strongdm 8.0.0 → 8.1.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1692786ff878322b92229abdcf3a833c53a3ac2fcc282c908b88746b39c50a10
4
- data.tar.gz: 523e925b33b3b3246e53f3819820c50095305ad79c486e6b21cb09e5558c89e7
3
+ metadata.gz: 9126b0fed8d1f9d6bace10080c99994b18fea3dfb5d10728cb14f0ccbf2cac5b
4
+ data.tar.gz: 45523efb30a4a5615704eac6078c24187c8033739066669afac11c30c032f2ac
5
5
  SHA512:
6
- metadata.gz: 8d6a587a20eb66b2d917c2587f553f98325d1e270b8f321ce628eb3d22fb5b0437b655e5f3ed2b38e48971d3e6302775db7473e3d1397bc436e77cba926fe65e
7
- data.tar.gz: 8cb03acd29cce7f386c47956607d3e3e2b7457cd30200fcfdcf4760bb3a0539bf4811d7ad42c4ea88c0b707405a069b4bdb86fd5ff418e0c506585f52d2d4f86
6
+ metadata.gz: 8b95773f4109c5e056bcfb92dd4b95ebc52eec97e178c8794622e2169e4bae765f420df3a763d5cf94bf37f1a1f443732abb1344cd4174f8d66d629cb47ed1d5
7
+ data.tar.gz: 66429d1d6759fb9f349b8fc110ae80ff297f43f3ae7bb98f6ac56de3f8fd338a6f0ecef79b81f4430e787c4974c433a0313e66510f70b9b67efa5f77ae58a2d1
data/.git/ORIG_HEAD CHANGED
@@ -1 +1 @@
1
- f34575bc142eabf113dbbc5b40b3a16e0c026355
1
+ 7659a644ef149debee2515386136b7e2d5e917ea
data/.git/index CHANGED
Binary file
data/.git/logs/HEAD CHANGED
@@ -1,3 +1,3 @@
1
- 0000000000000000000000000000000000000000 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- f34575bc142eabf113dbbc5b40b3a16e0c026355 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 checkout: moving from master to master
3
- f34575bc142eabf113dbbc5b40b3a16e0c026355 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1712692017 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 7659a644ef149debee2515386136b7e2d5e917ea 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 checkout: moving from master to master
3
+ 7659a644ef149debee2515386136b7e2d5e917ea 14ef2b24960a5e854b60586884494ed913221b5b sdmrelease <support@strongdm.com> 1714059057 +0000 merge origin/development: Fast-forward
@@ -1,2 +1,2 @@
1
- 0000000000000000000000000000000000000000 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
- f34575bc142eabf113dbbc5b40b3a16e0c026355 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1712692017 +0000 merge origin/development: Fast-forward
1
+ 0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
2
+ 7659a644ef149debee2515386136b7e2d5e917ea 14ef2b24960a5e854b60586884494ed913221b5b sdmrelease <support@strongdm.com> 1714059057 +0000 merge origin/development: Fast-forward
@@ -1 +1 @@
1
- 0000000000000000000000000000000000000000 f34575bc142eabf113dbbc5b40b3a16e0c026355 sdmrelease <support@strongdm.com> 1712692017 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
1
+ 0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
data/.git/packed-refs CHANGED
@@ -1,6 +1,6 @@
1
1
  # pack-refs with: peeled fully-peeled sorted
2
- 7659a644ef149debee2515386136b7e2d5e917ea refs/remotes/origin/development
3
- f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/remotes/origin/master
2
+ 14ef2b24960a5e854b60586884494ed913221b5b refs/remotes/origin/development
3
+ 7659a644ef149debee2515386136b7e2d5e917ea refs/remotes/origin/master
4
4
  2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
5
5
  04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
6
6
  6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
@@ -104,3 +104,4 @@ e37aa2b50ffd917949a8e1c7a1fa28d12071fa69 refs/tags/v6.7.0
104
104
  d8a1092c15d3618de31ada43875014d96bd21e36 refs/tags/v6.9.0
105
105
  c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/tags/v7.0.0
106
106
  f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/tags/v7.1.0
107
+ 7659a644ef149debee2515386136b7e2d5e917ea refs/tags/v8.0.0
@@ -1 +1 @@
1
- 7659a644ef149debee2515386136b7e2d5e917ea
1
+ 14ef2b24960a5e854b60586884494ed913221b5b
data/lib/constants.rb CHANGED
@@ -241,9 +241,13 @@ module SDM
241
241
  REMOTE_IDENTITY_GROUP_CREATED = "remote identity group created"
242
242
  REMOTE_IDENTITY_GROUP_UPDATED = "remote identity group updated"
243
243
  REMOTE_IDENTITY_GROUP_DELETED = "remote identity group deleted"
244
+ IDENTITY_SET_PROVISIONING_ENABLED = "identity set provisioning enabled"
245
+ IDENTITY_SET_PROVISIONING_DISABLED = "identity set provisioning disabled"
244
246
  REMOTE_IDENTITY_CREATED = "remote identity created"
245
247
  REMOTE_IDENTITY_UPDATED = "remote identity updated"
246
248
  REMOTE_IDENTITY_DELETED = "remote identity deleted"
249
+ IDENTITY_ALIAS_PROVISIONING_ENABLED = "identity alias provisioning enabled"
250
+ IDENTITY_ALIAS_PROVISIONING_DISABLED = "identity alias provisioning disabled"
247
251
  ACCESS_REQUESTED_TO_RESOURCE = "access requested to resource"
248
252
  ACCESS_REQUEST_TO_RESOURCE_APPROVAL_ADDED = "access request to resource approval added"
249
253
  ACCESS_REQUEST_TO_RESOURCE_CANCELED = "access request to resource canceled"
@@ -44,6 +44,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
44
44
  repeated :targets, :string, 1941306
45
45
  optional :terraform_docs, :message, 1941304, "v1.TerraformDocs"
46
46
  optional :custom, :message, 1941305, "v1.CustomOptions"
47
+ optional :terraform_datasource_only, :bool, 1941307
47
48
  end
48
49
  add_message "v1.OneofOptions" do
49
50
  repeated :common_fields, :string, 1941381
data/lib/grpc/plumbing.rb CHANGED
@@ -5416,6 +5416,64 @@ module SDM
5416
5416
  end
5417
5417
  items
5418
5418
  end
5419
+ def self.convert_keyfactor_x_509_store_to_porcelain(plumbing)
5420
+ if plumbing == nil
5421
+ return nil
5422
+ end
5423
+ porcelain = KeyfactorX509Store.new()
5424
+ porcelain.ca_file_path = (plumbing.ca_file_path)
5425
+ porcelain.certificate_file_path = (plumbing.certificate_file_path)
5426
+ porcelain.default_certificate_authority_name = (plumbing.default_certificate_authority_name)
5427
+ porcelain.default_certificate_profile_name = (plumbing.default_certificate_profile_name)
5428
+ porcelain.default_end_entity_profile_name = (plumbing.default_end_entity_profile_name)
5429
+ porcelain.enrollment_code_env_var = (plumbing.enrollment_code_env_var)
5430
+ porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
5431
+ porcelain.id = (plumbing.id)
5432
+ porcelain.key_file_path = (plumbing.key_file_path)
5433
+ porcelain.key_password_env_var = (plumbing.key_password_env_var)
5434
+ porcelain.name = (plumbing.name)
5435
+ porcelain.server_address = (plumbing.server_address)
5436
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
5437
+ porcelain
5438
+ end
5439
+
5440
+ def self.convert_keyfactor_x_509_store_to_plumbing(porcelain)
5441
+ if porcelain == nil
5442
+ return nil
5443
+ end
5444
+ plumbing = V1::KeyfactorX509Store.new()
5445
+ plumbing.ca_file_path = (porcelain.ca_file_path)
5446
+ plumbing.certificate_file_path = (porcelain.certificate_file_path)
5447
+ plumbing.default_certificate_authority_name = (porcelain.default_certificate_authority_name)
5448
+ plumbing.default_certificate_profile_name = (porcelain.default_certificate_profile_name)
5449
+ plumbing.default_end_entity_profile_name = (porcelain.default_end_entity_profile_name)
5450
+ plumbing.enrollment_code_env_var = (porcelain.enrollment_code_env_var)
5451
+ plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
5452
+ plumbing.id = (porcelain.id)
5453
+ plumbing.key_file_path = (porcelain.key_file_path)
5454
+ plumbing.key_password_env_var = (porcelain.key_password_env_var)
5455
+ plumbing.name = (porcelain.name)
5456
+ plumbing.server_address = (porcelain.server_address)
5457
+ plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
5458
+ plumbing
5459
+ end
5460
+ def self.convert_repeated_keyfactor_x_509_store_to_plumbing(porcelains)
5461
+ items = Array.new
5462
+ porcelains.each do |porcelain|
5463
+ plumbing = convert_keyfactor_x_509_store_to_plumbing(porcelain)
5464
+ items.append(plumbing)
5465
+ end
5466
+ items
5467
+ end
5468
+
5469
+ def self.convert_repeated_keyfactor_x_509_store_to_porcelain(plumbings)
5470
+ items = Array.new
5471
+ plumbings.each do |plumbing|
5472
+ porcelain = convert_keyfactor_x_509_store_to_porcelain(plumbing)
5473
+ items.append(porcelain)
5474
+ end
5475
+ items
5476
+ end
5419
5477
  def self.convert_kubernetes_to_porcelain(plumbing)
5420
5478
  if plumbing == nil
5421
5479
  return nil
@@ -10373,6 +10431,9 @@ module SDM
10373
10431
  if porcelain.instance_of? GCPCertX509Store
10374
10432
  plumbing.gcp_cert_x_509 = convert_gcp_cert_x_509_store_to_plumbing(porcelain)
10375
10433
  end
10434
+ if porcelain.instance_of? KeyfactorX509Store
10435
+ plumbing.keyfactor_x_509 = convert_keyfactor_x_509_store_to_plumbing(porcelain)
10436
+ end
10376
10437
  if porcelain.instance_of? VaultAppRoleStore
10377
10438
  plumbing.vault_app_role = convert_vault_app_role_store_to_plumbing(porcelain)
10378
10439
  end
@@ -10437,6 +10498,9 @@ module SDM
10437
10498
  if plumbing.gcp_cert_x_509 != nil
10438
10499
  return convert_gcp_cert_x_509_store_to_porcelain(plumbing.gcp_cert_x_509)
10439
10500
  end
10501
+ if plumbing.keyfactor_x_509 != nil
10502
+ return convert_keyfactor_x_509_store_to_porcelain(plumbing.keyfactor_x_509)
10503
+ end
10440
10504
  if plumbing.vault_app_role != nil
10441
10505
  return convert_vault_app_role_store_to_porcelain(plumbing.vault_app_role)
10442
10506
  end
@@ -34,6 +34,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
34
34
  optional :delinea, :message, 2900, "v1.DelineaStore"
35
35
  optional :gcp, :message, 201, "v1.GCPStore"
36
36
  optional :gcp_cert_x_509, :message, 202, "v1.GCPCertX509Store"
37
+ optional :keyfactor_x_509, :message, 200, "v1.KeyfactorX509Store"
37
38
  optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
38
39
  optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
39
40
  optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
@@ -114,6 +115,21 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
114
115
  optional :projectID, :string, 3
115
116
  optional :tags, :message, 32771, "v1.Tags"
116
117
  end
118
+ add_message "v1.KeyfactorX509Store" do
119
+ optional :id, :string, 1
120
+ optional :name, :string, 2
121
+ optional :ca_file_path, :string, 6
122
+ optional :certificate_file_path, :string, 4
123
+ optional :default_certificate_authority_name, :string, 10
124
+ optional :default_certificate_profile_name, :string, 8
125
+ optional :default_end_entity_profile_name, :string, 9
126
+ optional :enrollment_code_env_var, :string, 12
127
+ optional :enrollment_username_env_var, :string, 11
128
+ optional :key_file_path, :string, 5
129
+ optional :key_password_env_var, :string, 7
130
+ optional :server_address, :string, 3
131
+ optional :tags, :message, 32771, "v1.Tags"
132
+ end
117
133
  add_message "v1.VaultAppRoleStore" do
118
134
  optional :id, :string, 1
119
135
  optional :name, :string, 2
@@ -219,6 +235,7 @@ module V1
219
235
  DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
220
236
  GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
221
237
  GCPCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPCertX509Store").msgclass
238
+ KeyfactorX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorX509Store").msgclass
222
239
  VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
223
240
  VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
224
241
  VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
@@ -5253,6 +5253,79 @@ module SDM
5253
5253
  end
5254
5254
  end
5255
5255
 
5256
+ class KeyfactorX509Store
5257
+ # Path to the root CA that signed the certificate passed to the client for HTTPS connection.
5258
+ # This is not required if the CA is trusted by the host operating system. This should be a PEM
5259
+ # formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
5260
+ attr_accessor :ca_file_path
5261
+ # Path to client certificate in PEM format. This certificate must contain a client certificate that
5262
+ # is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
5263
+ # key associated with the certificate, but KeyFile can also be set to configure the private key.
5264
+ attr_accessor :certificate_file_path
5265
+ # Name of EJBCA certificate authority that will enroll CSR.
5266
+ attr_accessor :default_certificate_authority_name
5267
+ # Certificate profile name that EJBCA will enroll the CSR with.
5268
+ attr_accessor :default_certificate_profile_name
5269
+ # End entity profile that EJBCA will enroll the CSR with.
5270
+ attr_accessor :default_end_entity_profile_name
5271
+ # code used by EJBCA during enrollment. May be left blank if no code is required.
5272
+ attr_accessor :enrollment_code_env_var
5273
+ # username that used by the EJBCA during enrollment. This can be left out.
5274
+ # If so, the username must be auto-generated on the Keyfactor side.
5275
+ attr_accessor :enrollment_username_env_var
5276
+ # Unique identifier of the SecretStore.
5277
+ attr_accessor :id
5278
+ # Path to private key in PEM format. This file should contain the private key associated with the
5279
+ # client certificate configured in CertificateFile.
5280
+ attr_accessor :key_file_path
5281
+ # optional environment variable housing the password that is used to decrypt the key file.
5282
+ attr_accessor :key_password_env_var
5283
+ # Unique human-readable name of the SecretStore.
5284
+ attr_accessor :name
5285
+ # the host of the Key Factor CA
5286
+ attr_accessor :server_address
5287
+ # Tags is a map of key, value pairs.
5288
+ attr_accessor :tags
5289
+
5290
+ def initialize(
5291
+ ca_file_path: nil,
5292
+ certificate_file_path: nil,
5293
+ default_certificate_authority_name: nil,
5294
+ default_certificate_profile_name: nil,
5295
+ default_end_entity_profile_name: nil,
5296
+ enrollment_code_env_var: nil,
5297
+ enrollment_username_env_var: nil,
5298
+ id: nil,
5299
+ key_file_path: nil,
5300
+ key_password_env_var: nil,
5301
+ name: nil,
5302
+ server_address: nil,
5303
+ tags: nil
5304
+ )
5305
+ @ca_file_path = ca_file_path == nil ? "" : ca_file_path
5306
+ @certificate_file_path = certificate_file_path == nil ? "" : certificate_file_path
5307
+ @default_certificate_authority_name = default_certificate_authority_name == nil ? "" : default_certificate_authority_name
5308
+ @default_certificate_profile_name = default_certificate_profile_name == nil ? "" : default_certificate_profile_name
5309
+ @default_end_entity_profile_name = default_end_entity_profile_name == nil ? "" : default_end_entity_profile_name
5310
+ @enrollment_code_env_var = enrollment_code_env_var == nil ? "" : enrollment_code_env_var
5311
+ @enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
5312
+ @id = id == nil ? "" : id
5313
+ @key_file_path = key_file_path == nil ? "" : key_file_path
5314
+ @key_password_env_var = key_password_env_var == nil ? "" : key_password_env_var
5315
+ @name = name == nil ? "" : name
5316
+ @server_address = server_address == nil ? "" : server_address
5317
+ @tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
5318
+ end
5319
+
5320
+ def to_json(options = {})
5321
+ hash = {}
5322
+ self.instance_variables.each do |var|
5323
+ hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
5324
+ end
5325
+ hash.to_json
5326
+ end
5327
+ end
5328
+
5256
5329
  class Kubernetes
5257
5330
  # The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
5258
5331
  attr_accessor :bind_interface
data/lib/strongdm.rb CHANGED
@@ -29,7 +29,7 @@ module SDM #:nodoc:
29
29
  DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
30
30
  DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
31
31
  API_VERSION = "2024-03-28"
32
- USER_AGENT = "strongdm-sdk-ruby/8.0.0"
32
+ USER_AGENT = "strongdm-sdk-ruby/8.1.0"
33
33
  private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
34
34
 
35
35
  # Creates a new strongDM API client.
data/lib/svc.rb CHANGED
@@ -4508,6 +4508,7 @@ module SDM #:nodoc:
4508
4508
  # {DelineaStore}
4509
4509
  # {GCPStore}
4510
4510
  # {GCPCertX509Store}
4511
+ # {KeyfactorX509Store}
4511
4512
  # {VaultAppRoleStore}
4512
4513
  # {VaultAppRoleCertSSHStore}
4513
4514
  # {VaultAppRoleCertX509Store}
data/lib/version CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "8.0.0"
16
+ VERSION = "8.1.0"
17
17
  end
data/lib/version.rb CHANGED
@@ -13,5 +13,5 @@
13
13
  # limitations under the License.
14
14
  #
15
15
  module SDM
16
- VERSION = "8.0.0"
16
+ VERSION = "8.1.0"
17
17
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: strongdm
3
3
  version: !ruby/object:Gem::Version
4
- version: 8.0.0
4
+ version: 8.1.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - strongDM Team
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-04-09 00:00:00.000000000 Z
11
+ date: 2024-04-25 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: grpc
@@ -81,8 +81,8 @@ files:
81
81
  - "./.git/logs/HEAD"
82
82
  - "./.git/logs/refs/heads/master"
83
83
  - "./.git/logs/refs/remotes/origin/HEAD"
84
- - "./.git/objects/pack/pack-69c9823403bcd0961320d5e472ca7682c217e13f.idx"
85
- - "./.git/objects/pack/pack-69c9823403bcd0961320d5e472ca7682c217e13f.pack"
84
+ - "./.git/objects/pack/pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.idx"
85
+ - "./.git/objects/pack/pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.pack"
86
86
  - "./.git/packed-refs"
87
87
  - "./.git/refs/heads/master"
88
88
  - "./.git/refs/remotes/origin/HEAD"