cribl-control-plane 0.2.1rc4__py3-none-any.whl → 0.2.1rc5__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cribl-control-plane might be problematic. Click here for more details.
- cribl_control_plane/_version.py +3 -3
- cribl_control_plane/groups_sdk.py +3 -0
- cribl_control_plane/mappings.py +1185 -0
- cribl_control_plane/models/__init__.py +149 -105
- cribl_control_plane/models/createadminproductsmappingsactivatebyproductop.py +52 -0
- cribl_control_plane/models/createadminproductsmappingsbyproductop.py +53 -0
- cribl_control_plane/models/deleteadminproductsmappingsbyproductandidop.py +51 -0
- cribl_control_plane/models/getadminproductsmappingsbyproductandidop.py +51 -0
- cribl_control_plane/models/getadminproductsmappingsbyproductop.py +44 -0
- cribl_control_plane/models/input.py +14 -14
- cribl_control_plane/models/inputappscope.py +16 -20
- cribl_control_plane/models/inputconfluentcloud.py +0 -110
- cribl_control_plane/models/inputcriblhttp.py +16 -20
- cribl_control_plane/models/inputcribllakehttp.py +16 -20
- cribl_control_plane/models/inputcribltcp.py +16 -20
- cribl_control_plane/models/inputdatadogagent.py +16 -20
- cribl_control_plane/models/inputedgeprometheus.py +36 -44
- cribl_control_plane/models/inputelastic.py +27 -44
- cribl_control_plane/models/inputeventhub.py +0 -118
- cribl_control_plane/models/inputfirehose.py +16 -20
- cribl_control_plane/models/inputgrafana.py +31 -39
- cribl_control_plane/models/inputhttp.py +16 -20
- cribl_control_plane/models/inputhttpraw.py +16 -20
- cribl_control_plane/models/inputkafka.py +0 -108
- cribl_control_plane/models/inputloki.py +16 -20
- cribl_control_plane/models/inputmetrics.py +16 -20
- cribl_control_plane/models/inputmodeldriventelemetry.py +16 -20
- cribl_control_plane/models/inputopentelemetry.py +15 -19
- cribl_control_plane/models/inputprometheus.py +36 -44
- cribl_control_plane/models/inputprometheusrw.py +16 -20
- cribl_control_plane/models/inputsplunk.py +16 -20
- cribl_control_plane/models/inputsplunkhec.py +15 -19
- cribl_control_plane/models/inputsyslog.py +31 -39
- cribl_control_plane/models/inputsystemmetrics.py +10 -20
- cribl_control_plane/models/inputtcp.py +16 -30
- cribl_control_plane/models/inputtcpjson.py +16 -20
- cribl_control_plane/models/inputwindowsmetrics.py +10 -20
- cribl_control_plane/models/inputwineventlogs.py +0 -14
- cribl_control_plane/models/inputwizwebhook.py +16 -20
- cribl_control_plane/models/inputzscalerhec.py +15 -19
- cribl_control_plane/models/mappingruleset.py +53 -0
- cribl_control_plane/models/mappingrulesetevalmappingfunction.py +71 -0
- cribl_control_plane/models/mappingrulesetgenericmappingfunction.py +29 -0
- cribl_control_plane/models/output.py +22 -22
- cribl_control_plane/models/outputazureblob.py +0 -7
- cribl_control_plane/models/outputazuredataexplorer.py +93 -283
- cribl_control_plane/models/outputazureeventhub.py +21 -169
- cribl_control_plane/models/outputazurelogs.py +21 -49
- cribl_control_plane/models/outputchronicle.py +21 -49
- cribl_control_plane/models/outputclickhouse.py +21 -49
- cribl_control_plane/models/outputcloudwatch.py +21 -49
- cribl_control_plane/models/outputconfluentcloud.py +22 -167
- cribl_control_plane/models/outputcriblhttp.py +21 -49
- cribl_control_plane/models/outputcribltcp.py +21 -49
- cribl_control_plane/models/outputcrowdstrikenextgensiem.py +22 -50
- cribl_control_plane/models/outputdatabricks.py +0 -7
- cribl_control_plane/models/outputdatadog.py +21 -49
- cribl_control_plane/models/outputdataset.py +21 -49
- cribl_control_plane/models/outputdls3.py +0 -7
- cribl_control_plane/models/outputdynatracehttp.py +21 -49
- cribl_control_plane/models/outputdynatraceotlp.py +21 -49
- cribl_control_plane/models/outputelastic.py +21 -74
- cribl_control_plane/models/outputelasticcloud.py +21 -74
- cribl_control_plane/models/outputfilesystem.py +0 -7
- cribl_control_plane/models/outputgooglechronicle.py +22 -65
- cribl_control_plane/models/outputgooglecloudlogging.py +22 -50
- cribl_control_plane/models/outputgooglecloudstorage.py +0 -7
- cribl_control_plane/models/outputgooglepubsub.py +21 -49
- cribl_control_plane/models/outputgrafanacloud.py +42 -98
- cribl_control_plane/models/outputgraphite.py +21 -49
- cribl_control_plane/models/outputhoneycomb.py +21 -49
- cribl_control_plane/models/outputhumiohec.py +21 -49
- cribl_control_plane/models/outputinfluxdb.py +21 -49
- cribl_control_plane/models/outputkafka.py +19 -162
- cribl_control_plane/models/outputkinesis.py +21 -56
- cribl_control_plane/models/outputloki.py +19 -47
- cribl_control_plane/models/outputminio.py +0 -7
- cribl_control_plane/models/outputmsk.py +19 -54
- cribl_control_plane/models/outputnewrelic.py +21 -49
- cribl_control_plane/models/outputnewrelicevents.py +22 -50
- cribl_control_plane/models/outputopentelemetry.py +21 -49
- cribl_control_plane/models/outputprometheus.py +21 -49
- cribl_control_plane/models/outputs3.py +0 -7
- cribl_control_plane/models/outputsentinel.py +21 -49
- cribl_control_plane/models/outputsentineloneaisiem.py +22 -50
- cribl_control_plane/models/outputservicenow.py +21 -49
- cribl_control_plane/models/outputsignalfx.py +21 -49
- cribl_control_plane/models/outputsns.py +19 -47
- cribl_control_plane/models/outputsplunk.py +21 -49
- cribl_control_plane/models/outputsplunkhec.py +21 -49
- cribl_control_plane/models/outputsplunklb.py +21 -49
- cribl_control_plane/models/outputsqs.py +19 -47
- cribl_control_plane/models/outputstatsd.py +21 -49
- cribl_control_plane/models/outputstatsdext.py +21 -49
- cribl_control_plane/models/outputsumologic.py +21 -49
- cribl_control_plane/models/outputsyslog.py +99 -129
- cribl_control_plane/models/outputtcpjson.py +21 -49
- cribl_control_plane/models/outputwavefront.py +21 -49
- cribl_control_plane/models/outputwebhook.py +21 -49
- cribl_control_plane/models/outputxsiam.py +19 -47
- cribl_control_plane/models/pipeline.py +4 -4
- cribl_control_plane/models/rulesetid.py +13 -0
- cribl_control_plane/models/runnablejobcollection.py +8 -12
- cribl_control_plane/models/runnablejobexecutor.py +8 -12
- cribl_control_plane/models/runnablejobscheduledsearch.py +8 -12
- cribl_control_plane/models/updateadminproductsmappingsbyproductandidop.py +63 -0
- cribl_control_plane/pipelines.py +8 -8
- {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc5.dist-info}/METADATA +11 -2
- {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc5.dist-info}/RECORD +110 -99
- {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc5.dist-info}/WHEEL +0 -0
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
|
+
|
|
3
|
+
from __future__ import annotations
|
|
4
|
+
from .productscore import ProductsCore
|
|
5
|
+
from .rulesetid import RulesetID, RulesetIDTypedDict
|
|
6
|
+
from cribl_control_plane.types import BaseModel
|
|
7
|
+
from cribl_control_plane.utils import (
|
|
8
|
+
FieldMetadata,
|
|
9
|
+
PathParamMetadata,
|
|
10
|
+
RequestMetadata,
|
|
11
|
+
validate_open_enum,
|
|
12
|
+
)
|
|
13
|
+
from pydantic.functional_validators import PlainValidator
|
|
14
|
+
from typing import List, Optional
|
|
15
|
+
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
16
|
+
|
|
17
|
+
|
|
18
|
+
class CreateAdminProductsMappingsActivateByProductRequestTypedDict(TypedDict):
|
|
19
|
+
product: ProductsCore
|
|
20
|
+
r"""Name of the Cribl product to activate the Mapping Ruleset for"""
|
|
21
|
+
ruleset_id: RulesetIDTypedDict
|
|
22
|
+
r"""RulesetId object"""
|
|
23
|
+
|
|
24
|
+
|
|
25
|
+
class CreateAdminProductsMappingsActivateByProductRequest(BaseModel):
|
|
26
|
+
product: Annotated[
|
|
27
|
+
Annotated[ProductsCore, PlainValidator(validate_open_enum(False))],
|
|
28
|
+
FieldMetadata(path=PathParamMetadata(style="simple", explode=False)),
|
|
29
|
+
]
|
|
30
|
+
r"""Name of the Cribl product to activate the Mapping Ruleset for"""
|
|
31
|
+
|
|
32
|
+
ruleset_id: Annotated[
|
|
33
|
+
RulesetID, FieldMetadata(request=RequestMetadata(media_type="application/json"))
|
|
34
|
+
]
|
|
35
|
+
r"""RulesetId object"""
|
|
36
|
+
|
|
37
|
+
|
|
38
|
+
class CreateAdminProductsMappingsActivateByProductResponseTypedDict(TypedDict):
|
|
39
|
+
r"""The <code>id</code> of the Mapping Ruleset that has been successfully activated"""
|
|
40
|
+
|
|
41
|
+
count: NotRequired[int]
|
|
42
|
+
r"""number of items present in the items array"""
|
|
43
|
+
items: NotRequired[List[RulesetIDTypedDict]]
|
|
44
|
+
|
|
45
|
+
|
|
46
|
+
class CreateAdminProductsMappingsActivateByProductResponse(BaseModel):
|
|
47
|
+
r"""The <code>id</code> of the Mapping Ruleset that has been successfully activated"""
|
|
48
|
+
|
|
49
|
+
count: Optional[int] = None
|
|
50
|
+
r"""number of items present in the items array"""
|
|
51
|
+
|
|
52
|
+
items: Optional[List[RulesetID]] = None
|
|
@@ -0,0 +1,53 @@
|
|
|
1
|
+
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
|
+
|
|
3
|
+
from __future__ import annotations
|
|
4
|
+
from .mappingruleset import MappingRuleset, MappingRulesetTypedDict
|
|
5
|
+
from .productscore import ProductsCore
|
|
6
|
+
from cribl_control_plane.types import BaseModel
|
|
7
|
+
from cribl_control_plane.utils import (
|
|
8
|
+
FieldMetadata,
|
|
9
|
+
PathParamMetadata,
|
|
10
|
+
RequestMetadata,
|
|
11
|
+
validate_open_enum,
|
|
12
|
+
)
|
|
13
|
+
from pydantic.functional_validators import PlainValidator
|
|
14
|
+
from typing import List, Optional
|
|
15
|
+
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
16
|
+
|
|
17
|
+
|
|
18
|
+
class CreateAdminProductsMappingsByProductRequestTypedDict(TypedDict):
|
|
19
|
+
product: ProductsCore
|
|
20
|
+
r"""Name of the Cribl product to create the Mapping Ruleset for"""
|
|
21
|
+
mapping_ruleset: MappingRulesetTypedDict
|
|
22
|
+
r"""MappingRuleset object"""
|
|
23
|
+
|
|
24
|
+
|
|
25
|
+
class CreateAdminProductsMappingsByProductRequest(BaseModel):
|
|
26
|
+
product: Annotated[
|
|
27
|
+
Annotated[ProductsCore, PlainValidator(validate_open_enum(False))],
|
|
28
|
+
FieldMetadata(path=PathParamMetadata(style="simple", explode=False)),
|
|
29
|
+
]
|
|
30
|
+
r"""Name of the Cribl product to create the Mapping Ruleset for"""
|
|
31
|
+
|
|
32
|
+
mapping_ruleset: Annotated[
|
|
33
|
+
MappingRuleset,
|
|
34
|
+
FieldMetadata(request=RequestMetadata(media_type="application/json")),
|
|
35
|
+
]
|
|
36
|
+
r"""MappingRuleset object"""
|
|
37
|
+
|
|
38
|
+
|
|
39
|
+
class CreateAdminProductsMappingsByProductResponseTypedDict(TypedDict):
|
|
40
|
+
r"""A list containing the newly created Mapping Ruleset objects"""
|
|
41
|
+
|
|
42
|
+
count: NotRequired[int]
|
|
43
|
+
r"""number of items present in the items array"""
|
|
44
|
+
items: NotRequired[List[MappingRulesetTypedDict]]
|
|
45
|
+
|
|
46
|
+
|
|
47
|
+
class CreateAdminProductsMappingsByProductResponse(BaseModel):
|
|
48
|
+
r"""A list containing the newly created Mapping Ruleset objects"""
|
|
49
|
+
|
|
50
|
+
count: Optional[int] = None
|
|
51
|
+
r"""number of items present in the items array"""
|
|
52
|
+
|
|
53
|
+
items: Optional[List[MappingRuleset]] = None
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
|
+
|
|
3
|
+
from __future__ import annotations
|
|
4
|
+
from .mappingruleset import MappingRuleset, MappingRulesetTypedDict
|
|
5
|
+
from .productscore import ProductsCore
|
|
6
|
+
from cribl_control_plane.types import BaseModel
|
|
7
|
+
from cribl_control_plane.utils import (
|
|
8
|
+
FieldMetadata,
|
|
9
|
+
PathParamMetadata,
|
|
10
|
+
validate_open_enum,
|
|
11
|
+
)
|
|
12
|
+
from pydantic.functional_validators import PlainValidator
|
|
13
|
+
from typing import List, Optional
|
|
14
|
+
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
15
|
+
|
|
16
|
+
|
|
17
|
+
class DeleteAdminProductsMappingsByProductAndIDRequestTypedDict(TypedDict):
|
|
18
|
+
product: ProductsCore
|
|
19
|
+
r"""Name of the Cribl product to delete the Mapping Ruleset for"""
|
|
20
|
+
id: str
|
|
21
|
+
r"""The <code>id</code> of the Mapping Ruleset to delete."""
|
|
22
|
+
|
|
23
|
+
|
|
24
|
+
class DeleteAdminProductsMappingsByProductAndIDRequest(BaseModel):
|
|
25
|
+
product: Annotated[
|
|
26
|
+
Annotated[ProductsCore, PlainValidator(validate_open_enum(False))],
|
|
27
|
+
FieldMetadata(path=PathParamMetadata(style="simple", explode=False)),
|
|
28
|
+
]
|
|
29
|
+
r"""Name of the Cribl product to delete the Mapping Ruleset for"""
|
|
30
|
+
|
|
31
|
+
id: Annotated[
|
|
32
|
+
str, FieldMetadata(path=PathParamMetadata(style="simple", explode=False))
|
|
33
|
+
]
|
|
34
|
+
r"""The <code>id</code> of the Mapping Ruleset to delete."""
|
|
35
|
+
|
|
36
|
+
|
|
37
|
+
class DeleteAdminProductsMappingsByProductAndIDResponseTypedDict(TypedDict):
|
|
38
|
+
r"""A list containing the deleted Mapping Ruleset objects"""
|
|
39
|
+
|
|
40
|
+
count: NotRequired[int]
|
|
41
|
+
r"""number of items present in the items array"""
|
|
42
|
+
items: NotRequired[List[MappingRulesetTypedDict]]
|
|
43
|
+
|
|
44
|
+
|
|
45
|
+
class DeleteAdminProductsMappingsByProductAndIDResponse(BaseModel):
|
|
46
|
+
r"""A list containing the deleted Mapping Ruleset objects"""
|
|
47
|
+
|
|
48
|
+
count: Optional[int] = None
|
|
49
|
+
r"""number of items present in the items array"""
|
|
50
|
+
|
|
51
|
+
items: Optional[List[MappingRuleset]] = None
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
|
+
|
|
3
|
+
from __future__ import annotations
|
|
4
|
+
from .mappingruleset import MappingRuleset, MappingRulesetTypedDict
|
|
5
|
+
from .productscore import ProductsCore
|
|
6
|
+
from cribl_control_plane.types import BaseModel
|
|
7
|
+
from cribl_control_plane.utils import (
|
|
8
|
+
FieldMetadata,
|
|
9
|
+
PathParamMetadata,
|
|
10
|
+
validate_open_enum,
|
|
11
|
+
)
|
|
12
|
+
from pydantic.functional_validators import PlainValidator
|
|
13
|
+
from typing import List, Optional
|
|
14
|
+
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
15
|
+
|
|
16
|
+
|
|
17
|
+
class GetAdminProductsMappingsByProductAndIDRequestTypedDict(TypedDict):
|
|
18
|
+
product: ProductsCore
|
|
19
|
+
r"""Name of the Cribl product to get the Mappings for"""
|
|
20
|
+
id: str
|
|
21
|
+
r"""The <code>id</code> of the Worker Group or Edge Fleet Mapping Ruleset to get"""
|
|
22
|
+
|
|
23
|
+
|
|
24
|
+
class GetAdminProductsMappingsByProductAndIDRequest(BaseModel):
|
|
25
|
+
product: Annotated[
|
|
26
|
+
Annotated[ProductsCore, PlainValidator(validate_open_enum(False))],
|
|
27
|
+
FieldMetadata(path=PathParamMetadata(style="simple", explode=False)),
|
|
28
|
+
]
|
|
29
|
+
r"""Name of the Cribl product to get the Mappings for"""
|
|
30
|
+
|
|
31
|
+
id: Annotated[
|
|
32
|
+
str, FieldMetadata(path=PathParamMetadata(style="simple", explode=False))
|
|
33
|
+
]
|
|
34
|
+
r"""The <code>id</code> of the Worker Group or Edge Fleet Mapping Ruleset to get"""
|
|
35
|
+
|
|
36
|
+
|
|
37
|
+
class GetAdminProductsMappingsByProductAndIDResponseTypedDict(TypedDict):
|
|
38
|
+
r"""a list of MappingRuleset objects"""
|
|
39
|
+
|
|
40
|
+
count: NotRequired[int]
|
|
41
|
+
r"""number of items present in the items array"""
|
|
42
|
+
items: NotRequired[List[MappingRulesetTypedDict]]
|
|
43
|
+
|
|
44
|
+
|
|
45
|
+
class GetAdminProductsMappingsByProductAndIDResponse(BaseModel):
|
|
46
|
+
r"""a list of MappingRuleset objects"""
|
|
47
|
+
|
|
48
|
+
count: Optional[int] = None
|
|
49
|
+
r"""number of items present in the items array"""
|
|
50
|
+
|
|
51
|
+
items: Optional[List[MappingRuleset]] = None
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
|
+
|
|
3
|
+
from __future__ import annotations
|
|
4
|
+
from .mappingruleset import MappingRuleset, MappingRulesetTypedDict
|
|
5
|
+
from .productscore import ProductsCore
|
|
6
|
+
from cribl_control_plane.types import BaseModel
|
|
7
|
+
from cribl_control_plane.utils import (
|
|
8
|
+
FieldMetadata,
|
|
9
|
+
PathParamMetadata,
|
|
10
|
+
validate_open_enum,
|
|
11
|
+
)
|
|
12
|
+
from pydantic.functional_validators import PlainValidator
|
|
13
|
+
from typing import List, Optional
|
|
14
|
+
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
15
|
+
|
|
16
|
+
|
|
17
|
+
class GetAdminProductsMappingsByProductRequestTypedDict(TypedDict):
|
|
18
|
+
product: ProductsCore
|
|
19
|
+
r"""Name of the Cribl product to list the Mapping Rulesets for"""
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
class GetAdminProductsMappingsByProductRequest(BaseModel):
|
|
23
|
+
product: Annotated[
|
|
24
|
+
Annotated[ProductsCore, PlainValidator(validate_open_enum(False))],
|
|
25
|
+
FieldMetadata(path=PathParamMetadata(style="simple", explode=False)),
|
|
26
|
+
]
|
|
27
|
+
r"""Name of the Cribl product to list the Mapping Rulesets for"""
|
|
28
|
+
|
|
29
|
+
|
|
30
|
+
class GetAdminProductsMappingsByProductResponseTypedDict(TypedDict):
|
|
31
|
+
r"""a list of MappingRuleset objects"""
|
|
32
|
+
|
|
33
|
+
count: NotRequired[int]
|
|
34
|
+
r"""number of items present in the items array"""
|
|
35
|
+
items: NotRequired[List[MappingRulesetTypedDict]]
|
|
36
|
+
|
|
37
|
+
|
|
38
|
+
class GetAdminProductsMappingsByProductResponse(BaseModel):
|
|
39
|
+
r"""a list of MappingRuleset objects"""
|
|
40
|
+
|
|
41
|
+
count: Optional[int] = None
|
|
42
|
+
r"""number of items present in the items array"""
|
|
43
|
+
|
|
44
|
+
items: Optional[List[MappingRuleset]] = None
|
|
@@ -75,59 +75,59 @@ from typing_extensions import Annotated, TypeAliasType
|
|
|
75
75
|
InputTypedDict = TypeAliasType(
|
|
76
76
|
"InputTypedDict",
|
|
77
77
|
Union[
|
|
78
|
-
InputCriblTypedDict,
|
|
79
|
-
InputKubeEventsTypedDict,
|
|
80
78
|
InputDatagenTypedDict,
|
|
79
|
+
InputKubeEventsTypedDict,
|
|
80
|
+
InputCriblTypedDict,
|
|
81
81
|
InputCriblmetricsTypedDict,
|
|
82
82
|
InputKubeMetricsTypedDict,
|
|
83
|
-
InputSystemStateTypedDict,
|
|
84
83
|
InputCollectionTypedDict,
|
|
84
|
+
InputSystemStateTypedDict,
|
|
85
85
|
InputModelDrivenTelemetryTypedDict,
|
|
86
86
|
InputSystemMetricsTypedDict,
|
|
87
87
|
InputWindowsMetricsTypedDict,
|
|
88
88
|
InputJournalFilesTypedDict,
|
|
89
|
+
InputWinEventLogsTypedDict,
|
|
89
90
|
InputRawUDPTypedDict,
|
|
90
|
-
InputKubeLogsTypedDict,
|
|
91
91
|
InputExecTypedDict,
|
|
92
|
-
|
|
92
|
+
InputKubeLogsTypedDict,
|
|
93
93
|
InputMetricsTypedDict,
|
|
94
|
-
|
|
94
|
+
InputSnmpTypedDict,
|
|
95
95
|
InputCriblTCPTypedDict,
|
|
96
96
|
InputNetflowTypedDict,
|
|
97
97
|
InputTcpjsonTypedDict,
|
|
98
98
|
InputGooglePubsubTypedDict,
|
|
99
99
|
InputOffice365ServiceTypedDict,
|
|
100
100
|
InputWizTypedDict,
|
|
101
|
+
InputTCPTypedDict,
|
|
101
102
|
InputFirehoseTypedDict,
|
|
102
103
|
InputCriblHTTPTypedDict,
|
|
103
104
|
InputDatadogAgentTypedDict,
|
|
104
105
|
InputOffice365MgmtTypedDict,
|
|
105
106
|
InputFileTypedDict,
|
|
106
|
-
InputTCPTypedDict,
|
|
107
107
|
InputSplunkTypedDict,
|
|
108
|
-
InputAppscopeTypedDict,
|
|
109
108
|
InputWefTypedDict,
|
|
109
|
+
InputAppscopeTypedDict,
|
|
110
110
|
InputHTTPRawTypedDict,
|
|
111
111
|
InputWizWebhookTypedDict,
|
|
112
|
-
InputCriblLakeHTTPTypedDict,
|
|
113
112
|
InputHTTPTypedDict,
|
|
114
|
-
|
|
115
|
-
InputSqsTypedDict,
|
|
113
|
+
InputCriblLakeHTTPTypedDict,
|
|
116
114
|
InputAzureBlobTypedDict,
|
|
115
|
+
InputSqsTypedDict,
|
|
116
|
+
InputZscalerHecTypedDict,
|
|
117
117
|
InputKinesisTypedDict,
|
|
118
118
|
InputConfluentCloudTypedDict,
|
|
119
119
|
InputEventhubTypedDict,
|
|
120
120
|
InputKafkaTypedDict,
|
|
121
121
|
InputElasticTypedDict,
|
|
122
|
-
InputSplunkHecTypedDict,
|
|
123
122
|
InputOffice365MsgTraceTypedDict,
|
|
123
|
+
InputSplunkHecTypedDict,
|
|
124
124
|
InputLokiTypedDict,
|
|
125
125
|
InputPrometheusRwTypedDict,
|
|
126
|
-
InputCrowdstrikeTypedDict,
|
|
127
126
|
InputPrometheusTypedDict,
|
|
127
|
+
InputCrowdstrikeTypedDict,
|
|
128
|
+
InputEdgePrometheusTypedDict,
|
|
128
129
|
InputOpenTelemetryTypedDict,
|
|
129
130
|
InputS3TypedDict,
|
|
130
|
-
InputEdgePrometheusTypedDict,
|
|
131
131
|
InputSecurityLakeTypedDict,
|
|
132
132
|
InputMskTypedDict,
|
|
133
133
|
InputS3InventoryTypedDict,
|
|
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
|
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
9
|
from pydantic.functional_validators import PlainValidator
|
|
10
|
-
from typing import List, Optional
|
|
10
|
+
from typing import Any, List, Optional
|
|
11
11
|
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
12
12
|
|
|
13
13
|
|
|
@@ -221,12 +221,6 @@ class InputAppscopeMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
221
221
|
|
|
222
222
|
class InputAppscopeTLSSettingsServerSideTypedDict(TypedDict):
|
|
223
223
|
disabled: NotRequired[bool]
|
|
224
|
-
request_cert: NotRequired[bool]
|
|
225
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
226
|
-
reject_unauthorized: NotRequired[bool]
|
|
227
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
228
|
-
common_name_regex: NotRequired[str]
|
|
229
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
230
224
|
certificate_name: NotRequired[str]
|
|
231
225
|
r"""The name of the predefined certificate"""
|
|
232
226
|
priv_key_path: NotRequired[str]
|
|
@@ -237,6 +231,10 @@ class InputAppscopeTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
237
231
|
r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
238
232
|
ca_path: NotRequired[str]
|
|
239
233
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
234
|
+
request_cert: NotRequired[bool]
|
|
235
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
236
|
+
reject_unauthorized: NotRequired[Any]
|
|
237
|
+
common_name_regex: NotRequired[Any]
|
|
240
238
|
min_version: NotRequired[InputAppscopeMinimumTLSVersion]
|
|
241
239
|
max_version: NotRequired[InputAppscopeMaximumTLSVersion]
|
|
242
240
|
|
|
@@ -244,19 +242,6 @@ class InputAppscopeTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
244
242
|
class InputAppscopeTLSSettingsServerSide(BaseModel):
|
|
245
243
|
disabled: Optional[bool] = True
|
|
246
244
|
|
|
247
|
-
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
248
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
249
|
-
|
|
250
|
-
reject_unauthorized: Annotated[
|
|
251
|
-
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
252
|
-
] = True
|
|
253
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
254
|
-
|
|
255
|
-
common_name_regex: Annotated[
|
|
256
|
-
Optional[str], pydantic.Field(alias="commonNameRegex")
|
|
257
|
-
] = "/.*/"
|
|
258
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
259
|
-
|
|
260
245
|
certificate_name: Annotated[
|
|
261
246
|
Optional[str], pydantic.Field(alias="certificateName")
|
|
262
247
|
] = None
|
|
@@ -274,6 +259,17 @@ class InputAppscopeTLSSettingsServerSide(BaseModel):
|
|
|
274
259
|
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
275
260
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
276
261
|
|
|
262
|
+
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
263
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
264
|
+
|
|
265
|
+
reject_unauthorized: Annotated[
|
|
266
|
+
Optional[Any], pydantic.Field(alias="rejectUnauthorized")
|
|
267
|
+
] = None
|
|
268
|
+
|
|
269
|
+
common_name_regex: Annotated[
|
|
270
|
+
Optional[Any], pydantic.Field(alias="commonNameRegex")
|
|
271
|
+
] = None
|
|
272
|
+
|
|
277
273
|
min_version: Annotated[
|
|
278
274
|
Annotated[
|
|
279
275
|
Optional[InputAppscopeMinimumTLSVersion],
|
|
@@ -341,13 +341,6 @@ class InputConfluentCloudKafkaSchemaRegistryAuthentication(BaseModel):
|
|
|
341
341
|
tls: Optional[InputConfluentCloudKafkaSchemaRegistryTLSSettingsClientSide] = None
|
|
342
342
|
|
|
343
343
|
|
|
344
|
-
class InputConfluentCloudAuthenticationMethod(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
345
|
-
r"""Enter credentials directly, or select a stored secret"""
|
|
346
|
-
|
|
347
|
-
MANUAL = "manual"
|
|
348
|
-
SECRET = "secret"
|
|
349
|
-
|
|
350
|
-
|
|
351
344
|
class InputConfluentCloudSASLMechanism(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
352
345
|
# PLAIN
|
|
353
346
|
PLAIN = "plain"
|
|
@@ -359,58 +352,13 @@ class InputConfluentCloudSASLMechanism(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
359
352
|
KERBEROS = "kerberos"
|
|
360
353
|
|
|
361
354
|
|
|
362
|
-
class InputConfluentCloudOauthParamTypedDict(TypedDict):
|
|
363
|
-
name: str
|
|
364
|
-
value: str
|
|
365
|
-
|
|
366
|
-
|
|
367
|
-
class InputConfluentCloudOauthParam(BaseModel):
|
|
368
|
-
name: str
|
|
369
|
-
|
|
370
|
-
value: str
|
|
371
|
-
|
|
372
|
-
|
|
373
|
-
class InputConfluentCloudSaslExtensionTypedDict(TypedDict):
|
|
374
|
-
name: str
|
|
375
|
-
value: str
|
|
376
|
-
|
|
377
|
-
|
|
378
|
-
class InputConfluentCloudSaslExtension(BaseModel):
|
|
379
|
-
name: str
|
|
380
|
-
|
|
381
|
-
value: str
|
|
382
|
-
|
|
383
|
-
|
|
384
355
|
class InputConfluentCloudAuthenticationTypedDict(TypedDict):
|
|
385
356
|
r"""Authentication parameters to use when connecting to brokers. Using TLS is highly recommended."""
|
|
386
357
|
|
|
387
358
|
disabled: NotRequired[bool]
|
|
388
|
-
username: NotRequired[str]
|
|
389
|
-
password: NotRequired[str]
|
|
390
|
-
auth_type: NotRequired[InputConfluentCloudAuthenticationMethod]
|
|
391
|
-
r"""Enter credentials directly, or select a stored secret"""
|
|
392
|
-
credentials_secret: NotRequired[str]
|
|
393
|
-
r"""Select or create a secret that references your credentials"""
|
|
394
359
|
mechanism: NotRequired[InputConfluentCloudSASLMechanism]
|
|
395
|
-
keytab_location: NotRequired[str]
|
|
396
|
-
r"""Location of keytab file for authentication principal"""
|
|
397
|
-
principal: NotRequired[str]
|
|
398
|
-
r"""Authentication principal, such as `kafka_user@example.com`"""
|
|
399
|
-
broker_service_class: NotRequired[str]
|
|
400
|
-
r"""Kerberos service class for Kafka brokers, such as `kafka`"""
|
|
401
360
|
oauth_enabled: NotRequired[bool]
|
|
402
361
|
r"""Enable OAuth authentication"""
|
|
403
|
-
token_url: NotRequired[str]
|
|
404
|
-
r"""URL of the token endpoint to use for OAuth authentication"""
|
|
405
|
-
client_id: NotRequired[str]
|
|
406
|
-
r"""Client ID to use for OAuth authentication"""
|
|
407
|
-
oauth_secret_type: NotRequired[str]
|
|
408
|
-
client_text_secret: NotRequired[str]
|
|
409
|
-
r"""Select or create a stored text secret"""
|
|
410
|
-
oauth_params: NotRequired[List[InputConfluentCloudOauthParamTypedDict]]
|
|
411
|
-
r"""Additional fields to send to the token endpoint, such as scope or audience"""
|
|
412
|
-
sasl_extensions: NotRequired[List[InputConfluentCloudSaslExtensionTypedDict]]
|
|
413
|
-
r"""Additional SASL extension fields, such as Confluent's logicalCluster or identityPoolId"""
|
|
414
362
|
|
|
415
363
|
|
|
416
364
|
class InputConfluentCloudAuthentication(BaseModel):
|
|
@@ -418,74 +366,16 @@ class InputConfluentCloudAuthentication(BaseModel):
|
|
|
418
366
|
|
|
419
367
|
disabled: Optional[bool] = True
|
|
420
368
|
|
|
421
|
-
username: Optional[str] = None
|
|
422
|
-
|
|
423
|
-
password: Optional[str] = None
|
|
424
|
-
|
|
425
|
-
auth_type: Annotated[
|
|
426
|
-
Annotated[
|
|
427
|
-
Optional[InputConfluentCloudAuthenticationMethod],
|
|
428
|
-
PlainValidator(validate_open_enum(False)),
|
|
429
|
-
],
|
|
430
|
-
pydantic.Field(alias="authType"),
|
|
431
|
-
] = InputConfluentCloudAuthenticationMethod.MANUAL
|
|
432
|
-
r"""Enter credentials directly, or select a stored secret"""
|
|
433
|
-
|
|
434
|
-
credentials_secret: Annotated[
|
|
435
|
-
Optional[str], pydantic.Field(alias="credentialsSecret")
|
|
436
|
-
] = None
|
|
437
|
-
r"""Select or create a secret that references your credentials"""
|
|
438
|
-
|
|
439
369
|
mechanism: Annotated[
|
|
440
370
|
Optional[InputConfluentCloudSASLMechanism],
|
|
441
371
|
PlainValidator(validate_open_enum(False)),
|
|
442
372
|
] = InputConfluentCloudSASLMechanism.PLAIN
|
|
443
373
|
|
|
444
|
-
keytab_location: Annotated[
|
|
445
|
-
Optional[str], pydantic.Field(alias="keytabLocation")
|
|
446
|
-
] = None
|
|
447
|
-
r"""Location of keytab file for authentication principal"""
|
|
448
|
-
|
|
449
|
-
principal: Optional[str] = None
|
|
450
|
-
r"""Authentication principal, such as `kafka_user@example.com`"""
|
|
451
|
-
|
|
452
|
-
broker_service_class: Annotated[
|
|
453
|
-
Optional[str], pydantic.Field(alias="brokerServiceClass")
|
|
454
|
-
] = None
|
|
455
|
-
r"""Kerberos service class for Kafka brokers, such as `kafka`"""
|
|
456
|
-
|
|
457
374
|
oauth_enabled: Annotated[Optional[bool], pydantic.Field(alias="oauthEnabled")] = (
|
|
458
375
|
False
|
|
459
376
|
)
|
|
460
377
|
r"""Enable OAuth authentication"""
|
|
461
378
|
|
|
462
|
-
token_url: Annotated[Optional[str], pydantic.Field(alias="tokenUrl")] = None
|
|
463
|
-
r"""URL of the token endpoint to use for OAuth authentication"""
|
|
464
|
-
|
|
465
|
-
client_id: Annotated[Optional[str], pydantic.Field(alias="clientId")] = None
|
|
466
|
-
r"""Client ID to use for OAuth authentication"""
|
|
467
|
-
|
|
468
|
-
oauth_secret_type: Annotated[
|
|
469
|
-
Optional[str], pydantic.Field(alias="oauthSecretType")
|
|
470
|
-
] = "secret"
|
|
471
|
-
|
|
472
|
-
client_text_secret: Annotated[
|
|
473
|
-
Optional[str], pydantic.Field(alias="clientTextSecret")
|
|
474
|
-
] = None
|
|
475
|
-
r"""Select or create a stored text secret"""
|
|
476
|
-
|
|
477
|
-
oauth_params: Annotated[
|
|
478
|
-
Optional[List[InputConfluentCloudOauthParam]],
|
|
479
|
-
pydantic.Field(alias="oauthParams"),
|
|
480
|
-
] = None
|
|
481
|
-
r"""Additional fields to send to the token endpoint, such as scope or audience"""
|
|
482
|
-
|
|
483
|
-
sasl_extensions: Annotated[
|
|
484
|
-
Optional[List[InputConfluentCloudSaslExtension]],
|
|
485
|
-
pydantic.Field(alias="saslExtensions"),
|
|
486
|
-
] = None
|
|
487
|
-
r"""Additional SASL extension fields, such as Confluent's logicalCluster or identityPoolId"""
|
|
488
|
-
|
|
489
379
|
|
|
490
380
|
class InputConfluentCloudMetadatumTypedDict(TypedDict):
|
|
491
381
|
name: str
|
|
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
|
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
9
|
from pydantic.functional_validators import PlainValidator
|
|
10
|
-
from typing import List, Optional
|
|
10
|
+
from typing import Any, List, Optional
|
|
11
11
|
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
12
12
|
|
|
13
13
|
|
|
@@ -123,12 +123,6 @@ class InputCriblHTTPMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
123
123
|
|
|
124
124
|
class InputCriblHTTPTLSSettingsServerSideTypedDict(TypedDict):
|
|
125
125
|
disabled: NotRequired[bool]
|
|
126
|
-
request_cert: NotRequired[bool]
|
|
127
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
128
|
-
reject_unauthorized: NotRequired[bool]
|
|
129
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
130
|
-
common_name_regex: NotRequired[str]
|
|
131
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
132
126
|
certificate_name: NotRequired[str]
|
|
133
127
|
r"""The name of the predefined certificate"""
|
|
134
128
|
priv_key_path: NotRequired[str]
|
|
@@ -139,6 +133,10 @@ class InputCriblHTTPTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
139
133
|
r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
140
134
|
ca_path: NotRequired[str]
|
|
141
135
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
136
|
+
request_cert: NotRequired[bool]
|
|
137
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
138
|
+
reject_unauthorized: NotRequired[Any]
|
|
139
|
+
common_name_regex: NotRequired[Any]
|
|
142
140
|
min_version: NotRequired[InputCriblHTTPMinimumTLSVersion]
|
|
143
141
|
max_version: NotRequired[InputCriblHTTPMaximumTLSVersion]
|
|
144
142
|
|
|
@@ -146,19 +144,6 @@ class InputCriblHTTPTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
146
144
|
class InputCriblHTTPTLSSettingsServerSide(BaseModel):
|
|
147
145
|
disabled: Optional[bool] = True
|
|
148
146
|
|
|
149
|
-
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
150
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
151
|
-
|
|
152
|
-
reject_unauthorized: Annotated[
|
|
153
|
-
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
154
|
-
] = True
|
|
155
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
156
|
-
|
|
157
|
-
common_name_regex: Annotated[
|
|
158
|
-
Optional[str], pydantic.Field(alias="commonNameRegex")
|
|
159
|
-
] = "/.*/"
|
|
160
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
161
|
-
|
|
162
147
|
certificate_name: Annotated[
|
|
163
148
|
Optional[str], pydantic.Field(alias="certificateName")
|
|
164
149
|
] = None
|
|
@@ -176,6 +161,17 @@ class InputCriblHTTPTLSSettingsServerSide(BaseModel):
|
|
|
176
161
|
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
177
162
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
178
163
|
|
|
164
|
+
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
165
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
166
|
+
|
|
167
|
+
reject_unauthorized: Annotated[
|
|
168
|
+
Optional[Any], pydantic.Field(alias="rejectUnauthorized")
|
|
169
|
+
] = None
|
|
170
|
+
|
|
171
|
+
common_name_regex: Annotated[
|
|
172
|
+
Optional[Any], pydantic.Field(alias="commonNameRegex")
|
|
173
|
+
] = None
|
|
174
|
+
|
|
179
175
|
min_version: Annotated[
|
|
180
176
|
Annotated[
|
|
181
177
|
Optional[InputCriblHTTPMinimumTLSVersion],
|