strongdm 11.8.0__zip → 11.10.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-11.8.0 → strongdm-11.10.0}/PKG-INFO +2 -2
- {strongdm-11.8.0 → strongdm-11.10.0}/setup.py +2 -2
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/accounts_pb2.py +10 -8
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/client.py +7 -7
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/constants.py +22 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/drivers_pb2.py +428 -172
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/models.py +319 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/plumbing.py +152 -1
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/spec_pb2.py +4 -2
- strongdm-11.10.0/strongdm/spec_pb2_grpc.py +18 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/svc.py +83 -81
- strongdm-11.10.0/strongdm/tags_pb2_grpc.py +18 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm.egg-info/SOURCES.txt +2 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/LICENSE +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/README.md +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/setup.cfg +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/__init__.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/errors.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/options_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/policies_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/policies_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/policies_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/policies_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/roles_pb2_grpc.py +0 -0
- /strongdm-11.8.0/strongdm/secret_store_types_pb2_grpc.py → /strongdm-11.10.0/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
- /strongdm-11.8.0/strongdm/spec_pb2_grpc.py → /strongdm-11.10.0/strongdm/secret_engine_types_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/secret_store_types_pb2.py +0 -0
- /strongdm-11.8.0/strongdm/tags_pb2_grpc.py → /strongdm-11.10.0/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-11.8.0 → strongdm-11.10.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -1,12 +1,12 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: strongdm
|
3
|
-
Version: 11.
|
3
|
+
Version: 11.10.0
|
4
4
|
Summary: strongDM SDK for the Python programming language.
|
5
5
|
Home-page: https://github.com/strongdm/strongdm-sdk-python
|
6
6
|
Author: strongDM Team
|
7
7
|
Author-email: sdk-feedback@strongdm.com
|
8
8
|
License: apache-2.0
|
9
|
-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v11.
|
9
|
+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v11.10.0.tar.gz
|
10
10
|
Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
|
11
11
|
Platform: UNKNOWN
|
12
12
|
Classifier: Development Status :: 4 - Beta
|
@@ -23,7 +23,7 @@ from setuptools import setup
|
|
23
23
|
setup(
|
24
24
|
name='strongdm',
|
25
25
|
packages=['strongdm'],
|
26
|
-
version='11.
|
26
|
+
version='11.10.0',
|
27
27
|
license='apache-2.0',
|
28
28
|
description='strongDM SDK for the Python programming language.',
|
29
29
|
long_description=long_description,
|
@@ -32,7 +32,7 @@ setup(
|
|
32
32
|
author_email='sdk-feedback@strongdm.com',
|
33
33
|
url='https://github.com/strongdm/strongdm-sdk-python',
|
34
34
|
download_url=
|
35
|
-
'https://github.com/strongdm/strongdm-sdk-python/archive/v11.
|
35
|
+
'https://github.com/strongdm/strongdm-sdk-python/archive/v11.10.0.tar.gz',
|
36
36
|
keywords=[
|
37
37
|
'strongDM', 'sdm', 'api', 'automation', 'security', 'audit',
|
38
38
|
'database', 'server', 'ssh', 'rdp'
|
@@ -33,7 +33,7 @@ from . import spec_pb2 as spec__pb2
|
|
33
33
|
from . import tags_pb2 as tags__pb2
|
34
34
|
|
35
35
|
|
36
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x0e\x61\x63\x63ounts.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\"i\n\x14\x41\x63\x63ountCreateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.CreateRequestMetadata\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xf8\x02\n\x15\x41\x63\x63ountCreateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.CreateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\x05token\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xf0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x04 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12<\n\naccess_key\x18\x05 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider\x12<\n\nsecret_key\x18\x06 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"Q\n\x11\x41\x63\x63ountGetRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xd6\x01\n\x12\x41\x63\x63ountGetResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"u\n\x14\x41\x63\x63ountUpdateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.UpdateRequestMetadata\x12\n\n\x02id\x18\x02 \x01(\t\x12(\n\x07\x61\x63\x63ount\x18\x03 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xdc\x01\n\x15\x41\x63\x63ountUpdateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.UpdateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x14\x41\x63\x63ountDeleteRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.DeleteRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xb2\x01\n\x15\x41\x63\x63ountDeleteResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.DeleteResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x02 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x12\x41\x63\x63ountListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xc1\x01\n\x13\x41\x63\x63ountListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12)\n\x08\x61\x63\x63ounts\x18\x02 \x03(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\"\x94\x02\n\x07\x41\x63\x63ount\x12$\n\x04user\x18\x01 \x01(\x0b\x32\x08.v1.UserB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00\x12*\n\x07service\x18\x02 \x01(\x0b\x32\x0b.v1.ServiceB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00\x12&\n\x05token\x18\x03 \x01(\x0b\x32\t.v1.TokenB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00:a\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07R\xc2\xf3\xb3\x07M\xa2\xf3\xb3\x07 tf_examples/account_resource.txt\xaa\xf3\xb3\x07#tf_examples/account_data_source.txtB,\n\x07\x61\x63\x63ount\x12!\xaa\xf8\xb3\x07\x0e\xaa\xf8\xb3\x07\tsuspended\xaa\xf8\xb3\x07\t\xaa\xf8\xb3\x07\x04tags\"\
|
36
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x0e\x61\x63\x63ounts.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\"i\n\x14\x41\x63\x63ountCreateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.CreateRequestMetadata\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xf8\x02\n\x15\x41\x63\x63ountCreateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.CreateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\x05token\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xf0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x04 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12<\n\naccess_key\x18\x05 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider\x12<\n\nsecret_key\x18\x06 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"Q\n\x11\x41\x63\x63ountGetRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xd6\x01\n\x12\x41\x63\x63ountGetResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"u\n\x14\x41\x63\x63ountUpdateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.UpdateRequestMetadata\x12\n\n\x02id\x18\x02 \x01(\t\x12(\n\x07\x61\x63\x63ount\x18\x03 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xdc\x01\n\x15\x41\x63\x63ountUpdateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.UpdateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x14\x41\x63\x63ountDeleteRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.DeleteRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xb2\x01\n\x15\x41\x63\x63ountDeleteResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.DeleteResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x02 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x12\x41\x63\x63ountListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xc1\x01\n\x13\x41\x63\x63ountListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12)\n\x08\x61\x63\x63ounts\x18\x02 \x03(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\"\x94\x02\n\x07\x41\x63\x63ount\x12$\n\x04user\x18\x01 \x01(\x0b\x32\x08.v1.UserB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00\x12*\n\x07service\x18\x02 \x01(\x0b\x32\x0b.v1.ServiceB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00\x12&\n\x05token\x18\x03 \x01(\x0b\x32\t.v1.TokenB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00:a\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07R\xc2\xf3\xb3\x07M\xa2\xf3\xb3\x07 tf_examples/account_resource.txt\xaa\xf3\xb3\x07#tf_examples/account_data_source.txtB,\n\x07\x61\x63\x63ount\x12!\xaa\xf8\xb3\x07\x0e\xaa\xf8\xb3\x07\tsuspended\xaa\xf8\xb3\x07\t\xaa\xf8\xb3\x07\x04tags\"\x93\x07\n\x04User\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\x05\x65mail\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12#\n\nfirst_name\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\"\n\tlast_name\x18\x04 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12*\n\tsuspended\x18\x05 \x01(\x08\x42\x17\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12\"\n\x04tags\x18\x06 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x36\n\x10permission_level\x18\x07 \x01(\tB\x1c\xf2\xf8\xb3\x07\x17\x98\xf4\xb3\x07\x01\xb2\xf4\xb3\x07\r!json_gateway\x12#\n\nmanaged_by\x18\x08 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01\x12\x1f\n\x0b\x65xternal_id\x18\t \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\xdb\x01\n\x0bsuspendedRO\x18\n \x01(\x08\x42\xc5\x01\xf2\xf8\xb3\x07\xbf\x01\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\xaf\x01\xc2\xf4\xb3\x07\x0f\n\x02go\x12\tSuspended\xc2\xf4\xb3\x07\x10\n\x03\x63li\x12\tsuspended\xc2\xf4\xb3\x07\x11\n\x04ruby\x12\tsuspended\xc2\xf4\xb3\x07\x13\n\x06python\x12\tsuspended\xc2\xf4\xb3\x07\x11\n\x04java\x12\tSuspended\xc2\xf4\xb3\x07\x1f\n\x12terraform-provider\x12\tsuspended\xc2\xf4\xb3\x07\x19\n\x0cjson_gateway\x12\tsuspended\x98\xf4\xb3\x07\x01\x12\x90\x02\n\x12permission_levelRW\x18\x0b \x01(\tB\xf3\x01\xf2\xf8\xb3\x07\xed\x01\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\xdd\x01\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fPermissionLevel\xc2\xf4\xb3\x07\x17\n\x03\x63li\x12\x10permission-level\xc2\xf4\xb3\x07\x18\n\x04ruby\x12\x10permission_level\xc2\xf4\xb3\x07\x1a\n\x06python\x12\x10permission_level\xc2\xf4\xb3\x07\x17\n\x04java\x12\x0fPermissionLevel\xc2\xf4\xb3\x07&\n\x12terraform-provider\x12\x10permission_level\xc2\xf4\xb3\x07\x1f\n\x0cjson_gateway\x12\x0fpermissionLevel\xd0\xf4\xb3\x07\x01\x12?\n\x08password\x18\x0c \x01(\tB-\xf2\xf8\xb3\x07(\xb0\xf3\xb3\x07\x01\xe8\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x8f\x01\n\x07Service\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\x04name\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1d\n\tsuspended\x18\x03 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x04tags\x18\x04 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x81\x03\n\x05Token\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\x04name\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1d\n\tsuspended\x18\x03 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x04tags\x18\x04 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x37\n\x07rekeyed\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x38\n\x08\x64\x65\x61\x64line\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12 \n\x0c\x61\x63\x63ount_type\x18\x07 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1f\n\x0bpermissions\x18\x08 \x03(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x37\n\x08\x64uration\x18\t \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\x0f\xfa\xf8\xb3\x07\n\xa8\xf3\xb3\x07\x01\xd8\xf3\xb3\x07\x01\x32\xba\x04\n\x08\x41\x63\x63ounts\x12\x63\n\x06\x43reate\x12\x18.v1.AccountCreateRequest\x1a\x19.v1.AccountCreateResponse\"$\x82\xf9\xb3\x07\t\xa2\xf3\xb3\x07\x04post\x82\xf9\xb3\x07\x11\xaa\xf3\xb3\x07\x0c/v1/accounts\x12^\n\x03Get\x12\x15.v1.AccountGetRequest\x1a\x16.v1.AccountGetResponse\"(\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x16\xaa\xf3\xb3\x07\x11/v1/accounts/{id}\x12g\n\x06Update\x12\x18.v1.AccountUpdateRequest\x1a\x19.v1.AccountUpdateResponse\"(\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03put\x82\xf9\xb3\x07\x16\xaa\xf3\xb3\x07\x11/v1/accounts/{id}\x12j\n\x06\x44\x65lete\x12\x18.v1.AccountDeleteRequest\x1a\x19.v1.AccountDeleteResponse\"+\x82\xf9\xb3\x07\x0b\xa2\xf3\xb3\x07\x06\x64\x65lete\x82\xf9\xb3\x07\x16\xaa\xf3\xb3\x07\x11/v1/accounts/{id}\x12\\\n\x04List\x12\x16.v1.AccountListRequest\x1a\x17.v1.AccountListResponse\"#\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x11\xaa\xf3\xb3\x07\x0c/v1/accounts\x1a\x36\xca\xf9\xb3\x07\x0c\xc2\xf9\xb3\x07\x07\x41\x63\x63ount\xca\xf9\xb3\x07\x07\xd2\xf9\xb3\x07\x02\x61-\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\t\xca\xf9\xb3\x07\x04!cliBd\n\x19\x63om.strongdm.api.plumbingB\x10\x41\x63\x63ountsPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
|
37
37
|
|
38
38
|
|
39
39
|
|
@@ -236,6 +236,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
236
236
|
_USER.fields_by_name['suspendedRO']._serialized_options = b'\362\370\263\007\277\001\260\363\263\007\001\312\363\263\007\257\001\302\364\263\007\017\n\002go\022\tSuspended\302\364\263\007\020\n\003cli\022\tsuspended\302\364\263\007\021\n\004ruby\022\tsuspended\302\364\263\007\023\n\006python\022\tsuspended\302\364\263\007\021\n\004java\022\tSuspended\302\364\263\007\037\n\022terraform-provider\022\tsuspended\302\364\263\007\031\n\014json_gateway\022\tsuspended\230\364\263\007\001'
|
237
237
|
_USER.fields_by_name['permission_levelRW']._options = None
|
238
238
|
_USER.fields_by_name['permission_levelRW']._serialized_options = b'\362\370\263\007\355\001\260\363\263\007\001\312\363\263\007\335\001\302\364\263\007\025\n\002go\022\017PermissionLevel\302\364\263\007\027\n\003cli\022\020permission-level\302\364\263\007\030\n\004ruby\022\020permission_level\302\364\263\007\032\n\006python\022\020permission_level\302\364\263\007\027\n\004java\022\017PermissionLevel\302\364\263\007&\n\022terraform-provider\022\020permission_level\302\364\263\007\037\n\014json_gateway\022\017permissionLevel\320\364\263\007\001'
|
239
|
+
_USER.fields_by_name['password']._options = None
|
240
|
+
_USER.fields_by_name['password']._serialized_options = b'\362\370\263\007(\260\363\263\007\001\350\363\263\007\001\262\364\263\007\001*\262\364\263\007\023!terraform-provider'
|
239
241
|
_USER._options = None
|
240
242
|
_USER._serialized_options = b'\372\370\263\007\005\250\363\263\007\001'
|
241
243
|
_SERVICE.fields_by_name['id']._options = None
|
@@ -303,11 +305,11 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
303
305
|
_ACCOUNT._serialized_start=1810
|
304
306
|
_ACCOUNT._serialized_end=2086
|
305
307
|
_USER._serialized_start=2089
|
306
|
-
_USER._serialized_end=
|
307
|
-
_SERVICE._serialized_start=
|
308
|
-
_SERVICE._serialized_end=
|
309
|
-
_TOKEN._serialized_start=
|
310
|
-
_TOKEN._serialized_end=
|
311
|
-
_ACCOUNTS._serialized_start=
|
312
|
-
_ACCOUNTS._serialized_end=
|
308
|
+
_USER._serialized_end=3004
|
309
|
+
_SERVICE._serialized_start=3007
|
310
|
+
_SERVICE._serialized_end=3150
|
311
|
+
_TOKEN._serialized_start=3153
|
312
|
+
_TOKEN._serialized_end=3538
|
313
|
+
_ACCOUNTS._serialized_start=3541
|
314
|
+
_ACCOUNTS._serialized_end=4111
|
313
315
|
# @@protoc_insertion_point(module_scope)
|
@@ -33,7 +33,7 @@ DEFAULT_MAX_RETRIES = 3
|
|
33
33
|
DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
|
34
34
|
DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
|
35
35
|
API_VERSION = '2024-03-28'
|
36
|
-
USER_AGENT = 'strongdm-sdk-python/11.
|
36
|
+
USER_AGENT = 'strongdm-sdk-python/11.10.0'
|
37
37
|
|
38
38
|
|
39
39
|
class Client:
|
@@ -370,18 +370,18 @@ class Client:
|
|
370
370
|
|
371
371
|
See `strongdm.svc.RolesHistory`.
|
372
372
|
'''
|
373
|
-
self.secret_store_healths = svc.SecretStoreHealths(channel, self)
|
374
|
-
'''
|
375
|
-
SecretStoreHealths exposes health states for secret stores.
|
376
|
-
|
377
|
-
See `strongdm.svc.SecretStoreHealths`.
|
378
|
-
'''
|
379
373
|
self.secret_stores = svc.SecretStores(channel, self)
|
380
374
|
'''
|
381
375
|
SecretStores are servers where resource secrets (passwords, keys) are stored.
|
382
376
|
|
383
377
|
See `strongdm.svc.SecretStores`.
|
384
378
|
'''
|
379
|
+
self.secret_store_healths = svc.SecretStoreHealths(channel, self)
|
380
|
+
'''
|
381
|
+
SecretStoreHealths exposes health states for secret stores.
|
382
|
+
|
383
|
+
See `strongdm.svc.SecretStoreHealths`.
|
384
|
+
'''
|
385
385
|
self.secret_stores_history = svc.SecretStoresHistory(channel, self)
|
386
386
|
'''
|
387
387
|
SecretStoresHistory records all changes to the state of a SecretStore.
|
@@ -105,6 +105,7 @@ class ActivityEntityType:
|
|
105
105
|
ORGANIZATION = "organization"
|
106
106
|
INSTALLATION = "installation"
|
107
107
|
SECRET_STORE = "secretstore"
|
108
|
+
SECRET_ENGINE = "secretengine"
|
108
109
|
REMOTE_IDENTITY_GROUP = "remote_identity_group"
|
109
110
|
REMOTE_IDENTITY = "remote_identity"
|
110
111
|
IDENTITY_SET = "identity_set"
|
@@ -114,6 +115,7 @@ class ActivityEntityType:
|
|
114
115
|
APPROVAL_FLOW = "approval_flow"
|
115
116
|
APPROVAL_FLOW_STEP = "approval_flow_step"
|
116
117
|
APPROVAL_FLOW_APPROVER = "approval_flow_approver"
|
118
|
+
MANAGED_SECRET = "managed_secret"
|
117
119
|
NODE = "node"
|
118
120
|
PEERING_GROUP = "peering_group"
|
119
121
|
PEERING_GROUP_NODE = "peering_group_node"
|
@@ -128,6 +130,7 @@ class ActivityVerb:
|
|
128
130
|
USER_UPDATED = "user updated"
|
129
131
|
USER_SIGNUP = "user signup"
|
130
132
|
USER_TYPE_CHANGED = "user type changed"
|
133
|
+
USER_PASSWORD_CHANGED = "user password changed"
|
131
134
|
USER_TEMPORARY_ACCESS_GRANTED = "user temporary access granted"
|
132
135
|
USER_TEMPORARY_ACCESS_REVOKED = "user temporary access revoked"
|
133
136
|
USER_TEMPORARY_ACCESS_EXPIRED = "user temporary access expired"
|
@@ -244,6 +247,9 @@ class ActivityVerb:
|
|
244
247
|
SECRET_STORE_ADDED = "secret store added"
|
245
248
|
SECRET_STORE_UPDATED = "secret store updated"
|
246
249
|
SECRET_STORE_DELETED = "secret store deleted"
|
250
|
+
SECRET_ENGINE_ADDED = "secret engine added"
|
251
|
+
SECRET_ENGINE_UPDATED = "secret engine updated"
|
252
|
+
SECRET_ENGINE_DELETED = "secret engine deleted"
|
247
253
|
REMOTE_IDENTITY_GROUP_CREATED = "remote identity group created"
|
248
254
|
REMOTE_IDENTITY_GROUP_UPDATED = "remote identity group updated"
|
249
255
|
REMOTE_IDENTITY_GROUP_DELETED = "remote identity group deleted"
|
@@ -313,6 +319,10 @@ class ActivityVerb:
|
|
313
319
|
USER_INTEGRATION_DEAUTHORIZED = "user deauthorized integration"
|
314
320
|
SERVICE_NOW_TOKEN_ADDED = "ServiceNow token created"
|
315
321
|
SERVICE_NOW_TOKEN_DELETED = "ServiceNow token deleted"
|
322
|
+
MANAGED_SECRET_CREATED = "managed secret created"
|
323
|
+
MANAGED_SECRET_UPDATED = "managed secret updated"
|
324
|
+
MANAGED_SECRET_EXPIRATION_TIME_UPDATED = "managed secret expiration time updated"
|
325
|
+
MANAGED_SECRET_DELETED = "managed secret deleted"
|
316
326
|
|
317
327
|
|
318
328
|
# Permissions, all permissions that may be granted to an account.
|
@@ -327,6 +337,11 @@ class Permission:
|
|
327
337
|
DATASOURCE_UPDATE = "datasource:update"
|
328
338
|
RESOURCE_LOCK_DELETE = "resourcelock:delete"
|
329
339
|
RESOURCE_LOCK_LIST = "resourcelock:list"
|
340
|
+
SECRET_ENGINE_CREATE = "secretengine:create"
|
341
|
+
SECRET_ENGINE_LIST = "secretengine:list"
|
342
|
+
SECRET_ENGINE_DELETE = "secretengine:delete"
|
343
|
+
SECRET_ENGINE_UPDATE = "secretengine:update"
|
344
|
+
SECRET_ENGINE_STATUS = "secretengine:status"
|
330
345
|
SECRET_STORE_CREATE = "secretstore:create"
|
331
346
|
SECRET_STORE_LIST = "secretstore:list"
|
332
347
|
SECRET_STORE_DELETE = "secretstore:delete"
|
@@ -347,6 +362,7 @@ class Permission:
|
|
347
362
|
USER_DELETE = "user:delete"
|
348
363
|
USER_ASSIGN = "user:assign"
|
349
364
|
USER_SUSPEND = "user:suspend"
|
365
|
+
USER_SET_PASSWORD = "user:set_password"
|
350
366
|
DEMO_PROVISIONING_REQUEST_CREATE = "demoprovisioningrequest:create"
|
351
367
|
DEMO_PROVISIONING_REQUEST_LIST = "demoprovisioningrequest:list"
|
352
368
|
ROLE_LIST = "role:list"
|
@@ -370,6 +386,7 @@ class Permission:
|
|
370
386
|
ORG_AUDIT_ORG = "audit:organization"
|
371
387
|
ORG_AUDIT_REMOTE_IDENTITIES = "audit:remoteidentities"
|
372
388
|
ORG_AUDIT_REMOTE_IDENTITY_GROUPS = "audit:remoteidentitygroups"
|
389
|
+
ORG_AUDIT_SECRET_ENGINES = "audit:secretengines"
|
373
390
|
ORG_AUDIT_SECRET_STORES = "audit:secretstores"
|
374
391
|
ORG_AUDIT_WORKFLOWS = "audit:workflows"
|
375
392
|
ORG_AUDIT_APPROVAL_FLOWS = "audit:approvalflows"
|
@@ -402,6 +419,11 @@ class Permission:
|
|
402
419
|
BILLING_READ = "billing:read"
|
403
420
|
CREDENTIAL_READ = "credential:read"
|
404
421
|
CREDENTIAL_WRITE = "credential:write"
|
422
|
+
MANAGED_SECRET_CREATE = "managedsecret:create"
|
423
|
+
MANAGED_SECRET_LIST = "managedsecret:list"
|
424
|
+
MANAGED_SECRET_DELETE = "managedsecret:delete"
|
425
|
+
MANAGED_SECRET_UPDATE = "managedsecret:update"
|
426
|
+
MANAGED_SECRET_READ = "managedsecret:read"
|
405
427
|
|
406
428
|
|
407
429
|
# Query Categories, all the categories of resource against which queries are logged.
|