strongdm 8.1.0 → 8.4.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 9126b0fed8d1f9d6bace10080c99994b18fea3dfb5d10728cb14f0ccbf2cac5b
4
- data.tar.gz: 45523efb30a4a5615704eac6078c24187c8033739066669afac11c30c032f2ac
3
+ metadata.gz: 0db6a67f3dc8f6fb4d1f96d31ed4ec252dcafa3f242652ec98add77f1dc4fce0
4
+ data.tar.gz: eabcaa44c11f5fc550bc8b56d94792ffcba24db02ef05b3c74f8407e50d16b6e
5
5
  SHA512:
6
- metadata.gz: 8b95773f4109c5e056bcfb92dd4b95ebc52eec97e178c8794622e2169e4bae765f420df3a763d5cf94bf37f1a1f443732abb1344cd4174f8d66d629cb47ed1d5
7
- data.tar.gz: 66429d1d6759fb9f349b8fc110ae80ff297f43f3ae7bb98f6ac56de3f8fd338a6f0ecef79b81f4430e787c4974c433a0313e66510f70b9b67efa5f77ae58a2d1
6
+ metadata.gz: bea0d51be418fcf78661d02d78f3771e3b25a88047d6f01ed4c5835e5c996d7d4e0389e760c6dc9eb1490efcd770d89ab82c115199ce15debd012bddfa398c68
7
+ data.tar.gz: 311b96003c3e033690af8354471146298507390a889f6a3ee3767782c8060a62d71759b5304873a4e8d07f8881db06dd945f1325d64c360c17a675092019fdb9
data/.git/ORIG_HEAD CHANGED
@@ -1 +1 @@
1
- 7659a644ef149debee2515386136b7e2d5e917ea
1
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667
data/.git/index CHANGED
Binary file
data/.git/logs/HEAD CHANGED
@@ -1,3 +1,3 @@
1
- 0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- 7659a644ef149debee2515386136b7e2d5e917ea 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 checkout: moving from master to master
3
- 7659a644ef149debee2515386136b7e2d5e917ea 14ef2b24960a5e854b60586884494ed913221b5b sdmrelease <support@strongdm.com> 1714059057 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 checkout: moving from master to master
3
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 6ca94f88b799db10fe2a0867b5b53718a0289d0a root <root@8f370e732ffa.(none)> 1716241926 +0000 merge origin/development: Fast-forward
@@ -1,2 +1,2 @@
1
- 0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- 7659a644ef149debee2515386136b7e2d5e917ea 14ef2b24960a5e854b60586884494ed913221b5b sdmrelease <support@strongdm.com> 1714059057 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 6ca94f88b799db10fe2a0867b5b53718a0289d0a root <root@8f370e732ffa.(none)> 1716241926 +0000 merge origin/development: Fast-forward
@@ -1 +1 @@
1
- 0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
1
+ 0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
data/.git/packed-refs CHANGED
@@ -1,6 +1,6 @@
1
1
  # pack-refs with: peeled fully-peeled sorted
2
- 14ef2b24960a5e854b60586884494ed913221b5b refs/remotes/origin/development
3
- 7659a644ef149debee2515386136b7e2d5e917ea refs/remotes/origin/master
2
+ 6ca94f88b799db10fe2a0867b5b53718a0289d0a refs/remotes/origin/development
3
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 refs/remotes/origin/master
4
4
  2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
5
5
  04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
6
6
  6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
@@ -105,3 +105,5 @@ d8a1092c15d3618de31ada43875014d96bd21e36 refs/tags/v6.9.0
105
105
  c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/tags/v7.0.0
106
106
  f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/tags/v7.1.0
107
107
  7659a644ef149debee2515386136b7e2d5e917ea refs/tags/v8.0.0
108
+ 14ef2b24960a5e854b60586884494ed913221b5b refs/tags/v8.1.0
109
+ 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 refs/tags/v8.3.0
@@ -1 +1 @@
1
- 14ef2b24960a5e854b60586884494ed913221b5b
1
+ 6ca94f88b799db10fe2a0867b5b53718a0289d0a
data/lib/constants.rb CHANGED
@@ -93,6 +93,7 @@ module SDM
93
93
  NONE = ""
94
94
  DUO = "duo"
95
95
  TOTP = "totp"
96
+ OKTA = "okta"
96
97
  end
97
98
 
98
99
  # Activity Entities, all entity types that can be part of an activity.
data/lib/grpc/plumbing.rb CHANGED
@@ -5416,6 +5416,62 @@ module SDM
5416
5416
  end
5417
5417
  items
5418
5418
  end
5419
+ def self.convert_keyfactor_ssh_store_to_porcelain(plumbing)
5420
+ if plumbing == nil
5421
+ return nil
5422
+ end
5423
+ porcelain = KeyfactorSSHStore.new()
5424
+ porcelain.ca_file_path = (plumbing.ca_file_path)
5425
+ porcelain.certificate_file_path = (plumbing.certificate_file_path)
5426
+ porcelain.default_certificate_authority_name = (plumbing.default_certificate_authority_name)
5427
+ porcelain.default_certificate_profile_name = (plumbing.default_certificate_profile_name)
5428
+ porcelain.default_end_entity_profile_name = (plumbing.default_end_entity_profile_name)
5429
+ porcelain.enrollment_code_env_var = (plumbing.enrollment_code_env_var)
5430
+ porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
5431
+ porcelain.id = (plumbing.id)
5432
+ porcelain.key_file_path = (plumbing.key_file_path)
5433
+ porcelain.name = (plumbing.name)
5434
+ porcelain.server_address = (plumbing.server_address)
5435
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
5436
+ porcelain
5437
+ end
5438
+
5439
+ def self.convert_keyfactor_ssh_store_to_plumbing(porcelain)
5440
+ if porcelain == nil
5441
+ return nil
5442
+ end
5443
+ plumbing = V1::KeyfactorSSHStore.new()
5444
+ plumbing.ca_file_path = (porcelain.ca_file_path)
5445
+ plumbing.certificate_file_path = (porcelain.certificate_file_path)
5446
+ plumbing.default_certificate_authority_name = (porcelain.default_certificate_authority_name)
5447
+ plumbing.default_certificate_profile_name = (porcelain.default_certificate_profile_name)
5448
+ plumbing.default_end_entity_profile_name = (porcelain.default_end_entity_profile_name)
5449
+ plumbing.enrollment_code_env_var = (porcelain.enrollment_code_env_var)
5450
+ plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
5451
+ plumbing.id = (porcelain.id)
5452
+ plumbing.key_file_path = (porcelain.key_file_path)
5453
+ plumbing.name = (porcelain.name)
5454
+ plumbing.server_address = (porcelain.server_address)
5455
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
5456
+ plumbing
5457
+ end
5458
+ def self.convert_repeated_keyfactor_ssh_store_to_plumbing(porcelains)
5459
+ items = Array.new
5460
+ porcelains.each do |porcelain|
5461
+ plumbing = convert_keyfactor_ssh_store_to_plumbing(porcelain)
5462
+ items.append(plumbing)
5463
+ end
5464
+ items
5465
+ end
5466
+
5467
+ def self.convert_repeated_keyfactor_ssh_store_to_porcelain(plumbings)
5468
+ items = Array.new
5469
+ plumbings.each do |plumbing|
5470
+ porcelain = convert_keyfactor_ssh_store_to_porcelain(plumbing)
5471
+ items.append(porcelain)
5472
+ end
5473
+ items
5474
+ end
5419
5475
  def self.convert_keyfactor_x_509_store_to_porcelain(plumbing)
5420
5476
  if plumbing == nil
5421
5477
  return nil
@@ -5430,7 +5486,6 @@ module SDM
5430
5486
  porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
5431
5487
  porcelain.id = (plumbing.id)
5432
5488
  porcelain.key_file_path = (plumbing.key_file_path)
5433
- porcelain.key_password_env_var = (plumbing.key_password_env_var)
5434
5489
  porcelain.name = (plumbing.name)
5435
5490
  porcelain.server_address = (plumbing.server_address)
5436
5491
  porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
@@ -5451,7 +5506,6 @@ module SDM
5451
5506
  plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
5452
5507
  plumbing.id = (porcelain.id)
5453
5508
  plumbing.key_file_path = (porcelain.key_file_path)
5454
- plumbing.key_password_env_var = (porcelain.key_password_env_var)
5455
5509
  plumbing.name = (porcelain.name)
5456
5510
  plumbing.server_address = (porcelain.server_address)
5457
5511
  plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
@@ -10431,6 +10485,9 @@ module SDM
10431
10485
  if porcelain.instance_of? GCPCertX509Store
10432
10486
  plumbing.gcp_cert_x_509 = convert_gcp_cert_x_509_store_to_plumbing(porcelain)
10433
10487
  end
10488
+ if porcelain.instance_of? KeyfactorSSHStore
10489
+ plumbing.keyfactor_ssh = convert_keyfactor_ssh_store_to_plumbing(porcelain)
10490
+ end
10434
10491
  if porcelain.instance_of? KeyfactorX509Store
10435
10492
  plumbing.keyfactor_x_509 = convert_keyfactor_x_509_store_to_plumbing(porcelain)
10436
10493
  end
@@ -10443,6 +10500,12 @@ module SDM
10443
10500
  if porcelain.instance_of? VaultAppRoleCertX509Store
10444
10501
  plumbing.vault_app_role_cert_x_509 = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
10445
10502
  end
10503
+ if porcelain.instance_of? VaultAWSEC2Store
10504
+ plumbing.vault_awsec_2 = convert_vault_awsec_2_store_to_plumbing(porcelain)
10505
+ end
10506
+ if porcelain.instance_of? VaultAWSIAMStore
10507
+ plumbing.vault_awsiam = convert_vault_awsiam_store_to_plumbing(porcelain)
10508
+ end
10446
10509
  if porcelain.instance_of? VaultTLSStore
10447
10510
  plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
10448
10511
  end
@@ -10498,6 +10561,9 @@ module SDM
10498
10561
  if plumbing.gcp_cert_x_509 != nil
10499
10562
  return convert_gcp_cert_x_509_store_to_porcelain(plumbing.gcp_cert_x_509)
10500
10563
  end
10564
+ if plumbing.keyfactor_ssh != nil
10565
+ return convert_keyfactor_ssh_store_to_porcelain(plumbing.keyfactor_ssh)
10566
+ end
10501
10567
  if plumbing.keyfactor_x_509 != nil
10502
10568
  return convert_keyfactor_x_509_store_to_porcelain(plumbing.keyfactor_x_509)
10503
10569
  end
@@ -10510,6 +10576,12 @@ module SDM
10510
10576
  if plumbing.vault_app_role_cert_x_509 != nil
10511
10577
  return convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing.vault_app_role_cert_x_509)
10512
10578
  end
10579
+ if plumbing.vault_awsec_2 != nil
10580
+ return convert_vault_awsec_2_store_to_porcelain(plumbing.vault_awsec_2)
10581
+ end
10582
+ if plumbing.vault_awsiam != nil
10583
+ return convert_vault_awsiam_store_to_porcelain(plumbing.vault_awsiam)
10584
+ end
10513
10585
  if plumbing.vault_tls != nil
10514
10586
  return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
10515
10587
  end
@@ -11473,6 +11545,90 @@ module SDM
11473
11545
  end
11474
11546
  items
11475
11547
  end
11548
+ def self.convert_vault_awsec_2_store_to_porcelain(plumbing)
11549
+ if plumbing == nil
11550
+ return nil
11551
+ end
11552
+ porcelain = VaultAWSEC2Store.new()
11553
+ porcelain.id = (plumbing.id)
11554
+ porcelain.name = (plumbing.name)
11555
+ porcelain.namespace = (plumbing.namespace)
11556
+ porcelain.server_address = (plumbing.server_address)
11557
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
11558
+ porcelain
11559
+ end
11560
+
11561
+ def self.convert_vault_awsec_2_store_to_plumbing(porcelain)
11562
+ if porcelain == nil
11563
+ return nil
11564
+ end
11565
+ plumbing = V1::VaultAWSEC2Store.new()
11566
+ plumbing.id = (porcelain.id)
11567
+ plumbing.name = (porcelain.name)
11568
+ plumbing.namespace = (porcelain.namespace)
11569
+ plumbing.server_address = (porcelain.server_address)
11570
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
11571
+ plumbing
11572
+ end
11573
+ def self.convert_repeated_vault_awsec_2_store_to_plumbing(porcelains)
11574
+ items = Array.new
11575
+ porcelains.each do |porcelain|
11576
+ plumbing = convert_vault_awsec_2_store_to_plumbing(porcelain)
11577
+ items.append(plumbing)
11578
+ end
11579
+ items
11580
+ end
11581
+
11582
+ def self.convert_repeated_vault_awsec_2_store_to_porcelain(plumbings)
11583
+ items = Array.new
11584
+ plumbings.each do |plumbing|
11585
+ porcelain = convert_vault_awsec_2_store_to_porcelain(plumbing)
11586
+ items.append(porcelain)
11587
+ end
11588
+ items
11589
+ end
11590
+ def self.convert_vault_awsiam_store_to_porcelain(plumbing)
11591
+ if plumbing == nil
11592
+ return nil
11593
+ end
11594
+ porcelain = VaultAWSIAMStore.new()
11595
+ porcelain.id = (plumbing.id)
11596
+ porcelain.name = (plumbing.name)
11597
+ porcelain.namespace = (plumbing.namespace)
11598
+ porcelain.server_address = (plumbing.server_address)
11599
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
11600
+ porcelain
11601
+ end
11602
+
11603
+ def self.convert_vault_awsiam_store_to_plumbing(porcelain)
11604
+ if porcelain == nil
11605
+ return nil
11606
+ end
11607
+ plumbing = V1::VaultAWSIAMStore.new()
11608
+ plumbing.id = (porcelain.id)
11609
+ plumbing.name = (porcelain.name)
11610
+ plumbing.namespace = (porcelain.namespace)
11611
+ plumbing.server_address = (porcelain.server_address)
11612
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
11613
+ plumbing
11614
+ end
11615
+ def self.convert_repeated_vault_awsiam_store_to_plumbing(porcelains)
11616
+ items = Array.new
11617
+ porcelains.each do |porcelain|
11618
+ plumbing = convert_vault_awsiam_store_to_plumbing(porcelain)
11619
+ items.append(plumbing)
11620
+ end
11621
+ items
11622
+ end
11623
+
11624
+ def self.convert_repeated_vault_awsiam_store_to_porcelain(plumbings)
11625
+ items = Array.new
11626
+ plumbings.each do |plumbing|
11627
+ porcelain = convert_vault_awsiam_store_to_porcelain(plumbing)
11628
+ items.append(porcelain)
11629
+ end
11630
+ items
11631
+ end
11476
11632
  def self.convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
11477
11633
  if plumbing == nil
11478
11634
  return nil
@@ -34,7 +34,10 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
34
34
  optional :delinea, :message, 2900, "v1.DelineaStore"
35
35
  optional :gcp, :message, 201, "v1.GCPStore"
36
36
  optional :gcp_cert_x_509, :message, 202, "v1.GCPCertX509Store"
37
+ optional :keyfactor_ssh, :message, 210, "v1.KeyfactorSSHStore"
37
38
  optional :keyfactor_x_509, :message, 200, "v1.KeyfactorX509Store"
39
+ optional :vault_awsec_2, :message, 97, "v1.VaultAWSEC2Store"
40
+ optional :vault_awsiam, :message, 96, "v1.VaultAWSIAMStore"
38
41
  optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
39
42
  optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
40
43
  optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
@@ -115,6 +118,20 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
115
118
  optional :projectID, :string, 3
116
119
  optional :tags, :message, 32771, "v1.Tags"
117
120
  end
121
+ add_message "v1.KeyfactorSSHStore" do
122
+ optional :id, :string, 1
123
+ optional :name, :string, 2
124
+ optional :ca_file_path, :string, 6
125
+ optional :certificate_file_path, :string, 4
126
+ optional :default_certificate_authority_name, :string, 10
127
+ optional :default_certificate_profile_name, :string, 8
128
+ optional :default_end_entity_profile_name, :string, 9
129
+ optional :enrollment_code_env_var, :string, 12
130
+ optional :enrollment_username_env_var, :string, 11
131
+ optional :key_file_path, :string, 5
132
+ optional :server_address, :string, 3
133
+ optional :tags, :message, 32771, "v1.Tags"
134
+ end
118
135
  add_message "v1.KeyfactorX509Store" do
119
136
  optional :id, :string, 1
120
137
  optional :name, :string, 2
@@ -126,10 +143,23 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
126
143
  optional :enrollment_code_env_var, :string, 12
127
144
  optional :enrollment_username_env_var, :string, 11
128
145
  optional :key_file_path, :string, 5
129
- optional :key_password_env_var, :string, 7
130
146
  optional :server_address, :string, 3
131
147
  optional :tags, :message, 32771, "v1.Tags"
132
148
  end
149
+ add_message "v1.VaultAWSEC2Store" do
150
+ optional :id, :string, 1
151
+ optional :name, :string, 2
152
+ optional :namespace, :string, 5
153
+ optional :server_address, :string, 3
154
+ optional :tags, :message, 8, "v1.Tags"
155
+ end
156
+ add_message "v1.VaultAWSIAMStore" do
157
+ optional :id, :string, 1
158
+ optional :name, :string, 2
159
+ optional :namespace, :string, 5
160
+ optional :server_address, :string, 3
161
+ optional :tags, :message, 8, "v1.Tags"
162
+ end
133
163
  add_message "v1.VaultAppRoleStore" do
134
164
  optional :id, :string, 1
135
165
  optional :name, :string, 2
@@ -235,7 +265,10 @@ module V1
235
265
  DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
236
266
  GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
237
267
  GCPCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPCertX509Store").msgclass
268
+ KeyfactorSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorSSHStore").msgclass
238
269
  KeyfactorX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorX509Store").msgclass
270
+ VaultAWSEC2Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2Store").msgclass
271
+ VaultAWSIAMStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMStore").msgclass
239
272
  VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
240
273
  VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
241
274
  VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
@@ -5253,6 +5253,75 @@ module SDM
5253
5253
  end
5254
5254
  end
5255
5255
 
5256
+ class KeyfactorSSHStore
5257
+ # Path to the root CA that signed the certificate passed to the client for HTTPS connection.
5258
+ # This is not required if the CA is trusted by the host operating system. This should be a PEM
5259
+ # formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
5260
+ attr_accessor :ca_file_path
5261
+ # Path to client certificate in PEM format. This certificate must contain a client certificate that
5262
+ # is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
5263
+ # key associated with the certificate, but KeyFile can also be set to configure the private key.
5264
+ attr_accessor :certificate_file_path
5265
+ # Name of EJBCA certificate authority that will enroll CSR.
5266
+ attr_accessor :default_certificate_authority_name
5267
+ # Certificate profile name that EJBCA will enroll the CSR with.
5268
+ attr_accessor :default_certificate_profile_name
5269
+ # End entity profile that EJBCA will enroll the CSR with.
5270
+ attr_accessor :default_end_entity_profile_name
5271
+ # code used by EJBCA during enrollment. May be left blank if no code is required.
5272
+ attr_accessor :enrollment_code_env_var
5273
+ # username that used by the EJBCA during enrollment. This can be left out.
5274
+ # If so, the username must be auto-generated on the Keyfactor side.
5275
+ attr_accessor :enrollment_username_env_var
5276
+ # Unique identifier of the SecretStore.
5277
+ attr_accessor :id
5278
+ # Path to private key in PEM format. This file should contain the private key associated with the
5279
+ # client certificate configured in CertificateFile.
5280
+ attr_accessor :key_file_path
5281
+ # Unique human-readable name of the SecretStore.
5282
+ attr_accessor :name
5283
+ # the host of the Key Factor CA
5284
+ attr_accessor :server_address
5285
+ # Tags is a map of key, value pairs.
5286
+ attr_accessor :tags
5287
+
5288
+ def initialize(
5289
+ ca_file_path: nil,
5290
+ certificate_file_path: nil,
5291
+ default_certificate_authority_name: nil,
5292
+ default_certificate_profile_name: nil,
5293
+ default_end_entity_profile_name: nil,
5294
+ enrollment_code_env_var: nil,
5295
+ enrollment_username_env_var: nil,
5296
+ id: nil,
5297
+ key_file_path: nil,
5298
+ name: nil,
5299
+ server_address: nil,
5300
+ tags: nil
5301
+ )
5302
+ @ca_file_path = ca_file_path == nil ? "" : ca_file_path
5303
+ @certificate_file_path = certificate_file_path == nil ? "" : certificate_file_path
5304
+ @default_certificate_authority_name = default_certificate_authority_name == nil ? "" : default_certificate_authority_name
5305
+ @default_certificate_profile_name = default_certificate_profile_name == nil ? "" : default_certificate_profile_name
5306
+ @default_end_entity_profile_name = default_end_entity_profile_name == nil ? "" : default_end_entity_profile_name
5307
+ @enrollment_code_env_var = enrollment_code_env_var == nil ? "" : enrollment_code_env_var
5308
+ @enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
5309
+ @id = id == nil ? "" : id
5310
+ @key_file_path = key_file_path == nil ? "" : key_file_path
5311
+ @name = name == nil ? "" : name
5312
+ @server_address = server_address == nil ? "" : server_address
5313
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
5314
+ end
5315
+
5316
+ def to_json(options = {})
5317
+ hash = {}
5318
+ self.instance_variables.each do |var|
5319
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
5320
+ end
5321
+ hash.to_json
5322
+ end
5323
+ end
5324
+
5256
5325
  class KeyfactorX509Store
5257
5326
  # Path to the root CA that signed the certificate passed to the client for HTTPS connection.
5258
5327
  # This is not required if the CA is trusted by the host operating system. This should be a PEM
@@ -5278,8 +5347,6 @@ module SDM
5278
5347
  # Path to private key in PEM format. This file should contain the private key associated with the
5279
5348
  # client certificate configured in CertificateFile.
5280
5349
  attr_accessor :key_file_path
5281
- # optional environment variable housing the password that is used to decrypt the key file.
5282
- attr_accessor :key_password_env_var
5283
5350
  # Unique human-readable name of the SecretStore.
5284
5351
  attr_accessor :name
5285
5352
  # the host of the Key Factor CA
@@ -5297,7 +5364,6 @@ module SDM
5297
5364
  enrollment_username_env_var: nil,
5298
5365
  id: nil,
5299
5366
  key_file_path: nil,
5300
- key_password_env_var: nil,
5301
5367
  name: nil,
5302
5368
  server_address: nil,
5303
5369
  tags: nil
@@ -5311,7 +5377,6 @@ module SDM
5311
5377
  @enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
5312
5378
  @id = id == nil ? "" : id
5313
5379
  @key_file_path = key_file_path == nil ? "" : key_file_path
5314
- @key_password_env_var = key_password_env_var == nil ? "" : key_password_env_var
5315
5380
  @name = name == nil ? "" : name
5316
5381
  @server_address = server_address == nil ? "" : server_address
5317
5382
  @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
@@ -10682,6 +10747,78 @@ module SDM
10682
10747
  end
10683
10748
  end
10684
10749
 
10750
+ # VaultAWSEC2Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10751
+ class VaultAWSEC2Store
10752
+ # Unique identifier of the SecretStore.
10753
+ attr_accessor :id
10754
+ # Unique human-readable name of the SecretStore.
10755
+ attr_accessor :name
10756
+ # The namespace to make requests within
10757
+ attr_accessor :namespace
10758
+ # The URL of the Vault to target
10759
+ attr_accessor :server_address
10760
+ # Tags is a map of key, value pairs.
10761
+ attr_accessor :tags
10762
+
10763
+ def initialize(
10764
+ id: nil,
10765
+ name: nil,
10766
+ namespace: nil,
10767
+ server_address: nil,
10768
+ tags: nil
10769
+ )
10770
+ @id = id == nil ? "" : id
10771
+ @name = name == nil ? "" : name
10772
+ @namespace = namespace == nil ? "" : namespace
10773
+ @server_address = server_address == nil ? "" : server_address
10774
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10775
+ end
10776
+
10777
+ def to_json(options = {})
10778
+ hash = {}
10779
+ self.instance_variables.each do |var|
10780
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10781
+ end
10782
+ hash.to_json
10783
+ end
10784
+ end
10785
+
10786
+ # VaultAWSIAMStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
10787
+ class VaultAWSIAMStore
10788
+ # Unique identifier of the SecretStore.
10789
+ attr_accessor :id
10790
+ # Unique human-readable name of the SecretStore.
10791
+ attr_accessor :name
10792
+ # The namespace to make requests within
10793
+ attr_accessor :namespace
10794
+ # The URL of the Vault to target
10795
+ attr_accessor :server_address
10796
+ # Tags is a map of key, value pairs.
10797
+ attr_accessor :tags
10798
+
10799
+ def initialize(
10800
+ id: nil,
10801
+ name: nil,
10802
+ namespace: nil,
10803
+ server_address: nil,
10804
+ tags: nil
10805
+ )
10806
+ @id = id == nil ? "" : id
10807
+ @name = name == nil ? "" : name
10808
+ @namespace = namespace == nil ? "" : namespace
10809
+ @server_address = server_address == nil ? "" : server_address
10810
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
10811
+ end
10812
+
10813
+ def to_json(options = {})
10814
+ hash = {}
10815
+ self.instance_variables.each do |var|
10816
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
10817
+ end
10818
+ hash.to_json
10819
+ end
10820
+ end
10821
+
10685
10822
  class VaultAppRoleCertSSHStore
10686
10823
  # Unique identifier of the SecretStore.
10687
10824
  attr_accessor :id
data/lib/strongdm.rb CHANGED
@@ -29,7 +29,7 @@ module SDM #:nodoc:
29
29
  DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
30
30
  DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
31
31
  API_VERSION = "2024-03-28"
32
- USER_AGENT = "strongdm-sdk-ruby/8.1.0"
32
+ USER_AGENT = "strongdm-sdk-ruby/8.4.0"
33
33
  private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
34
34
 
35
35
  # Creates a new strongDM API client.
data/lib/svc.rb CHANGED
@@ -4508,10 +4508,13 @@ module SDM #:nodoc:
4508
4508
  # {DelineaStore}
4509
4509
  # {GCPStore}
4510
4510
  # {GCPCertX509Store}
4511
+ # {KeyfactorSSHStore}
4511
4512
  # {KeyfactorX509Store}
4512
4513
  # {VaultAppRoleStore}
4513
4514
  # {VaultAppRoleCertSSHStore}
4514
4515
  # {VaultAppRoleCertX509Store}
4516
+ # {VaultAWSEC2Store}
4517
+ # {VaultAWSIAMStore}
4515
4518
  # {VaultTLSStore}
4516
4519
  # {VaultTLSCertSSHStore}
4517
4520
  # {VaultTLSCertX509Store}
data/lib/version CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "8.1.0"
16
+ VERSION = "8.4.0"
17
17
  end
data/lib/version.rb CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "8.1.0"
16
+ VERSION = "8.4.0"
17
17
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: strongdm
3
3
  version: !ruby/object:Gem::Version
4
- version: 8.1.0
4
+ version: 8.4.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - strongDM Team
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-04-25 00:00:00.000000000 Z
11
+ date: 2024-05-20 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: grpc
@@ -81,8 +81,8 @@ files:
81
81
  - "./.git/logs/HEAD"
82
82
  - "./.git/logs/refs/heads/master"
83
83
  - "./.git/logs/refs/remotes/origin/HEAD"
84
- - "./.git/objects/pack/pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.idx"
85
- - "./.git/objects/pack/pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.pack"
84
+ - "./.git/objects/pack/pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.idx"
85
+ - "./.git/objects/pack/pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.pack"
86
86
  - "./.git/packed-refs"
87
87
  - "./.git/refs/heads/master"
88
88
  - "./.git/refs/remotes/origin/HEAD"