mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-06-14 10:53:34 +00:00
rebase: Bump github.com/IBM/keyprotect-go-client from 0.9.2 to 0.10.0
Bumps [github.com/IBM/keyprotect-go-client](https://github.com/IBM/keyprotect-go-client) from 0.9.2 to 0.10.0. - [Release notes](https://github.com/IBM/keyprotect-go-client/releases) - [Changelog](https://github.com/IBM/keyprotect-go-client/blob/master/CHANGELOG.md) - [Commits](https://github.com/IBM/keyprotect-go-client/compare/v0.9.2...v0.10.0) --- updated-dependencies: - dependency-name: github.com/IBM/keyprotect-go-client dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
This commit is contained in:
committed by
Madhu Rajanna
parent
09a858d51d
commit
7b44054a7e
4
vendor/github.com/IBM/keyprotect-go-client/.travis.yml
generated
vendored
4
vendor/github.com/IBM/keyprotect-go-client/.travis.yml
generated
vendored
@ -30,8 +30,8 @@ script:
|
||||
|
||||
# To enable semantic-release, uncomment these sections.
|
||||
before_deploy:
|
||||
- nvm install 14
|
||||
- npm install -g npm@6.x
|
||||
- nvm install node
|
||||
- npm install -g npm
|
||||
- npm install @semantic-release/changelog
|
||||
- npm install @semantic-release/exec
|
||||
- npm install @semantic-release/git
|
||||
|
20
vendor/github.com/IBM/keyprotect-go-client/instances.go
generated
vendored
20
vendor/github.com/IBM/keyprotect-go-client/instances.go
generated
vendored
@ -532,21 +532,11 @@ func (c *Client) SetInstancePolicies(ctx context.Context, policies MultiplePolic
|
||||
},
|
||||
}
|
||||
|
||||
if policies.KeyCreateImportAccess.CreateRootKey {
|
||||
policy.PolicyData.Attributes.CreateRootKey = &policies.KeyCreateImportAccess.CreateRootKey
|
||||
}
|
||||
if policies.KeyCreateImportAccess.CreateStandardKey {
|
||||
policy.PolicyData.Attributes.CreateStandardKey = &policies.KeyCreateImportAccess.CreateStandardKey
|
||||
}
|
||||
if policies.KeyCreateImportAccess.ImportRootKey {
|
||||
policy.PolicyData.Attributes.ImportRootKey = &policies.KeyCreateImportAccess.ImportRootKey
|
||||
}
|
||||
if policies.KeyCreateImportAccess.ImportStandardKey {
|
||||
policy.PolicyData.Attributes.ImportStandardKey = &policies.KeyCreateImportAccess.ImportStandardKey
|
||||
}
|
||||
if policies.KeyCreateImportAccess.EnforceToken {
|
||||
policy.PolicyData.Attributes.EnforceToken = &policies.KeyCreateImportAccess.EnforceToken
|
||||
}
|
||||
policy.PolicyData.Attributes.CreateRootKey = &policies.KeyCreateImportAccess.CreateRootKey
|
||||
policy.PolicyData.Attributes.CreateStandardKey = &policies.KeyCreateImportAccess.CreateStandardKey
|
||||
policy.PolicyData.Attributes.ImportRootKey = &policies.KeyCreateImportAccess.ImportRootKey
|
||||
policy.PolicyData.Attributes.ImportStandardKey = &policies.KeyCreateImportAccess.ImportStandardKey
|
||||
policy.PolicyData.Attributes.EnforceToken = &policies.KeyCreateImportAccess.EnforceToken
|
||||
|
||||
resPolicies = append(resPolicies, policy)
|
||||
}
|
||||
|
12
vendor/github.com/IBM/keyprotect-go-client/keys.go
generated
vendored
12
vendor/github.com/IBM/keyprotect-go-client/keys.go
generated
vendored
@ -400,9 +400,10 @@ type ForceOpt struct {
|
||||
|
||||
// ListKeyVersionsOptions struct to add the query parameters for the ListKeyVersions function
|
||||
type ListKeyVersionsOptions struct {
|
||||
Limit *uint32
|
||||
Offset *uint32
|
||||
TotalCount *bool
|
||||
Limit *uint32
|
||||
Offset *uint32
|
||||
TotalCount *bool
|
||||
AllKeyStates *bool
|
||||
}
|
||||
|
||||
// ListKeyVersions gets all the versions of the key resource by specifying ID of the key and/or optional parameters
|
||||
@ -427,6 +428,9 @@ func (c *Client) ListKeyVersions(ctx context.Context, idOrAlias string, listKeyV
|
||||
if listKeyVersionsOptions.TotalCount != nil {
|
||||
values.Set("totalCount", fmt.Sprint(*listKeyVersionsOptions.TotalCount))
|
||||
}
|
||||
if listKeyVersionsOptions.AllKeyStates != nil {
|
||||
values.Set("allKeyStates", fmt.Sprint(*listKeyVersionsOptions.AllKeyStates))
|
||||
}
|
||||
req.URL.RawQuery = values.Encode()
|
||||
}
|
||||
|
||||
@ -740,7 +744,7 @@ func (c *Client) InitiateDualAuthDelete(ctx context.Context, idOrAlias string) e
|
||||
// CancelDualAuthDelete unsets the key for deletion. If a key is set for deletion, it can
|
||||
// be prevented from getting deleted by unsetting the key for deletion.
|
||||
// For more information refer to the Key Protect docs in the link below:
|
||||
//https://cloud.ibm.com/docs/key-protect?topic=key-protect-delete-dual-auth-keys#unset-key-deletion-api
|
||||
// https://cloud.ibm.com/docs/key-protect?topic=key-protect-delete-dual-auth-keys#unset-key-deletion-api
|
||||
func (c *Client) CancelDualAuthDelete(ctx context.Context, idOrAlias string) error {
|
||||
_, err := c.doKeysAction(ctx, idOrAlias, "unsetKeyForDeletion", nil)
|
||||
return err
|
||||
|
3
vendor/github.com/openshift/api/security/v1/Makefile
generated
vendored
Normal file
3
vendor/github.com/openshift/api/security/v1/Makefile
generated
vendored
Normal file
@ -0,0 +1,3 @@
|
||||
.PHONY: test
|
||||
test:
|
||||
make -C ../../tests test GINKGO_EXTRA_ARGS=--focus="security.openshift.io/v1"
|
36
vendor/github.com/openshift/api/security/v1/stable.securitycontextconstraints.testsuite.yaml
generated
vendored
Normal file
36
vendor/github.com/openshift/api/security/v1/stable.securitycontextconstraints.testsuite.yaml
generated
vendored
Normal file
@ -0,0 +1,36 @@
|
||||
apiVersion: apiextensions.k8s.io/v1 # Hack because controller-gen complains if we don't have this
|
||||
name: "[Stable] SecurityContextConstraints"
|
||||
crd: 0000_03_security-openshift_01_scc.crd.yaml
|
||||
tests:
|
||||
onCreate:
|
||||
- name: Should be able to create a minimal SecurityContextConstraints
|
||||
initial: |
|
||||
apiVersion: security.openshift.io/v1
|
||||
kind: SecurityContextConstraints
|
||||
allowHostDirVolumePlugin: false
|
||||
allowHostIPC: false
|
||||
allowHostNetwork: false
|
||||
allowHostPID: false
|
||||
allowHostPorts: false
|
||||
allowPrivilegedContainer: false
|
||||
allowedCapabilities: []
|
||||
defaultAddCapabilities: []
|
||||
priority: 0
|
||||
readOnlyRootFilesystem: false
|
||||
requiredDropCapabilities: []
|
||||
volumes: []
|
||||
expected: |
|
||||
apiVersion: security.openshift.io/v1
|
||||
kind: SecurityContextConstraints
|
||||
allowHostDirVolumePlugin: false
|
||||
allowHostIPC: false
|
||||
allowHostNetwork: false
|
||||
allowHostPID: false
|
||||
allowHostPorts: false
|
||||
allowPrivilegedContainer: false
|
||||
allowedCapabilities: []
|
||||
defaultAddCapabilities: []
|
||||
priority: 0
|
||||
readOnlyRootFilesystem: false
|
||||
requiredDropCapabilities: []
|
||||
volumes: []
|
2
vendor/modules.txt
vendored
2
vendor/modules.txt
vendored
@ -1,4 +1,4 @@
|
||||
# github.com/IBM/keyprotect-go-client v0.9.2
|
||||
# github.com/IBM/keyprotect-go-client v0.10.0
|
||||
## explicit; go 1.15
|
||||
github.com/IBM/keyprotect-go-client
|
||||
github.com/IBM/keyprotect-go-client/iam
|
||||
|
Reference in New Issue
Block a user