strongdm 8.0.0 → 8.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.git/ORIG_HEAD +1 -1
- data/.git/index +0 -0
- data/.git/logs/HEAD +3 -3
- data/.git/logs/refs/heads/master +2 -2
- data/.git/logs/refs/remotes/origin/HEAD +1 -1
- data/.git/objects/pack/{pack-69c9823403bcd0961320d5e472ca7682c217e13f.idx → pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.idx} +0 -0
- data/.git/objects/pack/{pack-69c9823403bcd0961320d5e472ca7682c217e13f.pack → pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.pack} +0 -0
- data/.git/packed-refs +3 -2
- data/.git/refs/heads/master +1 -1
- data/lib/constants.rb +4 -0
- data/lib/grpc/options_pb.rb +1 -0
- data/lib/grpc/plumbing.rb +64 -0
- data/lib/grpc/secret_store_types_pb.rb +17 -0
- data/lib/models/porcelain.rb +73 -0
- data/lib/strongdm.rb +1 -1
- data/lib/svc.rb +1 -0
- data/lib/version +1 -1
- data/lib/version.rb +1 -1
- metadata +4 -4
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 9126b0fed8d1f9d6bace10080c99994b18fea3dfb5d10728cb14f0ccbf2cac5b
|
|
4
|
+
data.tar.gz: 45523efb30a4a5615704eac6078c24187c8033739066669afac11c30c032f2ac
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 8b95773f4109c5e056bcfb92dd4b95ebc52eec97e178c8794622e2169e4bae765f420df3a763d5cf94bf37f1a1f443732abb1344cd4174f8d66d629cb47ed1d5
|
|
7
|
+
data.tar.gz: 66429d1d6759fb9f349b8fc110ae80ff297f43f3ae7bb98f6ac56de3f8fd338a6f0ecef79b81f4430e787c4974c433a0313e66510f70b9b67efa5f77ae58a2d1
|
data/.git/ORIG_HEAD
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
7659a644ef149debee2515386136b7e2d5e917ea
|
data/.git/index
CHANGED
|
Binary file
|
data/.git/logs/HEAD
CHANGED
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
2
|
-
|
|
3
|
-
|
|
1
|
+
0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
2
|
+
7659a644ef149debee2515386136b7e2d5e917ea 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 checkout: moving from master to master
|
|
3
|
+
7659a644ef149debee2515386136b7e2d5e917ea 14ef2b24960a5e854b60586884494ed913221b5b sdmrelease <support@strongdm.com> 1714059057 +0000 merge origin/development: Fast-forward
|
data/.git/logs/refs/heads/master
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
2
|
-
|
|
1
|
+
0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
2
|
+
7659a644ef149debee2515386136b7e2d5e917ea 14ef2b24960a5e854b60586884494ed913221b5b sdmrelease <support@strongdm.com> 1714059057 +0000 merge origin/development: Fast-forward
|
|
@@ -1 +1 @@
|
|
|
1
|
-
0000000000000000000000000000000000000000
|
|
1
|
+
0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
|
Binary file
|
|
Binary file
|
data/.git/packed-refs
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
# pack-refs with: peeled fully-peeled sorted
|
|
2
|
-
|
|
3
|
-
|
|
2
|
+
14ef2b24960a5e854b60586884494ed913221b5b refs/remotes/origin/development
|
|
3
|
+
7659a644ef149debee2515386136b7e2d5e917ea refs/remotes/origin/master
|
|
4
4
|
2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
|
|
5
5
|
04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
|
|
6
6
|
6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
|
|
@@ -104,3 +104,4 @@ e37aa2b50ffd917949a8e1c7a1fa28d12071fa69 refs/tags/v6.7.0
|
|
|
104
104
|
d8a1092c15d3618de31ada43875014d96bd21e36 refs/tags/v6.9.0
|
|
105
105
|
c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/tags/v7.0.0
|
|
106
106
|
f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/tags/v7.1.0
|
|
107
|
+
7659a644ef149debee2515386136b7e2d5e917ea refs/tags/v8.0.0
|
data/.git/refs/heads/master
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
14ef2b24960a5e854b60586884494ed913221b5b
|
data/lib/constants.rb
CHANGED
|
@@ -241,9 +241,13 @@ module SDM
|
|
|
241
241
|
REMOTE_IDENTITY_GROUP_CREATED = "remote identity group created"
|
|
242
242
|
REMOTE_IDENTITY_GROUP_UPDATED = "remote identity group updated"
|
|
243
243
|
REMOTE_IDENTITY_GROUP_DELETED = "remote identity group deleted"
|
|
244
|
+
IDENTITY_SET_PROVISIONING_ENABLED = "identity set provisioning enabled"
|
|
245
|
+
IDENTITY_SET_PROVISIONING_DISABLED = "identity set provisioning disabled"
|
|
244
246
|
REMOTE_IDENTITY_CREATED = "remote identity created"
|
|
245
247
|
REMOTE_IDENTITY_UPDATED = "remote identity updated"
|
|
246
248
|
REMOTE_IDENTITY_DELETED = "remote identity deleted"
|
|
249
|
+
IDENTITY_ALIAS_PROVISIONING_ENABLED = "identity alias provisioning enabled"
|
|
250
|
+
IDENTITY_ALIAS_PROVISIONING_DISABLED = "identity alias provisioning disabled"
|
|
247
251
|
ACCESS_REQUESTED_TO_RESOURCE = "access requested to resource"
|
|
248
252
|
ACCESS_REQUEST_TO_RESOURCE_APPROVAL_ADDED = "access request to resource approval added"
|
|
249
253
|
ACCESS_REQUEST_TO_RESOURCE_CANCELED = "access request to resource canceled"
|
data/lib/grpc/options_pb.rb
CHANGED
|
@@ -44,6 +44,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
44
44
|
repeated :targets, :string, 1941306
|
|
45
45
|
optional :terraform_docs, :message, 1941304, "v1.TerraformDocs"
|
|
46
46
|
optional :custom, :message, 1941305, "v1.CustomOptions"
|
|
47
|
+
optional :terraform_datasource_only, :bool, 1941307
|
|
47
48
|
end
|
|
48
49
|
add_message "v1.OneofOptions" do
|
|
49
50
|
repeated :common_fields, :string, 1941381
|
data/lib/grpc/plumbing.rb
CHANGED
|
@@ -5416,6 +5416,64 @@ module SDM
|
|
|
5416
5416
|
end
|
|
5417
5417
|
items
|
|
5418
5418
|
end
|
|
5419
|
+
def self.convert_keyfactor_x_509_store_to_porcelain(plumbing)
|
|
5420
|
+
if plumbing == nil
|
|
5421
|
+
return nil
|
|
5422
|
+
end
|
|
5423
|
+
porcelain = KeyfactorX509Store.new()
|
|
5424
|
+
porcelain.ca_file_path = (plumbing.ca_file_path)
|
|
5425
|
+
porcelain.certificate_file_path = (plumbing.certificate_file_path)
|
|
5426
|
+
porcelain.default_certificate_authority_name = (plumbing.default_certificate_authority_name)
|
|
5427
|
+
porcelain.default_certificate_profile_name = (plumbing.default_certificate_profile_name)
|
|
5428
|
+
porcelain.default_end_entity_profile_name = (plumbing.default_end_entity_profile_name)
|
|
5429
|
+
porcelain.enrollment_code_env_var = (plumbing.enrollment_code_env_var)
|
|
5430
|
+
porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
|
|
5431
|
+
porcelain.id = (plumbing.id)
|
|
5432
|
+
porcelain.key_file_path = (plumbing.key_file_path)
|
|
5433
|
+
porcelain.key_password_env_var = (plumbing.key_password_env_var)
|
|
5434
|
+
porcelain.name = (plumbing.name)
|
|
5435
|
+
porcelain.server_address = (plumbing.server_address)
|
|
5436
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
5437
|
+
porcelain
|
|
5438
|
+
end
|
|
5439
|
+
|
|
5440
|
+
def self.convert_keyfactor_x_509_store_to_plumbing(porcelain)
|
|
5441
|
+
if porcelain == nil
|
|
5442
|
+
return nil
|
|
5443
|
+
end
|
|
5444
|
+
plumbing = V1::KeyfactorX509Store.new()
|
|
5445
|
+
plumbing.ca_file_path = (porcelain.ca_file_path)
|
|
5446
|
+
plumbing.certificate_file_path = (porcelain.certificate_file_path)
|
|
5447
|
+
plumbing.default_certificate_authority_name = (porcelain.default_certificate_authority_name)
|
|
5448
|
+
plumbing.default_certificate_profile_name = (porcelain.default_certificate_profile_name)
|
|
5449
|
+
plumbing.default_end_entity_profile_name = (porcelain.default_end_entity_profile_name)
|
|
5450
|
+
plumbing.enrollment_code_env_var = (porcelain.enrollment_code_env_var)
|
|
5451
|
+
plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
|
|
5452
|
+
plumbing.id = (porcelain.id)
|
|
5453
|
+
plumbing.key_file_path = (porcelain.key_file_path)
|
|
5454
|
+
plumbing.key_password_env_var = (porcelain.key_password_env_var)
|
|
5455
|
+
plumbing.name = (porcelain.name)
|
|
5456
|
+
plumbing.server_address = (porcelain.server_address)
|
|
5457
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
|
5458
|
+
plumbing
|
|
5459
|
+
end
|
|
5460
|
+
def self.convert_repeated_keyfactor_x_509_store_to_plumbing(porcelains)
|
|
5461
|
+
items = Array.new
|
|
5462
|
+
porcelains.each do |porcelain|
|
|
5463
|
+
plumbing = convert_keyfactor_x_509_store_to_plumbing(porcelain)
|
|
5464
|
+
items.append(plumbing)
|
|
5465
|
+
end
|
|
5466
|
+
items
|
|
5467
|
+
end
|
|
5468
|
+
|
|
5469
|
+
def self.convert_repeated_keyfactor_x_509_store_to_porcelain(plumbings)
|
|
5470
|
+
items = Array.new
|
|
5471
|
+
plumbings.each do |plumbing|
|
|
5472
|
+
porcelain = convert_keyfactor_x_509_store_to_porcelain(plumbing)
|
|
5473
|
+
items.append(porcelain)
|
|
5474
|
+
end
|
|
5475
|
+
items
|
|
5476
|
+
end
|
|
5419
5477
|
def self.convert_kubernetes_to_porcelain(plumbing)
|
|
5420
5478
|
if plumbing == nil
|
|
5421
5479
|
return nil
|
|
@@ -10373,6 +10431,9 @@ module SDM
|
|
|
10373
10431
|
if porcelain.instance_of? GCPCertX509Store
|
|
10374
10432
|
plumbing.gcp_cert_x_509 = convert_gcp_cert_x_509_store_to_plumbing(porcelain)
|
|
10375
10433
|
end
|
|
10434
|
+
if porcelain.instance_of? KeyfactorX509Store
|
|
10435
|
+
plumbing.keyfactor_x_509 = convert_keyfactor_x_509_store_to_plumbing(porcelain)
|
|
10436
|
+
end
|
|
10376
10437
|
if porcelain.instance_of? VaultAppRoleStore
|
|
10377
10438
|
plumbing.vault_app_role = convert_vault_app_role_store_to_plumbing(porcelain)
|
|
10378
10439
|
end
|
|
@@ -10437,6 +10498,9 @@ module SDM
|
|
|
10437
10498
|
if plumbing.gcp_cert_x_509 != nil
|
|
10438
10499
|
return convert_gcp_cert_x_509_store_to_porcelain(plumbing.gcp_cert_x_509)
|
|
10439
10500
|
end
|
|
10501
|
+
if plumbing.keyfactor_x_509 != nil
|
|
10502
|
+
return convert_keyfactor_x_509_store_to_porcelain(plumbing.keyfactor_x_509)
|
|
10503
|
+
end
|
|
10440
10504
|
if plumbing.vault_app_role != nil
|
|
10441
10505
|
return convert_vault_app_role_store_to_porcelain(plumbing.vault_app_role)
|
|
10442
10506
|
end
|
|
@@ -34,6 +34,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
34
34
|
optional :delinea, :message, 2900, "v1.DelineaStore"
|
|
35
35
|
optional :gcp, :message, 201, "v1.GCPStore"
|
|
36
36
|
optional :gcp_cert_x_509, :message, 202, "v1.GCPCertX509Store"
|
|
37
|
+
optional :keyfactor_x_509, :message, 200, "v1.KeyfactorX509Store"
|
|
37
38
|
optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
|
|
38
39
|
optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
|
|
39
40
|
optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
|
|
@@ -114,6 +115,21 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
|
114
115
|
optional :projectID, :string, 3
|
|
115
116
|
optional :tags, :message, 32771, "v1.Tags"
|
|
116
117
|
end
|
|
118
|
+
add_message "v1.KeyfactorX509Store" do
|
|
119
|
+
optional :id, :string, 1
|
|
120
|
+
optional :name, :string, 2
|
|
121
|
+
optional :ca_file_path, :string, 6
|
|
122
|
+
optional :certificate_file_path, :string, 4
|
|
123
|
+
optional :default_certificate_authority_name, :string, 10
|
|
124
|
+
optional :default_certificate_profile_name, :string, 8
|
|
125
|
+
optional :default_end_entity_profile_name, :string, 9
|
|
126
|
+
optional :enrollment_code_env_var, :string, 12
|
|
127
|
+
optional :enrollment_username_env_var, :string, 11
|
|
128
|
+
optional :key_file_path, :string, 5
|
|
129
|
+
optional :key_password_env_var, :string, 7
|
|
130
|
+
optional :server_address, :string, 3
|
|
131
|
+
optional :tags, :message, 32771, "v1.Tags"
|
|
132
|
+
end
|
|
117
133
|
add_message "v1.VaultAppRoleStore" do
|
|
118
134
|
optional :id, :string, 1
|
|
119
135
|
optional :name, :string, 2
|
|
@@ -219,6 +235,7 @@ module V1
|
|
|
219
235
|
DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
|
|
220
236
|
GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
|
|
221
237
|
GCPCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPCertX509Store").msgclass
|
|
238
|
+
KeyfactorX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorX509Store").msgclass
|
|
222
239
|
VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
|
|
223
240
|
VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
|
|
224
241
|
VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
|
data/lib/models/porcelain.rb
CHANGED
|
@@ -5253,6 +5253,79 @@ module SDM
|
|
|
5253
5253
|
end
|
|
5254
5254
|
end
|
|
5255
5255
|
|
|
5256
|
+
class KeyfactorX509Store
|
|
5257
|
+
# Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
|
5258
|
+
# This is not required if the CA is trusted by the host operating system. This should be a PEM
|
|
5259
|
+
# formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
|
|
5260
|
+
attr_accessor :ca_file_path
|
|
5261
|
+
# Path to client certificate in PEM format. This certificate must contain a client certificate that
|
|
5262
|
+
# is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
|
|
5263
|
+
# key associated with the certificate, but KeyFile can also be set to configure the private key.
|
|
5264
|
+
attr_accessor :certificate_file_path
|
|
5265
|
+
# Name of EJBCA certificate authority that will enroll CSR.
|
|
5266
|
+
attr_accessor :default_certificate_authority_name
|
|
5267
|
+
# Certificate profile name that EJBCA will enroll the CSR with.
|
|
5268
|
+
attr_accessor :default_certificate_profile_name
|
|
5269
|
+
# End entity profile that EJBCA will enroll the CSR with.
|
|
5270
|
+
attr_accessor :default_end_entity_profile_name
|
|
5271
|
+
# code used by EJBCA during enrollment. May be left blank if no code is required.
|
|
5272
|
+
attr_accessor :enrollment_code_env_var
|
|
5273
|
+
# username that used by the EJBCA during enrollment. This can be left out.
|
|
5274
|
+
# If so, the username must be auto-generated on the Keyfactor side.
|
|
5275
|
+
attr_accessor :enrollment_username_env_var
|
|
5276
|
+
# Unique identifier of the SecretStore.
|
|
5277
|
+
attr_accessor :id
|
|
5278
|
+
# Path to private key in PEM format. This file should contain the private key associated with the
|
|
5279
|
+
# client certificate configured in CertificateFile.
|
|
5280
|
+
attr_accessor :key_file_path
|
|
5281
|
+
# optional environment variable housing the password that is used to decrypt the key file.
|
|
5282
|
+
attr_accessor :key_password_env_var
|
|
5283
|
+
# Unique human-readable name of the SecretStore.
|
|
5284
|
+
attr_accessor :name
|
|
5285
|
+
# the host of the Key Factor CA
|
|
5286
|
+
attr_accessor :server_address
|
|
5287
|
+
# Tags is a map of key, value pairs.
|
|
5288
|
+
attr_accessor :tags
|
|
5289
|
+
|
|
5290
|
+
def initialize(
|
|
5291
|
+
ca_file_path: nil,
|
|
5292
|
+
certificate_file_path: nil,
|
|
5293
|
+
default_certificate_authority_name: nil,
|
|
5294
|
+
default_certificate_profile_name: nil,
|
|
5295
|
+
default_end_entity_profile_name: nil,
|
|
5296
|
+
enrollment_code_env_var: nil,
|
|
5297
|
+
enrollment_username_env_var: nil,
|
|
5298
|
+
id: nil,
|
|
5299
|
+
key_file_path: nil,
|
|
5300
|
+
key_password_env_var: nil,
|
|
5301
|
+
name: nil,
|
|
5302
|
+
server_address: nil,
|
|
5303
|
+
tags: nil
|
|
5304
|
+
)
|
|
5305
|
+
@ca_file_path = ca_file_path == nil ? "" : ca_file_path
|
|
5306
|
+
@certificate_file_path = certificate_file_path == nil ? "" : certificate_file_path
|
|
5307
|
+
@default_certificate_authority_name = default_certificate_authority_name == nil ? "" : default_certificate_authority_name
|
|
5308
|
+
@default_certificate_profile_name = default_certificate_profile_name == nil ? "" : default_certificate_profile_name
|
|
5309
|
+
@default_end_entity_profile_name = default_end_entity_profile_name == nil ? "" : default_end_entity_profile_name
|
|
5310
|
+
@enrollment_code_env_var = enrollment_code_env_var == nil ? "" : enrollment_code_env_var
|
|
5311
|
+
@enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
|
|
5312
|
+
@id = id == nil ? "" : id
|
|
5313
|
+
@key_file_path = key_file_path == nil ? "" : key_file_path
|
|
5314
|
+
@key_password_env_var = key_password_env_var == nil ? "" : key_password_env_var
|
|
5315
|
+
@name = name == nil ? "" : name
|
|
5316
|
+
@server_address = server_address == nil ? "" : server_address
|
|
5317
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
|
5318
|
+
end
|
|
5319
|
+
|
|
5320
|
+
def to_json(options = {})
|
|
5321
|
+
hash = {}
|
|
5322
|
+
self.instance_variables.each do |var|
|
|
5323
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
|
5324
|
+
end
|
|
5325
|
+
hash.to_json
|
|
5326
|
+
end
|
|
5327
|
+
end
|
|
5328
|
+
|
|
5256
5329
|
class Kubernetes
|
|
5257
5330
|
# The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
|
5258
5331
|
attr_accessor :bind_interface
|
data/lib/strongdm.rb
CHANGED
|
@@ -29,7 +29,7 @@ module SDM #:nodoc:
|
|
|
29
29
|
DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
|
|
30
30
|
DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
|
|
31
31
|
API_VERSION = "2024-03-28"
|
|
32
|
-
USER_AGENT = "strongdm-sdk-ruby/8.
|
|
32
|
+
USER_AGENT = "strongdm-sdk-ruby/8.1.0"
|
|
33
33
|
private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
|
|
34
34
|
|
|
35
35
|
# Creates a new strongDM API client.
|
data/lib/svc.rb
CHANGED
data/lib/version
CHANGED
data/lib/version.rb
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: strongdm
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 8.
|
|
4
|
+
version: 8.1.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- strongDM Team
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2024-04-
|
|
11
|
+
date: 2024-04-25 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: grpc
|
|
@@ -81,8 +81,8 @@ files:
|
|
|
81
81
|
- "./.git/logs/HEAD"
|
|
82
82
|
- "./.git/logs/refs/heads/master"
|
|
83
83
|
- "./.git/logs/refs/remotes/origin/HEAD"
|
|
84
|
-
- "./.git/objects/pack/pack-
|
|
85
|
-
- "./.git/objects/pack/pack-
|
|
84
|
+
- "./.git/objects/pack/pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.idx"
|
|
85
|
+
- "./.git/objects/pack/pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.pack"
|
|
86
86
|
- "./.git/packed-refs"
|
|
87
87
|
- "./.git/refs/heads/master"
|
|
88
88
|
- "./.git/refs/remotes/origin/HEAD"
|