cribl-control-plane 0.2.1rc7__py3-none-any.whl → 0.3.0a1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cribl-control-plane might be problematic. Click here for more details.

Files changed (179) hide show
  1. cribl_control_plane/_version.py +4 -4
  2. cribl_control_plane/errors/__init__.py +5 -8
  3. cribl_control_plane/errors/{healthserverstatus_error.py → healthstatus_error.py} +9 -10
  4. cribl_control_plane/groups_sdk.py +28 -52
  5. cribl_control_plane/health.py +16 -22
  6. cribl_control_plane/models/__init__.py +54 -217
  7. cribl_control_plane/models/appmode.py +14 -0
  8. cribl_control_plane/models/authtoken.py +1 -5
  9. cribl_control_plane/models/cacheconnection.py +0 -20
  10. cribl_control_plane/models/configgroup.py +7 -55
  11. cribl_control_plane/models/configgroupcloud.py +1 -11
  12. cribl_control_plane/models/createconfiggroupbyproductop.py +5 -17
  13. cribl_control_plane/models/createroutesappendbyidop.py +2 -2
  14. cribl_control_plane/models/createversionundoop.py +3 -3
  15. cribl_control_plane/models/cribllakedataset.py +1 -11
  16. cribl_control_plane/models/cribllakedatasetupdate.py +1 -11
  17. cribl_control_plane/models/datasetmetadata.py +1 -11
  18. cribl_control_plane/models/deleteconfiggroupbyproductandidop.py +0 -11
  19. cribl_control_plane/models/deleteoutputpqbyidop.py +2 -2
  20. cribl_control_plane/models/distributedsummary.py +0 -6
  21. cribl_control_plane/models/error.py +16 -0
  22. cribl_control_plane/models/getconfiggroupaclbyproductandidop.py +0 -20
  23. cribl_control_plane/models/getconfiggroupaclteamsbyproductandidop.py +0 -20
  24. cribl_control_plane/models/getconfiggroupbyproductandidop.py +0 -11
  25. cribl_control_plane/models/getconfiggroupconfigversionbyproductandidop.py +0 -11
  26. cribl_control_plane/models/gethealthinfoop.py +17 -0
  27. cribl_control_plane/models/getsummaryop.py +0 -11
  28. cribl_control_plane/models/hbcriblinfo.py +3 -24
  29. cribl_control_plane/models/{healthserverstatus.py → healthstatus.py} +8 -27
  30. cribl_control_plane/models/heartbeatmetadata.py +0 -3
  31. cribl_control_plane/models/input.py +78 -80
  32. cribl_control_plane/models/inputappscope.py +17 -80
  33. cribl_control_plane/models/inputazureblob.py +1 -33
  34. cribl_control_plane/models/inputcollection.py +1 -24
  35. cribl_control_plane/models/inputconfluentcloud.py +18 -195
  36. cribl_control_plane/models/inputcribl.py +1 -24
  37. cribl_control_plane/models/inputcriblhttp.py +17 -62
  38. cribl_control_plane/models/inputcribllakehttp.py +17 -62
  39. cribl_control_plane/models/inputcriblmetrics.py +1 -24
  40. cribl_control_plane/models/inputcribltcp.py +17 -62
  41. cribl_control_plane/models/inputcrowdstrike.py +1 -54
  42. cribl_control_plane/models/inputdatadogagent.py +17 -62
  43. cribl_control_plane/models/inputdatagen.py +1 -24
  44. cribl_control_plane/models/inputedgeprometheus.py +34 -147
  45. cribl_control_plane/models/inputelastic.py +27 -119
  46. cribl_control_plane/models/inputeventhub.py +1 -182
  47. cribl_control_plane/models/inputexec.py +1 -33
  48. cribl_control_plane/models/inputfile.py +3 -42
  49. cribl_control_plane/models/inputfirehose.py +17 -62
  50. cribl_control_plane/models/inputgooglepubsub.py +1 -36
  51. cribl_control_plane/models/inputgrafana.py +32 -157
  52. cribl_control_plane/models/inputhttp.py +17 -62
  53. cribl_control_plane/models/inputhttpraw.py +17 -62
  54. cribl_control_plane/models/inputjournalfiles.py +1 -24
  55. cribl_control_plane/models/inputkafka.py +17 -189
  56. cribl_control_plane/models/inputkinesis.py +1 -80
  57. cribl_control_plane/models/inputkubeevents.py +1 -24
  58. cribl_control_plane/models/inputkubelogs.py +1 -33
  59. cribl_control_plane/models/inputkubemetrics.py +1 -33
  60. cribl_control_plane/models/inputloki.py +17 -71
  61. cribl_control_plane/models/inputmetrics.py +17 -62
  62. cribl_control_plane/models/inputmodeldriventelemetry.py +17 -62
  63. cribl_control_plane/models/inputmsk.py +18 -81
  64. cribl_control_plane/models/inputnetflow.py +1 -24
  65. cribl_control_plane/models/inputoffice365mgmt.py +1 -67
  66. cribl_control_plane/models/inputoffice365msgtrace.py +1 -67
  67. cribl_control_plane/models/inputoffice365service.py +1 -67
  68. cribl_control_plane/models/inputopentelemetry.py +16 -92
  69. cribl_control_plane/models/inputprometheus.py +34 -138
  70. cribl_control_plane/models/inputprometheusrw.py +17 -71
  71. cribl_control_plane/models/inputrawudp.py +1 -24
  72. cribl_control_plane/models/inputs3.py +1 -45
  73. cribl_control_plane/models/inputs3inventory.py +1 -54
  74. cribl_control_plane/models/inputsecuritylake.py +1 -54
  75. cribl_control_plane/models/inputsnmp.py +1 -40
  76. cribl_control_plane/models/inputsplunk.py +17 -85
  77. cribl_control_plane/models/inputsplunkhec.py +16 -70
  78. cribl_control_plane/models/inputsplunksearch.py +1 -63
  79. cribl_control_plane/models/inputsqs.py +1 -56
  80. cribl_control_plane/models/inputsyslog.py +32 -121
  81. cribl_control_plane/models/inputsystemmetrics.py +9 -142
  82. cribl_control_plane/models/inputsystemstate.py +1 -33
  83. cribl_control_plane/models/inputtcp.py +17 -81
  84. cribl_control_plane/models/inputtcpjson.py +17 -71
  85. cribl_control_plane/models/inputwef.py +1 -71
  86. cribl_control_plane/models/inputwindowsmetrics.py +9 -129
  87. cribl_control_plane/models/inputwineventlogs.py +1 -60
  88. cribl_control_plane/models/inputwiz.py +1 -45
  89. cribl_control_plane/models/inputwizwebhook.py +17 -62
  90. cribl_control_plane/models/inputzscalerhec.py +16 -70
  91. cribl_control_plane/models/jobinfo.py +1 -4
  92. cribl_control_plane/models/jobstatus.py +3 -34
  93. cribl_control_plane/models/listconfiggroupbyproductop.py +0 -11
  94. cribl_control_plane/models/logininfo.py +3 -3
  95. cribl_control_plane/models/masterworkerentry.py +1 -11
  96. cribl_control_plane/models/nodeprovidedinfo.py +1 -11
  97. cribl_control_plane/models/nodeupgradestatus.py +0 -38
  98. cribl_control_plane/models/output.py +88 -93
  99. cribl_control_plane/models/outputazureblob.py +1 -110
  100. cribl_control_plane/models/outputazuredataexplorer.py +87 -452
  101. cribl_control_plane/models/outputazureeventhub.py +19 -281
  102. cribl_control_plane/models/outputazurelogs.py +19 -115
  103. cribl_control_plane/models/outputchronicle.py +19 -115
  104. cribl_control_plane/models/outputclickhouse.py +19 -155
  105. cribl_control_plane/models/outputcloudwatch.py +19 -106
  106. cribl_control_plane/models/outputconfluentcloud.py +38 -311
  107. cribl_control_plane/models/outputcriblhttp.py +19 -135
  108. cribl_control_plane/models/outputcribllake.py +1 -97
  109. cribl_control_plane/models/outputcribltcp.py +19 -132
  110. cribl_control_plane/models/outputcrowdstrikenextgensiem.py +20 -129
  111. cribl_control_plane/models/outputdatadog.py +19 -159
  112. cribl_control_plane/models/outputdataset.py +19 -143
  113. cribl_control_plane/models/outputdiskspool.py +1 -11
  114. cribl_control_plane/models/outputdls3.py +1 -152
  115. cribl_control_plane/models/outputdynatracehttp.py +19 -160
  116. cribl_control_plane/models/outputdynatraceotlp.py +19 -160
  117. cribl_control_plane/models/outputelastic.py +19 -163
  118. cribl_control_plane/models/outputelasticcloud.py +19 -140
  119. cribl_control_plane/models/outputexabeam.py +1 -61
  120. cribl_control_plane/models/outputfilesystem.py +1 -87
  121. cribl_control_plane/models/outputgooglechronicle.py +20 -166
  122. cribl_control_plane/models/outputgooglecloudlogging.py +20 -131
  123. cribl_control_plane/models/outputgooglecloudstorage.py +1 -136
  124. cribl_control_plane/models/outputgooglepubsub.py +19 -106
  125. cribl_control_plane/models/outputgrafanacloud.py +37 -288
  126. cribl_control_plane/models/outputgraphite.py +19 -105
  127. cribl_control_plane/models/outputhoneycomb.py +19 -115
  128. cribl_control_plane/models/outputhumiohec.py +19 -126
  129. cribl_control_plane/models/outputinfluxdb.py +19 -130
  130. cribl_control_plane/models/outputkafka.py +34 -302
  131. cribl_control_plane/models/outputkinesis.py +19 -133
  132. cribl_control_plane/models/outputloki.py +17 -129
  133. cribl_control_plane/models/outputminio.py +1 -145
  134. cribl_control_plane/models/outputmsk.py +34 -193
  135. cribl_control_plane/models/outputnewrelic.py +19 -136
  136. cribl_control_plane/models/outputnewrelicevents.py +20 -128
  137. cribl_control_plane/models/outputopentelemetry.py +19 -178
  138. cribl_control_plane/models/outputprometheus.py +19 -115
  139. cribl_control_plane/models/outputring.py +1 -31
  140. cribl_control_plane/models/outputs3.py +1 -152
  141. cribl_control_plane/models/outputsecuritylake.py +1 -114
  142. cribl_control_plane/models/outputsentinel.py +19 -135
  143. cribl_control_plane/models/outputsentineloneaisiem.py +20 -134
  144. cribl_control_plane/models/outputservicenow.py +19 -168
  145. cribl_control_plane/models/outputsignalfx.py +19 -115
  146. cribl_control_plane/models/outputsns.py +17 -113
  147. cribl_control_plane/models/outputsplunk.py +19 -153
  148. cribl_control_plane/models/outputsplunkhec.py +19 -208
  149. cribl_control_plane/models/outputsplunklb.py +19 -182
  150. cribl_control_plane/models/outputsqs.py +17 -124
  151. cribl_control_plane/models/outputstatsd.py +19 -105
  152. cribl_control_plane/models/outputstatsdext.py +19 -105
  153. cribl_control_plane/models/outputsumologic.py +19 -117
  154. cribl_control_plane/models/outputsyslog.py +96 -259
  155. cribl_control_plane/models/outputtcpjson.py +19 -141
  156. cribl_control_plane/models/outputwavefront.py +19 -115
  157. cribl_control_plane/models/outputwebhook.py +19 -161
  158. cribl_control_plane/models/outputxsiam.py +17 -113
  159. cribl_control_plane/models/packinfo.py +5 -8
  160. cribl_control_plane/models/packinstallinfo.py +5 -8
  161. cribl_control_plane/models/resourcepolicy.py +0 -11
  162. cribl_control_plane/models/{uploadpackresponse.py → routecloneconf.py} +4 -4
  163. cribl_control_plane/models/routeconf.py +4 -3
  164. cribl_control_plane/models/runnablejobcollection.py +9 -72
  165. cribl_control_plane/models/runnablejobexecutor.py +9 -32
  166. cribl_control_plane/models/runnablejobscheduledsearch.py +9 -23
  167. cribl_control_plane/models/updateconfiggroupbyproductandidop.py +0 -11
  168. cribl_control_plane/models/updateconfiggroupdeploybyproductandidop.py +0 -11
  169. cribl_control_plane/packs.py +7 -202
  170. cribl_control_plane/routes_sdk.py +6 -6
  171. cribl_control_plane/tokens.py +15 -23
  172. {cribl_control_plane-0.2.1rc7.dist-info → cribl_control_plane-0.3.0a1.dist-info}/METADATA +9 -50
  173. cribl_control_plane-0.3.0a1.dist-info/RECORD +330 -0
  174. cribl_control_plane/models/groupcreaterequest.py +0 -171
  175. cribl_control_plane/models/outpostnodeinfo.py +0 -16
  176. cribl_control_plane/models/outputdatabricks.py +0 -482
  177. cribl_control_plane/models/updatepacksop.py +0 -25
  178. cribl_control_plane-0.2.1rc7.dist-info/RECORD +0 -331
  179. {cribl_control_plane-0.2.1rc7.dist-info → cribl_control_plane-0.3.0a1.dist-info}/WHEEL +0 -0
@@ -1,12 +1,11 @@
1
1
  """Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
2
2
 
3
3
  from __future__ import annotations
4
- from cribl_control_plane import models, utils
4
+ from cribl_control_plane import utils
5
5
  from cribl_control_plane.types import BaseModel
6
6
  from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
- from pydantic import field_serializer
10
9
  from pydantic.functional_validators import PlainValidator
11
10
  from typing import List, Optional
12
11
  from typing_extensions import Annotated, NotRequired, TypedDict
@@ -30,18 +29,14 @@ class InputSecurityLakeConnection(BaseModel):
30
29
  class InputSecurityLakeMode(str, Enum, metaclass=utils.OpenEnumMeta):
31
30
  r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
32
31
 
33
- # Smart
34
32
  SMART = "smart"
35
- # Always On
36
33
  ALWAYS = "always"
37
34
 
38
35
 
39
36
  class InputSecurityLakeCompression(str, Enum, metaclass=utils.OpenEnumMeta):
40
37
  r"""Codec to use to compress the persisted data"""
41
38
 
42
- # None
43
39
  NONE = "none"
44
- # Gzip
45
40
  GZIP = "gzip"
46
41
 
47
42
 
@@ -108,33 +103,12 @@ class InputSecurityLakePq(BaseModel):
108
103
  Optional[InputSecurityLakePqControls], pydantic.Field(alias="pqControls")
109
104
  ] = None
110
105
 
111
- @field_serializer("mode")
112
- def serialize_mode(self, value):
113
- if isinstance(value, str):
114
- try:
115
- return models.InputSecurityLakeMode(value)
116
- except ValueError:
117
- return value
118
- return value
119
-
120
- @field_serializer("compress")
121
- def serialize_compress(self, value):
122
- if isinstance(value, str):
123
- try:
124
- return models.InputSecurityLakeCompression(value)
125
- except ValueError:
126
- return value
127
- return value
128
-
129
106
 
130
107
  class InputSecurityLakeAuthenticationMethod(str, Enum, metaclass=utils.OpenEnumMeta):
131
108
  r"""AWS authentication method. Choose Auto to use IAM roles."""
132
109
 
133
- # Auto
134
110
  AUTO = "auto"
135
- # Manual
136
111
  MANUAL = "manual"
137
- # Secret Key pair
138
112
  SECRET = "secret"
139
113
 
140
114
 
@@ -469,30 +443,3 @@ class InputSecurityLake(BaseModel):
469
443
  Optional[str], pydantic.Field(alias="processedTagValue")
470
444
  ] = None
471
445
  r"""The value for the S3 object tag applied after processing. This field accepts an expression for dynamic generation."""
472
-
473
- @field_serializer("aws_authentication_method")
474
- def serialize_aws_authentication_method(self, value):
475
- if isinstance(value, str):
476
- try:
477
- return models.InputSecurityLakeAuthenticationMethod(value)
478
- except ValueError:
479
- return value
480
- return value
481
-
482
- @field_serializer("signature_version")
483
- def serialize_signature_version(self, value):
484
- if isinstance(value, str):
485
- try:
486
- return models.InputSecurityLakeSignatureVersion(value)
487
- except ValueError:
488
- return value
489
- return value
490
-
491
- @field_serializer("tag_after_processing")
492
- def serialize_tag_after_processing(self, value):
493
- if isinstance(value, str):
494
- try:
495
- return models.InputSecurityLakeTagAfterProcessing(value)
496
- except ValueError:
497
- return value
498
- return value
@@ -1,12 +1,11 @@
1
1
  """Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
2
2
 
3
3
  from __future__ import annotations
4
- from cribl_control_plane import models, utils
4
+ from cribl_control_plane import utils
5
5
  from cribl_control_plane.types import BaseModel
6
6
  from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
- from pydantic import field_serializer
10
9
  from pydantic.functional_validators import PlainValidator
11
10
  from typing import Any, List, Optional
12
11
  from typing_extensions import Annotated, NotRequired, TypedDict
@@ -30,18 +29,14 @@ class InputSnmpConnection(BaseModel):
30
29
  class InputSnmpMode(str, Enum, metaclass=utils.OpenEnumMeta):
31
30
  r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
32
31
 
33
- # Smart
34
32
  SMART = "smart"
35
- # Always On
36
33
  ALWAYS = "always"
37
34
 
38
35
 
39
36
  class InputSnmpCompression(str, Enum, metaclass=utils.OpenEnumMeta):
40
37
  r"""Codec to use to compress the persisted data"""
41
38
 
42
- # None
43
39
  NONE = "none"
44
- # Gzip
45
40
  GZIP = "gzip"
46
41
 
47
42
 
@@ -107,39 +102,14 @@ class InputSnmpPq(BaseModel):
107
102
  Optional[InputSnmpPqControls], pydantic.Field(alias="pqControls")
108
103
  ] = None
109
104
 
110
- @field_serializer("mode")
111
- def serialize_mode(self, value):
112
- if isinstance(value, str):
113
- try:
114
- return models.InputSnmpMode(value)
115
- except ValueError:
116
- return value
117
- return value
118
-
119
- @field_serializer("compress")
120
- def serialize_compress(self, value):
121
- if isinstance(value, str):
122
- try:
123
- return models.InputSnmpCompression(value)
124
- except ValueError:
125
- return value
126
- return value
127
-
128
105
 
129
106
  class AuthenticationProtocol(str, Enum, metaclass=utils.OpenEnumMeta):
130
- # None
131
107
  NONE = "none"
132
- # MD5
133
108
  MD5 = "md5"
134
- # SHA1
135
109
  SHA = "sha"
136
- # SHA224
137
110
  SHA224 = "sha224"
138
- # SHA256
139
111
  SHA256 = "sha256"
140
- # SHA384
141
112
  SHA384 = "sha384"
142
- # SHA512
143
113
  SHA512 = "sha512"
144
114
 
145
115
 
@@ -166,15 +136,6 @@ class V3User(BaseModel):
166
136
  "none"
167
137
  )
168
138
 
169
- @field_serializer("auth_protocol")
170
- def serialize_auth_protocol(self, value):
171
- if isinstance(value, str):
172
- try:
173
- return models.AuthenticationProtocol(value)
174
- except ValueError:
175
- return value
176
- return value
177
-
178
139
 
179
140
  class SNMPv3AuthenticationTypedDict(TypedDict):
180
141
  r"""Authentication parameters for SNMPv3 trap. Set the log level to debug if you are experiencing authentication or decryption issues."""
@@ -1,14 +1,13 @@
1
1
  """Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
2
2
 
3
3
  from __future__ import annotations
4
- from cribl_control_plane import models, utils
4
+ from cribl_control_plane import utils
5
5
  from cribl_control_plane.types import BaseModel
6
6
  from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
- from pydantic import field_serializer
10
9
  from pydantic.functional_validators import PlainValidator
11
- from typing import List, Optional
10
+ from typing import Any, List, Optional
12
11
  from typing_extensions import Annotated, NotRequired, TypedDict
13
12
 
14
13
 
@@ -30,18 +29,14 @@ class InputSplunkConnection(BaseModel):
30
29
  class InputSplunkMode(str, Enum, metaclass=utils.OpenEnumMeta):
31
30
  r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
32
31
 
33
- # Smart
34
32
  SMART = "smart"
35
- # Always On
36
33
  ALWAYS = "always"
37
34
 
38
35
 
39
36
  class InputSplunkPqCompression(str, Enum, metaclass=utils.OpenEnumMeta):
40
37
  r"""Codec to use to compress the persisted data"""
41
38
 
42
- # None
43
39
  NONE = "none"
44
- # Gzip
45
40
  GZIP = "gzip"
46
41
 
47
42
 
@@ -107,24 +102,6 @@ class InputSplunkPq(BaseModel):
107
102
  Optional[InputSplunkPqControls], pydantic.Field(alias="pqControls")
108
103
  ] = None
109
104
 
110
- @field_serializer("mode")
111
- def serialize_mode(self, value):
112
- if isinstance(value, str):
113
- try:
114
- return models.InputSplunkMode(value)
115
- except ValueError:
116
- return value
117
- return value
118
-
119
- @field_serializer("compress")
120
- def serialize_compress(self, value):
121
- if isinstance(value, str):
122
- try:
123
- return models.InputSplunkPqCompression(value)
124
- except ValueError:
125
- return value
126
- return value
127
-
128
105
 
129
106
  class InputSplunkMinimumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
130
107
  TL_SV1 = "TLSv1"
@@ -142,12 +119,6 @@ class InputSplunkMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
142
119
 
143
120
  class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
144
121
  disabled: NotRequired[bool]
145
- request_cert: NotRequired[bool]
146
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
147
- reject_unauthorized: NotRequired[bool]
148
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
149
- common_name_regex: NotRequired[str]
150
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
151
122
  certificate_name: NotRequired[str]
152
123
  r"""The name of the predefined certificate"""
153
124
  priv_key_path: NotRequired[str]
@@ -158,6 +129,10 @@ class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
158
129
  r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
159
130
  ca_path: NotRequired[str]
160
131
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
132
+ request_cert: NotRequired[bool]
133
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
134
+ reject_unauthorized: NotRequired[Any]
135
+ common_name_regex: NotRequired[Any]
161
136
  min_version: NotRequired[InputSplunkMinimumTLSVersion]
162
137
  max_version: NotRequired[InputSplunkMaximumTLSVersion]
163
138
 
@@ -165,19 +140,6 @@ class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
165
140
  class InputSplunkTLSSettingsServerSide(BaseModel):
166
141
  disabled: Optional[bool] = True
167
142
 
168
- request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
169
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
170
-
171
- reject_unauthorized: Annotated[
172
- Optional[bool], pydantic.Field(alias="rejectUnauthorized")
173
- ] = True
174
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
175
-
176
- common_name_regex: Annotated[
177
- Optional[str], pydantic.Field(alias="commonNameRegex")
178
- ] = "/.*/"
179
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
180
-
181
143
  certificate_name: Annotated[
182
144
  Optional[str], pydantic.Field(alias="certificateName")
183
145
  ] = None
@@ -195,6 +157,17 @@ class InputSplunkTLSSettingsServerSide(BaseModel):
195
157
  ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
196
158
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
197
159
 
160
+ request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
161
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
162
+
163
+ reject_unauthorized: Annotated[
164
+ Optional[Any], pydantic.Field(alias="rejectUnauthorized")
165
+ ] = None
166
+
167
+ common_name_regex: Annotated[
168
+ Optional[Any], pydantic.Field(alias="commonNameRegex")
169
+ ] = None
170
+
198
171
  min_version: Annotated[
199
172
  Annotated[
200
173
  Optional[InputSplunkMinimumTLSVersion],
@@ -211,24 +184,6 @@ class InputSplunkTLSSettingsServerSide(BaseModel):
211
184
  pydantic.Field(alias="maxVersion"),
212
185
  ] = None
213
186
 
214
- @field_serializer("min_version")
215
- def serialize_min_version(self, value):
216
- if isinstance(value, str):
217
- try:
218
- return models.InputSplunkMinimumTLSVersion(value)
219
- except ValueError:
220
- return value
221
- return value
222
-
223
- @field_serializer("max_version")
224
- def serialize_max_version(self, value):
225
- if isinstance(value, str):
226
- try:
227
- return models.InputSplunkMaximumTLSVersion(value)
228
- except ValueError:
229
- return value
230
- return value
231
-
232
187
 
233
188
  class InputSplunkMetadatumTypedDict(TypedDict):
234
189
  name: str
@@ -259,20 +214,15 @@ class InputSplunkAuthToken(BaseModel):
259
214
  class InputSplunkMaxS2SVersion(str, Enum, metaclass=utils.OpenEnumMeta):
260
215
  r"""The highest S2S protocol version to advertise during handshake"""
261
216
 
262
- # v3
263
217
  V3 = "v3"
264
- # v4
265
218
  V4 = "v4"
266
219
 
267
220
 
268
221
  class InputSplunkCompression(str, Enum, metaclass=utils.OpenEnumMeta):
269
222
  r"""Controls whether to support reading compressed data from a forwarder. Select 'Automatic' to match the forwarder's configuration, or 'Disabled' to reject compressed connections."""
270
223
 
271
- # Disabled
272
224
  DISABLED = "disabled"
273
- # Automatic
274
225
  AUTO = "auto"
275
- # Always
276
226
  ALWAYS = "always"
277
227
 
278
228
 
@@ -448,21 +398,3 @@ class InputSplunk(BaseModel):
448
398
  Optional[InputSplunkCompression], PlainValidator(validate_open_enum(False))
449
399
  ] = InputSplunkCompression.DISABLED
450
400
  r"""Controls whether to support reading compressed data from a forwarder. Select 'Automatic' to match the forwarder's configuration, or 'Disabled' to reject compressed connections."""
451
-
452
- @field_serializer("max_s2_sversion")
453
- def serialize_max_s2_sversion(self, value):
454
- if isinstance(value, str):
455
- try:
456
- return models.InputSplunkMaxS2SVersion(value)
457
- except ValueError:
458
- return value
459
- return value
460
-
461
- @field_serializer("compress")
462
- def serialize_compress(self, value):
463
- if isinstance(value, str):
464
- try:
465
- return models.InputSplunkCompression(value)
466
- except ValueError:
467
- return value
468
- return value
@@ -1,12 +1,11 @@
1
1
  """Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
2
2
 
3
3
  from __future__ import annotations
4
- from cribl_control_plane import models, utils
4
+ from cribl_control_plane import utils
5
5
  from cribl_control_plane.types import BaseModel
6
6
  from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
- from pydantic import field_serializer
10
9
  from pydantic.functional_validators import PlainValidator
11
10
  from typing import Any, List, Optional
12
11
  from typing_extensions import Annotated, NotRequired, TypedDict
@@ -30,18 +29,14 @@ class InputSplunkHecConnection(BaseModel):
30
29
  class InputSplunkHecMode(str, Enum, metaclass=utils.OpenEnumMeta):
31
30
  r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
32
31
 
33
- # Smart
34
32
  SMART = "smart"
35
- # Always On
36
33
  ALWAYS = "always"
37
34
 
38
35
 
39
36
  class InputSplunkHecCompression(str, Enum, metaclass=utils.OpenEnumMeta):
40
37
  r"""Codec to use to compress the persisted data"""
41
38
 
42
- # None
43
39
  NONE = "none"
44
- # Gzip
45
40
  GZIP = "gzip"
46
41
 
47
42
 
@@ -107,24 +102,6 @@ class InputSplunkHecPq(BaseModel):
107
102
  Optional[InputSplunkHecPqControls], pydantic.Field(alias="pqControls")
108
103
  ] = None
109
104
 
110
- @field_serializer("mode")
111
- def serialize_mode(self, value):
112
- if isinstance(value, str):
113
- try:
114
- return models.InputSplunkHecMode(value)
115
- except ValueError:
116
- return value
117
- return value
118
-
119
- @field_serializer("compress")
120
- def serialize_compress(self, value):
121
- if isinstance(value, str):
122
- try:
123
- return models.InputSplunkHecCompression(value)
124
- except ValueError:
125
- return value
126
- return value
127
-
128
105
 
129
106
  class InputSplunkHecAuthenticationMethod(str, Enum, metaclass=utils.OpenEnumMeta):
130
107
  r"""Select Manual to enter an auth token directly, or select Secret to use a text secret to authenticate"""
@@ -187,15 +164,6 @@ class InputSplunkHecAuthToken(BaseModel):
187
164
  metadata: Optional[List[InputSplunkHecAuthTokenMetadatum]] = None
188
165
  r"""Fields to add to events referencing this token"""
189
166
 
190
- @field_serializer("auth_type")
191
- def serialize_auth_type(self, value):
192
- if isinstance(value, str):
193
- try:
194
- return models.InputSplunkHecAuthenticationMethod(value)
195
- except ValueError:
196
- return value
197
- return value
198
-
199
167
 
200
168
  class InputSplunkHecMinimumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
201
169
  TL_SV1 = "TLSv1"
@@ -213,12 +181,6 @@ class InputSplunkHecMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
213
181
 
214
182
  class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
215
183
  disabled: NotRequired[bool]
216
- request_cert: NotRequired[bool]
217
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
218
- reject_unauthorized: NotRequired[bool]
219
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
220
- common_name_regex: NotRequired[str]
221
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
222
184
  certificate_name: NotRequired[str]
223
185
  r"""The name of the predefined certificate"""
224
186
  priv_key_path: NotRequired[str]
@@ -229,6 +191,10 @@ class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
229
191
  r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
230
192
  ca_path: NotRequired[str]
231
193
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
194
+ request_cert: NotRequired[bool]
195
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
196
+ reject_unauthorized: NotRequired[Any]
197
+ common_name_regex: NotRequired[Any]
232
198
  min_version: NotRequired[InputSplunkHecMinimumTLSVersion]
233
199
  max_version: NotRequired[InputSplunkHecMaximumTLSVersion]
234
200
 
@@ -236,19 +202,6 @@ class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
236
202
  class InputSplunkHecTLSSettingsServerSide(BaseModel):
237
203
  disabled: Optional[bool] = True
238
204
 
239
- request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
240
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
241
-
242
- reject_unauthorized: Annotated[
243
- Optional[bool], pydantic.Field(alias="rejectUnauthorized")
244
- ] = True
245
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
246
-
247
- common_name_regex: Annotated[
248
- Optional[str], pydantic.Field(alias="commonNameRegex")
249
- ] = "/.*/"
250
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
251
-
252
205
  certificate_name: Annotated[
253
206
  Optional[str], pydantic.Field(alias="certificateName")
254
207
  ] = None
@@ -266,6 +219,17 @@ class InputSplunkHecTLSSettingsServerSide(BaseModel):
266
219
  ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
267
220
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
268
221
 
222
+ request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
223
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
224
+
225
+ reject_unauthorized: Annotated[
226
+ Optional[Any], pydantic.Field(alias="rejectUnauthorized")
227
+ ] = None
228
+
229
+ common_name_regex: Annotated[
230
+ Optional[Any], pydantic.Field(alias="commonNameRegex")
231
+ ] = None
232
+
269
233
  min_version: Annotated[
270
234
  Annotated[
271
235
  Optional[InputSplunkHecMinimumTLSVersion],
@@ -282,24 +246,6 @@ class InputSplunkHecTLSSettingsServerSide(BaseModel):
282
246
  pydantic.Field(alias="maxVersion"),
283
247
  ] = None
284
248
 
285
- @field_serializer("min_version")
286
- def serialize_min_version(self, value):
287
- if isinstance(value, str):
288
- try:
289
- return models.InputSplunkHecMinimumTLSVersion(value)
290
- except ValueError:
291
- return value
292
- return value
293
-
294
- @field_serializer("max_version")
295
- def serialize_max_version(self, value):
296
- if isinstance(value, str):
297
- try:
298
- return models.InputSplunkHecMaximumTLSVersion(value)
299
- except ValueError:
300
- return value
301
- return value
302
-
303
249
 
304
250
  class InputSplunkHecMetadatumTypedDict(TypedDict):
305
251
  name: str
@@ -1,12 +1,11 @@
1
1
  """Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
2
2
 
3
3
  from __future__ import annotations
4
- from cribl_control_plane import models, utils
4
+ from cribl_control_plane import utils
5
5
  from cribl_control_plane.types import BaseModel
6
6
  from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
- from pydantic import field_serializer
10
9
  from pydantic.functional_validators import PlainValidator
11
10
  from typing import List, Optional
12
11
  from typing_extensions import Annotated, NotRequired, TypedDict
@@ -30,18 +29,14 @@ class InputSplunkSearchConnection(BaseModel):
30
29
  class InputSplunkSearchMode(str, Enum, metaclass=utils.OpenEnumMeta):
31
30
  r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
32
31
 
33
- # Smart
34
32
  SMART = "smart"
35
- # Always On
36
33
  ALWAYS = "always"
37
34
 
38
35
 
39
36
  class InputSplunkSearchCompression(str, Enum, metaclass=utils.OpenEnumMeta):
40
37
  r"""Codec to use to compress the persisted data"""
41
38
 
42
- # None
43
39
  NONE = "none"
44
- # Gzip
45
40
  GZIP = "gzip"
46
41
 
47
42
 
@@ -108,24 +103,6 @@ class InputSplunkSearchPq(BaseModel):
108
103
  Optional[InputSplunkSearchPqControls], pydantic.Field(alias="pqControls")
109
104
  ] = None
110
105
 
111
- @field_serializer("mode")
112
- def serialize_mode(self, value):
113
- if isinstance(value, str):
114
- try:
115
- return models.InputSplunkSearchMode(value)
116
- except ValueError:
117
- return value
118
- return value
119
-
120
- @field_serializer("compress")
121
- def serialize_compress(self, value):
122
- if isinstance(value, str):
123
- try:
124
- return models.InputSplunkSearchCompression(value)
125
- except ValueError:
126
- return value
127
- return value
128
-
129
106
 
130
107
  class OutputMode(str, Enum, metaclass=utils.OpenEnumMeta):
131
108
  r"""Format of the returned output"""
@@ -185,11 +162,8 @@ class InputSplunkSearchMetadatum(BaseModel):
185
162
  class InputSplunkSearchRetryType(str, Enum, metaclass=utils.OpenEnumMeta):
186
163
  r"""The algorithm to use when performing HTTP retries"""
187
164
 
188
- # Disabled
189
165
  NONE = "none"
190
- # Backoff
191
166
  BACKOFF = "backoff"
192
- # Static
193
167
  STATIC = "static"
194
168
 
195
169
 
@@ -245,15 +219,6 @@ class InputSplunkSearchRetryRules(BaseModel):
245
219
  ] = False
246
220
  r"""Retry request when a connection reset (ECONNRESET) error occurs"""
247
221
 
248
- @field_serializer("type")
249
- def serialize_type(self, value):
250
- if isinstance(value, str):
251
- try:
252
- return models.InputSplunkSearchRetryType(value)
253
- except ValueError:
254
- return value
255
- return value
256
-
257
222
 
258
223
  class InputSplunkSearchAuthenticationType(str, Enum, metaclass=utils.OpenEnumMeta):
259
224
  r"""Splunk Search authentication type"""
@@ -583,30 +548,3 @@ class InputSplunkSearch(BaseModel):
583
548
  pydantic.Field(alias="oauthHeaders"),
584
549
  ] = None
585
550
  r"""Additional headers to send in the OAuth login request. @{product} will automatically add the content-type header 'application/x-www-form-urlencoded' when sending this request."""
586
-
587
- @field_serializer("output_mode")
588
- def serialize_output_mode(self, value):
589
- if isinstance(value, str):
590
- try:
591
- return models.OutputMode(value)
592
- except ValueError:
593
- return value
594
- return value
595
-
596
- @field_serializer("log_level")
597
- def serialize_log_level(self, value):
598
- if isinstance(value, str):
599
- try:
600
- return models.InputSplunkSearchLogLevel(value)
601
- except ValueError:
602
- return value
603
- return value
604
-
605
- @field_serializer("auth_type")
606
- def serialize_auth_type(self, value):
607
- if isinstance(value, str):
608
- try:
609
- return models.InputSplunkSearchAuthenticationType(value)
610
- except ValueError:
611
- return value
612
- return value