+
# A path to a client key file accessible by a Node
|
10022
|
+
attr_accessor :client_key_path
|
10023
|
+
# Unique identifier of the SecretStore.
|
10024
|
+
attr_accessor :id
|
10025
|
+
# Unique human-readable name of the SecretStore.
|
10026
|
+
attr_accessor :name
|
10027
|
+
# The namespace to make requests within
|
10028
|
+
attr_accessor :namespace
|
10029
|
+
# The mount point of the PKI engine configured with the desired CA
|
10030
|
+
attr_accessor :pki_mount_point
|
10031
|
+
# The URL of the Vault to target
|
10032
|
+
attr_accessor :server_address
|
10033
|
+
# The signing role to be used for signing certificates
|
10034
|
+
attr_accessor :signing_role
|
10035
|
+
# Tags is a map of key, value pairs.
|
10036
|
+
attr_accessor :tags
|
10037
|
+
|
10038
|
+
def initialize(
|
10039
|
+
ca_cert_path: nil,
|
10040
|
+
client_cert_path: nil,
|
10041
|
+
client_key_path: nil,
|
10042
|
+
id: nil,
|
10043
|
+
name: nil,
|
10044
|
+
namespace: nil,
|
10045
|
+
pki_mount_point: nil,
|
10046
|
+
server_address: nil,
|
10047
|
+
signing_role: nil,
|
10048
|
+
tags: nil
|
10049
|
+
)
|
10050
|
+
@ca_cert_path = ca_cert_path == nil ? "" : ca_cert_path
|
10051
|
+
@client_cert_path = client_cert_path == nil ? "" : client_cert_path
|
10052
|
+
@client_key_path = client_key_path == nil ? "" : client_key_path
|
10053
|
+
@id = id == nil ? "" : id
|
10054
|
+
@name = name == nil ? "" : name
|
10055
|
+
@namespace = namespace == nil ? "" : namespace
|
10056
|
+
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
10057
|
+
@server_address = server_address == nil ? "" : server_address
|
10058
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
10059
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
10060
|
+
end
|
10061
|
+
|
10062
|
+
def to_json(options = {})
|
10063
|
+
hash = {}
|
10064
|
+
self.instance_variables.each do |var|
|
10065
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
10066
|
+
end
|
10067
|
+
hash.to_json
|
10068
|
+
end
|
10069
|
+
end
|
10070
|
+
|
9871
10071
|
class VaultTLSStore
|
9872
10072
|
# A path to a CA file accessible by a Node
|
9873
10073
|
attr_accessor :ca_cert_path
|
@@ -9915,6 +10115,94 @@ module SDM
|
|
9915
10115
|
end
|
9916
10116
|
end
|
9917
10117
|
|
10118
|
+
# VaultTokenCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10119
|
+
class VaultTokenCertSSHStore
|
10120
|
+
# Unique identifier of the SecretStore.
|
10121
|
+
attr_accessor :id
|
10122
|
+
# Unique human-readable name of the SecretStore.
|
10123
|
+
attr_accessor :name
|
10124
|
+
# The namespace to make requests within
|
10125
|
+
attr_accessor :namespace
|
10126
|
+
# The URL of the Vault to target
|
10127
|
+
attr_accessor :server_address
|
10128
|
+
# The signing role to be used for signing certificates
|
10129
|
+
attr_accessor :signing_role
|
10130
|
+
# The mount point of the SSH engine configured with the desired CA
|
10131
|
+
attr_accessor :ssh_mount_point
|
10132
|
+
# Tags is a map of key, value pairs.
|
10133
|
+
attr_accessor :tags
|
10134
|
+
|
10135
|
+
def initialize(
|
10136
|
+
id: nil,
|
10137
|
+
name: nil,
|
10138
|
+
namespace: nil,
|
10139
|
+
server_address: nil,
|
10140
|
+
signing_role: nil,
|
10141
|
+
ssh_mount_point: nil,
|
10142
|
+
tags: nil
|
10143
|
+
)
|
10144
|
+
@id = id == nil ? "" : id
|
10145
|
+
@name = name == nil ? "" : name
|
10146
|
+
@namespace = namespace == nil ? "" : namespace
|
10147
|
+
@server_address = server_address == nil ? "" : server_address
|
10148
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
10149
|
+
@ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
|
10150
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
10151
|
+
end
|
10152
|
+
|
10153
|
+
def to_json(options = {})
|
10154
|
+
hash = {}
|
10155
|
+
self.instance_variables.each do |var|
|
10156
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
10157
|
+
end
|
10158
|
+
hash.to_json
|
10159
|
+
end
|
10160
|
+
end
|
10161
|
+
|
10162
|
+
# VaultTokenCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10163
|
+
class VaultTokenCertX509Store
|
10164
|
+
# Unique identifier of the SecretStore.
|
10165
|
+
attr_accessor :id
|
10166
|
+
# Unique human-readable name of the SecretStore.
|
10167
|
+
attr_accessor :name
|
10168
|
+
# The namespace to make requests within
|
10169
|
+
attr_accessor :namespace
|
10170
|
+
# The mount point of the PKI engine configured with the desired CA
|
10171
|
+
attr_accessor :pki_mount_point
|
10172
|
+
# The URL of the Vault to target
|
10173
|
+
attr_accessor :server_address
|
10174
|
+
# The signing role to be used for signing certificates
|
10175
|
+
attr_accessor :signing_role
|
10176
|
+
# Tags is a map of key, value pairs.
|
10177
|
+
attr_accessor :tags
|
10178
|
+
|
10179
|
+
def initialize(
|
10180
|
+
id: nil,
|
10181
|
+
name: nil,
|
10182
|
+
namespace: nil,
|
10183
|
+
pki_mount_point: nil,
|
10184
|
+
server_address: nil,
|
10185
|
+
signing_role: nil,
|
10186
|
+
tags: nil
|
10187
|
+
)
|
10188
|
+
@id = id == nil ? "" : id
|
10189
|
+
@name = name == nil ? "" : name
|
10190
|
+
@namespace = namespace == nil ? "" : namespace
|
10191
|
+
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
10192
|
+
@server_address = server_address == nil ? "" : server_address
|
10193
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
10194
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
10195
|
+
end
|
10196
|
+
|
10197
|
+
def to_json(options = {})
|
10198
|
+
hash = {}
|
10199
|
+
self.instance_variables.each do |var|
|
10200
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
10201
|
+
end
|
10202
|
+
hash.to_json
|
10203
|
+
end
|
10204
|
+
end
|
10205
|
+
|
9918
10206
|
class VaultTokenStore
|
9919
10207
|
# Unique identifier of the SecretStore.
|
9920
10208
|
attr_accessor :id
|
data/lib/strongdm.rb
CHANGED
@@ -29,7 +29,7 @@ module SDM #:nodoc:
|
|
29
29
|
DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
|
30
30
|
DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
|
31
31
|
API_VERSION = "2021-08-23"
|
32
|
-
USER_AGENT = "strongdm-sdk-ruby/6.3.
|
32
|
+
USER_AGENT = "strongdm-sdk-ruby/6.3.1"
|
33
33
|
private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
|
34
34
|
|
35
35
|
# Creates a new strongDM API client.
|
data/lib/svc.rb
CHANGED
@@ -3763,8 +3763,14 @@ module SDM #:nodoc:
|
|
3763
3763
|
# {DelineaStore}
|
3764
3764
|
# {GCPStore}
|
3765
3765
|
# {VaultAppRoleStore}
|
3766
|
+
# {VaultAppRoleCertSSHStore}
|
3767
|
+
# {VaultAppRoleCertX509Store}
|
3766
3768
|
# {VaultTLSStore}
|
3769
|
+
# {VaultTLSCertSSHStore}
|
3770
|
+
# {VaultTLSCertX509Store}
|
3767
3771
|
# {VaultTokenStore}
|
3772
|
+
# {VaultTokenCertSSHStore}
|
3773
|
+
# {VaultTokenCertX509Store}
|
3768
3774
|
class SecretStores
|
3769
3775
|
extend Gem::Deprecate
|
3770
3776
|
|
data/lib/version
CHANGED
data/lib/version.rb
CHANGED
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: strongdm
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 6.3.
|
4
|
+
version: 6.3.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- strongDM Team
|
@@ -81,8 +81,8 @@ files:
|
|
81
81
|
- "./.git/logs/HEAD"
|
82
82
|
- "./.git/logs/refs/heads/master"
|
83
83
|
- "./.git/logs/refs/remotes/origin/HEAD"
|
84
|
-
- "./.git/objects/pack/pack-
|
85
|
-
- "./.git/objects/pack/pack-
|
84
|
+
- "./.git/objects/pack/pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.idx"
|
85
|
+
- "./.git/objects/pack/pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.pack"
|
86
86
|
- "./.git/packed-refs"
|
87
87
|
- "./.git/refs/heads/master"
|
88
88
|
- "./.git/refs/remotes/origin/HEAD"
|