strongdm 15.22.0__zip → 15.23.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-15.22.0 → strongdm-15.23.0}/PKG-INFO +2 -2
- {strongdm-15.22.0 → strongdm-15.23.0}/setup.py +2 -2
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/client.py +1 -1
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/models.py +392 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/plumbing.py +200 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_store_types_pb2.py +168 -48
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/svc.py +4 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-15.22.0 → strongdm-15.23.0}/LICENSE +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/README.md +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/setup.cfg +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/__init__.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_groups_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_groups_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_groups_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_groups_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/constants.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/drivers_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/errors.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_roles_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_roles_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_roles_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_roles_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/health_checks_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/health_checks_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/managed_secrets_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/managed_secrets_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/options_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/policies_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/policies_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/policies_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/policies_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/proxy_cluster_keys_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/proxy_cluster_keys_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engine_policy_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engine_types_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engine_types_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engines_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engines_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-15.22.0 → strongdm-15.23.0}/strongdm.egg-info/top_level.txt +0 -0
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: strongdm
|
|
3
|
-
Version: 15.
|
|
3
|
+
Version: 15.23.0
|
|
4
4
|
Summary: strongDM SDK for the Python programming language.
|
|
5
5
|
Home-page: https://github.com/strongdm/strongdm-sdk-python
|
|
6
6
|
Author: strongDM Team
|
|
7
7
|
Author-email: sdk-feedback@strongdm.com
|
|
8
8
|
License: apache-2.0
|
|
9
|
-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v15.
|
|
9
|
+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v15.23.0.tar.gz
|
|
10
10
|
Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
|
|
11
11
|
Platform: UNKNOWN
|
|
12
12
|
Classifier: Development Status :: 4 - Beta
|
|
@@ -23,7 +23,7 @@ from setuptools import setup
|
|
|
23
23
|
setup(
|
|
24
24
|
name='strongdm',
|
|
25
25
|
packages=['strongdm'],
|
|
26
|
-
version='15.
|
|
26
|
+
version='15.23.0',
|
|
27
27
|
license='apache-2.0',
|
|
28
28
|
description='strongDM SDK for the Python programming language.',
|
|
29
29
|
long_description=long_description,
|
|
@@ -32,7 +32,7 @@ setup(
|
|
|
32
32
|
author_email='sdk-feedback@strongdm.com',
|
|
33
33
|
url='https://github.com/strongdm/strongdm-sdk-python',
|
|
34
34
|
download_url=
|
|
35
|
-
'https://github.com/strongdm/strongdm-sdk-python/archive/v15.
|
|
35
|
+
'https://github.com/strongdm/strongdm-sdk-python/archive/v15.23.0.tar.gz',
|
|
36
36
|
keywords=[
|
|
37
37
|
'strongDM', 'sdm', 'api', 'automation', 'security', 'audit',
|
|
38
38
|
'database', 'server', 'ssh', 'rdp'
|
|
@@ -32227,6 +32227,202 @@ class User:
|
|
|
32227
32227
|
)
|
|
32228
32228
|
|
|
32229
32229
|
|
|
32230
|
+
class VaultAWSEC2CertSSHStore:
|
|
32231
|
+
'''
|
|
32232
|
+
VaultAWSEC2CertSSHStore is currently unstable, and its API may change, or it may be removed,
|
|
32233
|
+
without a major version bump.
|
|
32234
|
+
'''
|
|
32235
|
+
__slots__ = [
|
|
32236
|
+
'id',
|
|
32237
|
+
'issuedcertttlminutes',
|
|
32238
|
+
'name',
|
|
32239
|
+
'namespace',
|
|
32240
|
+
'server_address',
|
|
32241
|
+
'signing_role',
|
|
32242
|
+
'ssh_mount_point',
|
|
32243
|
+
'tags',
|
|
32244
|
+
]
|
|
32245
|
+
|
|
32246
|
+
def __init__(
|
|
32247
|
+
self,
|
|
32248
|
+
id=None,
|
|
32249
|
+
issuedcertttlminutes=None,
|
|
32250
|
+
name=None,
|
|
32251
|
+
namespace=None,
|
|
32252
|
+
server_address=None,
|
|
32253
|
+
signing_role=None,
|
|
32254
|
+
ssh_mount_point=None,
|
|
32255
|
+
tags=None,
|
|
32256
|
+
):
|
|
32257
|
+
self.id = id if id is not None else ''
|
|
32258
|
+
'''
|
|
32259
|
+
Unique identifier of the SecretStore.
|
|
32260
|
+
'''
|
|
32261
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
|
32262
|
+
'''
|
|
32263
|
+
The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
|
32264
|
+
'''
|
|
32265
|
+
self.name = name if name is not None else ''
|
|
32266
|
+
'''
|
|
32267
|
+
Unique human-readable name of the SecretStore.
|
|
32268
|
+
'''
|
|
32269
|
+
self.namespace = namespace if namespace is not None else ''
|
|
32270
|
+
'''
|
|
32271
|
+
The namespace to make requests within
|
|
32272
|
+
'''
|
|
32273
|
+
self.server_address = server_address if server_address is not None else ''
|
|
32274
|
+
'''
|
|
32275
|
+
The URL of the Vault to target
|
|
32276
|
+
'''
|
|
32277
|
+
self.signing_role = signing_role if signing_role is not None else ''
|
|
32278
|
+
'''
|
|
32279
|
+
The signing role to be used for signing certificates
|
|
32280
|
+
'''
|
|
32281
|
+
self.ssh_mount_point = ssh_mount_point if ssh_mount_point is not None else ''
|
|
32282
|
+
'''
|
|
32283
|
+
The mount point of the SSH engine configured with the desired CA
|
|
32284
|
+
'''
|
|
32285
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
32286
|
+
'''
|
|
32287
|
+
Tags is a map of key, value pairs.
|
|
32288
|
+
'''
|
|
32289
|
+
|
|
32290
|
+
def __repr__(self):
|
|
32291
|
+
return '<sdm.VaultAWSEC2CertSSHStore ' + \
|
|
32292
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
32293
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
|
32294
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
32295
|
+
'namespace: ' + repr(self.namespace) + ' ' +\
|
|
32296
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
|
32297
|
+
'signing_role: ' + repr(self.signing_role) + ' ' +\
|
|
32298
|
+
'ssh_mount_point: ' + repr(self.ssh_mount_point) + ' ' +\
|
|
32299
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
32300
|
+
'>'
|
|
32301
|
+
|
|
32302
|
+
def to_dict(self):
|
|
32303
|
+
return {
|
|
32304
|
+
'id': self.id,
|
|
32305
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
|
32306
|
+
'name': self.name,
|
|
32307
|
+
'namespace': self.namespace,
|
|
32308
|
+
'server_address': self.server_address,
|
|
32309
|
+
'signing_role': self.signing_role,
|
|
32310
|
+
'ssh_mount_point': self.ssh_mount_point,
|
|
32311
|
+
'tags': self.tags,
|
|
32312
|
+
}
|
|
32313
|
+
|
|
32314
|
+
@classmethod
|
|
32315
|
+
def from_dict(cls, d):
|
|
32316
|
+
return cls(
|
|
32317
|
+
id=d.get('id'),
|
|
32318
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
|
32319
|
+
name=d.get('name'),
|
|
32320
|
+
namespace=d.get('namespace'),
|
|
32321
|
+
server_address=d.get('server_address'),
|
|
32322
|
+
signing_role=d.get('signing_role'),
|
|
32323
|
+
ssh_mount_point=d.get('ssh_mount_point'),
|
|
32324
|
+
tags=d.get('tags'),
|
|
32325
|
+
)
|
|
32326
|
+
|
|
32327
|
+
|
|
32328
|
+
class VaultAWSEC2CertX509Store:
|
|
32329
|
+
'''
|
|
32330
|
+
VaultAWSEC2CertX509Store is currently unstable, and its API may change, or it may be removed,
|
|
32331
|
+
without a major version bump.
|
|
32332
|
+
'''
|
|
32333
|
+
__slots__ = [
|
|
32334
|
+
'id',
|
|
32335
|
+
'issuedcertttlminutes',
|
|
32336
|
+
'name',
|
|
32337
|
+
'namespace',
|
|
32338
|
+
'pki_mount_point',
|
|
32339
|
+
'server_address',
|
|
32340
|
+
'signing_role',
|
|
32341
|
+
'tags',
|
|
32342
|
+
]
|
|
32343
|
+
|
|
32344
|
+
def __init__(
|
|
32345
|
+
self,
|
|
32346
|
+
id=None,
|
|
32347
|
+
issuedcertttlminutes=None,
|
|
32348
|
+
name=None,
|
|
32349
|
+
namespace=None,
|
|
32350
|
+
pki_mount_point=None,
|
|
32351
|
+
server_address=None,
|
|
32352
|
+
signing_role=None,
|
|
32353
|
+
tags=None,
|
|
32354
|
+
):
|
|
32355
|
+
self.id = id if id is not None else ''
|
|
32356
|
+
'''
|
|
32357
|
+
Unique identifier of the SecretStore.
|
|
32358
|
+
'''
|
|
32359
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
|
32360
|
+
'''
|
|
32361
|
+
The lifetime of certificates issued by this CA represented in minutes.
|
|
32362
|
+
'''
|
|
32363
|
+
self.name = name if name is not None else ''
|
|
32364
|
+
'''
|
|
32365
|
+
Unique human-readable name of the SecretStore.
|
|
32366
|
+
'''
|
|
32367
|
+
self.namespace = namespace if namespace is not None else ''
|
|
32368
|
+
'''
|
|
32369
|
+
The namespace to make requests within
|
|
32370
|
+
'''
|
|
32371
|
+
self.pki_mount_point = pki_mount_point if pki_mount_point is not None else ''
|
|
32372
|
+
'''
|
|
32373
|
+
The mount point of the PKI engine configured with the desired CA
|
|
32374
|
+
'''
|
|
32375
|
+
self.server_address = server_address if server_address is not None else ''
|
|
32376
|
+
'''
|
|
32377
|
+
The URL of the Vault to target
|
|
32378
|
+
'''
|
|
32379
|
+
self.signing_role = signing_role if signing_role is not None else ''
|
|
32380
|
+
'''
|
|
32381
|
+
The signing role to be used for signing certificates
|
|
32382
|
+
'''
|
|
32383
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
32384
|
+
'''
|
|
32385
|
+
Tags is a map of key, value pairs.
|
|
32386
|
+
'''
|
|
32387
|
+
|
|
32388
|
+
def __repr__(self):
|
|
32389
|
+
return '<sdm.VaultAWSEC2CertX509Store ' + \
|
|
32390
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
32391
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
|
32392
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
32393
|
+
'namespace: ' + repr(self.namespace) + ' ' +\
|
|
32394
|
+
'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
|
|
32395
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
|
32396
|
+
'signing_role: ' + repr(self.signing_role) + ' ' +\
|
|
32397
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
32398
|
+
'>'
|
|
32399
|
+
|
|
32400
|
+
def to_dict(self):
|
|
32401
|
+
return {
|
|
32402
|
+
'id': self.id,
|
|
32403
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
|
32404
|
+
'name': self.name,
|
|
32405
|
+
'namespace': self.namespace,
|
|
32406
|
+
'pki_mount_point': self.pki_mount_point,
|
|
32407
|
+
'server_address': self.server_address,
|
|
32408
|
+
'signing_role': self.signing_role,
|
|
32409
|
+
'tags': self.tags,
|
|
32410
|
+
}
|
|
32411
|
+
|
|
32412
|
+
@classmethod
|
|
32413
|
+
def from_dict(cls, d):
|
|
32414
|
+
return cls(
|
|
32415
|
+
id=d.get('id'),
|
|
32416
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
|
32417
|
+
name=d.get('name'),
|
|
32418
|
+
namespace=d.get('namespace'),
|
|
32419
|
+
pki_mount_point=d.get('pki_mount_point'),
|
|
32420
|
+
server_address=d.get('server_address'),
|
|
32421
|
+
signing_role=d.get('signing_role'),
|
|
32422
|
+
tags=d.get('tags'),
|
|
32423
|
+
)
|
|
32424
|
+
|
|
32425
|
+
|
|
32230
32426
|
class VaultAWSEC2Store:
|
|
32231
32427
|
__slots__ = [
|
|
32232
32428
|
'id',
|
|
@@ -32294,6 +32490,202 @@ class VaultAWSEC2Store:
|
|
|
32294
32490
|
)
|
|
32295
32491
|
|
|
32296
32492
|
|
|
32493
|
+
class VaultAWSIAMCertSSHStore:
|
|
32494
|
+
'''
|
|
32495
|
+
VaultAWSIAMCertSSHStore is currently unstable, and its API may change, or it may be removed,
|
|
32496
|
+
without a major version bump.
|
|
32497
|
+
'''
|
|
32498
|
+
__slots__ = [
|
|
32499
|
+
'id',
|
|
32500
|
+
'issuedcertttlminutes',
|
|
32501
|
+
'name',
|
|
32502
|
+
'namespace',
|
|
32503
|
+
'server_address',
|
|
32504
|
+
'signing_role',
|
|
32505
|
+
'ssh_mount_point',
|
|
32506
|
+
'tags',
|
|
32507
|
+
]
|
|
32508
|
+
|
|
32509
|
+
def __init__(
|
|
32510
|
+
self,
|
|
32511
|
+
id=None,
|
|
32512
|
+
issuedcertttlminutes=None,
|
|
32513
|
+
name=None,
|
|
32514
|
+
namespace=None,
|
|
32515
|
+
server_address=None,
|
|
32516
|
+
signing_role=None,
|
|
32517
|
+
ssh_mount_point=None,
|
|
32518
|
+
tags=None,
|
|
32519
|
+
):
|
|
32520
|
+
self.id = id if id is not None else ''
|
|
32521
|
+
'''
|
|
32522
|
+
Unique identifier of the SecretStore.
|
|
32523
|
+
'''
|
|
32524
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
|
32525
|
+
'''
|
|
32526
|
+
The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
|
32527
|
+
'''
|
|
32528
|
+
self.name = name if name is not None else ''
|
|
32529
|
+
'''
|
|
32530
|
+
Unique human-readable name of the SecretStore.
|
|
32531
|
+
'''
|
|
32532
|
+
self.namespace = namespace if namespace is not None else ''
|
|
32533
|
+
'''
|
|
32534
|
+
The namespace to make requests within
|
|
32535
|
+
'''
|
|
32536
|
+
self.server_address = server_address if server_address is not None else ''
|
|
32537
|
+
'''
|
|
32538
|
+
The URL of the Vault to target
|
|
32539
|
+
'''
|
|
32540
|
+
self.signing_role = signing_role if signing_role is not None else ''
|
|
32541
|
+
'''
|
|
32542
|
+
The signing role to be used for signing certificates
|
|
32543
|
+
'''
|
|
32544
|
+
self.ssh_mount_point = ssh_mount_point if ssh_mount_point is not None else ''
|
|
32545
|
+
'''
|
|
32546
|
+
The mount point of the SSH engine configured with the desired CA
|
|
32547
|
+
'''
|
|
32548
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
32549
|
+
'''
|
|
32550
|
+
Tags is a map of key, value pairs.
|
|
32551
|
+
'''
|
|
32552
|
+
|
|
32553
|
+
def __repr__(self):
|
|
32554
|
+
return '<sdm.VaultAWSIAMCertSSHStore ' + \
|
|
32555
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
32556
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
|
32557
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
32558
|
+
'namespace: ' + repr(self.namespace) + ' ' +\
|
|
32559
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
|
32560
|
+
'signing_role: ' + repr(self.signing_role) + ' ' +\
|
|
32561
|
+
'ssh_mount_point: ' + repr(self.ssh_mount_point) + ' ' +\
|
|
32562
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
32563
|
+
'>'
|
|
32564
|
+
|
|
32565
|
+
def to_dict(self):
|
|
32566
|
+
return {
|
|
32567
|
+
'id': self.id,
|
|
32568
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
|
32569
|
+
'name': self.name,
|
|
32570
|
+
'namespace': self.namespace,
|
|
32571
|
+
'server_address': self.server_address,
|
|
32572
|
+
'signing_role': self.signing_role,
|
|
32573
|
+
'ssh_mount_point': self.ssh_mount_point,
|
|
32574
|
+
'tags': self.tags,
|
|
32575
|
+
}
|
|
32576
|
+
|
|
32577
|
+
@classmethod
|
|
32578
|
+
def from_dict(cls, d):
|
|
32579
|
+
return cls(
|
|
32580
|
+
id=d.get('id'),
|
|
32581
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
|
32582
|
+
name=d.get('name'),
|
|
32583
|
+
namespace=d.get('namespace'),
|
|
32584
|
+
server_address=d.get('server_address'),
|
|
32585
|
+
signing_role=d.get('signing_role'),
|
|
32586
|
+
ssh_mount_point=d.get('ssh_mount_point'),
|
|
32587
|
+
tags=d.get('tags'),
|
|
32588
|
+
)
|
|
32589
|
+
|
|
32590
|
+
|
|
32591
|
+
class VaultAWSIAMCertX509Store:
|
|
32592
|
+
'''
|
|
32593
|
+
VaultAWSIAMCertX509Store is currently unstable, and its API may change, or it may be removed,
|
|
32594
|
+
without a major version bump.
|
|
32595
|
+
'''
|
|
32596
|
+
__slots__ = [
|
|
32597
|
+
'id',
|
|
32598
|
+
'issuedcertttlminutes',
|
|
32599
|
+
'name',
|
|
32600
|
+
'namespace',
|
|
32601
|
+
'pki_mount_point',
|
|
32602
|
+
'server_address',
|
|
32603
|
+
'signing_role',
|
|
32604
|
+
'tags',
|
|
32605
|
+
]
|
|
32606
|
+
|
|
32607
|
+
def __init__(
|
|
32608
|
+
self,
|
|
32609
|
+
id=None,
|
|
32610
|
+
issuedcertttlminutes=None,
|
|
32611
|
+
name=None,
|
|
32612
|
+
namespace=None,
|
|
32613
|
+
pki_mount_point=None,
|
|
32614
|
+
server_address=None,
|
|
32615
|
+
signing_role=None,
|
|
32616
|
+
tags=None,
|
|
32617
|
+
):
|
|
32618
|
+
self.id = id if id is not None else ''
|
|
32619
|
+
'''
|
|
32620
|
+
Unique identifier of the SecretStore.
|
|
32621
|
+
'''
|
|
32622
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
|
32623
|
+
'''
|
|
32624
|
+
The lifetime of certificates issued by this CA represented in minutes.
|
|
32625
|
+
'''
|
|
32626
|
+
self.name = name if name is not None else ''
|
|
32627
|
+
'''
|
|
32628
|
+
Unique human-readable name of the SecretStore.
|
|
32629
|
+
'''
|
|
32630
|
+
self.namespace = namespace if namespace is not None else ''
|
|
32631
|
+
'''
|
|
32632
|
+
The namespace to make requests within
|
|
32633
|
+
'''
|
|
32634
|
+
self.pki_mount_point = pki_mount_point if pki_mount_point is not None else ''
|
|
32635
|
+
'''
|
|
32636
|
+
The mount point of the PKI engine configured with the desired CA
|
|
32637
|
+
'''
|
|
32638
|
+
self.server_address = server_address if server_address is not None else ''
|
|
32639
|
+
'''
|
|
32640
|
+
The URL of the Vault to target
|
|
32641
|
+
'''
|
|
32642
|
+
self.signing_role = signing_role if signing_role is not None else ''
|
|
32643
|
+
'''
|
|
32644
|
+
The signing role to be used for signing certificates
|
|
32645
|
+
'''
|
|
32646
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
32647
|
+
'''
|
|
32648
|
+
Tags is a map of key, value pairs.
|
|
32649
|
+
'''
|
|
32650
|
+
|
|
32651
|
+
def __repr__(self):
|
|
32652
|
+
return '<sdm.VaultAWSIAMCertX509Store ' + \
|
|
32653
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
32654
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
|
32655
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
32656
|
+
'namespace: ' + repr(self.namespace) + ' ' +\
|
|
32657
|
+
'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
|
|
32658
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
|
32659
|
+
'signing_role: ' + repr(self.signing_role) + ' ' +\
|
|
32660
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
32661
|
+
'>'
|
|
32662
|
+
|
|
32663
|
+
def to_dict(self):
|
|
32664
|
+
return {
|
|
32665
|
+
'id': self.id,
|
|
32666
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
|
32667
|
+
'name': self.name,
|
|
32668
|
+
'namespace': self.namespace,
|
|
32669
|
+
'pki_mount_point': self.pki_mount_point,
|
|
32670
|
+
'server_address': self.server_address,
|
|
32671
|
+
'signing_role': self.signing_role,
|
|
32672
|
+
'tags': self.tags,
|
|
32673
|
+
}
|
|
32674
|
+
|
|
32675
|
+
@classmethod
|
|
32676
|
+
def from_dict(cls, d):
|
|
32677
|
+
return cls(
|
|
32678
|
+
id=d.get('id'),
|
|
32679
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
|
32680
|
+
name=d.get('name'),
|
|
32681
|
+
namespace=d.get('namespace'),
|
|
32682
|
+
pki_mount_point=d.get('pki_mount_point'),
|
|
32683
|
+
server_address=d.get('server_address'),
|
|
32684
|
+
signing_role=d.get('signing_role'),
|
|
32685
|
+
tags=d.get('tags'),
|
|
32686
|
+
)
|
|
32687
|
+
|
|
32688
|
+
|
|
32297
32689
|
class VaultAWSIAMStore:
|
|
32298
32690
|
__slots__ = [
|
|
32299
32691
|
'id',
|
|
@@ -15681,9 +15681,21 @@ def convert_secret_store_to_plumbing(porcelain):
|
|
|
15681
15681
|
if isinstance(porcelain, models.VaultAWSEC2Store):
|
|
15682
15682
|
plumbing.vault_awsec_2.CopyFrom(
|
|
15683
15683
|
convert_vault_awsec_2_store_to_plumbing(porcelain))
|
|
15684
|
+
if isinstance(porcelain, models.VaultAWSEC2CertSSHStore):
|
|
15685
|
+
plumbing.vault_awsec_2_cert_ssh.CopyFrom(
|
|
15686
|
+
convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain))
|
|
15687
|
+
if isinstance(porcelain, models.VaultAWSEC2CertX509Store):
|
|
15688
|
+
plumbing.vault_awsec_2_cert_x_509.CopyFrom(
|
|
15689
|
+
convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain))
|
|
15684
15690
|
if isinstance(porcelain, models.VaultAWSIAMStore):
|
|
15685
15691
|
plumbing.vault_awsiam.CopyFrom(
|
|
15686
15692
|
convert_vault_awsiam_store_to_plumbing(porcelain))
|
|
15693
|
+
if isinstance(porcelain, models.VaultAWSIAMCertSSHStore):
|
|
15694
|
+
plumbing.vault_awsiam_cert_ssh.CopyFrom(
|
|
15695
|
+
convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain))
|
|
15696
|
+
if isinstance(porcelain, models.VaultAWSIAMCertX509Store):
|
|
15697
|
+
plumbing.vault_awsiam_cert_x_509.CopyFrom(
|
|
15698
|
+
convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain))
|
|
15687
15699
|
if isinstance(porcelain, models.VaultTLSStore):
|
|
15688
15700
|
plumbing.vault_tls.CopyFrom(
|
|
15689
15701
|
convert_vault_tls_store_to_plumbing(porcelain))
|
|
@@ -15749,8 +15761,20 @@ def convert_secret_store_to_porcelain(plumbing):
|
|
|
15749
15761
|
plumbing.vault_app_role_cert_x_509)
|
|
15750
15762
|
if plumbing.HasField('vault_awsec_2'):
|
|
15751
15763
|
return convert_vault_awsec_2_store_to_porcelain(plumbing.vault_awsec_2)
|
|
15764
|
+
if plumbing.HasField('vault_awsec_2_cert_ssh'):
|
|
15765
|
+
return convert_vault_awsec_2_cert_ssh_store_to_porcelain(
|
|
15766
|
+
plumbing.vault_awsec_2_cert_ssh)
|
|
15767
|
+
if plumbing.HasField('vault_awsec_2_cert_x_509'):
|
|
15768
|
+
return convert_vault_awsec_2_cert_x_509_store_to_porcelain(
|
|
15769
|
+
plumbing.vault_awsec_2_cert_x_509)
|
|
15752
15770
|
if plumbing.HasField('vault_awsiam'):
|
|
15753
15771
|
return convert_vault_awsiam_store_to_porcelain(plumbing.vault_awsiam)
|
|
15772
|
+
if plumbing.HasField('vault_awsiam_cert_ssh'):
|
|
15773
|
+
return convert_vault_awsiam_cert_ssh_store_to_porcelain(
|
|
15774
|
+
plumbing.vault_awsiam_cert_ssh)
|
|
15775
|
+
if plumbing.HasField('vault_awsiam_cert_x_509'):
|
|
15776
|
+
return convert_vault_awsiam_cert_x_509_store_to_porcelain(
|
|
15777
|
+
plumbing.vault_awsiam_cert_x_509)
|
|
15754
15778
|
if plumbing.HasField('vault_tls'):
|
|
15755
15779
|
return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
|
|
15756
15780
|
if plumbing.HasField('vault_tls_cert_ssh'):
|
|
@@ -16638,6 +16662,94 @@ def convert_repeated_user_to_porcelain(plumbings):
|
|
|
16638
16662
|
return [convert_user_to_porcelain(plumbing) for plumbing in plumbings]
|
|
16639
16663
|
|
|
16640
16664
|
|
|
16665
|
+
def convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing):
|
|
16666
|
+
if plumbing is None:
|
|
16667
|
+
return None
|
|
16668
|
+
porcelain = models.VaultAWSEC2CertSSHStore()
|
|
16669
|
+
porcelain.id = (plumbing.id)
|
|
16670
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
|
16671
|
+
porcelain.name = (plumbing.name)
|
|
16672
|
+
porcelain.namespace = (plumbing.namespace)
|
|
16673
|
+
porcelain.server_address = (plumbing.server_address)
|
|
16674
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
16675
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
|
16676
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
16677
|
+
return porcelain
|
|
16678
|
+
|
|
16679
|
+
|
|
16680
|
+
def convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain):
|
|
16681
|
+
plumbing = VaultAWSEC2CertSSHStore()
|
|
16682
|
+
if porcelain is None:
|
|
16683
|
+
return plumbing
|
|
16684
|
+
plumbing.id = (porcelain.id)
|
|
16685
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
|
16686
|
+
plumbing.name = (porcelain.name)
|
|
16687
|
+
plumbing.namespace = (porcelain.namespace)
|
|
16688
|
+
plumbing.server_address = (porcelain.server_address)
|
|
16689
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
16690
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
|
16691
|
+
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
|
16692
|
+
return plumbing
|
|
16693
|
+
|
|
16694
|
+
|
|
16695
|
+
def convert_repeated_vault_awsec_2_cert_ssh_store_to_plumbing(porcelains):
|
|
16696
|
+
return [
|
|
16697
|
+
convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
|
|
16698
|
+
for porcelain in porcelains
|
|
16699
|
+
]
|
|
16700
|
+
|
|
16701
|
+
|
|
16702
|
+
def convert_repeated_vault_awsec_2_cert_ssh_store_to_porcelain(plumbings):
|
|
16703
|
+
return [
|
|
16704
|
+
convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing)
|
|
16705
|
+
for plumbing in plumbings
|
|
16706
|
+
]
|
|
16707
|
+
|
|
16708
|
+
|
|
16709
|
+
def convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing):
|
|
16710
|
+
if plumbing is None:
|
|
16711
|
+
return None
|
|
16712
|
+
porcelain = models.VaultAWSEC2CertX509Store()
|
|
16713
|
+
porcelain.id = (plumbing.id)
|
|
16714
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
|
16715
|
+
porcelain.name = (plumbing.name)
|
|
16716
|
+
porcelain.namespace = (plumbing.namespace)
|
|
16717
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
|
16718
|
+
porcelain.server_address = (plumbing.server_address)
|
|
16719
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
16720
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
16721
|
+
return porcelain
|
|
16722
|
+
|
|
16723
|
+
|
|
16724
|
+
def convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain):
|
|
16725
|
+
plumbing = VaultAWSEC2CertX509Store()
|
|
16726
|
+
if porcelain is None:
|
|
16727
|
+
return plumbing
|
|
16728
|
+
plumbing.id = (porcelain.id)
|
|
16729
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
|
16730
|
+
plumbing.name = (porcelain.name)
|
|
16731
|
+
plumbing.namespace = (porcelain.namespace)
|
|
16732
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
|
16733
|
+
plumbing.server_address = (porcelain.server_address)
|
|
16734
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
16735
|
+
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
|
16736
|
+
return plumbing
|
|
16737
|
+
|
|
16738
|
+
|
|
16739
|
+
def convert_repeated_vault_awsec_2_cert_x_509_store_to_plumbing(porcelains):
|
|
16740
|
+
return [
|
|
16741
|
+
convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
|
|
16742
|
+
for porcelain in porcelains
|
|
16743
|
+
]
|
|
16744
|
+
|
|
16745
|
+
|
|
16746
|
+
def convert_repeated_vault_awsec_2_cert_x_509_store_to_porcelain(plumbings):
|
|
16747
|
+
return [
|
|
16748
|
+
convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing)
|
|
16749
|
+
for plumbing in plumbings
|
|
16750
|
+
]
|
|
16751
|
+
|
|
16752
|
+
|
|
16641
16753
|
def convert_vault_awsec_2_store_to_porcelain(plumbing):
|
|
16642
16754
|
if plumbing is None:
|
|
16643
16755
|
return None
|
|
@@ -16676,6 +16788,94 @@ def convert_repeated_vault_awsec_2_store_to_porcelain(plumbings):
|
|
|
16676
16788
|
]
|
|
16677
16789
|
|
|
16678
16790
|
|
|
16791
|
+
def convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing):
|
|
16792
|
+
if plumbing is None:
|
|
16793
|
+
return None
|
|
16794
|
+
porcelain = models.VaultAWSIAMCertSSHStore()
|
|
16795
|
+
porcelain.id = (plumbing.id)
|
|
16796
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
|
16797
|
+
porcelain.name = (plumbing.name)
|
|
16798
|
+
porcelain.namespace = (plumbing.namespace)
|
|
16799
|
+
porcelain.server_address = (plumbing.server_address)
|
|
16800
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
16801
|
+
porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
|
|
16802
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
16803
|
+
return porcelain
|
|
16804
|
+
|
|
16805
|
+
|
|
16806
|
+
def convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain):
|
|
16807
|
+
plumbing = VaultAWSIAMCertSSHStore()
|
|
16808
|
+
if porcelain is None:
|
|
16809
|
+
return plumbing
|
|
16810
|
+
plumbing.id = (porcelain.id)
|
|
16811
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
|
16812
|
+
plumbing.name = (porcelain.name)
|
|
16813
|
+
plumbing.namespace = (porcelain.namespace)
|
|
16814
|
+
plumbing.server_address = (porcelain.server_address)
|
|
16815
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
16816
|
+
plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
|
|
16817
|
+
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
|
16818
|
+
return plumbing
|
|
16819
|
+
|
|
16820
|
+
|
|
16821
|
+
def convert_repeated_vault_awsiam_cert_ssh_store_to_plumbing(porcelains):
|
|
16822
|
+
return [
|
|
16823
|
+
convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
|
|
16824
|
+
for porcelain in porcelains
|
|
16825
|
+
]
|
|
16826
|
+
|
|
16827
|
+
|
|
16828
|
+
def convert_repeated_vault_awsiam_cert_ssh_store_to_porcelain(plumbings):
|
|
16829
|
+
return [
|
|
16830
|
+
convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing)
|
|
16831
|
+
for plumbing in plumbings
|
|
16832
|
+
]
|
|
16833
|
+
|
|
16834
|
+
|
|
16835
|
+
def convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing):
|
|
16836
|
+
if plumbing is None:
|
|
16837
|
+
return None
|
|
16838
|
+
porcelain = models.VaultAWSIAMCertX509Store()
|
|
16839
|
+
porcelain.id = (plumbing.id)
|
|
16840
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
|
16841
|
+
porcelain.name = (plumbing.name)
|
|
16842
|
+
porcelain.namespace = (plumbing.namespace)
|
|
16843
|
+
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
|
16844
|
+
porcelain.server_address = (plumbing.server_address)
|
|
16845
|
+
porcelain.signing_role = (plumbing.signing_role)
|
|
16846
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
16847
|
+
return porcelain
|
|
16848
|
+
|
|
16849
|
+
|
|
16850
|
+
def convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain):
|
|
16851
|
+
plumbing = VaultAWSIAMCertX509Store()
|
|
16852
|
+
if porcelain is None:
|
|
16853
|
+
return plumbing
|
|
16854
|
+
plumbing.id = (porcelain.id)
|
|
16855
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
|
16856
|
+
plumbing.name = (porcelain.name)
|
|
16857
|
+
plumbing.namespace = (porcelain.namespace)
|
|
16858
|
+
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
|
16859
|
+
plumbing.server_address = (porcelain.server_address)
|
|
16860
|
+
plumbing.signing_role = (porcelain.signing_role)
|
|
16861
|
+
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
|
16862
|
+
return plumbing
|
|
16863
|
+
|
|
16864
|
+
|
|
16865
|
+
def convert_repeated_vault_awsiam_cert_x_509_store_to_plumbing(porcelains):
|
|
16866
|
+
return [
|
|
16867
|
+
convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
|
|
16868
|
+
for porcelain in porcelains
|
|
16869
|
+
]
|
|
16870
|
+
|
|
16871
|
+
|
|
16872
|
+
def convert_repeated_vault_awsiam_cert_x_509_store_to_porcelain(plumbings):
|
|
16873
|
+
return [
|
|
16874
|
+
convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing)
|
|
16875
|
+
for plumbing in plumbings
|
|
16876
|
+
]
|
|
16877
|
+
|
|
16878
|
+
|
|
16679
16879
|
def convert_vault_awsiam_store_to_porcelain(plumbing):
|
|
16680
16880
|
if plumbing is None:
|
|
16681
16881
|
return None
|