strongdm 6.3.0 → 6.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 526ac91fc752ec31eadddb747f4fd3288e0606ac07036913e0040b2789f59260
4
- data.tar.gz: 6848e19adbe420ab7dc09d5aa1e53677fe6fb3012ebce67b968c41b35a6e274a
3
+ metadata.gz: cc7306aea1eca0729a25187d1a302d86b6550d6f09ac9be7c4ec4f7f7bc4d00b
4
+ data.tar.gz: 63e886822320f0f357df5d222e7bdd7a8955b120df25ada378a80ecd57ce4203
5
5
  SHA512:
6
- metadata.gz: 7efe1e6bba5e718bd6b6cf78370c9931f8aa42da305b160c6c0c0714960f90209ba815e6637be0e62ed7c5c8a099cf07a7609454068aa1fc5689dc9fa357a0b5
7
- data.tar.gz: 3c08acf70d911a4816dc454279e6a03031dba21a5d521e5ccfcb4383270460afdb58bf8899226cd5dc8caca1c8fe837f4e356925cb08aaae0261af81be285285
6
+ metadata.gz: cc96479400b7be955e2647aff3f13d95bf5c5446bacb88f7dee356f5c98e3b0c7ef392147ad0b46384ea15a335cb33b1890e5bffdacb11bf1a8d91ce2ffa9889
7
+ data.tar.gz: 1d1035ab4594cc376b92863906f81a0a20ba11441e8eee17eaeca209c799f77e14c627b753c979159637872d766b6d81380b823f42b4be6d88fbd017822c35f8
data/.git/ORIG_HEAD CHANGED
@@ -1 +1 @@
1
- f4af6ebad8174f8e5aeec63536db9290597a3982
1
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149
data/.git/index CHANGED
Binary file
data/.git/logs/HEAD CHANGED
@@ -1,3 +1,3 @@
1
- 0000000000000000000000000000000000000000 f4af6ebad8174f8e5aeec63536db9290597a3982 sdmrelease <support@strongdm.com> 1706204253 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- f4af6ebad8174f8e5aeec63536db9290597a3982 f4af6ebad8174f8e5aeec63536db9290597a3982 sdmrelease <support@strongdm.com> 1706204253 +0000 checkout: moving from master to master
3
- f4af6ebad8174f8e5aeec63536db9290597a3982 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706204253 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 checkout: moving from master to master
3
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149 3ca1e977d66e0fb0232024c33a223a789453031c sdmrelease <support@strongdm.com> 1706211540 +0000 merge origin/development: Fast-forward
@@ -1,2 +1,2 @@
1
- 0000000000000000000000000000000000000000 f4af6ebad8174f8e5aeec63536db9290597a3982 sdmrelease <support@strongdm.com> 1706204253 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- f4af6ebad8174f8e5aeec63536db9290597a3982 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706204253 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149 3ca1e977d66e0fb0232024c33a223a789453031c sdmrelease <support@strongdm.com> 1706211540 +0000 merge origin/development: Fast-forward
@@ -1 +1 @@
1
- 0000000000000000000000000000000000000000 f4af6ebad8174f8e5aeec63536db9290597a3982 sdmrelease <support@strongdm.com> 1706204253 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
1
+ 0000000000000000000000000000000000000000 59ba0e6392d2e7f5f4c053e663766157c9a9b149 sdmrelease <support@strongdm.com> 1706211540 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
data/.git/packed-refs CHANGED
@@ -1,6 +1,6 @@
1
1
  # pack-refs with: peeled fully-peeled sorted
2
- 59ba0e6392d2e7f5f4c053e663766157c9a9b149 refs/remotes/origin/development
3
- f4af6ebad8174f8e5aeec63536db9290597a3982 refs/remotes/origin/master
2
+ 3ca1e977d66e0fb0232024c33a223a789453031c refs/remotes/origin/development
3
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149 refs/remotes/origin/master
4
4
  2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
5
5
  04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
6
6
  6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
@@ -93,3 +93,4 @@ da1cd910d138b56624af0d2fa2d92d8acec5edca refs/tags/v6.0.1
93
93
  296fd9e80fd98a5dd3dcaaccde49e33ea5578967 refs/tags/v6.1.0
94
94
  d8f6c24d93d0cf5e48ccc7bf7a5ead950a7b0614 refs/tags/v6.2.0
95
95
  f4af6ebad8174f8e5aeec63536db9290597a3982 refs/tags/v6.2.1
96
+ 59ba0e6392d2e7f5f4c053e663766157c9a9b149 refs/tags/v6.3.0
@@ -1 +1 @@
1
- 59ba0e6392d2e7f5f4c053e663766157c9a9b149
1
+ 3ca1e977d66e0fb0232024c33a223a789453031c
data/lib/grpc/plumbing.rb CHANGED
@@ -9449,12 +9449,30 @@ module SDM
9449
9449
  if porcelain.instance_of? VaultAppRoleStore
9450
9450
  plumbing.vault_app_role = convert_vault_app_role_store_to_plumbing(porcelain)
9451
9451
  end
9452
+ if porcelain.instance_of? VaultAppRoleCertSSHStore
9453
+ plumbing.vault_app_role_cert_ssh = convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
9454
+ end
9455
+ if porcelain.instance_of? VaultAppRoleCertX509Store
9456
+ plumbing.vault_app_role_cert_x_509 = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
9457
+ end
9452
9458
  if porcelain.instance_of? VaultTLSStore
9453
9459
  plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
9454
9460
  end
9461
+ if porcelain.instance_of? VaultTLSCertSSHStore
9462
+ plumbing.vault_tls_cert_ssh = convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
9463
+ end
9464
+ if porcelain.instance_of? VaultTLSCertX509Store
9465
+ plumbing.vault_tls_cert_x_509 = convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
9466
+ end
9455
9467
  if porcelain.instance_of? VaultTokenStore
9456
9468
  plumbing.vault_token = convert_vault_token_store_to_plumbing(porcelain)
9457
9469
  end
9470
+ if porcelain.instance_of? VaultTokenCertSSHStore
9471
+ plumbing.vault_token_cert_ssh = convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
9472
+ end
9473
+ if porcelain.instance_of? VaultTokenCertX509Store
9474
+ plumbing.vault_token_cert_x_509 = convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
9475
+ end
9458
9476
  plumbing
9459
9477
  end
9460
9478
 
@@ -9486,12 +9504,30 @@ module SDM
9486
9504
  if plumbing.vault_app_role != nil
9487
9505
  return convert_vault_app_role_store_to_porcelain(plumbing.vault_app_role)
9488
9506
  end
9507
+ if plumbing.vault_app_role_cert_ssh != nil
9508
+ return convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing.vault_app_role_cert_ssh)
9509
+ end
9510
+ if plumbing.vault_app_role_cert_x_509 != nil
9511
+ return convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing.vault_app_role_cert_x_509)
9512
+ end
9489
9513
  if plumbing.vault_tls != nil
9490
9514
  return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
9491
9515
  end
9516
+ if plumbing.vault_tls_cert_ssh != nil
9517
+ return convert_vault_tls_cert_ssh_store_to_porcelain(plumbing.vault_tls_cert_ssh)
9518
+ end
9519
+ if plumbing.vault_tls_cert_x_509 != nil
9520
+ return convert_vault_tls_cert_x_509_store_to_porcelain(plumbing.vault_tls_cert_x_509)
9521
+ end
9492
9522
  if plumbing.vault_token != nil
9493
9523
  return convert_vault_token_store_to_porcelain(plumbing.vault_token)
9494
9524
  end
9525
+ if plumbing.vault_token_cert_ssh != nil
9526
+ return convert_vault_token_cert_ssh_store_to_porcelain(plumbing.vault_token_cert_ssh)
9527
+ end
9528
+ if plumbing.vault_token_cert_x_509 != nil
9529
+ return convert_vault_token_cert_x_509_store_to_porcelain(plumbing.vault_token_cert_x_509)
9530
+ end
9495
9531
  raise UnknownError.new("unknown polymorphic type, please upgrade your SDK")
9496
9532
  end
9497
9533
  def self.convert_repeated_secret_store_to_plumbing(porcelains)
@@ -10393,6 +10429,98 @@ module SDM
10393
10429
  end
10394
10430
  items
10395
10431
  end
10432
+ def self.convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
10433
+ if plumbing == nil
10434
+ return nil
10435
+ end
10436
+ porcelain = VaultAppRoleCertSSHStore.new()
10437
+ porcelain.id = (plumbing.id)
10438
+ porcelain.name = (plumbing.name)
10439
+ porcelain.namespace = (plumbing.namespace)
10440
+ porcelain.server_address = (plumbing.server_address)
10441
+ porcelain.signing_role = (plumbing.signing_role)
10442
+ porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
10443
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10444
+ porcelain
10445
+ end
10446
+
10447
+ def self.convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
10448
+ if porcelain == nil
10449
+ return nil
10450
+ end
10451
+ plumbing = V1::VaultAppRoleCertSSHStore.new()
10452
+ plumbing.id = (porcelain.id)
10453
+ plumbing.name = (porcelain.name)
10454
+ plumbing.namespace = (porcelain.namespace)
10455
+ plumbing.server_address = (porcelain.server_address)
10456
+ plumbing.signing_role = (porcelain.signing_role)
10457
+ plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
10458
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10459
+ plumbing
10460
+ end
10461
+ def self.convert_repeated_vault_app_role_cert_ssh_store_to_plumbing(porcelains)
10462
+ items = Array.new
10463
+ porcelains.each do |porcelain|
10464
+ plumbing = convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain)
10465
+ items.append(plumbing)
10466
+ end
10467
+ items
10468
+ end
10469
+
10470
+ def self.convert_repeated_vault_app_role_cert_ssh_store_to_porcelain(plumbings)
10471
+ items = Array.new
10472
+ plumbings.each do |plumbing|
10473
+ porcelain = convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
10474
+ items.append(porcelain)
10475
+ end
10476
+ items
10477
+ end
10478
+ def self.convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing)
10479
+ if plumbing == nil
10480
+ return nil
10481
+ end
10482
+ porcelain = VaultAppRoleCertX509Store.new()
10483
+ porcelain.id = (plumbing.id)
10484
+ porcelain.name = (plumbing.name)
10485
+ porcelain.namespace = (plumbing.namespace)
10486
+ porcelain.pki_mount_point = (plumbing.pki_mount_point)
10487
+ porcelain.server_address = (plumbing.server_address)
10488
+ porcelain.signing_role = (plumbing.signing_role)
10489
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10490
+ porcelain
10491
+ end
10492
+
10493
+ def self.convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
10494
+ if porcelain == nil
10495
+ return nil
10496
+ end
10497
+ plumbing = V1::VaultAppRoleCertX509Store.new()
10498
+ plumbing.id = (porcelain.id)
10499
+ plumbing.name = (porcelain.name)
10500
+ plumbing.namespace = (porcelain.namespace)
10501
+ plumbing.pki_mount_point = (porcelain.pki_mount_point)
10502
+ plumbing.server_address = (porcelain.server_address)
10503
+ plumbing.signing_role = (porcelain.signing_role)
10504
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10505
+ plumbing
10506
+ end
10507
+ def self.convert_repeated_vault_app_role_cert_x_509_store_to_plumbing(porcelains)
10508
+ items = Array.new
10509
+ porcelains.each do |porcelain|
10510
+ plumbing = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
10511
+ items.append(plumbing)
10512
+ end
10513
+ items
10514
+ end
10515
+
10516
+ def self.convert_repeated_vault_app_role_cert_x_509_store_to_porcelain(plumbings)
10517
+ items = Array.new
10518
+ plumbings.each do |plumbing|
10519
+ porcelain = convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing)
10520
+ items.append(porcelain)
10521
+ end
10522
+ items
10523
+ end
10396
10524
  def self.convert_vault_app_role_store_to_porcelain(plumbing)
10397
10525
  if plumbing == nil
10398
10526
  return nil
@@ -10435,6 +10563,110 @@ module SDM
10435
10563
  end
10436
10564
  items
10437
10565
  end
10566
+ def self.convert_vault_tls_cert_ssh_store_to_porcelain(plumbing)
10567
+ if plumbing == nil
10568
+ return nil
10569
+ end
10570
+ porcelain = VaultTLSCertSSHStore.new()
10571
+ porcelain.ca_cert_path = (plumbing.CA_cert_path)
10572
+ porcelain.client_cert_path = (plumbing.client_cert_path)
10573
+ porcelain.client_key_path = (plumbing.client_key_path)
10574
+ porcelain.id = (plumbing.id)
10575
+ porcelain.name = (plumbing.name)
10576
+ porcelain.namespace = (plumbing.namespace)
10577
+ porcelain.server_address = (plumbing.server_address)
10578
+ porcelain.signing_role = (plumbing.signing_role)
10579
+ porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
10580
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10581
+ porcelain
10582
+ end
10583
+
10584
+ def self.convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
10585
+ if porcelain == nil
10586
+ return nil
10587
+ end
10588
+ plumbing = V1::VaultTLSCertSSHStore.new()
10589
+ plumbing.CA_cert_path = (porcelain.ca_cert_path)
10590
+ plumbing.client_cert_path = (porcelain.client_cert_path)
10591
+ plumbing.client_key_path = (porcelain.client_key_path)
10592
+ plumbing.id = (porcelain.id)
10593
+ plumbing.name = (porcelain.name)
10594
+ plumbing.namespace = (porcelain.namespace)
10595
+ plumbing.server_address = (porcelain.server_address)
10596
+ plumbing.signing_role = (porcelain.signing_role)
10597
+ plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
10598
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10599
+ plumbing
10600
+ end
10601
+ def self.convert_repeated_vault_tls_cert_ssh_store_to_plumbing(porcelains)
10602
+ items = Array.new
10603
+ porcelains.each do |porcelain|
10604
+ plumbing = convert_vault_tls_cert_ssh_store_to_plumbing(porcelain)
10605
+ items.append(plumbing)
10606
+ end
10607
+ items
10608
+ end
10609
+
10610
+ def self.convert_repeated_vault_tls_cert_ssh_store_to_porcelain(plumbings)
10611
+ items = Array.new
10612
+ plumbings.each do |plumbing|
10613
+ porcelain = convert_vault_tls_cert_ssh_store_to_porcelain(plumbing)
10614
+ items.append(porcelain)
10615
+ end
10616
+ items
10617
+ end
10618
+ def self.convert_vault_tls_cert_x_509_store_to_porcelain(plumbing)
10619
+ if plumbing == nil
10620
+ return nil
10621
+ end
10622
+ porcelain = VaultTLSCertX509Store.new()
10623
+ porcelain.ca_cert_path = (plumbing.CA_cert_path)
10624
+ porcelain.client_cert_path = (plumbing.client_cert_path)
10625
+ porcelain.client_key_path = (plumbing.client_key_path)
10626
+ porcelain.id = (plumbing.id)
10627
+ porcelain.name = (plumbing.name)
10628
+ porcelain.namespace = (plumbing.namespace)
10629
+ porcelain.pki_mount_point = (plumbing.pki_mount_point)
10630
+ porcelain.server_address = (plumbing.server_address)
10631
+ porcelain.signing_role = (plumbing.signing_role)
10632
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10633
+ porcelain
10634
+ end
10635
+
10636
+ def self.convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
10637
+ if porcelain == nil
10638
+ return nil
10639
+ end
10640
+ plumbing = V1::VaultTLSCertX509Store.new()
10641
+ plumbing.CA_cert_path = (porcelain.ca_cert_path)
10642
+ plumbing.client_cert_path = (porcelain.client_cert_path)
10643
+ plumbing.client_key_path = (porcelain.client_key_path)
10644
+ plumbing.id = (porcelain.id)
10645
+ plumbing.name = (porcelain.name)
10646
+ plumbing.namespace = (porcelain.namespace)
10647
+ plumbing.pki_mount_point = (porcelain.pki_mount_point)
10648
+ plumbing.server_address = (porcelain.server_address)
10649
+ plumbing.signing_role = (porcelain.signing_role)
10650
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10651
+ plumbing
10652
+ end
10653
+ def self.convert_repeated_vault_tls_cert_x_509_store_to_plumbing(porcelains)
10654
+ items = Array.new
10655
+ porcelains.each do |porcelain|
10656
+ plumbing = convert_vault_tls_cert_x_509_store_to_plumbing(porcelain)
10657
+ items.append(plumbing)
10658
+ end
10659
+ items
10660
+ end
10661
+
10662
+ def self.convert_repeated_vault_tls_cert_x_509_store_to_porcelain(plumbings)
10663
+ items = Array.new
10664
+ plumbings.each do |plumbing|
10665
+ porcelain = convert_vault_tls_cert_x_509_store_to_porcelain(plumbing)
10666
+ items.append(porcelain)
10667
+ end
10668
+ items
10669
+ end
10438
10670
  def self.convert_vault_tls_store_to_porcelain(plumbing)
10439
10671
  if plumbing == nil
10440
10672
  return nil
@@ -10483,6 +10715,98 @@ module SDM
10483
10715
  end
10484
10716
  items
10485
10717
  end
10718
+ def self.convert_vault_token_cert_ssh_store_to_porcelain(plumbing)
10719
+ if plumbing == nil
10720
+ return nil
10721
+ end
10722
+ porcelain = VaultTokenCertSSHStore.new()
10723
+ porcelain.id = (plumbing.id)
10724
+ porcelain.name = (plumbing.name)
10725
+ porcelain.namespace = (plumbing.namespace)
10726
+ porcelain.server_address = (plumbing.server_address)
10727
+ porcelain.signing_role = (plumbing.signing_role)
10728
+ porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
10729
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10730
+ porcelain
10731
+ end
10732
+
10733
+ def self.convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
10734
+ if porcelain == nil
10735
+ return nil
10736
+ end
10737
+ plumbing = V1::VaultTokenCertSSHStore.new()
10738
+ plumbing.id = (porcelain.id)
10739
+ plumbing.name = (porcelain.name)
10740
+ plumbing.namespace = (porcelain.namespace)
10741
+ plumbing.server_address = (porcelain.server_address)
10742
+ plumbing.signing_role = (porcelain.signing_role)
10743
+ plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
10744
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10745
+ plumbing
10746
+ end
10747
+ def self.convert_repeated_vault_token_cert_ssh_store_to_plumbing(porcelains)
10748
+ items = Array.new
10749
+ porcelains.each do |porcelain|
10750
+ plumbing = convert_vault_token_cert_ssh_store_to_plumbing(porcelain)
10751
+ items.append(plumbing)
10752
+ end
10753
+ items
10754
+ end
10755
+
10756
+ def self.convert_repeated_vault_token_cert_ssh_store_to_porcelain(plumbings)
10757
+ items = Array.new
10758
+ plumbings.each do |plumbing|
10759
+ porcelain = convert_vault_token_cert_ssh_store_to_porcelain(plumbing)
10760
+ items.append(porcelain)
10761
+ end
10762
+ items
10763
+ end
10764
+ def self.convert_vault_token_cert_x_509_store_to_porcelain(plumbing)
10765
+ if plumbing == nil
10766
+ return nil
10767
+ end
10768
+ porcelain = VaultTokenCertX509Store.new()
10769
+ porcelain.id = (plumbing.id)
10770
+ porcelain.name = (plumbing.name)
10771
+ porcelain.namespace = (plumbing.namespace)
10772
+ porcelain.pki_mount_point = (plumbing.pki_mount_point)
10773
+ porcelain.server_address = (plumbing.server_address)
10774
+ porcelain.signing_role = (plumbing.signing_role)
10775
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10776
+ porcelain
10777
+ end
10778
+
10779
+ def self.convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
10780
+ if porcelain == nil
10781
+ return nil
10782
+ end
10783
+ plumbing = V1::VaultTokenCertX509Store.new()
10784
+ plumbing.id = (porcelain.id)
10785
+ plumbing.name = (porcelain.name)
10786
+ plumbing.namespace = (porcelain.namespace)
10787
+ plumbing.pki_mount_point = (porcelain.pki_mount_point)
10788
+ plumbing.server_address = (porcelain.server_address)
10789
+ plumbing.signing_role = (porcelain.signing_role)
10790
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
10791
+ plumbing
10792
+ end
10793
+ def self.convert_repeated_vault_token_cert_x_509_store_to_plumbing(porcelains)
10794
+ items = Array.new
10795
+ porcelains.each do |porcelain|
10796
+ plumbing = convert_vault_token_cert_x_509_store_to_plumbing(porcelain)
10797
+ items.append(plumbing)
10798
+ end
10799
+ items
10800
+ end
10801
+
10802
+ def self.convert_repeated_vault_token_cert_x_509_store_to_porcelain(plumbings)
10803
+ items = Array.new
10804
+ plumbings.each do |plumbing|
10805
+ porcelain = convert_vault_token_cert_x_509_store_to_porcelain(plumbing)
10806
+ items.append(porcelain)
10807
+ end
10808
+ items
10809
+ end
10486
10810
  def self.convert_vault_token_store_to_porcelain(plumbing)
10487
10811
  if plumbing == nil
10488
10812
  return nil
@@ -32,8 +32,14 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
32
32
  optional :delinea, :message, 2900, "v1.DelineaStore"
33
33
  optional :gcp, :message, 201, "v1.GCPStore"
34
34
  optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
35
+ optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
36
+ optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
35
37
  optional :vault_tls, :message, 1, "v1.VaultTLSStore"
38
+ optional :vault_tls_cert_ssh, :message, 92, "v1.VaultTLSCertSSHStore"
39
+ optional :vault_tls_cert_x_509, :message, 93, "v1.VaultTLSCertX509Store"
36
40
  optional :vault_token, :message, 2, "v1.VaultTokenStore"
41
+ optional :vault_token_cert_ssh, :message, 90, "v1.VaultTokenCertSSHStore"
42
+ optional :vault_token_cert_x_509, :message, 91, "v1.VaultTokenCertX509Store"
37
43
  end
38
44
  end
39
45
  add_message "v1.AWSStore" do
@@ -86,6 +92,24 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
86
92
  optional :server_address, :string, 3
87
93
  optional :tags, :message, 8, "v1.Tags"
88
94
  end
95
+ add_message "v1.VaultAppRoleCertSSHStore" do
96
+ optional :id, :string, 1
97
+ optional :name, :string, 2
98
+ optional :namespace, :string, 5
99
+ optional :server_address, :string, 3
100
+ optional :signing_role, :string, 7
101
+ optional :ssh_mount_point, :string, 6
102
+ optional :tags, :message, 8, "v1.Tags"
103
+ end
104
+ add_message "v1.VaultAppRoleCertX509Store" do
105
+ optional :id, :string, 1
106
+ optional :name, :string, 2
107
+ optional :namespace, :string, 5
108
+ optional :pki_mount_point, :string, 6
109
+ optional :server_address, :string, 3
110
+ optional :signing_role, :string, 7
111
+ optional :tags, :message, 8, "v1.Tags"
112
+ end
89
113
  add_message "v1.VaultTLSStore" do
90
114
  optional :id, :string, 1
91
115
  optional :name, :string, 2
@@ -96,6 +120,30 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
96
120
  optional :server_address, :string, 3
97
121
  optional :tags, :message, 7, "v1.Tags"
98
122
  end
123
+ add_message "v1.VaultTLSCertSSHStore" do
124
+ optional :id, :string, 1
125
+ optional :name, :string, 2
126
+ optional :CA_cert_path, :string, 4
127
+ optional :client_cert_path, :string, 5
128
+ optional :client_key_path, :string, 6
129
+ optional :namespace, :string, 8
130
+ optional :server_address, :string, 3
131
+ optional :signing_role, :string, 10
132
+ optional :ssh_mount_point, :string, 9
133
+ optional :tags, :message, 7, "v1.Tags"
134
+ end
135
+ add_message "v1.VaultTLSCertX509Store" do
136
+ optional :id, :string, 1
137
+ optional :name, :string, 2
138
+ optional :CA_cert_path, :string, 4
139
+ optional :client_cert_path, :string, 5
140
+ optional :client_key_path, :string, 6
141
+ optional :namespace, :string, 8
142
+ optional :pki_mount_point, :string, 9
143
+ optional :server_address, :string, 3
144
+ optional :signing_role, :string, 10
145
+ optional :tags, :message, 7, "v1.Tags"
146
+ end
99
147
  add_message "v1.VaultTokenStore" do
100
148
  optional :id, :string, 1
101
149
  optional :name, :string, 2
@@ -103,6 +151,24 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
103
151
  optional :server_address, :string, 3
104
152
  optional :tags, :message, 4, "v1.Tags"
105
153
  end
154
+ add_message "v1.VaultTokenCertSSHStore" do
155
+ optional :id, :string, 1
156
+ optional :name, :string, 2
157
+ optional :namespace, :string, 5
158
+ optional :server_address, :string, 3
159
+ optional :signing_role, :string, 7
160
+ optional :ssh_mount_point, :string, 6
161
+ optional :tags, :message, 4, "v1.Tags"
162
+ end
163
+ add_message "v1.VaultTokenCertX509Store" do
164
+ optional :id, :string, 1
165
+ optional :name, :string, 2
166
+ optional :namespace, :string, 5
167
+ optional :pki_mount_point, :string, 6
168
+ optional :server_address, :string, 3
169
+ optional :signing_role, :string, 7
170
+ optional :tags, :message, 4, "v1.Tags"
171
+ end
106
172
  end
107
173
  end
108
174
 
@@ -116,6 +182,12 @@ module V1
116
182
  DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
117
183
  GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
118
184
  VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
185
+ VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
186
+ VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
119
187
  VaultTLSStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSStore").msgclass
188
+ VaultTLSCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSCertSSHStore").msgclass
189
+ VaultTLSCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTLSCertX509Store").msgclass
120
190
  VaultTokenStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenStore").msgclass
191
+ VaultTokenCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenCertSSHStore").msgclass
192
+ VaultTokenCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultTokenCertX509Store").msgclass
121
193
  end
@@ -9833,6 +9833,94 @@ module SDM
9833
9833
  end
9834
9834
  end
9835
9835
 
9836
+ # VaultAppRoleCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
9837
+ class VaultAppRoleCertSSHStore
9838
+ # Unique identifier of the SecretStore.
9839
+ attr_accessor :id
9840
+ # Unique human-readable name of the SecretStore.
9841
+ attr_accessor :name
9842
+ # The namespace to make requests within
9843
+ attr_accessor :namespace
9844
+ # The URL of the Vault to target
9845
+ attr_accessor :server_address
9846
+ # The signing role to be used for signing certificates
9847
+ attr_accessor :signing_role
9848
+ # The mount point of the SSH engine configured with the desired CA
9849
+ attr_accessor :ssh_mount_point
9850
+ # Tags is a map of key, value pairs.
9851
+ attr_accessor :tags
9852
+
9853
+ def initialize(
9854
+ id: nil,
9855
+ name: nil,
9856
+ namespace: nil,
9857
+ server_address: nil,
9858
+ signing_role: nil,
9859
+ ssh_mount_point: nil,
9860
+ tags: nil
9861
+ )
9862
+ @id = id == nil ? "" : id
9863
+ @name = name == nil ? "" : name
9864
+ @namespace = namespace == nil ? "" : namespace
9865
+ @server_address = server_address == nil ? "" : server_address
9866
+ @signing_role = signing_role == nil ? "" : signing_role
9867
+ @ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
9868
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
9869
+ end
9870
+
9871
+ def to_json(options = {})
9872
+ hash = {}
9873
+ self.instance_variables.each do |var|
9874
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
9875
+ end
9876
+ hash.to_json
9877
+ end
9878
+ end
9879
+
9880
+ # VaultAppRoleCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
9881
+ class VaultAppRoleCertX509Store
9882
+ # Unique identifier of the SecretStore.
9883
+ attr_accessor :id
9884
+ # Unique human-readable name of the SecretStore.
9885
+ attr_accessor :name
9886
+ # The namespace to make requests within
9887
+ attr_accessor :namespace
9888
+ # The mount point of the PKI engine configured with the desired CA
9889
+ attr_accessor :pki_mount_point
9890
+ # The URL of the Vault to target
9891
+ attr_accessor :server_address
9892
+ # The signing role to be used for signing certificates
9893
+ attr_accessor :signing_role
9894
+ # Tags is a map of key, value pairs.
9895
+ attr_accessor :tags
9896
+
9897
+ def initialize(
9898
+ id: nil,
9899
+ name: nil,
9900
+ namespace: nil,
9901
+ pki_mount_point: nil,
9902
+ server_address: nil,
9903
+ signing_role: nil,
9904
+ tags: nil
9905
+ )
9906
+ @id = id == nil ? "" : id
9907
+ @name = name == nil ? "" : name
9908
+ @namespace = namespace == nil ? "" : namespace
9909
+ @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
9910
+ @server_address = server_address == nil ? "" : server_address
9911
+ @signing_role = signing_role == nil ? "" : signing_role
9912
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
9913
+ end
9914
+
9915
+ def to_json(options = {})
9916
+ hash = {}
9917
+ self.instance_variables.each do |var|
9918
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
9919
+ end
9920
+ hash.to_json
9921
+ end
9922
+ end
9923
+
9836
9924
  class VaultAppRoleStore
9837
9925
  # Unique identifier of the SecretStore.
9838
9926
  attr_accessor :id
@@ -9868,6 +9956,118 @@ module SDM
9868
9956
  end
9869
9957
  end
9870
9958
 
9959
+ # VaultTLSCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
9960
+ class VaultTLSCertSSHStore
9961
+ # A path to a CA file accessible by a Node
9962
+ attr_accessor :ca_cert_path
9963
+ # A path to a client certificate file accessible by a Node
9964
+ attr_accessor :client_cert_path
9965
+ # A path to a client key file accessible by a Node
9966
+ attr_accessor :client_key_path
9967
+ # Unique identifier of the SecretStore.
9968
+ attr_accessor :id
9969
+ # Unique human-readable name of the SecretStore.
9970
+ attr_accessor :name
9971
+ # The namespace to make requests within
9972
+ attr_accessor :namespace
9973
+ # The URL of the Vault to target
9974
+ attr_accessor :server_address
9975
+ # The signing role to be used for signing certificates
9976
+ attr_accessor :signing_role
9977
+ # The mount point of the SSH engine configured with the desired CA
9978
+ attr_accessor :ssh_mount_point
9979
+ # Tags is a map of key, value pairs.
9980
+ attr_accessor :tags
9981
+
9982
+ def initialize(
9983
+ ca_cert_path: nil,
9984
+ client_cert_path: nil,
9985
+ client_key_path: nil,
9986
+ id: nil,
9987
+ name: nil,
9988
+ namespace: nil,
9989
+ server_address: nil,
9990
+ signing_role: nil,
9991
+ ssh_mount_point: nil,
9992
+ tags: nil
9993
+ )
9994
+ @ca_cert_path = ca_cert_path == nil ? "" : ca_cert_path
9995
+ @client_cert_path = client_cert_path == nil ? "" : client_cert_path
9996
+ @client_key_path = client_key_path == nil ? "" : client_key_path
9997
+ @id = id == nil ? "" : id
9998
+ @name = name == nil ? "" : name
9999
+ @namespace = namespace == nil ? "" : namespace
10000
+ @server_address = server_address == nil ? "" : server_address
10001
+ @signing_role = signing_role == nil ? "" : signing_role
10002
+ @ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
10003
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10004
+ end
10005
+
10006
+ def to_json(options = {})
10007
+ hash = {}
10008
+ self.instance_variables.each do |var|
10009
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10010
+ end
10011
+ hash.to_json
10012
+ end
10013
+ end
10014
+
10015
+ # VaultTLSCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10016
+ class VaultTLSCertX509Store
10017
+ # A path to a CA file accessible by a Node
10018
+ attr_accessor :ca_cert_path
10019
+ # A path to a client certificate file accessible by a Node
10020
+ attr_accessor :client_cert_path
10021
+ # A path to a client key file accessible by a Node
10022
+ attr_accessor :client_key_path
10023
+ # Unique identifier of the SecretStore.
10024
+ attr_accessor :id
10025
+ # Unique human-readable name of the SecretStore.
10026
+ attr_accessor :name
10027
+ # The namespace to make requests within
10028
+ attr_accessor :namespace
10029
+ # The mount point of the PKI engine configured with the desired CA
10030
+ attr_accessor :pki_mount_point
10031
+ # The URL of the Vault to target
10032
+ attr_accessor :server_address
10033
+ # The signing role to be used for signing certificates
10034
+ attr_accessor :signing_role
10035
+ # Tags is a map of key, value pairs.
10036
+ attr_accessor :tags
10037
+
10038
+ def initialize(
10039
+ ca_cert_path: nil,
10040
+ client_cert_path: nil,
10041
+ client_key_path: nil,
10042
+ id: nil,
10043
+ name: nil,
10044
+ namespace: nil,
10045
+ pki_mount_point: nil,
10046
+ server_address: nil,
10047
+ signing_role: nil,
10048
+ tags: nil
10049
+ )
10050
+ @ca_cert_path = ca_cert_path == nil ? "" : ca_cert_path
10051
+ @client_cert_path = client_cert_path == nil ? "" : client_cert_path
10052
+ @client_key_path = client_key_path == nil ? "" : client_key_path
10053
+ @id = id == nil ? "" : id
10054
+ @name = name == nil ? "" : name
10055
+ @namespace = namespace == nil ? "" : namespace
10056
+ @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
10057
+ @server_address = server_address == nil ? "" : server_address
10058
+ @signing_role = signing_role == nil ? "" : signing_role
10059
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10060
+ end
10061
+
10062
+ def to_json(options = {})
10063
+ hash = {}
10064
+ self.instance_variables.each do |var|
10065
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10066
+ end
10067
+ hash.to_json
10068
+ end
10069
+ end
10070
+
9871
10071
  class VaultTLSStore
9872
10072
  # A path to a CA file accessible by a Node
9873
10073
  attr_accessor :ca_cert_path
@@ -9915,6 +10115,94 @@ module SDM
9915
10115
  end
9916
10116
  end
9917
10117
 
10118
+ # VaultTokenCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
10119
+ class VaultTokenCertSSHStore
10120
+ # Unique identifier of the SecretStore.
10121
+ attr_accessor :id
10122
+ # Unique human-readable name of the SecretStore.
10123
+ attr_accessor :name
10124
+ # The namespace to make requests within
10125
+ attr_accessor :namespace
10126
+ # The URL of the Vault to target
10127
+ attr_accessor :server_address
10128
+ # The signing role to be used for signing certificates
10129
+ attr_accessor :signing_role
10130
+ # The mount point of the SSH engine configured with the desired CA
10131
+ attr_accessor :ssh_mount_point
10132
+ # Tags is a map of key, value pairs.
10133
+ attr_accessor :tags
10134
+
10135
+ def initialize(
10136
+ id: nil,
10137
+ name: nil,
10138
+ namespace: nil,
10139
+ server_address: nil,
10140
+ signing_role: nil,
10141
+ ssh_mount_point: nil,
10142
+ tags: nil
10143
+ )
10144
+ @id = id == nil ? "" : id
10145
+ @name = name == nil ? "" : name
10146
+ @namespace = namespace == nil ? "" : namespace
10147
+ @server_address = server_address == nil ? "" : server_address
10148
+ @signing_role = signing_role == nil ? "" : signing_role
10149
+ @ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
10150
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10151
+ end
10152
+
10153
+ def to_json(options = {})
10154
+ hash = {}
10155
+ self.instance_variables.each do |var|
10156
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10157
+ end
10158
+ hash.to_json
10159
+ end
10160
+ end
10161
+
10162
+ # VaultTokenCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10163
+ class VaultTokenCertX509Store
10164
+ # Unique identifier of the SecretStore.
10165
+ attr_accessor :id
10166
+ # Unique human-readable name of the SecretStore.
10167
+ attr_accessor :name
10168
+ # The namespace to make requests within
10169
+ attr_accessor :namespace
10170
+ # The mount point of the PKI engine configured with the desired CA
10171
+ attr_accessor :pki_mount_point
10172
+ # The URL of the Vault to target
10173
+ attr_accessor :server_address
10174
+ # The signing role to be used for signing certificates
10175
+ attr_accessor :signing_role
10176
+ # Tags is a map of key, value pairs.
10177
+ attr_accessor :tags
10178
+
10179
+ def initialize(
10180
+ id: nil,
10181
+ name: nil,
10182
+ namespace: nil,
10183
+ pki_mount_point: nil,
10184
+ server_address: nil,
10185
+ signing_role: nil,
10186
+ tags: nil
10187
+ )
10188
+ @id = id == nil ? "" : id
10189
+ @name = name == nil ? "" : name
10190
+ @namespace = namespace == nil ? "" : namespace
10191
+ @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
10192
+ @server_address = server_address == nil ? "" : server_address
10193
+ @signing_role = signing_role == nil ? "" : signing_role
10194
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10195
+ end
10196
+
10197
+ def to_json(options = {})
10198
+ hash = {}
10199
+ self.instance_variables.each do |var|
10200
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10201
+ end
10202
+ hash.to_json
10203
+ end
10204
+ end
10205
+
9918
10206
  class VaultTokenStore
9919
10207
  # Unique identifier of the SecretStore.
9920
10208
  attr_accessor :id
data/lib/strongdm.rb CHANGED
@@ -29,7 +29,7 @@ module SDM #:nodoc:
29
29
  DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
30
30
  DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
31
31
  API_VERSION = "2021-08-23"
32
- USER_AGENT = "strongdm-sdk-ruby/6.3.0"
32
+ USER_AGENT = "strongdm-sdk-ruby/6.3.1"
33
33
  private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
34
34
 
35
35
  # Creates a new strongDM API client.
data/lib/svc.rb CHANGED
@@ -3763,8 +3763,14 @@ module SDM #:nodoc:
3763
3763
  # {DelineaStore}
3764
3764
  # {GCPStore}
3765
3765
  # {VaultAppRoleStore}
3766
+ # {VaultAppRoleCertSSHStore}
3767
+ # {VaultAppRoleCertX509Store}
3766
3768
  # {VaultTLSStore}
3769
+ # {VaultTLSCertSSHStore}
3770
+ # {VaultTLSCertX509Store}
3767
3771
  # {VaultTokenStore}
3772
+ # {VaultTokenCertSSHStore}
3773
+ # {VaultTokenCertX509Store}
3768
3774
  class SecretStores
3769
3775
  extend Gem::Deprecate
3770
3776
 
data/lib/version CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "6.3.0"
16
+ VERSION = "6.3.1"
17
17
  end
data/lib/version.rb CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "6.3.0"
16
+ VERSION = "6.3.1"
17
17
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: strongdm
3
3
  version: !ruby/object:Gem::Version
4
- version: 6.3.0
4
+ version: 6.3.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - strongDM Team
@@ -81,8 +81,8 @@ files:
81
81
  - "./.git/logs/HEAD"
82
82
  - "./.git/logs/refs/heads/master"
83
83
  - "./.git/logs/refs/remotes/origin/HEAD"
84
- - "./.git/objects/pack/pack-937ee306e3b4fe54045c0d7b71751845270470b4.idx"
85
- - "./.git/objects/pack/pack-937ee306e3b4fe54045c0d7b71751845270470b4.pack"
84
+ - "./.git/objects/pack/pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.idx"
85
+ - "./.git/objects/pack/pack-a7478d78e4c6471c95cbeb49374ac04dffb1510e.pack"
86
86
  - "./.git/packed-refs"
87
87
  - "./.git/refs/heads/master"
88
88
  - "./.git/refs/remotes/origin/HEAD"