strongdm 7.0.0 → 8.0.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0760de79267673cdb950eee0db3fd85393fd67a99af0eade61452a44211576fe
4
- data.tar.gz: a9d0ef8500ace7013543a8c1a744c4cf726f3b570606512d96af8dab867d148d
3
+ metadata.gz: 1692786ff878322b92229abdcf3a833c53a3ac2fcc282c908b88746b39c50a10
4
+ data.tar.gz: 523e925b33b3b3246e53f3819820c50095305ad79c486e6b21cb09e5558c89e7
5
5
  SHA512:
6
- metadata.gz: f189580f1ba7e1a2829be6b31037ec97636d7a0ccdbebf1e0d81b98fc91fcdcc21ab13139cca1d09d95ac04eba5f672c1d5f381ec9bba98bb73fb8937dcb922f
7
- data.tar.gz: ec158df54db66b17e634ae0cafb277a53ad5e997c6d8f70cfcde29b80e02fe580bb223333b493bd272126ae84ea3eda44eb46d1bda199aec83a9c9cb04f1bb1d
6
+ metadata.gz: 8d6a587a20eb66b2d917c2587f553f98325d1e270b8f321ce628eb3d22fb5b0437b655e5f3ed2b38e48971d3e6302775db7473e3d1397bc436e77cba926fe65e
7
+ data.tar.gz: 8cb03acd29cce7f386c47956607d3e3e2b7457cd30200fcfdcf4760bb3a0539bf4811d7ad42c4ea88c0b707405a069b4bdb86fd5ff418e0c506585f52d2d4f86
data/.git/ORIG_HEAD CHANGED
@@ -1 +1 @@
1
- d8a1092c15d3618de31ada43875014d96bd21e36
1
+ f34575bc142eabf113dbbc5b40b3a16e0c026355
data/.git/index CHANGED
Binary file
data/.git/logs/HEAD CHANGED
@@ -1,3 +1,3 @@
1
- 0000000000000000000000000000000000000000 d8a1092c15d3618de31ada43875014d96bd21e36 sdmrelease <support@strongdm.com> 1710517159 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- d8a1092c15d3618de31ada43875014d96bd21e36 d8a1092c15d3618de31ada43875014d96bd21e36 sdmrelease <support@strongdm.com> 1710517159 +0000 checkout: moving from master to master
3
- d8a1092c15d3618de31ada43875014d96bd21e36 c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c sdmrelease <support@strongdm.com> 1710517159 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ f34575bc142eabf113dbbc5b40b3a16e0c026355 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 checkout: moving from master to master
3
+ f34575bc142eabf113dbbc5b40b3a16e0c026355 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1712692017 +0000 merge origin/development: Fast-forward
@@ -1,2 +1,2 @@
1
- 0000000000000000000000000000000000000000 d8a1092c15d3618de31ada43875014d96bd21e36 sdmrelease <support@strongdm.com> 1710517159 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- d8a1092c15d3618de31ada43875014d96bd21e36 c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c sdmrelease <support@strongdm.com> 1710517159 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ f34575bc142eabf113dbbc5b40b3a16e0c026355 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1712692017 +0000 merge origin/development: Fast-forward
@@ -1 +1 @@
1
- 0000000000000000000000000000000000000000 d8a1092c15d3618de31ada43875014d96bd21e36 sdmrelease <support@strongdm.com> 1710517159 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
1
+ 0000000000000000000000000000000000000000 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
data/.git/packed-refs CHANGED
@@ -1,6 +1,6 @@
1
1
  # pack-refs with: peeled fully-peeled sorted
2
- c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/remotes/origin/development
3
- d8a1092c15d3618de31ada43875014d96bd21e36 refs/remotes/origin/master
2
+ 7659a644ef149debee2515386136b7e2d5e917ea refs/remotes/origin/development
3
+ f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/remotes/origin/master
4
4
  2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
5
5
  04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
6
6
  6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
@@ -102,3 +102,5 @@ e37aa2b50ffd917949a8e1c7a1fa28d12071fa69 refs/tags/v6.7.0
102
102
  3e28afb8b757876c463b22aac13ee618d9ead204 refs/tags/v6.7.1
103
103
  0429c9a2739f699ea33db7e6dd85e6be47e9190e refs/tags/v6.8.0
104
104
  d8a1092c15d3618de31ada43875014d96bd21e36 refs/tags/v6.9.0
105
+ c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/tags/v7.0.0
106
+ f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/tags/v7.1.0
@@ -1 +1 @@
1
- c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c
1
+ 7659a644ef149debee2515386136b7e2d5e917ea
@@ -17,6 +17,7 @@
17
17
 
18
18
  require "google/protobuf"
19
19
 
20
+ require "google/protobuf/duration_pb"
20
21
  require "google/protobuf/timestamp_pb"
21
22
  require "options_pb"
22
23
  require "spec_pb"
@@ -33,6 +34,8 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
33
34
  optional :account, :message, 2, "v1.Account"
34
35
  optional :token, :string, 3
35
36
  optional :rate_limit, :message, 4, "v1.RateLimitMetadata"
37
+ optional :access_key, :string, 5
38
+ optional :secret_key, :string, 6
36
39
  end
37
40
  add_message "v1.AccountGetRequest" do
38
41
  optional :meta, :message, 1, "v1.GetRequestMetadata"
@@ -103,6 +106,9 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
103
106
  optional :tags, :message, 4, "v1.Tags"
104
107
  optional :rekeyed, :message, 5, "google.protobuf.Timestamp"
105
108
  optional :deadline, :message, 6, "google.protobuf.Timestamp"
109
+ optional :account_type, :string, 7
110
+ repeated :permissions, :string, 8
111
+ optional :duration, :message, 9, "google.protobuf.Duration"
106
112
  end
107
113
  end
108
114
  end
@@ -23,6 +23,7 @@ module V1
23
23
  # Accounts are users that have access to strongDM. There are two types of accounts:
24
24
  # 1. **Users:** humans who are authenticated through username and password or SSO.
25
25
  # 2. **Service Accounts:** machines that are authenticated using a service token.
26
+ # 3. **Tokens** are access keys with permissions that can be used for authentication.
26
27
  class Service
27
28
  include ::GRPC::GenericService
28
29
 
data/lib/grpc/plumbing.rb CHANGED
@@ -1041,6 +1041,9 @@ module SDM
1041
1041
  if porcelain.instance_of? Service
1042
1042
  plumbing.service = convert_service_to_plumbing(porcelain)
1043
1043
  end
1044
+ if porcelain.instance_of? Token
1045
+ plumbing.token = convert_token_to_plumbing(porcelain)
1046
+ end
1044
1047
  if porcelain.instance_of? User
1045
1048
  plumbing.user = convert_user_to_plumbing(porcelain)
1046
1049
  end
@@ -1054,6 +1057,9 @@ module SDM
1054
1057
  if plumbing.service != nil
1055
1058
  return convert_service_to_porcelain(plumbing.service)
1056
1059
  end
1060
+ if plumbing.token != nil
1061
+ return convert_token_to_porcelain(plumbing.token)
1062
+ end
1057
1063
  if plumbing.user != nil
1058
1064
  return convert_user_to_porcelain(plumbing.user)
1059
1065
  end
@@ -1271,9 +1277,11 @@ module SDM
1271
1277
  return nil
1272
1278
  end
1273
1279
  porcelain = AccountCreateResponse.new()
1280
+ porcelain.access_key = (plumbing.access_key)
1274
1281
  porcelain.account = convert_account_to_porcelain(plumbing.account)
1275
1282
  porcelain.meta = convert_create_response_metadata_to_porcelain(plumbing.meta)
1276
1283
  porcelain.rate_limit = convert_rate_limit_metadata_to_porcelain(plumbing.rate_limit)
1284
+ porcelain.secret_key = (plumbing.secret_key)
1277
1285
  porcelain.token = (plumbing.token)
1278
1286
  porcelain
1279
1287
  end
@@ -1283,9 +1291,11 @@ module SDM
1283
1291
  return nil
1284
1292
  end
1285
1293
  plumbing = V1::AccountCreateResponse.new()
1294
+ plumbing.access_key = (porcelain.access_key)
1286
1295
  plumbing.account = convert_account_to_plumbing(porcelain.account)
1287
1296
  plumbing.meta = convert_create_response_metadata_to_plumbing(porcelain.meta)
1288
1297
  plumbing.rate_limit = convert_rate_limit_metadata_to_plumbing(porcelain.rate_limit)
1298
+ plumbing.secret_key = (porcelain.secret_key)
1289
1299
  plumbing.token = (porcelain.token)
1290
1300
  plumbing
1291
1301
  end
@@ -4878,6 +4888,7 @@ module SDM
4878
4888
  porcelain.caid = (plumbing.caID)
4879
4889
  porcelain.capoolid = (plumbing.caPoolID)
4880
4890
  porcelain.id = (plumbing.id)
4891
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
4881
4892
  porcelain.location = (plumbing.location)
4882
4893
  porcelain.name = (plumbing.name)
4883
4894
  porcelain.projectid = (plumbing.projectID)
@@ -4893,6 +4904,7 @@ module SDM
4893
4904
  plumbing.caID = (porcelain.caid)
4894
4905
  plumbing.caPoolID = (porcelain.capoolid)
4895
4906
  plumbing.id = (porcelain.id)
4907
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
4896
4908
  plumbing.location = (porcelain.location)
4897
4909
  plumbing.name = (porcelain.name)
4898
4910
  plumbing.projectID = (porcelain.projectid)
@@ -11205,6 +11217,56 @@ module SDM
11205
11217
  end
11206
11218
  items
11207
11219
  end
11220
+ def self.convert_token_to_porcelain(plumbing)
11221
+ if plumbing == nil
11222
+ return nil
11223
+ end
11224
+ porcelain = Token.new()
11225
+ porcelain.account_type = (plumbing.account_type)
11226
+ porcelain.deadline = convert_timestamp_to_porcelain(plumbing.deadline)
11227
+ porcelain.duration = convert_duration_to_porcelain(plumbing.duration)
11228
+ porcelain.id = (plumbing.id)
11229
+ porcelain.name = (plumbing.name)
11230
+ porcelain.permissions = (plumbing.permissions)
11231
+ porcelain.rekeyed = convert_timestamp_to_porcelain(plumbing.rekeyed)
11232
+ porcelain.suspended = (plumbing.suspended)
11233
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
11234
+ porcelain
11235
+ end
11236
+
11237
+ def self.convert_token_to_plumbing(porcelain)
11238
+ if porcelain == nil
11239
+ return nil
11240
+ end
11241
+ plumbing = V1::Token.new()
11242
+ plumbing.account_type = (porcelain.account_type)
11243
+ plumbing.deadline = convert_timestamp_to_plumbing(porcelain.deadline)
11244
+ plumbing.duration = convert_duration_to_plumbing(porcelain.duration)
11245
+ plumbing.id = (porcelain.id)
11246
+ plumbing.name = (porcelain.name)
11247
+ plumbing.permissions += (porcelain.permissions)
11248
+ plumbing.rekeyed = convert_timestamp_to_plumbing(porcelain.rekeyed)
11249
+ plumbing.suspended = (porcelain.suspended)
11250
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
11251
+ plumbing
11252
+ end
11253
+ def self.convert_repeated_token_to_plumbing(porcelains)
11254
+ items = Array.new
11255
+ porcelains.each do |porcelain|
11256
+ plumbing = convert_token_to_plumbing(porcelain)
11257
+ items.append(plumbing)
11258
+ end
11259
+ items
11260
+ end
11261
+
11262
+ def self.convert_repeated_token_to_porcelain(plumbings)
11263
+ items = Array.new
11264
+ plumbings.each do |plumbing|
11265
+ porcelain = convert_token_to_porcelain(plumbing)
11266
+ items.append(porcelain)
11267
+ end
11268
+ items
11269
+ end
11208
11270
  def self.convert_trino_to_porcelain(plumbing)
11209
11271
  if plumbing == nil
11210
11272
  return nil
@@ -11353,6 +11415,7 @@ module SDM
11353
11415
  end
11354
11416
  porcelain = VaultAppRoleCertSSHStore.new()
11355
11417
  porcelain.id = (plumbing.id)
11418
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11356
11419
  porcelain.name = (plumbing.name)
11357
11420
  porcelain.namespace = (plumbing.namespace)
11358
11421
  porcelain.server_address = (plumbing.server_address)
@@ -11368,6 +11431,7 @@ module SDM
11368
11431
  end
11369
11432
  plumbing = V1::VaultAppRoleCertSSHStore.new()
11370
11433
  plumbing.id = (porcelain.id)
11434
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11371
11435
  plumbing.name = (porcelain.name)
11372
11436
  plumbing.namespace = (porcelain.namespace)
11373
11437
  plumbing.server_address = (porcelain.server_address)
@@ -11399,6 +11463,7 @@ module SDM
11399
11463
  end
11400
11464
  porcelain = VaultAppRoleCertX509Store.new()
11401
11465
  porcelain.id = (plumbing.id)
11466
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11402
11467
  porcelain.name = (plumbing.name)
11403
11468
  porcelain.namespace = (plumbing.namespace)
11404
11469
  porcelain.pki_mount_point = (plumbing.pki_mount_point)
@@ -11414,6 +11479,7 @@ module SDM
11414
11479
  end
11415
11480
  plumbing = V1::VaultAppRoleCertX509Store.new()
11416
11481
  plumbing.id = (porcelain.id)
11482
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11417
11483
  plumbing.name = (porcelain.name)
11418
11484
  plumbing.namespace = (porcelain.namespace)
11419
11485
  plumbing.pki_mount_point = (porcelain.pki_mount_point)
@@ -11490,6 +11556,7 @@ module SDM
11490
11556
  porcelain.client_cert_path = (plumbing.client_cert_path)
11491
11557
  porcelain.client_key_path = (plumbing.client_key_path)
11492
11558
  porcelain.id = (plumbing.id)
11559
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11493
11560
  porcelain.name = (plumbing.name)
11494
11561
  porcelain.namespace = (plumbing.namespace)
11495
11562
  porcelain.server_address = (plumbing.server_address)
@@ -11508,6 +11575,7 @@ module SDM
11508
11575
  plumbing.client_cert_path = (porcelain.client_cert_path)
11509
11576
  plumbing.client_key_path = (porcelain.client_key_path)
11510
11577
  plumbing.id = (porcelain.id)
11578
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11511
11579
  plumbing.name = (porcelain.name)
11512
11580
  plumbing.namespace = (porcelain.namespace)
11513
11581
  plumbing.server_address = (porcelain.server_address)
@@ -11542,6 +11610,7 @@ module SDM
11542
11610
  porcelain.client_cert_path = (plumbing.client_cert_path)
11543
11611
  porcelain.client_key_path = (plumbing.client_key_path)
11544
11612
  porcelain.id = (plumbing.id)
11613
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11545
11614
  porcelain.name = (plumbing.name)
11546
11615
  porcelain.namespace = (plumbing.namespace)
11547
11616
  porcelain.pki_mount_point = (plumbing.pki_mount_point)
@@ -11560,6 +11629,7 @@ module SDM
11560
11629
  plumbing.client_cert_path = (porcelain.client_cert_path)
11561
11630
  plumbing.client_key_path = (porcelain.client_key_path)
11562
11631
  plumbing.id = (porcelain.id)
11632
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11563
11633
  plumbing.name = (porcelain.name)
11564
11634
  plumbing.namespace = (porcelain.namespace)
11565
11635
  plumbing.pki_mount_point = (porcelain.pki_mount_point)
@@ -11639,6 +11709,7 @@ module SDM
11639
11709
  end
11640
11710
  porcelain = VaultTokenCertSSHStore.new()
11641
11711
  porcelain.id = (plumbing.id)
11712
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11642
11713
  porcelain.name = (plumbing.name)
11643
11714
  porcelain.namespace = (plumbing.namespace)
11644
11715
  porcelain.server_address = (plumbing.server_address)
@@ -11654,6 +11725,7 @@ module SDM
11654
11725
  end
11655
11726
  plumbing = V1::VaultTokenCertSSHStore.new()
11656
11727
  plumbing.id = (porcelain.id)
11728
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11657
11729
  plumbing.name = (porcelain.name)
11658
11730
  plumbing.namespace = (porcelain.namespace)
11659
11731
  plumbing.server_address = (porcelain.server_address)
@@ -11685,6 +11757,7 @@ module SDM
11685
11757
  end
11686
11758
  porcelain = VaultTokenCertX509Store.new()
11687
11759
  porcelain.id = (plumbing.id)
11760
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11688
11761
  porcelain.name = (plumbing.name)
11689
11762
  porcelain.namespace = (plumbing.namespace)
11690
11763
  porcelain.pki_mount_point = (plumbing.pki_mount_point)
@@ -11700,6 +11773,7 @@ module SDM
11700
11773
  end
11701
11774
  plumbing = V1::VaultTokenCertX509Store.new()
11702
11775
  plumbing.id = (porcelain.id)
11776
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11703
11777
  plumbing.name = (porcelain.name)
11704
11778
  plumbing.namespace = (porcelain.namespace)
11705
11779
  plumbing.pki_mount_point = (porcelain.pki_mount_point)
@@ -56,7 +56,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
56
56
  optional :name, :string, 2
57
57
  optional :caArn, :string, 5
58
58
  optional :certificateTemplateArn, :string, 7
59
- optional :issuedCertTTLMinutes, :string, 8
59
+ optional :issuedCertTTLMinutes, :int32, 8
60
60
  optional :region, :string, 3
61
61
  optional :signingAlgo, :string, 6
62
62
  optional :tags, :message, 4, "v1.Tags"
@@ -109,6 +109,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
109
109
  optional :name, :string, 2
110
110
  optional :caID, :string, 6
111
111
  optional :caPoolID, :string, 5
112
+ optional :issuedCertTTLMinutes, :int32, 7
112
113
  optional :location, :string, 4
113
114
  optional :projectID, :string, 3
114
115
  optional :tags, :message, 32771, "v1.Tags"
@@ -123,6 +124,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
123
124
  add_message "v1.VaultAppRoleCertSSHStore" do
124
125
  optional :id, :string, 1
125
126
  optional :name, :string, 2
127
+ optional :issuedCertTTLMinutes, :int32, 9
126
128
  optional :namespace, :string, 5
127
129
  optional :server_address, :string, 3
128
130
  optional :signing_role, :string, 7
@@ -132,6 +134,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
132
134
  add_message "v1.VaultAppRoleCertX509Store" do
133
135
  optional :id, :string, 1
134
136
  optional :name, :string, 2
137
+ optional :issuedCertTTLMinutes, :int32, 9
135
138
  optional :namespace, :string, 5
136
139
  optional :pki_mount_point, :string, 6
137
140
  optional :server_address, :string, 3
@@ -154,6 +157,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
154
157
  optional :CA_cert_path, :string, 4
155
158
  optional :client_cert_path, :string, 5
156
159
  optional :client_key_path, :string, 6
160
+ optional :issuedCertTTLMinutes, :int32, 11
157
161
  optional :namespace, :string, 8
158
162
  optional :server_address, :string, 3
159
163
  optional :signing_role, :string, 10
@@ -166,6 +170,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
166
170
  optional :CA_cert_path, :string, 4
167
171
  optional :client_cert_path, :string, 5
168
172
  optional :client_key_path, :string, 6
173
+ optional :issuedCertTTLMinutes, :int32, 11
169
174
  optional :namespace, :string, 8
170
175
  optional :pki_mount_point, :string, 9
171
176
  optional :server_address, :string, 3
@@ -182,6 +187,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
182
187
  add_message "v1.VaultTokenCertSSHStore" do
183
188
  optional :id, :string, 1
184
189
  optional :name, :string, 2
190
+ optional :issuedCertTTLMinutes, :int32, 9
185
191
  optional :namespace, :string, 5
186
192
  optional :server_address, :string, 3
187
193
  optional :signing_role, :string, 7
@@ -191,6 +197,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
191
197
  add_message "v1.VaultTokenCertX509Store" do
192
198
  optional :id, :string, 1
193
199
  optional :name, :string, 2
200
+ optional :issuedCertTTLMinutes, :int32, 8
194
201
  optional :namespace, :string, 5
195
202
  optional :pki_mount_point, :string, 6
196
203
  optional :server_address, :string, 3
@@ -458,7 +458,6 @@ module SDM
458
458
  end
459
459
  end
460
460
 
461
- # AWSCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
462
461
  class AWSCertX509Store
463
462
  # The ARN of the CA in AWS Private CA
464
463
  attr_accessor :caarn
@@ -466,7 +465,7 @@ module SDM
466
465
  attr_accessor :certificatetemplatearn
467
466
  # Unique identifier of the SecretStore.
468
467
  attr_accessor :id
469
- # The lifetime of certificates issued by this CA represented in minutes e.g. 600 (for 10 hours). Defaults to 8 hours if not provided.
468
+ # The lifetime of certificates issued by this CA represented in minutes.
470
469
  attr_accessor :issuedcertttlminutes
471
470
  # Unique human-readable name of the SecretStore.
472
471
  attr_accessor :name
@@ -490,7 +489,7 @@ module SDM
490
489
  @caarn = caarn == nil ? "" : caarn
491
490
  @certificatetemplatearn = certificatetemplatearn == nil ? "" : certificatetemplatearn
492
491
  @id = id == nil ? "" : id
493
- @issuedcertttlminutes = issuedcertttlminutes == nil ? "" : issuedcertttlminutes
492
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
494
493
  @name = name == nil ? "" : name
495
494
  @region = region == nil ? "" : region
496
495
  @signingalgo = signingalgo == nil ? "" : signingalgo
@@ -1082,25 +1081,33 @@ module SDM
1082
1081
 
1083
1082
  # AccountCreateResponse reports how the Accounts were created in the system.
1084
1083
  class AccountCreateResponse
1084
+ # ID part of the API key.
1085
+ attr_accessor :access_key
1085
1086
  # The created Account.
1086
1087
  attr_accessor :account
1087
1088
  # Reserved for future use.
1088
1089
  attr_accessor :meta
1089
1090
  # Rate limit information.
1090
1091
  attr_accessor :rate_limit
1092
+ # Secret part of the API key.
1093
+ attr_accessor :secret_key
1091
1094
  # The auth token generated for the Account. The Account will use this token to
1092
1095
  # authenticate with the strongDM API.
1093
1096
  attr_accessor :token
1094
1097
 
1095
1098
  def initialize(
1099
+ access_key: nil,
1096
1100
  account: nil,
1097
1101
  meta: nil,
1098
1102
  rate_limit: nil,
1103
+ secret_key: nil,
1099
1104
  token: nil
1100
1105
  )
1106
+ @access_key = access_key == nil ? "" : access_key
1101
1107
  @account = account == nil ? nil : account
1102
1108
  @meta = meta == nil ? nil : meta
1103
1109
  @rate_limit = rate_limit == nil ? nil : rate_limit
1110
+ @secret_key = secret_key == nil ? "" : secret_key
1104
1111
  @token = token == nil ? "" : token
1105
1112
  end
1106
1113
 
@@ -1506,7 +1513,6 @@ module SDM
1506
1513
  end
1507
1514
  end
1508
1515
 
1509
- # ActiveDirectoryStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
1510
1516
  class ActiveDirectoryStore
1511
1517
  # Unique identifier of the SecretStore.
1512
1518
  attr_accessor :id
@@ -4648,7 +4654,6 @@ module SDM
4648
4654
  end
4649
4655
  end
4650
4656
 
4651
- # GCPCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
4652
4657
  class GCPCertX509Store
4653
4658
  # The ID of the target CA
4654
4659
  attr_accessor :caid
@@ -4656,6 +4661,8 @@ module SDM
4656
4661
  attr_accessor :capoolid
4657
4662
  # Unique identifier of the SecretStore.
4658
4663
  attr_accessor :id
4664
+ # The lifetime of certificates issued by this CA represented in minutes.
4665
+ attr_accessor :issuedcertttlminutes
4659
4666
  # The Region for the CA in GCP format e.g. us-west1
4660
4667
  attr_accessor :location
4661
4668
  # Unique human-readable name of the SecretStore.
@@ -4669,6 +4676,7 @@ module SDM
4669
4676
  caid: nil,
4670
4677
  capoolid: nil,
4671
4678
  id: nil,
4679
+ issuedcertttlminutes: nil,
4672
4680
  location: nil,
4673
4681
  name: nil,
4674
4682
  projectid: nil,
@@ -4677,6 +4685,7 @@ module SDM
4677
4685
  @caid = caid == nil ? "" : caid
4678
4686
  @capoolid = capoolid == nil ? "" : capoolid
4679
4687
  @id = id == nil ? "" : id
4688
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
4680
4689
  @location = location == nil ? "" : location
4681
4690
  @name = name == nil ? "" : name
4682
4691
  @projectid = projectid == nil ? "" : projectid
@@ -10408,6 +10417,59 @@ module SDM
10408
10417
  end
10409
10418
  end
10410
10419
 
10420
+ # A Token is an account providing tokenized access for automation or integration use.
10421
+ # Tokens include admin tokens, API keys, and SCIM tokens.
10422
+ class Token
10423
+ # Corresponds to the type of token, e.g. api or admin-token.
10424
+ attr_accessor :account_type
10425
+ # The timestamp when the Token will expire.
10426
+ attr_accessor :deadline
10427
+ # Duration from token creation to expiration.
10428
+ attr_accessor :duration
10429
+ # Unique identifier of the Token.
10430
+ attr_accessor :id
10431
+ # Unique human-readable name of the Token.
10432
+ attr_accessor :name
10433
+ # Permissions assigned to the token, e.g. role:create.
10434
+ attr_accessor :permissions
10435
+ # The timestamp when the Token was last rekeyed.
10436
+ attr_accessor :rekeyed
10437
+ # Reserved for future use. Always false for tokens.
10438
+ attr_accessor :suspended
10439
+ # Tags is a map of key, value pairs.
10440
+ attr_accessor :tags
10441
+
10442
+ def initialize(
10443
+ account_type: nil,
10444
+ deadline: nil,
10445
+ duration: nil,
10446
+ id: nil,
10447
+ name: nil,
10448
+ permissions: nil,
10449
+ rekeyed: nil,
10450
+ suspended: nil,
10451
+ tags: nil
10452
+ )
10453
+ @account_type = account_type == nil ? "" : account_type
10454
+ @deadline = deadline == nil ? nil : deadline
10455
+ @duration = duration == nil ? nil : duration
10456
+ @id = id == nil ? "" : id
10457
+ @name = name == nil ? "" : name
10458
+ @permissions = permissions == nil ? [] : permissions
10459
+ @rekeyed = rekeyed == nil ? nil : rekeyed
10460
+ @suspended = suspended == nil ? false : suspended
10461
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10462
+ end
10463
+
10464
+ def to_json(options = {})
10465
+ hash = {}
10466
+ self.instance_variables.each do |var|
10467
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10468
+ end
10469
+ hash.to_json
10470
+ end
10471
+ end
10472
+
10411
10473
  # Trino is currently unstable, and its API may change, or it may be removed, without a major version bump.
10412
10474
  class Trino
10413
10475
  # The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
@@ -10547,10 +10609,11 @@ module SDM
10547
10609
  end
10548
10610
  end
10549
10611
 
10550
- # VaultAppRoleCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
10551
10612
  class VaultAppRoleCertSSHStore
10552
10613
  # Unique identifier of the SecretStore.
10553
10614
  attr_accessor :id
10615
+ # The lifetime of certificates issued by this CA represented in minutes.
10616
+ attr_accessor :issuedcertttlminutes
10554
10617
  # Unique human-readable name of the SecretStore.
10555
10618
  attr_accessor :name
10556
10619
  # The namespace to make requests within
@@ -10566,6 +10629,7 @@ module SDM
10566
10629
 
10567
10630
  def initialize(
10568
10631
  id: nil,
10632
+ issuedcertttlminutes: nil,
10569
10633
  name: nil,
10570
10634
  namespace: nil,
10571
10635
  server_address: nil,
@@ -10574,6 +10638,7 @@ module SDM
10574
10638
  tags: nil
10575
10639
  )
10576
10640
  @id = id == nil ? "" : id
10641
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10577
10642
  @name = name == nil ? "" : name
10578
10643
  @namespace = namespace == nil ? "" : namespace
10579
10644
  @server_address = server_address == nil ? "" : server_address
@@ -10591,10 +10656,11 @@ module SDM
10591
10656
  end
10592
10657
  end
10593
10658
 
10594
- # VaultAppRoleCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10595
10659
  class VaultAppRoleCertX509Store
10596
10660
  # Unique identifier of the SecretStore.
10597
10661
  attr_accessor :id
10662
+ # The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
10663
+ attr_accessor :issuedcertttlminutes
10598
10664
  # Unique human-readable name of the SecretStore.
10599
10665
  attr_accessor :name
10600
10666
  # The namespace to make requests within
@@ -10610,6 +10676,7 @@ module SDM
10610
10676
 
10611
10677
  def initialize(
10612
10678
  id: nil,
10679
+ issuedcertttlminutes: nil,
10613
10680
  name: nil,
10614
10681
  namespace: nil,
10615
10682
  pki_mount_point: nil,
@@ -10618,6 +10685,7 @@ module SDM
10618
10685
  tags: nil
10619
10686
  )
10620
10687
  @id = id == nil ? "" : id
10688
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10621
10689
  @name = name == nil ? "" : name
10622
10690
  @namespace = namespace == nil ? "" : namespace
10623
10691
  @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
@@ -10670,7 +10738,6 @@ module SDM
10670
10738
  end
10671
10739
  end
10672
10740
 
10673
- # VaultTLSCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
10674
10741
  class VaultTLSCertSSHStore
10675
10742
  # A path to a CA file accessible by a Node
10676
10743
  attr_accessor :ca_cert_path
@@ -10680,6 +10747,8 @@ module SDM
10680
10747
  attr_accessor :client_key_path
10681
10748
  # Unique identifier of the SecretStore.
10682
10749
  attr_accessor :id
10750
+ # The lifetime of certificates issued by this CA represented in minutes.
10751
+ attr_accessor :issuedcertttlminutes
10683
10752
  # Unique human-readable name of the SecretStore.
10684
10753
  attr_accessor :name
10685
10754
  # The namespace to make requests within
@@ -10698,6 +10767,7 @@ module SDM
10698
10767
  client_cert_path: nil,
10699
10768
  client_key_path: nil,
10700
10769
  id: nil,
10770
+ issuedcertttlminutes: nil,
10701
10771
  name: nil,
10702
10772
  namespace: nil,
10703
10773
  server_address: nil,
@@ -10709,6 +10779,7 @@ module SDM
10709
10779
  @client_cert_path = client_cert_path == nil ? "" : client_cert_path
10710
10780
  @client_key_path = client_key_path == nil ? "" : client_key_path
10711
10781
  @id = id == nil ? "" : id
10782
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10712
10783
  @name = name == nil ? "" : name
10713
10784
  @namespace = namespace == nil ? "" : namespace
10714
10785
  @server_address = server_address == nil ? "" : server_address
@@ -10726,7 +10797,6 @@ module SDM
10726
10797
  end
10727
10798
  end
10728
10799
 
10729
- # VaultTLSCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10730
10800
  class VaultTLSCertX509Store
10731
10801
  # A path to a CA file accessible by a Node
10732
10802
  attr_accessor :ca_cert_path
@@ -10736,6 +10806,8 @@ module SDM
10736
10806
  attr_accessor :client_key_path
10737
10807
  # Unique identifier of the SecretStore.
10738
10808
  attr_accessor :id
10809
+ # The lifetime of certificates issued by this CA represented in minutes.
10810
+ attr_accessor :issuedcertttlminutes
10739
10811
  # Unique human-readable name of the SecretStore.
10740
10812
  attr_accessor :name
10741
10813
  # The namespace to make requests within
@@ -10754,6 +10826,7 @@ module SDM
10754
10826
  client_cert_path: nil,
10755
10827
  client_key_path: nil,
10756
10828
  id: nil,
10829
+ issuedcertttlminutes: nil,
10757
10830
  name: nil,
10758
10831
  namespace: nil,
10759
10832
  pki_mount_point: nil,
@@ -10765,6 +10838,7 @@ module SDM
10765
10838
  @client_cert_path = client_cert_path == nil ? "" : client_cert_path
10766
10839
  @client_key_path = client_key_path == nil ? "" : client_key_path
10767
10840
  @id = id == nil ? "" : id
10841
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10768
10842
  @name = name == nil ? "" : name
10769
10843
  @namespace = namespace == nil ? "" : namespace
10770
10844
  @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
@@ -10829,10 +10903,11 @@ module SDM
10829
10903
  end
10830
10904
  end
10831
10905
 
10832
- # VaultTokenCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
10833
10906
  class VaultTokenCertSSHStore
10834
10907
  # Unique identifier of the SecretStore.
10835
10908
  attr_accessor :id
10909
+ # The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
10910
+ attr_accessor :issuedcertttlminutes
10836
10911
  # Unique human-readable name of the SecretStore.
10837
10912
  attr_accessor :name
10838
10913
  # The namespace to make requests within
@@ -10848,6 +10923,7 @@ module SDM
10848
10923
 
10849
10924
  def initialize(
10850
10925
  id: nil,
10926
+ issuedcertttlminutes: nil,
10851
10927
  name: nil,
10852
10928
  namespace: nil,
10853
10929
  server_address: nil,
@@ -10856,6 +10932,7 @@ module SDM
10856
10932
  tags: nil
10857
10933
  )
10858
10934
  @id = id == nil ? "" : id
10935
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10859
10936
  @name = name == nil ? "" : name
10860
10937
  @namespace = namespace == nil ? "" : namespace
10861
10938
  @server_address = server_address == nil ? "" : server_address
@@ -10873,10 +10950,11 @@ module SDM
10873
10950
  end
10874
10951
  end
10875
10952
 
10876
- # VaultTokenCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10877
10953
  class VaultTokenCertX509Store
10878
10954
  # Unique identifier of the SecretStore.
10879
10955
  attr_accessor :id
10956
+ # The lifetime of certificates issued by this CA represented in minutes.
10957
+ attr_accessor :issuedcertttlminutes
10880
10958
  # Unique human-readable name of the SecretStore.
10881
10959
  attr_accessor :name
10882
10960
  # The namespace to make requests within
@@ -10892,6 +10970,7 @@ module SDM
10892
10970
 
10893
10971
  def initialize(
10894
10972
  id: nil,
10973
+ issuedcertttlminutes: nil,
10895
10974
  name: nil,
10896
10975
  namespace: nil,
10897
10976
  pki_mount_point: nil,
@@ -10900,6 +10979,7 @@ module SDM
10900
10979
  tags: nil
10901
10980
  )
10902
10981
  @id = id == nil ? "" : id
10982
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10903
10983
  @name = name == nil ? "" : name
10904
10984
  @namespace = namespace == nil ? "" : namespace
10905
10985
  @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
data/lib/strongdm.rb CHANGED
@@ -28,8 +28,8 @@ module SDM #:nodoc:
28
28
  DEFAULT_MAX_RETRIES = 3
29
29
  DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
30
30
  DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
31
- API_VERSION = "2024-03-14"
32
- USER_AGENT = "strongdm-sdk-ruby/7.0.0"
31
+ API_VERSION = "2024-03-28"
32
+ USER_AGENT = "strongdm-sdk-ruby/8.0.0"
33
33
  private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
34
34
 
35
35
  # Creates a new strongDM API client.
@@ -240,6 +240,7 @@ module SDM #:nodoc:
240
240
  # Accounts are users that have access to strongDM. There are two types of accounts:
241
241
  # 1. **Users:** humans who are authenticated through username and password or SSO.
242
242
  # 2. **Service Accounts:** machines that are authenticated using a service token.
243
+ # 3. **Tokens** are access keys with permissions that can be used for authentication.
243
244
  #
244
245
  # See {Accounts}.
245
246
  attr_reader :accounts
@@ -527,6 +528,7 @@ module SDM #:nodoc:
527
528
  # Accounts are users that have access to strongDM. There are two types of accounts:
528
529
  # 1. **Users:** humans who are authenticated through username and password or SSO.
529
530
  # 2. **Service Accounts:** machines that are authenticated using a service token.
531
+ # 3. **Tokens** are access keys with permissions that can be used for authentication.
530
532
  #
531
533
  # See {SnapshotAccounts}.
532
534
  attr_reader :accounts
data/lib/svc.rb CHANGED
@@ -902,9 +902,11 @@ module SDM #:nodoc:
902
902
  # Accounts are users that have access to strongDM. There are two types of accounts:
903
903
  # 1. **Users:** humans who are authenticated through username and password or SSO.
904
904
  # 2. **Service Accounts:** machines that are authenticated using a service token.
905
+ # 3. **Tokens** are access keys with permissions that can be used for authentication.
905
906
  #
906
907
  # See:
907
908
  # {Service}
909
+ # {Token}
908
910
  # {User}
909
911
  class Accounts
910
912
  extend Gem::Deprecate
@@ -942,9 +944,11 @@ module SDM #:nodoc:
942
944
  end
943
945
 
944
946
  resp = AccountCreateResponse.new()
947
+ resp.access_key = (plumbing_response.access_key)
945
948
  resp.account = Plumbing::convert_account_to_porcelain(plumbing_response.account)
946
949
  resp.meta = Plumbing::convert_create_response_metadata_to_porcelain(plumbing_response.meta)
947
950
  resp.rate_limit = Plumbing::convert_rate_limit_metadata_to_porcelain(plumbing_response.rate_limit)
951
+ resp.secret_key = (plumbing_response.secret_key)
948
952
  resp.token = (plumbing_response.token)
949
953
  resp
950
954
  end
data/lib/version CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "7.0.0"
16
+ VERSION = "8.0.0"
17
17
  end
data/lib/version.rb CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "7.0.0"
16
+ VERSION = "8.0.0"
17
17
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: strongdm
3
3
  version: !ruby/object:Gem::Version
4
- version: 7.0.0
4
+ version: 8.0.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - strongDM Team
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-03-15 00:00:00.000000000 Z
11
+ date: 2024-04-09 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: grpc
@@ -81,8 +81,8 @@ files:
81
81
  - "./.git/logs/HEAD"
82
82
  - "./.git/logs/refs/heads/master"
83
83
  - "./.git/logs/refs/remotes/origin/HEAD"
84
- - "./.git/objects/pack/pack-35100f17336a9a56e777373870676ef90dc420dc.idx"
85
- - "./.git/objects/pack/pack-35100f17336a9a56e777373870676ef90dc420dc.pack"
84
+ - "./.git/objects/pack/pack-69c9823403bcd0961320d5e472ca7682c217e13f.idx"
85
+ - "./.git/objects/pack/pack-69c9823403bcd0961320d5e472ca7682c217e13f.pack"
86
86
  - "./.git/packed-refs"
87
87
  - "./.git/refs/heads/master"
88
88
  - "./.git/refs/remotes/origin/HEAD"