cribl-control-plane 0.2.1rc4__py3-none-any.whl → 0.2.1rc5__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cribl-control-plane might be problematic. Click here for more details.

Files changed (110) hide show
  1. cribl_control_plane/_version.py +3 -3
  2. cribl_control_plane/groups_sdk.py +3 -0
  3. cribl_control_plane/mappings.py +1185 -0
  4. cribl_control_plane/models/__init__.py +149 -105
  5. cribl_control_plane/models/createadminproductsmappingsactivatebyproductop.py +52 -0
  6. cribl_control_plane/models/createadminproductsmappingsbyproductop.py +53 -0
  7. cribl_control_plane/models/deleteadminproductsmappingsbyproductandidop.py +51 -0
  8. cribl_control_plane/models/getadminproductsmappingsbyproductandidop.py +51 -0
  9. cribl_control_plane/models/getadminproductsmappingsbyproductop.py +44 -0
  10. cribl_control_plane/models/input.py +14 -14
  11. cribl_control_plane/models/inputappscope.py +16 -20
  12. cribl_control_plane/models/inputconfluentcloud.py +0 -110
  13. cribl_control_plane/models/inputcriblhttp.py +16 -20
  14. cribl_control_plane/models/inputcribllakehttp.py +16 -20
  15. cribl_control_plane/models/inputcribltcp.py +16 -20
  16. cribl_control_plane/models/inputdatadogagent.py +16 -20
  17. cribl_control_plane/models/inputedgeprometheus.py +36 -44
  18. cribl_control_plane/models/inputelastic.py +27 -44
  19. cribl_control_plane/models/inputeventhub.py +0 -118
  20. cribl_control_plane/models/inputfirehose.py +16 -20
  21. cribl_control_plane/models/inputgrafana.py +31 -39
  22. cribl_control_plane/models/inputhttp.py +16 -20
  23. cribl_control_plane/models/inputhttpraw.py +16 -20
  24. cribl_control_plane/models/inputkafka.py +0 -108
  25. cribl_control_plane/models/inputloki.py +16 -20
  26. cribl_control_plane/models/inputmetrics.py +16 -20
  27. cribl_control_plane/models/inputmodeldriventelemetry.py +16 -20
  28. cribl_control_plane/models/inputopentelemetry.py +15 -19
  29. cribl_control_plane/models/inputprometheus.py +36 -44
  30. cribl_control_plane/models/inputprometheusrw.py +16 -20
  31. cribl_control_plane/models/inputsplunk.py +16 -20
  32. cribl_control_plane/models/inputsplunkhec.py +15 -19
  33. cribl_control_plane/models/inputsyslog.py +31 -39
  34. cribl_control_plane/models/inputsystemmetrics.py +10 -20
  35. cribl_control_plane/models/inputtcp.py +16 -30
  36. cribl_control_plane/models/inputtcpjson.py +16 -20
  37. cribl_control_plane/models/inputwindowsmetrics.py +10 -20
  38. cribl_control_plane/models/inputwineventlogs.py +0 -14
  39. cribl_control_plane/models/inputwizwebhook.py +16 -20
  40. cribl_control_plane/models/inputzscalerhec.py +15 -19
  41. cribl_control_plane/models/mappingruleset.py +53 -0
  42. cribl_control_plane/models/mappingrulesetevalmappingfunction.py +71 -0
  43. cribl_control_plane/models/mappingrulesetgenericmappingfunction.py +29 -0
  44. cribl_control_plane/models/output.py +22 -22
  45. cribl_control_plane/models/outputazureblob.py +0 -7
  46. cribl_control_plane/models/outputazuredataexplorer.py +93 -283
  47. cribl_control_plane/models/outputazureeventhub.py +21 -169
  48. cribl_control_plane/models/outputazurelogs.py +21 -49
  49. cribl_control_plane/models/outputchronicle.py +21 -49
  50. cribl_control_plane/models/outputclickhouse.py +21 -49
  51. cribl_control_plane/models/outputcloudwatch.py +21 -49
  52. cribl_control_plane/models/outputconfluentcloud.py +22 -167
  53. cribl_control_plane/models/outputcriblhttp.py +21 -49
  54. cribl_control_plane/models/outputcribltcp.py +21 -49
  55. cribl_control_plane/models/outputcrowdstrikenextgensiem.py +22 -50
  56. cribl_control_plane/models/outputdatabricks.py +0 -7
  57. cribl_control_plane/models/outputdatadog.py +21 -49
  58. cribl_control_plane/models/outputdataset.py +21 -49
  59. cribl_control_plane/models/outputdls3.py +0 -7
  60. cribl_control_plane/models/outputdynatracehttp.py +21 -49
  61. cribl_control_plane/models/outputdynatraceotlp.py +21 -49
  62. cribl_control_plane/models/outputelastic.py +21 -74
  63. cribl_control_plane/models/outputelasticcloud.py +21 -74
  64. cribl_control_plane/models/outputfilesystem.py +0 -7
  65. cribl_control_plane/models/outputgooglechronicle.py +22 -65
  66. cribl_control_plane/models/outputgooglecloudlogging.py +22 -50
  67. cribl_control_plane/models/outputgooglecloudstorage.py +0 -7
  68. cribl_control_plane/models/outputgooglepubsub.py +21 -49
  69. cribl_control_plane/models/outputgrafanacloud.py +42 -98
  70. cribl_control_plane/models/outputgraphite.py +21 -49
  71. cribl_control_plane/models/outputhoneycomb.py +21 -49
  72. cribl_control_plane/models/outputhumiohec.py +21 -49
  73. cribl_control_plane/models/outputinfluxdb.py +21 -49
  74. cribl_control_plane/models/outputkafka.py +19 -162
  75. cribl_control_plane/models/outputkinesis.py +21 -56
  76. cribl_control_plane/models/outputloki.py +19 -47
  77. cribl_control_plane/models/outputminio.py +0 -7
  78. cribl_control_plane/models/outputmsk.py +19 -54
  79. cribl_control_plane/models/outputnewrelic.py +21 -49
  80. cribl_control_plane/models/outputnewrelicevents.py +22 -50
  81. cribl_control_plane/models/outputopentelemetry.py +21 -49
  82. cribl_control_plane/models/outputprometheus.py +21 -49
  83. cribl_control_plane/models/outputs3.py +0 -7
  84. cribl_control_plane/models/outputsentinel.py +21 -49
  85. cribl_control_plane/models/outputsentineloneaisiem.py +22 -50
  86. cribl_control_plane/models/outputservicenow.py +21 -49
  87. cribl_control_plane/models/outputsignalfx.py +21 -49
  88. cribl_control_plane/models/outputsns.py +19 -47
  89. cribl_control_plane/models/outputsplunk.py +21 -49
  90. cribl_control_plane/models/outputsplunkhec.py +21 -49
  91. cribl_control_plane/models/outputsplunklb.py +21 -49
  92. cribl_control_plane/models/outputsqs.py +19 -47
  93. cribl_control_plane/models/outputstatsd.py +21 -49
  94. cribl_control_plane/models/outputstatsdext.py +21 -49
  95. cribl_control_plane/models/outputsumologic.py +21 -49
  96. cribl_control_plane/models/outputsyslog.py +99 -129
  97. cribl_control_plane/models/outputtcpjson.py +21 -49
  98. cribl_control_plane/models/outputwavefront.py +21 -49
  99. cribl_control_plane/models/outputwebhook.py +21 -49
  100. cribl_control_plane/models/outputxsiam.py +19 -47
  101. cribl_control_plane/models/pipeline.py +4 -4
  102. cribl_control_plane/models/rulesetid.py +13 -0
  103. cribl_control_plane/models/runnablejobcollection.py +8 -12
  104. cribl_control_plane/models/runnablejobexecutor.py +8 -12
  105. cribl_control_plane/models/runnablejobscheduledsearch.py +8 -12
  106. cribl_control_plane/models/updateadminproductsmappingsbyproductandidop.py +63 -0
  107. cribl_control_plane/pipelines.py +8 -8
  108. {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc5.dist-info}/METADATA +11 -2
  109. {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc5.dist-info}/RECORD +110 -99
  110. {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc5.dist-info}/WHEEL +0 -0
@@ -0,0 +1,52 @@
1
+ """Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
2
+
3
+ from __future__ import annotations
4
+ from .productscore import ProductsCore
5
+ from .rulesetid import RulesetID, RulesetIDTypedDict
6
+ from cribl_control_plane.types import BaseModel
7
+ from cribl_control_plane.utils import (
8
+ FieldMetadata,
9
+ PathParamMetadata,
10
+ RequestMetadata,
11
+ validate_open_enum,
12
+ )
13
+ from pydantic.functional_validators import PlainValidator
14
+ from typing import List, Optional
15
+ from typing_extensions import Annotated, NotRequired, TypedDict
16
+
17
+
18
+ class CreateAdminProductsMappingsActivateByProductRequestTypedDict(TypedDict):
19
+ product: ProductsCore
20
+ r"""Name of the Cribl product to activate the Mapping Ruleset for"""
21
+ ruleset_id: RulesetIDTypedDict
22
+ r"""RulesetId object"""
23
+
24
+
25
+ class CreateAdminProductsMappingsActivateByProductRequest(BaseModel):
26
+ product: Annotated[
27
+ Annotated[ProductsCore, PlainValidator(validate_open_enum(False))],
28
+ FieldMetadata(path=PathParamMetadata(style="simple", explode=False)),
29
+ ]
30
+ r"""Name of the Cribl product to activate the Mapping Ruleset for"""
31
+
32
+ ruleset_id: Annotated[
33
+ RulesetID, FieldMetadata(request=RequestMetadata(media_type="application/json"))
34
+ ]
35
+ r"""RulesetId object"""
36
+
37
+
38
+ class CreateAdminProductsMappingsActivateByProductResponseTypedDict(TypedDict):
39
+ r"""The <code>id</code> of the Mapping Ruleset that has been successfully activated"""
40
+
41
+ count: NotRequired[int]
42
+ r"""number of items present in the items array"""
43
+ items: NotRequired[List[RulesetIDTypedDict]]
44
+
45
+
46
+ class CreateAdminProductsMappingsActivateByProductResponse(BaseModel):
47
+ r"""The <code>id</code> of the Mapping Ruleset that has been successfully activated"""
48
+
49
+ count: Optional[int] = None
50
+ r"""number of items present in the items array"""
51
+
52
+ items: Optional[List[RulesetID]] = None
@@ -0,0 +1,53 @@
1
+ """Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
2
+
3
+ from __future__ import annotations
4
+ from .mappingruleset import MappingRuleset, MappingRulesetTypedDict
5
+ from .productscore import ProductsCore
6
+ from cribl_control_plane.types import BaseModel
7
+ from cribl_control_plane.utils import (
8
+ FieldMetadata,
9
+ PathParamMetadata,
10
+ RequestMetadata,
11
+ validate_open_enum,
12
+ )
13
+ from pydantic.functional_validators import PlainValidator
14
+ from typing import List, Optional
15
+ from typing_extensions import Annotated, NotRequired, TypedDict
16
+
17
+
18
+ class CreateAdminProductsMappingsByProductRequestTypedDict(TypedDict):
19
+ product: ProductsCore
20
+ r"""Name of the Cribl product to create the Mapping Ruleset for"""
21
+ mapping_ruleset: MappingRulesetTypedDict
22
+ r"""MappingRuleset object"""
23
+
24
+
25
+ class CreateAdminProductsMappingsByProductRequest(BaseModel):
26
+ product: Annotated[
27
+ Annotated[ProductsCore, PlainValidator(validate_open_enum(False))],
28
+ FieldMetadata(path=PathParamMetadata(style="simple", explode=False)),
29
+ ]
30
+ r"""Name of the Cribl product to create the Mapping Ruleset for"""
31
+
32
+ mapping_ruleset: Annotated[
33
+ MappingRuleset,
34
+ FieldMetadata(request=RequestMetadata(media_type="application/json")),
35
+ ]
36
+ r"""MappingRuleset object"""
37
+
38
+
39
+ class CreateAdminProductsMappingsByProductResponseTypedDict(TypedDict):
40
+ r"""A list containing the newly created Mapping Ruleset objects"""
41
+
42
+ count: NotRequired[int]
43
+ r"""number of items present in the items array"""
44
+ items: NotRequired[List[MappingRulesetTypedDict]]
45
+
46
+
47
+ class CreateAdminProductsMappingsByProductResponse(BaseModel):
48
+ r"""A list containing the newly created Mapping Ruleset objects"""
49
+
50
+ count: Optional[int] = None
51
+ r"""number of items present in the items array"""
52
+
53
+ items: Optional[List[MappingRuleset]] = None
@@ -0,0 +1,51 @@
1
+ """Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
2
+
3
+ from __future__ import annotations
4
+ from .mappingruleset import MappingRuleset, MappingRulesetTypedDict
5
+ from .productscore import ProductsCore
6
+ from cribl_control_plane.types import BaseModel
7
+ from cribl_control_plane.utils import (
8
+ FieldMetadata,
9
+ PathParamMetadata,
10
+ validate_open_enum,
11
+ )
12
+ from pydantic.functional_validators import PlainValidator
13
+ from typing import List, Optional
14
+ from typing_extensions import Annotated, NotRequired, TypedDict
15
+
16
+
17
+ class DeleteAdminProductsMappingsByProductAndIDRequestTypedDict(TypedDict):
18
+ product: ProductsCore
19
+ r"""Name of the Cribl product to delete the Mapping Ruleset for"""
20
+ id: str
21
+ r"""The <code>id</code> of the Mapping Ruleset to delete."""
22
+
23
+
24
+ class DeleteAdminProductsMappingsByProductAndIDRequest(BaseModel):
25
+ product: Annotated[
26
+ Annotated[ProductsCore, PlainValidator(validate_open_enum(False))],
27
+ FieldMetadata(path=PathParamMetadata(style="simple", explode=False)),
28
+ ]
29
+ r"""Name of the Cribl product to delete the Mapping Ruleset for"""
30
+
31
+ id: Annotated[
32
+ str, FieldMetadata(path=PathParamMetadata(style="simple", explode=False))
33
+ ]
34
+ r"""The <code>id</code> of the Mapping Ruleset to delete."""
35
+
36
+
37
+ class DeleteAdminProductsMappingsByProductAndIDResponseTypedDict(TypedDict):
38
+ r"""A list containing the deleted Mapping Ruleset objects"""
39
+
40
+ count: NotRequired[int]
41
+ r"""number of items present in the items array"""
42
+ items: NotRequired[List[MappingRulesetTypedDict]]
43
+
44
+
45
+ class DeleteAdminProductsMappingsByProductAndIDResponse(BaseModel):
46
+ r"""A list containing the deleted Mapping Ruleset objects"""
47
+
48
+ count: Optional[int] = None
49
+ r"""number of items present in the items array"""
50
+
51
+ items: Optional[List[MappingRuleset]] = None
@@ -0,0 +1,51 @@
1
+ """Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
2
+
3
+ from __future__ import annotations
4
+ from .mappingruleset import MappingRuleset, MappingRulesetTypedDict
5
+ from .productscore import ProductsCore
6
+ from cribl_control_plane.types import BaseModel
7
+ from cribl_control_plane.utils import (
8
+ FieldMetadata,
9
+ PathParamMetadata,
10
+ validate_open_enum,
11
+ )
12
+ from pydantic.functional_validators import PlainValidator
13
+ from typing import List, Optional
14
+ from typing_extensions import Annotated, NotRequired, TypedDict
15
+
16
+
17
+ class GetAdminProductsMappingsByProductAndIDRequestTypedDict(TypedDict):
18
+ product: ProductsCore
19
+ r"""Name of the Cribl product to get the Mappings for"""
20
+ id: str
21
+ r"""The <code>id</code> of the Worker Group or Edge Fleet Mapping Ruleset to get"""
22
+
23
+
24
+ class GetAdminProductsMappingsByProductAndIDRequest(BaseModel):
25
+ product: Annotated[
26
+ Annotated[ProductsCore, PlainValidator(validate_open_enum(False))],
27
+ FieldMetadata(path=PathParamMetadata(style="simple", explode=False)),
28
+ ]
29
+ r"""Name of the Cribl product to get the Mappings for"""
30
+
31
+ id: Annotated[
32
+ str, FieldMetadata(path=PathParamMetadata(style="simple", explode=False))
33
+ ]
34
+ r"""The <code>id</code> of the Worker Group or Edge Fleet Mapping Ruleset to get"""
35
+
36
+
37
+ class GetAdminProductsMappingsByProductAndIDResponseTypedDict(TypedDict):
38
+ r"""a list of MappingRuleset objects"""
39
+
40
+ count: NotRequired[int]
41
+ r"""number of items present in the items array"""
42
+ items: NotRequired[List[MappingRulesetTypedDict]]
43
+
44
+
45
+ class GetAdminProductsMappingsByProductAndIDResponse(BaseModel):
46
+ r"""a list of MappingRuleset objects"""
47
+
48
+ count: Optional[int] = None
49
+ r"""number of items present in the items array"""
50
+
51
+ items: Optional[List[MappingRuleset]] = None
@@ -0,0 +1,44 @@
1
+ """Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
2
+
3
+ from __future__ import annotations
4
+ from .mappingruleset import MappingRuleset, MappingRulesetTypedDict
5
+ from .productscore import ProductsCore
6
+ from cribl_control_plane.types import BaseModel
7
+ from cribl_control_plane.utils import (
8
+ FieldMetadata,
9
+ PathParamMetadata,
10
+ validate_open_enum,
11
+ )
12
+ from pydantic.functional_validators import PlainValidator
13
+ from typing import List, Optional
14
+ from typing_extensions import Annotated, NotRequired, TypedDict
15
+
16
+
17
+ class GetAdminProductsMappingsByProductRequestTypedDict(TypedDict):
18
+ product: ProductsCore
19
+ r"""Name of the Cribl product to list the Mapping Rulesets for"""
20
+
21
+
22
+ class GetAdminProductsMappingsByProductRequest(BaseModel):
23
+ product: Annotated[
24
+ Annotated[ProductsCore, PlainValidator(validate_open_enum(False))],
25
+ FieldMetadata(path=PathParamMetadata(style="simple", explode=False)),
26
+ ]
27
+ r"""Name of the Cribl product to list the Mapping Rulesets for"""
28
+
29
+
30
+ class GetAdminProductsMappingsByProductResponseTypedDict(TypedDict):
31
+ r"""a list of MappingRuleset objects"""
32
+
33
+ count: NotRequired[int]
34
+ r"""number of items present in the items array"""
35
+ items: NotRequired[List[MappingRulesetTypedDict]]
36
+
37
+
38
+ class GetAdminProductsMappingsByProductResponse(BaseModel):
39
+ r"""a list of MappingRuleset objects"""
40
+
41
+ count: Optional[int] = None
42
+ r"""number of items present in the items array"""
43
+
44
+ items: Optional[List[MappingRuleset]] = None
@@ -75,59 +75,59 @@ from typing_extensions import Annotated, TypeAliasType
75
75
  InputTypedDict = TypeAliasType(
76
76
  "InputTypedDict",
77
77
  Union[
78
- InputCriblTypedDict,
79
- InputKubeEventsTypedDict,
80
78
  InputDatagenTypedDict,
79
+ InputKubeEventsTypedDict,
80
+ InputCriblTypedDict,
81
81
  InputCriblmetricsTypedDict,
82
82
  InputKubeMetricsTypedDict,
83
- InputSystemStateTypedDict,
84
83
  InputCollectionTypedDict,
84
+ InputSystemStateTypedDict,
85
85
  InputModelDrivenTelemetryTypedDict,
86
86
  InputSystemMetricsTypedDict,
87
87
  InputWindowsMetricsTypedDict,
88
88
  InputJournalFilesTypedDict,
89
+ InputWinEventLogsTypedDict,
89
90
  InputRawUDPTypedDict,
90
- InputKubeLogsTypedDict,
91
91
  InputExecTypedDict,
92
- InputSnmpTypedDict,
92
+ InputKubeLogsTypedDict,
93
93
  InputMetricsTypedDict,
94
- InputWinEventLogsTypedDict,
94
+ InputSnmpTypedDict,
95
95
  InputCriblTCPTypedDict,
96
96
  InputNetflowTypedDict,
97
97
  InputTcpjsonTypedDict,
98
98
  InputGooglePubsubTypedDict,
99
99
  InputOffice365ServiceTypedDict,
100
100
  InputWizTypedDict,
101
+ InputTCPTypedDict,
101
102
  InputFirehoseTypedDict,
102
103
  InputCriblHTTPTypedDict,
103
104
  InputDatadogAgentTypedDict,
104
105
  InputOffice365MgmtTypedDict,
105
106
  InputFileTypedDict,
106
- InputTCPTypedDict,
107
107
  InputSplunkTypedDict,
108
- InputAppscopeTypedDict,
109
108
  InputWefTypedDict,
109
+ InputAppscopeTypedDict,
110
110
  InputHTTPRawTypedDict,
111
111
  InputWizWebhookTypedDict,
112
- InputCriblLakeHTTPTypedDict,
113
112
  InputHTTPTypedDict,
114
- InputZscalerHecTypedDict,
115
- InputSqsTypedDict,
113
+ InputCriblLakeHTTPTypedDict,
116
114
  InputAzureBlobTypedDict,
115
+ InputSqsTypedDict,
116
+ InputZscalerHecTypedDict,
117
117
  InputKinesisTypedDict,
118
118
  InputConfluentCloudTypedDict,
119
119
  InputEventhubTypedDict,
120
120
  InputKafkaTypedDict,
121
121
  InputElasticTypedDict,
122
- InputSplunkHecTypedDict,
123
122
  InputOffice365MsgTraceTypedDict,
123
+ InputSplunkHecTypedDict,
124
124
  InputLokiTypedDict,
125
125
  InputPrometheusRwTypedDict,
126
- InputCrowdstrikeTypedDict,
127
126
  InputPrometheusTypedDict,
127
+ InputCrowdstrikeTypedDict,
128
+ InputEdgePrometheusTypedDict,
128
129
  InputOpenTelemetryTypedDict,
129
130
  InputS3TypedDict,
130
- InputEdgePrometheusTypedDict,
131
131
  InputSecurityLakeTypedDict,
132
132
  InputMskTypedDict,
133
133
  InputS3InventoryTypedDict,
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
9
  from pydantic.functional_validators import PlainValidator
10
- from typing import List, Optional
10
+ from typing import Any, List, Optional
11
11
  from typing_extensions import Annotated, NotRequired, TypedDict
12
12
 
13
13
 
@@ -221,12 +221,6 @@ class InputAppscopeMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
221
221
 
222
222
  class InputAppscopeTLSSettingsServerSideTypedDict(TypedDict):
223
223
  disabled: NotRequired[bool]
224
- request_cert: NotRequired[bool]
225
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
226
- reject_unauthorized: NotRequired[bool]
227
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
228
- common_name_regex: NotRequired[str]
229
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
230
224
  certificate_name: NotRequired[str]
231
225
  r"""The name of the predefined certificate"""
232
226
  priv_key_path: NotRequired[str]
@@ -237,6 +231,10 @@ class InputAppscopeTLSSettingsServerSideTypedDict(TypedDict):
237
231
  r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
238
232
  ca_path: NotRequired[str]
239
233
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
234
+ request_cert: NotRequired[bool]
235
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
236
+ reject_unauthorized: NotRequired[Any]
237
+ common_name_regex: NotRequired[Any]
240
238
  min_version: NotRequired[InputAppscopeMinimumTLSVersion]
241
239
  max_version: NotRequired[InputAppscopeMaximumTLSVersion]
242
240
 
@@ -244,19 +242,6 @@ class InputAppscopeTLSSettingsServerSideTypedDict(TypedDict):
244
242
  class InputAppscopeTLSSettingsServerSide(BaseModel):
245
243
  disabled: Optional[bool] = True
246
244
 
247
- request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
248
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
249
-
250
- reject_unauthorized: Annotated[
251
- Optional[bool], pydantic.Field(alias="rejectUnauthorized")
252
- ] = True
253
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
254
-
255
- common_name_regex: Annotated[
256
- Optional[str], pydantic.Field(alias="commonNameRegex")
257
- ] = "/.*/"
258
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
259
-
260
245
  certificate_name: Annotated[
261
246
  Optional[str], pydantic.Field(alias="certificateName")
262
247
  ] = None
@@ -274,6 +259,17 @@ class InputAppscopeTLSSettingsServerSide(BaseModel):
274
259
  ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
275
260
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
276
261
 
262
+ request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
263
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
264
+
265
+ reject_unauthorized: Annotated[
266
+ Optional[Any], pydantic.Field(alias="rejectUnauthorized")
267
+ ] = None
268
+
269
+ common_name_regex: Annotated[
270
+ Optional[Any], pydantic.Field(alias="commonNameRegex")
271
+ ] = None
272
+
277
273
  min_version: Annotated[
278
274
  Annotated[
279
275
  Optional[InputAppscopeMinimumTLSVersion],
@@ -341,13 +341,6 @@ class InputConfluentCloudKafkaSchemaRegistryAuthentication(BaseModel):
341
341
  tls: Optional[InputConfluentCloudKafkaSchemaRegistryTLSSettingsClientSide] = None
342
342
 
343
343
 
344
- class InputConfluentCloudAuthenticationMethod(str, Enum, metaclass=utils.OpenEnumMeta):
345
- r"""Enter credentials directly, or select a stored secret"""
346
-
347
- MANUAL = "manual"
348
- SECRET = "secret"
349
-
350
-
351
344
  class InputConfluentCloudSASLMechanism(str, Enum, metaclass=utils.OpenEnumMeta):
352
345
  # PLAIN
353
346
  PLAIN = "plain"
@@ -359,58 +352,13 @@ class InputConfluentCloudSASLMechanism(str, Enum, metaclass=utils.OpenEnumMeta):
359
352
  KERBEROS = "kerberos"
360
353
 
361
354
 
362
- class InputConfluentCloudOauthParamTypedDict(TypedDict):
363
- name: str
364
- value: str
365
-
366
-
367
- class InputConfluentCloudOauthParam(BaseModel):
368
- name: str
369
-
370
- value: str
371
-
372
-
373
- class InputConfluentCloudSaslExtensionTypedDict(TypedDict):
374
- name: str
375
- value: str
376
-
377
-
378
- class InputConfluentCloudSaslExtension(BaseModel):
379
- name: str
380
-
381
- value: str
382
-
383
-
384
355
  class InputConfluentCloudAuthenticationTypedDict(TypedDict):
385
356
  r"""Authentication parameters to use when connecting to brokers. Using TLS is highly recommended."""
386
357
 
387
358
  disabled: NotRequired[bool]
388
- username: NotRequired[str]
389
- password: NotRequired[str]
390
- auth_type: NotRequired[InputConfluentCloudAuthenticationMethod]
391
- r"""Enter credentials directly, or select a stored secret"""
392
- credentials_secret: NotRequired[str]
393
- r"""Select or create a secret that references your credentials"""
394
359
  mechanism: NotRequired[InputConfluentCloudSASLMechanism]
395
- keytab_location: NotRequired[str]
396
- r"""Location of keytab file for authentication principal"""
397
- principal: NotRequired[str]
398
- r"""Authentication principal, such as `kafka_user@example.com`"""
399
- broker_service_class: NotRequired[str]
400
- r"""Kerberos service class for Kafka brokers, such as `kafka`"""
401
360
  oauth_enabled: NotRequired[bool]
402
361
  r"""Enable OAuth authentication"""
403
- token_url: NotRequired[str]
404
- r"""URL of the token endpoint to use for OAuth authentication"""
405
- client_id: NotRequired[str]
406
- r"""Client ID to use for OAuth authentication"""
407
- oauth_secret_type: NotRequired[str]
408
- client_text_secret: NotRequired[str]
409
- r"""Select or create a stored text secret"""
410
- oauth_params: NotRequired[List[InputConfluentCloudOauthParamTypedDict]]
411
- r"""Additional fields to send to the token endpoint, such as scope or audience"""
412
- sasl_extensions: NotRequired[List[InputConfluentCloudSaslExtensionTypedDict]]
413
- r"""Additional SASL extension fields, such as Confluent's logicalCluster or identityPoolId"""
414
362
 
415
363
 
416
364
  class InputConfluentCloudAuthentication(BaseModel):
@@ -418,74 +366,16 @@ class InputConfluentCloudAuthentication(BaseModel):
418
366
 
419
367
  disabled: Optional[bool] = True
420
368
 
421
- username: Optional[str] = None
422
-
423
- password: Optional[str] = None
424
-
425
- auth_type: Annotated[
426
- Annotated[
427
- Optional[InputConfluentCloudAuthenticationMethod],
428
- PlainValidator(validate_open_enum(False)),
429
- ],
430
- pydantic.Field(alias="authType"),
431
- ] = InputConfluentCloudAuthenticationMethod.MANUAL
432
- r"""Enter credentials directly, or select a stored secret"""
433
-
434
- credentials_secret: Annotated[
435
- Optional[str], pydantic.Field(alias="credentialsSecret")
436
- ] = None
437
- r"""Select or create a secret that references your credentials"""
438
-
439
369
  mechanism: Annotated[
440
370
  Optional[InputConfluentCloudSASLMechanism],
441
371
  PlainValidator(validate_open_enum(False)),
442
372
  ] = InputConfluentCloudSASLMechanism.PLAIN
443
373
 
444
- keytab_location: Annotated[
445
- Optional[str], pydantic.Field(alias="keytabLocation")
446
- ] = None
447
- r"""Location of keytab file for authentication principal"""
448
-
449
- principal: Optional[str] = None
450
- r"""Authentication principal, such as `kafka_user@example.com`"""
451
-
452
- broker_service_class: Annotated[
453
- Optional[str], pydantic.Field(alias="brokerServiceClass")
454
- ] = None
455
- r"""Kerberos service class for Kafka brokers, such as `kafka`"""
456
-
457
374
  oauth_enabled: Annotated[Optional[bool], pydantic.Field(alias="oauthEnabled")] = (
458
375
  False
459
376
  )
460
377
  r"""Enable OAuth authentication"""
461
378
 
462
- token_url: Annotated[Optional[str], pydantic.Field(alias="tokenUrl")] = None
463
- r"""URL of the token endpoint to use for OAuth authentication"""
464
-
465
- client_id: Annotated[Optional[str], pydantic.Field(alias="clientId")] = None
466
- r"""Client ID to use for OAuth authentication"""
467
-
468
- oauth_secret_type: Annotated[
469
- Optional[str], pydantic.Field(alias="oauthSecretType")
470
- ] = "secret"
471
-
472
- client_text_secret: Annotated[
473
- Optional[str], pydantic.Field(alias="clientTextSecret")
474
- ] = None
475
- r"""Select or create a stored text secret"""
476
-
477
- oauth_params: Annotated[
478
- Optional[List[InputConfluentCloudOauthParam]],
479
- pydantic.Field(alias="oauthParams"),
480
- ] = None
481
- r"""Additional fields to send to the token endpoint, such as scope or audience"""
482
-
483
- sasl_extensions: Annotated[
484
- Optional[List[InputConfluentCloudSaslExtension]],
485
- pydantic.Field(alias="saslExtensions"),
486
- ] = None
487
- r"""Additional SASL extension fields, such as Confluent's logicalCluster or identityPoolId"""
488
-
489
379
 
490
380
  class InputConfluentCloudMetadatumTypedDict(TypedDict):
491
381
  name: str
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
9
  from pydantic.functional_validators import PlainValidator
10
- from typing import List, Optional
10
+ from typing import Any, List, Optional
11
11
  from typing_extensions import Annotated, NotRequired, TypedDict
12
12
 
13
13
 
@@ -123,12 +123,6 @@ class InputCriblHTTPMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
123
123
 
124
124
  class InputCriblHTTPTLSSettingsServerSideTypedDict(TypedDict):
125
125
  disabled: NotRequired[bool]
126
- request_cert: NotRequired[bool]
127
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
128
- reject_unauthorized: NotRequired[bool]
129
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
130
- common_name_regex: NotRequired[str]
131
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
132
126
  certificate_name: NotRequired[str]
133
127
  r"""The name of the predefined certificate"""
134
128
  priv_key_path: NotRequired[str]
@@ -139,6 +133,10 @@ class InputCriblHTTPTLSSettingsServerSideTypedDict(TypedDict):
139
133
  r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
140
134
  ca_path: NotRequired[str]
141
135
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
136
+ request_cert: NotRequired[bool]
137
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
138
+ reject_unauthorized: NotRequired[Any]
139
+ common_name_regex: NotRequired[Any]
142
140
  min_version: NotRequired[InputCriblHTTPMinimumTLSVersion]
143
141
  max_version: NotRequired[InputCriblHTTPMaximumTLSVersion]
144
142
 
@@ -146,19 +144,6 @@ class InputCriblHTTPTLSSettingsServerSideTypedDict(TypedDict):
146
144
  class InputCriblHTTPTLSSettingsServerSide(BaseModel):
147
145
  disabled: Optional[bool] = True
148
146
 
149
- request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
150
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
151
-
152
- reject_unauthorized: Annotated[
153
- Optional[bool], pydantic.Field(alias="rejectUnauthorized")
154
- ] = True
155
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
156
-
157
- common_name_regex: Annotated[
158
- Optional[str], pydantic.Field(alias="commonNameRegex")
159
- ] = "/.*/"
160
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
161
-
162
147
  certificate_name: Annotated[
163
148
  Optional[str], pydantic.Field(alias="certificateName")
164
149
  ] = None
@@ -176,6 +161,17 @@ class InputCriblHTTPTLSSettingsServerSide(BaseModel):
176
161
  ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
177
162
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
178
163
 
164
+ request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
165
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
166
+
167
+ reject_unauthorized: Annotated[
168
+ Optional[Any], pydantic.Field(alias="rejectUnauthorized")
169
+ ] = None
170
+
171
+ common_name_regex: Annotated[
172
+ Optional[Any], pydantic.Field(alias="commonNameRegex")
173
+ ] = None
174
+
179
175
  min_version: Annotated[
180
176
  Annotated[
181
177
  Optional[InputCriblHTTPMinimumTLSVersion],