strongdm 11.0.0__zip → 11.3.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-11.0.0 → strongdm-11.3.0}/PKG-INFO +2 -2
- {strongdm-11.0.0 → strongdm-11.3.0}/setup.py +2 -2
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/access_request_events_history_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/access_requests_history_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/access_requests_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflow_approvers_history_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflow_approvers_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflow_steps_history_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflow_steps_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflows_history_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflows_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/client.py +22 -1
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/constants.py +2 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/drivers_pb2.py +188 -174
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/models.py +408 -8
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/options_pb2.py +24 -24
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/plumbing.py +266 -0
- strongdm-11.3.0/strongdm/policies_history_pb2.py +100 -0
- strongdm-11.3.0/strongdm/policies_history_pb2_grpc.py +84 -0
- strongdm-11.3.0/strongdm/policies_pb2.py +226 -0
- strongdm-11.3.0/strongdm/policies_pb2_grpc.py +223 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/svc.py +245 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_approvers_history_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_approvers_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_assignments_history_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_assignments_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_roles_history_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_roles_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflows_history_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflows_pb2.py +3 -3
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm.egg-info/SOURCES.txt +4 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/LICENSE +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/README.md +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/setup.cfg +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/__init__.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/errors.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-11.0.0 → strongdm-11.3.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -20,6 +20,7 @@ import collections
|
|
20
20
|
|
21
21
|
class AKS:
|
22
22
|
__slots__ = [
|
23
|
+
'allow_resource_role_bypass',
|
23
24
|
'bind_interface',
|
24
25
|
'certificate_authority',
|
25
26
|
'client_certificate',
|
@@ -43,6 +44,7 @@ class AKS:
|
|
43
44
|
|
44
45
|
def __init__(
|
45
46
|
self,
|
47
|
+
allow_resource_role_bypass=None,
|
46
48
|
bind_interface=None,
|
47
49
|
certificate_authority=None,
|
48
50
|
client_certificate=None,
|
@@ -63,6 +65,11 @@ class AKS:
|
|
63
65
|
subdomain=None,
|
64
66
|
tags=None,
|
65
67
|
):
|
68
|
+
self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
|
69
|
+
'''
|
70
|
+
If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
|
71
|
+
when a resource role is not provided.
|
72
|
+
'''
|
66
73
|
self.bind_interface = bind_interface if bind_interface is not None else ''
|
67
74
|
'''
|
68
75
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
@@ -143,6 +150,7 @@ class AKS:
|
|
143
150
|
|
144
151
|
def __repr__(self):
|
145
152
|
return '<sdm.AKS ' + \
|
153
|
+
'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
|
146
154
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
147
155
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
148
156
|
'client_certificate: ' + repr(self.client_certificate) + ' ' +\
|
@@ -166,6 +174,7 @@ class AKS:
|
|
166
174
|
|
167
175
|
def to_dict(self):
|
168
176
|
return {
|
177
|
+
'allow_resource_role_bypass': self.allow_resource_role_bypass,
|
169
178
|
'bind_interface': self.bind_interface,
|
170
179
|
'certificate_authority': self.certificate_authority,
|
171
180
|
'client_certificate': self.client_certificate,
|
@@ -191,6 +200,7 @@ class AKS:
|
|
191
200
|
@classmethod
|
192
201
|
def from_dict(cls, d):
|
193
202
|
return cls(
|
203
|
+
allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
|
194
204
|
bind_interface=d.get('bind_interface'),
|
195
205
|
certificate_authority=d.get('certificate_authority'),
|
196
206
|
client_certificate=d.get('client_certificate'),
|
@@ -364,6 +374,7 @@ class AKSBasicAuth:
|
|
364
374
|
|
365
375
|
class AKSServiceAccount:
|
366
376
|
__slots__ = [
|
377
|
+
'allow_resource_role_bypass',
|
367
378
|
'bind_interface',
|
368
379
|
'discovery_enabled',
|
369
380
|
'discovery_username',
|
@@ -385,6 +396,7 @@ class AKSServiceAccount:
|
|
385
396
|
|
386
397
|
def __init__(
|
387
398
|
self,
|
399
|
+
allow_resource_role_bypass=None,
|
388
400
|
bind_interface=None,
|
389
401
|
discovery_enabled=None,
|
390
402
|
discovery_username=None,
|
@@ -403,6 +415,11 @@ class AKSServiceAccount:
|
|
403
415
|
tags=None,
|
404
416
|
token=None,
|
405
417
|
):
|
418
|
+
self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
|
419
|
+
'''
|
420
|
+
If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
|
421
|
+
when a resource role is not provided.
|
422
|
+
'''
|
406
423
|
self.bind_interface = bind_interface if bind_interface is not None else ''
|
407
424
|
'''
|
408
425
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
@@ -475,6 +492,7 @@ class AKSServiceAccount:
|
|
475
492
|
|
476
493
|
def __repr__(self):
|
477
494
|
return '<sdm.AKSServiceAccount ' + \
|
495
|
+
'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
|
478
496
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
479
497
|
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
480
498
|
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
@@ -496,6 +514,7 @@ class AKSServiceAccount:
|
|
496
514
|
|
497
515
|
def to_dict(self):
|
498
516
|
return {
|
517
|
+
'allow_resource_role_bypass': self.allow_resource_role_bypass,
|
499
518
|
'bind_interface': self.bind_interface,
|
500
519
|
'discovery_enabled': self.discovery_enabled,
|
501
520
|
'discovery_username': self.discovery_username,
|
@@ -519,6 +538,7 @@ class AKSServiceAccount:
|
|
519
538
|
@classmethod
|
520
539
|
def from_dict(cls, d):
|
521
540
|
return cls(
|
541
|
+
allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
|
522
542
|
bind_interface=d.get('bind_interface'),
|
523
543
|
discovery_enabled=d.get('discovery_enabled'),
|
524
544
|
discovery_username=d.get('discovery_username'),
|
@@ -3342,6 +3362,7 @@ class ActivityGetResponse:
|
|
3342
3362
|
class AmazonEKS:
|
3343
3363
|
__slots__ = [
|
3344
3364
|
'access_key',
|
3365
|
+
'allow_resource_role_bypass',
|
3345
3366
|
'bind_interface',
|
3346
3367
|
'certificate_authority',
|
3347
3368
|
'cluster_name',
|
@@ -3368,6 +3389,7 @@ class AmazonEKS:
|
|
3368
3389
|
def __init__(
|
3369
3390
|
self,
|
3370
3391
|
access_key=None,
|
3392
|
+
allow_resource_role_bypass=None,
|
3371
3393
|
bind_interface=None,
|
3372
3394
|
certificate_authority=None,
|
3373
3395
|
cluster_name=None,
|
@@ -3394,6 +3416,11 @@ class AmazonEKS:
|
|
3394
3416
|
'''
|
3395
3417
|
The Access Key ID to use to authenticate.
|
3396
3418
|
'''
|
3419
|
+
self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
|
3420
|
+
'''
|
3421
|
+
If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
|
3422
|
+
when a resource role is not provided.
|
3423
|
+
'''
|
3397
3424
|
self.bind_interface = bind_interface if bind_interface is not None else ''
|
3398
3425
|
'''
|
3399
3426
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
@@ -3483,6 +3510,7 @@ class AmazonEKS:
|
|
3483
3510
|
def __repr__(self):
|
3484
3511
|
return '<sdm.AmazonEKS ' + \
|
3485
3512
|
'access_key: ' + repr(self.access_key) + ' ' +\
|
3513
|
+
'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
|
3486
3514
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
3487
3515
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
3488
3516
|
'cluster_name: ' + repr(self.cluster_name) + ' ' +\
|
@@ -3509,6 +3537,7 @@ class AmazonEKS:
|
|
3509
3537
|
def to_dict(self):
|
3510
3538
|
return {
|
3511
3539
|
'access_key': self.access_key,
|
3540
|
+
'allow_resource_role_bypass': self.allow_resource_role_bypass,
|
3512
3541
|
'bind_interface': self.bind_interface,
|
3513
3542
|
'certificate_authority': self.certificate_authority,
|
3514
3543
|
'cluster_name': self.cluster_name,
|
@@ -3537,6 +3566,7 @@ class AmazonEKS:
|
|
3537
3566
|
def from_dict(cls, d):
|
3538
3567
|
return cls(
|
3539
3568
|
access_key=d.get('access_key'),
|
3569
|
+
allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
|
3540
3570
|
bind_interface=d.get('bind_interface'),
|
3541
3571
|
certificate_authority=d.get('certificate_authority'),
|
3542
3572
|
cluster_name=d.get('cluster_name'),
|
@@ -3564,6 +3594,7 @@ class AmazonEKS:
|
|
3564
3594
|
|
3565
3595
|
class AmazonEKSInstanceProfile:
|
3566
3596
|
__slots__ = [
|
3597
|
+
'allow_resource_role_bypass',
|
3567
3598
|
'bind_interface',
|
3568
3599
|
'certificate_authority',
|
3569
3600
|
'cluster_name',
|
@@ -3588,6 +3619,7 @@ class AmazonEKSInstanceProfile:
|
|
3588
3619
|
|
3589
3620
|
def __init__(
|
3590
3621
|
self,
|
3622
|
+
allow_resource_role_bypass=None,
|
3591
3623
|
bind_interface=None,
|
3592
3624
|
certificate_authority=None,
|
3593
3625
|
cluster_name=None,
|
@@ -3609,6 +3641,11 @@ class AmazonEKSInstanceProfile:
|
|
3609
3641
|
subdomain=None,
|
3610
3642
|
tags=None,
|
3611
3643
|
):
|
3644
|
+
self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
|
3645
|
+
'''
|
3646
|
+
If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
|
3647
|
+
when a resource role is not provided.
|
3648
|
+
'''
|
3612
3649
|
self.bind_interface = bind_interface if bind_interface is not None else ''
|
3613
3650
|
'''
|
3614
3651
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
@@ -3693,6 +3730,7 @@ class AmazonEKSInstanceProfile:
|
|
3693
3730
|
|
3694
3731
|
def __repr__(self):
|
3695
3732
|
return '<sdm.AmazonEKSInstanceProfile ' + \
|
3733
|
+
'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
|
3696
3734
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
3697
3735
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
3698
3736
|
'cluster_name: ' + repr(self.cluster_name) + ' ' +\
|
@@ -3717,6 +3755,7 @@ class AmazonEKSInstanceProfile:
|
|
3717
3755
|
|
3718
3756
|
def to_dict(self):
|
3719
3757
|
return {
|
3758
|
+
'allow_resource_role_bypass': self.allow_resource_role_bypass,
|
3720
3759
|
'bind_interface': self.bind_interface,
|
3721
3760
|
'certificate_authority': self.certificate_authority,
|
3722
3761
|
'cluster_name': self.cluster_name,
|
@@ -3743,6 +3782,7 @@ class AmazonEKSInstanceProfile:
|
|
3743
3782
|
@classmethod
|
3744
3783
|
def from_dict(cls, d):
|
3745
3784
|
return cls(
|
3785
|
+
allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
|
3746
3786
|
bind_interface=d.get('bind_interface'),
|
3747
3787
|
certificate_authority=d.get('certificate_authority'),
|
3748
3788
|
cluster_name=d.get('cluster_name'),
|
@@ -9651,6 +9691,7 @@ class GetResponseMetadata:
|
|
9651
9691
|
|
9652
9692
|
class GoogleGKE:
|
9653
9693
|
__slots__ = [
|
9694
|
+
'allow_resource_role_bypass',
|
9654
9695
|
'bind_interface',
|
9655
9696
|
'certificate_authority',
|
9656
9697
|
'discovery_enabled',
|
@@ -9672,6 +9713,7 @@ class GoogleGKE:
|
|
9672
9713
|
|
9673
9714
|
def __init__(
|
9674
9715
|
self,
|
9716
|
+
allow_resource_role_bypass=None,
|
9675
9717
|
bind_interface=None,
|
9676
9718
|
certificate_authority=None,
|
9677
9719
|
discovery_enabled=None,
|
@@ -9690,6 +9732,11 @@ class GoogleGKE:
|
|
9690
9732
|
subdomain=None,
|
9691
9733
|
tags=None,
|
9692
9734
|
):
|
9735
|
+
self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
|
9736
|
+
'''
|
9737
|
+
If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
|
9738
|
+
when a resource role is not provided.
|
9739
|
+
'''
|
9693
9740
|
self.bind_interface = bind_interface if bind_interface is not None else ''
|
9694
9741
|
'''
|
9695
9742
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
@@ -9762,6 +9809,7 @@ class GoogleGKE:
|
|
9762
9809
|
|
9763
9810
|
def __repr__(self):
|
9764
9811
|
return '<sdm.GoogleGKE ' + \
|
9812
|
+
'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
|
9765
9813
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
9766
9814
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
9767
9815
|
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
@@ -9783,6 +9831,7 @@ class GoogleGKE:
|
|
9783
9831
|
|
9784
9832
|
def to_dict(self):
|
9785
9833
|
return {
|
9834
|
+
'allow_resource_role_bypass': self.allow_resource_role_bypass,
|
9786
9835
|
'bind_interface': self.bind_interface,
|
9787
9836
|
'certificate_authority': self.certificate_authority,
|
9788
9837
|
'discovery_enabled': self.discovery_enabled,
|
@@ -9806,6 +9855,7 @@ class GoogleGKE:
|
|
9806
9855
|
@classmethod
|
9807
9856
|
def from_dict(cls, d):
|
9808
9857
|
return cls(
|
9858
|
+
allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
|
9809
9859
|
bind_interface=d.get('bind_interface'),
|
9810
9860
|
certificate_authority=d.get('certificate_authority'),
|
9811
9861
|
discovery_enabled=d.get('discovery_enabled'),
|
@@ -11487,6 +11537,7 @@ class KeyfactorX509Store:
|
|
11487
11537
|
|
11488
11538
|
class Kubernetes:
|
11489
11539
|
__slots__ = [
|
11540
|
+
'allow_resource_role_bypass',
|
11490
11541
|
'bind_interface',
|
11491
11542
|
'certificate_authority',
|
11492
11543
|
'client_certificate',
|
@@ -11510,6 +11561,7 @@ class Kubernetes:
|
|
11510
11561
|
|
11511
11562
|
def __init__(
|
11512
11563
|
self,
|
11564
|
+
allow_resource_role_bypass=None,
|
11513
11565
|
bind_interface=None,
|
11514
11566
|
certificate_authority=None,
|
11515
11567
|
client_certificate=None,
|
@@ -11530,6 +11582,11 @@ class Kubernetes:
|
|
11530
11582
|
subdomain=None,
|
11531
11583
|
tags=None,
|
11532
11584
|
):
|
11585
|
+
self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
|
11586
|
+
'''
|
11587
|
+
If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
|
11588
|
+
when a resource role is not provided.
|
11589
|
+
'''
|
11533
11590
|
self.bind_interface = bind_interface if bind_interface is not None else ''
|
11534
11591
|
'''
|
11535
11592
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
@@ -11610,6 +11667,7 @@ class Kubernetes:
|
|
11610
11667
|
|
11611
11668
|
def __repr__(self):
|
11612
11669
|
return '<sdm.Kubernetes ' + \
|
11670
|
+
'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
|
11613
11671
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
11614
11672
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
11615
11673
|
'client_certificate: ' + repr(self.client_certificate) + ' ' +\
|
@@ -11633,6 +11691,7 @@ class Kubernetes:
|
|
11633
11691
|
|
11634
11692
|
def to_dict(self):
|
11635
11693
|
return {
|
11694
|
+
'allow_resource_role_bypass': self.allow_resource_role_bypass,
|
11636
11695
|
'bind_interface': self.bind_interface,
|
11637
11696
|
'certificate_authority': self.certificate_authority,
|
11638
11697
|
'client_certificate': self.client_certificate,
|
@@ -11658,6 +11717,7 @@ class Kubernetes:
|
|
11658
11717
|
@classmethod
|
11659
11718
|
def from_dict(cls, d):
|
11660
11719
|
return cls(
|
11720
|
+
allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
|
11661
11721
|
bind_interface=d.get('bind_interface'),
|
11662
11722
|
certificate_authority=d.get('certificate_authority'),
|
11663
11723
|
client_certificate=d.get('client_certificate'),
|
@@ -11831,6 +11891,7 @@ class KubernetesBasicAuth:
|
|
11831
11891
|
|
11832
11892
|
class KubernetesServiceAccount:
|
11833
11893
|
__slots__ = [
|
11894
|
+
'allow_resource_role_bypass',
|
11834
11895
|
'bind_interface',
|
11835
11896
|
'discovery_enabled',
|
11836
11897
|
'discovery_username',
|
@@ -11852,6 +11913,7 @@ class KubernetesServiceAccount:
|
|
11852
11913
|
|
11853
11914
|
def __init__(
|
11854
11915
|
self,
|
11916
|
+
allow_resource_role_bypass=None,
|
11855
11917
|
bind_interface=None,
|
11856
11918
|
discovery_enabled=None,
|
11857
11919
|
discovery_username=None,
|
@@ -11870,6 +11932,11 @@ class KubernetesServiceAccount:
|
|
11870
11932
|
tags=None,
|
11871
11933
|
token=None,
|
11872
11934
|
):
|
11935
|
+
self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
|
11936
|
+
'''
|
11937
|
+
If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
|
11938
|
+
when a resource role is not provided.
|
11939
|
+
'''
|
11873
11940
|
self.bind_interface = bind_interface if bind_interface is not None else ''
|
11874
11941
|
'''
|
11875
11942
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
@@ -11942,6 +12009,7 @@ class KubernetesServiceAccount:
|
|
11942
12009
|
|
11943
12010
|
def __repr__(self):
|
11944
12011
|
return '<sdm.KubernetesServiceAccount ' + \
|
12012
|
+
'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
|
11945
12013
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
11946
12014
|
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
11947
12015
|
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
@@ -11963,6 +12031,7 @@ class KubernetesServiceAccount:
|
|
11963
12031
|
|
11964
12032
|
def to_dict(self):
|
11965
12033
|
return {
|
12034
|
+
'allow_resource_role_bypass': self.allow_resource_role_bypass,
|
11966
12035
|
'bind_interface': self.bind_interface,
|
11967
12036
|
'discovery_enabled': self.discovery_enabled,
|
11968
12037
|
'discovery_username': self.discovery_username,
|
@@ -11986,6 +12055,7 @@ class KubernetesServiceAccount:
|
|
11986
12055
|
@classmethod
|
11987
12056
|
def from_dict(cls, d):
|
11988
12057
|
return cls(
|
12058
|
+
allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
|
11989
12059
|
bind_interface=d.get('bind_interface'),
|
11990
12060
|
discovery_enabled=d.get('discovery_enabled'),
|
11991
12061
|
discovery_username=d.get('discovery_username'),
|
@@ -13162,10 +13232,6 @@ class Memsql:
|
|
13162
13232
|
|
13163
13233
|
|
13164
13234
|
class MongoHost:
|
13165
|
-
'''
|
13166
|
-
MongoHost is currently unstable, and its API may change, or it may be removed,
|
13167
|
-
without a major version bump.
|
13168
|
-
'''
|
13169
13235
|
__slots__ = [
|
13170
13236
|
'auth_database',
|
13171
13237
|
'bind_interface',
|
@@ -13323,6 +13389,10 @@ class MongoHost:
|
|
13323
13389
|
|
13324
13390
|
|
13325
13391
|
class MongoLegacyHost:
|
13392
|
+
'''
|
13393
|
+
MongoLegacyHost is currently unstable, and its API may change, or it may be removed,
|
13394
|
+
without a major version bump.
|
13395
|
+
'''
|
13326
13396
|
__slots__ = [
|
13327
13397
|
'auth_database',
|
13328
13398
|
'bind_interface',
|
@@ -13480,6 +13550,10 @@ class MongoLegacyHost:
|
|
13480
13550
|
|
13481
13551
|
|
13482
13552
|
class MongoLegacyReplicaset:
|
13553
|
+
'''
|
13554
|
+
MongoLegacyReplicaset is currently unstable, and its API may change, or it may be removed,
|
13555
|
+
without a major version bump.
|
13556
|
+
'''
|
13483
13557
|
__slots__ = [
|
13484
13558
|
'auth_database',
|
13485
13559
|
'bind_interface',
|
@@ -13655,10 +13729,6 @@ class MongoLegacyReplicaset:
|
|
13655
13729
|
|
13656
13730
|
|
13657
13731
|
class MongoReplicaSet:
|
13658
|
-
'''
|
13659
|
-
MongoReplicaSet is currently unstable, and its API may change, or it may be removed,
|
13660
|
-
without a major version bump.
|
13661
|
-
'''
|
13662
13732
|
__slots__ = [
|
13663
13733
|
'auth_database',
|
13664
13734
|
'bind_interface',
|
@@ -16027,6 +16097,336 @@ class PeeringGroupResourceGetResponse:
|
|
16027
16097
|
)
|
16028
16098
|
|
16029
16099
|
|
16100
|
+
class Policy:
|
16101
|
+
'''
|
16102
|
+
Policy is a collection of one or more statements that enforce fine-grained access control
|
16103
|
+
for the users of an organization.
|
16104
|
+
'''
|
16105
|
+
__slots__ = [
|
16106
|
+
'description',
|
16107
|
+
'id',
|
16108
|
+
'name',
|
16109
|
+
'policy',
|
16110
|
+
]
|
16111
|
+
|
16112
|
+
def __init__(
|
16113
|
+
self,
|
16114
|
+
description=None,
|
16115
|
+
id=None,
|
16116
|
+
name=None,
|
16117
|
+
policy=None,
|
16118
|
+
):
|
16119
|
+
self.description = description if description is not None else ''
|
16120
|
+
'''
|
16121
|
+
Optional description of the Policy.
|
16122
|
+
'''
|
16123
|
+
self.id = id if id is not None else ''
|
16124
|
+
'''
|
16125
|
+
Unique identifier of the Policy.
|
16126
|
+
'''
|
16127
|
+
self.name = name if name is not None else ''
|
16128
|
+
'''
|
16129
|
+
Unique human-readable name of the Policy.
|
16130
|
+
'''
|
16131
|
+
self.policy = policy if policy is not None else ''
|
16132
|
+
'''
|
16133
|
+
The content of the Policy, in Cedar policy language.
|
16134
|
+
'''
|
16135
|
+
|
16136
|
+
def __repr__(self):
|
16137
|
+
return '<sdm.Policy ' + \
|
16138
|
+
'description: ' + repr(self.description) + ' ' +\
|
16139
|
+
'id: ' + repr(self.id) + ' ' +\
|
16140
|
+
'name: ' + repr(self.name) + ' ' +\
|
16141
|
+
'policy: ' + repr(self.policy) + ' ' +\
|
16142
|
+
'>'
|
16143
|
+
|
16144
|
+
def to_dict(self):
|
16145
|
+
return {
|
16146
|
+
'description': self.description,
|
16147
|
+
'id': self.id,
|
16148
|
+
'name': self.name,
|
16149
|
+
'policy': self.policy,
|
16150
|
+
}
|
16151
|
+
|
16152
|
+
@classmethod
|
16153
|
+
def from_dict(cls, d):
|
16154
|
+
return cls(
|
16155
|
+
description=d.get('description'),
|
16156
|
+
id=d.get('id'),
|
16157
|
+
name=d.get('name'),
|
16158
|
+
policy=d.get('policy'),
|
16159
|
+
)
|
16160
|
+
|
16161
|
+
|
16162
|
+
class PolicyCreateResponse:
|
16163
|
+
'''
|
16164
|
+
PolicyCreateResponse reports how the Policy was created in the system.
|
16165
|
+
'''
|
16166
|
+
__slots__ = [
|
16167
|
+
'policy',
|
16168
|
+
'rate_limit',
|
16169
|
+
]
|
16170
|
+
|
16171
|
+
def __init__(
|
16172
|
+
self,
|
16173
|
+
policy=None,
|
16174
|
+
rate_limit=None,
|
16175
|
+
):
|
16176
|
+
self.policy = policy if policy is not None else None
|
16177
|
+
'''
|
16178
|
+
The created Policy.
|
16179
|
+
'''
|
16180
|
+
self.rate_limit = rate_limit if rate_limit is not None else None
|
16181
|
+
'''
|
16182
|
+
Rate limit information.
|
16183
|
+
'''
|
16184
|
+
|
16185
|
+
def __repr__(self):
|
16186
|
+
return '<sdm.PolicyCreateResponse ' + \
|
16187
|
+
'policy: ' + repr(self.policy) + ' ' +\
|
16188
|
+
'rate_limit: ' + repr(self.rate_limit) + ' ' +\
|
16189
|
+
'>'
|
16190
|
+
|
16191
|
+
def to_dict(self):
|
16192
|
+
return {
|
16193
|
+
'policy': self.policy,
|
16194
|
+
'rate_limit': self.rate_limit,
|
16195
|
+
}
|
16196
|
+
|
16197
|
+
@classmethod
|
16198
|
+
def from_dict(cls, d):
|
16199
|
+
return cls(
|
16200
|
+
policy=d.get('policy'),
|
16201
|
+
rate_limit=d.get('rate_limit'),
|
16202
|
+
)
|
16203
|
+
|
16204
|
+
|
16205
|
+
class PolicyDeleteResponse:
|
16206
|
+
'''
|
16207
|
+
PolicyDeleteResponse returns information about a Policy that was deleted.
|
16208
|
+
'''
|
16209
|
+
__slots__ = [
|
16210
|
+
'rate_limit',
|
16211
|
+
]
|
16212
|
+
|
16213
|
+
def __init__(
|
16214
|
+
self,
|
16215
|
+
rate_limit=None,
|
16216
|
+
):
|
16217
|
+
self.rate_limit = rate_limit if rate_limit is not None else None
|
16218
|
+
'''
|
16219
|
+
Rate limit information.
|
16220
|
+
'''
|
16221
|
+
|
16222
|
+
def __repr__(self):
|
16223
|
+
return '<sdm.PolicyDeleteResponse ' + \
|
16224
|
+
'rate_limit: ' + repr(self.rate_limit) + ' ' +\
|
16225
|
+
'>'
|
16226
|
+
|
16227
|
+
def to_dict(self):
|
16228
|
+
return {
|
16229
|
+
'rate_limit': self.rate_limit,
|
16230
|
+
}
|
16231
|
+
|
16232
|
+
@classmethod
|
16233
|
+
def from_dict(cls, d):
|
16234
|
+
return cls(rate_limit=d.get('rate_limit'), )
|
16235
|
+
|
16236
|
+
|
16237
|
+
class PolicyGetResponse:
|
16238
|
+
'''
|
16239
|
+
PolicyGetResponse returns a requested Policy.
|
16240
|
+
'''
|
16241
|
+
__slots__ = [
|
16242
|
+
'meta',
|
16243
|
+
'policy',
|
16244
|
+
'rate_limit',
|
16245
|
+
]
|
16246
|
+
|
16247
|
+
def __init__(
|
16248
|
+
self,
|
16249
|
+
meta=None,
|
16250
|
+
policy=None,
|
16251
|
+
rate_limit=None,
|
16252
|
+
):
|
16253
|
+
self.meta = meta if meta is not None else None
|
16254
|
+
'''
|
16255
|
+
Reserved for future use.
|
16256
|
+
'''
|
16257
|
+
self.policy = policy if policy is not None else None
|
16258
|
+
'''
|
16259
|
+
The requested Policy.
|
16260
|
+
'''
|
16261
|
+
self.rate_limit = rate_limit if rate_limit is not None else None
|
16262
|
+
'''
|
16263
|
+
Rate limit information.
|
16264
|
+
'''
|
16265
|
+
|
16266
|
+
def __repr__(self):
|
16267
|
+
return '<sdm.PolicyGetResponse ' + \
|
16268
|
+
'meta: ' + repr(self.meta) + ' ' +\
|
16269
|
+
'policy: ' + repr(self.policy) + ' ' +\
|
16270
|
+
'rate_limit: ' + repr(self.rate_limit) + ' ' +\
|
16271
|
+
'>'
|
16272
|
+
|
16273
|
+
def to_dict(self):
|
16274
|
+
return {
|
16275
|
+
'meta': self.meta,
|
16276
|
+
'policy': self.policy,
|
16277
|
+
'rate_limit': self.rate_limit,
|
16278
|
+
}
|
16279
|
+
|
16280
|
+
@classmethod
|
16281
|
+
def from_dict(cls, d):
|
16282
|
+
return cls(
|
16283
|
+
meta=d.get('meta'),
|
16284
|
+
policy=d.get('policy'),
|
16285
|
+
rate_limit=d.get('rate_limit'),
|
16286
|
+
)
|
16287
|
+
|
16288
|
+
|
16289
|
+
class PolicyHistory:
|
16290
|
+
'''
|
16291
|
+
PolicyHistory records the state of a Policy at a given point in time,
|
16292
|
+
where every change (create, update and delete) to a Policy produces a
|
16293
|
+
PolicyHistory record.
|
16294
|
+
'''
|
16295
|
+
__slots__ = [
|
16296
|
+
'activity_id',
|
16297
|
+
'deleted_at',
|
16298
|
+
'policy',
|
16299
|
+
'timestamp',
|
16300
|
+
]
|
16301
|
+
|
16302
|
+
def __init__(
|
16303
|
+
self,
|
16304
|
+
activity_id=None,
|
16305
|
+
deleted_at=None,
|
16306
|
+
policy=None,
|
16307
|
+
timestamp=None,
|
16308
|
+
):
|
16309
|
+
self.activity_id = activity_id if activity_id is not None else ''
|
16310
|
+
'''
|
16311
|
+
The unique identifier of the Activity that produced this change to the Policy.
|
16312
|
+
May be empty for some system-initiated updates.
|
16313
|
+
'''
|
16314
|
+
self.deleted_at = deleted_at if deleted_at is not None else None
|
16315
|
+
'''
|
16316
|
+
If this Policy was deleted, the time it was deleted.
|
16317
|
+
'''
|
16318
|
+
self.policy = policy if policy is not None else None
|
16319
|
+
'''
|
16320
|
+
The complete Policy state at this time.
|
16321
|
+
'''
|
16322
|
+
self.timestamp = timestamp if timestamp is not None else None
|
16323
|
+
'''
|
16324
|
+
The time at which the Policy state was recorded.
|
16325
|
+
'''
|
16326
|
+
|
16327
|
+
def __repr__(self):
|
16328
|
+
return '<sdm.PolicyHistory ' + \
|
16329
|
+
'activity_id: ' + repr(self.activity_id) + ' ' +\
|
16330
|
+
'deleted_at: ' + repr(self.deleted_at) + ' ' +\
|
16331
|
+
'policy: ' + repr(self.policy) + ' ' +\
|
16332
|
+
'timestamp: ' + repr(self.timestamp) + ' ' +\
|
16333
|
+
'>'
|
16334
|
+
|
16335
|
+
def to_dict(self):
|
16336
|
+
return {
|
16337
|
+
'activity_id': self.activity_id,
|
16338
|
+
'deleted_at': self.deleted_at,
|
16339
|
+
'policy': self.policy,
|
16340
|
+
'timestamp': self.timestamp,
|
16341
|
+
}
|
16342
|
+
|
16343
|
+
@classmethod
|
16344
|
+
def from_dict(cls, d):
|
16345
|
+
return cls(
|
16346
|
+
activity_id=d.get('activity_id'),
|
16347
|
+
deleted_at=d.get('deleted_at'),
|
16348
|
+
policy=d.get('policy'),
|
16349
|
+
timestamp=d.get('timestamp'),
|
16350
|
+
)
|
16351
|
+
|
16352
|
+
|
16353
|
+
class PolicyListResponse:
|
16354
|
+
'''
|
16355
|
+
PolicyListResponse returns a list of Policy records that meet
|
16356
|
+
the criteria of a PolicyListRequest.
|
16357
|
+
'''
|
16358
|
+
__slots__ = [
|
16359
|
+
'rate_limit',
|
16360
|
+
]
|
16361
|
+
|
16362
|
+
def __init__(
|
16363
|
+
self,
|
16364
|
+
rate_limit=None,
|
16365
|
+
):
|
16366
|
+
self.rate_limit = rate_limit if rate_limit is not None else None
|
16367
|
+
'''
|
16368
|
+
Rate limit information.
|
16369
|
+
'''
|
16370
|
+
|
16371
|
+
def __repr__(self):
|
16372
|
+
return '<sdm.PolicyListResponse ' + \
|
16373
|
+
'rate_limit: ' + repr(self.rate_limit) + ' ' +\
|
16374
|
+
'>'
|
16375
|
+
|
16376
|
+
def to_dict(self):
|
16377
|
+
return {
|
16378
|
+
'rate_limit': self.rate_limit,
|
16379
|
+
}
|
16380
|
+
|
16381
|
+
@classmethod
|
16382
|
+
def from_dict(cls, d):
|
16383
|
+
return cls(rate_limit=d.get('rate_limit'), )
|
16384
|
+
|
16385
|
+
|
16386
|
+
class PolicyUpdateResponse:
|
16387
|
+
'''
|
16388
|
+
PolicyUpdateResponse returns the fields of a Policy after it has been updated by
|
16389
|
+
a PolicyUpdateRequest.
|
16390
|
+
'''
|
16391
|
+
__slots__ = [
|
16392
|
+
'policy',
|
16393
|
+
'rate_limit',
|
16394
|
+
]
|
16395
|
+
|
16396
|
+
def __init__(
|
16397
|
+
self,
|
16398
|
+
policy=None,
|
16399
|
+
rate_limit=None,
|
16400
|
+
):
|
16401
|
+
self.policy = policy if policy is not None else None
|
16402
|
+
'''
|
16403
|
+
The updated Policy.
|
16404
|
+
'''
|
16405
|
+
self.rate_limit = rate_limit if rate_limit is not None else None
|
16406
|
+
'''
|
16407
|
+
Rate limit information.
|
16408
|
+
'''
|
16409
|
+
|
16410
|
+
def __repr__(self):
|
16411
|
+
return '<sdm.PolicyUpdateResponse ' + \
|
16412
|
+
'policy: ' + repr(self.policy) + ' ' +\
|
16413
|
+
'rate_limit: ' + repr(self.rate_limit) + ' ' +\
|
16414
|
+
'>'
|
16415
|
+
|
16416
|
+
def to_dict(self):
|
16417
|
+
return {
|
16418
|
+
'policy': self.policy,
|
16419
|
+
'rate_limit': self.rate_limit,
|
16420
|
+
}
|
16421
|
+
|
16422
|
+
@classmethod
|
16423
|
+
def from_dict(cls, d):
|
16424
|
+
return cls(
|
16425
|
+
policy=d.get('policy'),
|
16426
|
+
rate_limit=d.get('rate_limit'),
|
16427
|
+
)
|
16428
|
+
|
16429
|
+
|
16030
16430
|
class Postgres:
|
16031
16431
|
__slots__ = [
|
16032
16432
|
'bind_interface',
|