strongdm 6.3.0 → 6.3.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 526ac91fc752ec31eadddb747f4fd3288e0606ac07036913e0040b2789f59260
4
- data.tar.gz: 6848e19adbe420ab7dc09d5aa1e53677fe6fb3012ebce67b968c41b35a6e274a
3
+ metadata.gz: cc7306aea1eca0729a25187d1a302d86b6550d6f09ac9be7c4ec4f7f7bc4d00b
4
+ data.tar.gz: 63e886822320f0f357df5d222e7bdd7a8955b120df25ada378a80ecd57ce4203
5
5
  SHA512:
6
- metadata.gz: 7efe1e6bba5e718bd6b6cf78370c9931f8aa42da305b160c6c0c0714960f90209ba815e6637be0e62ed7c5c8a099cf07a7609454068aa1fc5689dc9fa357a0b5
7
- data.tar.gz: 3c08acf70d911a4816dc454279e6a03031dba21a5d521e5ccfcb4383270460afdb58bf8899226cd5dc8caca1c8fe837f4e356925cb08aaae0261af81be285285
6
+ metadata.gz: cc96479400b7be955e2647aff3f13d95bf5c5446bacb88f7dee356f5c98e3b0c7ef392147ad0b46384ea15a335cb33b1890e5bffdacb11bf1a8d91ce2ffa9889
7
+ data.tar.gz: 1d1035ab4594cc376b92863906f81a0a20ba11441e8eee17eaeca209c799f77e14c627b753c979159637872d766b6d81380b823f42b4be6d88fbd017822c35f8
data/.git/ORIG_HEAD CHANGED
@@ -1 +1 @@
1
- f4af6ebad8174f8e5aeec63536db9290597a3982
1
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149
data/.git/index CHANGED
Binary file
data/.git/logs/HEAD CHANGED
@@ -1,3 +1,3 @@
1
- 0000000000000000000000000000000000000000 f4af6ebad8174f8e5aeec63536db9290597a3982 sdmrelease <support@strongdm.com> 1706204253 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- f4af6ebad8174f8e5aeec63536db9290597a3982 f4af6ebad8174f8e5aeec63536db9290597a3982 sdmrelease <support@strongdm.com> 1706204253 +0000 checkout: moving from master to master
3
- f4af6ebad8174f8e5aeec63536db9290597a3982 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706204253 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 checkout: moving from master to master
3
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149 3ca1e977d66e0fb0232024c33a223a789453031c sdmrelease <support@strongdm.com> 1706211540 +0000 merge origin/development: Fast-forward
@@ -1,2 +1,2 @@
1
- 0000000000000000000000000000000000000000 f4af6ebad8174f8e5aeec63536db9290597a3982 sdmrelease <support@strongdm.com> 1706204253 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- f4af6ebad8174f8e5aeec63536db9290597a3982 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706204253 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149 3ca1e977d66e0fb0232024c33a223a789453031c sdmrelease <support@strongdm.com> 1706211540 +0000 merge origin/development: Fast-forward
@@ -1 +1 @@
1
- 0000000000000000000000000000000000000000 f4af6ebad8174f8e5aeec63536db9290597a3982 sdmrelease <support@strongdm.com> 1706204253 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
1
+ 0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
data/.git/packed-refs CHANGED
@@ -1,6 +1,6 @@
1
1
  # pack-refs with: peeled fully-peeled sorted
2
- 59ba0e6392d2e7f5f4c053e663766157c9a9b149 refs/remotes/origin/development
3
- f4af6ebad8174f8e5aeec63536db9290597a3982 refs/remotes/origin/master
2
+ 3ca1e977d66e0fb0232024c33a223a789453031c refs/remotes/origin/development
3
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149 refs/remotes/origin/master
4
4
  2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
5
5
  04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
6
6
  6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
@@ -93,3 +93,4 @@ da1cd910d138b56624af0d2fa2d92d8acec5edca refs/tags/v6.0.1
93
93
  296fd9e80fd98a5dd3dcaaccde49e33ea5578967 refs/tags/v6.1.0
94
94
  d8f6c24d93d0cf5e48ccc7bf7a5ead950a7b0614 refs/tags/v6.2.0
95
95
  f4af6ebad8174f8e5aeec63536db9290597a3982 refs/tags/v6.2.1
96
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149 refs/tags/v6.3.0
@@ -1 +1 @@
1
- 59ba0e6392d2e7f5f4c053e663766157c9a9b149
1
+ 3ca1e977d66e0fb0232024c33a223a789453031c
data/lib/grpc/plumbing.rb CHANGED
@@ -9449,12 +9449,30 @@ module SDM
9449
9449
  if porcelain.instance_of? VaultAppRoleStore
9450
9450
  plumbing.vault_app_role = convert_vault_app_role_store_to_plumbing(porcelain)
9451
9451
  end
9452
+ if porcelain.instance_of? VaultAppRoleCertSSHStore
9453
+ plumbing.vault_app_role_cert_ssh = convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
9454
+ end
9455
+ if porcelain.instance_of? VaultAppRoleCertX509Store
9456
+ plumbing.vault_app_role_cert_x_509 = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
9457
+ end
9452
9458
  if porcelain.instance_of? VaultTLSStore
9453
9459
  plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
9454
9460
  end
9461
+ if porcelain.instance_of? VaultTLSCertSSHStore
9462
+ plumbing.vault_tls_cert_ssh = convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
9463
+ end
9464
+ if porcelain.instance_of? VaultTLSCertX509Store
9465
+ plumbing.vault_tls_cert_x_509 = convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
9466
+ end
9455
9467
  if porcelain.instance_of? VaultTokenStore
9456
9468
  plumbing.vault_token = convert_vault_token_store_to_plumbing(porcelain)
9457
9469
  end
9470
+ if porcelain.instance_of? VaultTokenCertSSHStore
9471
+ plumbing.vault_token_cert_ssh = convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
9472
+ end
9473
+ if porcelain.instance_of? VaultTokenCertX509Store
9474
+ plumbing.vault_token_cert_x_509 = convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
9475
+ end
9458
9476
  plumbing
9459
9477
  end
9460
9478
 
@@ -9486,12 +9504,30 @@ module SDM
9486
9504
  if plumbing.vault_app_role != nil
9487
9505
  return convert_vault_app_role_store_to_porcelain(plumbing.vault_app_role)
9488
9506
  end
9507
+ if plumbing.vault_app_role_cert_ssh != nil
9508
+ return convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing.vault_app_role_cert_ssh)
9509
+ end
9510
+ if plumbing.vault_app_role_cert_x_509 != nil
9511
+ return convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing.vault_app_role_cert_x_509)
9512
+ end
9489
9513
  if plumbing.vault_tls != nil
9490
9514
  return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
9491
9515
  end
9516
+ if plumbing.vault_tls_cert_ssh != nil
9517
+ return convert_vault_tls_cert_ssh_store_to_porcelain(plumbing.vault_tls_cert_ssh)
9518
+ end
9519
+ if plumbing.vault_tls_cert_x_509 != nil
9520
+ return convert_vault_tls_cert_x_509_store_to_porcelain(plumbing.vault_tls_cert_x_509)
9521
+ end
9492
9522
  if plumbing.vault_token != nil
9493
9523
  return convert_vault_token_store_to_porcelain(plumbing.vault_token)
9494
9524
  end
9525
+ if plumbing.vault_token_cert_ssh != nil
9526
+ return convert_vault_token_cert_ssh_store_to_porcelain(plumbing.vault_token_cert_ssh)
9527
+ end
9528
+ if plumbing.vault_token_cert_x_509 != nil
9529
+ return convert_vault_token_cert_x_509_store_to_porcelain(plumbing.vault_token_cert_x_509)
9530
+ end
9495
9531
  raise UnknownError.new("unknown polymorphic type, please upgrade your SDK")
9496
9532
  end
9497
9533
  def self.convert_repeated_secret_store_to_plumbing(porcelains)
@@ -10393,6 +10429,98 @@ module SDM
10393
10429
  end
10394
10430
  items
10395
10431
  end
10432
+ def self.convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
10433
+ if plumbing == nil
10434
+ return nil
10435
+ end
10436
+ porcelain = VaultAppRoleCertSSHStore.new()
10437
+ porcelain.id = (plumbing.id)
10438
+ porcelain.name = (plumbing.name)
10439
+ porcelain.namespace = (plumbing.namespace)
10440
+ porcelain.server_address = (plumbing.server_address)
10441
+ porcelain.signing_role = (plumbing.signing_role)
10442
+ porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
10443
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10444
+ porcelain
10445
+ end
10446
+
10447
+ def self.convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
10448
+ if porcelain == nil
10449
+ return nil
10450
+ end
10451
+ plumbing = V1::VaultAppRoleCertSSHStore.new()
10452
+ plumbing.id = (porcelain.id)
10453
+ plumbing.name = (porcelain.name)
10454
+ plumbing.namespace = (porcelain.namespace)
10455
+ plumbing.server_address = (porcelain.server_address)
10456
+ plumbing.signing_role = (porcelain.signing_role)
10457
+ plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
10458
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10459
+ plumbing
10460
+ end
10461
+ def self.convert_repeated_vault_app_role_cert_ssh_store_to_plumbing(porcelains)
10462
+ items = Array.new
10463
+ porcelains.each do |porcelain|
10464
+ plumbing = convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
10465
+ items.append(plumbing)
10466
+ end
10467
+ items
10468
+ end
10469
+
10470
+ def self.convert_repeated_vault_app_role_cert_ssh_store_to_porcelain(plumbings)
10471
+ items = Array.new
10472
+ plumbings.each do |plumbing|
10473
+ porcelain = convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
10474
+ items.append(porcelain)
10475
+ end
10476
+ items
10477
+ end
10478
+ def self.convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing)
10479
+ if plumbing == nil
10480
+ return nil
10481
+ end
10482
+ porcelain = VaultAppRoleCertX509Store.new()
10483
+ porcelain.id = (plumbing.id)
10484
+ porcelain.name = (plumbing.name)
10485
+ porcelain.namespace = (plumbing.namespace)
10486
+ porcelain.pki_mount_point = (plumbing.pki_mount_point)
10487
+ porcelain.server_address = (plumbing.server_address)
10488
+ porcelain.signing_role = (plumbing.signing_role)
10489
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10490
+ porcelain
10491
+ end
10492
+
10493
+ def self.convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
10494
+ if porcelain == nil
10495
+ return nil
10496
+ end
10497
+ plumbing = V1::VaultAppRoleCertX509Store.new()
10498
+ plumbing.id = (porcelain.id)
10499
+ plumbing.name = (porcelain.name)
10500
+ plumbing.namespace = (porcelain.namespace)
10501
+ plumbing.pki_mount_point = (porcelain.pki_mount_point)
10502
+ plumbing.server_address = (porcelain.server_address)
10503
+ plumbing.signing_role = (porcelain.signing_role)
10504
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10505
+ plumbing
10506
+ end
10507
+ def self.convert_repeated_vault_app_role_cert_x_509_store_to_plumbing(porcelains)
10508
+ items = Array.new
10509
+ porcelains.each do |porcelain|
10510
+ plumbing = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
10511
+ items.append(plumbing)
10512
+ end
10513
+ items
10514
+ end
10515
+
10516
+ def self.convert_repeated_vault_app_role_cert_x_509_store_to_porcelain(plumbings)
10517
+ items = Array.new
10518
+ plumbings.each do |plumbing|
10519
+ porcelain = convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing)
10520
+ items.append(porcelain)
10521
+ end
10522
+ items
10523
+ end
10396
10524
  def self.convert_vault_app_role_store_to_porcelain(plumbing)
10397
10525
  if plumbing == nil
10398
10526
  return nil
@@ -10435,6 +10563,110 @@ module SDM
10435
10563
  end
10436
10564
  items
10437
10565
  end
10566
+ def self.convert_vault_tls_cert_ssh_store_to_porcelain(plumbing)
10567
+ if plumbing == nil
10568
+ return nil
10569
+ end
10570
+ porcelain = VaultTLSCertSSHStore.new()
10571
+ porcelain.ca_cert_path = (plumbing.CA_cert_path)
10572
+ porcelain.client_cert_path = (plumbing.client_cert_path)
10573
+ porcelain.client_key_path = (plumbing.client_key_path)
10574
+ porcelain.id = (plumbing.id)
10575
+ porcelain.name = (plumbing.name)
10576
+ porcelain.namespace = (plumbing.namespace)
10577
+ porcelain.server_address = (plumbing.server_address)
10578
+ porcelain.signing_role = (plumbing.signing_role)
10579
+ porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
10580
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10581
+ porcelain
10582
+ end
10583
+
10584
+ def self.convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
10585
+ if porcelain == nil
10586
+ return nil
10587
+ end
10588
+ plumbing = V1::VaultTLSCertSSHStore.new()
10589
+ plumbing.CA_cert_path = (porcelain.ca_cert_path)
10590
+ plumbing.client_cert_path = (porcelain.client_cert_path)
10591
+ plumbing.client_key_path = (porcelain.client_key_path)
10592
+ plumbing.id = (porcelain.id)
10593
+ plumbing.name = (porcelain.name)
10594
+ plumbing.namespace = (porcelain.namespace)
10595
+ plumbing.server_address = (porcelain.server_address)
10596
+ plumbing.signing_role = (porcelain.signing_role)
10597
+ plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
10598
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10599
+ plumbing
10600
+ end
10601
+ def self.convert_repeated_vault_tls_cert_ssh_store_to_plumbing(porcelains)
10602
+ items = Array.new
10603
+ porcelains.each do |porcelain|
10604
+ plumbing = convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
10605
+ items.append(plumbing)
10606
+ end
10607
+ items
10608
+ end
10609
+
10610
+ def self.convert_repeated_vault_tls_cert_ssh_store_to_porcelain(plumbings)
10611
+ items = Array.new
10612
+ plumbings.each do |plumbing|
10613
+ porcelain = convert_vault_tls_cert_ssh_store_to_porcelain(plumbing)
10614
+ items.append(porcelain)
10615
+ end
10616
+ items
10617
+ end
10618
+ def self.convert_vault_tls_cert_x_509_store_to_porcelain(plumbing)
10619
+ if plumbing == nil
10620
+ return nil
10621
+ end
10622
+ porcelain = VaultTLSCertX509Store.new()
10623
+ porcelain.ca_cert_path = (plumbing.CA_cert_path)
10624
+ porcelain.client_cert_path = (plumbing.client_cert_path)
10625
+ porcelain.client_key_path = (plumbing.client_key_path)
10626
+ porcelain.id = (plumbing.id)
10627
+ porcelain.name = (plumbing.name)
10628
+ porcelain.namespace = (plumbing.namespace)
10629
+ porcelain.pki_mount_point = (plumbing.pki_mount_point)
10630
+ porcelain.server_address = (plumbing.server_address)
10631
+ porcelain.signing_role = (plumbing.signing_role)
10632
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10633
+ porcelain
10634
+ end
10635
+
10636
+ def self.convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
10637
+ if porcelain == nil
10638
+ return nil
10639
+ end
10640
+ plumbing = V1::VaultTLSCertX509Store.new()
10641
+ plumbing.CA_cert_path = (porcelain.ca_cert_path)
10642
+ plumbing.client_cert_path = (porcelain.client_cert_path)
10643
+ plumbing.client_key_path = (porcelain.client_key_path)
10644
+ plumbing.id = (porcelain.id)
10645
+ plumbing.name = (porcelain.name)
10646
+ plumbing.namespace = (porcelain.namespace)
10647
+ plumbing.pki_mount_point = (porcelain.pki_mount_point)
10648
+ plumbing.server_address = (porcelain.server_address)
10649
+ plumbing.signing_role = (porcelain.signing_role)
10650
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10651
+ plumbing
10652
+ end
10653
+ def self.convert_repeated_vault_tls_cert_x_509_store_to_plumbing(porcelains)
10654
+ items = Array.new
10655
+ porcelains.each do |porcelain|
10656
+ plumbing = convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
10657
+ items.append(plumbing)
10658
+ end
10659
+ items
10660
+ end
10661
+
10662
+ def self.convert_repeated_vault_tls_cert_x_509_store_to_porcelain(plumbings)
10663
+ items = Array.new
10664
+ plumbings.each do |plumbing|
10665
+ porcelain = convert_vault_tls_cert_x_509_store_to_porcelain(plumbing)
10666
+ items.append(porcelain)
10667
+ end
10668
+ items
10669
+ end
10438
10670
  def self.convert_vault_tls_store_to_porcelain(plumbing)
10439
10671
  if plumbing == nil
10440
10672
  return nil
@@ -10483,6 +10715,98 @@ module SDM
10483
10715
  end
10484
10716
  items
10485
10717
  end
10718
+ def self.convert_vault_token_cert_ssh_store_to_porcelain(plumbing)
10719
+ if plumbing == nil
10720
+ return nil
10721
+ end
10722
+ porcelain = VaultTokenCertSSHStore.new()
10723
+ porcelain.id = (plumbing.id)
10724
+ porcelain.name = (plumbing.name)
10725
+ porcelain.namespace = (plumbing.namespace)
10726
+ porcelain.server_address = (plumbing.server_address)
10727
+ porcelain.signing_role = (plumbing.signing_role)
10728
+ porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
10729
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10730
+ porcelain
10731
+ end
10732
+
10733
+ def self.convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
10734
+ if porcelain == nil
10735
+ return nil
10736
+ end
10737
+ plumbing = V1::VaultTokenCertSSHStore.new()
10738
+ plumbing.id = (porcelain.id)
10739
+ plumbing.name = (porcelain.name)
10740
+ plumbing.namespace = (porcelain.namespace)
10741
+ plumbing.server_address = (porcelain.server_address)
10742
+ plumbing.signing_role = (porcelain.signing_role)
10743
+ plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
10744
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10745
+ plumbing
10746
+ end
10747
+ def self.convert_repeated_vault_token_cert_ssh_store_to_plumbing(porcelains)
10748
+ items = Array.new
10749
+ porcelains.each do |porcelain|
10750
+ plumbing = convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
10751
+ items.append(plumbing)
10752
+ end
10753
+ items
10754
+ end
10755
+
10756
+ def self.convert_repeated_vault_token_cert_ssh_store_to_porcelain(plumbings)
10757
+ items = Array.new
10758
+ plumbings.each do |plumbing|
10759
+ porcelain = convert_vault_token_cert_ssh_store_to_porcelain(plumbing)
10760
+ items.append(porcelain)
10761
+ end
10762
+ items
10763
+ end
10764
+ def self.convert_vault_token_cert_x_509_store_to_porcelain(plumbing)
10765
+ if plumbing == nil
10766
+ return nil
10767
+ end
10768
+ porcelain = VaultTokenCertX509Store.new()
10769
+ porcelain.id = (plumbing.id)
10770
+ porcelain.name = (plumbing.name)
10771
+ porcelain.namespace = (plumbing.namespace)
10772
+ porcelain.pki_mount_point = (plumbing.pki_mount_point)
10773
+ porcelain.server_address = (plumbing.server_address)
10774
+ porcelain.signing_role = (plumbing.signing_role)
10775
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10776
+ porcelain
10777
+ end
10778
+
10779
+ def self.convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
10780
+ if porcelain == nil
10781
+ return nil
10782
+ end
10783
+ plumbing = V1::VaultTokenCertX509Store.new()
10784
+ plumbing.id = (porcelain.id)
10785
+ plumbing.name = (porcelain.name)
10786
+ plumbing.namespace = (porcelain.namespace)
10787
+ plumbing.pki_mount_point = (porcelain.pki_mount_point)
10788
+ plumbing.server_address = (porcelain.server_address)
10789
+ plumbing.signing_role = (porcelain.signing_role)
10790
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10791
+ plumbing
10792
+ end
10793
+ def self.convert_repeated_vault_token_cert_x_509_store_to_plumbing(porcelains)
10794
+ items = Array.new
10795
+ porcelains.each do |porcelain|
10796
+ plumbing = convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
10797
+ items.append(plumbing)
10798
+ end
10799
+ items
10800
+ end
10801
+
10802
+ def self.convert_repeated_vault_token_cert_x_509_store_to_porcelain(plumbings)
10803
+ items = Array.new
10804
+ plumbings.each do |plumbing|
10805
+ porcelain = convert_vault_token_cert_x_509_store_to_porcelain(plumbing)
10806
+ items.append(porcelain)
10807
+ end
10808
+ items
10809
+ end
10486
10810
  def self.convert_vault_token_store_to_porcelain(plumbing)
10487
10811
  if plumbing == nil
10488
10812
  return nil
@@ -32,8 +32,14 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
32
32
  optional :delinea, :message, 2900, "v1.DelineaStore"
33
33
  optional :gcp, :message, 201, "v1.GCPStore"
34
34
  optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
35
+ optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
36
+ optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
35
37
  optional :vault_tls, :message, 1, "v1.VaultTLSStore"
38
+ optional :vault_tls_cert_ssh, :message, 92, "v1.VaultTLSCertSSHStore"
39
+ optional :vault_tls_cert_x_509, :message, 93, "v1.VaultTLSCertX509Store"
36
40
  optional :vault_token, :message, 2, "v1.VaultTokenStore"
41
+ optional :vault_token_cert_ssh, :message, 90, "v1.VaultTokenCertSSHStore"
42
+ optional :vault_token_cert_x_509, :message, 91, "v1.VaultTokenCertX509Store"
37
43
  end
38
44
  end
39
45
  add_message "v1.AWSStore" do
@@ -86,6 +92,24 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
86
92
  optional :server_address, :string, 3
87
93
  optional :tags, :message, 8, "v1.Tags"
88
94
  end
95
+ add_message "v1.VaultAppRoleCertSSHStore" do
96
+ optional :id, :string, 1
97
+ optional :name, :string, 2
98
+ optional :namespace, :string, 5
99
+ optional :server_address, :string, 3
100
+ optional :signing_role, :string, 7
101
+ optional :ssh_mount_point, :string, 6
102
+ optional :tags, :message, 8, "v1.Tags"
103
+ end
104
+ add_message "v1.VaultAppRoleCertX509Store" do
105
+ optional :id, :string, 1
106
+ optional :name, :string, 2
107
+ optional :namespace, :string, 5
108
+ optional :pki_mount_point, :string, 6
109
+ optional :server_address, :string, 3
110
+ optional :signing_role, :string, 7
111
+ optional :tags, :message, 8, "v1.Tags"
112
+ end
89
113
  add_message "v1.VaultTLSStore" do
90
114
  optional :id, :string, 1
91
115
  optional :name, :string, 2
@@ -96,6 +120,30 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
96
120
  optional :server_address, :string, 3
97
121
  optional :tags, :message, 7, "v1.Tags"
98
122
  end
123
+ add_message "v1.VaultTLSCertSSHStore" do
124
+ optional :id, :string, 1
125
+ optional :name, :string, 2
126
+ optional :CA_cert_path, :string, 4
127
+ optional :client_cert_path, :string, 5
128
+ optional :client_key_path, :string, 6
129
+ optional :namespace, :string, 8
130
+ optional :server_address, :string, 3
131
+ optional :signing_role, :string, 10
132
+ optional :ssh_mount_point, :string, 9
133
+ optional :tags, :message, 7, "v1.Tags"
134
+ end
135
+ add_message "v1.VaultTLSCertX509Store" do
136
+ optional :id, :string, 1
137
+ optional :name, :string, 2
138
+ optional :CA_cert_path, :string, 4
139
+ optional :client_cert_path, :string, 5
140
+ optional :client_key_path, :string, 6
141
+ optional :namespace, :string, 8
142
+ optional :pki_mount_point, :string, 9
143
+ optional :server_address, :string, 3
144
+ optional :signing_role, :string, 10
145
+ optional :tags, :message, 7, "v1.Tags"
146
+ end
99
147
  add_message "v1.VaultTokenStore" do
100
148
  optional :id, :string, 1
101
149
  optional :name, :string, 2
@@ -103,6 +151,24 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
103
151
  optional :server_address, :string, 3
104
152
  optional :tags, :message, 4, "v1.Tags"
105
153
  end
154
+ add_message "v1.VaultTokenCertSSHStore" do
155
+ optional :id, :string, 1
156
+ optional :name, :string, 2
157
+ optional :namespace, :string, 5
158
+ optional :server_address, :string, 3
159
+ optional :signing_role, :string, 7
160
+ optional :ssh_mount_point, :string, 6
161
+ optional :tags, :message, 4, "v1.Tags"
162
+ end
163
+ add_message "v1.VaultTokenCertX509Store" do
164
+ optional :id, :string, 1
165
+ optional :name, :string, 2
166
+ optional :namespace, :string, 5
167
+ optional :pki_mount_point, :string, 6
168
+ optional :server_address, :string, 3
169
+ optional :signing_role, :string, 7
170
+ optional :tags, :message, 4, "v1.Tags"
171
+ end
106
172
  end
107
173
  end
108
174
 
@@ -116,6 +182,12 @@ module V1
116
182
  DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
117
183
  GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
118
184
  VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
185
+ VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
186
+ VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
119
187
  VaultTLSStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSStore").msgclass
188
+ VaultTLSCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSCertSSHStore").msgclass
189
+ VaultTLSCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSCertX509Store").msgclass
120
190
  VaultTokenStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenStore").msgclass
191
+ VaultTokenCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenCertSSHStore").msgclass
192
+ VaultTokenCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenCertX509Store").msgclass
121
193
  end
@@ -9833,6 +9833,94 @@ module SDM
9833
9833
  end
9834
9834
  end
9835
9835
 
9836
+ # VaultAppRoleCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
9837
+ class VaultAppRoleCertSSHStore
9838
+ # Unique identifier of the SecretStore.
9839
+ attr_accessor :id
9840
+ # Unique human-readable name of the SecretStore.
9841
+ attr_accessor :name
9842
+ # The namespace to make requests within
9843
+ attr_accessor :namespace
9844
+ # The URL of the Vault to target
9845
+ attr_accessor :server_address
9846
+ # The signing role to be used for signing certificates
9847
+ attr_accessor :signing_role
9848
+ # The mount point of the SSH engine configured with the desired CA
9849
+ attr_accessor :ssh_mount_point
9850
+ # Tags is a map of key, value pairs.
9851
+ attr_accessor :tags
9852
+
9853
+ def initialize(
9854
+ id: nil,
9855
+ name: nil,
9856
+ namespace: nil,
9857
+ server_address: nil,
9858
+ signing_role: nil,
9859
+ ssh_mount_point: nil,
9860
+ tags: nil
9861
+ )
9862
+ @id = id == nil ? "" : id
9863
+ @name = name == nil ? "" : name
9864
+ @namespace = namespace == nil ? "" : namespace
9865
+ @server_address = server_address == nil ? "" : server_address
9866
+ @signing_role = signing_role == nil ? "" : signing_role
9867
+ @ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
9868
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
9869
+ end
9870
+
9871
+ def to_json(options = {})
9872
+ hash = {}
9873
+ self.instance_variables.each do |var|
9874
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
9875
+ end
9876
+ hash.to_json
9877
+ end
9878
+ end
9879
+
9880
+ # VaultAppRoleCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
9881
+ class VaultAppRoleCertX509Store
9882
+ # Unique identifier of the SecretStore.
9883
+ attr_accessor :id
9884
+ # Unique human-readable name of the SecretStore.
9885
+ attr_accessor :name
9886
+ # The namespace to make requests within
9887
+ attr_accessor :namespace
9888
+ # The mount point of the PKI engine configured with the desired CA
9889
+ attr_accessor :pki_mount_point
9890
+ # The URL of the Vault to target
9891
+ attr_accessor :server_address
9892
+ # The signing role to be used for signing certificates
9893
+ attr_accessor :signing_role
9894
+ # Tags is a map of key, value pairs.
9895
+ attr_accessor :tags
9896
+
9897
+ def initialize(
9898
+ id: nil,
9899
+ name: nil,
9900
+ namespace: nil,
9901
+ pki_mount_point: nil,
9902
+ server_address: nil,
9903
+ signing_role: nil,
9904
+ tags: nil
9905
+ )
9906
+ @id = id == nil ? "" : id
9907
+ @name = name == nil ? "" : name
9908
+ @namespace = namespace == nil ? "" : namespace
9909
+ @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
9910
+ @server_address = server_address == nil ? "" : server_address
9911
+ @signing_role = signing_role == nil ? "" : signing_role
9912
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
9913
+ end
9914
+
9915
+ def to_json(options = {})
9916
+ hash = {}
9917
+ self.instance_variables.each do |var|
9918
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
9919
+ end
9920
+ hash.to_json
9921
+ end
9922
+ end
9923
+
9836
9924
  class VaultAppRoleStore
9837
9925
  # Unique identifier of the SecretStore.
9838
9926
  attr_accessor :id
@@ -9868,6 +9956,118 @@ module SDM
9868
9956
  end
9869
9957
  end
9870
9958
 
9959
+ # VaultTLSCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
9960
+ class VaultTLSCertSSHStore
9961
+ # A path to a CA file accessible by a Node
9962
+ attr_accessor :ca_cert_path
9963
+ # A path to a client certificate file accessible by a Node
9964
+ attr_accessor :client_cert_path
9965
+ # A path to a client key file accessible by a Node
9966
+ attr_accessor :client_key_path
9967
+ # Unique identifier of the SecretStore.
9968
+ attr_accessor :id
9969
+ # Unique human-readable name of the SecretStore.
9970
+ attr_accessor :name
9971
+ # The namespace to make requests within
9972
+ attr_accessor :namespace
9973
+ # The URL of the Vault to target
9974
+ attr_accessor :server_address
9975
+ # The signing role to be used for signing certificates
9976
+ attr_accessor :signing_role
9977
+ # The mount point of the SSH engine configured with the desired CA
9978
+ attr_accessor :ssh_mount_point
9979
+ # Tags is a map of key, value pairs.
9980
+ attr_accessor :tags
9981
+
9982
+ def initialize(
9983
+ ca_cert_path: nil,
9984
+ client_cert_path: nil,
9985
+ client_key_path: nil,
9986
+ id: nil,
9987
+ name: nil,
9988
+ namespace: nil,
9989
+ server_address: nil,
9990
+ signing_role: nil,
9991
+ ssh_mount_point: nil,
9992
+ tags: nil
9993
+ )
9994
+ @ca_cert_path = ca_cert_path == nil ? "" : ca_cert_path
9995
+ @client_cert_path = client_cert_path == nil ? "" : client_cert_path
9996
+ @client_key_path = client_key_path == nil ? "" : client_key_path
9997
+ @id = id == nil ? "" : id
9998
+ @name = name == nil ? "" : name
9999
+ @namespace = namespace == nil ? "" : namespace
10000
+ @server_address = server_address == nil ? "" : server_address
10001
+ @signing_role = signing_role == nil ? "" : signing_role
10002
+ @ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
10003
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10004
+ end
10005
+
10006
+ def to_json(options = {})
10007
+ hash = {}
10008
+ self.instance_variables.each do |var|
10009
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10010
+ end
10011
+ hash.to_json
10012
+ end
10013
+ end
10014
+
10015
+ # VaultTLSCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10016
+ class VaultTLSCertX509Store
10017
+ # A path to a CA file accessible by a Node
10018
+ attr_accessor :ca_cert_path
10019
+ # A path to a client certificate file accessible by a Node
10020
+ attr_accessor :client_cert_path
10021
+ # A path to a client key file accessible by a Node
10022
+ attr_accessor :client_key_path
10023
+ # Unique identifier of the SecretStore.
10024
+ attr_accessor :id
10025
+ # Unique human-readable name of the SecretStore.
10026
+ attr_accessor :name
10027
+ # The namespace to make requests within
10028
+ attr_accessor :namespace
10029
+ # The mount point of the PKI engine configured with the desired CA
10030
+ attr_accessor :pki_mount_point
10031
+ # The URL of the Vault to target
10032
+ attr_accessor :server_address
10033
+ # The signing role to be used for signing certificates
10034
+ attr_accessor :signing_role
10035
+ # Tags is a map of key, value pairs.
10036
+ attr_accessor :tags
10037
+
10038
+ def initialize(
10039
+ ca_cert_path: nil,
10040
+ client_cert_path: nil,
10041
+ client_key_path: nil,
10042
+ id: nil,
10043
+ name: nil,
10044
+ namespace: nil,
10045
+ pki_mount_point: nil,
10046
+ server_address: nil,
10047
+ signing_role: nil,
10048
+ tags: nil
10049
+ )
10050
+ @ca_cert_path = ca_cert_path == nil ? "" : ca_cert_path
10051
+ @client_cert_path = client_cert_path == nil ? "" : client_cert_path
10052
+ @client_key_path = client_key_path == nil ? "" : client_key_path
10053
+ @id = id == nil ? "" : id
10054
+ @name = name == nil ? "" : name
10055
+ @namespace = namespace == nil ? "" : namespace
10056
+ @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
10057
+ @server_address = server_address == nil ? "" : server_address
10058
+ @signing_role = signing_role == nil ? "" : signing_role
10059
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10060
+ end
10061
+
10062
+ def to_json(options = {})
10063
+ hash = {}
10064
+ self.instance_variables.each do |var|
10065
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10066
+ end
10067
+ hash.to_json
10068
+ end
10069
+ end
10070
+
9871
10071
  class VaultTLSStore
9872
10072
  # A path to a CA file accessible by a Node
9873
10073
  attr_accessor :ca_cert_path
@@ -9915,6 +10115,94 @@ module SDM
9915
10115
  end
9916
10116
  end
9917
10117
 
10118
+ # VaultTokenCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
10119
+ class VaultTokenCertSSHStore
10120
+ # Unique identifier of the SecretStore.
10121
+ attr_accessor :id
10122
+ # Unique human-readable name of the SecretStore.
10123
+ attr_accessor :name
10124
+ # The namespace to make requests within
10125
+ attr_accessor :namespace
10126
+ # The URL of the Vault to target
10127
+ attr_accessor :server_address
10128
+ # The signing role to be used for signing certificates
10129
+ attr_accessor :signing_role
10130
+ # The mount point of the SSH engine configured with the desired CA
10131
+ attr_accessor :ssh_mount_point
10132
+ # Tags is a map of key, value pairs.
10133
+ attr_accessor :tags
10134
+
10135
+ def initialize(
10136
+ id: nil,
10137
+ name: nil,
10138
+ namespace: nil,
10139
+ server_address: nil,
10140
+ signing_role: nil,
10141
+ ssh_mount_point: nil,
10142
+ tags: nil
10143
+ )
10144
+ @id = id == nil ? "" : id
10145
+ @name = name == nil ? "" : name
10146
+ @namespace = namespace == nil ? "" : namespace
10147
+ @server_address = server_address == nil ? "" : server_address
10148
+ @signing_role = signing_role == nil ? "" : signing_role
10149
+ @ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
10150
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10151
+ end
10152
+
10153
+ def to_json(options = {})
10154
+ hash = {}
10155
+ self.instance_variables.each do |var|
10156
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10157
+ end
10158
+ hash.to_json
10159
+ end
10160
+ end
10161
+
10162
+ # VaultTokenCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10163
+ class VaultTokenCertX509Store
10164
+ # Unique identifier of the SecretStore.
10165
+ attr_accessor :id
10166
+ # Unique human-readable name of the SecretStore.
10167
+ attr_accessor :name
10168
+ # The namespace to make requests within
10169
+ attr_accessor :namespace
10170
+ # The mount point of the PKI engine configured with the desired CA
10171
+ attr_accessor :pki_mount_point
10172
+ # The URL of the Vault to target
10173
+ attr_accessor :server_address
10174
+ # The signing role to be used for signing certificates
10175
+ attr_accessor :signing_role
10176
+ # Tags is a map of key, value pairs.
10177
+ attr_accessor :tags
10178
+
10179
+ def initialize(
10180
+ id: nil,
10181
+ name: nil,
10182
+ namespace: nil,
10183
+ pki_mount_point: nil,
10184
+ server_address: nil,
10185
+ signing_role: nil,
10186
+ tags: nil
10187
+ )
10188
+ @id = id == nil ? "" : id
10189
+ @name = name == nil ? "" : name
10190
+ @namespace = namespace == nil ? "" : namespace
10191
+ @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
10192
+ @server_address = server_address == nil ? "" : server_address
10193
+ @signing_role = signing_role == nil ? "" : signing_role
10194
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10195
+ end
10196
+
10197
+ def to_json(options = {})
10198
+ hash = {}
10199
+ self.instance_variables.each do |var|
10200
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10201
+ end
10202
+ hash.to_json
10203
+ end
10204
+ end
10205
+
9918
10206
  class VaultTokenStore
9919
10207
  # Unique identifier of the SecretStore.
9920
10208
  attr_accessor :id
data/lib/strongdm.rb CHANGED
@@ -29,7 +29,7 @@ module SDM #:nodoc:
29
29
  DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
30
30
  DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
31
31
  API_VERSION = "2021-08-23"
32
- USER_AGENT = "strongdm-sdk-ruby/6.3.0"
32
+ USER_AGENT = "strongdm-sdk-ruby/6.3.1"
33
33
  private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
34
34
 
35
35
  # Creates a new strongDM API client.
data/lib/svc.rb CHANGED
@@ -3763,8 +3763,14 @@ module SDM #:nodoc:
3763
3763
  # {DelineaStore}
3764
3764
  # {GCPStore}
3765
3765
  # {VaultAppRoleStore}
3766
+ # {VaultAppRoleCertSSHStore}
3767
+ # {VaultAppRoleCertX509Store}
3766
3768
  # {VaultTLSStore}
3769
+ # {VaultTLSCertSSHStore}
3770
+ # {VaultTLSCertX509Store}
3767
3771
  # {VaultTokenStore}
3772
+ # {VaultTokenCertSSHStore}
3773
+ # {VaultTokenCertX509Store}
3768
3774
  class SecretStores
3769
3775
  extend Gem::Deprecate
3770
3776
 
data/lib/version CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "6.3.0"
16
+ VERSION = "6.3.1"
17
17
  end
data/lib/version.rb CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "6.3.0"
16
+ VERSION = "6.3.1"
17
17
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: strongdm
3
3
  version: !ruby/object:Gem::Version
4
- version: 6.3.0
4
+ version: 6.3.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - strongDM Team
@@ -81,8 +81,8 @@ files:
81
81
  - "./.git/logs/HEAD"
82
82
  - "./.git/logs/refs/heads/master"
83
83
  - "./.git/logs/refs/remotes/origin/HEAD"
84
- - "./.git/objects/pack/pack-937ee306e3b4fe54045c0d7b71751845270470b4.idx"
85
- - "./.git/objects/pack/pack-937ee306e3b4fe54045c0d7b71751845270470b4.pack"
84
+ - "./.git/objects/pack/pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.idx"
85
+ - "./.git/objects/pack/pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.pack"
86
86
  - "./.git/packed-refs"
87
87
  - "./.git/refs/heads/master"
88
88
  - "./.git/refs/remotes/origin/HEAD"