strongdm 14.14.0__zip → 14.20.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-14.14.0 → strongdm-14.20.0}/PKG-INFO +2 -2
- {strongdm-14.14.0 → strongdm-14.20.0}/setup.py +2 -2
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/client.py +48 -31
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/drivers_pb2.py +98 -92
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/models.py +55 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/organization_history_pb2.py +8 -4
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/plumbing.py +12 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/queries_pb2.py +10 -8
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/svc.py +869 -483
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-14.14.0 → strongdm-14.20.0}/LICENSE +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/README.md +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/setup.cfg +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/__init__.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/constants.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/errors.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/health_checks_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/health_checks_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/managed_secrets_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/managed_secrets_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/options_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/policies_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/policies_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/policies_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/policies_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/proxy_cluster_keys_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/proxy_cluster_keys_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engine_policy_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engine_types_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engine_types_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engines_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engines_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-14.14.0 → strongdm-14.20.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -15455,6 +15455,8 @@ class KubernetesPodIdentity:
|
|
15455
15455
|
'allow_resource_role_bypass',
|
15456
15456
|
'bind_interface',
|
15457
15457
|
'certificate_authority',
|
15458
|
+
'discovery_enabled',
|
15459
|
+
'discovery_username',
|
15458
15460
|
'egress_filter',
|
15459
15461
|
'healthcheck_namespace',
|
15460
15462
|
'healthy',
|
@@ -15474,6 +15476,8 @@ class KubernetesPodIdentity:
|
|
15474
15476
|
allow_resource_role_bypass=None,
|
15475
15477
|
bind_interface=None,
|
15476
15478
|
certificate_authority=None,
|
15479
|
+
discovery_enabled=None,
|
15480
|
+
discovery_username=None,
|
15477
15481
|
egress_filter=None,
|
15478
15482
|
healthcheck_namespace=None,
|
15479
15483
|
healthy=None,
|
@@ -15500,6 +15504,15 @@ class KubernetesPodIdentity:
|
|
15500
15504
|
'''
|
15501
15505
|
The CA to authenticate TLS connections with.
|
15502
15506
|
'''
|
15507
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
15508
|
+
'''
|
15509
|
+
If true, configures discovery of a cluster to be run from a node.
|
15510
|
+
'''
|
15511
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
15512
|
+
'''
|
15513
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
15514
|
+
running discovery.
|
15515
|
+
'''
|
15503
15516
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
15504
15517
|
'''
|
15505
15518
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -15554,6 +15567,8 @@ class KubernetesPodIdentity:
|
|
15554
15567
|
'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
|
15555
15568
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
15556
15569
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
15570
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
15571
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
15557
15572
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
15558
15573
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
15559
15574
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
@@ -15573,6 +15588,8 @@ class KubernetesPodIdentity:
|
|
15573
15588
|
'allow_resource_role_bypass': self.allow_resource_role_bypass,
|
15574
15589
|
'bind_interface': self.bind_interface,
|
15575
15590
|
'certificate_authority': self.certificate_authority,
|
15591
|
+
'discovery_enabled': self.discovery_enabled,
|
15592
|
+
'discovery_username': self.discovery_username,
|
15576
15593
|
'egress_filter': self.egress_filter,
|
15577
15594
|
'healthcheck_namespace': self.healthcheck_namespace,
|
15578
15595
|
'healthy': self.healthy,
|
@@ -15594,6 +15611,8 @@ class KubernetesPodIdentity:
|
|
15594
15611
|
allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
|
15595
15612
|
bind_interface=d.get('bind_interface'),
|
15596
15613
|
certificate_authority=d.get('certificate_authority'),
|
15614
|
+
discovery_enabled=d.get('discovery_enabled'),
|
15615
|
+
discovery_username=d.get('discovery_username'),
|
15597
15616
|
egress_filter=d.get('egress_filter'),
|
15598
15617
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
15599
15618
|
healthy=d.get('healthy'),
|
@@ -20080,6 +20099,7 @@ class Organization:
|
|
20080
20099
|
'created_at',
|
20081
20100
|
'device_trust_enabled',
|
20082
20101
|
'device_trust_provider',
|
20102
|
+
'discard_replays',
|
20083
20103
|
'enforce_single_session',
|
20084
20104
|
'idle_timeout',
|
20085
20105
|
'idle_timeout_enabled',
|
@@ -20094,6 +20114,7 @@ class Organization:
|
|
20094
20114
|
'mfa_enabled',
|
20095
20115
|
'mfa_provider',
|
20096
20116
|
'name',
|
20117
|
+
'public_key_pem',
|
20097
20118
|
'require_secret_store',
|
20098
20119
|
'saml_metadata_url',
|
20099
20120
|
'scim_provider',
|
@@ -20112,6 +20133,7 @@ class Organization:
|
|
20112
20133
|
created_at=None,
|
20113
20134
|
device_trust_enabled=None,
|
20114
20135
|
device_trust_provider=None,
|
20136
|
+
discard_replays=None,
|
20115
20137
|
enforce_single_session=None,
|
20116
20138
|
idle_timeout=None,
|
20117
20139
|
idle_timeout_enabled=None,
|
@@ -20126,6 +20148,7 @@ class Organization:
|
|
20126
20148
|
mfa_enabled=None,
|
20127
20149
|
mfa_provider=None,
|
20128
20150
|
name=None,
|
20151
|
+
public_key_pem=None,
|
20129
20152
|
require_secret_store=None,
|
20130
20153
|
saml_metadata_url=None,
|
20131
20154
|
scim_provider=None,
|
@@ -20153,6 +20176,10 @@ class Organization:
|
|
20153
20176
|
'''
|
20154
20177
|
The Organization's device trust provider, one of the DeviceTrustProvider constants.
|
20155
20178
|
'''
|
20179
|
+
self.discard_replays = discard_replays if discard_replays is not None else False
|
20180
|
+
'''
|
20181
|
+
Indicates if the Organization should drop replay data for SSH, RDP, and K8s logs.
|
20182
|
+
'''
|
20156
20183
|
self.enforce_single_session = enforce_single_session if enforce_single_session is not None else False
|
20157
20184
|
'''
|
20158
20185
|
Indicates if the Organization enforces a single session per user for the CLI and AdminUI.
|
@@ -20209,6 +20236,10 @@ class Organization:
|
|
20209
20236
|
'''
|
20210
20237
|
The Organization's name.
|
20211
20238
|
'''
|
20239
|
+
self.public_key_pem = public_key_pem if public_key_pem is not None else ''
|
20240
|
+
'''
|
20241
|
+
The Organization's public key PEM for encrypting remote logs.
|
20242
|
+
'''
|
20212
20243
|
self.require_secret_store = require_secret_store if require_secret_store is not None else False
|
20213
20244
|
'''
|
20214
20245
|
Indicates if the Organization requires secret stores.
|
@@ -20256,6 +20287,7 @@ class Organization:
|
|
20256
20287
|
'created_at: ' + repr(self.created_at) + ' ' +\
|
20257
20288
|
'device_trust_enabled: ' + repr(self.device_trust_enabled) + ' ' +\
|
20258
20289
|
'device_trust_provider: ' + repr(self.device_trust_provider) + ' ' +\
|
20290
|
+
'discard_replays: ' + repr(self.discard_replays) + ' ' +\
|
20259
20291
|
'enforce_single_session: ' + repr(self.enforce_single_session) + ' ' +\
|
20260
20292
|
'idle_timeout: ' + repr(self.idle_timeout) + ' ' +\
|
20261
20293
|
'idle_timeout_enabled: ' + repr(self.idle_timeout_enabled) + ' ' +\
|
@@ -20270,6 +20302,7 @@ class Organization:
|
|
20270
20302
|
'mfa_enabled: ' + repr(self.mfa_enabled) + ' ' +\
|
20271
20303
|
'mfa_provider: ' + repr(self.mfa_provider) + ' ' +\
|
20272
20304
|
'name: ' + repr(self.name) + ' ' +\
|
20305
|
+
'public_key_pem: ' + repr(self.public_key_pem) + ' ' +\
|
20273
20306
|
'require_secret_store: ' + repr(self.require_secret_store) + ' ' +\
|
20274
20307
|
'saml_metadata_url: ' + repr(self.saml_metadata_url) + ' ' +\
|
20275
20308
|
'scim_provider: ' + repr(self.scim_provider) + ' ' +\
|
@@ -20288,6 +20321,7 @@ class Organization:
|
|
20288
20321
|
'created_at': self.created_at,
|
20289
20322
|
'device_trust_enabled': self.device_trust_enabled,
|
20290
20323
|
'device_trust_provider': self.device_trust_provider,
|
20324
|
+
'discard_replays': self.discard_replays,
|
20291
20325
|
'enforce_single_session': self.enforce_single_session,
|
20292
20326
|
'idle_timeout': self.idle_timeout,
|
20293
20327
|
'idle_timeout_enabled': self.idle_timeout_enabled,
|
@@ -20302,6 +20336,7 @@ class Organization:
|
|
20302
20336
|
'mfa_enabled': self.mfa_enabled,
|
20303
20337
|
'mfa_provider': self.mfa_provider,
|
20304
20338
|
'name': self.name,
|
20339
|
+
'public_key_pem': self.public_key_pem,
|
20305
20340
|
'require_secret_store': self.require_secret_store,
|
20306
20341
|
'saml_metadata_url': self.saml_metadata_url,
|
20307
20342
|
'scim_provider': self.scim_provider,
|
@@ -20323,6 +20358,7 @@ class Organization:
|
|
20323
20358
|
created_at=d.get('created_at'),
|
20324
20359
|
device_trust_enabled=d.get('device_trust_enabled'),
|
20325
20360
|
device_trust_provider=d.get('device_trust_provider'),
|
20361
|
+
discard_replays=d.get('discard_replays'),
|
20326
20362
|
enforce_single_session=d.get('enforce_single_session'),
|
20327
20363
|
idle_timeout=d.get('idle_timeout'),
|
20328
20364
|
idle_timeout_enabled=d.get('idle_timeout_enabled'),
|
@@ -20337,6 +20373,7 @@ class Organization:
|
|
20337
20373
|
mfa_enabled=d.get('mfa_enabled'),
|
20338
20374
|
mfa_provider=d.get('mfa_provider'),
|
20339
20375
|
name=d.get('name'),
|
20376
|
+
public_key_pem=d.get('public_key_pem'),
|
20340
20377
|
require_secret_store=d.get('require_secret_store'),
|
20341
20378
|
saml_metadata_url=d.get('saml_metadata_url'),
|
20342
20379
|
scim_provider=d.get('scim_provider'),
|
@@ -22183,6 +22220,7 @@ class Query:
|
|
22183
22220
|
'encrypted',
|
22184
22221
|
'id',
|
22185
22222
|
'identity_alias_username',
|
22223
|
+
'metadata_json',
|
22186
22224
|
'query_body',
|
22187
22225
|
'query_category',
|
22188
22226
|
'query_hash',
|
@@ -22215,6 +22253,7 @@ class Query:
|
|
22215
22253
|
encrypted=None,
|
22216
22254
|
id=None,
|
22217
22255
|
identity_alias_username=None,
|
22256
|
+
metadata_json=None,
|
22218
22257
|
query_body=None,
|
22219
22258
|
query_category=None,
|
22220
22259
|
query_hash=None,
|
@@ -22293,6 +22332,10 @@ class Query:
|
|
22293
22332
|
'''
|
22294
22333
|
The username of the IdentityAlias used to access the Resource.
|
22295
22334
|
'''
|
22335
|
+
self.metadata_json = metadata_json if metadata_json is not None else ''
|
22336
|
+
'''
|
22337
|
+
Driver specific metadata associated with this query.
|
22338
|
+
'''
|
22296
22339
|
self.query_body = query_body if query_body is not None else ''
|
22297
22340
|
'''
|
22298
22341
|
The captured content of the Query.
|
@@ -22373,6 +22416,7 @@ class Query:
|
|
22373
22416
|
'encrypted: ' + repr(self.encrypted) + ' ' +\
|
22374
22417
|
'id: ' + repr(self.id) + ' ' +\
|
22375
22418
|
'identity_alias_username: ' + repr(self.identity_alias_username) + ' ' +\
|
22419
|
+
'metadata_json: ' + repr(self.metadata_json) + ' ' +\
|
22376
22420
|
'query_body: ' + repr(self.query_body) + ' ' +\
|
22377
22421
|
'query_category: ' + repr(self.query_category) + ' ' +\
|
22378
22422
|
'query_hash: ' + repr(self.query_hash) + ' ' +\
|
@@ -22405,6 +22449,7 @@ class Query:
|
|
22405
22449
|
'encrypted': self.encrypted,
|
22406
22450
|
'id': self.id,
|
22407
22451
|
'identity_alias_username': self.identity_alias_username,
|
22452
|
+
'metadata_json': self.metadata_json,
|
22408
22453
|
'query_body': self.query_body,
|
22409
22454
|
'query_category': self.query_category,
|
22410
22455
|
'query_hash': self.query_hash,
|
@@ -22438,6 +22483,7 @@ class Query:
|
|
22438
22483
|
encrypted=d.get('encrypted'),
|
22439
22484
|
id=d.get('id'),
|
22440
22485
|
identity_alias_username=d.get('identity_alias_username'),
|
22486
|
+
metadata_json=d.get('metadata_json'),
|
22441
22487
|
query_body=d.get('query_body'),
|
22442
22488
|
query_category=d.get('query_category'),
|
22443
22489
|
query_hash=d.get('query_hash'),
|
@@ -29324,6 +29370,7 @@ class Trino:
|
|
29324
29370
|
'secret_store_id',
|
29325
29371
|
'subdomain',
|
29326
29372
|
'tags',
|
29373
|
+
'tls_required',
|
29327
29374
|
'username',
|
29328
29375
|
]
|
29329
29376
|
|
@@ -29342,6 +29389,7 @@ class Trino:
|
|
29342
29389
|
secret_store_id=None,
|
29343
29390
|
subdomain=None,
|
29344
29391
|
tags=None,
|
29392
|
+
tls_required=None,
|
29345
29393
|
username=None,
|
29346
29394
|
):
|
29347
29395
|
self.bind_interface = bind_interface if bind_interface is not None else ''
|
@@ -29396,6 +29444,10 @@ class Trino:
|
|
29396
29444
|
'''
|
29397
29445
|
Tags is a map of key, value pairs.
|
29398
29446
|
'''
|
29447
|
+
self.tls_required = tls_required if tls_required is not None else False
|
29448
|
+
'''
|
29449
|
+
If set, TLS must be used to connect to this resource.
|
29450
|
+
'''
|
29399
29451
|
self.username = username if username is not None else ''
|
29400
29452
|
'''
|
29401
29453
|
The username to authenticate with.
|
@@ -29416,6 +29468,7 @@ class Trino:
|
|
29416
29468
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
29417
29469
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
29418
29470
|
'tags: ' + repr(self.tags) + ' ' +\
|
29471
|
+
'tls_required: ' + repr(self.tls_required) + ' ' +\
|
29419
29472
|
'username: ' + repr(self.username) + ' ' +\
|
29420
29473
|
'>'
|
29421
29474
|
|
@@ -29434,6 +29487,7 @@ class Trino:
|
|
29434
29487
|
'secret_store_id': self.secret_store_id,
|
29435
29488
|
'subdomain': self.subdomain,
|
29436
29489
|
'tags': self.tags,
|
29490
|
+
'tls_required': self.tls_required,
|
29437
29491
|
'username': self.username,
|
29438
29492
|
}
|
29439
29493
|
|
@@ -29453,6 +29507,7 @@ class Trino:
|
|
29453
29507
|
secret_store_id=d.get('secret_store_id'),
|
29454
29508
|
subdomain=d.get('subdomain'),
|
29455
29509
|
tags=d.get('tags'),
|
29510
|
+
tls_required=d.get('tls_required'),
|
29456
29511
|
username=d.get('username'),
|
29457
29512
|
)
|
29458
29513
|
|
@@ -32,7 +32,7 @@ from . import options_pb2 as options__pb2
|
|
32
32
|
from . import spec_pb2 as spec__pb2
|
33
33
|
|
34
34
|
|
35
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\
|
35
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xe2\x0c\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\"\n\x0eloopback_range\x18\x1a \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14\x64\x65vice_trust_enabled\x18\x1b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x15\x64\x65vice_trust_provider\x18\x1c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12*\n\x16\x65nforce_single_session\x18\x1d \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0f\x64iscard_replays\x18\x1e \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0epublic_key_pem\x18\x1f \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
|
36
36
|
|
37
37
|
|
38
38
|
|
@@ -149,6 +149,10 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
149
149
|
_ORGANIZATION.fields_by_name['device_trust_provider']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
150
150
|
_ORGANIZATION.fields_by_name['enforce_single_session']._options = None
|
151
151
|
_ORGANIZATION.fields_by_name['enforce_single_session']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
152
|
+
_ORGANIZATION.fields_by_name['discard_replays']._options = None
|
153
|
+
_ORGANIZATION.fields_by_name['discard_replays']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
154
|
+
_ORGANIZATION.fields_by_name['public_key_pem']._options = None
|
155
|
+
_ORGANIZATION.fields_by_name['public_key_pem']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
152
156
|
_ORGANIZATION._options = None
|
153
157
|
_ORGANIZATION._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
|
154
158
|
_ORGANIZATIONHISTORY._options = None
|
@@ -162,7 +166,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
162
166
|
_ORGANIZATIONHISTORYRECORD._serialized_start=538
|
163
167
|
_ORGANIZATIONHISTORYRECORD._serialized_end=761
|
164
168
|
_ORGANIZATION._serialized_start=764
|
165
|
-
_ORGANIZATION._serialized_end=
|
166
|
-
_ORGANIZATIONHISTORY._serialized_start=
|
167
|
-
_ORGANIZATIONHISTORY._serialized_end=
|
169
|
+
_ORGANIZATION._serialized_end=2398
|
170
|
+
_ORGANIZATIONHISTORY._serialized_start=2401
|
171
|
+
_ORGANIZATIONHISTORY._serialized_end=2640
|
168
172
|
# @@protoc_insertion_point(module_scope)
|
@@ -7243,6 +7243,8 @@ def convert_kubernetes_pod_identity_to_porcelain(plumbing):
|
|
7243
7243
|
plumbing.allow_resource_role_bypass)
|
7244
7244
|
porcelain.bind_interface = (plumbing.bind_interface)
|
7245
7245
|
porcelain.certificate_authority = (plumbing.certificate_authority)
|
7246
|
+
porcelain.discovery_enabled = (plumbing.discovery_enabled)
|
7247
|
+
porcelain.discovery_username = (plumbing.discovery_username)
|
7246
7248
|
porcelain.egress_filter = (plumbing.egress_filter)
|
7247
7249
|
porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
|
7248
7250
|
porcelain.healthy = (plumbing.healthy)
|
@@ -7267,6 +7269,8 @@ def convert_kubernetes_pod_identity_to_plumbing(porcelain):
|
|
7267
7269
|
porcelain.allow_resource_role_bypass)
|
7268
7270
|
plumbing.bind_interface = (porcelain.bind_interface)
|
7269
7271
|
plumbing.certificate_authority = (porcelain.certificate_authority)
|
7272
|
+
plumbing.discovery_enabled = (porcelain.discovery_enabled)
|
7273
|
+
plumbing.discovery_username = (porcelain.discovery_username)
|
7270
7274
|
plumbing.egress_filter = (porcelain.egress_filter)
|
7271
7275
|
plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
|
7272
7276
|
plumbing.healthy = (porcelain.healthy)
|
@@ -9434,6 +9438,7 @@ def convert_organization_to_porcelain(plumbing):
|
|
9434
9438
|
porcelain.created_at = convert_timestamp_to_porcelain(plumbing.created_at)
|
9435
9439
|
porcelain.device_trust_enabled = (plumbing.device_trust_enabled)
|
9436
9440
|
porcelain.device_trust_provider = (plumbing.device_trust_provider)
|
9441
|
+
porcelain.discard_replays = (plumbing.discard_replays)
|
9437
9442
|
porcelain.enforce_single_session = (plumbing.enforce_single_session)
|
9438
9443
|
porcelain.idle_timeout = convert_duration_to_porcelain(
|
9439
9444
|
plumbing.idle_timeout)
|
@@ -9449,6 +9454,7 @@ def convert_organization_to_porcelain(plumbing):
|
|
9449
9454
|
porcelain.mfa_enabled = (plumbing.mfa_enabled)
|
9450
9455
|
porcelain.mfa_provider = (plumbing.mfa_provider)
|
9451
9456
|
porcelain.name = (plumbing.name)
|
9457
|
+
porcelain.public_key_pem = (plumbing.public_key_pem)
|
9452
9458
|
porcelain.require_secret_store = (plumbing.require_secret_store)
|
9453
9459
|
porcelain.saml_metadata_url = (plumbing.saml_metadata_url)
|
9454
9460
|
porcelain.scim_provider = (plumbing.scim_provider)
|
@@ -9474,6 +9480,7 @@ def convert_organization_to_plumbing(porcelain):
|
|
9474
9480
|
convert_timestamp_to_plumbing(porcelain.created_at))
|
9475
9481
|
plumbing.device_trust_enabled = (porcelain.device_trust_enabled)
|
9476
9482
|
plumbing.device_trust_provider = (porcelain.device_trust_provider)
|
9483
|
+
plumbing.discard_replays = (porcelain.discard_replays)
|
9477
9484
|
plumbing.enforce_single_session = (porcelain.enforce_single_session)
|
9478
9485
|
plumbing.idle_timeout.CopyFrom(
|
9479
9486
|
convert_duration_to_plumbing(porcelain.idle_timeout))
|
@@ -9489,6 +9496,7 @@ def convert_organization_to_plumbing(porcelain):
|
|
9489
9496
|
plumbing.mfa_enabled = (porcelain.mfa_enabled)
|
9490
9497
|
plumbing.mfa_provider = (porcelain.mfa_provider)
|
9491
9498
|
plumbing.name = (porcelain.name)
|
9499
|
+
plumbing.public_key_pem = (porcelain.public_key_pem)
|
9492
9500
|
plumbing.require_secret_store = (porcelain.require_secret_store)
|
9493
9501
|
plumbing.saml_metadata_url = (porcelain.saml_metadata_url)
|
9494
9502
|
plumbing.scim_provider = (porcelain.scim_provider)
|
@@ -10727,6 +10735,7 @@ def convert_query_to_porcelain(plumbing):
|
|
10727
10735
|
porcelain.encrypted = (plumbing.encrypted)
|
10728
10736
|
porcelain.id = (plumbing.id)
|
10729
10737
|
porcelain.identity_alias_username = (plumbing.identity_alias_username)
|
10738
|
+
porcelain.metadata_json = (plumbing.metadata_json)
|
10730
10739
|
porcelain.query_body = (plumbing.query_body)
|
10731
10740
|
porcelain.query_category = (plumbing.query_category)
|
10732
10741
|
porcelain.query_hash = (plumbing.query_hash)
|
@@ -10766,6 +10775,7 @@ def convert_query_to_plumbing(porcelain):
|
|
10766
10775
|
plumbing.encrypted = (porcelain.encrypted)
|
10767
10776
|
plumbing.id = (porcelain.id)
|
10768
10777
|
plumbing.identity_alias_username = (porcelain.identity_alias_username)
|
10778
|
+
plumbing.metadata_json = (porcelain.metadata_json)
|
10769
10779
|
plumbing.query_body = (porcelain.query_body)
|
10770
10780
|
plumbing.query_category = (porcelain.query_category)
|
10771
10781
|
plumbing.query_hash = (porcelain.query_hash)
|
@@ -14904,6 +14914,7 @@ def convert_trino_to_porcelain(plumbing):
|
|
14904
14914
|
porcelain.secret_store_id = (plumbing.secret_store_id)
|
14905
14915
|
porcelain.subdomain = (plumbing.subdomain)
|
14906
14916
|
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
14917
|
+
porcelain.tls_required = (plumbing.tls_required)
|
14907
14918
|
porcelain.username = (plumbing.username)
|
14908
14919
|
return porcelain
|
14909
14920
|
|
@@ -14925,6 +14936,7 @@ def convert_trino_to_plumbing(porcelain):
|
|
14925
14936
|
plumbing.secret_store_id = (porcelain.secret_store_id)
|
14926
14937
|
plumbing.subdomain = (porcelain.subdomain)
|
14927
14938
|
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
14939
|
+
plumbing.tls_required = (porcelain.tls_required)
|
14928
14940
|
plumbing.username = (porcelain.username)
|
14929
14941
|
return plumbing
|
14930
14942
|
|
@@ -33,7 +33,7 @@ from . import spec_pb2 as spec__pb2
|
|
33
33
|
from . import tags_pb2 as tags__pb2
|
34
34
|
|
35
35
|
|
36
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\rqueries.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\"\x7f\n\x10QueryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xe6\x01\n\x11QueryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12&\n\x07queries\x18\x02 \x03(\x0b\x32\t.v1.QueryB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\
|
36
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\rqueries.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\"\x7f\n\x10QueryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xe6\x01\n\x11QueryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12&\n\x07queries\x18\x02 \x03(\x0b\x32\t.v1.QueryB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xd3\n\n\x05Query\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\naccount_id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1f\n\x0bresource_id\x18\x03 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nquery_body\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x37\n\x08\x64uration\x18\x05 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tencrypted\x18\x06 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nquery_hash\x18\x07 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12.\n\x18remote_identity_username\x18\x08 \x01(\tB\x0c\x18\x01\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\t \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0e\x65gress_node_id\x18\n \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nreplayable\x18\x0b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12 \n\x0crecord_count\x18\x0c \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rresource_type\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0equery_category\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tquery_key\x18\x0f \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rresource_name\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\rresource_tags\x18\x11 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12&\n\x12\x61\x63\x63ount_first_name\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11\x61\x63\x63ount_last_name\x18\x13 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\raccount_email\x18\x14 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12*\n\x0c\x61\x63\x63ount_tags\x18\x15 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12/\n\x0cquery_key_id\x18\x16 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12<\n\x0c\x63ompleted_at\x18\x17 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12-\n\x07\x63\x61pture\x18\x18 \x01(\x0b\x32\x10.v1.QueryCaptureB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\tsource_ip\x18\x19 \x01(\tB\"\xf2\xf8\xb3\x07\x1d\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x13\xc2\xf4\xb3\x07\x0e\n\x02go\x12\x08SourceIP\x12\x34\n\x11\x61uthentication_id\x18\x1a \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\x1a\n\x06target\x18\x1b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x36\n\tauthzJson\x18\x1c \x01(\tB#\xf2\xf8\xb3\x07\x1e\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x14\xc2\xf4\xb3\x07\x0f\n\x02go\x12\tAuthzJSON\x12\x35\n\tclient_ip\x18\x1d \x01(\tB\"\xf2\xf8\xb3\x07\x1d\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x13\xc2\xf4\xb3\x07\x0e\n\x02go\x12\x08\x43lientIP\x12+\n\x17identity_alias_username\x18\x1e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rmetadata_json\x18\x1f \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cMetadataJSON:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xa3\x05\n\x0cQueryCapture\x12\x19\n\x05width\x18\x01 \x01(\x05\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1a\n\x06height\x18\x02 \x01(\x05\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1b\n\x07\x63ommand\x18\x03 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x03\x65nv\x18\x04 \x03(\x0b\x32\x19.v1.QueryCapture.EnvEntryB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x18\n\x04type\x18\x05 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tfile_name\x18\x06 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tfile_size\x18\x07 \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0e\x63lient_command\x18\x08 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x17\n\x03pod\x18\t \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tcontainer\x18\n \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0erequest_method\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0brequest_uri\x18\x0c \x01(\tB$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nRequestURI\x12 \n\x0crequest_body\x18\r \x01(\x0c\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12&\n\x12impersonation_user\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14impersonation_groups\x18\x0f \x03(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10privilege_groups\x18\x10 \x03(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x1a*\n\x08\x45nvEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xa5\x01\n\x07Queries\x12W\n\x04List\x12\x14.v1.QueryListRequest\x1a\x15.v1.QueryListResponse\"\"\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x10\xaa\xf3\xb3\x07\x0b/v1/queries\x1a\x41\xca\xf9\xb3\x07\n\xc2\xf9\xb3\x07\x05Query\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x8b\x01\n\x19\x63om.strongdm.api.plumbingB\x0fQueriesPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
|
37
37
|
|
38
38
|
|
39
39
|
|
@@ -153,6 +153,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
153
153
|
_QUERY.fields_by_name['client_ip']._serialized_options = b'\362\370\263\007\035\260\363\263\007\001\312\363\263\007\023\302\364\263\007\016\n\002go\022\010ClientIP'
|
154
154
|
_QUERY.fields_by_name['identity_alias_username']._options = None
|
155
155
|
_QUERY.fields_by_name['identity_alias_username']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
156
|
+
_QUERY.fields_by_name['metadata_json']._options = None
|
157
|
+
_QUERY.fields_by_name['metadata_json']._serialized_options = b'\362\370\263\007!\260\363\263\007\001\312\363\263\007\027\302\364\263\007\022\n\002go\022\014MetadataJSON'
|
156
158
|
_QUERY._options = None
|
157
159
|
_QUERY._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
|
158
160
|
_QUERYCAPTURE_ENVENTRY._options = None
|
@@ -200,11 +202,11 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
200
202
|
_QUERYLISTRESPONSE._serialized_start=255
|
201
203
|
_QUERYLISTRESPONSE._serialized_end=485
|
202
204
|
_QUERY._serialized_start=488
|
203
|
-
_QUERY._serialized_end=
|
204
|
-
_QUERYCAPTURE._serialized_start=
|
205
|
-
_QUERYCAPTURE._serialized_end=
|
206
|
-
_QUERYCAPTURE_ENVENTRY._serialized_start=
|
207
|
-
_QUERYCAPTURE_ENVENTRY._serialized_end=
|
208
|
-
_QUERIES._serialized_start=
|
209
|
-
_QUERIES._serialized_end=
|
205
|
+
_QUERY._serialized_end=1851
|
206
|
+
_QUERYCAPTURE._serialized_start=1854
|
207
|
+
_QUERYCAPTURE._serialized_end=2529
|
208
|
+
_QUERYCAPTURE_ENVENTRY._serialized_start=2435
|
209
|
+
_QUERYCAPTURE_ENVENTRY._serialized_end=2477
|
210
|
+
_QUERIES._serialized_start=2532
|
211
|
+
_QUERIES._serialized_end=2697
|
210
212
|
# @@protoc_insertion_point(module_scope)
|