strongdm 8.1.0 → 8.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.git/ORIG_HEAD +1 -1
- data/.git/index +0 -0
- data/.git/logs/HEAD +3 -3
- data/.git/logs/refs/heads/master +2 -2
- data/.git/logs/refs/remotes/origin/HEAD +1 -1
- data/.git/objects/pack/{pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.idx → pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.idx} +0 -0
- data/.git/objects/pack/{pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.pack → pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.pack} +0 -0
- data/.git/packed-refs +4 -2
- data/.git/refs/heads/master +1 -1
- data/lib/constants.rb +1 -0
- data/lib/grpc/plumbing.rb +158 -2
- data/lib/grpc/secret_store_types_pb.rb +34 -1
- data/lib/models/porcelain.rb +141 -4
- data/lib/strongdm.rb +1 -1
- data/lib/svc.rb +3 -0
- data/lib/version +1 -1
- data/lib/version.rb +1 -1
- metadata +4 -4
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 0db6a67f3dc8f6fb4d1f96d31ed4ec252dcafa3f242652ec98add77f1dc4fce0
|
|
4
|
+
data.tar.gz: eabcaa44c11f5fc550bc8b56d94792ffcba24db02ef05b3c74f8407e50d16b6e
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: bea0d51be418fcf78661d02d78f3771e3b25a88047d6f01ed4c5835e5c996d7d4e0389e760c6dc9eb1490efcd770d89ab82c115199ce15debd012bddfa398c68
|
|
7
|
+
data.tar.gz: 311b96003c3e033690af8354471146298507390a889f6a3ee3767782c8060a62d71759b5304873a4e8d07f8881db06dd945f1325d64c360c17a675092019fdb9
|
data/.git/ORIG_HEAD
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667
|
data/.git/index
CHANGED
|
Binary file
|
data/.git/logs/HEAD
CHANGED
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
2
|
-
|
|
3
|
-
|
|
1
|
+
0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
2
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 checkout: moving from master to master
|
|
3
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 6ca94f88b799db10fe2a0867b5b53718a0289d0a root <root@8f370e732ffa.(none)> 1716241926 +0000 merge origin/development: Fast-forward
|
data/.git/logs/refs/heads/master
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
2
|
-
|
|
1
|
+
0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
2
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 6ca94f88b799db10fe2a0867b5b53718a0289d0a root <root@8f370e732ffa.(none)> 1716241926 +0000 merge origin/development: Fast-forward
|
|
@@ -1 +1 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
1
|
+
0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
Binary file
|
|
Binary file
|
data/.git/packed-refs
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
# pack-refs with: peeled fully-peeled sorted
|
|
2
|
-
|
|
3
|
-
|
|
2
|
+
6ca94f88b799db10fe2a0867b5b53718a0289d0a refs/remotes/origin/development
|
|
3
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 refs/remotes/origin/master
|
|
4
4
|
2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
|
|
5
5
|
04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
|
|
6
6
|
6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
|
|
@@ -105,3 +105,5 @@ d8a1092c15d3618de31ada43875014d96bd21e36 refs/tags/v6.9.0
|
|
|
105
105
|
c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/tags/v7.0.0
|
|
106
106
|
f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/tags/v7.1.0
|
|
107
107
|
7659a644ef149debee2515386136b7e2d5e917ea refs/tags/v8.0.0
|
|
108
|
+
14ef2b24960a5e854b60586884494ed913221b5b refs/tags/v8.1.0
|
|
109
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 refs/tags/v8.3.0
|
data/.git/refs/heads/master
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
6ca94f88b799db10fe2a0867b5b53718a0289d0a
|
data/lib/constants.rb
CHANGED
data/lib/grpc/plumbing.rb
CHANGED
|
@@ -5416,6 +5416,62 @@ module SDM
|
|
|
5416
5416
|
end
|
|
5417
5417
|
items
|
|
5418
5418
|
end
|
|
5419
|
+
def self.convert_keyfactor_ssh_store_to_porcelain(plumbing)
|
|
5420
|
+
if plumbing == nil
|
|
5421
|
+
return nil
|
|
5422
|
+
end
|
|
5423
|
+
porcelain = KeyfactorSSHStore.new()
|
|
5424
|
+
porcelain.ca_file_path = (plumbing.ca_file_path)
|
|
5425
|
+
porcelain.certificate_file_path = (plumbing.certificate_file_path)
|
|
5426
|
+
porcelain.default_certificate_authority_name = (plumbing.default_certificate_authority_name)
|
|
5427
|
+
porcelain.default_certificate_profile_name = (plumbing.default_certificate_profile_name)
|
|
5428
|
+
porcelain.default_end_entity_profile_name = (plumbing.default_end_entity_profile_name)
|
|
5429
|
+
porcelain.enrollment_code_env_var = (plumbing.enrollment_code_env_var)
|
|
5430
|
+
porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
|
|
5431
|
+
porcelain.id = (plumbing.id)
|
|
5432
|
+
porcelain.key_file_path = (plumbing.key_file_path)
|
|
5433
|
+
porcelain.name = (plumbing.name)
|
|
5434
|
+
porcelain.server_address = (plumbing.server_address)
|
|
5435
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
5436
|
+
porcelain
|
|
5437
|
+
end
|
|
5438
|
+
|
|
5439
|
+
def self.convert_keyfactor_ssh_store_to_plumbing(porcelain)
|
|
5440
|
+
if porcelain == nil
|
|
5441
|
+
return nil
|
|
5442
|
+
end
|
|
5443
|
+
plumbing = V1::KeyfactorSSHStore.new()
|
|
5444
|
+
plumbing.ca_file_path = (porcelain.ca_file_path)
|
|
5445
|
+
plumbing.certificate_file_path = (porcelain.certificate_file_path)
|
|
5446
|
+
plumbing.default_certificate_authority_name = (porcelain.default_certificate_authority_name)
|
|
5447
|
+
plumbing.default_certificate_profile_name = (porcelain.default_certificate_profile_name)
|
|
5448
|
+
plumbing.default_end_entity_profile_name = (porcelain.default_end_entity_profile_name)
|
|
5449
|
+
plumbing.enrollment_code_env_var = (porcelain.enrollment_code_env_var)
|
|
5450
|
+
plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
|
|
5451
|
+
plumbing.id = (porcelain.id)
|
|
5452
|
+
plumbing.key_file_path = (porcelain.key_file_path)
|
|
5453
|
+
plumbing.name = (porcelain.name)
|
|
5454
|
+
plumbing.server_address = (porcelain.server_address)
|
|
5455
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
5456
|
+
plumbing
|
|
5457
|
+
end
|
|
5458
|
+
def self.convert_repeated_keyfactor_ssh_store_to_plumbing(porcelains)
|
|
5459
|
+
items = Array.new
|
|
5460
|
+
porcelains.each do |porcelain|
|
|
5461
|
+
plumbing = convert_keyfactor_ssh_store_to_plumbing(porcelain)
|
|
5462
|
+
items.append(plumbing)
|
|
5463
|
+
end
|
|
5464
|
+
items
|
|
5465
|
+
end
|
|
5466
|
+
|
|
5467
|
+
def self.convert_repeated_keyfactor_ssh_store_to_porcelain(plumbings)
|
|
5468
|
+
items = Array.new
|
|
5469
|
+
plumbings.each do |plumbing|
|
|
5470
|
+
porcelain = convert_keyfactor_ssh_store_to_porcelain(plumbing)
|
|
5471
|
+
items.append(porcelain)
|
|
5472
|
+
end
|
|
5473
|
+
items
|
|
5474
|
+
end
|
|
5419
5475
|
def self.convert_keyfactor_x_509_store_to_porcelain(plumbing)
|
|
5420
5476
|
if plumbing == nil
|
|
5421
5477
|
return nil
|
|
@@ -5430,7 +5486,6 @@ module SDM
|
|
|
5430
5486
|
porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
|
|
5431
5487
|
porcelain.id = (plumbing.id)
|
|
5432
5488
|
porcelain.key_file_path = (plumbing.key_file_path)
|
|
5433
|
-
porcelain.key_password_env_var = (plumbing.key_password_env_var)
|
|
5434
5489
|
porcelain.name = (plumbing.name)
|
|
5435
5490
|
porcelain.server_address = (plumbing.server_address)
|
|
5436
5491
|
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
@@ -5451,7 +5506,6 @@ module SDM
|
|
|
5451
5506
|
plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
|
|
5452
5507
|
plumbing.id = (porcelain.id)
|
|
5453
5508
|
plumbing.key_file_path = (porcelain.key_file_path)
|
|
5454
|
-
plumbing.key_password_env_var = (porcelain.key_password_env_var)
|
|
5455
5509
|
plumbing.name = (porcelain.name)
|
|
5456
5510
|
plumbing.server_address = (porcelain.server_address)
|
|
5457
5511
|
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
@@ -10431,6 +10485,9 @@ module SDM
|
|
|
10431
10485
|
if porcelain.instance_of? GCPCertX509Store
|
|
10432
10486
|
plumbing.gcp_cert_x_509 = convert_gcp_cert_x_509_store_to_plumbing(porcelain)
|
|
10433
10487
|
end
|
|
10488
|
+
if porcelain.instance_of? KeyfactorSSHStore
|
|
10489
|
+
plumbing.keyfactor_ssh = convert_keyfactor_ssh_store_to_plumbing(porcelain)
|
|
10490
|
+
end
|
|
10434
10491
|
if porcelain.instance_of? KeyfactorX509Store
|
|
10435
10492
|
plumbing.keyfactor_x_509 = convert_keyfactor_x_509_store_to_plumbing(porcelain)
|
|
10436
10493
|
end
|
|
@@ -10443,6 +10500,12 @@ module SDM
|
|
|
10443
10500
|
if porcelain.instance_of? VaultAppRoleCertX509Store
|
|
10444
10501
|
plumbing.vault_app_role_cert_x_509 = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
|
|
10445
10502
|
end
|
|
10503
|
+
if porcelain.instance_of? VaultAWSEC2Store
|
|
10504
|
+
plumbing.vault_awsec_2 = convert_vault_awsec_2_store_to_plumbing(porcelain)
|
|
10505
|
+
end
|
|
10506
|
+
if porcelain.instance_of? VaultAWSIAMStore
|
|
10507
|
+
plumbing.vault_awsiam = convert_vault_awsiam_store_to_plumbing(porcelain)
|
|
10508
|
+
end
|
|
10446
10509
|
if porcelain.instance_of? VaultTLSStore
|
|
10447
10510
|
plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
|
|
10448
10511
|
end
|
|
@@ -10498,6 +10561,9 @@ module SDM
|
|
|
10498
10561
|
if plumbing.gcp_cert_x_509 != nil
|
|
10499
10562
|
return convert_gcp_cert_x_509_store_to_porcelain(plumbing.gcp_cert_x_509)
|
|
10500
10563
|
end
|
|
10564
|
+
if plumbing.keyfactor_ssh != nil
|
|
10565
|
+
return convert_keyfactor_ssh_store_to_porcelain(plumbing.keyfactor_ssh)
|
|
10566
|
+
end
|
|
10501
10567
|
if plumbing.keyfactor_x_509 != nil
|
|
10502
10568
|
return convert_keyfactor_x_509_store_to_porcelain(plumbing.keyfactor_x_509)
|
|
10503
10569
|
end
|
|
@@ -10510,6 +10576,12 @@ module SDM
|
|
|
10510
10576
|
if plumbing.vault_app_role_cert_x_509 != nil
|
|
10511
10577
|
return convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing.vault_app_role_cert_x_509)
|
|
10512
10578
|
end
|
|
10579
|
+
if plumbing.vault_awsec_2 != nil
|
|
10580
|
+
return convert_vault_awsec_2_store_to_porcelain(plumbing.vault_awsec_2)
|
|
10581
|
+
end
|
|
10582
|
+
if plumbing.vault_awsiam != nil
|
|
10583
|
+
return convert_vault_awsiam_store_to_porcelain(plumbing.vault_awsiam)
|
|
10584
|
+
end
|
|
10513
10585
|
if plumbing.vault_tls != nil
|
|
10514
10586
|
return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
|
|
10515
10587
|
end
|
|
@@ -11473,6 +11545,90 @@ module SDM
|
|
|
11473
11545
|
end
|
|
11474
11546
|
items
|
|
11475
11547
|
end
|
|
11548
|
+
def self.convert_vault_awsec_2_store_to_porcelain(plumbing)
|
|
11549
|
+
if plumbing == nil
|
|
11550
|
+
return nil
|
|
11551
|
+
end
|
|
11552
|
+
porcelain = VaultAWSEC2Store.new()
|
|
11553
|
+
porcelain.id = (plumbing.id)
|
|
11554
|
+
porcelain.name = (plumbing.name)
|
|
11555
|
+
porcelain.namespace = (plumbing.namespace)
|
|
11556
|
+
porcelain.server_address = (plumbing.server_address)
|
|
11557
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
11558
|
+
porcelain
|
|
11559
|
+
end
|
|
11560
|
+
|
|
11561
|
+
def self.convert_vault_awsec_2_store_to_plumbing(porcelain)
|
|
11562
|
+
if porcelain == nil
|
|
11563
|
+
return nil
|
|
11564
|
+
end
|
|
11565
|
+
plumbing = V1::VaultAWSEC2Store.new()
|
|
11566
|
+
plumbing.id = (porcelain.id)
|
|
11567
|
+
plumbing.name = (porcelain.name)
|
|
11568
|
+
plumbing.namespace = (porcelain.namespace)
|
|
11569
|
+
plumbing.server_address = (porcelain.server_address)
|
|
11570
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
11571
|
+
plumbing
|
|
11572
|
+
end
|
|
11573
|
+
def self.convert_repeated_vault_awsec_2_store_to_plumbing(porcelains)
|
|
11574
|
+
items = Array.new
|
|
11575
|
+
porcelains.each do |porcelain|
|
|
11576
|
+
plumbing = convert_vault_awsec_2_store_to_plumbing(porcelain)
|
|
11577
|
+
items.append(plumbing)
|
|
11578
|
+
end
|
|
11579
|
+
items
|
|
11580
|
+
end
|
|
11581
|
+
|
|
11582
|
+
def self.convert_repeated_vault_awsec_2_store_to_porcelain(plumbings)
|
|
11583
|
+
items = Array.new
|
|
11584
|
+
plumbings.each do |plumbing|
|
|
11585
|
+
porcelain = convert_vault_awsec_2_store_to_porcelain(plumbing)
|
|
11586
|
+
items.append(porcelain)
|
|
11587
|
+
end
|
|
11588
|
+
items
|
|
11589
|
+
end
|
|
11590
|
+
def self.convert_vault_awsiam_store_to_porcelain(plumbing)
|
|
11591
|
+
if plumbing == nil
|
|
11592
|
+
return nil
|
|
11593
|
+
end
|
|
11594
|
+
porcelain = VaultAWSIAMStore.new()
|
|
11595
|
+
porcelain.id = (plumbing.id)
|
|
11596
|
+
porcelain.name = (plumbing.name)
|
|
11597
|
+
porcelain.namespace = (plumbing.namespace)
|
|
11598
|
+
porcelain.server_address = (plumbing.server_address)
|
|
11599
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
11600
|
+
porcelain
|
|
11601
|
+
end
|
|
11602
|
+
|
|
11603
|
+
def self.convert_vault_awsiam_store_to_plumbing(porcelain)
|
|
11604
|
+
if porcelain == nil
|
|
11605
|
+
return nil
|
|
11606
|
+
end
|
|
11607
|
+
plumbing = V1::VaultAWSIAMStore.new()
|
|
11608
|
+
plumbing.id = (porcelain.id)
|
|
11609
|
+
plumbing.name = (porcelain.name)
|
|
11610
|
+
plumbing.namespace = (porcelain.namespace)
|
|
11611
|
+
plumbing.server_address = (porcelain.server_address)
|
|
11612
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
11613
|
+
plumbing
|
|
11614
|
+
end
|
|
11615
|
+
def self.convert_repeated_vault_awsiam_store_to_plumbing(porcelains)
|
|
11616
|
+
items = Array.new
|
|
11617
|
+
porcelains.each do |porcelain|
|
|
11618
|
+
plumbing = convert_vault_awsiam_store_to_plumbing(porcelain)
|
|
11619
|
+
items.append(plumbing)
|
|
11620
|
+
end
|
|
11621
|
+
items
|
|
11622
|
+
end
|
|
11623
|
+
|
|
11624
|
+
def self.convert_repeated_vault_awsiam_store_to_porcelain(plumbings)
|
|
11625
|
+
items = Array.new
|
|
11626
|
+
plumbings.each do |plumbing|
|
|
11627
|
+
porcelain = convert_vault_awsiam_store_to_porcelain(plumbing)
|
|
11628
|
+
items.append(porcelain)
|
|
11629
|
+
end
|
|
11630
|
+
items
|
|
11631
|
+
end
|
|
11476
11632
|
def self.convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
|
|
11477
11633
|
if plumbing == nil
|
|
11478
11634
|
return nil
|
|
@@ -34,7 +34,10 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
34
34
|
optional :delinea, :message, 2900, "v1.DelineaStore"
|
|
35
35
|
optional :gcp, :message, 201, "v1.GCPStore"
|
|
36
36
|
optional :gcp_cert_x_509, :message, 202, "v1.GCPCertX509Store"
|
|
37
|
+
optional :keyfactor_ssh, :message, 210, "v1.KeyfactorSSHStore"
|
|
37
38
|
optional :keyfactor_x_509, :message, 200, "v1.KeyfactorX509Store"
|
|
39
|
+
optional :vault_awsec_2, :message, 97, "v1.VaultAWSEC2Store"
|
|
40
|
+
optional :vault_awsiam, :message, 96, "v1.VaultAWSIAMStore"
|
|
38
41
|
optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
|
|
39
42
|
optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
|
|
40
43
|
optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
|
|
@@ -115,6 +118,20 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
115
118
|
optional :projectID, :string, 3
|
|
116
119
|
optional :tags, :message, 32771, "v1.Tags"
|
|
117
120
|
end
|
|
121
|
+
add_message "v1.KeyfactorSSHStore" do
|
|
122
|
+
optional :id, :string, 1
|
|
123
|
+
optional :name, :string, 2
|
|
124
|
+
optional :ca_file_path, :string, 6
|
|
125
|
+
optional :certificate_file_path, :string, 4
|
|
126
|
+
optional :default_certificate_authority_name, :string, 10
|
|
127
|
+
optional :default_certificate_profile_name, :string, 8
|
|
128
|
+
optional :default_end_entity_profile_name, :string, 9
|
|
129
|
+
optional :enrollment_code_env_var, :string, 12
|
|
130
|
+
optional :enrollment_username_env_var, :string, 11
|
|
131
|
+
optional :key_file_path, :string, 5
|
|
132
|
+
optional :server_address, :string, 3
|
|
133
|
+
optional :tags, :message, 32771, "v1.Tags"
|
|
134
|
+
end
|
|
118
135
|
add_message "v1.KeyfactorX509Store" do
|
|
119
136
|
optional :id, :string, 1
|
|
120
137
|
optional :name, :string, 2
|
|
@@ -126,10 +143,23 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
126
143
|
optional :enrollment_code_env_var, :string, 12
|
|
127
144
|
optional :enrollment_username_env_var, :string, 11
|
|
128
145
|
optional :key_file_path, :string, 5
|
|
129
|
-
optional :key_password_env_var, :string, 7
|
|
130
146
|
optional :server_address, :string, 3
|
|
131
147
|
optional :tags, :message, 32771, "v1.Tags"
|
|
132
148
|
end
|
|
149
|
+
add_message "v1.VaultAWSEC2Store" do
|
|
150
|
+
optional :id, :string, 1
|
|
151
|
+
optional :name, :string, 2
|
|
152
|
+
optional :namespace, :string, 5
|
|
153
|
+
optional :server_address, :string, 3
|
|
154
|
+
optional :tags, :message, 8, "v1.Tags"
|
|
155
|
+
end
|
|
156
|
+
add_message "v1.VaultAWSIAMStore" do
|
|
157
|
+
optional :id, :string, 1
|
|
158
|
+
optional :name, :string, 2
|
|
159
|
+
optional :namespace, :string, 5
|
|
160
|
+
optional :server_address, :string, 3
|
|
161
|
+
optional :tags, :message, 8, "v1.Tags"
|
|
162
|
+
end
|
|
133
163
|
add_message "v1.VaultAppRoleStore" do
|
|
134
164
|
optional :id, :string, 1
|
|
135
165
|
optional :name, :string, 2
|
|
@@ -235,7 +265,10 @@ module V1
|
|
|
235
265
|
DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
|
|
236
266
|
GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
|
|
237
267
|
GCPCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPCertX509Store").msgclass
|
|
268
|
+
KeyfactorSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorSSHStore").msgclass
|
|
238
269
|
KeyfactorX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorX509Store").msgclass
|
|
270
|
+
VaultAWSEC2Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2Store").msgclass
|
|
271
|
+
VaultAWSIAMStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMStore").msgclass
|
|
239
272
|
VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
|
|
240
273
|
VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
|
|
241
274
|
VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
|
data/lib/models/porcelain.rb
CHANGED
|
@@ -5253,6 +5253,75 @@ module SDM
|
|
|
5253
5253
|
end
|
|
5254
5254
|
end
|
|
5255
5255
|
|
|
5256
|
+
class KeyfactorSSHStore
|
|
5257
|
+
# Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
|
5258
|
+
# This is not required if the CA is trusted by the host operating system. This should be a PEM
|
|
5259
|
+
# formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
|
|
5260
|
+
attr_accessor :ca_file_path
|
|
5261
|
+
# Path to client certificate in PEM format. This certificate must contain a client certificate that
|
|
5262
|
+
# is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
|
|
5263
|
+
# key associated with the certificate, but KeyFile can also be set to configure the private key.
|
|
5264
|
+
attr_accessor :certificate_file_path
|
|
5265
|
+
# Name of EJBCA certificate authority that will enroll CSR.
|
|
5266
|
+
attr_accessor :default_certificate_authority_name
|
|
5267
|
+
# Certificate profile name that EJBCA will enroll the CSR with.
|
|
5268
|
+
attr_accessor :default_certificate_profile_name
|
|
5269
|
+
# End entity profile that EJBCA will enroll the CSR with.
|
|
5270
|
+
attr_accessor :default_end_entity_profile_name
|
|
5271
|
+
# code used by EJBCA during enrollment. May be left blank if no code is required.
|
|
5272
|
+
attr_accessor :enrollment_code_env_var
|
|
5273
|
+
# username that used by the EJBCA during enrollment. This can be left out.
|
|
5274
|
+
# If so, the username must be auto-generated on the Keyfactor side.
|
|
5275
|
+
attr_accessor :enrollment_username_env_var
|
|
5276
|
+
# Unique identifier of the SecretStore.
|
|
5277
|
+
attr_accessor :id
|
|
5278
|
+
# Path to private key in PEM format. This file should contain the private key associated with the
|
|
5279
|
+
# client certificate configured in CertificateFile.
|
|
5280
|
+
attr_accessor :key_file_path
|
|
5281
|
+
# Unique human-readable name of the SecretStore.
|
|
5282
|
+
attr_accessor :name
|
|
5283
|
+
# the host of the Key Factor CA
|
|
5284
|
+
attr_accessor :server_address
|
|
5285
|
+
# Tags is a map of key, value pairs.
|
|
5286
|
+
attr_accessor :tags
|
|
5287
|
+
|
|
5288
|
+
def initialize(
|
|
5289
|
+
ca_file_path: nil,
|
|
5290
|
+
certificate_file_path: nil,
|
|
5291
|
+
default_certificate_authority_name: nil,
|
|
5292
|
+
default_certificate_profile_name: nil,
|
|
5293
|
+
default_end_entity_profile_name: nil,
|
|
5294
|
+
enrollment_code_env_var: nil,
|
|
5295
|
+
enrollment_username_env_var: nil,
|
|
5296
|
+
id: nil,
|
|
5297
|
+
key_file_path: nil,
|
|
5298
|
+
name: nil,
|
|
5299
|
+
server_address: nil,
|
|
5300
|
+
tags: nil
|
|
5301
|
+
)
|
|
5302
|
+
@ca_file_path = ca_file_path == nil ? "" : ca_file_path
|
|
5303
|
+
@certificate_file_path = certificate_file_path == nil ? "" : certificate_file_path
|
|
5304
|
+
@default_certificate_authority_name = default_certificate_authority_name == nil ? "" : default_certificate_authority_name
|
|
5305
|
+
@default_certificate_profile_name = default_certificate_profile_name == nil ? "" : default_certificate_profile_name
|
|
5306
|
+
@default_end_entity_profile_name = default_end_entity_profile_name == nil ? "" : default_end_entity_profile_name
|
|
5307
|
+
@enrollment_code_env_var = enrollment_code_env_var == nil ? "" : enrollment_code_env_var
|
|
5308
|
+
@enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
|
|
5309
|
+
@id = id == nil ? "" : id
|
|
5310
|
+
@key_file_path = key_file_path == nil ? "" : key_file_path
|
|
5311
|
+
@name = name == nil ? "" : name
|
|
5312
|
+
@server_address = server_address == nil ? "" : server_address
|
|
5313
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
5314
|
+
end
|
|
5315
|
+
|
|
5316
|
+
def to_json(options = {})
|
|
5317
|
+
hash = {}
|
|
5318
|
+
self.instance_variables.each do |var|
|
|
5319
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
5320
|
+
end
|
|
5321
|
+
hash.to_json
|
|
5322
|
+
end
|
|
5323
|
+
end
|
|
5324
|
+
|
|
5256
5325
|
class KeyfactorX509Store
|
|
5257
5326
|
# Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
|
5258
5327
|
# This is not required if the CA is trusted by the host operating system. This should be a PEM
|
|
@@ -5278,8 +5347,6 @@ module SDM
|
|
|
5278
5347
|
# Path to private key in PEM format. This file should contain the private key associated with the
|
|
5279
5348
|
# client certificate configured in CertificateFile.
|
|
5280
5349
|
attr_accessor :key_file_path
|
|
5281
|
-
# optional environment variable housing the password that is used to decrypt the key file.
|
|
5282
|
-
attr_accessor :key_password_env_var
|
|
5283
5350
|
# Unique human-readable name of the SecretStore.
|
|
5284
5351
|
attr_accessor :name
|
|
5285
5352
|
# the host of the Key Factor CA
|
|
@@ -5297,7 +5364,6 @@ module SDM
|
|
|
5297
5364
|
enrollment_username_env_var: nil,
|
|
5298
5365
|
id: nil,
|
|
5299
5366
|
key_file_path: nil,
|
|
5300
|
-
key_password_env_var: nil,
|
|
5301
5367
|
name: nil,
|
|
5302
5368
|
server_address: nil,
|
|
5303
5369
|
tags: nil
|
|
@@ -5311,7 +5377,6 @@ module SDM
|
|
|
5311
5377
|
@enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
|
|
5312
5378
|
@id = id == nil ? "" : id
|
|
5313
5379
|
@key_file_path = key_file_path == nil ? "" : key_file_path
|
|
5314
|
-
@key_password_env_var = key_password_env_var == nil ? "" : key_password_env_var
|
|
5315
5380
|
@name = name == nil ? "" : name
|
|
5316
5381
|
@server_address = server_address == nil ? "" : server_address
|
|
5317
5382
|
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
@@ -10682,6 +10747,78 @@ module SDM
|
|
|
10682
10747
|
end
|
|
10683
10748
|
end
|
|
10684
10749
|
|
|
10750
|
+
# VaultAWSEC2Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
10751
|
+
class VaultAWSEC2Store
|
|
10752
|
+
# Unique identifier of the SecretStore.
|
|
10753
|
+
attr_accessor :id
|
|
10754
|
+
# Unique human-readable name of the SecretStore.
|
|
10755
|
+
attr_accessor :name
|
|
10756
|
+
# The namespace to make requests within
|
|
10757
|
+
attr_accessor :namespace
|
|
10758
|
+
# The URL of the Vault to target
|
|
10759
|
+
attr_accessor :server_address
|
|
10760
|
+
# Tags is a map of key, value pairs.
|
|
10761
|
+
attr_accessor :tags
|
|
10762
|
+
|
|
10763
|
+
def initialize(
|
|
10764
|
+
id: nil,
|
|
10765
|
+
name: nil,
|
|
10766
|
+
namespace: nil,
|
|
10767
|
+
server_address: nil,
|
|
10768
|
+
tags: nil
|
|
10769
|
+
)
|
|
10770
|
+
@id = id == nil ? "" : id
|
|
10771
|
+
@name = name == nil ? "" : name
|
|
10772
|
+
@namespace = namespace == nil ? "" : namespace
|
|
10773
|
+
@server_address = server_address == nil ? "" : server_address
|
|
10774
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
10775
|
+
end
|
|
10776
|
+
|
|
10777
|
+
def to_json(options = {})
|
|
10778
|
+
hash = {}
|
|
10779
|
+
self.instance_variables.each do |var|
|
|
10780
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
10781
|
+
end
|
|
10782
|
+
hash.to_json
|
|
10783
|
+
end
|
|
10784
|
+
end
|
|
10785
|
+
|
|
10786
|
+
# VaultAWSIAMStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
|
10787
|
+
class VaultAWSIAMStore
|
|
10788
|
+
# Unique identifier of the SecretStore.
|
|
10789
|
+
attr_accessor :id
|
|
10790
|
+
# Unique human-readable name of the SecretStore.
|
|
10791
|
+
attr_accessor :name
|
|
10792
|
+
# The namespace to make requests within
|
|
10793
|
+
attr_accessor :namespace
|
|
10794
|
+
# The URL of the Vault to target
|
|
10795
|
+
attr_accessor :server_address
|
|
10796
|
+
# Tags is a map of key, value pairs.
|
|
10797
|
+
attr_accessor :tags
|
|
10798
|
+
|
|
10799
|
+
def initialize(
|
|
10800
|
+
id: nil,
|
|
10801
|
+
name: nil,
|
|
10802
|
+
namespace: nil,
|
|
10803
|
+
server_address: nil,
|
|
10804
|
+
tags: nil
|
|
10805
|
+
)
|
|
10806
|
+
@id = id == nil ? "" : id
|
|
10807
|
+
@name = name == nil ? "" : name
|
|
10808
|
+
@namespace = namespace == nil ? "" : namespace
|
|
10809
|
+
@server_address = server_address == nil ? "" : server_address
|
|
10810
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
10811
|
+
end
|
|
10812
|
+
|
|
10813
|
+
def to_json(options = {})
|
|
10814
|
+
hash = {}
|
|
10815
|
+
self.instance_variables.each do |var|
|
|
10816
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
10817
|
+
end
|
|
10818
|
+
hash.to_json
|
|
10819
|
+
end
|
|
10820
|
+
end
|
|
10821
|
+
|
|
10685
10822
|
class VaultAppRoleCertSSHStore
|
|
10686
10823
|
# Unique identifier of the SecretStore.
|
|
10687
10824
|
attr_accessor :id
|
data/lib/strongdm.rb
CHANGED
|
@@ -29,7 +29,7 @@ module SDM #:nodoc:
|
|
|
29
29
|
DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
|
|
30
30
|
DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
|
|
31
31
|
API_VERSION = "2024-03-28"
|
|
32
|
-
USER_AGENT = "strongdm-sdk-ruby/8.
|
|
32
|
+
USER_AGENT = "strongdm-sdk-ruby/8.4.0"
|
|
33
33
|
private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
|
|
34
34
|
|
|
35
35
|
# Creates a new strongDM API client.
|
data/lib/svc.rb
CHANGED
|
@@ -4508,10 +4508,13 @@ module SDM #:nodoc:
|
|
|
4508
4508
|
# {DelineaStore}
|
|
4509
4509
|
# {GCPStore}
|
|
4510
4510
|
# {GCPCertX509Store}
|
|
4511
|
+
# {KeyfactorSSHStore}
|
|
4511
4512
|
# {KeyfactorX509Store}
|
|
4512
4513
|
# {VaultAppRoleStore}
|
|
4513
4514
|
# {VaultAppRoleCertSSHStore}
|
|
4514
4515
|
# {VaultAppRoleCertX509Store}
|
|
4516
|
+
# {VaultAWSEC2Store}
|
|
4517
|
+
# {VaultAWSIAMStore}
|
|
4515
4518
|
# {VaultTLSStore}
|
|
4516
4519
|
# {VaultTLSCertSSHStore}
|
|
4517
4520
|
# {VaultTLSCertX509Store}
|
data/lib/version
CHANGED
data/lib/version.rb
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: strongdm
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 8.
|
|
4
|
+
version: 8.4.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- strongDM Team
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2024-
|
|
11
|
+
date: 2024-05-20 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: grpc
|
|
@@ -81,8 +81,8 @@ files:
|
|
|
81
81
|
- "./.git/logs/HEAD"
|
|
82
82
|
- "./.git/logs/refs/heads/master"
|
|
83
83
|
- "./.git/logs/refs/remotes/origin/HEAD"
|
|
84
|
-
- "./.git/objects/pack/pack-
|
|
85
|
-
- "./.git/objects/pack/pack-
|
|
84
|
+
- "./.git/objects/pack/pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.idx"
|
|
85
|
+
- "./.git/objects/pack/pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.pack"
|
|
86
86
|
- "./.git/packed-refs"
|
|
87
87
|
- "./.git/refs/heads/master"
|
|
88
88
|
- "./.git/refs/remotes/origin/HEAD"
|