strongdm 8.1.0 → 8.4.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.git/ORIG_HEAD +1 -1
- data/.git/index +0 -0
- data/.git/logs/HEAD +3 -3
- data/.git/logs/refs/heads/master +2 -2
- data/.git/logs/refs/remotes/origin/HEAD +1 -1
- data/.git/objects/pack/{pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.idx → pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.idx} +0 -0
- data/.git/objects/pack/{pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.pack → pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.pack} +0 -0
- data/.git/packed-refs +4 -2
- data/.git/refs/heads/master +1 -1
- data/lib/constants.rb +1 -0
- data/lib/grpc/plumbing.rb +158 -2
- data/lib/grpc/secret_store_types_pb.rb +34 -1
- data/lib/models/porcelain.rb +141 -4
- data/lib/strongdm.rb +1 -1
- data/lib/svc.rb +3 -0
- data/lib/version +1 -1
- data/lib/version.rb +1 -1
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 0db6a67f3dc8f6fb4d1f96d31ed4ec252dcafa3f242652ec98add77f1dc4fce0
|
4
|
+
data.tar.gz: eabcaa44c11f5fc550bc8b56d94792ffcba24db02ef05b3c74f8407e50d16b6e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: bea0d51be418fcf78661d02d78f3771e3b25a88047d6f01ed4c5835e5c996d7d4e0389e760c6dc9eb1490efcd770d89ab82c115199ce15debd012bddfa398c68
|
7
|
+
data.tar.gz: 311b96003c3e033690af8354471146298507390a889f6a3ee3767782c8060a62d71759b5304873a4e8d07f8881db06dd945f1325d64c360c17a675092019fdb9
|
data/.git/ORIG_HEAD
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667
|
data/.git/index
CHANGED
Binary file
|
data/.git/logs/HEAD
CHANGED
@@ -1,3 +1,3 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
2
|
-
|
3
|
-
|
1
|
+
0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
2
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 checkout: moving from master to master
|
3
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 6ca94f88b799db10fe2a0867b5b53718a0289d0a root <root@8f370e732ffa.(none)> 1716241926 +0000 merge origin/development: Fast-forward
|
data/.git/logs/refs/heads/master
CHANGED
@@ -1,2 +1,2 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
2
|
-
|
1
|
+
0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
2
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 6ca94f88b799db10fe2a0867b5b53718a0289d0a root <root@8f370e732ffa.(none)> 1716241926 +0000 merge origin/development: Fast-forward
|
@@ -1 +1 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
1
|
+
0000000000000000000000000000000000000000 98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 root <root@8f370e732ffa.(none)> 1716241926 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
Binary file
|
Binary file
|
data/.git/packed-refs
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
# pack-refs with: peeled fully-peeled sorted
|
2
|
-
|
3
|
-
|
2
|
+
6ca94f88b799db10fe2a0867b5b53718a0289d0a refs/remotes/origin/development
|
3
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 refs/remotes/origin/master
|
4
4
|
2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
|
5
5
|
04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
|
6
6
|
6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
|
@@ -105,3 +105,5 @@ d8a1092c15d3618de31ada43875014d96bd21e36 refs/tags/v6.9.0
|
|
105
105
|
c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/tags/v7.0.0
|
106
106
|
f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/tags/v7.1.0
|
107
107
|
7659a644ef149debee2515386136b7e2d5e917ea refs/tags/v8.0.0
|
108
|
+
14ef2b24960a5e854b60586884494ed913221b5b refs/tags/v8.1.0
|
109
|
+
98b9ee54f8ca2dc8eecd977e22bf3d05ca667667 refs/tags/v8.3.0
|
data/.git/refs/heads/master
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
6ca94f88b799db10fe2a0867b5b53718a0289d0a
|
data/lib/constants.rb
CHANGED
data/lib/grpc/plumbing.rb
CHANGED
@@ -5416,6 +5416,62 @@ module SDM
|
|
5416
5416
|
end
|
5417
5417
|
items
|
5418
5418
|
end
|
5419
|
+
def self.convert_keyfactor_ssh_store_to_porcelain(plumbing)
|
5420
|
+
if plumbing == nil
|
5421
|
+
return nil
|
5422
|
+
end
|
5423
|
+
porcelain = KeyfactorSSHStore.new()
|
5424
|
+
porcelain.ca_file_path = (plumbing.ca_file_path)
|
5425
|
+
porcelain.certificate_file_path = (plumbing.certificate_file_path)
|
5426
|
+
porcelain.default_certificate_authority_name = (plumbing.default_certificate_authority_name)
|
5427
|
+
porcelain.default_certificate_profile_name = (plumbing.default_certificate_profile_name)
|
5428
|
+
porcelain.default_end_entity_profile_name = (plumbing.default_end_entity_profile_name)
|
5429
|
+
porcelain.enrollment_code_env_var = (plumbing.enrollment_code_env_var)
|
5430
|
+
porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
|
5431
|
+
porcelain.id = (plumbing.id)
|
5432
|
+
porcelain.key_file_path = (plumbing.key_file_path)
|
5433
|
+
porcelain.name = (plumbing.name)
|
5434
|
+
porcelain.server_address = (plumbing.server_address)
|
5435
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
5436
|
+
porcelain
|
5437
|
+
end
|
5438
|
+
|
5439
|
+
def self.convert_keyfactor_ssh_store_to_plumbing(porcelain)
|
5440
|
+
if porcelain == nil
|
5441
|
+
return nil
|
5442
|
+
end
|
5443
|
+
plumbing = V1::KeyfactorSSHStore.new()
|
5444
|
+
plumbing.ca_file_path = (porcelain.ca_file_path)
|
5445
|
+
plumbing.certificate_file_path = (porcelain.certificate_file_path)
|
5446
|
+
plumbing.default_certificate_authority_name = (porcelain.default_certificate_authority_name)
|
5447
|
+
plumbing.default_certificate_profile_name = (porcelain.default_certificate_profile_name)
|
5448
|
+
plumbing.default_end_entity_profile_name = (porcelain.default_end_entity_profile_name)
|
5449
|
+
plumbing.enrollment_code_env_var = (porcelain.enrollment_code_env_var)
|
5450
|
+
plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
|
5451
|
+
plumbing.id = (porcelain.id)
|
5452
|
+
plumbing.key_file_path = (porcelain.key_file_path)
|
5453
|
+
plumbing.name = (porcelain.name)
|
5454
|
+
plumbing.server_address = (porcelain.server_address)
|
5455
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
5456
|
+
plumbing
|
5457
|
+
end
|
5458
|
+
def self.convert_repeated_keyfactor_ssh_store_to_plumbing(porcelains)
|
5459
|
+
items = Array.new
|
5460
|
+
porcelains.each do |porcelain|
|
5461
|
+
plumbing = convert_keyfactor_ssh_store_to_plumbing(porcelain)
|
5462
|
+
items.append(plumbing)
|
5463
|
+
end
|
5464
|
+
items
|
5465
|
+
end
|
5466
|
+
|
5467
|
+
def self.convert_repeated_keyfactor_ssh_store_to_porcelain(plumbings)
|
5468
|
+
items = Array.new
|
5469
|
+
plumbings.each do |plumbing|
|
5470
|
+
porcelain = convert_keyfactor_ssh_store_to_porcelain(plumbing)
|
5471
|
+
items.append(porcelain)
|
5472
|
+
end
|
5473
|
+
items
|
5474
|
+
end
|
5419
5475
|
def self.convert_keyfactor_x_509_store_to_porcelain(plumbing)
|
5420
5476
|
if plumbing == nil
|
5421
5477
|
return nil
|
@@ -5430,7 +5486,6 @@ module SDM
|
|
5430
5486
|
porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
|
5431
5487
|
porcelain.id = (plumbing.id)
|
5432
5488
|
porcelain.key_file_path = (plumbing.key_file_path)
|
5433
|
-
porcelain.key_password_env_var = (plumbing.key_password_env_var)
|
5434
5489
|
porcelain.name = (plumbing.name)
|
5435
5490
|
porcelain.server_address = (plumbing.server_address)
|
5436
5491
|
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
@@ -5451,7 +5506,6 @@ module SDM
|
|
5451
5506
|
plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
|
5452
5507
|
plumbing.id = (porcelain.id)
|
5453
5508
|
plumbing.key_file_path = (porcelain.key_file_path)
|
5454
|
-
plumbing.key_password_env_var = (porcelain.key_password_env_var)
|
5455
5509
|
plumbing.name = (porcelain.name)
|
5456
5510
|
plumbing.server_address = (porcelain.server_address)
|
5457
5511
|
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
@@ -10431,6 +10485,9 @@ module SDM
|
|
10431
10485
|
if porcelain.instance_of? GCPCertX509Store
|
10432
10486
|
plumbing.gcp_cert_x_509 = convert_gcp_cert_x_509_store_to_plumbing(porcelain)
|
10433
10487
|
end
|
10488
|
+
if porcelain.instance_of? KeyfactorSSHStore
|
10489
|
+
plumbing.keyfactor_ssh = convert_keyfactor_ssh_store_to_plumbing(porcelain)
|
10490
|
+
end
|
10434
10491
|
if porcelain.instance_of? KeyfactorX509Store
|
10435
10492
|
plumbing.keyfactor_x_509 = convert_keyfactor_x_509_store_to_plumbing(porcelain)
|
10436
10493
|
end
|
@@ -10443,6 +10500,12 @@ module SDM
|
|
10443
10500
|
if porcelain.instance_of? VaultAppRoleCertX509Store
|
10444
10501
|
plumbing.vault_app_role_cert_x_509 = convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain)
|
10445
10502
|
end
|
10503
|
+
if porcelain.instance_of? VaultAWSEC2Store
|
10504
|
+
plumbing.vault_awsec_2 = convert_vault_awsec_2_store_to_plumbing(porcelain)
|
10505
|
+
end
|
10506
|
+
if porcelain.instance_of? VaultAWSIAMStore
|
10507
|
+
plumbing.vault_awsiam = convert_vault_awsiam_store_to_plumbing(porcelain)
|
10508
|
+
end
|
10446
10509
|
if porcelain.instance_of? VaultTLSStore
|
10447
10510
|
plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
|
10448
10511
|
end
|
@@ -10498,6 +10561,9 @@ module SDM
|
|
10498
10561
|
if plumbing.gcp_cert_x_509 != nil
|
10499
10562
|
return convert_gcp_cert_x_509_store_to_porcelain(plumbing.gcp_cert_x_509)
|
10500
10563
|
end
|
10564
|
+
if plumbing.keyfactor_ssh != nil
|
10565
|
+
return convert_keyfactor_ssh_store_to_porcelain(plumbing.keyfactor_ssh)
|
10566
|
+
end
|
10501
10567
|
if plumbing.keyfactor_x_509 != nil
|
10502
10568
|
return convert_keyfactor_x_509_store_to_porcelain(plumbing.keyfactor_x_509)
|
10503
10569
|
end
|
@@ -10510,6 +10576,12 @@ module SDM
|
|
10510
10576
|
if plumbing.vault_app_role_cert_x_509 != nil
|
10511
10577
|
return convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing.vault_app_role_cert_x_509)
|
10512
10578
|
end
|
10579
|
+
if plumbing.vault_awsec_2 != nil
|
10580
|
+
return convert_vault_awsec_2_store_to_porcelain(plumbing.vault_awsec_2)
|
10581
|
+
end
|
10582
|
+
if plumbing.vault_awsiam != nil
|
10583
|
+
return convert_vault_awsiam_store_to_porcelain(plumbing.vault_awsiam)
|
10584
|
+
end
|
10513
10585
|
if plumbing.vault_tls != nil
|
10514
10586
|
return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
|
10515
10587
|
end
|
@@ -11473,6 +11545,90 @@ module SDM
|
|
11473
11545
|
end
|
11474
11546
|
items
|
11475
11547
|
end
|
11548
|
+
def self.convert_vault_awsec_2_store_to_porcelain(plumbing)
|
11549
|
+
if plumbing == nil
|
11550
|
+
return nil
|
11551
|
+
end
|
11552
|
+
porcelain = VaultAWSEC2Store.new()
|
11553
|
+
porcelain.id = (plumbing.id)
|
11554
|
+
porcelain.name = (plumbing.name)
|
11555
|
+
porcelain.namespace = (plumbing.namespace)
|
11556
|
+
porcelain.server_address = (plumbing.server_address)
|
11557
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
11558
|
+
porcelain
|
11559
|
+
end
|
11560
|
+
|
11561
|
+
def self.convert_vault_awsec_2_store_to_plumbing(porcelain)
|
11562
|
+
if porcelain == nil
|
11563
|
+
return nil
|
11564
|
+
end
|
11565
|
+
plumbing = V1::VaultAWSEC2Store.new()
|
11566
|
+
plumbing.id = (porcelain.id)
|
11567
|
+
plumbing.name = (porcelain.name)
|
11568
|
+
plumbing.namespace = (porcelain.namespace)
|
11569
|
+
plumbing.server_address = (porcelain.server_address)
|
11570
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
11571
|
+
plumbing
|
11572
|
+
end
|
11573
|
+
def self.convert_repeated_vault_awsec_2_store_to_plumbing(porcelains)
|
11574
|
+
items = Array.new
|
11575
|
+
porcelains.each do |porcelain|
|
11576
|
+
plumbing = convert_vault_awsec_2_store_to_plumbing(porcelain)
|
11577
|
+
items.append(plumbing)
|
11578
|
+
end
|
11579
|
+
items
|
11580
|
+
end
|
11581
|
+
|
11582
|
+
def self.convert_repeated_vault_awsec_2_store_to_porcelain(plumbings)
|
11583
|
+
items = Array.new
|
11584
|
+
plumbings.each do |plumbing|
|
11585
|
+
porcelain = convert_vault_awsec_2_store_to_porcelain(plumbing)
|
11586
|
+
items.append(porcelain)
|
11587
|
+
end
|
11588
|
+
items
|
11589
|
+
end
|
11590
|
+
def self.convert_vault_awsiam_store_to_porcelain(plumbing)
|
11591
|
+
if plumbing == nil
|
11592
|
+
return nil
|
11593
|
+
end
|
11594
|
+
porcelain = VaultAWSIAMStore.new()
|
11595
|
+
porcelain.id = (plumbing.id)
|
11596
|
+
porcelain.name = (plumbing.name)
|
11597
|
+
porcelain.namespace = (plumbing.namespace)
|
11598
|
+
porcelain.server_address = (plumbing.server_address)
|
11599
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
11600
|
+
porcelain
|
11601
|
+
end
|
11602
|
+
|
11603
|
+
def self.convert_vault_awsiam_store_to_plumbing(porcelain)
|
11604
|
+
if porcelain == nil
|
11605
|
+
return nil
|
11606
|
+
end
|
11607
|
+
plumbing = V1::VaultAWSIAMStore.new()
|
11608
|
+
plumbing.id = (porcelain.id)
|
11609
|
+
plumbing.name = (porcelain.name)
|
11610
|
+
plumbing.namespace = (porcelain.namespace)
|
11611
|
+
plumbing.server_address = (porcelain.server_address)
|
11612
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
11613
|
+
plumbing
|
11614
|
+
end
|
11615
|
+
def self.convert_repeated_vault_awsiam_store_to_plumbing(porcelains)
|
11616
|
+
items = Array.new
|
11617
|
+
porcelains.each do |porcelain|
|
11618
|
+
plumbing = convert_vault_awsiam_store_to_plumbing(porcelain)
|
11619
|
+
items.append(plumbing)
|
11620
|
+
end
|
11621
|
+
items
|
11622
|
+
end
|
11623
|
+
|
11624
|
+
def self.convert_repeated_vault_awsiam_store_to_porcelain(plumbings)
|
11625
|
+
items = Array.new
|
11626
|
+
plumbings.each do |plumbing|
|
11627
|
+
porcelain = convert_vault_awsiam_store_to_porcelain(plumbing)
|
11628
|
+
items.append(porcelain)
|
11629
|
+
end
|
11630
|
+
items
|
11631
|
+
end
|
11476
11632
|
def self.convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing)
|
11477
11633
|
if plumbing == nil
|
11478
11634
|
return nil
|
@@ -34,7 +34,10 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
34
34
|
optional :delinea, :message, 2900, "v1.DelineaStore"
|
35
35
|
optional :gcp, :message, 201, "v1.GCPStore"
|
36
36
|
optional :gcp_cert_x_509, :message, 202, "v1.GCPCertX509Store"
|
37
|
+
optional :keyfactor_ssh, :message, 210, "v1.KeyfactorSSHStore"
|
37
38
|
optional :keyfactor_x_509, :message, 200, "v1.KeyfactorX509Store"
|
39
|
+
optional :vault_awsec_2, :message, 97, "v1.VaultAWSEC2Store"
|
40
|
+
optional :vault_awsiam, :message, 96, "v1.VaultAWSIAMStore"
|
38
41
|
optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
|
39
42
|
optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
|
40
43
|
optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
|
@@ -115,6 +118,20 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
115
118
|
optional :projectID, :string, 3
|
116
119
|
optional :tags, :message, 32771, "v1.Tags"
|
117
120
|
end
|
121
|
+
add_message "v1.KeyfactorSSHStore" do
|
122
|
+
optional :id, :string, 1
|
123
|
+
optional :name, :string, 2
|
124
|
+
optional :ca_file_path, :string, 6
|
125
|
+
optional :certificate_file_path, :string, 4
|
126
|
+
optional :default_certificate_authority_name, :string, 10
|
127
|
+
optional :default_certificate_profile_name, :string, 8
|
128
|
+
optional :default_end_entity_profile_name, :string, 9
|
129
|
+
optional :enrollment_code_env_var, :string, 12
|
130
|
+
optional :enrollment_username_env_var, :string, 11
|
131
|
+
optional :key_file_path, :string, 5
|
132
|
+
optional :server_address, :string, 3
|
133
|
+
optional :tags, :message, 32771, "v1.Tags"
|
134
|
+
end
|
118
135
|
add_message "v1.KeyfactorX509Store" do
|
119
136
|
optional :id, :string, 1
|
120
137
|
optional :name, :string, 2
|
@@ -126,10 +143,23 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
126
143
|
optional :enrollment_code_env_var, :string, 12
|
127
144
|
optional :enrollment_username_env_var, :string, 11
|
128
145
|
optional :key_file_path, :string, 5
|
129
|
-
optional :key_password_env_var, :string, 7
|
130
146
|
optional :server_address, :string, 3
|
131
147
|
optional :tags, :message, 32771, "v1.Tags"
|
132
148
|
end
|
149
|
+
add_message "v1.VaultAWSEC2Store" do
|
150
|
+
optional :id, :string, 1
|
151
|
+
optional :name, :string, 2
|
152
|
+
optional :namespace, :string, 5
|
153
|
+
optional :server_address, :string, 3
|
154
|
+
optional :tags, :message, 8, "v1.Tags"
|
155
|
+
end
|
156
|
+
add_message "v1.VaultAWSIAMStore" do
|
157
|
+
optional :id, :string, 1
|
158
|
+
optional :name, :string, 2
|
159
|
+
optional :namespace, :string, 5
|
160
|
+
optional :server_address, :string, 3
|
161
|
+
optional :tags, :message, 8, "v1.Tags"
|
162
|
+
end
|
133
163
|
add_message "v1.VaultAppRoleStore" do
|
134
164
|
optional :id, :string, 1
|
135
165
|
optional :name, :string, 2
|
@@ -235,7 +265,10 @@ module V1
|
|
235
265
|
DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
|
236
266
|
GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
|
237
267
|
GCPCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPCertX509Store").msgclass
|
268
|
+
KeyfactorSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorSSHStore").msgclass
|
238
269
|
KeyfactorX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorX509Store").msgclass
|
270
|
+
VaultAWSEC2Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2Store").msgclass
|
271
|
+
VaultAWSIAMStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMStore").msgclass
|
239
272
|
VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
|
240
273
|
VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
|
241
274
|
VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
|
data/lib/models/porcelain.rb
CHANGED
@@ -5253,6 +5253,75 @@ module SDM
|
|
5253
5253
|
end
|
5254
5254
|
end
|
5255
5255
|
|
5256
|
+
class KeyfactorSSHStore
|
5257
|
+
# Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
5258
|
+
# This is not required if the CA is trusted by the host operating system. This should be a PEM
|
5259
|
+
# formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
|
5260
|
+
attr_accessor :ca_file_path
|
5261
|
+
# Path to client certificate in PEM format. This certificate must contain a client certificate that
|
5262
|
+
# is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
|
5263
|
+
# key associated with the certificate, but KeyFile can also be set to configure the private key.
|
5264
|
+
attr_accessor :certificate_file_path
|
5265
|
+
# Name of EJBCA certificate authority that will enroll CSR.
|
5266
|
+
attr_accessor :default_certificate_authority_name
|
5267
|
+
# Certificate profile name that EJBCA will enroll the CSR with.
|
5268
|
+
attr_accessor :default_certificate_profile_name
|
5269
|
+
# End entity profile that EJBCA will enroll the CSR with.
|
5270
|
+
attr_accessor :default_end_entity_profile_name
|
5271
|
+
# code used by EJBCA during enrollment. May be left blank if no code is required.
|
5272
|
+
attr_accessor :enrollment_code_env_var
|
5273
|
+
# username that used by the EJBCA during enrollment. This can be left out.
|
5274
|
+
# If so, the username must be auto-generated on the Keyfactor side.
|
5275
|
+
attr_accessor :enrollment_username_env_var
|
5276
|
+
# Unique identifier of the SecretStore.
|
5277
|
+
attr_accessor :id
|
5278
|
+
# Path to private key in PEM format. This file should contain the private key associated with the
|
5279
|
+
# client certificate configured in CertificateFile.
|
5280
|
+
attr_accessor :key_file_path
|
5281
|
+
# Unique human-readable name of the SecretStore.
|
5282
|
+
attr_accessor :name
|
5283
|
+
# the host of the Key Factor CA
|
5284
|
+
attr_accessor :server_address
|
5285
|
+
# Tags is a map of key, value pairs.
|
5286
|
+
attr_accessor :tags
|
5287
|
+
|
5288
|
+
def initialize(
|
5289
|
+
ca_file_path: nil,
|
5290
|
+
certificate_file_path: nil,
|
5291
|
+
default_certificate_authority_name: nil,
|
5292
|
+
default_certificate_profile_name: nil,
|
5293
|
+
default_end_entity_profile_name: nil,
|
5294
|
+
enrollment_code_env_var: nil,
|
5295
|
+
enrollment_username_env_var: nil,
|
5296
|
+
id: nil,
|
5297
|
+
key_file_path: nil,
|
5298
|
+
name: nil,
|
5299
|
+
server_address: nil,
|
5300
|
+
tags: nil
|
5301
|
+
)
|
5302
|
+
@ca_file_path = ca_file_path == nil ? "" : ca_file_path
|
5303
|
+
@certificate_file_path = certificate_file_path == nil ? "" : certificate_file_path
|
5304
|
+
@default_certificate_authority_name = default_certificate_authority_name == nil ? "" : default_certificate_authority_name
|
5305
|
+
@default_certificate_profile_name = default_certificate_profile_name == nil ? "" : default_certificate_profile_name
|
5306
|
+
@default_end_entity_profile_name = default_end_entity_profile_name == nil ? "" : default_end_entity_profile_name
|
5307
|
+
@enrollment_code_env_var = enrollment_code_env_var == nil ? "" : enrollment_code_env_var
|
5308
|
+
@enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
|
5309
|
+
@id = id == nil ? "" : id
|
5310
|
+
@key_file_path = key_file_path == nil ? "" : key_file_path
|
5311
|
+
@name = name == nil ? "" : name
|
5312
|
+
@server_address = server_address == nil ? "" : server_address
|
5313
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
5314
|
+
end
|
5315
|
+
|
5316
|
+
def to_json(options = {})
|
5317
|
+
hash = {}
|
5318
|
+
self.instance_variables.each do |var|
|
5319
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
5320
|
+
end
|
5321
|
+
hash.to_json
|
5322
|
+
end
|
5323
|
+
end
|
5324
|
+
|
5256
5325
|
class KeyfactorX509Store
|
5257
5326
|
# Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
5258
5327
|
# This is not required if the CA is trusted by the host operating system. This should be a PEM
|
@@ -5278,8 +5347,6 @@ module SDM
|
|
5278
5347
|
# Path to private key in PEM format. This file should contain the private key associated with the
|
5279
5348
|
# client certificate configured in CertificateFile.
|
5280
5349
|
attr_accessor :key_file_path
|
5281
|
-
# optional environment variable housing the password that is used to decrypt the key file.
|
5282
|
-
attr_accessor :key_password_env_var
|
5283
5350
|
# Unique human-readable name of the SecretStore.
|
5284
5351
|
attr_accessor :name
|
5285
5352
|
# the host of the Key Factor CA
|
@@ -5297,7 +5364,6 @@ module SDM
|
|
5297
5364
|
enrollment_username_env_var: nil,
|
5298
5365
|
id: nil,
|
5299
5366
|
key_file_path: nil,
|
5300
|
-
key_password_env_var: nil,
|
5301
5367
|
name: nil,
|
5302
5368
|
server_address: nil,
|
5303
5369
|
tags: nil
|
@@ -5311,7 +5377,6 @@ module SDM
|
|
5311
5377
|
@enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
|
5312
5378
|
@id = id == nil ? "" : id
|
5313
5379
|
@key_file_path = key_file_path == nil ? "" : key_file_path
|
5314
|
-
@key_password_env_var = key_password_env_var == nil ? "" : key_password_env_var
|
5315
5380
|
@name = name == nil ? "" : name
|
5316
5381
|
@server_address = server_address == nil ? "" : server_address
|
5317
5382
|
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
@@ -10682,6 +10747,78 @@ module SDM
|
|
10682
10747
|
end
|
10683
10748
|
end
|
10684
10749
|
|
10750
|
+
# VaultAWSEC2Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10751
|
+
class VaultAWSEC2Store
|
10752
|
+
# Unique identifier of the SecretStore.
|
10753
|
+
attr_accessor :id
|
10754
|
+
# Unique human-readable name of the SecretStore.
|
10755
|
+
attr_accessor :name
|
10756
|
+
# The namespace to make requests within
|
10757
|
+
attr_accessor :namespace
|
10758
|
+
# The URL of the Vault to target
|
10759
|
+
attr_accessor :server_address
|
10760
|
+
# Tags is a map of key, value pairs.
|
10761
|
+
attr_accessor :tags
|
10762
|
+
|
10763
|
+
def initialize(
|
10764
|
+
id: nil,
|
10765
|
+
name: nil,
|
10766
|
+
namespace: nil,
|
10767
|
+
server_address: nil,
|
10768
|
+
tags: nil
|
10769
|
+
)
|
10770
|
+
@id = id == nil ? "" : id
|
10771
|
+
@name = name == nil ? "" : name
|
10772
|
+
@namespace = namespace == nil ? "" : namespace
|
10773
|
+
@server_address = server_address == nil ? "" : server_address
|
10774
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
10775
|
+
end
|
10776
|
+
|
10777
|
+
def to_json(options = {})
|
10778
|
+
hash = {}
|
10779
|
+
self.instance_variables.each do |var|
|
10780
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
10781
|
+
end
|
10782
|
+
hash.to_json
|
10783
|
+
end
|
10784
|
+
end
|
10785
|
+
|
10786
|
+
# VaultAWSIAMStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
10787
|
+
class VaultAWSIAMStore
|
10788
|
+
# Unique identifier of the SecretStore.
|
10789
|
+
attr_accessor :id
|
10790
|
+
# Unique human-readable name of the SecretStore.
|
10791
|
+
attr_accessor :name
|
10792
|
+
# The namespace to make requests within
|
10793
|
+
attr_accessor :namespace
|
10794
|
+
# The URL of the Vault to target
|
10795
|
+
attr_accessor :server_address
|
10796
|
+
# Tags is a map of key, value pairs.
|
10797
|
+
attr_accessor :tags
|
10798
|
+
|
10799
|
+
def initialize(
|
10800
|
+
id: nil,
|
10801
|
+
name: nil,
|
10802
|
+
namespace: nil,
|
10803
|
+
server_address: nil,
|
10804
|
+
tags: nil
|
10805
|
+
)
|
10806
|
+
@id = id == nil ? "" : id
|
10807
|
+
@name = name == nil ? "" : name
|
10808
|
+
@namespace = namespace == nil ? "" : namespace
|
10809
|
+
@server_address = server_address == nil ? "" : server_address
|
10810
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
10811
|
+
end
|
10812
|
+
|
10813
|
+
def to_json(options = {})
|
10814
|
+
hash = {}
|
10815
|
+
self.instance_variables.each do |var|
|
10816
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
10817
|
+
end
|
10818
|
+
hash.to_json
|
10819
|
+
end
|
10820
|
+
end
|
10821
|
+
|
10685
10822
|
class VaultAppRoleCertSSHStore
|
10686
10823
|
# Unique identifier of the SecretStore.
|
10687
10824
|
attr_accessor :id
|
data/lib/strongdm.rb
CHANGED
@@ -29,7 +29,7 @@ module SDM #:nodoc:
|
|
29
29
|
DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
|
30
30
|
DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
|
31
31
|
API_VERSION = "2024-03-28"
|
32
|
-
USER_AGENT = "strongdm-sdk-ruby/8.
|
32
|
+
USER_AGENT = "strongdm-sdk-ruby/8.4.0"
|
33
33
|
private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
|
34
34
|
|
35
35
|
# Creates a new strongDM API client.
|
data/lib/svc.rb
CHANGED
@@ -4508,10 +4508,13 @@ module SDM #:nodoc:
|
|
4508
4508
|
# {DelineaStore}
|
4509
4509
|
# {GCPStore}
|
4510
4510
|
# {GCPCertX509Store}
|
4511
|
+
# {KeyfactorSSHStore}
|
4511
4512
|
# {KeyfactorX509Store}
|
4512
4513
|
# {VaultAppRoleStore}
|
4513
4514
|
# {VaultAppRoleCertSSHStore}
|
4514
4515
|
# {VaultAppRoleCertX509Store}
|
4516
|
+
# {VaultAWSEC2Store}
|
4517
|
+
# {VaultAWSIAMStore}
|
4515
4518
|
# {VaultTLSStore}
|
4516
4519
|
# {VaultTLSCertSSHStore}
|
4517
4520
|
# {VaultTLSCertX509Store}
|
data/lib/version
CHANGED
data/lib/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: strongdm
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 8.
|
4
|
+
version: 8.4.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- strongDM Team
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-05-20 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: grpc
|
@@ -81,8 +81,8 @@ files:
|
|
81
81
|
- "./.git/logs/HEAD"
|
82
82
|
- "./.git/logs/refs/heads/master"
|
83
83
|
- "./.git/logs/refs/remotes/origin/HEAD"
|
84
|
-
- "./.git/objects/pack/pack-
|
85
|
-
- "./.git/objects/pack/pack-
|
84
|
+
- "./.git/objects/pack/pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.idx"
|
85
|
+
- "./.git/objects/pack/pack-4ee1251da9ac4f762232f7c2302709c4007ce5db.pack"
|
86
86
|
- "./.git/packed-refs"
|
87
87
|
- "./.git/refs/heads/master"
|
88
88
|
- "./.git/refs/remotes/origin/HEAD"
|