strongdm 14.14.0__zip → 14.20.0__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (151) hide show
  1. {strongdm-14.14.0 → strongdm-14.20.0}/PKG-INFO +2 -2
  2. {strongdm-14.14.0 → strongdm-14.20.0}/setup.py +2 -2
  3. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/client.py +48 -31
  4. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/drivers_pb2.py +98 -92
  5. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/models.py +55 -0
  6. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/organization_history_pb2.py +8 -4
  7. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/plumbing.py +12 -0
  8. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/queries_pb2.py +10 -8
  9. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/svc.py +869 -483
  10. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm.egg-info/PKG-INFO +2 -2
  11. {strongdm-14.14.0 → strongdm-14.20.0}/LICENSE +0 -0
  12. {strongdm-14.14.0 → strongdm-14.20.0}/README.md +0 -0
  13. {strongdm-14.14.0 → strongdm-14.20.0}/setup.cfg +0 -0
  14. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/__init__.py +0 -0
  15. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_request_events_history_pb2.py +0 -0
  16. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
  17. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_requests_history_pb2.py +0 -0
  18. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
  19. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_requests_pb2.py +0 -0
  20. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/access_requests_pb2_grpc.py +0 -0
  21. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_attachments_history_pb2.py +0 -0
  22. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  23. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_attachments_pb2.py +0 -0
  24. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
  25. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_grants_history_pb2.py +0 -0
  26. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  27. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_grants_pb2.py +0 -0
  28. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_grants_pb2_grpc.py +0 -0
  29. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_permissions_pb2.py +0 -0
  30. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
  31. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_resources_history_pb2.py +0 -0
  32. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  33. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_resources_pb2.py +0 -0
  34. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/account_resources_pb2_grpc.py +0 -0
  35. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/accounts_history_pb2.py +0 -0
  36. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
  37. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/accounts_pb2.py +0 -0
  38. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/accounts_pb2_grpc.py +0 -0
  39. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/activities_pb2.py +0 -0
  40. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/activities_pb2_grpc.py +0 -0
  41. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
  42. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
  43. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
  44. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
  45. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
  46. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
  47. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
  48. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
  49. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflows_history_pb2.py +0 -0
  50. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
  51. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflows_pb2.py +0 -0
  52. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
  53. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/constants.py +0 -0
  54. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/control_panel_pb2.py +0 -0
  55. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/control_panel_pb2_grpc.py +0 -0
  56. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/drivers_pb2_grpc.py +0 -0
  57. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/errors.py +0 -0
  58. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/health_checks_pb2.py +0 -0
  59. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/health_checks_pb2_grpc.py +0 -0
  60. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_aliases_history_pb2.py +0 -0
  61. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
  62. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_aliases_pb2.py +0 -0
  63. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
  64. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_sets_history_pb2.py +0 -0
  65. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
  66. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_sets_pb2.py +0 -0
  67. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
  68. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/managed_secrets_pb2.py +0 -0
  69. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/managed_secrets_pb2_grpc.py +0 -0
  70. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/nodes_history_pb2.py +0 -0
  71. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
  72. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/nodes_pb2.py +0 -0
  73. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/nodes_pb2_grpc.py +0 -0
  74. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/options_pb2.py +0 -0
  75. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/options_pb2_grpc.py +0 -0
  76. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/organization_history_pb2_grpc.py +0 -0
  77. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_nodes_pb2.py +0 -0
  78. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
  79. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_peers_pb2.py +0 -0
  80. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
  81. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_resources_pb2.py +0 -0
  82. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
  83. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_groups_pb2.py +0 -0
  84. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
  85. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/policies_history_pb2.py +0 -0
  86. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/policies_history_pb2_grpc.py +0 -0
  87. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/policies_pb2.py +0 -0
  88. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/policies_pb2_grpc.py +0 -0
  89. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/proxy_cluster_keys_pb2.py +0 -0
  90. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/proxy_cluster_keys_pb2_grpc.py +0 -0
  91. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/queries_pb2_grpc.py +0 -0
  92. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identities_history_pb2.py +0 -0
  93. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  94. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identities_pb2.py +0 -0
  95. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
  96. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
  97. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  98. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identity_groups_pb2.py +0 -0
  99. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  100. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/replays_pb2.py +0 -0
  101. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/replays_pb2_grpc.py +0 -0
  102. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/resources_history_pb2.py +0 -0
  103. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/resources_history_pb2_grpc.py +0 -0
  104. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/resources_pb2.py +0 -0
  105. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/resources_pb2_grpc.py +0 -0
  106. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/role_resources_history_pb2.py +0 -0
  107. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  108. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/role_resources_pb2.py +0 -0
  109. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/role_resources_pb2_grpc.py +0 -0
  110. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/roles_history_pb2.py +0 -0
  111. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/roles_history_pb2_grpc.py +0 -0
  112. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/roles_pb2.py +0 -0
  113. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/roles_pb2_grpc.py +0 -0
  114. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engine_policy_pb2.py +0 -0
  115. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
  116. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engine_types_pb2.py +0 -0
  117. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engine_types_pb2_grpc.py +0 -0
  118. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engines_pb2.py +0 -0
  119. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_engines_pb2_grpc.py +0 -0
  120. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_store_healths_pb2.py +0 -0
  121. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
  122. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_store_types_pb2.py +0 -0
  123. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  124. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_stores_history_pb2.py +0 -0
  125. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  126. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_stores_pb2.py +0 -0
  127. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
  128. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/spec_pb2.py +0 -0
  129. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/spec_pb2_grpc.py +0 -0
  130. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/tags_pb2.py +0 -0
  131. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/tags_pb2_grpc.py +0 -0
  132. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
  133. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
  134. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_approvers_pb2.py +0 -0
  135. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
  136. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
  137. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
  138. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_assignments_pb2.py +0 -0
  139. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
  140. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_roles_history_pb2.py +0 -0
  141. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
  142. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_roles_pb2.py +0 -0
  143. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
  144. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflows_history_pb2.py +0 -0
  145. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
  146. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflows_pb2.py +0 -0
  147. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm/workflows_pb2_grpc.py +0 -0
  148. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm.egg-info/SOURCES.txt +0 -0
  149. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm.egg-info/dependency_links.txt +0 -0
  150. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm.egg-info/requires.txt +0 -0
  151. {strongdm-14.14.0 → strongdm-14.20.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -15455,6 +15455,8 @@ class KubernetesPodIdentity:
15455
15455
  'allow_resource_role_bypass',
15456
15456
  'bind_interface',
15457
15457
  'certificate_authority',
15458
+ 'discovery_enabled',
15459
+ 'discovery_username',
15458
15460
  'egress_filter',
15459
15461
  'healthcheck_namespace',
15460
15462
  'healthy',
@@ -15474,6 +15476,8 @@ class KubernetesPodIdentity:
15474
15476
  allow_resource_role_bypass=None,
15475
15477
  bind_interface=None,
15476
15478
  certificate_authority=None,
15479
+ discovery_enabled=None,
15480
+ discovery_username=None,
15477
15481
  egress_filter=None,
15478
15482
  healthcheck_namespace=None,
15479
15483
  healthy=None,
@@ -15500,6 +15504,15 @@ class KubernetesPodIdentity:
15500
15504
  '''
15501
15505
  The CA to authenticate TLS connections with.
15502
15506
  '''
15507
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
15508
+ '''
15509
+ If true, configures discovery of a cluster to be run from a node.
15510
+ '''
15511
+ self.discovery_username = discovery_username if discovery_username is not None else ''
15512
+ '''
15513
+ If a cluster is configured for user impersonation, this is the user to impersonate when
15514
+ running discovery.
15515
+ '''
15503
15516
  self.egress_filter = egress_filter if egress_filter is not None else ''
15504
15517
  '''
15505
15518
  A filter applied to the routing logic to pin datasource to nodes.
@@ -15554,6 +15567,8 @@ class KubernetesPodIdentity:
15554
15567
  'allow_resource_role_bypass: ' + repr(self.allow_resource_role_bypass) + ' ' +\
15555
15568
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
15556
15569
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
15570
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
15571
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
15557
15572
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
15558
15573
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
15559
15574
  'healthy: ' + repr(self.healthy) + ' ' +\
@@ -15573,6 +15588,8 @@ class KubernetesPodIdentity:
15573
15588
  'allow_resource_role_bypass': self.allow_resource_role_bypass,
15574
15589
  'bind_interface': self.bind_interface,
15575
15590
  'certificate_authority': self.certificate_authority,
15591
+ 'discovery_enabled': self.discovery_enabled,
15592
+ 'discovery_username': self.discovery_username,
15576
15593
  'egress_filter': self.egress_filter,
15577
15594
  'healthcheck_namespace': self.healthcheck_namespace,
15578
15595
  'healthy': self.healthy,
@@ -15594,6 +15611,8 @@ class KubernetesPodIdentity:
15594
15611
  allow_resource_role_bypass=d.get('allow_resource_role_bypass'),
15595
15612
  bind_interface=d.get('bind_interface'),
15596
15613
  certificate_authority=d.get('certificate_authority'),
15614
+ discovery_enabled=d.get('discovery_enabled'),
15615
+ discovery_username=d.get('discovery_username'),
15597
15616
  egress_filter=d.get('egress_filter'),
15598
15617
  healthcheck_namespace=d.get('healthcheck_namespace'),
15599
15618
  healthy=d.get('healthy'),
@@ -20080,6 +20099,7 @@ class Organization:
20080
20099
  'created_at',
20081
20100
  'device_trust_enabled',
20082
20101
  'device_trust_provider',
20102
+ 'discard_replays',
20083
20103
  'enforce_single_session',
20084
20104
  'idle_timeout',
20085
20105
  'idle_timeout_enabled',
@@ -20094,6 +20114,7 @@ class Organization:
20094
20114
  'mfa_enabled',
20095
20115
  'mfa_provider',
20096
20116
  'name',
20117
+ 'public_key_pem',
20097
20118
  'require_secret_store',
20098
20119
  'saml_metadata_url',
20099
20120
  'scim_provider',
@@ -20112,6 +20133,7 @@ class Organization:
20112
20133
  created_at=None,
20113
20134
  device_trust_enabled=None,
20114
20135
  device_trust_provider=None,
20136
+ discard_replays=None,
20115
20137
  enforce_single_session=None,
20116
20138
  idle_timeout=None,
20117
20139
  idle_timeout_enabled=None,
@@ -20126,6 +20148,7 @@ class Organization:
20126
20148
  mfa_enabled=None,
20127
20149
  mfa_provider=None,
20128
20150
  name=None,
20151
+ public_key_pem=None,
20129
20152
  require_secret_store=None,
20130
20153
  saml_metadata_url=None,
20131
20154
  scim_provider=None,
@@ -20153,6 +20176,10 @@ class Organization:
20153
20176
  '''
20154
20177
  The Organization's device trust provider, one of the DeviceTrustProvider constants.
20155
20178
  '''
20179
+ self.discard_replays = discard_replays if discard_replays is not None else False
20180
+ '''
20181
+ Indicates if the Organization should drop replay data for SSH, RDP, and K8s logs.
20182
+ '''
20156
20183
  self.enforce_single_session = enforce_single_session if enforce_single_session is not None else False
20157
20184
  '''
20158
20185
  Indicates if the Organization enforces a single session per user for the CLI and AdminUI.
@@ -20209,6 +20236,10 @@ class Organization:
20209
20236
  '''
20210
20237
  The Organization's name.
20211
20238
  '''
20239
+ self.public_key_pem = public_key_pem if public_key_pem is not None else ''
20240
+ '''
20241
+ The Organization's public key PEM for encrypting remote logs.
20242
+ '''
20212
20243
  self.require_secret_store = require_secret_store if require_secret_store is not None else False
20213
20244
  '''
20214
20245
  Indicates if the Organization requires secret stores.
@@ -20256,6 +20287,7 @@ class Organization:
20256
20287
  'created_at: ' + repr(self.created_at) + ' ' +\
20257
20288
  'device_trust_enabled: ' + repr(self.device_trust_enabled) + ' ' +\
20258
20289
  'device_trust_provider: ' + repr(self.device_trust_provider) + ' ' +\
20290
+ 'discard_replays: ' + repr(self.discard_replays) + ' ' +\
20259
20291
  'enforce_single_session: ' + repr(self.enforce_single_session) + ' ' +\
20260
20292
  'idle_timeout: ' + repr(self.idle_timeout) + ' ' +\
20261
20293
  'idle_timeout_enabled: ' + repr(self.idle_timeout_enabled) + ' ' +\
@@ -20270,6 +20302,7 @@ class Organization:
20270
20302
  'mfa_enabled: ' + repr(self.mfa_enabled) + ' ' +\
20271
20303
  'mfa_provider: ' + repr(self.mfa_provider) + ' ' +\
20272
20304
  'name: ' + repr(self.name) + ' ' +\
20305
+ 'public_key_pem: ' + repr(self.public_key_pem) + ' ' +\
20273
20306
  'require_secret_store: ' + repr(self.require_secret_store) + ' ' +\
20274
20307
  'saml_metadata_url: ' + repr(self.saml_metadata_url) + ' ' +\
20275
20308
  'scim_provider: ' + repr(self.scim_provider) + ' ' +\
@@ -20288,6 +20321,7 @@ class Organization:
20288
20321
  'created_at': self.created_at,
20289
20322
  'device_trust_enabled': self.device_trust_enabled,
20290
20323
  'device_trust_provider': self.device_trust_provider,
20324
+ 'discard_replays': self.discard_replays,
20291
20325
  'enforce_single_session': self.enforce_single_session,
20292
20326
  'idle_timeout': self.idle_timeout,
20293
20327
  'idle_timeout_enabled': self.idle_timeout_enabled,
@@ -20302,6 +20336,7 @@ class Organization:
20302
20336
  'mfa_enabled': self.mfa_enabled,
20303
20337
  'mfa_provider': self.mfa_provider,
20304
20338
  'name': self.name,
20339
+ 'public_key_pem': self.public_key_pem,
20305
20340
  'require_secret_store': self.require_secret_store,
20306
20341
  'saml_metadata_url': self.saml_metadata_url,
20307
20342
  'scim_provider': self.scim_provider,
@@ -20323,6 +20358,7 @@ class Organization:
20323
20358
  created_at=d.get('created_at'),
20324
20359
  device_trust_enabled=d.get('device_trust_enabled'),
20325
20360
  device_trust_provider=d.get('device_trust_provider'),
20361
+ discard_replays=d.get('discard_replays'),
20326
20362
  enforce_single_session=d.get('enforce_single_session'),
20327
20363
  idle_timeout=d.get('idle_timeout'),
20328
20364
  idle_timeout_enabled=d.get('idle_timeout_enabled'),
@@ -20337,6 +20373,7 @@ class Organization:
20337
20373
  mfa_enabled=d.get('mfa_enabled'),
20338
20374
  mfa_provider=d.get('mfa_provider'),
20339
20375
  name=d.get('name'),
20376
+ public_key_pem=d.get('public_key_pem'),
20340
20377
  require_secret_store=d.get('require_secret_store'),
20341
20378
  saml_metadata_url=d.get('saml_metadata_url'),
20342
20379
  scim_provider=d.get('scim_provider'),
@@ -22183,6 +22220,7 @@ class Query:
22183
22220
  'encrypted',
22184
22221
  'id',
22185
22222
  'identity_alias_username',
22223
+ 'metadata_json',
22186
22224
  'query_body',
22187
22225
  'query_category',
22188
22226
  'query_hash',
@@ -22215,6 +22253,7 @@ class Query:
22215
22253
  encrypted=None,
22216
22254
  id=None,
22217
22255
  identity_alias_username=None,
22256
+ metadata_json=None,
22218
22257
  query_body=None,
22219
22258
  query_category=None,
22220
22259
  query_hash=None,
@@ -22293,6 +22332,10 @@ class Query:
22293
22332
  '''
22294
22333
  The username of the IdentityAlias used to access the Resource.
22295
22334
  '''
22335
+ self.metadata_json = metadata_json if metadata_json is not None else ''
22336
+ '''
22337
+ Driver specific metadata associated with this query.
22338
+ '''
22296
22339
  self.query_body = query_body if query_body is not None else ''
22297
22340
  '''
22298
22341
  The captured content of the Query.
@@ -22373,6 +22416,7 @@ class Query:
22373
22416
  'encrypted: ' + repr(self.encrypted) + ' ' +\
22374
22417
  'id: ' + repr(self.id) + ' ' +\
22375
22418
  'identity_alias_username: ' + repr(self.identity_alias_username) + ' ' +\
22419
+ 'metadata_json: ' + repr(self.metadata_json) + ' ' +\
22376
22420
  'query_body: ' + repr(self.query_body) + ' ' +\
22377
22421
  'query_category: ' + repr(self.query_category) + ' ' +\
22378
22422
  'query_hash: ' + repr(self.query_hash) + ' ' +\
@@ -22405,6 +22449,7 @@ class Query:
22405
22449
  'encrypted': self.encrypted,
22406
22450
  'id': self.id,
22407
22451
  'identity_alias_username': self.identity_alias_username,
22452
+ 'metadata_json': self.metadata_json,
22408
22453
  'query_body': self.query_body,
22409
22454
  'query_category': self.query_category,
22410
22455
  'query_hash': self.query_hash,
@@ -22438,6 +22483,7 @@ class Query:
22438
22483
  encrypted=d.get('encrypted'),
22439
22484
  id=d.get('id'),
22440
22485
  identity_alias_username=d.get('identity_alias_username'),
22486
+ metadata_json=d.get('metadata_json'),
22441
22487
  query_body=d.get('query_body'),
22442
22488
  query_category=d.get('query_category'),
22443
22489
  query_hash=d.get('query_hash'),
@@ -29324,6 +29370,7 @@ class Trino:
29324
29370
  'secret_store_id',
29325
29371
  'subdomain',
29326
29372
  'tags',
29373
+ 'tls_required',
29327
29374
  'username',
29328
29375
  ]
29329
29376
 
@@ -29342,6 +29389,7 @@ class Trino:
29342
29389
  secret_store_id=None,
29343
29390
  subdomain=None,
29344
29391
  tags=None,
29392
+ tls_required=None,
29345
29393
  username=None,
29346
29394
  ):
29347
29395
  self.bind_interface = bind_interface if bind_interface is not None else ''
@@ -29396,6 +29444,10 @@ class Trino:
29396
29444
  '''
29397
29445
  Tags is a map of key, value pairs.
29398
29446
  '''
29447
+ self.tls_required = tls_required if tls_required is not None else False
29448
+ '''
29449
+ If set, TLS must be used to connect to this resource.
29450
+ '''
29399
29451
  self.username = username if username is not None else ''
29400
29452
  '''
29401
29453
  The username to authenticate with.
@@ -29416,6 +29468,7 @@ class Trino:
29416
29468
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
29417
29469
  'subdomain: ' + repr(self.subdomain) + ' ' +\
29418
29470
  'tags: ' + repr(self.tags) + ' ' +\
29471
+ 'tls_required: ' + repr(self.tls_required) + ' ' +\
29419
29472
  'username: ' + repr(self.username) + ' ' +\
29420
29473
  '>'
29421
29474
 
@@ -29434,6 +29487,7 @@ class Trino:
29434
29487
  'secret_store_id': self.secret_store_id,
29435
29488
  'subdomain': self.subdomain,
29436
29489
  'tags': self.tags,
29490
+ 'tls_required': self.tls_required,
29437
29491
  'username': self.username,
29438
29492
  }
29439
29493
 
@@ -29453,6 +29507,7 @@ class Trino:
29453
29507
  secret_store_id=d.get('secret_store_id'),
29454
29508
  subdomain=d.get('subdomain'),
29455
29509
  tags=d.get('tags'),
29510
+ tls_required=d.get('tls_required'),
29456
29511
  username=d.get('username'),
29457
29512
  )
29458
29513
 
@@ -32,7 +32,7 @@ from . import options_pb2 as options__pb2
32
32
  from . import spec_pb2 as spec__pb2
33
33
 
34
34
 
35
- DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x99\x0c\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\"\n\x0eloopback_range\x18\x1a \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14\x64\x65vice_trust_enabled\x18\x1b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x15\x64\x65vice_trust_provider\x18\x1c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12*\n\x16\x65nforce_single_session\x18\x1d \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
35
+ DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xe2\x0c\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\"\n\x0eloopback_range\x18\x1a \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14\x64\x65vice_trust_enabled\x18\x1b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x15\x64\x65vice_trust_provider\x18\x1c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12*\n\x16\x65nforce_single_session\x18\x1d \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0f\x64iscard_replays\x18\x1e \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0epublic_key_pem\x18\x1f \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
36
36
 
37
37
 
38
38
 
@@ -149,6 +149,10 @@ if _descriptor._USE_C_DESCRIPTORS == False:
149
149
  _ORGANIZATION.fields_by_name['device_trust_provider']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
150
150
  _ORGANIZATION.fields_by_name['enforce_single_session']._options = None
151
151
  _ORGANIZATION.fields_by_name['enforce_single_session']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
152
+ _ORGANIZATION.fields_by_name['discard_replays']._options = None
153
+ _ORGANIZATION.fields_by_name['discard_replays']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
154
+ _ORGANIZATION.fields_by_name['public_key_pem']._options = None
155
+ _ORGANIZATION.fields_by_name['public_key_pem']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
152
156
  _ORGANIZATION._options = None
153
157
  _ORGANIZATION._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
154
158
  _ORGANIZATIONHISTORY._options = None
@@ -162,7 +166,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
162
166
  _ORGANIZATIONHISTORYRECORD._serialized_start=538
163
167
  _ORGANIZATIONHISTORYRECORD._serialized_end=761
164
168
  _ORGANIZATION._serialized_start=764
165
- _ORGANIZATION._serialized_end=2325
166
- _ORGANIZATIONHISTORY._serialized_start=2328
167
- _ORGANIZATIONHISTORY._serialized_end=2567
169
+ _ORGANIZATION._serialized_end=2398
170
+ _ORGANIZATIONHISTORY._serialized_start=2401
171
+ _ORGANIZATIONHISTORY._serialized_end=2640
168
172
  # @@protoc_insertion_point(module_scope)
@@ -7243,6 +7243,8 @@ def convert_kubernetes_pod_identity_to_porcelain(plumbing):
7243
7243
  plumbing.allow_resource_role_bypass)
7244
7244
  porcelain.bind_interface = (plumbing.bind_interface)
7245
7245
  porcelain.certificate_authority = (plumbing.certificate_authority)
7246
+ porcelain.discovery_enabled = (plumbing.discovery_enabled)
7247
+ porcelain.discovery_username = (plumbing.discovery_username)
7246
7248
  porcelain.egress_filter = (plumbing.egress_filter)
7247
7249
  porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
7248
7250
  porcelain.healthy = (plumbing.healthy)
@@ -7267,6 +7269,8 @@ def convert_kubernetes_pod_identity_to_plumbing(porcelain):
7267
7269
  porcelain.allow_resource_role_bypass)
7268
7270
  plumbing.bind_interface = (porcelain.bind_interface)
7269
7271
  plumbing.certificate_authority = (porcelain.certificate_authority)
7272
+ plumbing.discovery_enabled = (porcelain.discovery_enabled)
7273
+ plumbing.discovery_username = (porcelain.discovery_username)
7270
7274
  plumbing.egress_filter = (porcelain.egress_filter)
7271
7275
  plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
7272
7276
  plumbing.healthy = (porcelain.healthy)
@@ -9434,6 +9438,7 @@ def convert_organization_to_porcelain(plumbing):
9434
9438
  porcelain.created_at = convert_timestamp_to_porcelain(plumbing.created_at)
9435
9439
  porcelain.device_trust_enabled = (plumbing.device_trust_enabled)
9436
9440
  porcelain.device_trust_provider = (plumbing.device_trust_provider)
9441
+ porcelain.discard_replays = (plumbing.discard_replays)
9437
9442
  porcelain.enforce_single_session = (plumbing.enforce_single_session)
9438
9443
  porcelain.idle_timeout = convert_duration_to_porcelain(
9439
9444
  plumbing.idle_timeout)
@@ -9449,6 +9454,7 @@ def convert_organization_to_porcelain(plumbing):
9449
9454
  porcelain.mfa_enabled = (plumbing.mfa_enabled)
9450
9455
  porcelain.mfa_provider = (plumbing.mfa_provider)
9451
9456
  porcelain.name = (plumbing.name)
9457
+ porcelain.public_key_pem = (plumbing.public_key_pem)
9452
9458
  porcelain.require_secret_store = (plumbing.require_secret_store)
9453
9459
  porcelain.saml_metadata_url = (plumbing.saml_metadata_url)
9454
9460
  porcelain.scim_provider = (plumbing.scim_provider)
@@ -9474,6 +9480,7 @@ def convert_organization_to_plumbing(porcelain):
9474
9480
  convert_timestamp_to_plumbing(porcelain.created_at))
9475
9481
  plumbing.device_trust_enabled = (porcelain.device_trust_enabled)
9476
9482
  plumbing.device_trust_provider = (porcelain.device_trust_provider)
9483
+ plumbing.discard_replays = (porcelain.discard_replays)
9477
9484
  plumbing.enforce_single_session = (porcelain.enforce_single_session)
9478
9485
  plumbing.idle_timeout.CopyFrom(
9479
9486
  convert_duration_to_plumbing(porcelain.idle_timeout))
@@ -9489,6 +9496,7 @@ def convert_organization_to_plumbing(porcelain):
9489
9496
  plumbing.mfa_enabled = (porcelain.mfa_enabled)
9490
9497
  plumbing.mfa_provider = (porcelain.mfa_provider)
9491
9498
  plumbing.name = (porcelain.name)
9499
+ plumbing.public_key_pem = (porcelain.public_key_pem)
9492
9500
  plumbing.require_secret_store = (porcelain.require_secret_store)
9493
9501
  plumbing.saml_metadata_url = (porcelain.saml_metadata_url)
9494
9502
  plumbing.scim_provider = (porcelain.scim_provider)
@@ -10727,6 +10735,7 @@ def convert_query_to_porcelain(plumbing):
10727
10735
  porcelain.encrypted = (plumbing.encrypted)
10728
10736
  porcelain.id = (plumbing.id)
10729
10737
  porcelain.identity_alias_username = (plumbing.identity_alias_username)
10738
+ porcelain.metadata_json = (plumbing.metadata_json)
10730
10739
  porcelain.query_body = (plumbing.query_body)
10731
10740
  porcelain.query_category = (plumbing.query_category)
10732
10741
  porcelain.query_hash = (plumbing.query_hash)
@@ -10766,6 +10775,7 @@ def convert_query_to_plumbing(porcelain):
10766
10775
  plumbing.encrypted = (porcelain.encrypted)
10767
10776
  plumbing.id = (porcelain.id)
10768
10777
  plumbing.identity_alias_username = (porcelain.identity_alias_username)
10778
+ plumbing.metadata_json = (porcelain.metadata_json)
10769
10779
  plumbing.query_body = (porcelain.query_body)
10770
10780
  plumbing.query_category = (porcelain.query_category)
10771
10781
  plumbing.query_hash = (porcelain.query_hash)
@@ -14904,6 +14914,7 @@ def convert_trino_to_porcelain(plumbing):
14904
14914
  porcelain.secret_store_id = (plumbing.secret_store_id)
14905
14915
  porcelain.subdomain = (plumbing.subdomain)
14906
14916
  porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
14917
+ porcelain.tls_required = (plumbing.tls_required)
14907
14918
  porcelain.username = (plumbing.username)
14908
14919
  return porcelain
14909
14920
 
@@ -14925,6 +14936,7 @@ def convert_trino_to_plumbing(porcelain):
14925
14936
  plumbing.secret_store_id = (porcelain.secret_store_id)
14926
14937
  plumbing.subdomain = (porcelain.subdomain)
14927
14938
  plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
14939
+ plumbing.tls_required = (porcelain.tls_required)
14928
14940
  plumbing.username = (porcelain.username)
14929
14941
  return plumbing
14930
14942
 
@@ -33,7 +33,7 @@ from . import spec_pb2 as spec__pb2
33
33
  from . import tags_pb2 as tags__pb2
34
34
 
35
35
 
36
- DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\rqueries.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\"\x7f\n\x10QueryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xe6\x01\n\x11QueryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12&\n\x07queries\x18\x02 \x03(\x0b\x32\t.v1.QueryB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x94\n\n\x05Query\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\naccount_id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1f\n\x0bresource_id\x18\x03 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nquery_body\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x37\n\x08\x64uration\x18\x05 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tencrypted\x18\x06 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nquery_hash\x18\x07 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12.\n\x18remote_identity_username\x18\x08 \x01(\tB\x0c\x18\x01\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\t \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0e\x65gress_node_id\x18\n \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nreplayable\x18\x0b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12 \n\x0crecord_count\x18\x0c \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rresource_type\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0equery_category\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tquery_key\x18\x0f \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rresource_name\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\rresource_tags\x18\x11 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12&\n\x12\x61\x63\x63ount_first_name\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11\x61\x63\x63ount_last_name\x18\x13 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\raccount_email\x18\x14 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12*\n\x0c\x61\x63\x63ount_tags\x18\x15 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12/\n\x0cquery_key_id\x18\x16 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12<\n\x0c\x63ompleted_at\x18\x17 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12-\n\x07\x63\x61pture\x18\x18 \x01(\x0b\x32\x10.v1.QueryCaptureB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\tsource_ip\x18\x19 \x01(\tB\"\xf2\xf8\xb3\x07\x1d\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x13\xc2\xf4\xb3\x07\x0e\n\x02go\x12\x08SourceIP\x12\x34\n\x11\x61uthentication_id\x18\x1a \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\x1a\n\x06target\x18\x1b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x36\n\tauthzJson\x18\x1c \x01(\tB#\xf2\xf8\xb3\x07\x1e\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x14\xc2\xf4\xb3\x07\x0f\n\x02go\x12\tAuthzJSON\x12\x35\n\tclient_ip\x18\x1d \x01(\tB\"\xf2\xf8\xb3\x07\x1d\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x13\xc2\xf4\xb3\x07\x0e\n\x02go\x12\x08\x43lientIP\x12+\n\x17identity_alias_username\x18\x1e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xa3\x05\n\x0cQueryCapture\x12\x19\n\x05width\x18\x01 \x01(\x05\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1a\n\x06height\x18\x02 \x01(\x05\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1b\n\x07\x63ommand\x18\x03 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x03\x65nv\x18\x04 \x03(\x0b\x32\x19.v1.QueryCapture.EnvEntryB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x18\n\x04type\x18\x05 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tfile_name\x18\x06 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tfile_size\x18\x07 \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0e\x63lient_command\x18\x08 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x17\n\x03pod\x18\t \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tcontainer\x18\n \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0erequest_method\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0brequest_uri\x18\x0c \x01(\tB$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nRequestURI\x12 \n\x0crequest_body\x18\r \x01(\x0c\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12&\n\x12impersonation_user\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14impersonation_groups\x18\x0f \x03(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10privilege_groups\x18\x10 \x03(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x1a*\n\x08\x45nvEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xa5\x01\n\x07Queries\x12W\n\x04List\x12\x14.v1.QueryListRequest\x1a\x15.v1.QueryListResponse\"\"\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x10\xaa\xf3\xb3\x07\x0b/v1/queries\x1a\x41\xca\xf9\xb3\x07\n\xc2\xf9\xb3\x07\x05Query\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x8b\x01\n\x19\x63om.strongdm.api.plumbingB\x0fQueriesPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
36
+ DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\rqueries.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\"\x7f\n\x10QueryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xe6\x01\n\x11QueryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12&\n\x07queries\x18\x02 \x03(\x0b\x32\t.v1.QueryB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xd3\n\n\x05Query\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\naccount_id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1f\n\x0bresource_id\x18\x03 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nquery_body\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x37\n\x08\x64uration\x18\x05 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tencrypted\x18\x06 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nquery_hash\x18\x07 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12.\n\x18remote_identity_username\x18\x08 \x01(\tB\x0c\x18\x01\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\t \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0e\x65gress_node_id\x18\n \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nreplayable\x18\x0b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12 \n\x0crecord_count\x18\x0c \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rresource_type\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0equery_category\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tquery_key\x18\x0f \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rresource_name\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\rresource_tags\x18\x11 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12&\n\x12\x61\x63\x63ount_first_name\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11\x61\x63\x63ount_last_name\x18\x13 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\raccount_email\x18\x14 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12*\n\x0c\x61\x63\x63ount_tags\x18\x15 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12/\n\x0cquery_key_id\x18\x16 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12<\n\x0c\x63ompleted_at\x18\x17 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12-\n\x07\x63\x61pture\x18\x18 \x01(\x0b\x32\x10.v1.QueryCaptureB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\tsource_ip\x18\x19 \x01(\tB\"\xf2\xf8\xb3\x07\x1d\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x13\xc2\xf4\xb3\x07\x0e\n\x02go\x12\x08SourceIP\x12\x34\n\x11\x61uthentication_id\x18\x1a \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\x1a\n\x06target\x18\x1b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x36\n\tauthzJson\x18\x1c \x01(\tB#\xf2\xf8\xb3\x07\x1e\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x14\xc2\xf4\xb3\x07\x0f\n\x02go\x12\tAuthzJSON\x12\x35\n\tclient_ip\x18\x1d \x01(\tB\"\xf2\xf8\xb3\x07\x1d\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x13\xc2\xf4\xb3\x07\x0e\n\x02go\x12\x08\x43lientIP\x12+\n\x17identity_alias_username\x18\x1e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rmetadata_json\x18\x1f \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cMetadataJSON:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xa3\x05\n\x0cQueryCapture\x12\x19\n\x05width\x18\x01 \x01(\x05\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1a\n\x06height\x18\x02 \x01(\x05\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1b\n\x07\x63ommand\x18\x03 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x03\x65nv\x18\x04 \x03(\x0b\x32\x19.v1.QueryCapture.EnvEntryB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x18\n\x04type\x18\x05 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tfile_name\x18\x06 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tfile_size\x18\x07 \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0e\x63lient_command\x18\x08 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x17\n\x03pod\x18\t \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tcontainer\x18\n \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x0erequest_method\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0brequest_uri\x18\x0c \x01(\tB$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nRequestURI\x12 \n\x0crequest_body\x18\r \x01(\x0c\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12&\n\x12impersonation_user\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14impersonation_groups\x18\x0f \x03(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10privilege_groups\x18\x10 \x03(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x1a*\n\x08\x45nvEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xa5\x01\n\x07Queries\x12W\n\x04List\x12\x14.v1.QueryListRequest\x1a\x15.v1.QueryListResponse\"\"\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x10\xaa\xf3\xb3\x07\x0b/v1/queries\x1a\x41\xca\xf9\xb3\x07\n\xc2\xf9\xb3\x07\x05Query\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x8b\x01\n\x19\x63om.strongdm.api.plumbingB\x0fQueriesPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
37
37
 
38
38
 
39
39
 
@@ -153,6 +153,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
153
153
  _QUERY.fields_by_name['client_ip']._serialized_options = b'\362\370\263\007\035\260\363\263\007\001\312\363\263\007\023\302\364\263\007\016\n\002go\022\010ClientIP'
154
154
  _QUERY.fields_by_name['identity_alias_username']._options = None
155
155
  _QUERY.fields_by_name['identity_alias_username']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
156
+ _QUERY.fields_by_name['metadata_json']._options = None
157
+ _QUERY.fields_by_name['metadata_json']._serialized_options = b'\362\370\263\007!\260\363\263\007\001\312\363\263\007\027\302\364\263\007\022\n\002go\022\014MetadataJSON'
156
158
  _QUERY._options = None
157
159
  _QUERY._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
158
160
  _QUERYCAPTURE_ENVENTRY._options = None
@@ -200,11 +202,11 @@ if _descriptor._USE_C_DESCRIPTORS == False:
200
202
  _QUERYLISTRESPONSE._serialized_start=255
201
203
  _QUERYLISTRESPONSE._serialized_end=485
202
204
  _QUERY._serialized_start=488
203
- _QUERY._serialized_end=1788
204
- _QUERYCAPTURE._serialized_start=1791
205
- _QUERYCAPTURE._serialized_end=2466
206
- _QUERYCAPTURE_ENVENTRY._serialized_start=2372
207
- _QUERYCAPTURE_ENVENTRY._serialized_end=2414
208
- _QUERIES._serialized_start=2469
209
- _QUERIES._serialized_end=2634
205
+ _QUERY._serialized_end=1851
206
+ _QUERYCAPTURE._serialized_start=1854
207
+ _QUERYCAPTURE._serialized_end=2529
208
+ _QUERYCAPTURE_ENVENTRY._serialized_start=2435
209
+ _QUERYCAPTURE_ENVENTRY._serialized_end=2477
210
+ _QUERIES._serialized_start=2532
211
+ _QUERIES._serialized_end=2697
210
212
  # @@protoc_insertion_point(module_scope)