strongdm 8.1.0 → 8.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 9126b0fed8d1f9d6bace10080c99994b18fea3dfb5d10728cb14f0ccbf2cac5b
4
- data.tar.gz: 45523efb30a4a5615704eac6078c24187c8033739066669afac11c30c032f2ac
3
+ metadata.gz: 0db6a67f3dc8f6fb4d1f96d31ed4ec252dcafa3f242652ec98add77f1dc4fce0
4
+ data.tar.gz: eabcaa44c11f5fc550bc8b56d94792ffcba24db02ef05b3c74f8407e50d16b6e
5
5
  SHA512:
6
- metadata.gz: 8b95773f4109c5e056bcfb92dd4b95ebc52eec97e178c8794622e2169e4bae765f420df3a763d5cf94bf37f1a1f443732abb1344cd4174f8d66d629cb47ed1d5
7
- data.tar.gz: 66429d1d6759fb9f349b8fc110ae80ff297f43f3ae7bb98f6ac56de3f8fd338a6f0ecef79b81f4430e787c4974c433a0313e66510f70b9b67efa5f77ae58a2d1
6
+ metadata.gz: bea0d51be418fcf78661d02d78f3771e3b25a88047d6f01ed4c5835e5c996d7d4e0389e760c6dc9eb1490efcd770d89ab82c115199ce15debd012bddfa398c68
7
+ data.tar.gz: 311b96003c3e033690af8354471146298507390a889f6a3ee3767782c8060a62d71759b5304873a4e8d07f8881db06dd945f1325d64c360c17a675092019fdb9
data/.git/ORIG_HEAD CHANGED
@@ -1 +1 @@
1
- 7659a644ef149debee2515386136b7e2d5e917ea
1
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667
data/.git/index CHANGED
Binary file
data/.git/logs/HEAD CHANGED
@@ -1,3 +1,3 @@
1
- 0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- 7659a644ef149debee2515386136b7e2d5e917ea 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 checkout: moving from master to master
3
- 7659a644ef149debee2515386136b7e2d5e917ea 14ef2b24960a5e854b60586884494ed913221b5b sdmrelease <support@strongdm.com> 1714059057 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 checkout: moving from master to master
3
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 6ca94f88b799db10fe2a0867b5b53718a0289d0a root <root@8f370e732ffa.(none)> 1716241926 +0000 merge origin/development: Fast-forward
@@ -1,2 +1,2 @@
1
- 0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- 7659a644ef149debee2515386136b7e2d5e917ea 14ef2b24960a5e854b60586884494ed913221b5b sdmrelease <support@strongdm.com> 1714059057 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 6ca94f88b799db10fe2a0867b5b53718a0289d0a root <root@8f370e732ffa.(none)> 1716241926 +0000 merge origin/development: Fast-forward
@@ -1 +1 @@
1
- 0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
1
+ 0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
data/.git/packed-refs CHANGED
@@ -1,6 +1,6 @@
1
1
  # pack-refs with: peeled fully-peeled sorted
2
- 14ef2b24960a5e854b60586884494ed913221b5b refs/remotes/origin/development
3
- 7659a644ef149debee2515386136b7e2d5e917ea refs/remotes/origin/master
2
+ 6ca94f88b799db10fe2a0867b5b53718a0289d0a refs/remotes/origin/development
3
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 refs/remotes/origin/master
4
4
  2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
5
5
  04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
6
6
  6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
@@ -105,3 +105,5 @@ d8a1092c15d3618de31ada43875014d96bd21e36 refs/tags/v6.9.0
105
105
  c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/tags/v7.0.0
106
106
  f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/tags/v7.1.0
107
107
  7659a644ef149debee2515386136b7e2d5e917ea refs/tags/v8.0.0
108
+ 14ef2b24960a5e854b60586884494ed913221b5b refs/tags/v8.1.0
109
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 refs/tags/v8.3.0
@@ -1 +1 @@
1
- 14ef2b24960a5e854b60586884494ed913221b5b
1
+ 6ca94f88b799db10fe2a0867b5b53718a0289d0a
data/lib/constants.rb CHANGED
@@ -93,6 +93,7 @@ module SDM
93
93
  NONE = ""
94
94
  DUO = "duo"
95
95
  TOTP = "totp"
96
+ OKTA = "okta"
96
97
  end
97
98
 
98
99
  # Activity Entities, all entity types that can be part of an activity.
data/lib/grpc/plumbing.rb CHANGED
@@ -5416,6 +5416,62 @@ module SDM
5416
5416
  end
5417
5417
  items
5418
5418
  end
5419
+ def self.convert_keyfactor_ssh_store_to_porcelain(plumbing)
5420
+ if plumbing == nil
5421
+ return nil
5422
+ end
5423
+ porcelain = KeyfactorSSHStore.new()
5424
+ porcelain.ca_file_path = (plumbing.ca_file_path)
5425
+ porcelain.certificate_file_path = (plumbing.certificate_file_path)
5426
+ porcelain.default_certificate_authority_name = (plumbing.default_certificate_authority_name)
5427
+ porcelain.default_certificate_profile_name = (plumbing.default_certificate_profile_name)
5428
+ porcelain.default_end_entity_profile_name = (plumbing.default_end_entity_profile_name)
5429
+ porcelain.enrollment_code_env_var = (plumbing.enrollment_code_env_var)
5430
+ porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
5431
+ porcelain.id = (plumbing.id)
5432
+ porcelain.key_file_path = (plumbing.key_file_path)
5433
+ porcelain.name = (plumbing.name)
5434
+ porcelain.server_address = (plumbing.server_address)
5435
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
5436
+ porcelain
5437
+ end
5438
+
5439
+ def self.convert_keyfactor_ssh_store_to_plumbing(porcelain)
5440
+ if porcelain == nil
5441
+ return nil
5442
+ end
5443
+ plumbing = V1::KeyfactorSSHStore.new()
5444
+ plumbing.ca_file_path = (porcelain.ca_file_path)
5445
+ plumbing.certificate_file_path = (porcelain.certificate_file_path)
5446
+ plumbing.default_certificate_authority_name = (porcelain.default_certificate_authority_name)
5447
+ plumbing.default_certificate_profile_name = (porcelain.default_certificate_profile_name)
5448
+ plumbing.default_end_entity_profile_name = (porcelain.default_end_entity_profile_name)
5449
+ plumbing.enrollment_code_env_var = (porcelain.enrollment_code_env_var)
5450
+ plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
5451
+ plumbing.id = (porcelain.id)
5452
+ plumbing.key_file_path = (porcelain.key_file_path)
5453
+ plumbing.name = (porcelain.name)
5454
+ plumbing.server_address = (porcelain.server_address)
5455
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
5456
+ plumbing
5457
+ end
5458
+ def self.convert_repeated_keyfactor_ssh_store_to_plumbing(porcelains)
5459
+ items = Array.new
5460
+ porcelains.each do |porcelain|
5461
+ plumbing = convert_keyfactor_ssh_store_to_plumbing(porcelain)
5462
+ items.append(plumbing)
5463
+ end
5464
+ items
5465
+ end
5466
+
5467
+ def self.convert_repeated_keyfactor_ssh_store_to_porcelain(plumbings)
5468
+ items = Array.new
5469
+ plumbings.each do |plumbing|
5470
+ porcelain = convert_keyfactor_ssh_store_to_porcelain(plumbing)
5471
+ items.append(porcelain)
5472
+ end
5473
+ items
5474
+ end
5419
5475
  def self.convert_keyfactor_x_509_store_to_porcelain(plumbing)
5420
5476
  if plumbing == nil
5421
5477
  return nil
@@ -5430,7 +5486,6 @@ module SDM
5430
5486
  porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
5431
5487
  porcelain.id = (plumbing.id)
5432
5488
  porcelain.key_file_path = (plumbing.key_file_path)
5433
- porcelain.key_password_env_var = (plumbing.key_password_env_var)
5434
5489
  porcelain.name = (plumbing.name)
5435
5490
  porcelain.server_address = (plumbing.server_address)
5436
5491
  porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
@@ -5451,7 +5506,6 @@ module SDM
5451
5506
  plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
5452
5507
  plumbing.id = (porcelain.id)
5453
5508
  plumbing.key_file_path = (porcelain.key_file_path)
5454
- plumbing.key_password_env_var = (porcelain.key_password_env_var)
5455
5509
  plumbing.name = (porcelain.name)
5456
5510
  plumbing.server_address = (porcelain.server_address)
5457
5511
  plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
@@ -10431,6 +10485,9 @@ module SDM
10431
10485
  if porcelain.instance_of? GCPCertX509Store
10432
10486
  plumbing.gcp_cert_x_509 = convert_gcp_cert_x_509_store_to_plumbing(porcelain)
10433
10487
  end
10488
+ if porcelain.instance_of? KeyfactorSSHStore
10489
+ plumbing.keyfactor_ssh = convert_keyfactor_ssh_store_to_plumbing(porcelain)
10490
+ end
10434
10491
  if porcelain.instance_of? KeyfactorX509Store
10435
10492
  plumbing.keyfactor_x_509 = convert_keyfactor_x_509_store_to_plumbing(porcelain)
10436
10493
  end
@@ -10443,6 +10500,12 @@ module SDM
10443
10500
  if porcelain.instance_of? VaultAppRoleCertX509Store
10444
10501
  plumbing.vault_app_role_cert_x_509 = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
10445
10502
  end
10503
+ if porcelain.instance_of? VaultAWSEC2Store
10504
+ plumbing.vault_awsec_2 = convert_vault_awsec_2_store_to_plumbing(porcelain)
10505
+ end
10506
+ if porcelain.instance_of? VaultAWSIAMStore
10507
+ plumbing.vault_awsiam = convert_vault_awsiam_store_to_plumbing(porcelain)
10508
+ end
10446
10509
  if porcelain.instance_of? VaultTLSStore
10447
10510
  plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
10448
10511
  end
@@ -10498,6 +10561,9 @@ module SDM
10498
10561
  if plumbing.gcp_cert_x_509 != nil
10499
10562
  return convert_gcp_cert_x_509_store_to_porcelain(plumbing.gcp_cert_x_509)
10500
10563
  end
10564
+ if plumbing.keyfactor_ssh != nil
10565
+ return convert_keyfactor_ssh_store_to_porcelain(plumbing.keyfactor_ssh)
10566
+ end
10501
10567
  if plumbing.keyfactor_x_509 != nil
10502
10568
  return convert_keyfactor_x_509_store_to_porcelain(plumbing.keyfactor_x_509)
10503
10569
  end
@@ -10510,6 +10576,12 @@ module SDM
10510
10576
  if plumbing.vault_app_role_cert_x_509 != nil
10511
10577
  return convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing.vault_app_role_cert_x_509)
10512
10578
  end
10579
+ if plumbing.vault_awsec_2 != nil
10580
+ return convert_vault_awsec_2_store_to_porcelain(plumbing.vault_awsec_2)
10581
+ end
10582
+ if plumbing.vault_awsiam != nil
10583
+ return convert_vault_awsiam_store_to_porcelain(plumbing.vault_awsiam)
10584
+ end
10513
10585
  if plumbing.vault_tls != nil
10514
10586
  return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
10515
10587
  end
@@ -11473,6 +11545,90 @@ module SDM
11473
11545
  end
11474
11546
  items
11475
11547
  end
11548
+ def self.convert_vault_awsec_2_store_to_porcelain(plumbing)
11549
+ if plumbing == nil
11550
+ return nil
11551
+ end
11552
+ porcelain = VaultAWSEC2Store.new()
11553
+ porcelain.id = (plumbing.id)
11554
+ porcelain.name = (plumbing.name)
11555
+ porcelain.namespace = (plumbing.namespace)
11556
+ porcelain.server_address = (plumbing.server_address)
11557
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
11558
+ porcelain
11559
+ end
11560
+
11561
+ def self.convert_vault_awsec_2_store_to_plumbing(porcelain)
11562
+ if porcelain == nil
11563
+ return nil
11564
+ end
11565
+ plumbing = V1::VaultAWSEC2Store.new()
11566
+ plumbing.id = (porcelain.id)
11567
+ plumbing.name = (porcelain.name)
11568
+ plumbing.namespace = (porcelain.namespace)
11569
+ plumbing.server_address = (porcelain.server_address)
11570
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
11571
+ plumbing
11572
+ end
11573
+ def self.convert_repeated_vault_awsec_2_store_to_plumbing(porcelains)
11574
+ items = Array.new
11575
+ porcelains.each do |porcelain|
11576
+ plumbing = convert_vault_awsec_2_store_to_plumbing(porcelain)
11577
+ items.append(plumbing)
11578
+ end
11579
+ items
11580
+ end
11581
+
11582
+ def self.convert_repeated_vault_awsec_2_store_to_porcelain(plumbings)
11583
+ items = Array.new
11584
+ plumbings.each do |plumbing|
11585
+ porcelain = convert_vault_awsec_2_store_to_porcelain(plumbing)
11586
+ items.append(porcelain)
11587
+ end
11588
+ items
11589
+ end
11590
+ def self.convert_vault_awsiam_store_to_porcelain(plumbing)
11591
+ if plumbing == nil
11592
+ return nil
11593
+ end
11594
+ porcelain = VaultAWSIAMStore.new()
11595
+ porcelain.id = (plumbing.id)
11596
+ porcelain.name = (plumbing.name)
11597
+ porcelain.namespace = (plumbing.namespace)
11598
+ porcelain.server_address = (plumbing.server_address)
11599
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
11600
+ porcelain
11601
+ end
11602
+
11603
+ def self.convert_vault_awsiam_store_to_plumbing(porcelain)
11604
+ if porcelain == nil
11605
+ return nil
11606
+ end
11607
+ plumbing = V1::VaultAWSIAMStore.new()
11608
+ plumbing.id = (porcelain.id)
11609
+ plumbing.name = (porcelain.name)
11610
+ plumbing.namespace = (porcelain.namespace)
11611
+ plumbing.server_address = (porcelain.server_address)
11612
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
11613
+ plumbing
11614
+ end
11615
+ def self.convert_repeated_vault_awsiam_store_to_plumbing(porcelains)
11616
+ items = Array.new
11617
+ porcelains.each do |porcelain|
11618
+ plumbing = convert_vault_awsiam_store_to_plumbing(porcelain)
11619
+ items.append(plumbing)
11620
+ end
11621
+ items
11622
+ end
11623
+
11624
+ def self.convert_repeated_vault_awsiam_store_to_porcelain(plumbings)
11625
+ items = Array.new
11626
+ plumbings.each do |plumbing|
11627
+ porcelain = convert_vault_awsiam_store_to_porcelain(plumbing)
11628
+ items.append(porcelain)
11629
+ end
11630
+ items
11631
+ end
11476
11632
  def self.convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
11477
11633
  if plumbing == nil
11478
11634
  return nil
@@ -34,7 +34,10 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
34
34
  optional :delinea, :message, 2900, "v1.DelineaStore"
35
35
  optional :gcp, :message, 201, "v1.GCPStore"
36
36
  optional :gcp_cert_x_509, :message, 202, "v1.GCPCertX509Store"
37
+ optional :keyfactor_ssh, :message, 210, "v1.KeyfactorSSHStore"
37
38
  optional :keyfactor_x_509, :message, 200, "v1.KeyfactorX509Store"
39
+ optional :vault_awsec_2, :message, 97, "v1.VaultAWSEC2Store"
40
+ optional :vault_awsiam, :message, 96, "v1.VaultAWSIAMStore"
38
41
  optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
39
42
  optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
40
43
  optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
@@ -115,6 +118,20 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
115
118
  optional :projectID, :string, 3
116
119
  optional :tags, :message, 32771, "v1.Tags"
117
120
  end
121
+ add_message "v1.KeyfactorSSHStore" do
122
+ optional :id, :string, 1
123
+ optional :name, :string, 2
124
+ optional :ca_file_path, :string, 6
125
+ optional :certificate_file_path, :string, 4
126
+ optional :default_certificate_authority_name, :string, 10
127
+ optional :default_certificate_profile_name, :string, 8
128
+ optional :default_end_entity_profile_name, :string, 9
129
+ optional :enrollment_code_env_var, :string, 12
130
+ optional :enrollment_username_env_var, :string, 11
131
+ optional :key_file_path, :string, 5
132
+ optional :server_address, :string, 3
133
+ optional :tags, :message, 32771, "v1.Tags"
134
+ end
118
135
  add_message "v1.KeyfactorX509Store" do
119
136
  optional :id, :string, 1
120
137
  optional :name, :string, 2
@@ -126,10 +143,23 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
126
143
  optional :enrollment_code_env_var, :string, 12
127
144
  optional :enrollment_username_env_var, :string, 11
128
145
  optional :key_file_path, :string, 5
129
- optional :key_password_env_var, :string, 7
130
146
  optional :server_address, :string, 3
131
147
  optional :tags, :message, 32771, "v1.Tags"
132
148
  end
149
+ add_message "v1.VaultAWSEC2Store" do
150
+ optional :id, :string, 1
151
+ optional :name, :string, 2
152
+ optional :namespace, :string, 5
153
+ optional :server_address, :string, 3
154
+ optional :tags, :message, 8, "v1.Tags"
155
+ end
156
+ add_message "v1.VaultAWSIAMStore" do
157
+ optional :id, :string, 1
158
+ optional :name, :string, 2
159
+ optional :namespace, :string, 5
160
+ optional :server_address, :string, 3
161
+ optional :tags, :message, 8, "v1.Tags"
162
+ end
133
163
  add_message "v1.VaultAppRoleStore" do
134
164
  optional :id, :string, 1
135
165
  optional :name, :string, 2
@@ -235,7 +265,10 @@ module V1
235
265
  DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
236
266
  GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
237
267
  GCPCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPCertX509Store").msgclass
268
+ KeyfactorSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorSSHStore").msgclass
238
269
  KeyfactorX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorX509Store").msgclass
270
+ VaultAWSEC2Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2Store").msgclass
271
+ VaultAWSIAMStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMStore").msgclass
239
272
  VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
240
273
  VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
241
274
  VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
@@ -5253,6 +5253,75 @@ module SDM
5253
5253
  end
5254
5254
  end
5255
5255
 
5256
+ class KeyfactorSSHStore
5257
+ # Path to the root CA that signed the certificate passed to the client for HTTPS connection.
5258
+ # This is not required if the CA is trusted by the host operating system. This should be a PEM
5259
+ # formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
5260
+ attr_accessor :ca_file_path
5261
+ # Path to client certificate in PEM format. This certificate must contain a client certificate that
5262
+ # is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
5263
+ # key associated with the certificate, but KeyFile can also be set to configure the private key.
5264
+ attr_accessor :certificate_file_path
5265
+ # Name of EJBCA certificate authority that will enroll CSR.
5266
+ attr_accessor :default_certificate_authority_name
5267
+ # Certificate profile name that EJBCA will enroll the CSR with.
5268
+ attr_accessor :default_certificate_profile_name
5269
+ # End entity profile that EJBCA will enroll the CSR with.
5270
+ attr_accessor :default_end_entity_profile_name
5271
+ # code used by EJBCA during enrollment. May be left blank if no code is required.
5272
+ attr_accessor :enrollment_code_env_var
5273
+ # username that used by the EJBCA during enrollment. This can be left out.
5274
+ # If so, the username must be auto-generated on the Keyfactor side.
5275
+ attr_accessor :enrollment_username_env_var
5276
+ # Unique identifier of the SecretStore.
5277
+ attr_accessor :id
5278
+ # Path to private key in PEM format. This file should contain the private key associated with the
5279
+ # client certificate configured in CertificateFile.
5280
+ attr_accessor :key_file_path
5281
+ # Unique human-readable name of the SecretStore.
5282
+ attr_accessor :name
5283
+ # the host of the Key Factor CA
5284
+ attr_accessor :server_address
5285
+ # Tags is a map of key, value pairs.
5286
+ attr_accessor :tags
5287
+
5288
+ def initialize(
5289
+ ca_file_path: nil,
5290
+ certificate_file_path: nil,
5291
+ default_certificate_authority_name: nil,
5292
+ default_certificate_profile_name: nil,
5293
+ default_end_entity_profile_name: nil,
5294
+ enrollment_code_env_var: nil,
5295
+ enrollment_username_env_var: nil,
5296
+ id: nil,
5297
+ key_file_path: nil,
5298
+ name: nil,
5299
+ server_address: nil,
5300
+ tags: nil
5301
+ )
5302
+ @ca_file_path = ca_file_path == nil ? "" : ca_file_path
5303
+ @certificate_file_path = certificate_file_path == nil ? "" : certificate_file_path
5304
+ @default_certificate_authority_name = default_certificate_authority_name == nil ? "" : default_certificate_authority_name
5305
+ @default_certificate_profile_name = default_certificate_profile_name == nil ? "" : default_certificate_profile_name
5306
+ @default_end_entity_profile_name = default_end_entity_profile_name == nil ? "" : default_end_entity_profile_name
5307
+ @enrollment_code_env_var = enrollment_code_env_var == nil ? "" : enrollment_code_env_var
5308
+ @enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
5309
+ @id = id == nil ? "" : id
5310
+ @key_file_path = key_file_path == nil ? "" : key_file_path
5311
+ @name = name == nil ? "" : name
5312
+ @server_address = server_address == nil ? "" : server_address
5313
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
5314
+ end
5315
+
5316
+ def to_json(options = {})
5317
+ hash = {}
5318
+ self.instance_variables.each do |var|
5319
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
5320
+ end
5321
+ hash.to_json
5322
+ end
5323
+ end
5324
+
5256
5325
  class KeyfactorX509Store
5257
5326
  # Path to the root CA that signed the certificate passed to the client for HTTPS connection.
5258
5327
  # This is not required if the CA is trusted by the host operating system. This should be a PEM
@@ -5278,8 +5347,6 @@ module SDM
5278
5347
  # Path to private key in PEM format. This file should contain the private key associated with the
5279
5348
  # client certificate configured in CertificateFile.
5280
5349
  attr_accessor :key_file_path
5281
- # optional environment variable housing the password that is used to decrypt the key file.
5282
- attr_accessor :key_password_env_var
5283
5350
  # Unique human-readable name of the SecretStore.
5284
5351
  attr_accessor :name
5285
5352
  # the host of the Key Factor CA
@@ -5297,7 +5364,6 @@ module SDM
5297
5364
  enrollment_username_env_var: nil,
5298
5365
  id: nil,
5299
5366
  key_file_path: nil,
5300
- key_password_env_var: nil,
5301
5367
  name: nil,
5302
5368
  server_address: nil,
5303
5369
  tags: nil
@@ -5311,7 +5377,6 @@ module SDM
5311
5377
  @enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
5312
5378
  @id = id == nil ? "" : id
5313
5379
  @key_file_path = key_file_path == nil ? "" : key_file_path
5314
- @key_password_env_var = key_password_env_var == nil ? "" : key_password_env_var
5315
5380
  @name = name == nil ? "" : name
5316
5381
  @server_address = server_address == nil ? "" : server_address
5317
5382
  @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
@@ -10682,6 +10747,78 @@ module SDM
10682
10747
  end
10683
10748
  end
10684
10749
 
10750
+ # VaultAWSEC2Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10751
+ class VaultAWSEC2Store
10752
+ # Unique identifier of the SecretStore.
10753
+ attr_accessor :id
10754
+ # Unique human-readable name of the SecretStore.
10755
+ attr_accessor :name
10756
+ # The namespace to make requests within
10757
+ attr_accessor :namespace
10758
+ # The URL of the Vault to target
10759
+ attr_accessor :server_address
10760
+ # Tags is a map of key, value pairs.
10761
+ attr_accessor :tags
10762
+
10763
+ def initialize(
10764
+ id: nil,
10765
+ name: nil,
10766
+ namespace: nil,
10767
+ server_address: nil,
10768
+ tags: nil
10769
+ )
10770
+ @id = id == nil ? "" : id
10771
+ @name = name == nil ? "" : name
10772
+ @namespace = namespace == nil ? "" : namespace
10773
+ @server_address = server_address == nil ? "" : server_address
10774
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10775
+ end
10776
+
10777
+ def to_json(options = {})
10778
+ hash = {}
10779
+ self.instance_variables.each do |var|
10780
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10781
+ end
10782
+ hash.to_json
10783
+ end
10784
+ end
10785
+
10786
+ # VaultAWSIAMStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
10787
+ class VaultAWSIAMStore
10788
+ # Unique identifier of the SecretStore.
10789
+ attr_accessor :id
10790
+ # Unique human-readable name of the SecretStore.
10791
+ attr_accessor :name
10792
+ # The namespace to make requests within
10793
+ attr_accessor :namespace
10794
+ # The URL of the Vault to target
10795
+ attr_accessor :server_address
10796
+ # Tags is a map of key, value pairs.
10797
+ attr_accessor :tags
10798
+
10799
+ def initialize(
10800
+ id: nil,
10801
+ name: nil,
10802
+ namespace: nil,
10803
+ server_address: nil,
10804
+ tags: nil
10805
+ )
10806
+ @id = id == nil ? "" : id
10807
+ @name = name == nil ? "" : name
10808
+ @namespace = namespace == nil ? "" : namespace
10809
+ @server_address = server_address == nil ? "" : server_address
10810
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10811
+ end
10812
+
10813
+ def to_json(options = {})
10814
+ hash = {}
10815
+ self.instance_variables.each do |var|
10816
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10817
+ end
10818
+ hash.to_json
10819
+ end
10820
+ end
10821
+
10685
10822
  class VaultAppRoleCertSSHStore
10686
10823
  # Unique identifier of the SecretStore.
10687
10824
  attr_accessor :id
data/lib/strongdm.rb CHANGED
@@ -29,7 +29,7 @@ module SDM #:nodoc:
29
29
  DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
30
30
  DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
31
31
  API_VERSION = "2024-03-28"
32
- USER_AGENT = "strongdm-sdk-ruby/8.1.0"
32
+ USER_AGENT = "strongdm-sdk-ruby/8.4.0"
33
33
  private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
34
34
 
35
35
  # Creates a new strongDM API client.
data/lib/svc.rb CHANGED
@@ -4508,10 +4508,13 @@ module SDM #:nodoc:
4508
4508
  # {DelineaStore}
4509
4509
  # {GCPStore}
4510
4510
  # {GCPCertX509Store}
4511
+ # {KeyfactorSSHStore}
4511
4512
  # {KeyfactorX509Store}
4512
4513
  # {VaultAppRoleStore}
4513
4514
  # {VaultAppRoleCertSSHStore}
4514
4515
  # {VaultAppRoleCertX509Store}
4516
+ # {VaultAWSEC2Store}
4517
+ # {VaultAWSIAMStore}
4515
4518
  # {VaultTLSStore}
4516
4519
  # {VaultTLSCertSSHStore}
4517
4520
  # {VaultTLSCertX509Store}
data/lib/version CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "8.1.0"
16
+ VERSION = "8.4.0"
17
17
  end
data/lib/version.rb CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "8.1.0"
16
+ VERSION = "8.4.0"
17
17
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: strongdm
3
3
  version: !ruby/object:Gem::Version
4
- version: 8.1.0
4
+ version: 8.4.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - strongDM Team
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-04-25 00:00:00.000000000 Z
11
+ date: 2024-05-20 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: grpc
@@ -81,8 +81,8 @@ files:
81
81
  - "./.git/logs/HEAD"
82
82
  - "./.git/logs/refs/heads/master"
83
83
  - "./.git/logs/refs/remotes/origin/HEAD"
84
- - "./.git/objects/pack/pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.idx"
85
- - "./.git/objects/pack/pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.pack"
84
+ - "./.git/objects/pack/pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.idx"
85
+ - "./.git/objects/pack/pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.pack"
86
86
  - "./.git/packed-refs"
87
87
  - "./.git/refs/heads/master"
88
88
  - "./.git/refs/remotes/origin/HEAD"