strongdm 7.0.0 → 7.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0760de79267673cdb950eee0db3fd85393fd67a99af0eade61452a44211576fe
4
- data.tar.gz: a9d0ef8500ace7013543a8c1a744c4cf726f3b570606512d96af8dab867d148d
3
+ metadata.gz: 5c057417bc8df129e58f80222c92f1d47974637172f83b9049183a9dfa062952
4
+ data.tar.gz: 380e652a133f54b2951e41f9ab9036ce7083e8bbae474c11366599ecdb1e6b60
5
5
  SHA512:
6
- metadata.gz: f189580f1ba7e1a2829be6b31037ec97636d7a0ccdbebf1e0d81b98fc91fcdcc21ab13139cca1d09d95ac04eba5f672c1d5f381ec9bba98bb73fb8937dcb922f
7
- data.tar.gz: ec158df54db66b17e634ae0cafb277a53ad5e997c6d8f70cfcde29b80e02fe580bb223333b493bd272126ae84ea3eda44eb46d1bda199aec83a9c9cb04f1bb1d
6
+ metadata.gz: c886b286f177d51cb64793394983de2694dfcc2cf0e76ef59021e59e76063ed3c632224c7d3f79f63283acafe8b2c05caec74d1ff7651f0ac10d11d93d9aa57b
7
+ data.tar.gz: 67a3a57f5bbe4a3f78798ea81fa48d8137ff7d910591e97d4c90881bf6b58e7eb248d5bd649a0bbafe4e100b272cae876b54c897f4dfe034b460486e312b77d8
data/.git/ORIG_HEAD CHANGED
@@ -1 +1 @@
1
- d8a1092c15d3618de31ada43875014d96bd21e36
1
+ c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c
data/.git/index CHANGED
Binary file
data/.git/logs/HEAD CHANGED
@@ -1,3 +1,3 @@
1
- 0000000000000000000000000000000000000000 d8a1092c15d3618de31ada43875014d96bd21e36 sdmrelease <support@strongdm.com> 1710517159 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- d8a1092c15d3618de31ada43875014d96bd21e36 d8a1092c15d3618de31ada43875014d96bd21e36 sdmrelease <support@strongdm.com> 1710517159 +0000 checkout: moving from master to master
3
- d8a1092c15d3618de31ada43875014d96bd21e36 c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c sdmrelease <support@strongdm.com> 1710517159 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c sdmrelease <support@strongdm.com> 1710521783 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c sdmrelease <support@strongdm.com> 1710521783 +0000 checkout: moving from master to master
3
+ c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1710521783 +0000 merge origin/development: Fast-forward
@@ -1,2 +1,2 @@
1
- 0000000000000000000000000000000000000000 d8a1092c15d3618de31ada43875014d96bd21e36 sdmrelease <support@strongdm.com> 1710517159 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- d8a1092c15d3618de31ada43875014d96bd21e36 c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c sdmrelease <support@strongdm.com> 1710517159 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c sdmrelease <support@strongdm.com> 1710521783 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1710521783 +0000 merge origin/development: Fast-forward
@@ -1 +1 @@
1
- 0000000000000000000000000000000000000000 d8a1092c15d3618de31ada43875014d96bd21e36 sdmrelease <support@strongdm.com> 1710517159 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
1
+ 0000000000000000000000000000000000000000 c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c sdmrelease <support@strongdm.com> 1710521783 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
data/.git/packed-refs CHANGED
@@ -1,6 +1,6 @@
1
1
  # pack-refs with: peeled fully-peeled sorted
2
- c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/remotes/origin/development
3
- d8a1092c15d3618de31ada43875014d96bd21e36 refs/remotes/origin/master
2
+ f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/remotes/origin/development
3
+ c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/remotes/origin/master
4
4
  2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
5
5
  04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
6
6
  6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
@@ -102,3 +102,4 @@ e37aa2b50ffd917949a8e1c7a1fa28d12071fa69 refs/tags/v6.7.0
102
102
  3e28afb8b757876c463b22aac13ee618d9ead204 refs/tags/v6.7.1
103
103
  0429c9a2739f699ea33db7e6dd85e6be47e9190e refs/tags/v6.8.0
104
104
  d8a1092c15d3618de31ada43875014d96bd21e36 refs/tags/v6.9.0
105
+ c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/tags/v7.0.0
@@ -1 +1 @@
1
- c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c
1
+ f34575bc142eabf113dbbc5b40b3a16e0c026355
data/lib/grpc/plumbing.rb CHANGED
@@ -4878,6 +4878,7 @@ module SDM
4878
4878
  porcelain.caid = (plumbing.caID)
4879
4879
  porcelain.capoolid = (plumbing.caPoolID)
4880
4880
  porcelain.id = (plumbing.id)
4881
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
4881
4882
  porcelain.location = (plumbing.location)
4882
4883
  porcelain.name = (plumbing.name)
4883
4884
  porcelain.projectid = (plumbing.projectID)
@@ -4893,6 +4894,7 @@ module SDM
4893
4894
  plumbing.caID = (porcelain.caid)
4894
4895
  plumbing.caPoolID = (porcelain.capoolid)
4895
4896
  plumbing.id = (porcelain.id)
4897
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
4896
4898
  plumbing.location = (porcelain.location)
4897
4899
  plumbing.name = (porcelain.name)
4898
4900
  plumbing.projectID = (porcelain.projectid)
@@ -11353,6 +11355,7 @@ module SDM
11353
11355
  end
11354
11356
  porcelain = VaultAppRoleCertSSHStore.new()
11355
11357
  porcelain.id = (plumbing.id)
11358
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11356
11359
  porcelain.name = (plumbing.name)
11357
11360
  porcelain.namespace = (plumbing.namespace)
11358
11361
  porcelain.server_address = (plumbing.server_address)
@@ -11368,6 +11371,7 @@ module SDM
11368
11371
  end
11369
11372
  plumbing = V1::VaultAppRoleCertSSHStore.new()
11370
11373
  plumbing.id = (porcelain.id)
11374
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11371
11375
  plumbing.name = (porcelain.name)
11372
11376
  plumbing.namespace = (porcelain.namespace)
11373
11377
  plumbing.server_address = (porcelain.server_address)
@@ -11399,6 +11403,7 @@ module SDM
11399
11403
  end
11400
11404
  porcelain = VaultAppRoleCertX509Store.new()
11401
11405
  porcelain.id = (plumbing.id)
11406
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11402
11407
  porcelain.name = (plumbing.name)
11403
11408
  porcelain.namespace = (plumbing.namespace)
11404
11409
  porcelain.pki_mount_point = (plumbing.pki_mount_point)
@@ -11414,6 +11419,7 @@ module SDM
11414
11419
  end
11415
11420
  plumbing = V1::VaultAppRoleCertX509Store.new()
11416
11421
  plumbing.id = (porcelain.id)
11422
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11417
11423
  plumbing.name = (porcelain.name)
11418
11424
  plumbing.namespace = (porcelain.namespace)
11419
11425
  plumbing.pki_mount_point = (porcelain.pki_mount_point)
@@ -11490,6 +11496,7 @@ module SDM
11490
11496
  porcelain.client_cert_path = (plumbing.client_cert_path)
11491
11497
  porcelain.client_key_path = (plumbing.client_key_path)
11492
11498
  porcelain.id = (plumbing.id)
11499
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11493
11500
  porcelain.name = (plumbing.name)
11494
11501
  porcelain.namespace = (plumbing.namespace)
11495
11502
  porcelain.server_address = (plumbing.server_address)
@@ -11508,6 +11515,7 @@ module SDM
11508
11515
  plumbing.client_cert_path = (porcelain.client_cert_path)
11509
11516
  plumbing.client_key_path = (porcelain.client_key_path)
11510
11517
  plumbing.id = (porcelain.id)
11518
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11511
11519
  plumbing.name = (porcelain.name)
11512
11520
  plumbing.namespace = (porcelain.namespace)
11513
11521
  plumbing.server_address = (porcelain.server_address)
@@ -11542,6 +11550,7 @@ module SDM
11542
11550
  porcelain.client_cert_path = (plumbing.client_cert_path)
11543
11551
  porcelain.client_key_path = (plumbing.client_key_path)
11544
11552
  porcelain.id = (plumbing.id)
11553
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11545
11554
  porcelain.name = (plumbing.name)
11546
11555
  porcelain.namespace = (plumbing.namespace)
11547
11556
  porcelain.pki_mount_point = (plumbing.pki_mount_point)
@@ -11560,6 +11569,7 @@ module SDM
11560
11569
  plumbing.client_cert_path = (porcelain.client_cert_path)
11561
11570
  plumbing.client_key_path = (porcelain.client_key_path)
11562
11571
  plumbing.id = (porcelain.id)
11572
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11563
11573
  plumbing.name = (porcelain.name)
11564
11574
  plumbing.namespace = (porcelain.namespace)
11565
11575
  plumbing.pki_mount_point = (porcelain.pki_mount_point)
@@ -11639,6 +11649,7 @@ module SDM
11639
11649
  end
11640
11650
  porcelain = VaultTokenCertSSHStore.new()
11641
11651
  porcelain.id = (plumbing.id)
11652
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11642
11653
  porcelain.name = (plumbing.name)
11643
11654
  porcelain.namespace = (plumbing.namespace)
11644
11655
  porcelain.server_address = (plumbing.server_address)
@@ -11654,6 +11665,7 @@ module SDM
11654
11665
  end
11655
11666
  plumbing = V1::VaultTokenCertSSHStore.new()
11656
11667
  plumbing.id = (porcelain.id)
11668
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11657
11669
  plumbing.name = (porcelain.name)
11658
11670
  plumbing.namespace = (porcelain.namespace)
11659
11671
  plumbing.server_address = (porcelain.server_address)
@@ -11685,6 +11697,7 @@ module SDM
11685
11697
  end
11686
11698
  porcelain = VaultTokenCertX509Store.new()
11687
11699
  porcelain.id = (plumbing.id)
11700
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
11688
11701
  porcelain.name = (plumbing.name)
11689
11702
  porcelain.namespace = (plumbing.namespace)
11690
11703
  porcelain.pki_mount_point = (plumbing.pki_mount_point)
@@ -11700,6 +11713,7 @@ module SDM
11700
11713
  end
11701
11714
  plumbing = V1::VaultTokenCertX509Store.new()
11702
11715
  plumbing.id = (porcelain.id)
11716
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
11703
11717
  plumbing.name = (porcelain.name)
11704
11718
  plumbing.namespace = (porcelain.namespace)
11705
11719
  plumbing.pki_mount_point = (porcelain.pki_mount_point)
@@ -56,7 +56,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
56
56
  optional :name, :string, 2
57
57
  optional :caArn, :string, 5
58
58
  optional :certificateTemplateArn, :string, 7
59
- optional :issuedCertTTLMinutes, :string, 8
59
+ optional :issuedCertTTLMinutes, :int32, 8
60
60
  optional :region, :string, 3
61
61
  optional :signingAlgo, :string, 6
62
62
  optional :tags, :message, 4, "v1.Tags"
@@ -109,6 +109,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
109
109
  optional :name, :string, 2
110
110
  optional :caID, :string, 6
111
111
  optional :caPoolID, :string, 5
112
+ optional :issuedCertTTLMinutes, :int32, 7
112
113
  optional :location, :string, 4
113
114
  optional :projectID, :string, 3
114
115
  optional :tags, :message, 32771, "v1.Tags"
@@ -123,6 +124,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
123
124
  add_message "v1.VaultAppRoleCertSSHStore" do
124
125
  optional :id, :string, 1
125
126
  optional :name, :string, 2
127
+ optional :issuedCertTTLMinutes, :int32, 9
126
128
  optional :namespace, :string, 5
127
129
  optional :server_address, :string, 3
128
130
  optional :signing_role, :string, 7
@@ -132,6 +134,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
132
134
  add_message "v1.VaultAppRoleCertX509Store" do
133
135
  optional :id, :string, 1
134
136
  optional :name, :string, 2
137
+ optional :issuedCertTTLMinutes, :int32, 9
135
138
  optional :namespace, :string, 5
136
139
  optional :pki_mount_point, :string, 6
137
140
  optional :server_address, :string, 3
@@ -154,6 +157,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
154
157
  optional :CA_cert_path, :string, 4
155
158
  optional :client_cert_path, :string, 5
156
159
  optional :client_key_path, :string, 6
160
+ optional :issuedCertTTLMinutes, :int32, 11
157
161
  optional :namespace, :string, 8
158
162
  optional :server_address, :string, 3
159
163
  optional :signing_role, :string, 10
@@ -166,6 +170,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
166
170
  optional :CA_cert_path, :string, 4
167
171
  optional :client_cert_path, :string, 5
168
172
  optional :client_key_path, :string, 6
173
+ optional :issuedCertTTLMinutes, :int32, 11
169
174
  optional :namespace, :string, 8
170
175
  optional :pki_mount_point, :string, 9
171
176
  optional :server_address, :string, 3
@@ -182,6 +187,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
182
187
  add_message "v1.VaultTokenCertSSHStore" do
183
188
  optional :id, :string, 1
184
189
  optional :name, :string, 2
190
+ optional :issuedCertTTLMinutes, :int32, 9
185
191
  optional :namespace, :string, 5
186
192
  optional :server_address, :string, 3
187
193
  optional :signing_role, :string, 7
@@ -191,6 +197,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
191
197
  add_message "v1.VaultTokenCertX509Store" do
192
198
  optional :id, :string, 1
193
199
  optional :name, :string, 2
200
+ optional :issuedCertTTLMinutes, :int32, 8
194
201
  optional :namespace, :string, 5
195
202
  optional :pki_mount_point, :string, 6
196
203
  optional :server_address, :string, 3
@@ -458,7 +458,6 @@ module SDM
458
458
  end
459
459
  end
460
460
 
461
- # AWSCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
462
461
  class AWSCertX509Store
463
462
  # The ARN of the CA in AWS Private CA
464
463
  attr_accessor :caarn
@@ -466,7 +465,7 @@ module SDM
466
465
  attr_accessor :certificatetemplatearn
467
466
  # Unique identifier of the SecretStore.
468
467
  attr_accessor :id
469
- # The lifetime of certificates issued by this CA represented in minutes e.g. 600 (for 10 hours). Defaults to 8 hours if not provided.
468
+ # The lifetime of certificates issued by this CA represented in minutes.
470
469
  attr_accessor :issuedcertttlminutes
471
470
  # Unique human-readable name of the SecretStore.
472
471
  attr_accessor :name
@@ -490,7 +489,7 @@ module SDM
490
489
  @caarn = caarn == nil ? "" : caarn
491
490
  @certificatetemplatearn = certificatetemplatearn == nil ? "" : certificatetemplatearn
492
491
  @id = id == nil ? "" : id
493
- @issuedcertttlminutes = issuedcertttlminutes == nil ? "" : issuedcertttlminutes
492
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
494
493
  @name = name == nil ? "" : name
495
494
  @region = region == nil ? "" : region
496
495
  @signingalgo = signingalgo == nil ? "" : signingalgo
@@ -1506,7 +1505,6 @@ module SDM
1506
1505
  end
1507
1506
  end
1508
1507
 
1509
- # ActiveDirectoryStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
1510
1508
  class ActiveDirectoryStore
1511
1509
  # Unique identifier of the SecretStore.
1512
1510
  attr_accessor :id
@@ -4648,7 +4646,6 @@ module SDM
4648
4646
  end
4649
4647
  end
4650
4648
 
4651
- # GCPCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
4652
4649
  class GCPCertX509Store
4653
4650
  # The ID of the target CA
4654
4651
  attr_accessor :caid
@@ -4656,6 +4653,8 @@ module SDM
4656
4653
  attr_accessor :capoolid
4657
4654
  # Unique identifier of the SecretStore.
4658
4655
  attr_accessor :id
4656
+ # The lifetime of certificates issued by this CA represented in minutes.
4657
+ attr_accessor :issuedcertttlminutes
4659
4658
  # The Region for the CA in GCP format e.g. us-west1
4660
4659
  attr_accessor :location
4661
4660
  # Unique human-readable name of the SecretStore.
@@ -4669,6 +4668,7 @@ module SDM
4669
4668
  caid: nil,
4670
4669
  capoolid: nil,
4671
4670
  id: nil,
4671
+ issuedcertttlminutes: nil,
4672
4672
  location: nil,
4673
4673
  name: nil,
4674
4674
  projectid: nil,
@@ -4677,6 +4677,7 @@ module SDM
4677
4677
  @caid = caid == nil ? "" : caid
4678
4678
  @capoolid = capoolid == nil ? "" : capoolid
4679
4679
  @id = id == nil ? "" : id
4680
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
4680
4681
  @location = location == nil ? "" : location
4681
4682
  @name = name == nil ? "" : name
4682
4683
  @projectid = projectid == nil ? "" : projectid
@@ -10547,10 +10548,11 @@ module SDM
10547
10548
  end
10548
10549
  end
10549
10550
 
10550
- # VaultAppRoleCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
10551
10551
  class VaultAppRoleCertSSHStore
10552
10552
  # Unique identifier of the SecretStore.
10553
10553
  attr_accessor :id
10554
+ # The lifetime of certificates issued by this CA represented in minutes.
10555
+ attr_accessor :issuedcertttlminutes
10554
10556
  # Unique human-readable name of the SecretStore.
10555
10557
  attr_accessor :name
10556
10558
  # The namespace to make requests within
@@ -10566,6 +10568,7 @@ module SDM
10566
10568
 
10567
10569
  def initialize(
10568
10570
  id: nil,
10571
+ issuedcertttlminutes: nil,
10569
10572
  name: nil,
10570
10573
  namespace: nil,
10571
10574
  server_address: nil,
@@ -10574,6 +10577,7 @@ module SDM
10574
10577
  tags: nil
10575
10578
  )
10576
10579
  @id = id == nil ? "" : id
10580
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10577
10581
  @name = name == nil ? "" : name
10578
10582
  @namespace = namespace == nil ? "" : namespace
10579
10583
  @server_address = server_address == nil ? "" : server_address
@@ -10591,10 +10595,11 @@ module SDM
10591
10595
  end
10592
10596
  end
10593
10597
 
10594
- # VaultAppRoleCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10595
10598
  class VaultAppRoleCertX509Store
10596
10599
  # Unique identifier of the SecretStore.
10597
10600
  attr_accessor :id
10601
+ # The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
10602
+ attr_accessor :issuedcertttlminutes
10598
10603
  # Unique human-readable name of the SecretStore.
10599
10604
  attr_accessor :name
10600
10605
  # The namespace to make requests within
@@ -10610,6 +10615,7 @@ module SDM
10610
10615
 
10611
10616
  def initialize(
10612
10617
  id: nil,
10618
+ issuedcertttlminutes: nil,
10613
10619
  name: nil,
10614
10620
  namespace: nil,
10615
10621
  pki_mount_point: nil,
@@ -10618,6 +10624,7 @@ module SDM
10618
10624
  tags: nil
10619
10625
  )
10620
10626
  @id = id == nil ? "" : id
10627
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10621
10628
  @name = name == nil ? "" : name
10622
10629
  @namespace = namespace == nil ? "" : namespace
10623
10630
  @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
@@ -10670,7 +10677,6 @@ module SDM
10670
10677
  end
10671
10678
  end
10672
10679
 
10673
- # VaultTLSCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
10674
10680
  class VaultTLSCertSSHStore
10675
10681
  # A path to a CA file accessible by a Node
10676
10682
  attr_accessor :ca_cert_path
@@ -10680,6 +10686,8 @@ module SDM
10680
10686
  attr_accessor :client_key_path
10681
10687
  # Unique identifier of the SecretStore.
10682
10688
  attr_accessor :id
10689
+ # The lifetime of certificates issued by this CA represented in minutes.
10690
+ attr_accessor :issuedcertttlminutes
10683
10691
  # Unique human-readable name of the SecretStore.
10684
10692
  attr_accessor :name
10685
10693
  # The namespace to make requests within
@@ -10698,6 +10706,7 @@ module SDM
10698
10706
  client_cert_path: nil,
10699
10707
  client_key_path: nil,
10700
10708
  id: nil,
10709
+ issuedcertttlminutes: nil,
10701
10710
  name: nil,
10702
10711
  namespace: nil,
10703
10712
  server_address: nil,
@@ -10709,6 +10718,7 @@ module SDM
10709
10718
  @client_cert_path = client_cert_path == nil ? "" : client_cert_path
10710
10719
  @client_key_path = client_key_path == nil ? "" : client_key_path
10711
10720
  @id = id == nil ? "" : id
10721
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10712
10722
  @name = name == nil ? "" : name
10713
10723
  @namespace = namespace == nil ? "" : namespace
10714
10724
  @server_address = server_address == nil ? "" : server_address
@@ -10726,7 +10736,6 @@ module SDM
10726
10736
  end
10727
10737
  end
10728
10738
 
10729
- # VaultTLSCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10730
10739
  class VaultTLSCertX509Store
10731
10740
  # A path to a CA file accessible by a Node
10732
10741
  attr_accessor :ca_cert_path
@@ -10736,6 +10745,8 @@ module SDM
10736
10745
  attr_accessor :client_key_path
10737
10746
  # Unique identifier of the SecretStore.
10738
10747
  attr_accessor :id
10748
+ # The lifetime of certificates issued by this CA represented in minutes.
10749
+ attr_accessor :issuedcertttlminutes
10739
10750
  # Unique human-readable name of the SecretStore.
10740
10751
  attr_accessor :name
10741
10752
  # The namespace to make requests within
@@ -10754,6 +10765,7 @@ module SDM
10754
10765
  client_cert_path: nil,
10755
10766
  client_key_path: nil,
10756
10767
  id: nil,
10768
+ issuedcertttlminutes: nil,
10757
10769
  name: nil,
10758
10770
  namespace: nil,
10759
10771
  pki_mount_point: nil,
@@ -10765,6 +10777,7 @@ module SDM
10765
10777
  @client_cert_path = client_cert_path == nil ? "" : client_cert_path
10766
10778
  @client_key_path = client_key_path == nil ? "" : client_key_path
10767
10779
  @id = id == nil ? "" : id
10780
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10768
10781
  @name = name == nil ? "" : name
10769
10782
  @namespace = namespace == nil ? "" : namespace
10770
10783
  @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
@@ -10829,10 +10842,11 @@ module SDM
10829
10842
  end
10830
10843
  end
10831
10844
 
10832
- # VaultTokenCertSSHStore is currently unstable, and its API may change, or it may be removed, without a major version bump.
10833
10845
  class VaultTokenCertSSHStore
10834
10846
  # Unique identifier of the SecretStore.
10835
10847
  attr_accessor :id
10848
+ # The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
10849
+ attr_accessor :issuedcertttlminutes
10836
10850
  # Unique human-readable name of the SecretStore.
10837
10851
  attr_accessor :name
10838
10852
  # The namespace to make requests within
@@ -10848,6 +10862,7 @@ module SDM
10848
10862
 
10849
10863
  def initialize(
10850
10864
  id: nil,
10865
+ issuedcertttlminutes: nil,
10851
10866
  name: nil,
10852
10867
  namespace: nil,
10853
10868
  server_address: nil,
@@ -10856,6 +10871,7 @@ module SDM
10856
10871
  tags: nil
10857
10872
  )
10858
10873
  @id = id == nil ? "" : id
10874
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10859
10875
  @name = name == nil ? "" : name
10860
10876
  @namespace = namespace == nil ? "" : namespace
10861
10877
  @server_address = server_address == nil ? "" : server_address
@@ -10873,10 +10889,11 @@ module SDM
10873
10889
  end
10874
10890
  end
10875
10891
 
10876
- # VaultTokenCertX509Store is currently unstable, and its API may change, or it may be removed, without a major version bump.
10877
10892
  class VaultTokenCertX509Store
10878
10893
  # Unique identifier of the SecretStore.
10879
10894
  attr_accessor :id
10895
+ # The lifetime of certificates issued by this CA represented in minutes.
10896
+ attr_accessor :issuedcertttlminutes
10880
10897
  # Unique human-readable name of the SecretStore.
10881
10898
  attr_accessor :name
10882
10899
  # The namespace to make requests within
@@ -10892,6 +10909,7 @@ module SDM
10892
10909
 
10893
10910
  def initialize(
10894
10911
  id: nil,
10912
+ issuedcertttlminutes: nil,
10895
10913
  name: nil,
10896
10914
  namespace: nil,
10897
10915
  pki_mount_point: nil,
@@ -10900,6 +10918,7 @@ module SDM
10900
10918
  tags: nil
10901
10919
  )
10902
10920
  @id = id == nil ? "" : id
10921
+ @issuedcertttlminutes = issuedcertttlminutes == nil ? 0 : issuedcertttlminutes
10903
10922
  @name = name == nil ? "" : name
10904
10923
  @namespace = namespace == nil ? "" : namespace
10905
10924
  @pki_mount_point = pki_mount_point == nil ? "" : pki_mount_point
data/lib/strongdm.rb CHANGED
@@ -29,7 +29,7 @@ module SDM #:nodoc:
29
29
  DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
30
30
  DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
31
31
  API_VERSION = "2024-03-14"
32
- USER_AGENT = "strongdm-sdk-ruby/7.0.0"
32
+ USER_AGENT = "strongdm-sdk-ruby/7.1.0"
33
33
  private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
34
34
 
35
35
  # Creates a new strongDM API client.
data/lib/version CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "7.0.0"
16
+ VERSION = "7.1.0"
17
17
  end
data/lib/version.rb CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "7.0.0"
16
+ VERSION = "7.1.0"
17
17
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: strongdm
3
3
  version: !ruby/object:Gem::Version
4
- version: 7.0.0
4
+ version: 7.1.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - strongDM Team
@@ -81,8 +81,8 @@ files:
81
81
  - "./.git/logs/HEAD"
82
82
  - "./.git/logs/refs/heads/master"
83
83
  - "./.git/logs/refs/remotes/origin/HEAD"
84
- - "./.git/objects/pack/pack-35100f17336a9a56e777373870676ef90dc420dc.idx"
85
- - "./.git/objects/pack/pack-35100f17336a9a56e777373870676ef90dc420dc.pack"
84
+ - "./.git/objects/pack/pack-9cd0615b40bc7f8b12560a1af725da3a06bcb1d9.idx"
85
+ - "./.git/objects/pack/pack-9cd0615b40bc7f8b12560a1af725da3a06bcb1d9.pack"
86
86
  - "./.git/packed-refs"
87
87
  - "./.git/refs/heads/master"
88
88
  - "./.git/refs/remotes/origin/HEAD"