strongdm 14.14.0__zip → 14.17.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-14.14.0 → strongdm-14.17.0}/PKG-INFO +2 -2
- {strongdm-14.14.0 → strongdm-14.17.0}/setup.py +2 -2
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/client.py +1 -1
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/drivers_pb2.py +6 -4
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/models.py +27 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/organization_history_pb2.py +8 -4
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/plumbing.py +6 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-14.14.0 → strongdm-14.17.0}/LICENSE +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/README.md +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/setup.cfg +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/__init__.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/constants.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/errors.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/health_checks_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/health_checks_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/managed_secrets_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/managed_secrets_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/options_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/policies_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/policies_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/policies_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/policies_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/proxy_cluster_keys_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/proxy_cluster_keys_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_engine_policy_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_engine_types_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_engine_types_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_engines_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_engines_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/svc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-14.14.0 → strongdm-14.17.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -20080,6 +20080,7 @@ class Organization:
|
|
20080
20080
|
'created_at',
|
20081
20081
|
'device_trust_enabled',
|
20082
20082
|
'device_trust_provider',
|
20083
|
+
'discard_replays',
|
20083
20084
|
'enforce_single_session',
|
20084
20085
|
'idle_timeout',
|
20085
20086
|
'idle_timeout_enabled',
|
@@ -20094,6 +20095,7 @@ class Organization:
|
|
20094
20095
|
'mfa_enabled',
|
20095
20096
|
'mfa_provider',
|
20096
20097
|
'name',
|
20098
|
+
'public_key_pem',
|
20097
20099
|
'require_secret_store',
|
20098
20100
|
'saml_metadata_url',
|
20099
20101
|
'scim_provider',
|
@@ -20112,6 +20114,7 @@ class Organization:
|
|
20112
20114
|
created_at=None,
|
20113
20115
|
device_trust_enabled=None,
|
20114
20116
|
device_trust_provider=None,
|
20117
|
+
discard_replays=None,
|
20115
20118
|
enforce_single_session=None,
|
20116
20119
|
idle_timeout=None,
|
20117
20120
|
idle_timeout_enabled=None,
|
@@ -20126,6 +20129,7 @@ class Organization:
|
|
20126
20129
|
mfa_enabled=None,
|
20127
20130
|
mfa_provider=None,
|
20128
20131
|
name=None,
|
20132
|
+
public_key_pem=None,
|
20129
20133
|
require_secret_store=None,
|
20130
20134
|
saml_metadata_url=None,
|
20131
20135
|
scim_provider=None,
|
@@ -20153,6 +20157,10 @@ class Organization:
|
|
20153
20157
|
'''
|
20154
20158
|
The Organization's device trust provider, one of the DeviceTrustProvider constants.
|
20155
20159
|
'''
|
20160
|
+
self.discard_replays = discard_replays if discard_replays is not None else False
|
20161
|
+
'''
|
20162
|
+
Indicates if the Organization should drop replay data for SSH, RDP, and K8s logs.
|
20163
|
+
'''
|
20156
20164
|
self.enforce_single_session = enforce_single_session if enforce_single_session is not None else False
|
20157
20165
|
'''
|
20158
20166
|
Indicates if the Organization enforces a single session per user for the CLI and AdminUI.
|
@@ -20209,6 +20217,10 @@ class Organization:
|
|
20209
20217
|
'''
|
20210
20218
|
The Organization's name.
|
20211
20219
|
'''
|
20220
|
+
self.public_key_pem = public_key_pem if public_key_pem is not None else ''
|
20221
|
+
'''
|
20222
|
+
The Organization's public key PEM for encrypting remote logs.
|
20223
|
+
'''
|
20212
20224
|
self.require_secret_store = require_secret_store if require_secret_store is not None else False
|
20213
20225
|
'''
|
20214
20226
|
Indicates if the Organization requires secret stores.
|
@@ -20256,6 +20268,7 @@ class Organization:
|
|
20256
20268
|
'created_at: ' + repr(self.created_at) + ' ' +\
|
20257
20269
|
'device_trust_enabled: ' + repr(self.device_trust_enabled) + ' ' +\
|
20258
20270
|
'device_trust_provider: ' + repr(self.device_trust_provider) + ' ' +\
|
20271
|
+
'discard_replays: ' + repr(self.discard_replays) + ' ' +\
|
20259
20272
|
'enforce_single_session: ' + repr(self.enforce_single_session) + ' ' +\
|
20260
20273
|
'idle_timeout: ' + repr(self.idle_timeout) + ' ' +\
|
20261
20274
|
'idle_timeout_enabled: ' + repr(self.idle_timeout_enabled) + ' ' +\
|
@@ -20270,6 +20283,7 @@ class Organization:
|
|
20270
20283
|
'mfa_enabled: ' + repr(self.mfa_enabled) + ' ' +\
|
20271
20284
|
'mfa_provider: ' + repr(self.mfa_provider) + ' ' +\
|
20272
20285
|
'name: ' + repr(self.name) + ' ' +\
|
20286
|
+
'public_key_pem: ' + repr(self.public_key_pem) + ' ' +\
|
20273
20287
|
'require_secret_store: ' + repr(self.require_secret_store) + ' ' +\
|
20274
20288
|
'saml_metadata_url: ' + repr(self.saml_metadata_url) + ' ' +\
|
20275
20289
|
'scim_provider: ' + repr(self.scim_provider) + ' ' +\
|
@@ -20288,6 +20302,7 @@ class Organization:
|
|
20288
20302
|
'created_at': self.created_at,
|
20289
20303
|
'device_trust_enabled': self.device_trust_enabled,
|
20290
20304
|
'device_trust_provider': self.device_trust_provider,
|
20305
|
+
'discard_replays': self.discard_replays,
|
20291
20306
|
'enforce_single_session': self.enforce_single_session,
|
20292
20307
|
'idle_timeout': self.idle_timeout,
|
20293
20308
|
'idle_timeout_enabled': self.idle_timeout_enabled,
|
@@ -20302,6 +20317,7 @@ class Organization:
|
|
20302
20317
|
'mfa_enabled': self.mfa_enabled,
|
20303
20318
|
'mfa_provider': self.mfa_provider,
|
20304
20319
|
'name': self.name,
|
20320
|
+
'public_key_pem': self.public_key_pem,
|
20305
20321
|
'require_secret_store': self.require_secret_store,
|
20306
20322
|
'saml_metadata_url': self.saml_metadata_url,
|
20307
20323
|
'scim_provider': self.scim_provider,
|
@@ -20323,6 +20339,7 @@ class Organization:
|
|
20323
20339
|
created_at=d.get('created_at'),
|
20324
20340
|
device_trust_enabled=d.get('device_trust_enabled'),
|
20325
20341
|
device_trust_provider=d.get('device_trust_provider'),
|
20342
|
+
discard_replays=d.get('discard_replays'),
|
20326
20343
|
enforce_single_session=d.get('enforce_single_session'),
|
20327
20344
|
idle_timeout=d.get('idle_timeout'),
|
20328
20345
|
idle_timeout_enabled=d.get('idle_timeout_enabled'),
|
@@ -20337,6 +20354,7 @@ class Organization:
|
|
20337
20354
|
mfa_enabled=d.get('mfa_enabled'),
|
20338
20355
|
mfa_provider=d.get('mfa_provider'),
|
20339
20356
|
name=d.get('name'),
|
20357
|
+
public_key_pem=d.get('public_key_pem'),
|
20340
20358
|
require_secret_store=d.get('require_secret_store'),
|
20341
20359
|
saml_metadata_url=d.get('saml_metadata_url'),
|
20342
20360
|
scim_provider=d.get('scim_provider'),
|
@@ -29324,6 +29342,7 @@ class Trino:
|
|
29324
29342
|
'secret_store_id',
|
29325
29343
|
'subdomain',
|
29326
29344
|
'tags',
|
29345
|
+
'tls_required',
|
29327
29346
|
'username',
|
29328
29347
|
]
|
29329
29348
|
|
@@ -29342,6 +29361,7 @@ class Trino:
|
|
29342
29361
|
secret_store_id=None,
|
29343
29362
|
subdomain=None,
|
29344
29363
|
tags=None,
|
29364
|
+
tls_required=None,
|
29345
29365
|
username=None,
|
29346
29366
|
):
|
29347
29367
|
self.bind_interface = bind_interface if bind_interface is not None else ''
|
@@ -29396,6 +29416,10 @@ class Trino:
|
|
29396
29416
|
'''
|
29397
29417
|
Tags is a map of key, value pairs.
|
29398
29418
|
'''
|
29419
|
+
self.tls_required = tls_required if tls_required is not None else False
|
29420
|
+
'''
|
29421
|
+
If set, TLS must be used to connect to this resource.
|
29422
|
+
'''
|
29399
29423
|
self.username = username if username is not None else ''
|
29400
29424
|
'''
|
29401
29425
|
The username to authenticate with.
|
@@ -29416,6 +29440,7 @@ class Trino:
|
|
29416
29440
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
29417
29441
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
29418
29442
|
'tags: ' + repr(self.tags) + ' ' +\
|
29443
|
+
'tls_required: ' + repr(self.tls_required) + ' ' +\
|
29419
29444
|
'username: ' + repr(self.username) + ' ' +\
|
29420
29445
|
'>'
|
29421
29446
|
|
@@ -29434,6 +29459,7 @@ class Trino:
|
|
29434
29459
|
'secret_store_id': self.secret_store_id,
|
29435
29460
|
'subdomain': self.subdomain,
|
29436
29461
|
'tags': self.tags,
|
29462
|
+
'tls_required': self.tls_required,
|
29437
29463
|
'username': self.username,
|
29438
29464
|
}
|
29439
29465
|
|
@@ -29453,6 +29479,7 @@ class Trino:
|
|
29453
29479
|
secret_store_id=d.get('secret_store_id'),
|
29454
29480
|
subdomain=d.get('subdomain'),
|
29455
29481
|
tags=d.get('tags'),
|
29482
|
+
tls_required=d.get('tls_required'),
|
29456
29483
|
username=d.get('username'),
|
29457
29484
|
)
|
29458
29485
|
|
@@ -32,7 +32,7 @@ from . import options_pb2 as options__pb2
|
|
32
32
|
from . import spec_pb2 as spec__pb2
|
33
33
|
|
34
34
|
|
35
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\
|
35
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xe2\x0c\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\"\n\x0eloopback_range\x18\x1a \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14\x64\x65vice_trust_enabled\x18\x1b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x15\x64\x65vice_trust_provider\x18\x1c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12*\n\x16\x65nforce_single_session\x18\x1d \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0f\x64iscard_replays\x18\x1e \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0epublic_key_pem\x18\x1f \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
|
36
36
|
|
37
37
|
|
38
38
|
|
@@ -149,6 +149,10 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
149
149
|
_ORGANIZATION.fields_by_name['device_trust_provider']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
150
150
|
_ORGANIZATION.fields_by_name['enforce_single_session']._options = None
|
151
151
|
_ORGANIZATION.fields_by_name['enforce_single_session']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
152
|
+
_ORGANIZATION.fields_by_name['discard_replays']._options = None
|
153
|
+
_ORGANIZATION.fields_by_name['discard_replays']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
154
|
+
_ORGANIZATION.fields_by_name['public_key_pem']._options = None
|
155
|
+
_ORGANIZATION.fields_by_name['public_key_pem']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
152
156
|
_ORGANIZATION._options = None
|
153
157
|
_ORGANIZATION._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
|
154
158
|
_ORGANIZATIONHISTORY._options = None
|
@@ -162,7 +166,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
162
166
|
_ORGANIZATIONHISTORYRECORD._serialized_start=538
|
163
167
|
_ORGANIZATIONHISTORYRECORD._serialized_end=761
|
164
168
|
_ORGANIZATION._serialized_start=764
|
165
|
-
_ORGANIZATION._serialized_end=
|
166
|
-
_ORGANIZATIONHISTORY._serialized_start=
|
167
|
-
_ORGANIZATIONHISTORY._serialized_end=
|
169
|
+
_ORGANIZATION._serialized_end=2398
|
170
|
+
_ORGANIZATIONHISTORY._serialized_start=2401
|
171
|
+
_ORGANIZATIONHISTORY._serialized_end=2640
|
168
172
|
# @@protoc_insertion_point(module_scope)
|
@@ -9434,6 +9434,7 @@ def convert_organization_to_porcelain(plumbing):
|
|
9434
9434
|
porcelain.created_at = convert_timestamp_to_porcelain(plumbing.created_at)
|
9435
9435
|
porcelain.device_trust_enabled = (plumbing.device_trust_enabled)
|
9436
9436
|
porcelain.device_trust_provider = (plumbing.device_trust_provider)
|
9437
|
+
porcelain.discard_replays = (plumbing.discard_replays)
|
9437
9438
|
porcelain.enforce_single_session = (plumbing.enforce_single_session)
|
9438
9439
|
porcelain.idle_timeout = convert_duration_to_porcelain(
|
9439
9440
|
plumbing.idle_timeout)
|
@@ -9449,6 +9450,7 @@ def convert_organization_to_porcelain(plumbing):
|
|
9449
9450
|
porcelain.mfa_enabled = (plumbing.mfa_enabled)
|
9450
9451
|
porcelain.mfa_provider = (plumbing.mfa_provider)
|
9451
9452
|
porcelain.name = (plumbing.name)
|
9453
|
+
porcelain.public_key_pem = (plumbing.public_key_pem)
|
9452
9454
|
porcelain.require_secret_store = (plumbing.require_secret_store)
|
9453
9455
|
porcelain.saml_metadata_url = (plumbing.saml_metadata_url)
|
9454
9456
|
porcelain.scim_provider = (plumbing.scim_provider)
|
@@ -9474,6 +9476,7 @@ def convert_organization_to_plumbing(porcelain):
|
|
9474
9476
|
convert_timestamp_to_plumbing(porcelain.created_at))
|
9475
9477
|
plumbing.device_trust_enabled = (porcelain.device_trust_enabled)
|
9476
9478
|
plumbing.device_trust_provider = (porcelain.device_trust_provider)
|
9479
|
+
plumbing.discard_replays = (porcelain.discard_replays)
|
9477
9480
|
plumbing.enforce_single_session = (porcelain.enforce_single_session)
|
9478
9481
|
plumbing.idle_timeout.CopyFrom(
|
9479
9482
|
convert_duration_to_plumbing(porcelain.idle_timeout))
|
@@ -9489,6 +9492,7 @@ def convert_organization_to_plumbing(porcelain):
|
|
9489
9492
|
plumbing.mfa_enabled = (porcelain.mfa_enabled)
|
9490
9493
|
plumbing.mfa_provider = (porcelain.mfa_provider)
|
9491
9494
|
plumbing.name = (porcelain.name)
|
9495
|
+
plumbing.public_key_pem = (porcelain.public_key_pem)
|
9492
9496
|
plumbing.require_secret_store = (porcelain.require_secret_store)
|
9493
9497
|
plumbing.saml_metadata_url = (porcelain.saml_metadata_url)
|
9494
9498
|
plumbing.scim_provider = (porcelain.scim_provider)
|
@@ -14904,6 +14908,7 @@ def convert_trino_to_porcelain(plumbing):
|
|
14904
14908
|
porcelain.secret_store_id = (plumbing.secret_store_id)
|
14905
14909
|
porcelain.subdomain = (plumbing.subdomain)
|
14906
14910
|
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
14911
|
+
porcelain.tls_required = (plumbing.tls_required)
|
14907
14912
|
porcelain.username = (plumbing.username)
|
14908
14913
|
return porcelain
|
14909
14914
|
|
@@ -14925,6 +14930,7 @@ def convert_trino_to_plumbing(porcelain):
|
|
14925
14930
|
plumbing.secret_store_id = (porcelain.secret_store_id)
|
14926
14931
|
plumbing.subdomain = (porcelain.subdomain)
|
14927
14932
|
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
14933
|
+
plumbing.tls_required = (porcelain.tls_required)
|
14928
14934
|
plumbing.username = (porcelain.username)
|
14929
14935
|
return plumbing
|
14930
14936
|
|
@@ -1,12 +1,12 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: strongdm
|
3
|
-
Version: 14.
|
3
|
+
Version: 14.17.0
|
4
4
|
Summary: strongDM SDK for the Python programming language.
|
5
5
|
Home-page: https://github.com/strongdm/strongdm-sdk-python
|
6
6
|
Author: strongDM Team
|
7
7
|
Author-email: sdk-feedback@strongdm.com
|
8
8
|
License: apache-2.0
|
9
|
-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v14.
|
9
|
+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v14.17.0.tar.gz
|
10
10
|
Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
|
11
11
|
Platform: UNKNOWN
|
12
12
|
Classifier: Development Status :: 4 - Beta
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
{strongdm-14.14.0 → strongdm-14.17.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py
RENAMED
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|