strongdm 7.0.0 → 8.0.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.git/ORIG_HEAD +1 -1
- data/.git/index +0 -0
- data/.git/logs/HEAD +3 -3
- data/.git/logs/refs/heads/master +2 -2
- data/.git/logs/refs/remotes/origin/HEAD +1 -1
- data/.git/objects/pack/{pack-35100f17336a9a56e777373870676ef90dc420dc.idx → pack-69c9823403bcd0961320d5e472ca7682c217e13f.idx} +0 -0
- data/.git/objects/pack/{pack-35100f17336a9a56e777373870676ef90dc420dc.pack → pack-69c9823403bcd0961320d5e472ca7682c217e13f.pack} +0 -0
- data/.git/packed-refs +4 -2
- data/.git/refs/heads/master +1 -1
- data/lib/grpc/accounts_pb.rb +6 -0
- data/lib/grpc/accounts_services_pb.rb +1 -0
- data/lib/grpc/plumbing.rb +74 -0
- data/lib/grpc/secret_store_types_pb.rb +8 -1
- data/lib/models/porcelain.rb +91 -11
- data/lib/strongdm.rb +4 -2
- data/lib/svc.rb +4 -0
- data/lib/version +1 -1
- data/lib/version.rb +1 -1
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 1692786ff878322b92229abdcf3a833c53a3ac2fcc282c908b88746b39c50a10
|
4
|
+
data.tar.gz: 523e925b33b3b3246e53f3819820c50095305ad79c486e6b21cb09e5558c89e7
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8d6a587a20eb66b2d917c2587f553f98325d1e270b8f321ce628eb3d22fb5b0437b655e5f3ed2b38e48971d3e6302775db7473e3d1397bc436e77cba926fe65e
|
7
|
+
data.tar.gz: 8cb03acd29cce7f386c47956607d3e3e2b7457cd30200fcfdcf4760bb3a0539bf4811d7ad42c4ea88c0b707405a069b4bdb86fd5ff418e0c506585f52d2d4f86
|
data/.git/ORIG_HEAD
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
f34575bc142eabf113dbbc5b40b3a16e0c026355
|
data/.git/index
CHANGED
Binary file
|
data/.git/logs/HEAD
CHANGED
@@ -1,3 +1,3 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
2
|
-
|
3
|
-
|
1
|
+
0000000000000000000000000000000000000000 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
2
|
+
f34575bc142eabf113dbbc5b40b3a16e0c026355 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 checkout: moving from master to master
|
3
|
+
f34575bc142eabf113dbbc5b40b3a16e0c026355 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1712692017 +0000 merge origin/development: Fast-forward
|
data/.git/logs/refs/heads/master
CHANGED
@@ -1,2 +1,2 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
2
|
-
|
1
|
+
0000000000000000000000000000000000000000 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
2
|
+
f34575bc142eabf113dbbc5b40b3a16e0c026355 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1712692017 +0000 merge origin/development: Fast-forward
|
@@ -1 +1 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
1
|
+
0000000000000000000000000000000000000000 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
Binary file
|
Binary file
|
data/.git/packed-refs
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
# pack-refs with: peeled fully-peeled sorted
|
2
|
-
|
3
|
-
|
2
|
+
7659a644ef149debee2515386136b7e2d5e917ea refs/remotes/origin/development
|
3
|
+
f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/remotes/origin/master
|
4
4
|
2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
|
5
5
|
04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
|
6
6
|
6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
|
@@ -102,3 +102,5 @@ e37aa2b50ffd917949a8e1c7a1fa28d12071fa69 refs/tags/v6.7.0
|
|
102
102
|
3e28afb8b757876c463b22aac13ee618d9ead204 refs/tags/v6.7.1
|
103
103
|
0429c9a2739f699ea33db7e6dd85e6be47e9190e refs/tags/v6.8.0
|
104
104
|
d8a1092c15d3618de31ada43875014d96bd21e36 refs/tags/v6.9.0
|
105
|
+
c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/tags/v7.0.0
|
106
|
+
f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/tags/v7.1.0
|
data/.git/refs/heads/master
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
7659a644ef149debee2515386136b7e2d5e917ea
|
data/lib/grpc/accounts_pb.rb
CHANGED
@@ -17,6 +17,7 @@
|
|
17
17
|
|
18
18
|
require "google/protobuf"
|
19
19
|
|
20
|
+
require "google/protobuf/duration_pb"
|
20
21
|
require "google/protobuf/timestamp_pb"
|
21
22
|
require "options_pb"
|
22
23
|
require "spec_pb"
|
@@ -33,6 +34,8 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
33
34
|
optional :account, :message, 2, "v1.Account"
|
34
35
|
optional :token, :string, 3
|
35
36
|
optional :rate_limit, :message, 4, "v1.RateLimitMetadata"
|
37
|
+
optional :access_key, :string, 5
|
38
|
+
optional :secret_key, :string, 6
|
36
39
|
end
|
37
40
|
add_message "v1.AccountGetRequest" do
|
38
41
|
optional :meta, :message, 1, "v1.GetRequestMetadata"
|
@@ -103,6 +106,9 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
103
106
|
optional :tags, :message, 4, "v1.Tags"
|
104
107
|
optional :rekeyed, :message, 5, "google.protobuf.Timestamp"
|
105
108
|
optional :deadline, :message, 6, "google.protobuf.Timestamp"
|
109
|
+
optional :account_type, :string, 7
|
110
|
+
repeated :permissions, :string, 8
|
111
|
+
optional :duration, :message, 9, "google.protobuf.Duration"
|
106
112
|
end
|
107
113
|
end
|
108
114
|
end
|
@@ -23,6 +23,7 @@ module V1
|
|
23
23
|
# Accounts are users that have access to strongDM. There are two types of accounts:
|
24
24
|
# 1. **Users:** humans who are authenticated through username and password or SSO.
|
25
25
|
# 2. **Service Accounts:** machines that are authenticated using a service token.
|
26
|
+
# 3. **Tokens** are access keys with permissions that can be used for authentication.
|
26
27
|
class Service
|
27
28
|
include ::GRPC::GenericService
|
28
29
|
|
data/lib/grpc/plumbing.rb
CHANGED
@@ -1041,6 +1041,9 @@ module SDM
|
|
1041
1041
|
if porcelain.instance_of? Service
|
1042
1042
|
plumbing.service = convert_service_to_plumbing(porcelain)
|
1043
1043
|
end
|
1044
|
+
if porcelain.instance_of? Token
|
1045
|
+
plumbing.token = convert_token_to_plumbing(porcelain)
|
1046
|
+
end
|
1044
1047
|
if porcelain.instance_of? User
|
1045
1048
|
plumbing.user = convert_user_to_plumbing(porcelain)
|
1046
1049
|
end
|
@@ -1054,6 +1057,9 @@ module SDM
|
|
1054
1057
|
if plumbing.service != nil
|
1055
1058
|
return convert_service_to_porcelain(plumbing.service)
|
1056
1059
|
end
|
1060
|
+
if plumbing.token != nil
|
1061
|
+
return convert_token_to_porcelain(plumbing.token)
|
1062
|
+
end
|
1057
1063
|
if plumbing.user != nil
|
1058
1064
|
return convert_user_to_porcelain(plumbing.user)
|
1059
1065
|
end
|
@@ -1271,9 +1277,11 @@ module SDM
|
|
1271
1277
|
return nil
|
1272
1278
|
end
|
1273
1279
|
porcelain = AccountCreateResponse.new()
|
1280
|
+
porcelain.access_key = (plumbing.access_key)
|
1274
1281
|
porcelain.account = convert_account_to_porcelain(plumbing.account)
|
1275
1282
|
porcelain.meta = convert_create_response_metadata_to_porcelain(plumbing.meta)
|
1276
1283
|
porcelain.rate_limit = convert_rate_limit_metadata_to_porcelain(plumbing.rate_limit)
|
1284
|
+
porcelain.secret_key = (plumbing.secret_key)
|
1277
1285
|
porcelain.token = (plumbing.token)
|
1278
1286
|
porcelain
|
1279
1287
|
end
|
@@ -1283,9 +1291,11 @@ module SDM
|
|
1283
1291
|
return nil
|
1284
1292
|
end
|
1285
1293
|
plumbing = V1::AccountCreateResponse.new()
|
1294
|
+
plumbing.access_key = (porcelain.access_key)
|
1286
1295
|
plumbing.account = convert_account_to_plumbing(porcelain.account)
|
1287
1296
|
plumbing.meta = convert_create_response_metadata_to_plumbing(porcelain.meta)
|
1288
1297
|
plumbing.rate_limit = convert_rate_limit_metadata_to_plumbing(porcelain.rate_limit)
|
1298
|
+
plumbing.secret_key = (porcelain.secret_key)
|
1289
1299
|
plumbing.token = (porcelain.token)
|
1290
1300
|
plumbing
|
1291
1301
|
end
|
@@ -4878,6 +4888,7 @@ module SDM
|
|
4878
4888
|
porcelain.caid = (plumbing.caID)
|
4879
4889
|
porcelain.capoolid = (plumbing.caPoolID)
|
4880
4890
|
porcelain.id = (plumbing.id)
|
4891
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
4881
4892
|
porcelain.location = (plumbing.location)
|
4882
4893
|
porcelain.name = (plumbing.name)
|
4883
4894
|
porcelain.projectid = (plumbing.projectID)
|
@@ -4893,6 +4904,7 @@ module SDM
|
|
4893
4904
|
plumbing.caID = (porcelain.caid)
|
4894
4905
|
plumbing.caPoolID = (porcelain.capoolid)
|
4895
4906
|
plumbing.id = (porcelain.id)
|
4907
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
4896
4908
|
plumbing.location = (porcelain.location)
|
4897
4909
|
plumbing.name = (porcelain.name)
|
4898
4910
|
plumbing.projectID = (porcelain.projectid)
|
@@ -11205,6 +11217,56 @@ module SDM
|
|
11205
11217
|
end
|
11206
11218
|
items
|
11207
11219
|
end
|
11220
|
+
def self.convert_token_to_porcelain(plumbing)
|
11221
|
+
if plumbing == nil
|
11222
|
+
return nil
|
11223
|
+
end
|
11224
|
+
porcelain = Token.new()
|
11225
|
+
porcelain.account_type = (plumbing.account_type)
|
11226
|
+
porcelain.deadline = convert_timestamp_to_porcelain(plumbing.deadline)
|
11227
|
+
porcelain.duration = convert_duration_to_porcelain(plumbing.duration)
|
11228
|
+
porcelain.id = (plumbing.id)
|
11229
|
+
porcelain.name = (plumbing.name)
|
11230
|
+
porcelain.permissions = (plumbing.permissions)
|
11231
|
+
porcelain.rekeyed = convert_timestamp_to_porcelain(plumbing.rekeyed)
|
11232
|
+
porcelain.suspended = (plumbing.suspended)
|
11233
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
11234
|
+
porcelain
|
11235
|
+
end
|
11236
|
+
|
11237
|
+
def self.convert_token_to_plumbing(porcelain)
|
11238
|
+
if porcelain == nil
|
11239
|
+
return nil
|
11240
|
+
end
|
11241
|
+
plumbing = V1::Token.new()
|
11242
|
+
plumbing.account_type = (porcelain.account_type)
|
11243
|
+
plumbing.deadline = convert_timestamp_to_plumbing(porcelain.deadline)
|
11244
|
+
plumbing.duration = convert_duration_to_plumbing(porcelain.duration)
|
11245
|
+
plumbing.id = (porcelain.id)
|
11246
|
+
plumbing.name = (porcelain.name)
|
11247
|
+
plumbing.permissions += (porcelain.permissions)
|
11248
|
+
plumbing.rekeyed = convert_timestamp_to_plumbing(porcelain.rekeyed)
|
11249
|
+
plumbing.suspended = (porcelain.suspended)
|
11250
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
11251
|
+
plumbing
|
11252
|
+
end
|
11253
|
+
def self.convert_repeated_token_to_plumbing(porcelains)
|
11254
|
+
items = Array.new
|
11255
|
+
porcelains.each do |porcelain|
|
11256
|
+
plumbing = convert_token_to_plumbing(porcelain)
|
11257
|
+
items.append(plumbing)
|
11258
|
+
end
|
11259
|
+
items
|
11260
|
+
end
|
11261
|
+
|
11262
|
+
def self.convert_repeated_token_to_porcelain(plumbings)
|
11263
|
+
items = Array.new
|
11264
|
+
plumbings.each do |plumbing|
|
11265
|
+
porcelain = convert_token_to_porcelain(plumbing)
|
11266
|
+
items.append(porcelain)
|
11267
|
+
end
|
11268
|
+
items
|
11269
|
+
end
|
11208
11270
|
def self.convert_trino_to_porcelain(plumbing)
|
11209
11271
|
if plumbing == nil
|
11210
11272
|
return nil
|
@@ -11353,6 +11415,7 @@ module SDM
|
|
11353
11415
|
end
|
11354
11416
|
porcelain = VaultAppRoleCertSSHStore.new()
|
11355
11417
|
porcelain.id = (plumbing.id)
|
11418
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
11356
11419
|
porcelain.name = (plumbing.name)
|
11357
11420
|
porcelain.namespace = (plumbing.namespace)
|
11358
11421
|
porcelain.server_address = (plumbing.server_address)
|
@@ -11368,6 +11431,7 @@ module SDM
|
|
11368
11431
|
end
|
11369
11432
|
plumbing = V1::VaultAppRoleCertSSHStore.new()
|
11370
11433
|
plumbing.id = (porcelain.id)
|
11434
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
11371
11435
|
plumbing.name = (porcelain.name)
|
11372
11436
|
plumbing.namespace = (porcelain.namespace)
|
11373
11437
|
plumbing.server_address = (porcelain.server_address)
|
@@ -11399,6 +11463,7 @@ module SDM
|
|
11399
11463
|
end
|
11400
11464
|
porcelain = VaultAppRoleCertX509Store.new()
|
11401
11465
|
porcelain.id = (plumbing.id)
|
11466
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
11402
11467
|
porcelain.name = (plumbing.name)
|
11403
11468
|
porcelain.namespace = (plumbing.namespace)
|
11404
11469
|
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
@@ -11414,6 +11479,7 @@ module SDM
|
|
11414
11479
|
end
|
11415
11480
|
plumbing = V1::VaultAppRoleCertX509Store.new()
|
11416
11481
|
plumbing.id = (porcelain.id)
|
11482
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
11417
11483
|
plumbing.name = (porcelain.name)
|
11418
11484
|
plumbing.namespace = (porcelain.namespace)
|
11419
11485
|
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
@@ -11490,6 +11556,7 @@ module SDM
|
|
11490
11556
|
porcelain.client_cert_path = (plumbing.client_cert_path)
|
11491
11557
|
porcelain.client_key_path = (plumbing.client_key_path)
|
11492
11558
|
porcelain.id = (plumbing.id)
|
11559
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
11493
11560
|
porcelain.name = (plumbing.name)
|
11494
11561
|
porcelain.namespace = (plumbing.namespace)
|
11495
11562
|
porcelain.server_address = (plumbing.server_address)
|
@@ -11508,6 +11575,7 @@ module SDM
|
|
11508
11575
|
plumbing.client_cert_path = (porcelain.client_cert_path)
|
11509
11576
|
plumbing.client_key_path = (porcelain.client_key_path)
|
11510
11577
|
plumbing.id = (porcelain.id)
|
11578
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
11511
11579
|
plumbing.name = (porcelain.name)
|
11512
11580
|
plumbing.namespace = (porcelain.namespace)
|
11513
11581
|
plumbing.server_address = (porcelain.server_address)
|
@@ -11542,6 +11610,7 @@ module SDM
|
|
11542
11610
|
porcelain.client_cert_path = (plumbing.client_cert_path)
|
11543
11611
|
porcelain.client_key_path = (plumbing.client_key_path)
|
11544
11612
|
porcelain.id = (plumbing.id)
|
11613
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
11545
11614
|
porcelain.name = (plumbing.name)
|
11546
11615
|
porcelain.namespace = (plumbing.namespace)
|
11547
11616
|
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
@@ -11560,6 +11629,7 @@ module SDM
|
|
11560
11629
|
plumbing.client_cert_path = (porcelain.client_cert_path)
|
11561
11630
|
plumbing.client_key_path = (porcelain.client_key_path)
|
11562
11631
|
plumbing.id = (porcelain.id)
|
11632
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
11563
11633
|
plumbing.name = (porcelain.name)
|
11564
11634
|
plumbing.namespace = (porcelain.namespace)
|
11565
11635
|
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
@@ -11639,6 +11709,7 @@ module SDM
|
|
11639
11709
|
end
|
11640
11710
|
porcelain = VaultTokenCertSSHStore.new()
|
11641
11711
|
porcelain.id = (plumbing.id)
|
11712
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
11642
11713
|
porcelain.name = (plumbing.name)
|
11643
11714
|
porcelain.namespace = (plumbing.namespace)
|
11644
11715
|
porcelain.server_address = (plumbing.server_address)
|
@@ -11654,6 +11725,7 @@ module SDM
|
|
11654
11725
|
end
|
11655
11726
|
plumbing = V1::VaultTokenCertSSHStore.new()
|
11656
11727
|
plumbing.id = (porcelain.id)
|
11728
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
11657
11729
|
plumbing.name = (porcelain.name)
|
11658
11730
|
plumbing.namespace = (porcelain.namespace)
|
11659
11731
|
plumbing.server_address = (porcelain.server_address)
|
@@ -11685,6 +11757,7 @@ module SDM
|
|
11685
11757
|
end
|
11686
11758
|
porcelain = VaultTokenCertX509Store.new()
|
11687
11759
|
porcelain.id = (plumbing.id)
|
11760
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
11688
11761
|
porcelain.name = (plumbing.name)
|
11689
11762
|
porcelain.namespace = (plumbing.namespace)
|
11690
11763
|
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
@@ -11700,6 +11773,7 @@ module SDM
|
|
11700
11773
|
end
|
11701
11774
|
plumbing = V1::VaultTokenCertX509Store.new()
|
11702
11775
|
plumbing.id = (porcelain.id)
|
11776
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
11703
11777
|
plumbing.name = (porcelain.name)
|
11704
11778
|
plumbing.namespace = (porcelain.namespace)
|
11705
11779
|
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
@@ -56,7 +56,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
56
56
|
optional :name, :string, 2
|
57
57
|
optional :caArn, :string, 5
|
58
58
|
optional :certificateTemplateArn, :string, 7
|
59
|
-
optional :issuedCertTTLMinutes, :
|
59
|
+
optional :issuedCertTTLMinutes, :int32, 8
|
60
60
|
optional :region, :string, 3
|
61
61
|
optional :signingAlgo, :string, 6
|
62
62
|
optional :tags, :message, 4, "v1.Tags"
|
@@ -109,6 +109,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
109
109
|
optional :name, :string, 2
|
110
110
|
optional :caID, :string, 6
|
111
111
|
optional :caPoolID, :string, 5
|
112
|
+
optional :issuedCertTTLMinutes, :int32, 7
|
112
113
|
optional :location, :string, 4
|
113
114
|
optional :projectID, :string, 3
|
114
115
|
optional :tags, :message, 32771, "v1.Tags"
|
@@ -123,6 +124,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
123
124
|
add_message "v1.VaultAppRoleCertSSHStore" do
|
124
125
|
optional :id, :string, 1
|
125
126
|
optional :name, :string, 2
|
127
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
126
128
|
optional :namespace, :string, 5
|
127
129
|
optional :server_address, :string, 3
|
128
130
|
optional :signing_role, :string, 7
|
@@ -132,6 +134,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
132
134
|
add_message "v1.VaultAppRoleCertX509Store" do
|
133
135
|
optional :id, :string, 1
|
134
136
|
optional :name, :string, 2
|
137
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
135
138
|
optional :namespace, :string, 5
|
136
139
|
optional :pki_mount_point, :string, 6
|
137
140
|
optional :server_address, :string, 3
|
@@ -154,6 +157,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
154
157
|
optional :CA_cert_path, :string, 4
|
155
158
|
optional :client_cert_path, :string, 5
|
156
159
|
optional :client_key_path, :string, 6
|
160
|
+
optional :issuedCertTTLMinutes, :int32, 11
|
157
161
|
optional :namespace, :string, 8
|
158
162
|
optional :server_address, :string, 3
|
159
163
|
optional :signing_role, :string, 10
|
@@ -166,6 +170,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
166
170
|
optional :CA_cert_path, :string, 4
|
167
171
|
optional :client_cert_path, :string, 5
|
168
172
|
optional :client_key_path, :string, 6
|
173
|
+
optional :issuedCertTTLMinutes, :int32, 11
|
169
174
|
optional :namespace, :string, 8
|
170
175
|
optional :pki_mount_point, :string, 9
|
171
176
|
optional :server_address, :string, 3
|
@@ -182,6 +187,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
182
187
|
add_message "v1.VaultTokenCertSSHStore" do
|
183
188
|
optional :id, :string, 1
|
184
189
|
optional :name, :string, 2
|
190
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
185
191
|
optional :namespace, :string, 5
|
186
192
|
optional :server_address, :string, 3
|
187
193
|
optional :signing_role, :string, 7
|
@@ -191,6 +197,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
191
197
|
add_message "v1.VaultTokenCertX509Store" do
|
192
198
|
optional :id, :string, 1
|
193
199
|
optional :name, :string, 2
|
200
|
+
optional :issuedCertTTLMinutes, :int32, 8
|
194
201
|
optional :namespace, :string, 5
|
195
202
|
optional :pki_mount_point, :string, 6
|
196
203
|
optional :server_address, :string, 3
|
data/lib/models/porcelain.rb
CHANGED
@@ -458,7 +458,6 @@ module SDM
|
|
458
458
|
end
|
459
459
|
end
|
460
460
|
|
461
|
-
# AWSCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
462
461
|
class AWSCertX509Store
|
463
462
|
# The ARN of the CA in AWS Private CA
|
464
463
|
attr_accessor :caarn
|
@@ -466,7 +465,7 @@ module SDM
|
|
466
465
|
attr_accessor :certificatetemplatearn
|
467
466
|
# Unique identifier of the SecretStore.
|
468
467
|
attr_accessor :id
|
469
|
-
# The lifetime of certificates issued by this CA represented in minutes
|
468
|
+
# The lifetime of certificates issued by this CA represented in minutes.
|
470
469
|
attr_accessor :issuedcertttlminutes
|
471
470
|
# Unique human-readable name of the SecretStore.
|
472
471
|
attr_accessor :name
|
@@ -490,7 +489,7 @@ module SDM
|
|
490
489
|
@caarn = caarn == nil ? "" : caarn
|
491
490
|
@certificatetemplatearn = certificatetemplatearn == nil ? "" : certificatetemplatearn
|
492
491
|
@id = id == nil ? "" : id
|
493
|
-
@issuedcertttlminutes = issuedcertttlminutes == nil ?
|
492
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
494
493
|
@name = name == nil ? "" : name
|
495
494
|
@region = region == nil ? "" : region
|
496
495
|
@signingalgo = signingalgo == nil ? "" : signingalgo
|
@@ -1082,25 +1081,33 @@ module SDM
|
|
1082
1081
|
|
1083
1082
|
# AccountCreateResponse reports how the Accounts were created in the system.
|
1084
1083
|
class AccountCreateResponse
|
1084
|
+
# ID part of the API key.
|
1085
|
+
attr_accessor :access_key
|
1085
1086
|
# The created Account.
|
1086
1087
|
attr_accessor :account
|
1087
1088
|
# Reserved for future use.
|
1088
1089
|
attr_accessor :meta
|
1089
1090
|
# Rate limit information.
|
1090
1091
|
attr_accessor :rate_limit
|
1092
|
+
# Secret part of the API key.
|
1093
|
+
attr_accessor :secret_key
|
1091
1094
|
# The auth token generated for the Account. The Account will use this token to
|
1092
1095
|
# authenticate with the strongDM API.
|
1093
1096
|
attr_accessor :token
|
1094
1097
|
|
1095
1098
|
def initialize(
|
1099
|
+
access_key: nil,
|
1096
1100
|
account: nil,
|
1097
1101
|
meta: nil,
|
1098
1102
|
rate_limit: nil,
|
1103
|
+
secret_key: nil,
|
1099
1104
|
token: nil
|
1100
1105
|
)
|
1106
|
+
@access_key = access_key == nil ? "" : access_key
|
1101
1107
|
@account = account == nil ? nil : account
|
1102
1108
|
@meta = meta == nil ? nil : meta
|
1103
1109
|
@rate_limit = rate_limit == nil ? nil : rate_limit
|
1110
|
+
@secret_key = secret_key == nil ? "" : secret_key
|
1104
1111
|
@token = token == nil ? "" : token
|
1105
1112
|
end
|
1106
1113
|
|
@@ -1506,7 +1513,6 @@ module SDM
|
|
1506
1513
|
end
|
1507
1514
|
end
|
1508
1515
|
|
1509
|
-
# ActiveDirectoryStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
1510
1516
|
class ActiveDirectoryStore
|
1511
1517
|
# Unique identifier of the SecretStore.
|
1512
1518
|
attr_accessor :id
|
@@ -4648,7 +4654,6 @@ module SDM
|
|
4648
4654
|
end
|
4649
4655
|
end
|
4650
4656
|
|
4651
|
-
# GCPCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
4652
4657
|
class GCPCertX509Store
|
4653
4658
|
# The ID of the target CA
|
4654
4659
|
attr_accessor :caid
|
@@ -4656,6 +4661,8 @@ module SDM
|
|
4656
4661
|
attr_accessor :capoolid
|
4657
4662
|
# Unique identifier of the SecretStore.
|
4658
4663
|
attr_accessor :id
|
4664
|
+
# The lifetime of certificates issued by this CA represented in minutes.
|
4665
|
+
attr_accessor :issuedcertttlminutes
|
4659
4666
|
# The Region for the CA in GCP format e.g. us-west1
|
4660
4667
|
attr_accessor :location
|
4661
4668
|
# Unique human-readable name of the SecretStore.
|
@@ -4669,6 +4676,7 @@ module SDM
|
|
4669
4676
|
caid: nil,
|
4670
4677
|
capoolid: nil,
|
4671
4678
|
id: nil,
|
4679
|
+
issuedcertttlminutes: nil,
|
4672
4680
|
location: nil,
|
4673
4681
|
name: nil,
|
4674
4682
|
projectid: nil,
|
@@ -4677,6 +4685,7 @@ module SDM
|
|
4677
4685
|
@caid = caid == nil ? "" : caid
|
4678
4686
|
@capoolid = capoolid == nil ? "" : capoolid
|
4679
4687
|
@id = id == nil ? "" : id
|
4688
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
4680
4689
|
@location = location == nil ? "" : location
|
4681
4690
|
@name = name == nil ? "" : name
|
4682
4691
|
@projectid = projectid == nil ? "" : projectid
|
@@ -10408,6 +10417,59 @@ module SDM
|
|
10408
10417
|
end
|
10409
10418
|
end
|
10410
10419
|
|
10420
|
+
# A Token is an account providing tokenized access for automation or integration use.
|
10421
|
+
# Tokens include admin tokens, API keys, and SCIM tokens.
|
10422
|
+
class Token
|
10423
|
+
# Corresponds to the type of token, e.g. api or admin-token.
|
10424
|
+
attr_accessor :account_type
|
10425
|
+
# The timestamp when the Token will expire.
|
10426
|
+
attr_accessor :deadline
|
10427
|
+
# Duration from token creation to expiration.
|
10428
|
+
attr_accessor :duration
|
10429
|
+
# Unique identifier of the Token.
|
10430
|
+
attr_accessor :id
|
10431
|
+
# Unique human-readable name of the Token.
|
10432
|
+
attr_accessor :name
|
10433
|
+
# Permissions assigned to the token, e.g. role:create.
|
10434
|
+
attr_accessor :permissions
|
10435
|
+
# The timestamp when the Token was last rekeyed.
|
10436
|
+
attr_accessor :rekeyed
|
10437
|
+
# Reserved for future use. Always false for tokens.
|
10438
|
+
attr_accessor :suspended
|
10439
|
+
# Tags is a map of key, value pairs.
|
10440
|
+
attr_accessor :tags
|
10441
|
+
|
10442
|
+
def initialize(
|
10443
|
+
account_type: nil,
|
10444
|
+
deadline: nil,
|
10445
|
+
duration: nil,
|
10446
|
+
id: nil,
|
10447
|
+
name: nil,
|
10448
|
+
permissions: nil,
|
10449
|
+
rekeyed: nil,
|
10450
|
+
suspended: nil,
|
10451
|
+
tags: nil
|
10452
|
+
)
|
10453
|
+
@account_type = account_type == nil ? "" : account_type
|
10454
|
+
@deadline = deadline == nil ? nil : deadline
|
10455
|
+
@duration = duration == nil ? nil : duration
|
10456
|
+
@id = id == nil ? "" : id
|
10457
|
+
@name = name == nil ? "" : name
|
10458
|
+
@permissions = permissions == nil ? [] : permissions
|
10459
|
+
@rekeyed = rekeyed == nil ? nil : rekeyed
|
10460
|
+
@suspended = suspended == nil ? false : suspended
|
10461
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
10462
|
+
end
|
10463
|
+
|
10464
|
+
def to_json(options = {})
|
10465
|
+
hash = {}
|
10466
|
+
self.instance_variables.each do |var|
|
10467
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
10468
|
+
end
|
10469
|
+
hash.to_json
|
10470
|
+
end
|
10471
|
+
end
|
10472
|
+
|
10411
10473
|
# Trino is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10412
10474
|
class Trino
|
10413
10475
|
# The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
@@ -10547,10 +10609,11 @@ module SDM
|
|
10547
10609
|
end
|
10548
10610
|
end
|
10549
10611
|
|
10550
|
-
# VaultAppRoleCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10551
10612
|
class VaultAppRoleCertSSHStore
|
10552
10613
|
# Unique identifier of the SecretStore.
|
10553
10614
|
attr_accessor :id
|
10615
|
+
# The lifetime of certificates issued by this CA represented in minutes.
|
10616
|
+
attr_accessor :issuedcertttlminutes
|
10554
10617
|
# Unique human-readable name of the SecretStore.
|
10555
10618
|
attr_accessor :name
|
10556
10619
|
# The namespace to make requests within
|
@@ -10566,6 +10629,7 @@ module SDM
|
|
10566
10629
|
|
10567
10630
|
def initialize(
|
10568
10631
|
id: nil,
|
10632
|
+
issuedcertttlminutes: nil,
|
10569
10633
|
name: nil,
|
10570
10634
|
namespace: nil,
|
10571
10635
|
server_address: nil,
|
@@ -10574,6 +10638,7 @@ module SDM
|
|
10574
10638
|
tags: nil
|
10575
10639
|
)
|
10576
10640
|
@id = id == nil ? "" : id
|
10641
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
10577
10642
|
@name = name == nil ? "" : name
|
10578
10643
|
@namespace = namespace == nil ? "" : namespace
|
10579
10644
|
@server_address = server_address == nil ? "" : server_address
|
@@ -10591,10 +10656,11 @@ module SDM
|
|
10591
10656
|
end
|
10592
10657
|
end
|
10593
10658
|
|
10594
|
-
# VaultAppRoleCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10595
10659
|
class VaultAppRoleCertX509Store
|
10596
10660
|
# Unique identifier of the SecretStore.
|
10597
10661
|
attr_accessor :id
|
10662
|
+
# The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
10663
|
+
attr_accessor :issuedcertttlminutes
|
10598
10664
|
# Unique human-readable name of the SecretStore.
|
10599
10665
|
attr_accessor :name
|
10600
10666
|
# The namespace to make requests within
|
@@ -10610,6 +10676,7 @@ module SDM
|
|
10610
10676
|
|
10611
10677
|
def initialize(
|
10612
10678
|
id: nil,
|
10679
|
+
issuedcertttlminutes: nil,
|
10613
10680
|
name: nil,
|
10614
10681
|
namespace: nil,
|
10615
10682
|
pki_mount_point: nil,
|
@@ -10618,6 +10685,7 @@ module SDM
|
|
10618
10685
|
tags: nil
|
10619
10686
|
)
|
10620
10687
|
@id = id == nil ? "" : id
|
10688
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
10621
10689
|
@name = name == nil ? "" : name
|
10622
10690
|
@namespace = namespace == nil ? "" : namespace
|
10623
10691
|
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
@@ -10670,7 +10738,6 @@ module SDM
|
|
10670
10738
|
end
|
10671
10739
|
end
|
10672
10740
|
|
10673
|
-
# VaultTLSCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10674
10741
|
class VaultTLSCertSSHStore
|
10675
10742
|
# A path to a CA file accessible by a Node
|
10676
10743
|
attr_accessor :ca_cert_path
|
@@ -10680,6 +10747,8 @@ module SDM
|
|
10680
10747
|
attr_accessor :client_key_path
|
10681
10748
|
# Unique identifier of the SecretStore.
|
10682
10749
|
attr_accessor :id
|
10750
|
+
# The lifetime of certificates issued by this CA represented in minutes.
|
10751
|
+
attr_accessor :issuedcertttlminutes
|
10683
10752
|
# Unique human-readable name of the SecretStore.
|
10684
10753
|
attr_accessor :name
|
10685
10754
|
# The namespace to make requests within
|
@@ -10698,6 +10767,7 @@ module SDM
|
|
10698
10767
|
client_cert_path: nil,
|
10699
10768
|
client_key_path: nil,
|
10700
10769
|
id: nil,
|
10770
|
+
issuedcertttlminutes: nil,
|
10701
10771
|
name: nil,
|
10702
10772
|
namespace: nil,
|
10703
10773
|
server_address: nil,
|
@@ -10709,6 +10779,7 @@ module SDM
|
|
10709
10779
|
@client_cert_path = client_cert_path == nil ? "" : client_cert_path
|
10710
10780
|
@client_key_path = client_key_path == nil ? "" : client_key_path
|
10711
10781
|
@id = id == nil ? "" : id
|
10782
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
10712
10783
|
@name = name == nil ? "" : name
|
10713
10784
|
@namespace = namespace == nil ? "" : namespace
|
10714
10785
|
@server_address = server_address == nil ? "" : server_address
|
@@ -10726,7 +10797,6 @@ module SDM
|
|
10726
10797
|
end
|
10727
10798
|
end
|
10728
10799
|
|
10729
|
-
# VaultTLSCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10730
10800
|
class VaultTLSCertX509Store
|
10731
10801
|
# A path to a CA file accessible by a Node
|
10732
10802
|
attr_accessor :ca_cert_path
|
@@ -10736,6 +10806,8 @@ module SDM
|
|
10736
10806
|
attr_accessor :client_key_path
|
10737
10807
|
# Unique identifier of the SecretStore.
|
10738
10808
|
attr_accessor :id
|
10809
|
+
# The lifetime of certificates issued by this CA represented in minutes.
|
10810
|
+
attr_accessor :issuedcertttlminutes
|
10739
10811
|
# Unique human-readable name of the SecretStore.
|
10740
10812
|
attr_accessor :name
|
10741
10813
|
# The namespace to make requests within
|
@@ -10754,6 +10826,7 @@ module SDM
|
|
10754
10826
|
client_cert_path: nil,
|
10755
10827
|
client_key_path: nil,
|
10756
10828
|
id: nil,
|
10829
|
+
issuedcertttlminutes: nil,
|
10757
10830
|
name: nil,
|
10758
10831
|
namespace: nil,
|
10759
10832
|
pki_mount_point: nil,
|
@@ -10765,6 +10838,7 @@ module SDM
|
|
10765
10838
|
@client_cert_path = client_cert_path == nil ? "" : client_cert_path
|
10766
10839
|
@client_key_path = client_key_path == nil ? "" : client_key_path
|
10767
10840
|
@id = id == nil ? "" : id
|
10841
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
10768
10842
|
@name = name == nil ? "" : name
|
10769
10843
|
@namespace = namespace == nil ? "" : namespace
|
10770
10844
|
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
@@ -10829,10 +10903,11 @@ module SDM
|
|
10829
10903
|
end
|
10830
10904
|
end
|
10831
10905
|
|
10832
|
-
# VaultTokenCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10833
10906
|
class VaultTokenCertSSHStore
|
10834
10907
|
# Unique identifier of the SecretStore.
|
10835
10908
|
attr_accessor :id
|
10909
|
+
# The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
10910
|
+
attr_accessor :issuedcertttlminutes
|
10836
10911
|
# Unique human-readable name of the SecretStore.
|
10837
10912
|
attr_accessor :name
|
10838
10913
|
# The namespace to make requests within
|
@@ -10848,6 +10923,7 @@ module SDM
|
|
10848
10923
|
|
10849
10924
|
def initialize(
|
10850
10925
|
id: nil,
|
10926
|
+
issuedcertttlminutes: nil,
|
10851
10927
|
name: nil,
|
10852
10928
|
namespace: nil,
|
10853
10929
|
server_address: nil,
|
@@ -10856,6 +10932,7 @@ module SDM
|
|
10856
10932
|
tags: nil
|
10857
10933
|
)
|
10858
10934
|
@id = id == nil ? "" : id
|
10935
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
10859
10936
|
@name = name == nil ? "" : name
|
10860
10937
|
@namespace = namespace == nil ? "" : namespace
|
10861
10938
|
@server_address = server_address == nil ? "" : server_address
|
@@ -10873,10 +10950,11 @@ module SDM
|
|
10873
10950
|
end
|
10874
10951
|
end
|
10875
10952
|
|
10876
|
-
# VaultTokenCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10877
10953
|
class VaultTokenCertX509Store
|
10878
10954
|
# Unique identifier of the SecretStore.
|
10879
10955
|
attr_accessor :id
|
10956
|
+
# The lifetime of certificates issued by this CA represented in minutes.
|
10957
|
+
attr_accessor :issuedcertttlminutes
|
10880
10958
|
# Unique human-readable name of the SecretStore.
|
10881
10959
|
attr_accessor :name
|
10882
10960
|
# The namespace to make requests within
|
@@ -10892,6 +10970,7 @@ module SDM
|
|
10892
10970
|
|
10893
10971
|
def initialize(
|
10894
10972
|
id: nil,
|
10973
|
+
issuedcertttlminutes: nil,
|
10895
10974
|
name: nil,
|
10896
10975
|
namespace: nil,
|
10897
10976
|
pki_mount_point: nil,
|
@@ -10900,6 +10979,7 @@ module SDM
|
|
10900
10979
|
tags: nil
|
10901
10980
|
)
|
10902
10981
|
@id = id == nil ? "" : id
|
10982
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
10903
10983
|
@name = name == nil ? "" : name
|
10904
10984
|
@namespace = namespace == nil ? "" : namespace
|
10905
10985
|
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
data/lib/strongdm.rb
CHANGED
@@ -28,8 +28,8 @@ module SDM #:nodoc:
|
|
28
28
|
DEFAULT_MAX_RETRIES = 3
|
29
29
|
DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
|
30
30
|
DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
|
31
|
-
API_VERSION = "2024-03-
|
32
|
-
USER_AGENT = "strongdm-sdk-ruby/
|
31
|
+
API_VERSION = "2024-03-28"
|
32
|
+
USER_AGENT = "strongdm-sdk-ruby/8.0.0"
|
33
33
|
private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
|
34
34
|
|
35
35
|
# Creates a new strongDM API client.
|
@@ -240,6 +240,7 @@ module SDM #:nodoc:
|
|
240
240
|
# Accounts are users that have access to strongDM. There are two types of accounts:
|
241
241
|
# 1. **Users:** humans who are authenticated through username and password or SSO.
|
242
242
|
# 2. **Service Accounts:** machines that are authenticated using a service token.
|
243
|
+
# 3. **Tokens** are access keys with permissions that can be used for authentication.
|
243
244
|
#
|
244
245
|
# See {Accounts}.
|
245
246
|
attr_reader :accounts
|
@@ -527,6 +528,7 @@ module SDM #:nodoc:
|
|
527
528
|
# Accounts are users that have access to strongDM. There are two types of accounts:
|
528
529
|
# 1. **Users:** humans who are authenticated through username and password or SSO.
|
529
530
|
# 2. **Service Accounts:** machines that are authenticated using a service token.
|
531
|
+
# 3. **Tokens** are access keys with permissions that can be used for authentication.
|
530
532
|
#
|
531
533
|
# See {SnapshotAccounts}.
|
532
534
|
attr_reader :accounts
|
data/lib/svc.rb
CHANGED
@@ -902,9 +902,11 @@ module SDM #:nodoc:
|
|
902
902
|
# Accounts are users that have access to strongDM. There are two types of accounts:
|
903
903
|
# 1. **Users:** humans who are authenticated through username and password or SSO.
|
904
904
|
# 2. **Service Accounts:** machines that are authenticated using a service token.
|
905
|
+
# 3. **Tokens** are access keys with permissions that can be used for authentication.
|
905
906
|
#
|
906
907
|
# See:
|
907
908
|
# {Service}
|
909
|
+
# {Token}
|
908
910
|
# {User}
|
909
911
|
class Accounts
|
910
912
|
extend Gem::Deprecate
|
@@ -942,9 +944,11 @@ module SDM #:nodoc:
|
|
942
944
|
end
|
943
945
|
|
944
946
|
resp = AccountCreateResponse.new()
|
947
|
+
resp.access_key = (plumbing_response.access_key)
|
945
948
|
resp.account = Plumbing::convert_account_to_porcelain(plumbing_response.account)
|
946
949
|
resp.meta = Plumbing::convert_create_response_metadata_to_porcelain(plumbing_response.meta)
|
947
950
|
resp.rate_limit = Plumbing::convert_rate_limit_metadata_to_porcelain(plumbing_response.rate_limit)
|
951
|
+
resp.secret_key = (plumbing_response.secret_key)
|
948
952
|
resp.token = (plumbing_response.token)
|
949
953
|
resp
|
950
954
|
end
|
data/lib/version
CHANGED
data/lib/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: strongdm
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version:
|
4
|
+
version: 8.0.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- strongDM Team
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-04-09 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: grpc
|
@@ -81,8 +81,8 @@ files:
|
|
81
81
|
- "./.git/logs/HEAD"
|
82
82
|
- "./.git/logs/refs/heads/master"
|
83
83
|
- "./.git/logs/refs/remotes/origin/HEAD"
|
84
|
-
- "./.git/objects/pack/pack-
|
85
|
-
- "./.git/objects/pack/pack-
|
84
|
+
- "./.git/objects/pack/pack-69c9823403bcd0961320d5e472ca7682c217e13f.idx"
|
85
|
+
- "./.git/objects/pack/pack-69c9823403bcd0961320d5e472ca7682c217e13f.pack"
|
86
86
|
- "./.git/packed-refs"
|
87
87
|
- "./.git/refs/heads/master"
|
88
88
|
- "./.git/refs/remotes/origin/HEAD"
|