strongdm 15.22.0 → 15.23.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.git/ORIG_HEAD +1 -1
- data/.git/index +0 -0
- data/.git/logs/HEAD +3 -3
- data/.git/logs/refs/heads/master +2 -2
- data/.git/logs/refs/remotes/origin/HEAD +1 -1
- data/.git/objects/pack/{pack-102044dd10f7a14cf9558e47f1b2bf49750dce45.idx → pack-628307518dff1ea43296c8329e2a24dbda1b21c8.idx} +0 -0
- data/.git/objects/pack/{pack-102044dd10f7a14cf9558e47f1b2bf49750dce45.pack → pack-628307518dff1ea43296c8329e2a24dbda1b21c8.pack} +0 -0
- data/.git/packed-refs +3 -2
- data/.git/refs/heads/master +1 -1
- data/lib/grpc/plumbing.rb +216 -0
- data/lib/grpc/secret_store_types_pb.rb +48 -0
- data/lib/models/porcelain.rb +192 -0
- data/lib/strongdm.rb +1 -1
- data/lib/svc.rb +4 -0
- data/lib/version +1 -1
- data/lib/version.rb +1 -1
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 588c5012556b740bd38c81e1b317600eb56c821055c6f7eb1e369f0a557bfe41
|
4
|
+
data.tar.gz: 3c4a1495fae6f42e3cb9273d1643ed0bc29fe04be799079d31693f705560e649
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 60e529b813549e54307afbb565ff7b1e87cb9962749cc13b847856e260adfd563cbe5e875c7f6823a391981ee0cffe8e3048c578158e6bbc0a804c4704446be5
|
7
|
+
data.tar.gz: afc6b75aa54f857fabd0c92c2011dd69280f9c233621fb1977815ab4afefd018d567a7cae1a2b508c8dc86e44262c03fd491666c3b1c19145647fbca08769578
|
data/.git/ORIG_HEAD
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
dbc1e295841d51376c44f987d9eecf5c8427c478
|
data/.git/index
CHANGED
Binary file
|
data/.git/logs/HEAD
CHANGED
@@ -1,3 +1,3 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
2
|
-
|
3
|
-
|
1
|
+
0000000000000000000000000000000000000000 dbc1e295841d51376c44f987d9eecf5c8427c478 root <root@cc58665762cb.(none)> 1760362340 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
2
|
+
dbc1e295841d51376c44f987d9eecf5c8427c478 dbc1e295841d51376c44f987d9eecf5c8427c478 root <root@cc58665762cb.(none)> 1760362340 +0000 checkout: moving from master to master
|
3
|
+
dbc1e295841d51376c44f987d9eecf5c8427c478 1fb12400f09101921542776d3887b93103dd9c5f root <root@cc58665762cb.(none)> 1760362340 +0000 merge origin/development: Fast-forward
|
data/.git/logs/refs/heads/master
CHANGED
@@ -1,2 +1,2 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
2
|
-
|
1
|
+
0000000000000000000000000000000000000000 dbc1e295841d51376c44f987d9eecf5c8427c478 root <root@cc58665762cb.(none)> 1760362340 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
2
|
+
dbc1e295841d51376c44f987d9eecf5c8427c478 1fb12400f09101921542776d3887b93103dd9c5f root <root@cc58665762cb.(none)> 1760362340 +0000 merge origin/development: Fast-forward
|
@@ -1 +1 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
1
|
+
0000000000000000000000000000000000000000 dbc1e295841d51376c44f987d9eecf5c8427c478 root <root@cc58665762cb.(none)> 1760362340 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
Binary file
|
Binary file
|
data/.git/packed-refs
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
# pack-refs with: peeled fully-peeled sorted
|
2
|
-
|
3
|
-
|
2
|
+
1fb12400f09101921542776d3887b93103dd9c5f refs/remotes/origin/development
|
3
|
+
dbc1e295841d51376c44f987d9eecf5c8427c478 refs/remotes/origin/master
|
4
4
|
2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
|
5
5
|
04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
|
6
6
|
6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
|
@@ -113,6 +113,7 @@ ac9b86121b9542f28b614f897f7a61f34363410b refs/tags/v15.10.0
|
|
113
113
|
95ca84ab082b3f19fa3b0d1799ac55e4beebea64 refs/tags/v15.2.0
|
114
114
|
7cf936aad61c58434bf735f826e7cfcf71b9ce8a refs/tags/v15.20.0
|
115
115
|
229557ff8902458028f43d084b6fdff298486d99 refs/tags/v15.21.0
|
116
|
+
dbc1e295841d51376c44f987d9eecf5c8427c478 refs/tags/v15.22.0
|
116
117
|
cf3b15b82cb0c4229609c07c870c6cb4fd38ef75 refs/tags/v15.4.0
|
117
118
|
0be2c5e7f7a90c49077548cb3a9bce234219b9f0 refs/tags/v15.5.0
|
118
119
|
4b9cd43c5dda3f369b82b6a56132a5470ff9ff53 refs/tags/v15.6.0
|
data/.git/refs/heads/master
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
1fb12400f09101921542776d3887b93103dd9c5f
|
data/lib/grpc/plumbing.rb
CHANGED
@@ -16742,9 +16742,21 @@ module SDM
|
|
16742
16742
|
if porcelain.instance_of? VaultAWSEC2Store
|
16743
16743
|
plumbing.vault_awsec_2 = convert_vault_awsec_2_store_to_plumbing(porcelain)
|
16744
16744
|
end
|
16745
|
+
if porcelain.instance_of? VaultAWSEC2CertSSHStore
|
16746
|
+
plumbing.vault_awsec_2_cert_ssh = convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
|
16747
|
+
end
|
16748
|
+
if porcelain.instance_of? VaultAWSEC2CertX509Store
|
16749
|
+
plumbing.vault_awsec_2_cert_x_509 = convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
|
16750
|
+
end
|
16745
16751
|
if porcelain.instance_of? VaultAWSIAMStore
|
16746
16752
|
plumbing.vault_awsiam = convert_vault_awsiam_store_to_plumbing(porcelain)
|
16747
16753
|
end
|
16754
|
+
if porcelain.instance_of? VaultAWSIAMCertSSHStore
|
16755
|
+
plumbing.vault_awsiam_cert_ssh = convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
|
16756
|
+
end
|
16757
|
+
if porcelain.instance_of? VaultAWSIAMCertX509Store
|
16758
|
+
plumbing.vault_awsiam_cert_x_509 = convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
|
16759
|
+
end
|
16748
16760
|
if porcelain.instance_of? VaultTLSStore
|
16749
16761
|
plumbing.vault_tls = convert_vault_tls_store_to_plumbing(porcelain)
|
16750
16762
|
end
|
@@ -16818,9 +16830,21 @@ module SDM
|
|
16818
16830
|
if plumbing.vault_awsec_2 != nil
|
16819
16831
|
return convert_vault_awsec_2_store_to_porcelain(plumbing.vault_awsec_2)
|
16820
16832
|
end
|
16833
|
+
if plumbing.vault_awsec_2_cert_ssh != nil
|
16834
|
+
return convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing.vault_awsec_2_cert_ssh)
|
16835
|
+
end
|
16836
|
+
if plumbing.vault_awsec_2_cert_x_509 != nil
|
16837
|
+
return convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing.vault_awsec_2_cert_x_509)
|
16838
|
+
end
|
16821
16839
|
if plumbing.vault_awsiam != nil
|
16822
16840
|
return convert_vault_awsiam_store_to_porcelain(plumbing.vault_awsiam)
|
16823
16841
|
end
|
16842
|
+
if plumbing.vault_awsiam_cert_ssh != nil
|
16843
|
+
return convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing.vault_awsiam_cert_ssh)
|
16844
|
+
end
|
16845
|
+
if plumbing.vault_awsiam_cert_x_509 != nil
|
16846
|
+
return convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing.vault_awsiam_cert_x_509)
|
16847
|
+
end
|
16824
16848
|
if plumbing.vault_tls != nil
|
16825
16849
|
return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
|
16826
16850
|
end
|
@@ -17810,6 +17834,102 @@ module SDM
|
|
17810
17834
|
end
|
17811
17835
|
items
|
17812
17836
|
end
|
17837
|
+
def self.convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing)
|
17838
|
+
if plumbing == nil
|
17839
|
+
return nil
|
17840
|
+
end
|
17841
|
+
porcelain = VaultAWSEC2CertSSHStore.new()
|
17842
|
+
porcelain.id = (plumbing.id)
|
17843
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
17844
|
+
porcelain.name = (plumbing.name)
|
17845
|
+
porcelain.namespace = (plumbing.namespace)
|
17846
|
+
porcelain.server_address = (plumbing.server_address)
|
17847
|
+
porcelain.signing_role = (plumbing.signing_role)
|
17848
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
17849
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
17850
|
+
porcelain
|
17851
|
+
end
|
17852
|
+
|
17853
|
+
def self.convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
|
17854
|
+
if porcelain == nil
|
17855
|
+
return nil
|
17856
|
+
end
|
17857
|
+
plumbing = V1::VaultAWSEC2CertSSHStore.new()
|
17858
|
+
plumbing.id = (porcelain.id)
|
17859
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
17860
|
+
plumbing.name = (porcelain.name)
|
17861
|
+
plumbing.namespace = (porcelain.namespace)
|
17862
|
+
plumbing.server_address = (porcelain.server_address)
|
17863
|
+
plumbing.signing_role = (porcelain.signing_role)
|
17864
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
17865
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
17866
|
+
plumbing
|
17867
|
+
end
|
17868
|
+
def self.convert_repeated_vault_awsec_2_cert_ssh_store_to_plumbing(porcelains)
|
17869
|
+
items = Array.new
|
17870
|
+
porcelains.each do |porcelain|
|
17871
|
+
plumbing = convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
|
17872
|
+
items.append(plumbing)
|
17873
|
+
end
|
17874
|
+
items
|
17875
|
+
end
|
17876
|
+
|
17877
|
+
def self.convert_repeated_vault_awsec_2_cert_ssh_store_to_porcelain(plumbings)
|
17878
|
+
items = Array.new
|
17879
|
+
plumbings.each do |plumbing|
|
17880
|
+
porcelain = convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing)
|
17881
|
+
items.append(porcelain)
|
17882
|
+
end
|
17883
|
+
items
|
17884
|
+
end
|
17885
|
+
def self.convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing)
|
17886
|
+
if plumbing == nil
|
17887
|
+
return nil
|
17888
|
+
end
|
17889
|
+
porcelain = VaultAWSEC2CertX509Store.new()
|
17890
|
+
porcelain.id = (plumbing.id)
|
17891
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
17892
|
+
porcelain.name = (plumbing.name)
|
17893
|
+
porcelain.namespace = (plumbing.namespace)
|
17894
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
17895
|
+
porcelain.server_address = (plumbing.server_address)
|
17896
|
+
porcelain.signing_role = (plumbing.signing_role)
|
17897
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
17898
|
+
porcelain
|
17899
|
+
end
|
17900
|
+
|
17901
|
+
def self.convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
|
17902
|
+
if porcelain == nil
|
17903
|
+
return nil
|
17904
|
+
end
|
17905
|
+
plumbing = V1::VaultAWSEC2CertX509Store.new()
|
17906
|
+
plumbing.id = (porcelain.id)
|
17907
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
17908
|
+
plumbing.name = (porcelain.name)
|
17909
|
+
plumbing.namespace = (porcelain.namespace)
|
17910
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
17911
|
+
plumbing.server_address = (porcelain.server_address)
|
17912
|
+
plumbing.signing_role = (porcelain.signing_role)
|
17913
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
17914
|
+
plumbing
|
17915
|
+
end
|
17916
|
+
def self.convert_repeated_vault_awsec_2_cert_x_509_store_to_plumbing(porcelains)
|
17917
|
+
items = Array.new
|
17918
|
+
porcelains.each do |porcelain|
|
17919
|
+
plumbing = convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
|
17920
|
+
items.append(plumbing)
|
17921
|
+
end
|
17922
|
+
items
|
17923
|
+
end
|
17924
|
+
|
17925
|
+
def self.convert_repeated_vault_awsec_2_cert_x_509_store_to_porcelain(plumbings)
|
17926
|
+
items = Array.new
|
17927
|
+
plumbings.each do |plumbing|
|
17928
|
+
porcelain = convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing)
|
17929
|
+
items.append(porcelain)
|
17930
|
+
end
|
17931
|
+
items
|
17932
|
+
end
|
17813
17933
|
def self.convert_vault_awsec_2_store_to_porcelain(plumbing)
|
17814
17934
|
if plumbing == nil
|
17815
17935
|
return nil
|
@@ -17852,6 +17972,102 @@ module SDM
|
|
17852
17972
|
end
|
17853
17973
|
items
|
17854
17974
|
end
|
17975
|
+
def self.convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing)
|
17976
|
+
if plumbing == nil
|
17977
|
+
return nil
|
17978
|
+
end
|
17979
|
+
porcelain = VaultAWSIAMCertSSHStore.new()
|
17980
|
+
porcelain.id = (plumbing.id)
|
17981
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
17982
|
+
porcelain.name = (plumbing.name)
|
17983
|
+
porcelain.namespace = (plumbing.namespace)
|
17984
|
+
porcelain.server_address = (plumbing.server_address)
|
17985
|
+
porcelain.signing_role = (plumbing.signing_role)
|
17986
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
17987
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
17988
|
+
porcelain
|
17989
|
+
end
|
17990
|
+
|
17991
|
+
def self.convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
|
17992
|
+
if porcelain == nil
|
17993
|
+
return nil
|
17994
|
+
end
|
17995
|
+
plumbing = V1::VaultAWSIAMCertSSHStore.new()
|
17996
|
+
plumbing.id = (porcelain.id)
|
17997
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
17998
|
+
plumbing.name = (porcelain.name)
|
17999
|
+
plumbing.namespace = (porcelain.namespace)
|
18000
|
+
plumbing.server_address = (porcelain.server_address)
|
18001
|
+
plumbing.signing_role = (porcelain.signing_role)
|
18002
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
18003
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
18004
|
+
plumbing
|
18005
|
+
end
|
18006
|
+
def self.convert_repeated_vault_awsiam_cert_ssh_store_to_plumbing(porcelains)
|
18007
|
+
items = Array.new
|
18008
|
+
porcelains.each do |porcelain|
|
18009
|
+
plumbing = convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
|
18010
|
+
items.append(plumbing)
|
18011
|
+
end
|
18012
|
+
items
|
18013
|
+
end
|
18014
|
+
|
18015
|
+
def self.convert_repeated_vault_awsiam_cert_ssh_store_to_porcelain(plumbings)
|
18016
|
+
items = Array.new
|
18017
|
+
plumbings.each do |plumbing|
|
18018
|
+
porcelain = convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing)
|
18019
|
+
items.append(porcelain)
|
18020
|
+
end
|
18021
|
+
items
|
18022
|
+
end
|
18023
|
+
def self.convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing)
|
18024
|
+
if plumbing == nil
|
18025
|
+
return nil
|
18026
|
+
end
|
18027
|
+
porcelain = VaultAWSIAMCertX509Store.new()
|
18028
|
+
porcelain.id = (plumbing.id)
|
18029
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
18030
|
+
porcelain.name = (plumbing.name)
|
18031
|
+
porcelain.namespace = (plumbing.namespace)
|
18032
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
18033
|
+
porcelain.server_address = (plumbing.server_address)
|
18034
|
+
porcelain.signing_role = (plumbing.signing_role)
|
18035
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
18036
|
+
porcelain
|
18037
|
+
end
|
18038
|
+
|
18039
|
+
def self.convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
|
18040
|
+
if porcelain == nil
|
18041
|
+
return nil
|
18042
|
+
end
|
18043
|
+
plumbing = V1::VaultAWSIAMCertX509Store.new()
|
18044
|
+
plumbing.id = (porcelain.id)
|
18045
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
18046
|
+
plumbing.name = (porcelain.name)
|
18047
|
+
plumbing.namespace = (porcelain.namespace)
|
18048
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
18049
|
+
plumbing.server_address = (porcelain.server_address)
|
18050
|
+
plumbing.signing_role = (porcelain.signing_role)
|
18051
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
18052
|
+
plumbing
|
18053
|
+
end
|
18054
|
+
def self.convert_repeated_vault_awsiam_cert_x_509_store_to_plumbing(porcelains)
|
18055
|
+
items = Array.new
|
18056
|
+
porcelains.each do |porcelain|
|
18057
|
+
plumbing = convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
|
18058
|
+
items.append(plumbing)
|
18059
|
+
end
|
18060
|
+
items
|
18061
|
+
end
|
18062
|
+
|
18063
|
+
def self.convert_repeated_vault_awsiam_cert_x_509_store_to_porcelain(plumbings)
|
18064
|
+
items = Array.new
|
18065
|
+
plumbings.each do |plumbing|
|
18066
|
+
porcelain = convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing)
|
18067
|
+
items.append(porcelain)
|
18068
|
+
end
|
18069
|
+
items
|
18070
|
+
end
|
17855
18071
|
def self.convert_vault_awsiam_store_to_porcelain(plumbing)
|
17856
18072
|
if plumbing == nil
|
17857
18073
|
return nil
|
@@ -37,7 +37,11 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
37
37
|
optional :keyfactor_ssh, :message, 210, "v1.KeyfactorSSHStore"
|
38
38
|
optional :keyfactor_x_509, :message, 200, "v1.KeyfactorX509Store"
|
39
39
|
optional :vault_awsec_2, :message, 97, "v1.VaultAWSEC2Store"
|
40
|
+
optional :vault_awsec_2_cert_ssh, :message, 98, "v1.VaultAWSEC2CertSSHStore"
|
41
|
+
optional :vault_awsec_2_cert_x_509, :message, 100, "v1.VaultAWSEC2CertX509Store"
|
40
42
|
optional :vault_awsiam, :message, 96, "v1.VaultAWSIAMStore"
|
43
|
+
optional :vault_awsiam_cert_ssh, :message, 99, "v1.VaultAWSIAMCertSSHStore"
|
44
|
+
optional :vault_awsiam_cert_x_509, :message, 102, "v1.VaultAWSIAMCertX509Store"
|
41
45
|
optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
|
42
46
|
optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
|
43
47
|
optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
|
@@ -153,6 +157,26 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
153
157
|
optional :server_address, :string, 3
|
154
158
|
optional :tags, :message, 8, "v1.Tags"
|
155
159
|
end
|
160
|
+
add_message "v1.VaultAWSEC2CertSSHStore" do
|
161
|
+
optional :id, :string, 1
|
162
|
+
optional :name, :string, 2
|
163
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
164
|
+
optional :namespace, :string, 5
|
165
|
+
optional :server_address, :string, 3
|
166
|
+
optional :signing_role, :string, 7
|
167
|
+
optional :ssh_mount_point, :string, 6
|
168
|
+
optional :tags, :message, 4, "v1.Tags"
|
169
|
+
end
|
170
|
+
add_message "v1.VaultAWSEC2CertX509Store" do
|
171
|
+
optional :id, :string, 1
|
172
|
+
optional :name, :string, 2
|
173
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
174
|
+
optional :namespace, :string, 5
|
175
|
+
optional :pki_mount_point, :string, 6
|
176
|
+
optional :server_address, :string, 3
|
177
|
+
optional :signing_role, :string, 7
|
178
|
+
optional :tags, :message, 4, "v1.Tags"
|
179
|
+
end
|
156
180
|
add_message "v1.VaultAWSIAMStore" do
|
157
181
|
optional :id, :string, 1
|
158
182
|
optional :name, :string, 2
|
@@ -160,6 +184,26 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
160
184
|
optional :server_address, :string, 3
|
161
185
|
optional :tags, :message, 8, "v1.Tags"
|
162
186
|
end
|
187
|
+
add_message "v1.VaultAWSIAMCertSSHStore" do
|
188
|
+
optional :id, :string, 1
|
189
|
+
optional :name, :string, 2
|
190
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
191
|
+
optional :namespace, :string, 5
|
192
|
+
optional :server_address, :string, 3
|
193
|
+
optional :signing_role, :string, 7
|
194
|
+
optional :ssh_mount_point, :string, 6
|
195
|
+
optional :tags, :message, 4, "v1.Tags"
|
196
|
+
end
|
197
|
+
add_message "v1.VaultAWSIAMCertX509Store" do
|
198
|
+
optional :id, :string, 1
|
199
|
+
optional :name, :string, 2
|
200
|
+
optional :issuedCertTTLMinutes, :int32, 9
|
201
|
+
optional :namespace, :string, 5
|
202
|
+
optional :pki_mount_point, :string, 6
|
203
|
+
optional :server_address, :string, 3
|
204
|
+
optional :signing_role, :string, 7
|
205
|
+
optional :tags, :message, 4, "v1.Tags"
|
206
|
+
end
|
163
207
|
add_message "v1.VaultAppRoleStore" do
|
164
208
|
optional :id, :string, 1
|
165
209
|
optional :name, :string, 2
|
@@ -268,7 +312,11 @@ module V1
|
|
268
312
|
KeyfactorSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorSSHStore").msgclass
|
269
313
|
KeyfactorX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorX509Store").msgclass
|
270
314
|
VaultAWSEC2Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2Store").msgclass
|
315
|
+
VaultAWSEC2CertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2CertSSHStore").msgclass
|
316
|
+
VaultAWSEC2CertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSEC2CertX509Store").msgclass
|
271
317
|
VaultAWSIAMStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMStore").msgclass
|
318
|
+
VaultAWSIAMCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMCertSSHStore").msgclass
|
319
|
+
VaultAWSIAMCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAWSIAMCertX509Store").msgclass
|
272
320
|
VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
|
273
321
|
VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
|
274
322
|
VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
|
data/lib/models/porcelain.rb
CHANGED
@@ -16264,6 +16264,102 @@ module SDM
|
|
16264
16264
|
end
|
16265
16265
|
end
|
16266
16266
|
|
16267
|
+
# VaultAWSEC2CertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
16268
|
+
class VaultAWSEC2CertSSHStore
|
16269
|
+
# Unique identifier of the SecretStore.
|
16270
|
+
attr_accessor :id
|
16271
|
+
# The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
16272
|
+
attr_accessor :issuedcertttlminutes
|
16273
|
+
# Unique human-readable name of the SecretStore.
|
16274
|
+
attr_accessor :name
|
16275
|
+
# The namespace to make requests within
|
16276
|
+
attr_accessor :namespace
|
16277
|
+
# The URL of the Vault to target
|
16278
|
+
attr_accessor :server_address
|
16279
|
+
# The signing role to be used for signing certificates
|
16280
|
+
attr_accessor :signing_role
|
16281
|
+
# The mount point of the SSH engine configured with the desired CA
|
16282
|
+
attr_accessor :ssh_mount_point
|
16283
|
+
# Tags is a map of key, value pairs.
|
16284
|
+
attr_accessor :tags
|
16285
|
+
|
16286
|
+
def initialize(
|
16287
|
+
id: nil,
|
16288
|
+
issuedcertttlminutes: nil,
|
16289
|
+
name: nil,
|
16290
|
+
namespace: nil,
|
16291
|
+
server_address: nil,
|
16292
|
+
signing_role: nil,
|
16293
|
+
ssh_mount_point: nil,
|
16294
|
+
tags: nil
|
16295
|
+
)
|
16296
|
+
@id = id == nil ? "" : id
|
16297
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
16298
|
+
@name = name == nil ? "" : name
|
16299
|
+
@namespace = namespace == nil ? "" : namespace
|
16300
|
+
@server_address = server_address == nil ? "" : server_address
|
16301
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
16302
|
+
@ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
|
16303
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
16304
|
+
end
|
16305
|
+
|
16306
|
+
def to_json(options = {})
|
16307
|
+
hash = {}
|
16308
|
+
self.instance_variables.each do |var|
|
16309
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
16310
|
+
end
|
16311
|
+
hash.to_json
|
16312
|
+
end
|
16313
|
+
end
|
16314
|
+
|
16315
|
+
# VaultAWSEC2CertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
16316
|
+
class VaultAWSEC2CertX509Store
|
16317
|
+
# Unique identifier of the SecretStore.
|
16318
|
+
attr_accessor :id
|
16319
|
+
# The lifetime of certificates issued by this CA represented in minutes.
|
16320
|
+
attr_accessor :issuedcertttlminutes
|
16321
|
+
# Unique human-readable name of the SecretStore.
|
16322
|
+
attr_accessor :name
|
16323
|
+
# The namespace to make requests within
|
16324
|
+
attr_accessor :namespace
|
16325
|
+
# The mount point of the PKI engine configured with the desired CA
|
16326
|
+
attr_accessor :pki_mount_point
|
16327
|
+
# The URL of the Vault to target
|
16328
|
+
attr_accessor :server_address
|
16329
|
+
# The signing role to be used for signing certificates
|
16330
|
+
attr_accessor :signing_role
|
16331
|
+
# Tags is a map of key, value pairs.
|
16332
|
+
attr_accessor :tags
|
16333
|
+
|
16334
|
+
def initialize(
|
16335
|
+
id: nil,
|
16336
|
+
issuedcertttlminutes: nil,
|
16337
|
+
name: nil,
|
16338
|
+
namespace: nil,
|
16339
|
+
pki_mount_point: nil,
|
16340
|
+
server_address: nil,
|
16341
|
+
signing_role: nil,
|
16342
|
+
tags: nil
|
16343
|
+
)
|
16344
|
+
@id = id == nil ? "" : id
|
16345
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
16346
|
+
@name = name == nil ? "" : name
|
16347
|
+
@namespace = namespace == nil ? "" : namespace
|
16348
|
+
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
16349
|
+
@server_address = server_address == nil ? "" : server_address
|
16350
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
16351
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
16352
|
+
end
|
16353
|
+
|
16354
|
+
def to_json(options = {})
|
16355
|
+
hash = {}
|
16356
|
+
self.instance_variables.each do |var|
|
16357
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
16358
|
+
end
|
16359
|
+
hash.to_json
|
16360
|
+
end
|
16361
|
+
end
|
16362
|
+
|
16267
16363
|
class VaultAWSEC2Store
|
16268
16364
|
# Unique identifier of the SecretStore.
|
16269
16365
|
attr_accessor :id
|
@@ -16299,6 +16395,102 @@ module SDM
|
|
16299
16395
|
end
|
16300
16396
|
end
|
16301
16397
|
|
16398
|
+
# VaultAWSIAMCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
16399
|
+
class VaultAWSIAMCertSSHStore
|
16400
|
+
# Unique identifier of the SecretStore.
|
16401
|
+
attr_accessor :id
|
16402
|
+
# The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
16403
|
+
attr_accessor :issuedcertttlminutes
|
16404
|
+
# Unique human-readable name of the SecretStore.
|
16405
|
+
attr_accessor :name
|
16406
|
+
# The namespace to make requests within
|
16407
|
+
attr_accessor :namespace
|
16408
|
+
# The URL of the Vault to target
|
16409
|
+
attr_accessor :server_address
|
16410
|
+
# The signing role to be used for signing certificates
|
16411
|
+
attr_accessor :signing_role
|
16412
|
+
# The mount point of the SSH engine configured with the desired CA
|
16413
|
+
attr_accessor :ssh_mount_point
|
16414
|
+
# Tags is a map of key, value pairs.
|
16415
|
+
attr_accessor :tags
|
16416
|
+
|
16417
|
+
def initialize(
|
16418
|
+
id: nil,
|
16419
|
+
issuedcertttlminutes: nil,
|
16420
|
+
name: nil,
|
16421
|
+
namespace: nil,
|
16422
|
+
server_address: nil,
|
16423
|
+
signing_role: nil,
|
16424
|
+
ssh_mount_point: nil,
|
16425
|
+
tags: nil
|
16426
|
+
)
|
16427
|
+
@id = id == nil ? "" : id
|
16428
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
16429
|
+
@name = name == nil ? "" : name
|
16430
|
+
@namespace = namespace == nil ? "" : namespace
|
16431
|
+
@server_address = server_address == nil ? "" : server_address
|
16432
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
16433
|
+
@ssh_mount_point = ssh_mount_point == nil ? "" : ssh_mount_point
|
16434
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
16435
|
+
end
|
16436
|
+
|
16437
|
+
def to_json(options = {})
|
16438
|
+
hash = {}
|
16439
|
+
self.instance_variables.each do |var|
|
16440
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
16441
|
+
end
|
16442
|
+
hash.to_json
|
16443
|
+
end
|
16444
|
+
end
|
16445
|
+
|
16446
|
+
# VaultAWSIAMCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
|
16447
|
+
class VaultAWSIAMCertX509Store
|
16448
|
+
# Unique identifier of the SecretStore.
|
16449
|
+
attr_accessor :id
|
16450
|
+
# The lifetime of certificates issued by this CA represented in minutes.
|
16451
|
+
attr_accessor :issuedcertttlminutes
|
16452
|
+
# Unique human-readable name of the SecretStore.
|
16453
|
+
attr_accessor :name
|
16454
|
+
# The namespace to make requests within
|
16455
|
+
attr_accessor :namespace
|
16456
|
+
# The mount point of the PKI engine configured with the desired CA
|
16457
|
+
attr_accessor :pki_mount_point
|
16458
|
+
# The URL of the Vault to target
|
16459
|
+
attr_accessor :server_address
|
16460
|
+
# The signing role to be used for signing certificates
|
16461
|
+
attr_accessor :signing_role
|
16462
|
+
# Tags is a map of key, value pairs.
|
16463
|
+
attr_accessor :tags
|
16464
|
+
|
16465
|
+
def initialize(
|
16466
|
+
id: nil,
|
16467
|
+
issuedcertttlminutes: nil,
|
16468
|
+
name: nil,
|
16469
|
+
namespace: nil,
|
16470
|
+
pki_mount_point: nil,
|
16471
|
+
server_address: nil,
|
16472
|
+
signing_role: nil,
|
16473
|
+
tags: nil
|
16474
|
+
)
|
16475
|
+
@id = id == nil ? "" : id
|
16476
|
+
@issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
|
16477
|
+
@name = name == nil ? "" : name
|
16478
|
+
@namespace = namespace == nil ? "" : namespace
|
16479
|
+
@pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
|
16480
|
+
@server_address = server_address == nil ? "" : server_address
|
16481
|
+
@signing_role = signing_role == nil ? "" : signing_role
|
16482
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
16483
|
+
end
|
16484
|
+
|
16485
|
+
def to_json(options = {})
|
16486
|
+
hash = {}
|
16487
|
+
self.instance_variables.each do |var|
|
16488
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
16489
|
+
end
|
16490
|
+
hash.to_json
|
16491
|
+
end
|
16492
|
+
end
|
16493
|
+
|
16302
16494
|
class VaultAWSIAMStore
|
16303
16495
|
# Unique identifier of the SecretStore.
|
16304
16496
|
attr_accessor :id
|
data/lib/strongdm.rb
CHANGED
@@ -30,7 +30,7 @@ module SDM #:nodoc:
|
|
30
30
|
DEFAULT_RETRY_FACTOR = 1.6
|
31
31
|
DEFAULT_RETRY_JITTER = 0.2
|
32
32
|
API_VERSION = "2025-04-14"
|
33
|
-
USER_AGENT = "strongdm-sdk-ruby/15.
|
33
|
+
USER_AGENT = "strongdm-sdk-ruby/15.23.0"
|
34
34
|
private_constant :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :DEFAULT_RETRY_FACTOR, :DEFAULT_RETRY_JITTER, :API_VERSION, :USER_AGENT
|
35
35
|
|
36
36
|
# Creates a new strongDM API client.
|
data/lib/svc.rb
CHANGED
@@ -6646,7 +6646,11 @@ module SDM #:nodoc:
|
|
6646
6646
|
# {VaultAppRoleCertSSHStore}
|
6647
6647
|
# {VaultAppRoleCertX509Store}
|
6648
6648
|
# {VaultAWSEC2Store}
|
6649
|
+
# {VaultAWSEC2CertSSHStore}
|
6650
|
+
# {VaultAWSEC2CertX509Store}
|
6649
6651
|
# {VaultAWSIAMStore}
|
6652
|
+
# {VaultAWSIAMCertSSHStore}
|
6653
|
+
# {VaultAWSIAMCertX509Store}
|
6650
6654
|
# {VaultTLSStore}
|
6651
6655
|
# {VaultTLSCertSSHStore}
|
6652
6656
|
# {VaultTLSCertX509Store}
|
data/lib/version
CHANGED
data/lib/version.rb
CHANGED
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: strongdm
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 15.
|
4
|
+
version: 15.23.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- strongDM Team
|
@@ -81,8 +81,8 @@ files:
|
|
81
81
|
- "./.git/logs/HEAD"
|
82
82
|
- "./.git/logs/refs/heads/master"
|
83
83
|
- "./.git/logs/refs/remotes/origin/HEAD"
|
84
|
-
- "./.git/objects/pack/pack-
|
85
|
-
- "./.git/objects/pack/pack-
|
84
|
+
- "./.git/objects/pack/pack-628307518dff1ea43296c8329e2a24dbda1b21c8.idx"
|
85
|
+
- "./.git/objects/pack/pack-628307518dff1ea43296c8329e2a24dbda1b21c8.pack"
|
86
86
|
- "./.git/packed-refs"
|
87
87
|
- "./.git/refs/heads/master"
|
88
88
|
- "./.git/refs/remotes/origin/HEAD"
|