strongdm 11.1.0__zip → 11.3.0__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (139) hide show
  1. {strongdm-11.1.0 → strongdm-11.3.0}/PKG-INFO +2 -2
  2. {strongdm-11.1.0 → strongdm-11.3.0}/setup.py +2 -2
  3. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/access_request_events_history_pb2.py +3 -3
  4. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/access_requests_history_pb2.py +3 -3
  5. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/access_requests_pb2.py +3 -3
  6. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflow_approvers_history_pb2.py +3 -3
  7. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflow_approvers_pb2.py +3 -3
  8. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflow_steps_history_pb2.py +3 -3
  9. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflow_steps_pb2.py +3 -3
  10. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflows_history_pb2.py +3 -3
  11. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflows_pb2.py +3 -3
  12. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/client.py +22 -1
  13. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/constants.py +2 -0
  14. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/drivers_pb2.py +184 -170
  15. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/models.py +400 -0
  16. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/options_pb2.py +24 -24
  17. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/plumbing.py +266 -0
  18. strongdm-11.3.0/strongdm/policies_history_pb2.py +100 -0
  19. strongdm-11.3.0/strongdm/policies_history_pb2_grpc.py +84 -0
  20. strongdm-11.3.0/strongdm/policies_pb2.py +226 -0
  21. strongdm-11.3.0/strongdm/policies_pb2_grpc.py +223 -0
  22. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/svc.py +245 -0
  23. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_approvers_history_pb2.py +3 -3
  24. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_approvers_pb2.py +3 -3
  25. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_assignments_history_pb2.py +3 -3
  26. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_assignments_pb2.py +3 -3
  27. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_roles_history_pb2.py +3 -3
  28. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_roles_pb2.py +3 -3
  29. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflows_history_pb2.py +3 -3
  30. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflows_pb2.py +3 -3
  31. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm.egg-info/PKG-INFO +2 -2
  32. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm.egg-info/SOURCES.txt +4 -0
  33. {strongdm-11.1.0 → strongdm-11.3.0}/LICENSE +0 -0
  34. {strongdm-11.1.0 → strongdm-11.3.0}/README.md +0 -0
  35. {strongdm-11.1.0 → strongdm-11.3.0}/setup.cfg +0 -0
  36. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/__init__.py +0 -0
  37. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
  38. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
  39. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/access_requests_pb2_grpc.py +0 -0
  40. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_attachments_history_pb2.py +0 -0
  41. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  42. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_attachments_pb2.py +0 -0
  43. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
  44. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_grants_history_pb2.py +0 -0
  45. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  46. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_grants_pb2.py +0 -0
  47. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_grants_pb2_grpc.py +0 -0
  48. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_permissions_pb2.py +0 -0
  49. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
  50. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_resources_history_pb2.py +0 -0
  51. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  52. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_resources_pb2.py +0 -0
  53. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/account_resources_pb2_grpc.py +0 -0
  54. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/accounts_history_pb2.py +0 -0
  55. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
  56. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/accounts_pb2.py +0 -0
  57. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/accounts_pb2_grpc.py +0 -0
  58. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/activities_pb2.py +0 -0
  59. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/activities_pb2_grpc.py +0 -0
  60. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
  61. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
  62. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
  63. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
  64. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
  65. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
  66. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/control_panel_pb2.py +0 -0
  67. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/control_panel_pb2_grpc.py +0 -0
  68. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/drivers_pb2_grpc.py +0 -0
  69. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/errors.py +0 -0
  70. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/identity_aliases_history_pb2.py +0 -0
  71. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
  72. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/identity_aliases_pb2.py +0 -0
  73. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
  74. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/identity_sets_history_pb2.py +0 -0
  75. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
  76. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/identity_sets_pb2.py +0 -0
  77. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
  78. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/nodes_history_pb2.py +0 -0
  79. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
  80. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/nodes_pb2.py +0 -0
  81. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/nodes_pb2_grpc.py +0 -0
  82. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/options_pb2_grpc.py +0 -0
  83. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/organization_history_pb2.py +0 -0
  84. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/organization_history_pb2_grpc.py +0 -0
  85. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/peering_group_nodes_pb2.py +0 -0
  86. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
  87. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/peering_group_peers_pb2.py +0 -0
  88. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
  89. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/peering_group_resources_pb2.py +0 -0
  90. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
  91. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/peering_groups_pb2.py +0 -0
  92. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
  93. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/queries_pb2.py +0 -0
  94. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/queries_pb2_grpc.py +0 -0
  95. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/remote_identities_history_pb2.py +0 -0
  96. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  97. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/remote_identities_pb2.py +0 -0
  98. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
  99. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
  100. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  101. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/remote_identity_groups_pb2.py +0 -0
  102. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  103. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/replays_pb2.py +0 -0
  104. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/replays_pb2_grpc.py +0 -0
  105. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/resources_history_pb2.py +0 -0
  106. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/resources_history_pb2_grpc.py +0 -0
  107. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/resources_pb2.py +0 -0
  108. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/resources_pb2_grpc.py +0 -0
  109. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/role_resources_history_pb2.py +0 -0
  110. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  111. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/role_resources_pb2.py +0 -0
  112. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/role_resources_pb2_grpc.py +0 -0
  113. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/roles_history_pb2.py +0 -0
  114. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/roles_history_pb2_grpc.py +0 -0
  115. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/roles_pb2.py +0 -0
  116. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/roles_pb2_grpc.py +0 -0
  117. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/secret_store_healths_pb2.py +0 -0
  118. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
  119. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/secret_store_types_pb2.py +0 -0
  120. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  121. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/secret_stores_history_pb2.py +0 -0
  122. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  123. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/secret_stores_pb2.py +0 -0
  124. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
  125. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/spec_pb2.py +0 -0
  126. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/spec_pb2_grpc.py +0 -0
  127. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/tags_pb2.py +0 -0
  128. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/tags_pb2_grpc.py +0 -0
  129. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
  130. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
  131. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
  132. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
  133. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
  134. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
  135. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
  136. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm/workflows_pb2_grpc.py +0 -0
  137. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm.egg-info/dependency_links.txt +0 -0
  138. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm.egg-info/requires.txt +0 -0
  139. {strongdm-11.1.0 → strongdm-11.3.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -20,6 +20,7 @@ import collections
20
20
 
21
21
  class AKS:
22
22
  __slots__ = [
23
+ 'allow_resource_role_bypass',
23
24
  'bind_interface',
24
25
  'certificate_authority',
25
26
  'client_certificate',
@@ -43,6 +44,7 @@ class AKS:
43
44
 
44
45
  def __init__(
45
46
  self,
47
+ allow_resource_role_bypass=None,
46
48
  bind_interface=None,
47
49
  certificate_authority=None,
48
50
  client_certificate=None,
@@ -63,6 +65,11 @@ class AKS:
63
65
  subdomain=None,
64
66
  tags=None,
65
67
  ):
68
+ self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
69
+ '''
70
+ If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
71
+ when a resource role is not provided.
72
+ '''
66
73
  self.bind_interface = bind_interface if bind_interface is not None else ''
67
74
  '''
68
75
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
@@ -143,6 +150,7 @@ class AKS:
143
150
 
144
151
  def __repr__(self):
145
152
  return '<sdm.AKS ' + \
153
+ 'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
146
154
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
147
155
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
148
156
  'client_certificate: ' + repr(self.client_certificate) + ' ' +\
@@ -166,6 +174,7 @@ class AKS:
166
174
 
167
175
  def to_dict(self):
168
176
  return {
177
+ 'allow_resource_role_bypass': self.allow_resource_role_bypass,
169
178
  'bind_interface': self.bind_interface,
170
179
  'certificate_authority': self.certificate_authority,
171
180
  'client_certificate': self.client_certificate,
@@ -191,6 +200,7 @@ class AKS:
191
200
  @classmethod
192
201
  def from_dict(cls, d):
193
202
  return cls(
203
+ allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
194
204
  bind_interface=d.get('bind_interface'),
195
205
  certificate_authority=d.get('certificate_authority'),
196
206
  client_certificate=d.get('client_certificate'),
@@ -364,6 +374,7 @@ class AKSBasicAuth:
364
374
 
365
375
  class AKSServiceAccount:
366
376
  __slots__ = [
377
+ 'allow_resource_role_bypass',
367
378
  'bind_interface',
368
379
  'discovery_enabled',
369
380
  'discovery_username',
@@ -385,6 +396,7 @@ class AKSServiceAccount:
385
396
 
386
397
  def __init__(
387
398
  self,
399
+ allow_resource_role_bypass=None,
388
400
  bind_interface=None,
389
401
  discovery_enabled=None,
390
402
  discovery_username=None,
@@ -403,6 +415,11 @@ class AKSServiceAccount:
403
415
  tags=None,
404
416
  token=None,
405
417
  ):
418
+ self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
419
+ '''
420
+ If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
421
+ when a resource role is not provided.
422
+ '''
406
423
  self.bind_interface = bind_interface if bind_interface is not None else ''
407
424
  '''
408
425
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
@@ -475,6 +492,7 @@ class AKSServiceAccount:
475
492
 
476
493
  def __repr__(self):
477
494
  return '<sdm.AKSServiceAccount ' + \
495
+ 'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
478
496
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
479
497
  'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
480
498
  'discovery_username: ' + repr(self.discovery_username) + ' ' +\
@@ -496,6 +514,7 @@ class AKSServiceAccount:
496
514
 
497
515
  def to_dict(self):
498
516
  return {
517
+ 'allow_resource_role_bypass': self.allow_resource_role_bypass,
499
518
  'bind_interface': self.bind_interface,
500
519
  'discovery_enabled': self.discovery_enabled,
501
520
  'discovery_username': self.discovery_username,
@@ -519,6 +538,7 @@ class AKSServiceAccount:
519
538
  @classmethod
520
539
  def from_dict(cls, d):
521
540
  return cls(
541
+ allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
522
542
  bind_interface=d.get('bind_interface'),
523
543
  discovery_enabled=d.get('discovery_enabled'),
524
544
  discovery_username=d.get('discovery_username'),
@@ -3342,6 +3362,7 @@ class ActivityGetResponse:
3342
3362
  class AmazonEKS:
3343
3363
  __slots__ = [
3344
3364
  'access_key',
3365
+ 'allow_resource_role_bypass',
3345
3366
  'bind_interface',
3346
3367
  'certificate_authority',
3347
3368
  'cluster_name',
@@ -3368,6 +3389,7 @@ class AmazonEKS:
3368
3389
  def __init__(
3369
3390
  self,
3370
3391
  access_key=None,
3392
+ allow_resource_role_bypass=None,
3371
3393
  bind_interface=None,
3372
3394
  certificate_authority=None,
3373
3395
  cluster_name=None,
@@ -3394,6 +3416,11 @@ class AmazonEKS:
3394
3416
  '''
3395
3417
  The Access Key ID to use to authenticate.
3396
3418
  '''
3419
+ self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
3420
+ '''
3421
+ If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
3422
+ when a resource role is not provided.
3423
+ '''
3397
3424
  self.bind_interface = bind_interface if bind_interface is not None else ''
3398
3425
  '''
3399
3426
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
@@ -3483,6 +3510,7 @@ class AmazonEKS:
3483
3510
  def __repr__(self):
3484
3511
  return '<sdm.AmazonEKS ' + \
3485
3512
  'access_key: ' + repr(self.access_key) + ' ' +\
3513
+ 'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
3486
3514
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
3487
3515
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
3488
3516
  'cluster_name: ' + repr(self.cluster_name) + ' ' +\
@@ -3509,6 +3537,7 @@ class AmazonEKS:
3509
3537
  def to_dict(self):
3510
3538
  return {
3511
3539
  'access_key': self.access_key,
3540
+ 'allow_resource_role_bypass': self.allow_resource_role_bypass,
3512
3541
  'bind_interface': self.bind_interface,
3513
3542
  'certificate_authority': self.certificate_authority,
3514
3543
  'cluster_name': self.cluster_name,
@@ -3537,6 +3566,7 @@ class AmazonEKS:
3537
3566
  def from_dict(cls, d):
3538
3567
  return cls(
3539
3568
  access_key=d.get('access_key'),
3569
+ allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
3540
3570
  bind_interface=d.get('bind_interface'),
3541
3571
  certificate_authority=d.get('certificate_authority'),
3542
3572
  cluster_name=d.get('cluster_name'),
@@ -3564,6 +3594,7 @@ class AmazonEKS:
3564
3594
 
3565
3595
  class AmazonEKSInstanceProfile:
3566
3596
  __slots__ = [
3597
+ 'allow_resource_role_bypass',
3567
3598
  'bind_interface',
3568
3599
  'certificate_authority',
3569
3600
  'cluster_name',
@@ -3588,6 +3619,7 @@ class AmazonEKSInstanceProfile:
3588
3619
 
3589
3620
  def __init__(
3590
3621
  self,
3622
+ allow_resource_role_bypass=None,
3591
3623
  bind_interface=None,
3592
3624
  certificate_authority=None,
3593
3625
  cluster_name=None,
@@ -3609,6 +3641,11 @@ class AmazonEKSInstanceProfile:
3609
3641
  subdomain=None,
3610
3642
  tags=None,
3611
3643
  ):
3644
+ self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
3645
+ '''
3646
+ If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
3647
+ when a resource role is not provided.
3648
+ '''
3612
3649
  self.bind_interface = bind_interface if bind_interface is not None else ''
3613
3650
  '''
3614
3651
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
@@ -3693,6 +3730,7 @@ class AmazonEKSInstanceProfile:
3693
3730
 
3694
3731
  def __repr__(self):
3695
3732
  return '<sdm.AmazonEKSInstanceProfile ' + \
3733
+ 'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
3696
3734
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
3697
3735
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
3698
3736
  'cluster_name: ' + repr(self.cluster_name) + ' ' +\
@@ -3717,6 +3755,7 @@ class AmazonEKSInstanceProfile:
3717
3755
 
3718
3756
  def to_dict(self):
3719
3757
  return {
3758
+ 'allow_resource_role_bypass': self.allow_resource_role_bypass,
3720
3759
  'bind_interface': self.bind_interface,
3721
3760
  'certificate_authority': self.certificate_authority,
3722
3761
  'cluster_name': self.cluster_name,
@@ -3743,6 +3782,7 @@ class AmazonEKSInstanceProfile:
3743
3782
  @classmethod
3744
3783
  def from_dict(cls, d):
3745
3784
  return cls(
3785
+ allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
3746
3786
  bind_interface=d.get('bind_interface'),
3747
3787
  certificate_authority=d.get('certificate_authority'),
3748
3788
  cluster_name=d.get('cluster_name'),
@@ -9651,6 +9691,7 @@ class GetResponseMetadata:
9651
9691
 
9652
9692
  class GoogleGKE:
9653
9693
  __slots__ = [
9694
+ 'allow_resource_role_bypass',
9654
9695
  'bind_interface',
9655
9696
  'certificate_authority',
9656
9697
  'discovery_enabled',
@@ -9672,6 +9713,7 @@ class GoogleGKE:
9672
9713
 
9673
9714
  def __init__(
9674
9715
  self,
9716
+ allow_resource_role_bypass=None,
9675
9717
  bind_interface=None,
9676
9718
  certificate_authority=None,
9677
9719
  discovery_enabled=None,
@@ -9690,6 +9732,11 @@ class GoogleGKE:
9690
9732
  subdomain=None,
9691
9733
  tags=None,
9692
9734
  ):
9735
+ self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
9736
+ '''
9737
+ If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
9738
+ when a resource role is not provided.
9739
+ '''
9693
9740
  self.bind_interface = bind_interface if bind_interface is not None else ''
9694
9741
  '''
9695
9742
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
@@ -9762,6 +9809,7 @@ class GoogleGKE:
9762
9809
 
9763
9810
  def __repr__(self):
9764
9811
  return '<sdm.GoogleGKE ' + \
9812
+ 'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
9765
9813
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
9766
9814
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
9767
9815
  'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
@@ -9783,6 +9831,7 @@ class GoogleGKE:
9783
9831
 
9784
9832
  def to_dict(self):
9785
9833
  return {
9834
+ 'allow_resource_role_bypass': self.allow_resource_role_bypass,
9786
9835
  'bind_interface': self.bind_interface,
9787
9836
  'certificate_authority': self.certificate_authority,
9788
9837
  'discovery_enabled': self.discovery_enabled,
@@ -9806,6 +9855,7 @@ class GoogleGKE:
9806
9855
  @classmethod
9807
9856
  def from_dict(cls, d):
9808
9857
  return cls(
9858
+ allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
9809
9859
  bind_interface=d.get('bind_interface'),
9810
9860
  certificate_authority=d.get('certificate_authority'),
9811
9861
  discovery_enabled=d.get('discovery_enabled'),
@@ -11487,6 +11537,7 @@ class KeyfactorX509Store:
11487
11537
 
11488
11538
  class Kubernetes:
11489
11539
  __slots__ = [
11540
+ 'allow_resource_role_bypass',
11490
11541
  'bind_interface',
11491
11542
  'certificate_authority',
11492
11543
  'client_certificate',
@@ -11510,6 +11561,7 @@ class Kubernetes:
11510
11561
 
11511
11562
  def __init__(
11512
11563
  self,
11564
+ allow_resource_role_bypass=None,
11513
11565
  bind_interface=None,
11514
11566
  certificate_authority=None,
11515
11567
  client_certificate=None,
@@ -11530,6 +11582,11 @@ class Kubernetes:
11530
11582
  subdomain=None,
11531
11583
  tags=None,
11532
11584
  ):
11585
+ self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
11586
+ '''
11587
+ If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
11588
+ when a resource role is not provided.
11589
+ '''
11533
11590
  self.bind_interface = bind_interface if bind_interface is not None else ''
11534
11591
  '''
11535
11592
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
@@ -11610,6 +11667,7 @@ class Kubernetes:
11610
11667
 
11611
11668
  def __repr__(self):
11612
11669
  return '<sdm.Kubernetes ' + \
11670
+ 'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
11613
11671
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
11614
11672
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
11615
11673
  'client_certificate: ' + repr(self.client_certificate) + ' ' +\
@@ -11633,6 +11691,7 @@ class Kubernetes:
11633
11691
 
11634
11692
  def to_dict(self):
11635
11693
  return {
11694
+ 'allow_resource_role_bypass': self.allow_resource_role_bypass,
11636
11695
  'bind_interface': self.bind_interface,
11637
11696
  'certificate_authority': self.certificate_authority,
11638
11697
  'client_certificate': self.client_certificate,
@@ -11658,6 +11717,7 @@ class Kubernetes:
11658
11717
  @classmethod
11659
11718
  def from_dict(cls, d):
11660
11719
  return cls(
11720
+ allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
11661
11721
  bind_interface=d.get('bind_interface'),
11662
11722
  certificate_authority=d.get('certificate_authority'),
11663
11723
  client_certificate=d.get('client_certificate'),
@@ -11831,6 +11891,7 @@ class KubernetesBasicAuth:
11831
11891
 
11832
11892
  class KubernetesServiceAccount:
11833
11893
  __slots__ = [
11894
+ 'allow_resource_role_bypass',
11834
11895
  'bind_interface',
11835
11896
  'discovery_enabled',
11836
11897
  'discovery_username',
@@ -11852,6 +11913,7 @@ class KubernetesServiceAccount:
11852
11913
 
11853
11914
  def __init__(
11854
11915
  self,
11916
+ allow_resource_role_bypass=None,
11855
11917
  bind_interface=None,
11856
11918
  discovery_enabled=None,
11857
11919
  discovery_username=None,
@@ -11870,6 +11932,11 @@ class KubernetesServiceAccount:
11870
11932
  tags=None,
11871
11933
  token=None,
11872
11934
  ):
11935
+ self.allow_resource_role_bypass = allow_resource_role_bypass if allow_resource_role_bypass is not None else False
11936
+ '''
11937
+ If true, allows users to fallback to the existing authentication mode (Leased Credential or Identity Set)
11938
+ when a resource role is not provided.
11939
+ '''
11873
11940
  self.bind_interface = bind_interface if bind_interface is not None else ''
11874
11941
  '''
11875
11942
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
@@ -11942,6 +12009,7 @@ class KubernetesServiceAccount:
11942
12009
 
11943
12010
  def __repr__(self):
11944
12011
  return '<sdm.KubernetesServiceAccount ' + \
12012
+ 'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
11945
12013
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
11946
12014
  'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
11947
12015
  'discovery_username: ' + repr(self.discovery_username) + ' ' +\
@@ -11963,6 +12031,7 @@ class KubernetesServiceAccount:
11963
12031
 
11964
12032
  def to_dict(self):
11965
12033
  return {
12034
+ 'allow_resource_role_bypass': self.allow_resource_role_bypass,
11966
12035
  'bind_interface': self.bind_interface,
11967
12036
  'discovery_enabled': self.discovery_enabled,
11968
12037
  'discovery_username': self.discovery_username,
@@ -11986,6 +12055,7 @@ class KubernetesServiceAccount:
11986
12055
  @classmethod
11987
12056
  def from_dict(cls, d):
11988
12057
  return cls(
12058
+ allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
11989
12059
  bind_interface=d.get('bind_interface'),
11990
12060
  discovery_enabled=d.get('discovery_enabled'),
11991
12061
  discovery_username=d.get('discovery_username'),
@@ -16027,6 +16097,336 @@ class PeeringGroupResourceGetResponse:
16027
16097
  )
16028
16098
 
16029
16099
 
16100
+ class Policy:
16101
+ '''
16102
+ Policy is a collection of one or more statements that enforce fine-grained access control
16103
+ for the users of an organization.
16104
+ '''
16105
+ __slots__ = [
16106
+ 'description',
16107
+ 'id',
16108
+ 'name',
16109
+ 'policy',
16110
+ ]
16111
+
16112
+ def __init__(
16113
+ self,
16114
+ description=None,
16115
+ id=None,
16116
+ name=None,
16117
+ policy=None,
16118
+ ):
16119
+ self.description = description if description is not None else ''
16120
+ '''
16121
+ Optional description of the Policy.
16122
+ '''
16123
+ self.id = id if id is not None else ''
16124
+ '''
16125
+ Unique identifier of the Policy.
16126
+ '''
16127
+ self.name = name if name is not None else ''
16128
+ '''
16129
+ Unique human-readable name of the Policy.
16130
+ '''
16131
+ self.policy = policy if policy is not None else ''
16132
+ '''
16133
+ The content of the Policy, in Cedar policy language.
16134
+ '''
16135
+
16136
+ def __repr__(self):
16137
+ return '<sdm.Policy ' + \
16138
+ 'description: ' + repr(self.description) + ' ' +\
16139
+ 'id: ' + repr(self.id) + ' ' +\
16140
+ 'name: ' + repr(self.name) + ' ' +\
16141
+ 'policy: ' + repr(self.policy) + ' ' +\
16142
+ '>'
16143
+
16144
+ def to_dict(self):
16145
+ return {
16146
+ 'description': self.description,
16147
+ 'id': self.id,
16148
+ 'name': self.name,
16149
+ 'policy': self.policy,
16150
+ }
16151
+
16152
+ @classmethod
16153
+ def from_dict(cls, d):
16154
+ return cls(
16155
+ description=d.get('description'),
16156
+ id=d.get('id'),
16157
+ name=d.get('name'),
16158
+ policy=d.get('policy'),
16159
+ )
16160
+
16161
+
16162
+ class PolicyCreateResponse:
16163
+ '''
16164
+ PolicyCreateResponse reports how the Policy was created in the system.
16165
+ '''
16166
+ __slots__ = [
16167
+ 'policy',
16168
+ 'rate_limit',
16169
+ ]
16170
+
16171
+ def __init__(
16172
+ self,
16173
+ policy=None,
16174
+ rate_limit=None,
16175
+ ):
16176
+ self.policy = policy if policy is not None else None
16177
+ '''
16178
+ The created Policy.
16179
+ '''
16180
+ self.rate_limit = rate_limit if rate_limit is not None else None
16181
+ '''
16182
+ Rate limit information.
16183
+ '''
16184
+
16185
+ def __repr__(self):
16186
+ return '<sdm.PolicyCreateResponse ' + \
16187
+ 'policy: ' + repr(self.policy) + ' ' +\
16188
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
16189
+ '>'
16190
+
16191
+ def to_dict(self):
16192
+ return {
16193
+ 'policy': self.policy,
16194
+ 'rate_limit': self.rate_limit,
16195
+ }
16196
+
16197
+ @classmethod
16198
+ def from_dict(cls, d):
16199
+ return cls(
16200
+ policy=d.get('policy'),
16201
+ rate_limit=d.get('rate_limit'),
16202
+ )
16203
+
16204
+
16205
+ class PolicyDeleteResponse:
16206
+ '''
16207
+ PolicyDeleteResponse returns information about a Policy that was deleted.
16208
+ '''
16209
+ __slots__ = [
16210
+ 'rate_limit',
16211
+ ]
16212
+
16213
+ def __init__(
16214
+ self,
16215
+ rate_limit=None,
16216
+ ):
16217
+ self.rate_limit = rate_limit if rate_limit is not None else None
16218
+ '''
16219
+ Rate limit information.
16220
+ '''
16221
+
16222
+ def __repr__(self):
16223
+ return '<sdm.PolicyDeleteResponse ' + \
16224
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
16225
+ '>'
16226
+
16227
+ def to_dict(self):
16228
+ return {
16229
+ 'rate_limit': self.rate_limit,
16230
+ }
16231
+
16232
+ @classmethod
16233
+ def from_dict(cls, d):
16234
+ return cls(rate_limit=d.get('rate_limit'), )
16235
+
16236
+
16237
+ class PolicyGetResponse:
16238
+ '''
16239
+ PolicyGetResponse returns a requested Policy.
16240
+ '''
16241
+ __slots__ = [
16242
+ 'meta',
16243
+ 'policy',
16244
+ 'rate_limit',
16245
+ ]
16246
+
16247
+ def __init__(
16248
+ self,
16249
+ meta=None,
16250
+ policy=None,
16251
+ rate_limit=None,
16252
+ ):
16253
+ self.meta = meta if meta is not None else None
16254
+ '''
16255
+ Reserved for future use.
16256
+ '''
16257
+ self.policy = policy if policy is not None else None
16258
+ '''
16259
+ The requested Policy.
16260
+ '''
16261
+ self.rate_limit = rate_limit if rate_limit is not None else None
16262
+ '''
16263
+ Rate limit information.
16264
+ '''
16265
+
16266
+ def __repr__(self):
16267
+ return '<sdm.PolicyGetResponse ' + \
16268
+ 'meta: ' + repr(self.meta) + ' ' +\
16269
+ 'policy: ' + repr(self.policy) + ' ' +\
16270
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
16271
+ '>'
16272
+
16273
+ def to_dict(self):
16274
+ return {
16275
+ 'meta': self.meta,
16276
+ 'policy': self.policy,
16277
+ 'rate_limit': self.rate_limit,
16278
+ }
16279
+
16280
+ @classmethod
16281
+ def from_dict(cls, d):
16282
+ return cls(
16283
+ meta=d.get('meta'),
16284
+ policy=d.get('policy'),
16285
+ rate_limit=d.get('rate_limit'),
16286
+ )
16287
+
16288
+
16289
+ class PolicyHistory:
16290
+ '''
16291
+ PolicyHistory records the state of a Policy at a given point in time,
16292
+ where every change (create, update and delete) to a Policy produces a
16293
+ PolicyHistory record.
16294
+ '''
16295
+ __slots__ = [
16296
+ 'activity_id',
16297
+ 'deleted_at',
16298
+ 'policy',
16299
+ 'timestamp',
16300
+ ]
16301
+
16302
+ def __init__(
16303
+ self,
16304
+ activity_id=None,
16305
+ deleted_at=None,
16306
+ policy=None,
16307
+ timestamp=None,
16308
+ ):
16309
+ self.activity_id = activity_id if activity_id is not None else ''
16310
+ '''
16311
+ The unique identifier of the Activity that produced this change to the Policy.
16312
+ May be empty for some system-initiated updates.
16313
+ '''
16314
+ self.deleted_at = deleted_at if deleted_at is not None else None
16315
+ '''
16316
+ If this Policy was deleted, the time it was deleted.
16317
+ '''
16318
+ self.policy = policy if policy is not None else None
16319
+ '''
16320
+ The complete Policy state at this time.
16321
+ '''
16322
+ self.timestamp = timestamp if timestamp is not None else None
16323
+ '''
16324
+ The time at which the Policy state was recorded.
16325
+ '''
16326
+
16327
+ def __repr__(self):
16328
+ return '<sdm.PolicyHistory ' + \
16329
+ 'activity_id: ' + repr(self.activity_id) + ' ' +\
16330
+ 'deleted_at: ' + repr(self.deleted_at) + ' ' +\
16331
+ 'policy: ' + repr(self.policy) + ' ' +\
16332
+ 'timestamp: ' + repr(self.timestamp) + ' ' +\
16333
+ '>'
16334
+
16335
+ def to_dict(self):
16336
+ return {
16337
+ 'activity_id': self.activity_id,
16338
+ 'deleted_at': self.deleted_at,
16339
+ 'policy': self.policy,
16340
+ 'timestamp': self.timestamp,
16341
+ }
16342
+
16343
+ @classmethod
16344
+ def from_dict(cls, d):
16345
+ return cls(
16346
+ activity_id=d.get('activity_id'),
16347
+ deleted_at=d.get('deleted_at'),
16348
+ policy=d.get('policy'),
16349
+ timestamp=d.get('timestamp'),
16350
+ )
16351
+
16352
+
16353
+ class PolicyListResponse:
16354
+ '''
16355
+ PolicyListResponse returns a list of Policy records that meet
16356
+ the criteria of a PolicyListRequest.
16357
+ '''
16358
+ __slots__ = [
16359
+ 'rate_limit',
16360
+ ]
16361
+
16362
+ def __init__(
16363
+ self,
16364
+ rate_limit=None,
16365
+ ):
16366
+ self.rate_limit = rate_limit if rate_limit is not None else None
16367
+ '''
16368
+ Rate limit information.
16369
+ '''
16370
+
16371
+ def __repr__(self):
16372
+ return '<sdm.PolicyListResponse ' + \
16373
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
16374
+ '>'
16375
+
16376
+ def to_dict(self):
16377
+ return {
16378
+ 'rate_limit': self.rate_limit,
16379
+ }
16380
+
16381
+ @classmethod
16382
+ def from_dict(cls, d):
16383
+ return cls(rate_limit=d.get('rate_limit'), )
16384
+
16385
+
16386
+ class PolicyUpdateResponse:
16387
+ '''
16388
+ PolicyUpdateResponse returns the fields of a Policy after it has been updated by
16389
+ a PolicyUpdateRequest.
16390
+ '''
16391
+ __slots__ = [
16392
+ 'policy',
16393
+ 'rate_limit',
16394
+ ]
16395
+
16396
+ def __init__(
16397
+ self,
16398
+ policy=None,
16399
+ rate_limit=None,
16400
+ ):
16401
+ self.policy = policy if policy is not None else None
16402
+ '''
16403
+ The updated Policy.
16404
+ '''
16405
+ self.rate_limit = rate_limit if rate_limit is not None else None
16406
+ '''
16407
+ Rate limit information.
16408
+ '''
16409
+
16410
+ def __repr__(self):
16411
+ return '<sdm.PolicyUpdateResponse ' + \
16412
+ 'policy: ' + repr(self.policy) + ' ' +\
16413
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
16414
+ '>'
16415
+
16416
+ def to_dict(self):
16417
+ return {
16418
+ 'policy': self.policy,
16419
+ 'rate_limit': self.rate_limit,
16420
+ }
16421
+
16422
+ @classmethod
16423
+ def from_dict(cls, d):
16424
+ return cls(
16425
+ policy=d.get('policy'),
16426
+ rate_limit=d.get('rate_limit'),
16427
+ )
16428
+
16429
+
16030
16430
  class Postgres:
16031
16431
  __slots__ = [
16032
16432
  'bind_interface',