strongdm 15.22.0__zip → 15.23.0__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (159) hide show
  1. {strongdm-15.22.0 → strongdm-15.23.0}/PKG-INFO +2 -2
  2. {strongdm-15.22.0 → strongdm-15.23.0}/setup.py +2 -2
  3. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/client.py +1 -1
  4. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/models.py +392 -0
  5. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/plumbing.py +200 -0
  6. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_store_types_pb2.py +168 -48
  7. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/svc.py +4 -0
  8. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm.egg-info/PKG-INFO +2 -2
  9. {strongdm-15.22.0 → strongdm-15.23.0}/LICENSE +0 -0
  10. {strongdm-15.22.0 → strongdm-15.23.0}/README.md +0 -0
  11. {strongdm-15.22.0 → strongdm-15.23.0}/setup.cfg +0 -0
  12. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/__init__.py +0 -0
  13. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_request_events_history_pb2.py +0 -0
  14. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
  15. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_requests_history_pb2.py +0 -0
  16. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
  17. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_requests_pb2.py +0 -0
  18. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/access_requests_pb2_grpc.py +0 -0
  19. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_attachments_history_pb2.py +0 -0
  20. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  21. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_attachments_pb2.py +0 -0
  22. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
  23. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_grants_history_pb2.py +0 -0
  24. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  25. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_grants_pb2.py +0 -0
  26. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_grants_pb2_grpc.py +0 -0
  27. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_permissions_pb2.py +0 -0
  28. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
  29. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_resources_history_pb2.py +0 -0
  30. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  31. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_resources_pb2.py +0 -0
  32. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/account_resources_pb2_grpc.py +0 -0
  33. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_groups_history_pb2.py +0 -0
  34. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_groups_history_pb2_grpc.py +0 -0
  35. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_groups_pb2.py +0 -0
  36. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_groups_pb2_grpc.py +0 -0
  37. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_history_pb2.py +0 -0
  38. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
  39. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_pb2.py +0 -0
  40. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/accounts_pb2_grpc.py +0 -0
  41. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/activities_pb2.py +0 -0
  42. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/activities_pb2_grpc.py +0 -0
  43. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
  44. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
  45. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
  46. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
  47. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
  48. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
  49. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
  50. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
  51. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflows_history_pb2.py +0 -0
  52. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
  53. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflows_pb2.py +0 -0
  54. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
  55. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/constants.py +0 -0
  56. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/control_panel_pb2.py +0 -0
  57. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/control_panel_pb2_grpc.py +0 -0
  58. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/drivers_pb2.py +0 -0
  59. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/drivers_pb2_grpc.py +0 -0
  60. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/errors.py +0 -0
  61. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_history_pb2.py +0 -0
  62. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_history_pb2_grpc.py +0 -0
  63. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_pb2.py +0 -0
  64. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_pb2_grpc.py +0 -0
  65. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_roles_history_pb2.py +0 -0
  66. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_roles_history_pb2_grpc.py +0 -0
  67. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_roles_pb2.py +0 -0
  68. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/groups_roles_pb2_grpc.py +0 -0
  69. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/health_checks_pb2.py +0 -0
  70. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/health_checks_pb2_grpc.py +0 -0
  71. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_aliases_history_pb2.py +0 -0
  72. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
  73. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_aliases_pb2.py +0 -0
  74. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
  75. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_sets_history_pb2.py +0 -0
  76. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
  77. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_sets_pb2.py +0 -0
  78. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
  79. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/managed_secrets_pb2.py +0 -0
  80. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/managed_secrets_pb2_grpc.py +0 -0
  81. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/nodes_history_pb2.py +0 -0
  82. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
  83. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/nodes_pb2.py +0 -0
  84. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/nodes_pb2_grpc.py +0 -0
  85. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/options_pb2.py +0 -0
  86. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/options_pb2_grpc.py +0 -0
  87. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/organization_history_pb2.py +0 -0
  88. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/organization_history_pb2_grpc.py +0 -0
  89. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_nodes_pb2.py +0 -0
  90. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
  91. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_peers_pb2.py +0 -0
  92. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
  93. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_resources_pb2.py +0 -0
  94. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
  95. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_groups_pb2.py +0 -0
  96. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
  97. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/policies_history_pb2.py +0 -0
  98. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/policies_history_pb2_grpc.py +0 -0
  99. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/policies_pb2.py +0 -0
  100. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/policies_pb2_grpc.py +0 -0
  101. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/proxy_cluster_keys_pb2.py +0 -0
  102. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/proxy_cluster_keys_pb2_grpc.py +0 -0
  103. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/queries_pb2.py +0 -0
  104. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/queries_pb2_grpc.py +0 -0
  105. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identities_history_pb2.py +0 -0
  106. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  107. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identities_pb2.py +0 -0
  108. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
  109. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
  110. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  111. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identity_groups_pb2.py +0 -0
  112. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  113. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/replays_pb2.py +0 -0
  114. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/replays_pb2_grpc.py +0 -0
  115. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/resources_history_pb2.py +0 -0
  116. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/resources_history_pb2_grpc.py +0 -0
  117. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/resources_pb2.py +0 -0
  118. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/resources_pb2_grpc.py +0 -0
  119. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/role_resources_history_pb2.py +0 -0
  120. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  121. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/role_resources_pb2.py +0 -0
  122. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/role_resources_pb2_grpc.py +0 -0
  123. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/roles_history_pb2.py +0 -0
  124. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/roles_history_pb2_grpc.py +0 -0
  125. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/roles_pb2.py +0 -0
  126. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/roles_pb2_grpc.py +0 -0
  127. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engine_policy_pb2.py +0 -0
  128. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
  129. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engine_types_pb2.py +0 -0
  130. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engine_types_pb2_grpc.py +0 -0
  131. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engines_pb2.py +0 -0
  132. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_engines_pb2_grpc.py +0 -0
  133. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_store_healths_pb2.py +0 -0
  134. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
  135. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  136. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_stores_history_pb2.py +0 -0
  137. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  138. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_stores_pb2.py +0 -0
  139. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
  140. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/spec_pb2.py +0 -0
  141. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/spec_pb2_grpc.py +0 -0
  142. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/tags_pb2.py +0 -0
  143. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/tags_pb2_grpc.py +0 -0
  144. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
  145. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
  146. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_approvers_pb2.py +0 -0
  147. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
  148. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_roles_history_pb2.py +0 -0
  149. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
  150. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_roles_pb2.py +0 -0
  151. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
  152. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflows_history_pb2.py +0 -0
  153. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
  154. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflows_pb2.py +0 -0
  155. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm/workflows_pb2_grpc.py +0 -0
  156. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm.egg-info/SOURCES.txt +0 -0
  157. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm.egg-info/dependency_links.txt +0 -0
  158. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm.egg-info/requires.txt +0 -0
  159. {strongdm-15.22.0 → strongdm-15.23.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -1,12 +1,12 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: strongdm
3
- Version: 15.22.0
3
+ Version: 15.23.0
4
4
  Summary: strongDM SDK for the Python programming language.
5
5
  Home-page: https://github.com/strongdm/strongdm-sdk-python
6
6
  Author: strongDM Team
7
7
  Author-email: sdk-feedback@strongdm.com
8
8
  License: apache-2.0
9
- Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v15.22.0.tar.gz
9
+ Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v15.23.0.tar.gz
10
10
  Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
11
11
  Platform: UNKNOWN
12
12
  Classifier: Development Status :: 4 - Beta
@@ -23,7 +23,7 @@ from setuptools import setup
23
23
  setup(
24
24
  name='strongdm',
25
25
  packages=['strongdm'],
26
- version='15.22.0',
26
+ version='15.23.0',
27
27
  license='apache-2.0',
28
28
  description='strongDM SDK for the Python programming language.',
29
29
  long_description=long_description,
@@ -32,7 +32,7 @@ setup(
32
32
  author_email='sdk-feedback@strongdm.com',
33
33
  url='https://github.com/strongdm/strongdm-sdk-python',
34
34
  download_url=
35
- 'https://github.com/strongdm/strongdm-sdk-python/archive/v15.22.0.tar.gz',
35
+ 'https://github.com/strongdm/strongdm-sdk-python/archive/v15.23.0.tar.gz',
36
36
  keywords=[
37
37
  'strongDM', 'sdm', 'api', 'automation', 'security', 'audit',
38
38
  'database', 'server', 'ssh', 'rdp'
@@ -34,7 +34,7 @@ DEFAULT_MAX_RETRY_DELAY = 120 # 120 seconds
34
34
  DEFAULT_RETRY_FACTOR = 1.6
35
35
  DEFAULT_RETRY_JITTER = 0.2
36
36
  API_VERSION = '2025-04-14'
37
- USER_AGENT = 'strongdm-sdk-python/15.22.0'
37
+ USER_AGENT = 'strongdm-sdk-python/15.23.0'
38
38
 
39
39
 
40
40
  class Client:
@@ -32227,6 +32227,202 @@ class User:
32227
32227
  )
32228
32228
 
32229
32229
 
32230
+ class VaultAWSEC2CertSSHStore:
32231
+ '''
32232
+ VaultAWSEC2CertSSHStore is currently unstable, and its API may change, or it may be removed,
32233
+ without a major version bump.
32234
+ '''
32235
+ __slots__ = [
32236
+ 'id',
32237
+ 'issuedcertttlminutes',
32238
+ 'name',
32239
+ 'namespace',
32240
+ 'server_address',
32241
+ 'signing_role',
32242
+ 'ssh_mount_point',
32243
+ 'tags',
32244
+ ]
32245
+
32246
+ def __init__(
32247
+ self,
32248
+ id=None,
32249
+ issuedcertttlminutes=None,
32250
+ name=None,
32251
+ namespace=None,
32252
+ server_address=None,
32253
+ signing_role=None,
32254
+ ssh_mount_point=None,
32255
+ tags=None,
32256
+ ):
32257
+ self.id = id if id is not None else ''
32258
+ '''
32259
+ Unique identifier of the SecretStore.
32260
+ '''
32261
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
32262
+ '''
32263
+ The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
32264
+ '''
32265
+ self.name = name if name is not None else ''
32266
+ '''
32267
+ Unique human-readable name of the SecretStore.
32268
+ '''
32269
+ self.namespace = namespace if namespace is not None else ''
32270
+ '''
32271
+ The namespace to make requests within
32272
+ '''
32273
+ self.server_address = server_address if server_address is not None else ''
32274
+ '''
32275
+ The URL of the Vault to target
32276
+ '''
32277
+ self.signing_role = signing_role if signing_role is not None else ''
32278
+ '''
32279
+ The signing role to be used for signing certificates
32280
+ '''
32281
+ self.ssh_mount_point = ssh_mount_point if ssh_mount_point is not None else ''
32282
+ '''
32283
+ The mount point of the SSH engine configured with the desired CA
32284
+ '''
32285
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
32286
+ '''
32287
+ Tags is a map of key, value pairs.
32288
+ '''
32289
+
32290
+ def __repr__(self):
32291
+ return '<sdm.VaultAWSEC2CertSSHStore ' + \
32292
+ 'id: ' + repr(self.id) + ' ' +\
32293
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
32294
+ 'name: ' + repr(self.name) + ' ' +\
32295
+ 'namespace: ' + repr(self.namespace) + ' ' +\
32296
+ 'server_address: ' + repr(self.server_address) + ' ' +\
32297
+ 'signing_role: ' + repr(self.signing_role) + ' ' +\
32298
+ 'ssh_mount_point: ' + repr(self.ssh_mount_point) + ' ' +\
32299
+ 'tags: ' + repr(self.tags) + ' ' +\
32300
+ '>'
32301
+
32302
+ def to_dict(self):
32303
+ return {
32304
+ 'id': self.id,
32305
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
32306
+ 'name': self.name,
32307
+ 'namespace': self.namespace,
32308
+ 'server_address': self.server_address,
32309
+ 'signing_role': self.signing_role,
32310
+ 'ssh_mount_point': self.ssh_mount_point,
32311
+ 'tags': self.tags,
32312
+ }
32313
+
32314
+ @classmethod
32315
+ def from_dict(cls, d):
32316
+ return cls(
32317
+ id=d.get('id'),
32318
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
32319
+ name=d.get('name'),
32320
+ namespace=d.get('namespace'),
32321
+ server_address=d.get('server_address'),
32322
+ signing_role=d.get('signing_role'),
32323
+ ssh_mount_point=d.get('ssh_mount_point'),
32324
+ tags=d.get('tags'),
32325
+ )
32326
+
32327
+
32328
+ class VaultAWSEC2CertX509Store:
32329
+ '''
32330
+ VaultAWSEC2CertX509Store is currently unstable, and its API may change, or it may be removed,
32331
+ without a major version bump.
32332
+ '''
32333
+ __slots__ = [
32334
+ 'id',
32335
+ 'issuedcertttlminutes',
32336
+ 'name',
32337
+ 'namespace',
32338
+ 'pki_mount_point',
32339
+ 'server_address',
32340
+ 'signing_role',
32341
+ 'tags',
32342
+ ]
32343
+
32344
+ def __init__(
32345
+ self,
32346
+ id=None,
32347
+ issuedcertttlminutes=None,
32348
+ name=None,
32349
+ namespace=None,
32350
+ pki_mount_point=None,
32351
+ server_address=None,
32352
+ signing_role=None,
32353
+ tags=None,
32354
+ ):
32355
+ self.id = id if id is not None else ''
32356
+ '''
32357
+ Unique identifier of the SecretStore.
32358
+ '''
32359
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
32360
+ '''
32361
+ The lifetime of certificates issued by this CA represented in minutes.
32362
+ '''
32363
+ self.name = name if name is not None else ''
32364
+ '''
32365
+ Unique human-readable name of the SecretStore.
32366
+ '''
32367
+ self.namespace = namespace if namespace is not None else ''
32368
+ '''
32369
+ The namespace to make requests within
32370
+ '''
32371
+ self.pki_mount_point = pki_mount_point if pki_mount_point is not None else ''
32372
+ '''
32373
+ The mount point of the PKI engine configured with the desired CA
32374
+ '''
32375
+ self.server_address = server_address if server_address is not None else ''
32376
+ '''
32377
+ The URL of the Vault to target
32378
+ '''
32379
+ self.signing_role = signing_role if signing_role is not None else ''
32380
+ '''
32381
+ The signing role to be used for signing certificates
32382
+ '''
32383
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
32384
+ '''
32385
+ Tags is a map of key, value pairs.
32386
+ '''
32387
+
32388
+ def __repr__(self):
32389
+ return '<sdm.VaultAWSEC2CertX509Store ' + \
32390
+ 'id: ' + repr(self.id) + ' ' +\
32391
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
32392
+ 'name: ' + repr(self.name) + ' ' +\
32393
+ 'namespace: ' + repr(self.namespace) + ' ' +\
32394
+ 'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
32395
+ 'server_address: ' + repr(self.server_address) + ' ' +\
32396
+ 'signing_role: ' + repr(self.signing_role) + ' ' +\
32397
+ 'tags: ' + repr(self.tags) + ' ' +\
32398
+ '>'
32399
+
32400
+ def to_dict(self):
32401
+ return {
32402
+ 'id': self.id,
32403
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
32404
+ 'name': self.name,
32405
+ 'namespace': self.namespace,
32406
+ 'pki_mount_point': self.pki_mount_point,
32407
+ 'server_address': self.server_address,
32408
+ 'signing_role': self.signing_role,
32409
+ 'tags': self.tags,
32410
+ }
32411
+
32412
+ @classmethod
32413
+ def from_dict(cls, d):
32414
+ return cls(
32415
+ id=d.get('id'),
32416
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
32417
+ name=d.get('name'),
32418
+ namespace=d.get('namespace'),
32419
+ pki_mount_point=d.get('pki_mount_point'),
32420
+ server_address=d.get('server_address'),
32421
+ signing_role=d.get('signing_role'),
32422
+ tags=d.get('tags'),
32423
+ )
32424
+
32425
+
32230
32426
  class VaultAWSEC2Store:
32231
32427
  __slots__ = [
32232
32428
  'id',
@@ -32294,6 +32490,202 @@ class VaultAWSEC2Store:
32294
32490
  )
32295
32491
 
32296
32492
 
32493
+ class VaultAWSIAMCertSSHStore:
32494
+ '''
32495
+ VaultAWSIAMCertSSHStore is currently unstable, and its API may change, or it may be removed,
32496
+ without a major version bump.
32497
+ '''
32498
+ __slots__ = [
32499
+ 'id',
32500
+ 'issuedcertttlminutes',
32501
+ 'name',
32502
+ 'namespace',
32503
+ 'server_address',
32504
+ 'signing_role',
32505
+ 'ssh_mount_point',
32506
+ 'tags',
32507
+ ]
32508
+
32509
+ def __init__(
32510
+ self,
32511
+ id=None,
32512
+ issuedcertttlminutes=None,
32513
+ name=None,
32514
+ namespace=None,
32515
+ server_address=None,
32516
+ signing_role=None,
32517
+ ssh_mount_point=None,
32518
+ tags=None,
32519
+ ):
32520
+ self.id = id if id is not None else ''
32521
+ '''
32522
+ Unique identifier of the SecretStore.
32523
+ '''
32524
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
32525
+ '''
32526
+ The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
32527
+ '''
32528
+ self.name = name if name is not None else ''
32529
+ '''
32530
+ Unique human-readable name of the SecretStore.
32531
+ '''
32532
+ self.namespace = namespace if namespace is not None else ''
32533
+ '''
32534
+ The namespace to make requests within
32535
+ '''
32536
+ self.server_address = server_address if server_address is not None else ''
32537
+ '''
32538
+ The URL of the Vault to target
32539
+ '''
32540
+ self.signing_role = signing_role if signing_role is not None else ''
32541
+ '''
32542
+ The signing role to be used for signing certificates
32543
+ '''
32544
+ self.ssh_mount_point = ssh_mount_point if ssh_mount_point is not None else ''
32545
+ '''
32546
+ The mount point of the SSH engine configured with the desired CA
32547
+ '''
32548
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
32549
+ '''
32550
+ Tags is a map of key, value pairs.
32551
+ '''
32552
+
32553
+ def __repr__(self):
32554
+ return '<sdm.VaultAWSIAMCertSSHStore ' + \
32555
+ 'id: ' + repr(self.id) + ' ' +\
32556
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
32557
+ 'name: ' + repr(self.name) + ' ' +\
32558
+ 'namespace: ' + repr(self.namespace) + ' ' +\
32559
+ 'server_address: ' + repr(self.server_address) + ' ' +\
32560
+ 'signing_role: ' + repr(self.signing_role) + ' ' +\
32561
+ 'ssh_mount_point: ' + repr(self.ssh_mount_point) + ' ' +\
32562
+ 'tags: ' + repr(self.tags) + ' ' +\
32563
+ '>'
32564
+
32565
+ def to_dict(self):
32566
+ return {
32567
+ 'id': self.id,
32568
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
32569
+ 'name': self.name,
32570
+ 'namespace': self.namespace,
32571
+ 'server_address': self.server_address,
32572
+ 'signing_role': self.signing_role,
32573
+ 'ssh_mount_point': self.ssh_mount_point,
32574
+ 'tags': self.tags,
32575
+ }
32576
+
32577
+ @classmethod
32578
+ def from_dict(cls, d):
32579
+ return cls(
32580
+ id=d.get('id'),
32581
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
32582
+ name=d.get('name'),
32583
+ namespace=d.get('namespace'),
32584
+ server_address=d.get('server_address'),
32585
+ signing_role=d.get('signing_role'),
32586
+ ssh_mount_point=d.get('ssh_mount_point'),
32587
+ tags=d.get('tags'),
32588
+ )
32589
+
32590
+
32591
+ class VaultAWSIAMCertX509Store:
32592
+ '''
32593
+ VaultAWSIAMCertX509Store is currently unstable, and its API may change, or it may be removed,
32594
+ without a major version bump.
32595
+ '''
32596
+ __slots__ = [
32597
+ 'id',
32598
+ 'issuedcertttlminutes',
32599
+ 'name',
32600
+ 'namespace',
32601
+ 'pki_mount_point',
32602
+ 'server_address',
32603
+ 'signing_role',
32604
+ 'tags',
32605
+ ]
32606
+
32607
+ def __init__(
32608
+ self,
32609
+ id=None,
32610
+ issuedcertttlminutes=None,
32611
+ name=None,
32612
+ namespace=None,
32613
+ pki_mount_point=None,
32614
+ server_address=None,
32615
+ signing_role=None,
32616
+ tags=None,
32617
+ ):
32618
+ self.id = id if id is not None else ''
32619
+ '''
32620
+ Unique identifier of the SecretStore.
32621
+ '''
32622
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
32623
+ '''
32624
+ The lifetime of certificates issued by this CA represented in minutes.
32625
+ '''
32626
+ self.name = name if name is not None else ''
32627
+ '''
32628
+ Unique human-readable name of the SecretStore.
32629
+ '''
32630
+ self.namespace = namespace if namespace is not None else ''
32631
+ '''
32632
+ The namespace to make requests within
32633
+ '''
32634
+ self.pki_mount_point = pki_mount_point if pki_mount_point is not None else ''
32635
+ '''
32636
+ The mount point of the PKI engine configured with the desired CA
32637
+ '''
32638
+ self.server_address = server_address if server_address is not None else ''
32639
+ '''
32640
+ The URL of the Vault to target
32641
+ '''
32642
+ self.signing_role = signing_role if signing_role is not None else ''
32643
+ '''
32644
+ The signing role to be used for signing certificates
32645
+ '''
32646
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
32647
+ '''
32648
+ Tags is a map of key, value pairs.
32649
+ '''
32650
+
32651
+ def __repr__(self):
32652
+ return '<sdm.VaultAWSIAMCertX509Store ' + \
32653
+ 'id: ' + repr(self.id) + ' ' +\
32654
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
32655
+ 'name: ' + repr(self.name) + ' ' +\
32656
+ 'namespace: ' + repr(self.namespace) + ' ' +\
32657
+ 'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
32658
+ 'server_address: ' + repr(self.server_address) + ' ' +\
32659
+ 'signing_role: ' + repr(self.signing_role) + ' ' +\
32660
+ 'tags: ' + repr(self.tags) + ' ' +\
32661
+ '>'
32662
+
32663
+ def to_dict(self):
32664
+ return {
32665
+ 'id': self.id,
32666
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
32667
+ 'name': self.name,
32668
+ 'namespace': self.namespace,
32669
+ 'pki_mount_point': self.pki_mount_point,
32670
+ 'server_address': self.server_address,
32671
+ 'signing_role': self.signing_role,
32672
+ 'tags': self.tags,
32673
+ }
32674
+
32675
+ @classmethod
32676
+ def from_dict(cls, d):
32677
+ return cls(
32678
+ id=d.get('id'),
32679
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
32680
+ name=d.get('name'),
32681
+ namespace=d.get('namespace'),
32682
+ pki_mount_point=d.get('pki_mount_point'),
32683
+ server_address=d.get('server_address'),
32684
+ signing_role=d.get('signing_role'),
32685
+ tags=d.get('tags'),
32686
+ )
32687
+
32688
+
32297
32689
  class VaultAWSIAMStore:
32298
32690
  __slots__ = [
32299
32691
  'id',
@@ -15681,9 +15681,21 @@ def convert_secret_store_to_plumbing(porcelain):
15681
15681
  if isinstance(porcelain, models.VaultAWSEC2Store):
15682
15682
  plumbing.vault_awsec_2.CopyFrom(
15683
15683
  convert_vault_awsec_2_store_to_plumbing(porcelain))
15684
+ if isinstance(porcelain, models.VaultAWSEC2CertSSHStore):
15685
+ plumbing.vault_awsec_2_cert_ssh.CopyFrom(
15686
+ convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain))
15687
+ if isinstance(porcelain, models.VaultAWSEC2CertX509Store):
15688
+ plumbing.vault_awsec_2_cert_x_509.CopyFrom(
15689
+ convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain))
15684
15690
  if isinstance(porcelain, models.VaultAWSIAMStore):
15685
15691
  plumbing.vault_awsiam.CopyFrom(
15686
15692
  convert_vault_awsiam_store_to_plumbing(porcelain))
15693
+ if isinstance(porcelain, models.VaultAWSIAMCertSSHStore):
15694
+ plumbing.vault_awsiam_cert_ssh.CopyFrom(
15695
+ convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain))
15696
+ if isinstance(porcelain, models.VaultAWSIAMCertX509Store):
15697
+ plumbing.vault_awsiam_cert_x_509.CopyFrom(
15698
+ convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain))
15687
15699
  if isinstance(porcelain, models.VaultTLSStore):
15688
15700
  plumbing.vault_tls.CopyFrom(
15689
15701
  convert_vault_tls_store_to_plumbing(porcelain))
@@ -15749,8 +15761,20 @@ def convert_secret_store_to_porcelain(plumbing):
15749
15761
  plumbing.vault_app_role_cert_x_509)
15750
15762
  if plumbing.HasField('vault_awsec_2'):
15751
15763
  return convert_vault_awsec_2_store_to_porcelain(plumbing.vault_awsec_2)
15764
+ if plumbing.HasField('vault_awsec_2_cert_ssh'):
15765
+ return convert_vault_awsec_2_cert_ssh_store_to_porcelain(
15766
+ plumbing.vault_awsec_2_cert_ssh)
15767
+ if plumbing.HasField('vault_awsec_2_cert_x_509'):
15768
+ return convert_vault_awsec_2_cert_x_509_store_to_porcelain(
15769
+ plumbing.vault_awsec_2_cert_x_509)
15752
15770
  if plumbing.HasField('vault_awsiam'):
15753
15771
  return convert_vault_awsiam_store_to_porcelain(plumbing.vault_awsiam)
15772
+ if plumbing.HasField('vault_awsiam_cert_ssh'):
15773
+ return convert_vault_awsiam_cert_ssh_store_to_porcelain(
15774
+ plumbing.vault_awsiam_cert_ssh)
15775
+ if plumbing.HasField('vault_awsiam_cert_x_509'):
15776
+ return convert_vault_awsiam_cert_x_509_store_to_porcelain(
15777
+ plumbing.vault_awsiam_cert_x_509)
15754
15778
  if plumbing.HasField('vault_tls'):
15755
15779
  return convert_vault_tls_store_to_porcelain(plumbing.vault_tls)
15756
15780
  if plumbing.HasField('vault_tls_cert_ssh'):
@@ -16638,6 +16662,94 @@ def convert_repeated_user_to_porcelain(plumbings):
16638
16662
  return [convert_user_to_porcelain(plumbing) for plumbing in plumbings]
16639
16663
 
16640
16664
 
16665
+ def convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing):
16666
+ if plumbing is None:
16667
+ return None
16668
+ porcelain = models.VaultAWSEC2CertSSHStore()
16669
+ porcelain.id = (plumbing.id)
16670
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
16671
+ porcelain.name = (plumbing.name)
16672
+ porcelain.namespace = (plumbing.namespace)
16673
+ porcelain.server_address = (plumbing.server_address)
16674
+ porcelain.signing_role = (plumbing.signing_role)
16675
+ porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
16676
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
16677
+ return porcelain
16678
+
16679
+
16680
+ def convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain):
16681
+ plumbing = VaultAWSEC2CertSSHStore()
16682
+ if porcelain is None:
16683
+ return plumbing
16684
+ plumbing.id = (porcelain.id)
16685
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
16686
+ plumbing.name = (porcelain.name)
16687
+ plumbing.namespace = (porcelain.namespace)
16688
+ plumbing.server_address = (porcelain.server_address)
16689
+ plumbing.signing_role = (porcelain.signing_role)
16690
+ plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
16691
+ plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
16692
+ return plumbing
16693
+
16694
+
16695
+ def convert_repeated_vault_awsec_2_cert_ssh_store_to_plumbing(porcelains):
16696
+ return [
16697
+ convert_vault_awsec_2_cert_ssh_store_to_plumbing(porcelain)
16698
+ for porcelain in porcelains
16699
+ ]
16700
+
16701
+
16702
+ def convert_repeated_vault_awsec_2_cert_ssh_store_to_porcelain(plumbings):
16703
+ return [
16704
+ convert_vault_awsec_2_cert_ssh_store_to_porcelain(plumbing)
16705
+ for plumbing in plumbings
16706
+ ]
16707
+
16708
+
16709
+ def convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing):
16710
+ if plumbing is None:
16711
+ return None
16712
+ porcelain = models.VaultAWSEC2CertX509Store()
16713
+ porcelain.id = (plumbing.id)
16714
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
16715
+ porcelain.name = (plumbing.name)
16716
+ porcelain.namespace = (plumbing.namespace)
16717
+ porcelain.pki_mount_point = (plumbing.pki_mount_point)
16718
+ porcelain.server_address = (plumbing.server_address)
16719
+ porcelain.signing_role = (plumbing.signing_role)
16720
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
16721
+ return porcelain
16722
+
16723
+
16724
+ def convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain):
16725
+ plumbing = VaultAWSEC2CertX509Store()
16726
+ if porcelain is None:
16727
+ return plumbing
16728
+ plumbing.id = (porcelain.id)
16729
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
16730
+ plumbing.name = (porcelain.name)
16731
+ plumbing.namespace = (porcelain.namespace)
16732
+ plumbing.pki_mount_point = (porcelain.pki_mount_point)
16733
+ plumbing.server_address = (porcelain.server_address)
16734
+ plumbing.signing_role = (porcelain.signing_role)
16735
+ plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
16736
+ return plumbing
16737
+
16738
+
16739
+ def convert_repeated_vault_awsec_2_cert_x_509_store_to_plumbing(porcelains):
16740
+ return [
16741
+ convert_vault_awsec_2_cert_x_509_store_to_plumbing(porcelain)
16742
+ for porcelain in porcelains
16743
+ ]
16744
+
16745
+
16746
+ def convert_repeated_vault_awsec_2_cert_x_509_store_to_porcelain(plumbings):
16747
+ return [
16748
+ convert_vault_awsec_2_cert_x_509_store_to_porcelain(plumbing)
16749
+ for plumbing in plumbings
16750
+ ]
16751
+
16752
+
16641
16753
  def convert_vault_awsec_2_store_to_porcelain(plumbing):
16642
16754
  if plumbing is None:
16643
16755
  return None
@@ -16676,6 +16788,94 @@ def convert_repeated_vault_awsec_2_store_to_porcelain(plumbings):
16676
16788
  ]
16677
16789
 
16678
16790
 
16791
+ def convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing):
16792
+ if plumbing is None:
16793
+ return None
16794
+ porcelain = models.VaultAWSIAMCertSSHStore()
16795
+ porcelain.id = (plumbing.id)
16796
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
16797
+ porcelain.name = (plumbing.name)
16798
+ porcelain.namespace = (plumbing.namespace)
16799
+ porcelain.server_address = (plumbing.server_address)
16800
+ porcelain.signing_role = (plumbing.signing_role)
16801
+ porcelain.ssh_mount_point = (plumbing.ssh_mount_point)
16802
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
16803
+ return porcelain
16804
+
16805
+
16806
+ def convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain):
16807
+ plumbing = VaultAWSIAMCertSSHStore()
16808
+ if porcelain is None:
16809
+ return plumbing
16810
+ plumbing.id = (porcelain.id)
16811
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
16812
+ plumbing.name = (porcelain.name)
16813
+ plumbing.namespace = (porcelain.namespace)
16814
+ plumbing.server_address = (porcelain.server_address)
16815
+ plumbing.signing_role = (porcelain.signing_role)
16816
+ plumbing.ssh_mount_point = (porcelain.ssh_mount_point)
16817
+ plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
16818
+ return plumbing
16819
+
16820
+
16821
+ def convert_repeated_vault_awsiam_cert_ssh_store_to_plumbing(porcelains):
16822
+ return [
16823
+ convert_vault_awsiam_cert_ssh_store_to_plumbing(porcelain)
16824
+ for porcelain in porcelains
16825
+ ]
16826
+
16827
+
16828
+ def convert_repeated_vault_awsiam_cert_ssh_store_to_porcelain(plumbings):
16829
+ return [
16830
+ convert_vault_awsiam_cert_ssh_store_to_porcelain(plumbing)
16831
+ for plumbing in plumbings
16832
+ ]
16833
+
16834
+
16835
+ def convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing):
16836
+ if plumbing is None:
16837
+ return None
16838
+ porcelain = models.VaultAWSIAMCertX509Store()
16839
+ porcelain.id = (plumbing.id)
16840
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
16841
+ porcelain.name = (plumbing.name)
16842
+ porcelain.namespace = (plumbing.namespace)
16843
+ porcelain.pki_mount_point = (plumbing.pki_mount_point)
16844
+ porcelain.server_address = (plumbing.server_address)
16845
+ porcelain.signing_role = (plumbing.signing_role)
16846
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
16847
+ return porcelain
16848
+
16849
+
16850
+ def convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain):
16851
+ plumbing = VaultAWSIAMCertX509Store()
16852
+ if porcelain is None:
16853
+ return plumbing
16854
+ plumbing.id = (porcelain.id)
16855
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
16856
+ plumbing.name = (porcelain.name)
16857
+ plumbing.namespace = (porcelain.namespace)
16858
+ plumbing.pki_mount_point = (porcelain.pki_mount_point)
16859
+ plumbing.server_address = (porcelain.server_address)
16860
+ plumbing.signing_role = (porcelain.signing_role)
16861
+ plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
16862
+ return plumbing
16863
+
16864
+
16865
+ def convert_repeated_vault_awsiam_cert_x_509_store_to_plumbing(porcelains):
16866
+ return [
16867
+ convert_vault_awsiam_cert_x_509_store_to_plumbing(porcelain)
16868
+ for porcelain in porcelains
16869
+ ]
16870
+
16871
+
16872
+ def convert_repeated_vault_awsiam_cert_x_509_store_to_porcelain(plumbings):
16873
+ return [
16874
+ convert_vault_awsiam_cert_x_509_store_to_porcelain(plumbing)
16875
+ for plumbing in plumbings
16876
+ ]
16877
+
16878
+
16679
16879
  def convert_vault_awsiam_store_to_porcelain(plumbing):
16680
16880
  if plumbing is None:
16681
16881
  return None