strongdm 13.11.0__zip → 13.12.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-13.11.0 → strongdm-13.12.0}/PKG-INFO +2 -2
- {strongdm-13.11.0 → strongdm-13.12.0}/setup.py +2 -2
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/client.py +15 -1
- strongdm-13.12.0/strongdm/managed_secrets_pb2.py +460 -0
- strongdm-13.12.0/strongdm/managed_secrets_pb2_grpc.py +398 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/models.py +2399 -303
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/plumbing.py +4506 -2894
- strongdm-13.12.0/strongdm/secret_engine_policy_pb2.py +78 -0
- strongdm-13.12.0/strongdm/secret_engine_types_pb2.py +147 -0
- strongdm-13.12.0/strongdm/secret_engines_pb2.py +325 -0
- strongdm-13.12.0/strongdm/secret_engines_pb2_grpc.py +355 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/svc.py +686 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm.egg-info/SOURCES.txt +6 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/LICENSE +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/README.md +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/setup.cfg +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/__init__.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/constants.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/drivers_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/errors.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/health_checks_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/health_checks_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/options_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/policies_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/policies_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/policies_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/policies_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/proxy_cluster_keys_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/proxy_cluster_keys_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/secret_engine_types_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-13.11.0 → strongdm-13.12.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -0,0 +1,398 @@
|
|
1
|
+
# Copyright 2020 StrongDM Inc
|
2
|
+
#
|
3
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
4
|
+
# you may not use this file except in compliance with the License.
|
5
|
+
# You may obtain a copy of the License at
|
6
|
+
#
|
7
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
8
|
+
#
|
9
|
+
# Unless required by applicable law or agreed to in writing, software
|
10
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
11
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
12
|
+
# See the License for the specific language governing permissions and
|
13
|
+
# limitations under the License.
|
14
|
+
#
|
15
|
+
# Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT!
|
16
|
+
"""Client and server classes corresponding to protobuf-defined services."""
|
17
|
+
import grpc
|
18
|
+
|
19
|
+
from . import managed_secrets_pb2 as managed__secrets__pb2
|
20
|
+
|
21
|
+
|
22
|
+
class ManagedSecretsStub(object):
|
23
|
+
"""ManagedSecret is a private vertical for creating, reading, updating,
|
24
|
+
deleting, listing and rotating the managed secrets in the secrets engines as
|
25
|
+
an authenticated user.
|
26
|
+
"""
|
27
|
+
|
28
|
+
def __init__(self, channel):
|
29
|
+
"""Constructor.
|
30
|
+
|
31
|
+
Args:
|
32
|
+
channel: A grpc.Channel.
|
33
|
+
"""
|
34
|
+
self.List = channel.unary_unary(
|
35
|
+
'/v1.ManagedSecrets/List',
|
36
|
+
request_serializer=managed__secrets__pb2.ManagedSecretListRequest.SerializeToString,
|
37
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretListResponse.FromString,
|
38
|
+
)
|
39
|
+
self.ListByActor = channel.unary_unary(
|
40
|
+
'/v1.ManagedSecrets/ListByActor',
|
41
|
+
request_serializer=managed__secrets__pb2.ManagedSecretListRequest.SerializeToString,
|
42
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretListResponse.FromString,
|
43
|
+
)
|
44
|
+
self.Create = channel.unary_unary(
|
45
|
+
'/v1.ManagedSecrets/Create',
|
46
|
+
request_serializer=managed__secrets__pb2.ManagedSecretCreateRequest.SerializeToString,
|
47
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretCreateResponse.FromString,
|
48
|
+
)
|
49
|
+
self.Update = channel.unary_unary(
|
50
|
+
'/v1.ManagedSecrets/Update',
|
51
|
+
request_serializer=managed__secrets__pb2.ManagedSecretUpdateRequest.SerializeToString,
|
52
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretUpdateResponse.FromString,
|
53
|
+
)
|
54
|
+
self.Rotate = channel.unary_unary(
|
55
|
+
'/v1.ManagedSecrets/Rotate',
|
56
|
+
request_serializer=managed__secrets__pb2.ManagedSecretRotateRequest.SerializeToString,
|
57
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretRotateResponse.FromString,
|
58
|
+
)
|
59
|
+
self.Delete = channel.unary_unary(
|
60
|
+
'/v1.ManagedSecrets/Delete',
|
61
|
+
request_serializer=managed__secrets__pb2.ManagedSecretDeleteRequest.SerializeToString,
|
62
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretDeleteResponse.FromString,
|
63
|
+
)
|
64
|
+
self.Get = channel.unary_unary(
|
65
|
+
'/v1.ManagedSecrets/Get',
|
66
|
+
request_serializer=managed__secrets__pb2.ManagedSecretGetRequest.SerializeToString,
|
67
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretGetResponse.FromString,
|
68
|
+
)
|
69
|
+
self.Retrieve = channel.unary_unary(
|
70
|
+
'/v1.ManagedSecrets/Retrieve',
|
71
|
+
request_serializer=managed__secrets__pb2.ManagedSecretRetrieveRequest.SerializeToString,
|
72
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretRetrieveResponse.FromString,
|
73
|
+
)
|
74
|
+
self.Validate = channel.unary_unary(
|
75
|
+
'/v1.ManagedSecrets/Validate',
|
76
|
+
request_serializer=managed__secrets__pb2.ManagedSecretValidateRequest.SerializeToString,
|
77
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretValidateResponse.FromString,
|
78
|
+
)
|
79
|
+
self.Logs = channel.unary_unary(
|
80
|
+
'/v1.ManagedSecrets/Logs',
|
81
|
+
request_serializer=managed__secrets__pb2.ManagedSecretLogsRequest.SerializeToString,
|
82
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretLogsResponse.FromString,
|
83
|
+
)
|
84
|
+
|
85
|
+
|
86
|
+
class ManagedSecretsServicer(object):
|
87
|
+
"""ManagedSecret is a private vertical for creating, reading, updating,
|
88
|
+
deleting, listing and rotating the managed secrets in the secrets engines as
|
89
|
+
an authenticated user.
|
90
|
+
"""
|
91
|
+
|
92
|
+
def List(self, request, context):
|
93
|
+
"""List returns Managed Secrets from a Secret Engine.
|
94
|
+
"""
|
95
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
96
|
+
context.set_details('Method not implemented!')
|
97
|
+
raise NotImplementedError('Method not implemented!')
|
98
|
+
|
99
|
+
def ListByActor(self, request, context):
|
100
|
+
"""List returns Managed Secrets for an Actor from a Secret Engine.
|
101
|
+
"""
|
102
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
103
|
+
context.set_details('Method not implemented!')
|
104
|
+
raise NotImplementedError('Method not implemented!')
|
105
|
+
|
106
|
+
def Create(self, request, context):
|
107
|
+
"""Create creates a Managed Secret
|
108
|
+
"""
|
109
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
110
|
+
context.set_details('Method not implemented!')
|
111
|
+
raise NotImplementedError('Method not implemented!')
|
112
|
+
|
113
|
+
def Update(self, request, context):
|
114
|
+
"""Update updates a Managed Secret
|
115
|
+
"""
|
116
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
117
|
+
context.set_details('Method not implemented!')
|
118
|
+
raise NotImplementedError('Method not implemented!')
|
119
|
+
|
120
|
+
def Rotate(self, request, context):
|
121
|
+
"""Rotate forces rotation of Managed Secret
|
122
|
+
"""
|
123
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
124
|
+
context.set_details('Method not implemented!')
|
125
|
+
raise NotImplementedError('Method not implemented!')
|
126
|
+
|
127
|
+
def Delete(self, request, context):
|
128
|
+
"""Delete deletes a Managed Secret
|
129
|
+
"""
|
130
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
131
|
+
context.set_details('Method not implemented!')
|
132
|
+
raise NotImplementedError('Method not implemented!')
|
133
|
+
|
134
|
+
def Get(self, request, context):
|
135
|
+
"""Get gets details of a Managed Secret without sensitive data
|
136
|
+
"""
|
137
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
138
|
+
context.set_details('Method not implemented!')
|
139
|
+
raise NotImplementedError('Method not implemented!')
|
140
|
+
|
141
|
+
def Retrieve(self, request, context):
|
142
|
+
"""Retrieve returns Managed Secret with sensitive data
|
143
|
+
"""
|
144
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
145
|
+
context.set_details('Method not implemented!')
|
146
|
+
raise NotImplementedError('Method not implemented!')
|
147
|
+
|
148
|
+
def Validate(self, request, context):
|
149
|
+
"""Validate returns the result of testing the stored credential against the
|
150
|
+
secret engine.
|
151
|
+
"""
|
152
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
153
|
+
context.set_details('Method not implemented!')
|
154
|
+
raise NotImplementedError('Method not implemented!')
|
155
|
+
|
156
|
+
def Logs(self, request, context):
|
157
|
+
"""Logs returns the audit records for the managed secret. This may be replaced
|
158
|
+
in the future.
|
159
|
+
"""
|
160
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
161
|
+
context.set_details('Method not implemented!')
|
162
|
+
raise NotImplementedError('Method not implemented!')
|
163
|
+
|
164
|
+
|
165
|
+
def add_ManagedSecretsServicer_to_server(servicer, server):
|
166
|
+
rpc_method_handlers = {
|
167
|
+
'List': grpc.unary_unary_rpc_method_handler(
|
168
|
+
servicer.List,
|
169
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretListRequest.FromString,
|
170
|
+
response_serializer=managed__secrets__pb2.ManagedSecretListResponse.SerializeToString,
|
171
|
+
),
|
172
|
+
'ListByActor': grpc.unary_unary_rpc_method_handler(
|
173
|
+
servicer.ListByActor,
|
174
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretListRequest.FromString,
|
175
|
+
response_serializer=managed__secrets__pb2.ManagedSecretListResponse.SerializeToString,
|
176
|
+
),
|
177
|
+
'Create': grpc.unary_unary_rpc_method_handler(
|
178
|
+
servicer.Create,
|
179
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretCreateRequest.FromString,
|
180
|
+
response_serializer=managed__secrets__pb2.ManagedSecretCreateResponse.SerializeToString,
|
181
|
+
),
|
182
|
+
'Update': grpc.unary_unary_rpc_method_handler(
|
183
|
+
servicer.Update,
|
184
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretUpdateRequest.FromString,
|
185
|
+
response_serializer=managed__secrets__pb2.ManagedSecretUpdateResponse.SerializeToString,
|
186
|
+
),
|
187
|
+
'Rotate': grpc.unary_unary_rpc_method_handler(
|
188
|
+
servicer.Rotate,
|
189
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretRotateRequest.FromString,
|
190
|
+
response_serializer=managed__secrets__pb2.ManagedSecretRotateResponse.SerializeToString,
|
191
|
+
),
|
192
|
+
'Delete': grpc.unary_unary_rpc_method_handler(
|
193
|
+
servicer.Delete,
|
194
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretDeleteRequest.FromString,
|
195
|
+
response_serializer=managed__secrets__pb2.ManagedSecretDeleteResponse.SerializeToString,
|
196
|
+
),
|
197
|
+
'Get': grpc.unary_unary_rpc_method_handler(
|
198
|
+
servicer.Get,
|
199
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretGetRequest.FromString,
|
200
|
+
response_serializer=managed__secrets__pb2.ManagedSecretGetResponse.SerializeToString,
|
201
|
+
),
|
202
|
+
'Retrieve': grpc.unary_unary_rpc_method_handler(
|
203
|
+
servicer.Retrieve,
|
204
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretRetrieveRequest.FromString,
|
205
|
+
response_serializer=managed__secrets__pb2.ManagedSecretRetrieveResponse.SerializeToString,
|
206
|
+
),
|
207
|
+
'Validate': grpc.unary_unary_rpc_method_handler(
|
208
|
+
servicer.Validate,
|
209
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretValidateRequest.FromString,
|
210
|
+
response_serializer=managed__secrets__pb2.ManagedSecretValidateResponse.SerializeToString,
|
211
|
+
),
|
212
|
+
'Logs': grpc.unary_unary_rpc_method_handler(
|
213
|
+
servicer.Logs,
|
214
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretLogsRequest.FromString,
|
215
|
+
response_serializer=managed__secrets__pb2.ManagedSecretLogsResponse.SerializeToString,
|
216
|
+
),
|
217
|
+
}
|
218
|
+
generic_handler = grpc.method_handlers_generic_handler(
|
219
|
+
'v1.ManagedSecrets', rpc_method_handlers)
|
220
|
+
server.add_generic_rpc_handlers((generic_handler,))
|
221
|
+
|
222
|
+
|
223
|
+
# This class is part of an EXPERIMENTAL API.
|
224
|
+
class ManagedSecrets(object):
|
225
|
+
"""ManagedSecret is a private vertical for creating, reading, updating,
|
226
|
+
deleting, listing and rotating the managed secrets in the secrets engines as
|
227
|
+
an authenticated user.
|
228
|
+
"""
|
229
|
+
|
230
|
+
@staticmethod
|
231
|
+
def List(request,
|
232
|
+
target,
|
233
|
+
options=(),
|
234
|
+
channel_credentials=None,
|
235
|
+
call_credentials=None,
|
236
|
+
insecure=False,
|
237
|
+
compression=None,
|
238
|
+
wait_for_ready=None,
|
239
|
+
timeout=None,
|
240
|
+
metadata=None):
|
241
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/List',
|
242
|
+
managed__secrets__pb2.ManagedSecretListRequest.SerializeToString,
|
243
|
+
managed__secrets__pb2.ManagedSecretListResponse.FromString,
|
244
|
+
options, channel_credentials,
|
245
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
246
|
+
|
247
|
+
@staticmethod
|
248
|
+
def ListByActor(request,
|
249
|
+
target,
|
250
|
+
options=(),
|
251
|
+
channel_credentials=None,
|
252
|
+
call_credentials=None,
|
253
|
+
insecure=False,
|
254
|
+
compression=None,
|
255
|
+
wait_for_ready=None,
|
256
|
+
timeout=None,
|
257
|
+
metadata=None):
|
258
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/ListByActor',
|
259
|
+
managed__secrets__pb2.ManagedSecretListRequest.SerializeToString,
|
260
|
+
managed__secrets__pb2.ManagedSecretListResponse.FromString,
|
261
|
+
options, channel_credentials,
|
262
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
263
|
+
|
264
|
+
@staticmethod
|
265
|
+
def Create(request,
|
266
|
+
target,
|
267
|
+
options=(),
|
268
|
+
channel_credentials=None,
|
269
|
+
call_credentials=None,
|
270
|
+
insecure=False,
|
271
|
+
compression=None,
|
272
|
+
wait_for_ready=None,
|
273
|
+
timeout=None,
|
274
|
+
metadata=None):
|
275
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/Create',
|
276
|
+
managed__secrets__pb2.ManagedSecretCreateRequest.SerializeToString,
|
277
|
+
managed__secrets__pb2.ManagedSecretCreateResponse.FromString,
|
278
|
+
options, channel_credentials,
|
279
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
280
|
+
|
281
|
+
@staticmethod
|
282
|
+
def Update(request,
|
283
|
+
target,
|
284
|
+
options=(),
|
285
|
+
channel_credentials=None,
|
286
|
+
call_credentials=None,
|
287
|
+
insecure=False,
|
288
|
+
compression=None,
|
289
|
+
wait_for_ready=None,
|
290
|
+
timeout=None,
|
291
|
+
metadata=None):
|
292
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/Update',
|
293
|
+
managed__secrets__pb2.ManagedSecretUpdateRequest.SerializeToString,
|
294
|
+
managed__secrets__pb2.ManagedSecretUpdateResponse.FromString,
|
295
|
+
options, channel_credentials,
|
296
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
297
|
+
|
298
|
+
@staticmethod
|
299
|
+
def Rotate(request,
|
300
|
+
target,
|
301
|
+
options=(),
|
302
|
+
channel_credentials=None,
|
303
|
+
call_credentials=None,
|
304
|
+
insecure=False,
|
305
|
+
compression=None,
|
306
|
+
wait_for_ready=None,
|
307
|
+
timeout=None,
|
308
|
+
metadata=None):
|
309
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/Rotate',
|
310
|
+
managed__secrets__pb2.ManagedSecretRotateRequest.SerializeToString,
|
311
|
+
managed__secrets__pb2.ManagedSecretRotateResponse.FromString,
|
312
|
+
options, channel_credentials,
|
313
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
314
|
+
|
315
|
+
@staticmethod
|
316
|
+
def Delete(request,
|
317
|
+
target,
|
318
|
+
options=(),
|
319
|
+
channel_credentials=None,
|
320
|
+
call_credentials=None,
|
321
|
+
insecure=False,
|
322
|
+
compression=None,
|
323
|
+
wait_for_ready=None,
|
324
|
+
timeout=None,
|
325
|
+
metadata=None):
|
326
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/Delete',
|
327
|
+
managed__secrets__pb2.ManagedSecretDeleteRequest.SerializeToString,
|
328
|
+
managed__secrets__pb2.ManagedSecretDeleteResponse.FromString,
|
329
|
+
options, channel_credentials,
|
330
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
331
|
+
|
332
|
+
@staticmethod
|
333
|
+
def Get(request,
|
334
|
+
target,
|
335
|
+
options=(),
|
336
|
+
channel_credentials=None,
|
337
|
+
call_credentials=None,
|
338
|
+
insecure=False,
|
339
|
+
compression=None,
|
340
|
+
wait_for_ready=None,
|
341
|
+
timeout=None,
|
342
|
+
metadata=None):
|
343
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/Get',
|
344
|
+
managed__secrets__pb2.ManagedSecretGetRequest.SerializeToString,
|
345
|
+
managed__secrets__pb2.ManagedSecretGetResponse.FromString,
|
346
|
+
options, channel_credentials,
|
347
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
348
|
+
|
349
|
+
@staticmethod
|
350
|
+
def Retrieve(request,
|
351
|
+
target,
|
352
|
+
options=(),
|
353
|
+
channel_credentials=None,
|
354
|
+
call_credentials=None,
|
355
|
+
insecure=False,
|
356
|
+
compression=None,
|
357
|
+
wait_for_ready=None,
|
358
|
+
timeout=None,
|
359
|
+
metadata=None):
|
360
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/Retrieve',
|
361
|
+
managed__secrets__pb2.ManagedSecretRetrieveRequest.SerializeToString,
|
362
|
+
managed__secrets__pb2.ManagedSecretRetrieveResponse.FromString,
|
363
|
+
options, channel_credentials,
|
364
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
365
|
+
|
366
|
+
@staticmethod
|
367
|
+
def Validate(request,
|
368
|
+
target,
|
369
|
+
options=(),
|
370
|
+
channel_credentials=None,
|
371
|
+
call_credentials=None,
|
372
|
+
insecure=False,
|
373
|
+
compression=None,
|
374
|
+
wait_for_ready=None,
|
375
|
+
timeout=None,
|
376
|
+
metadata=None):
|
377
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/Validate',
|
378
|
+
managed__secrets__pb2.ManagedSecretValidateRequest.SerializeToString,
|
379
|
+
managed__secrets__pb2.ManagedSecretValidateResponse.FromString,
|
380
|
+
options, channel_credentials,
|
381
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
382
|
+
|
383
|
+
@staticmethod
|
384
|
+
def Logs(request,
|
385
|
+
target,
|
386
|
+
options=(),
|
387
|
+
channel_credentials=None,
|
388
|
+
call_credentials=None,
|
389
|
+
insecure=False,
|
390
|
+
compression=None,
|
391
|
+
wait_for_ready=None,
|
392
|
+
timeout=None,
|
393
|
+
metadata=None):
|
394
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/Logs',
|
395
|
+
managed__secrets__pb2.ManagedSecretLogsRequest.SerializeToString,
|
396
|
+
managed__secrets__pb2.ManagedSecretLogsResponse.FromString,
|
397
|
+
options, channel_credentials,
|
398
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|