strongdm 8.0.0 → 8.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.git/ORIG_HEAD +1 -1
- data/.git/index +0 -0
- data/.git/logs/HEAD +3 -3
- data/.git/logs/refs/heads/master +2 -2
- data/.git/logs/refs/remotes/origin/HEAD +1 -1
- data/.git/objects/pack/{pack-69c9823403bcd0961320d5e472ca7682c217e13f.idx → pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.idx} +0 -0
- data/.git/objects/pack/{pack-69c9823403bcd0961320d5e472ca7682c217e13f.pack → pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.pack} +0 -0
- data/.git/packed-refs +3 -2
- data/.git/refs/heads/master +1 -1
- data/lib/constants.rb +4 -0
- data/lib/grpc/options_pb.rb +1 -0
- data/lib/grpc/plumbing.rb +64 -0
- data/lib/grpc/secret_store_types_pb.rb +17 -0
- data/lib/models/porcelain.rb +73 -0
- data/lib/strongdm.rb +1 -1
- data/lib/svc.rb +1 -0
- data/lib/version +1 -1
- data/lib/version.rb +1 -1
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 9126b0fed8d1f9d6bace10080c99994b18fea3dfb5d10728cb14f0ccbf2cac5b
|
4
|
+
data.tar.gz: 45523efb30a4a5615704eac6078c24187c8033739066669afac11c30c032f2ac
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8b95773f4109c5e056bcfb92dd4b95ebc52eec97e178c8794622e2169e4bae765f420df3a763d5cf94bf37f1a1f443732abb1344cd4174f8d66d629cb47ed1d5
|
7
|
+
data.tar.gz: 66429d1d6759fb9f349b8fc110ae80ff297f43f3ae7bb98f6ac56de3f8fd338a6f0ecef79b81f4430e787c4974c433a0313e66510f70b9b67efa5f77ae58a2d1
|
data/.git/ORIG_HEAD
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
7659a644ef149debee2515386136b7e2d5e917ea
|
data/.git/index
CHANGED
Binary file
|
data/.git/logs/HEAD
CHANGED
@@ -1,3 +1,3 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
2
|
-
|
3
|
-
|
1
|
+
0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
2
|
+
7659a644ef149debee2515386136b7e2d5e917ea 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 checkout: moving from master to master
|
3
|
+
7659a644ef149debee2515386136b7e2d5e917ea 14ef2b24960a5e854b60586884494ed913221b5b sdmrelease <support@strongdm.com> 1714059057 +0000 merge origin/development: Fast-forward
|
data/.git/logs/refs/heads/master
CHANGED
@@ -1,2 +1,2 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
2
|
-
|
1
|
+
0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
2
|
+
7659a644ef149debee2515386136b7e2d5e917ea 14ef2b24960a5e854b60586884494ed913221b5b sdmrelease <support@strongdm.com> 1714059057 +0000 merge origin/development: Fast-forward
|
@@ -1 +1 @@
|
|
1
|
-
0000000000000000000000000000000000000000
|
1
|
+
0000000000000000000000000000000000000000 7659a644ef149debee2515386136b7e2d5e917ea sdmrelease <support@strongdm.com> 1714059057 +0000 clone: from github.com:strongdm/strongdm-sdk-ruby.git
|
Binary file
|
Binary file
|
data/.git/packed-refs
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
# pack-refs with: peeled fully-peeled sorted
|
2
|
-
|
3
|
-
|
2
|
+
14ef2b24960a5e854b60586884494ed913221b5b refs/remotes/origin/development
|
3
|
+
7659a644ef149debee2515386136b7e2d5e917ea refs/remotes/origin/master
|
4
4
|
2e4fe8087177ddea9b3991ca499f758384839c89 refs/tags/untagged-84fd83a4484c785cce63
|
5
5
|
04f604866214fab4d5663b5171a3e596331577bd refs/tags/v0.9.4
|
6
6
|
6f9a7b75b345c65fb554884907b7060680c807b7 refs/tags/v0.9.5
|
@@ -104,3 +104,4 @@ e37aa2b50ffd917949a8e1c7a1fa28d12071fa69 refs/tags/v6.7.0
|
|
104
104
|
d8a1092c15d3618de31ada43875014d96bd21e36 refs/tags/v6.9.0
|
105
105
|
c69cd1f08e014470bbe2e4dbc4ad494d4bf78d6c refs/tags/v7.0.0
|
106
106
|
f34575bc142eabf113dbbc5b40b3a16e0c026355 refs/tags/v7.1.0
|
107
|
+
7659a644ef149debee2515386136b7e2d5e917ea refs/tags/v8.0.0
|
data/.git/refs/heads/master
CHANGED
@@ -1 +1 @@
|
|
1
|
-
|
1
|
+
14ef2b24960a5e854b60586884494ed913221b5b
|
data/lib/constants.rb
CHANGED
@@ -241,9 +241,13 @@ module SDM
|
|
241
241
|
REMOTE_IDENTITY_GROUP_CREATED = "remote identity group created"
|
242
242
|
REMOTE_IDENTITY_GROUP_UPDATED = "remote identity group updated"
|
243
243
|
REMOTE_IDENTITY_GROUP_DELETED = "remote identity group deleted"
|
244
|
+
IDENTITY_SET_PROVISIONING_ENABLED = "identity set provisioning enabled"
|
245
|
+
IDENTITY_SET_PROVISIONING_DISABLED = "identity set provisioning disabled"
|
244
246
|
REMOTE_IDENTITY_CREATED = "remote identity created"
|
245
247
|
REMOTE_IDENTITY_UPDATED = "remote identity updated"
|
246
248
|
REMOTE_IDENTITY_DELETED = "remote identity deleted"
|
249
|
+
IDENTITY_ALIAS_PROVISIONING_ENABLED = "identity alias provisioning enabled"
|
250
|
+
IDENTITY_ALIAS_PROVISIONING_DISABLED = "identity alias provisioning disabled"
|
247
251
|
ACCESS_REQUESTED_TO_RESOURCE = "access requested to resource"
|
248
252
|
ACCESS_REQUEST_TO_RESOURCE_APPROVAL_ADDED = "access request to resource approval added"
|
249
253
|
ACCESS_REQUEST_TO_RESOURCE_CANCELED = "access request to resource canceled"
|
data/lib/grpc/options_pb.rb
CHANGED
@@ -44,6 +44,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
44
44
|
repeated :targets, :string, 1941306
|
45
45
|
optional :terraform_docs, :message, 1941304, "v1.TerraformDocs"
|
46
46
|
optional :custom, :message, 1941305, "v1.CustomOptions"
|
47
|
+
optional :terraform_datasource_only, :bool, 1941307
|
47
48
|
end
|
48
49
|
add_message "v1.OneofOptions" do
|
49
50
|
repeated :common_fields, :string, 1941381
|
data/lib/grpc/plumbing.rb
CHANGED
@@ -5416,6 +5416,64 @@ module SDM
|
|
5416
5416
|
end
|
5417
5417
|
items
|
5418
5418
|
end
|
5419
|
+
def self.convert_keyfactor_x_509_store_to_porcelain(plumbing)
|
5420
|
+
if plumbing == nil
|
5421
|
+
return nil
|
5422
|
+
end
|
5423
|
+
porcelain = KeyfactorX509Store.new()
|
5424
|
+
porcelain.ca_file_path = (plumbing.ca_file_path)
|
5425
|
+
porcelain.certificate_file_path = (plumbing.certificate_file_path)
|
5426
|
+
porcelain.default_certificate_authority_name = (plumbing.default_certificate_authority_name)
|
5427
|
+
porcelain.default_certificate_profile_name = (plumbing.default_certificate_profile_name)
|
5428
|
+
porcelain.default_end_entity_profile_name = (plumbing.default_end_entity_profile_name)
|
5429
|
+
porcelain.enrollment_code_env_var = (plumbing.enrollment_code_env_var)
|
5430
|
+
porcelain.enrollment_username_env_var = (plumbing.enrollment_username_env_var)
|
5431
|
+
porcelain.id = (plumbing.id)
|
5432
|
+
porcelain.key_file_path = (plumbing.key_file_path)
|
5433
|
+
porcelain.key_password_env_var = (plumbing.key_password_env_var)
|
5434
|
+
porcelain.name = (plumbing.name)
|
5435
|
+
porcelain.server_address = (plumbing.server_address)
|
5436
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
5437
|
+
porcelain
|
5438
|
+
end
|
5439
|
+
|
5440
|
+
def self.convert_keyfactor_x_509_store_to_plumbing(porcelain)
|
5441
|
+
if porcelain == nil
|
5442
|
+
return nil
|
5443
|
+
end
|
5444
|
+
plumbing = V1::KeyfactorX509Store.new()
|
5445
|
+
plumbing.ca_file_path = (porcelain.ca_file_path)
|
5446
|
+
plumbing.certificate_file_path = (porcelain.certificate_file_path)
|
5447
|
+
plumbing.default_certificate_authority_name = (porcelain.default_certificate_authority_name)
|
5448
|
+
plumbing.default_certificate_profile_name = (porcelain.default_certificate_profile_name)
|
5449
|
+
plumbing.default_end_entity_profile_name = (porcelain.default_end_entity_profile_name)
|
5450
|
+
plumbing.enrollment_code_env_var = (porcelain.enrollment_code_env_var)
|
5451
|
+
plumbing.enrollment_username_env_var = (porcelain.enrollment_username_env_var)
|
5452
|
+
plumbing.id = (porcelain.id)
|
5453
|
+
plumbing.key_file_path = (porcelain.key_file_path)
|
5454
|
+
plumbing.key_password_env_var = (porcelain.key_password_env_var)
|
5455
|
+
plumbing.name = (porcelain.name)
|
5456
|
+
plumbing.server_address = (porcelain.server_address)
|
5457
|
+
plumbing.tags = convert_tags_to_plumbing(porcelain.tags)
|
5458
|
+
plumbing
|
5459
|
+
end
|
5460
|
+
def self.convert_repeated_keyfactor_x_509_store_to_plumbing(porcelains)
|
5461
|
+
items = Array.new
|
5462
|
+
porcelains.each do |porcelain|
|
5463
|
+
plumbing = convert_keyfactor_x_509_store_to_plumbing(porcelain)
|
5464
|
+
items.append(plumbing)
|
5465
|
+
end
|
5466
|
+
items
|
5467
|
+
end
|
5468
|
+
|
5469
|
+
def self.convert_repeated_keyfactor_x_509_store_to_porcelain(plumbings)
|
5470
|
+
items = Array.new
|
5471
|
+
plumbings.each do |plumbing|
|
5472
|
+
porcelain = convert_keyfactor_x_509_store_to_porcelain(plumbing)
|
5473
|
+
items.append(porcelain)
|
5474
|
+
end
|
5475
|
+
items
|
5476
|
+
end
|
5419
5477
|
def self.convert_kubernetes_to_porcelain(plumbing)
|
5420
5478
|
if plumbing == nil
|
5421
5479
|
return nil
|
@@ -10373,6 +10431,9 @@ module SDM
|
|
10373
10431
|
if porcelain.instance_of? GCPCertX509Store
|
10374
10432
|
plumbing.gcp_cert_x_509 = convert_gcp_cert_x_509_store_to_plumbing(porcelain)
|
10375
10433
|
end
|
10434
|
+
if porcelain.instance_of? KeyfactorX509Store
|
10435
|
+
plumbing.keyfactor_x_509 = convert_keyfactor_x_509_store_to_plumbing(porcelain)
|
10436
|
+
end
|
10376
10437
|
if porcelain.instance_of? VaultAppRoleStore
|
10377
10438
|
plumbing.vault_app_role = convert_vault_app_role_store_to_plumbing(porcelain)
|
10378
10439
|
end
|
@@ -10437,6 +10498,9 @@ module SDM
|
|
10437
10498
|
if plumbing.gcp_cert_x_509 != nil
|
10438
10499
|
return convert_gcp_cert_x_509_store_to_porcelain(plumbing.gcp_cert_x_509)
|
10439
10500
|
end
|
10501
|
+
if plumbing.keyfactor_x_509 != nil
|
10502
|
+
return convert_keyfactor_x_509_store_to_porcelain(plumbing.keyfactor_x_509)
|
10503
|
+
end
|
10440
10504
|
if plumbing.vault_app_role != nil
|
10441
10505
|
return convert_vault_app_role_store_to_porcelain(plumbing.vault_app_role)
|
10442
10506
|
end
|
@@ -34,6 +34,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
34
34
|
optional :delinea, :message, 2900, "v1.DelineaStore"
|
35
35
|
optional :gcp, :message, 201, "v1.GCPStore"
|
36
36
|
optional :gcp_cert_x_509, :message, 202, "v1.GCPCertX509Store"
|
37
|
+
optional :keyfactor_x_509, :message, 200, "v1.KeyfactorX509Store"
|
37
38
|
optional :vault_app_role, :message, 4, "v1.VaultAppRoleStore"
|
38
39
|
optional :vault_app_role_cert_ssh, :message, 94, "v1.VaultAppRoleCertSSHStore"
|
39
40
|
optional :vault_app_role_cert_x_509, :message, 95, "v1.VaultAppRoleCertX509Store"
|
@@ -114,6 +115,21 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
114
115
|
optional :projectID, :string, 3
|
115
116
|
optional :tags, :message, 32771, "v1.Tags"
|
116
117
|
end
|
118
|
+
add_message "v1.KeyfactorX509Store" do
|
119
|
+
optional :id, :string, 1
|
120
|
+
optional :name, :string, 2
|
121
|
+
optional :ca_file_path, :string, 6
|
122
|
+
optional :certificate_file_path, :string, 4
|
123
|
+
optional :default_certificate_authority_name, :string, 10
|
124
|
+
optional :default_certificate_profile_name, :string, 8
|
125
|
+
optional :default_end_entity_profile_name, :string, 9
|
126
|
+
optional :enrollment_code_env_var, :string, 12
|
127
|
+
optional :enrollment_username_env_var, :string, 11
|
128
|
+
optional :key_file_path, :string, 5
|
129
|
+
optional :key_password_env_var, :string, 7
|
130
|
+
optional :server_address, :string, 3
|
131
|
+
optional :tags, :message, 32771, "v1.Tags"
|
132
|
+
end
|
117
133
|
add_message "v1.VaultAppRoleStore" do
|
118
134
|
optional :id, :string, 1
|
119
135
|
optional :name, :string, 2
|
@@ -219,6 +235,7 @@ module V1
|
|
219
235
|
DelineaStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.DelineaStore").msgclass
|
220
236
|
GCPStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPStore").msgclass
|
221
237
|
GCPCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.GCPCertX509Store").msgclass
|
238
|
+
KeyfactorX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.KeyfactorX509Store").msgclass
|
222
239
|
VaultAppRoleStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleStore").msgclass
|
223
240
|
VaultAppRoleCertSSHStore = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertSSHStore").msgclass
|
224
241
|
VaultAppRoleCertX509Store = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("v1.VaultAppRoleCertX509Store").msgclass
|
data/lib/models/porcelain.rb
CHANGED
@@ -5253,6 +5253,79 @@ module SDM
|
|
5253
5253
|
end
|
5254
5254
|
end
|
5255
5255
|
|
5256
|
+
class KeyfactorX509Store
|
5257
|
+
# Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
5258
|
+
# This is not required if the CA is trusted by the host operating system. This should be a PEM
|
5259
|
+
# formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
|
5260
|
+
attr_accessor :ca_file_path
|
5261
|
+
# Path to client certificate in PEM format. This certificate must contain a client certificate that
|
5262
|
+
# is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
|
5263
|
+
# key associated with the certificate, but KeyFile can also be set to configure the private key.
|
5264
|
+
attr_accessor :certificate_file_path
|
5265
|
+
# Name of EJBCA certificate authority that will enroll CSR.
|
5266
|
+
attr_accessor :default_certificate_authority_name
|
5267
|
+
# Certificate profile name that EJBCA will enroll the CSR with.
|
5268
|
+
attr_accessor :default_certificate_profile_name
|
5269
|
+
# End entity profile that EJBCA will enroll the CSR with.
|
5270
|
+
attr_accessor :default_end_entity_profile_name
|
5271
|
+
# code used by EJBCA during enrollment. May be left blank if no code is required.
|
5272
|
+
attr_accessor :enrollment_code_env_var
|
5273
|
+
# username that used by the EJBCA during enrollment. This can be left out.
|
5274
|
+
# If so, the username must be auto-generated on the Keyfactor side.
|
5275
|
+
attr_accessor :enrollment_username_env_var
|
5276
|
+
# Unique identifier of the SecretStore.
|
5277
|
+
attr_accessor :id
|
5278
|
+
# Path to private key in PEM format. This file should contain the private key associated with the
|
5279
|
+
# client certificate configured in CertificateFile.
|
5280
|
+
attr_accessor :key_file_path
|
5281
|
+
# optional environment variable housing the password that is used to decrypt the key file.
|
5282
|
+
attr_accessor :key_password_env_var
|
5283
|
+
# Unique human-readable name of the SecretStore.
|
5284
|
+
attr_accessor :name
|
5285
|
+
# the host of the Key Factor CA
|
5286
|
+
attr_accessor :server_address
|
5287
|
+
# Tags is a map of key, value pairs.
|
5288
|
+
attr_accessor :tags
|
5289
|
+
|
5290
|
+
def initialize(
|
5291
|
+
ca_file_path: nil,
|
5292
|
+
certificate_file_path: nil,
|
5293
|
+
default_certificate_authority_name: nil,
|
5294
|
+
default_certificate_profile_name: nil,
|
5295
|
+
default_end_entity_profile_name: nil,
|
5296
|
+
enrollment_code_env_var: nil,
|
5297
|
+
enrollment_username_env_var: nil,
|
5298
|
+
id: nil,
|
5299
|
+
key_file_path: nil,
|
5300
|
+
key_password_env_var: nil,
|
5301
|
+
name: nil,
|
5302
|
+
server_address: nil,
|
5303
|
+
tags: nil
|
5304
|
+
)
|
5305
|
+
@ca_file_path = ca_file_path == nil ? "" : ca_file_path
|
5306
|
+
@certificate_file_path = certificate_file_path == nil ? "" : certificate_file_path
|
5307
|
+
@default_certificate_authority_name = default_certificate_authority_name == nil ? "" : default_certificate_authority_name
|
5308
|
+
@default_certificate_profile_name = default_certificate_profile_name == nil ? "" : default_certificate_profile_name
|
5309
|
+
@default_end_entity_profile_name = default_end_entity_profile_name == nil ? "" : default_end_entity_profile_name
|
5310
|
+
@enrollment_code_env_var = enrollment_code_env_var == nil ? "" : enrollment_code_env_var
|
5311
|
+
@enrollment_username_env_var = enrollment_username_env_var == nil ? "" : enrollment_username_env_var
|
5312
|
+
@id = id == nil ? "" : id
|
5313
|
+
@key_file_path = key_file_path == nil ? "" : key_file_path
|
5314
|
+
@key_password_env_var = key_password_env_var == nil ? "" : key_password_env_var
|
5315
|
+
@name = name == nil ? "" : name
|
5316
|
+
@server_address = server_address == nil ? "" : server_address
|
5317
|
+
@tags = tags == nil ? SDM::_porcelain_zero_value_tags() : tags
|
5318
|
+
end
|
5319
|
+
|
5320
|
+
def to_json(options = {})
|
5321
|
+
hash = {}
|
5322
|
+
self.instance_variables.each do |var|
|
5323
|
+
hash[var.id2name.delete_prefix("@")] = self.instance_variable_get var
|
5324
|
+
end
|
5325
|
+
hash.to_json
|
5326
|
+
end
|
5327
|
+
end
|
5328
|
+
|
5256
5329
|
class Kubernetes
|
5257
5330
|
# The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
5258
5331
|
attr_accessor :bind_interface
|
data/lib/strongdm.rb
CHANGED
@@ -29,7 +29,7 @@ module SDM #:nodoc:
|
|
29
29
|
DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
|
30
30
|
DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
|
31
31
|
API_VERSION = "2024-03-28"
|
32
|
-
USER_AGENT = "strongdm-sdk-ruby/8.
|
32
|
+
USER_AGENT = "strongdm-sdk-ruby/8.1.0"
|
33
33
|
private_constant :DEFAULT_MAX_RETRIES, :DEFAULT_BASE_RETRY_DELAY, :DEFAULT_MAX_RETRY_DELAY, :API_VERSION, :USER_AGENT
|
34
34
|
|
35
35
|
# Creates a new strongDM API client.
|
data/lib/svc.rb
CHANGED
data/lib/version
CHANGED
data/lib/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: strongdm
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 8.
|
4
|
+
version: 8.1.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- strongDM Team
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-04-
|
11
|
+
date: 2024-04-25 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: grpc
|
@@ -81,8 +81,8 @@ files:
|
|
81
81
|
- "./.git/logs/HEAD"
|
82
82
|
- "./.git/logs/refs/heads/master"
|
83
83
|
- "./.git/logs/refs/remotes/origin/HEAD"
|
84
|
-
- "./.git/objects/pack/pack-
|
85
|
-
- "./.git/objects/pack/pack-
|
84
|
+
- "./.git/objects/pack/pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.idx"
|
85
|
+
- "./.git/objects/pack/pack-63b03bbfbc64adbf239ae7962c94b13e00085e38.pack"
|
86
86
|
- "./.git/packed-refs"
|
87
87
|
- "./.git/refs/heads/master"
|
88
88
|
- "./.git/refs/remotes/origin/HEAD"
|