strongdm 15.22.0__zip → 15.25.0__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (159) hide show
  1. {strongdm-15.22.0 → strongdm-15.25.0}/PKG-INFO +2 -2
  2. {strongdm-15.22.0 → strongdm-15.25.0}/setup.py +2 -2
  3. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/client.py +1 -1
  4. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/models.py +463 -0
  5. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/plumbing.py +243 -0
  6. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_store_types_pb2.py +192 -48
  7. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/svc.py +5 -0
  8. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm.egg-info/PKG-INFO +2 -2
  9. {strongdm-15.22.0 → strongdm-15.25.0}/LICENSE +0 -0
  10. {strongdm-15.22.0 → strongdm-15.25.0}/README.md +0 -0
  11. {strongdm-15.22.0 → strongdm-15.25.0}/setup.cfg +0 -0
  12. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/__init__.py +0 -0
  13. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_request_events_history_pb2.py +0 -0
  14. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
  15. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_requests_history_pb2.py +0 -0
  16. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
  17. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_requests_pb2.py +0 -0
  18. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_requests_pb2_grpc.py +0 -0
  19. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_attachments_history_pb2.py +0 -0
  20. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  21. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_attachments_pb2.py +0 -0
  22. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
  23. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_grants_history_pb2.py +0 -0
  24. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  25. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_grants_pb2.py +0 -0
  26. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_grants_pb2_grpc.py +0 -0
  27. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_permissions_pb2.py +0 -0
  28. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
  29. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_resources_history_pb2.py +0 -0
  30. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  31. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_resources_pb2.py +0 -0
  32. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_resources_pb2_grpc.py +0 -0
  33. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_groups_history_pb2.py +0 -0
  34. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_groups_history_pb2_grpc.py +0 -0
  35. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_groups_pb2.py +0 -0
  36. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_groups_pb2_grpc.py +0 -0
  37. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_history_pb2.py +0 -0
  38. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
  39. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_pb2.py +0 -0
  40. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_pb2_grpc.py +0 -0
  41. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/activities_pb2.py +0 -0
  42. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/activities_pb2_grpc.py +0 -0
  43. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
  44. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
  45. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
  46. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
  47. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
  48. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
  49. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
  50. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
  51. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflows_history_pb2.py +0 -0
  52. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
  53. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflows_pb2.py +0 -0
  54. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
  55. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/constants.py +0 -0
  56. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/control_panel_pb2.py +0 -0
  57. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/control_panel_pb2_grpc.py +0 -0
  58. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/drivers_pb2.py +0 -0
  59. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/drivers_pb2_grpc.py +0 -0
  60. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/errors.py +0 -0
  61. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_history_pb2.py +0 -0
  62. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_history_pb2_grpc.py +0 -0
  63. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_pb2.py +0 -0
  64. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_pb2_grpc.py +0 -0
  65. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_roles_history_pb2.py +0 -0
  66. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_roles_history_pb2_grpc.py +0 -0
  67. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_roles_pb2.py +0 -0
  68. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_roles_pb2_grpc.py +0 -0
  69. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/health_checks_pb2.py +0 -0
  70. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/health_checks_pb2_grpc.py +0 -0
  71. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_aliases_history_pb2.py +0 -0
  72. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
  73. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_aliases_pb2.py +0 -0
  74. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
  75. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_sets_history_pb2.py +0 -0
  76. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
  77. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_sets_pb2.py +0 -0
  78. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
  79. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/managed_secrets_pb2.py +0 -0
  80. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/managed_secrets_pb2_grpc.py +0 -0
  81. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/nodes_history_pb2.py +0 -0
  82. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
  83. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/nodes_pb2.py +0 -0
  84. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/nodes_pb2_grpc.py +0 -0
  85. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/options_pb2.py +0 -0
  86. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/options_pb2_grpc.py +0 -0
  87. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/organization_history_pb2.py +0 -0
  88. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/organization_history_pb2_grpc.py +0 -0
  89. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_nodes_pb2.py +0 -0
  90. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
  91. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_peers_pb2.py +0 -0
  92. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
  93. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_resources_pb2.py +0 -0
  94. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
  95. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_groups_pb2.py +0 -0
  96. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
  97. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/policies_history_pb2.py +0 -0
  98. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/policies_history_pb2_grpc.py +0 -0
  99. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/policies_pb2.py +0 -0
  100. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/policies_pb2_grpc.py +0 -0
  101. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/proxy_cluster_keys_pb2.py +0 -0
  102. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/proxy_cluster_keys_pb2_grpc.py +0 -0
  103. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/queries_pb2.py +0 -0
  104. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/queries_pb2_grpc.py +0 -0
  105. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identities_history_pb2.py +0 -0
  106. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  107. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identities_pb2.py +0 -0
  108. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
  109. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
  110. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  111. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identity_groups_pb2.py +0 -0
  112. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  113. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/replays_pb2.py +0 -0
  114. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/replays_pb2_grpc.py +0 -0
  115. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/resources_history_pb2.py +0 -0
  116. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/resources_history_pb2_grpc.py +0 -0
  117. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/resources_pb2.py +0 -0
  118. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/resources_pb2_grpc.py +0 -0
  119. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/role_resources_history_pb2.py +0 -0
  120. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  121. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/role_resources_pb2.py +0 -0
  122. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/role_resources_pb2_grpc.py +0 -0
  123. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/roles_history_pb2.py +0 -0
  124. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/roles_history_pb2_grpc.py +0 -0
  125. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/roles_pb2.py +0 -0
  126. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/roles_pb2_grpc.py +0 -0
  127. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engine_policy_pb2.py +0 -0
  128. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
  129. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engine_types_pb2.py +0 -0
  130. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engine_types_pb2_grpc.py +0 -0
  131. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engines_pb2.py +0 -0
  132. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engines_pb2_grpc.py +0 -0
  133. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_store_healths_pb2.py +0 -0
  134. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
  135. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  136. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_stores_history_pb2.py +0 -0
  137. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  138. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_stores_pb2.py +0 -0
  139. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
  140. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/spec_pb2.py +0 -0
  141. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/spec_pb2_grpc.py +0 -0
  142. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/tags_pb2.py +0 -0
  143. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/tags_pb2_grpc.py +0 -0
  144. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
  145. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
  146. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_approvers_pb2.py +0 -0
  147. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
  148. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_roles_history_pb2.py +0 -0
  149. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
  150. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_roles_pb2.py +0 -0
  151. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
  152. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflows_history_pb2.py +0 -0
  153. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
  154. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflows_pb2.py +0 -0
  155. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflows_pb2_grpc.py +0 -0
  156. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm.egg-info/SOURCES.txt +0 -0
  157. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm.egg-info/dependency_links.txt +0 -0
  158. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm.egg-info/requires.txt +0 -0
  159. {strongdm-15.22.0 → strongdm-15.25.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -1,12 +1,12 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: strongdm
3
- Version: 15.22.0
3
+ Version: 15.25.0
4
4
  Summary: strongDM SDK for the Python programming language.
5
5
  Home-page: https://github.com/strongdm/strongdm-sdk-python
6
6
  Author: strongDM Team
7
7
  Author-email: sdk-feedback@strongdm.com
8
8
  License: apache-2.0
9
- Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v15.22.0.tar.gz
9
+ Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v15.25.0.tar.gz
10
10
  Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
11
11
  Platform: UNKNOWN
12
12
  Classifier: Development Status :: 4 - Beta
@@ -23,7 +23,7 @@ from setuptools import setup
23
23
  setup(
24
24
  name='strongdm',
25
25
  packages=['strongdm'],
26
- version='15.22.0',
26
+ version='15.25.0',
27
27
  license='apache-2.0',
28
28
  description='strongDM SDK for the Python programming language.',
29
29
  long_description=long_description,
@@ -32,7 +32,7 @@ setup(
32
32
  author_email='sdk-feedback@strongdm.com',
33
33
  url='https://github.com/strongdm/strongdm-sdk-python',
34
34
  download_url=
35
- 'https://github.com/strongdm/strongdm-sdk-python/archive/v15.22.0.tar.gz',
35
+ 'https://github.com/strongdm/strongdm-sdk-python/archive/v15.25.0.tar.gz',
36
36
  keywords=[
37
37
  'strongDM', 'sdm', 'api', 'automation', 'security', 'audit',
38
38
  'database', 'server', 'ssh', 'rdp'
@@ -34,7 +34,7 @@ DEFAULT_MAX_RETRY_DELAY = 120 # 120 seconds
34
34
  DEFAULT_RETRY_FACTOR = 1.6
35
35
  DEFAULT_RETRY_JITTER = 0.2
36
36
  API_VERSION = '2025-04-14'
37
- USER_AGENT = 'strongdm-sdk-python/15.22.0'
37
+ USER_AGENT = 'strongdm-sdk-python/15.25.0'
38
38
 
39
39
 
40
40
  class Client:
@@ -1839,6 +1839,8 @@ class AWSStore:
1839
1839
  'id',
1840
1840
  'name',
1841
1841
  'region',
1842
+ 'role_arn',
1843
+ 'role_external_id',
1842
1844
  'tags',
1843
1845
  ]
1844
1846
 
@@ -1847,6 +1849,8 @@ class AWSStore:
1847
1849
  id=None,
1848
1850
  name=None,
1849
1851
  region=None,
1852
+ role_arn=None,
1853
+ role_external_id=None,
1850
1854
  tags=None,
1851
1855
  ):
1852
1856
  self.id = id if id is not None else ''
@@ -1861,6 +1865,14 @@ class AWSStore:
1861
1865
  '''
1862
1866
  The AWS region to target e.g. us-east-1
1863
1867
  '''
1868
+ self.role_arn = role_arn if role_arn is not None else ''
1869
+ '''
1870
+ The role to assume after logging in.
1871
+ '''
1872
+ self.role_external_id = role_external_id if role_external_id is not None else ''
1873
+ '''
1874
+ The external ID to associate with assume role requests. Does nothing if a role ARN is not provided.
1875
+ '''
1864
1876
  self.tags = tags if tags is not None else _porcelain_zero_value_tags()
1865
1877
  '''
1866
1878
  Tags is a map of key, value pairs.
@@ -1871,6 +1883,8 @@ class AWSStore:
1871
1883
  'id: ' + repr(self.id) + ' ' +\
1872
1884
  'name: ' + repr(self.name) + ' ' +\
1873
1885
  'region: ' + repr(self.region) + ' ' +\
1886
+ 'role_arn: ' + repr(self.role_arn) + ' ' +\
1887
+ 'role_external_id: ' + repr(self.role_external_id) + ' ' +\
1874
1888
  'tags: ' + repr(self.tags) + ' ' +\
1875
1889
  '>'
1876
1890
 
@@ -1879,6 +1893,8 @@ class AWSStore:
1879
1893
  'id': self.id,
1880
1894
  'name': self.name,
1881
1895
  'region': self.region,
1896
+ 'role_arn': self.role_arn,
1897
+ 'role_external_id': self.role_external_id,
1882
1898
  'tags': self.tags,
1883
1899
  }
1884
1900
 
@@ -1888,6 +1904,8 @@ class AWSStore:
1888
1904
  id=d.get('id'),
1889
1905
  name=d.get('name'),
1890
1906
  region=d.get('region'),
1907
+ role_arn=d.get('role_arn'),
1908
+ role_external_id=d.get('role_external_id'),
1891
1909
  tags=d.get('tags'),
1892
1910
  )
1893
1911
 
@@ -31312,6 +31330,59 @@ class Snowsight:
31312
31330
  )
31313
31331
 
31314
31332
 
31333
+ class StrongVaultStore:
31334
+ '''
31335
+ StrongVaultStore is currently unstable, and its API may change, or it may be removed,
31336
+ without a major version bump.
31337
+ '''
31338
+ __slots__ = [
31339
+ 'id',
31340
+ 'name',
31341
+ 'tags',
31342
+ ]
31343
+
31344
+ def __init__(
31345
+ self,
31346
+ id=None,
31347
+ name=None,
31348
+ tags=None,
31349
+ ):
31350
+ self.id = id if id is not None else ''
31351
+ '''
31352
+ Unique identifier of the SecretStore.
31353
+ '''
31354
+ self.name = name if name is not None else ''
31355
+ '''
31356
+ Unique human-readable name of the SecretStore.
31357
+ '''
31358
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
31359
+ '''
31360
+ Tags is a map of key, value pairs.
31361
+ '''
31362
+
31363
+ def __repr__(self):
31364
+ return '<sdm.StrongVaultStore ' + \
31365
+ 'id: ' + repr(self.id) + ' ' +\
31366
+ 'name: ' + repr(self.name) + ' ' +\
31367
+ 'tags: ' + repr(self.tags) + ' ' +\
31368
+ '>'
31369
+
31370
+ def to_dict(self):
31371
+ return {
31372
+ 'id': self.id,
31373
+ 'name': self.name,
31374
+ 'tags': self.tags,
31375
+ }
31376
+
31377
+ @classmethod
31378
+ def from_dict(cls, d):
31379
+ return cls(
31380
+ id=d.get('id'),
31381
+ name=d.get('name'),
31382
+ tags=d.get('tags'),
31383
+ )
31384
+
31385
+
31315
31386
  class Sybase:
31316
31387
  __slots__ = [
31317
31388
  'bind_interface',
@@ -32227,6 +32298,202 @@ class User:
32227
32298
  )
32228
32299
 
32229
32300
 
32301
+ class VaultAWSEC2CertSSHStore:
32302
+ '''
32303
+ VaultAWSEC2CertSSHStore is currently unstable, and its API may change, or it may be removed,
32304
+ without a major version bump.
32305
+ '''
32306
+ __slots__ = [
32307
+ 'id',
32308
+ 'issuedcertttlminutes',
32309
+ 'name',
32310
+ 'namespace',
32311
+ 'server_address',
32312
+ 'signing_role',
32313
+ 'ssh_mount_point',
32314
+ 'tags',
32315
+ ]
32316
+
32317
+ def __init__(
32318
+ self,
32319
+ id=None,
32320
+ issuedcertttlminutes=None,
32321
+ name=None,
32322
+ namespace=None,
32323
+ server_address=None,
32324
+ signing_role=None,
32325
+ ssh_mount_point=None,
32326
+ tags=None,
32327
+ ):
32328
+ self.id = id if id is not None else ''
32329
+ '''
32330
+ Unique identifier of the SecretStore.
32331
+ '''
32332
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
32333
+ '''
32334
+ The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
32335
+ '''
32336
+ self.name = name if name is not None else ''
32337
+ '''
32338
+ Unique human-readable name of the SecretStore.
32339
+ '''
32340
+ self.namespace = namespace if namespace is not None else ''
32341
+ '''
32342
+ The namespace to make requests within
32343
+ '''
32344
+ self.server_address = server_address if server_address is not None else ''
32345
+ '''
32346
+ The URL of the Vault to target
32347
+ '''
32348
+ self.signing_role = signing_role if signing_role is not None else ''
32349
+ '''
32350
+ The signing role to be used for signing certificates
32351
+ '''
32352
+ self.ssh_mount_point = ssh_mount_point if ssh_mount_point is not None else ''
32353
+ '''
32354
+ The mount point of the SSH engine configured with the desired CA
32355
+ '''
32356
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
32357
+ '''
32358
+ Tags is a map of key, value pairs.
32359
+ '''
32360
+
32361
+ def __repr__(self):
32362
+ return '<sdm.VaultAWSEC2CertSSHStore ' + \
32363
+ 'id: ' + repr(self.id) + ' ' +\
32364
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
32365
+ 'name: ' + repr(self.name) + ' ' +\
32366
+ 'namespace: ' + repr(self.namespace) + ' ' +\
32367
+ 'server_address: ' + repr(self.server_address) + ' ' +\
32368
+ 'signing_role: ' + repr(self.signing_role) + ' ' +\
32369
+ 'ssh_mount_point: ' + repr(self.ssh_mount_point) + ' ' +\
32370
+ 'tags: ' + repr(self.tags) + ' ' +\
32371
+ '>'
32372
+
32373
+ def to_dict(self):
32374
+ return {
32375
+ 'id': self.id,
32376
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
32377
+ 'name': self.name,
32378
+ 'namespace': self.namespace,
32379
+ 'server_address': self.server_address,
32380
+ 'signing_role': self.signing_role,
32381
+ 'ssh_mount_point': self.ssh_mount_point,
32382
+ 'tags': self.tags,
32383
+ }
32384
+
32385
+ @classmethod
32386
+ def from_dict(cls, d):
32387
+ return cls(
32388
+ id=d.get('id'),
32389
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
32390
+ name=d.get('name'),
32391
+ namespace=d.get('namespace'),
32392
+ server_address=d.get('server_address'),
32393
+ signing_role=d.get('signing_role'),
32394
+ ssh_mount_point=d.get('ssh_mount_point'),
32395
+ tags=d.get('tags'),
32396
+ )
32397
+
32398
+
32399
+ class VaultAWSEC2CertX509Store:
32400
+ '''
32401
+ VaultAWSEC2CertX509Store is currently unstable, and its API may change, or it may be removed,
32402
+ without a major version bump.
32403
+ '''
32404
+ __slots__ = [
32405
+ 'id',
32406
+ 'issuedcertttlminutes',
32407
+ 'name',
32408
+ 'namespace',
32409
+ 'pki_mount_point',
32410
+ 'server_address',
32411
+ 'signing_role',
32412
+ 'tags',
32413
+ ]
32414
+
32415
+ def __init__(
32416
+ self,
32417
+ id=None,
32418
+ issuedcertttlminutes=None,
32419
+ name=None,
32420
+ namespace=None,
32421
+ pki_mount_point=None,
32422
+ server_address=None,
32423
+ signing_role=None,
32424
+ tags=None,
32425
+ ):
32426
+ self.id = id if id is not None else ''
32427
+ '''
32428
+ Unique identifier of the SecretStore.
32429
+ '''
32430
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
32431
+ '''
32432
+ The lifetime of certificates issued by this CA represented in minutes.
32433
+ '''
32434
+ self.name = name if name is not None else ''
32435
+ '''
32436
+ Unique human-readable name of the SecretStore.
32437
+ '''
32438
+ self.namespace = namespace if namespace is not None else ''
32439
+ '''
32440
+ The namespace to make requests within
32441
+ '''
32442
+ self.pki_mount_point = pki_mount_point if pki_mount_point is not None else ''
32443
+ '''
32444
+ The mount point of the PKI engine configured with the desired CA
32445
+ '''
32446
+ self.server_address = server_address if server_address is not None else ''
32447
+ '''
32448
+ The URL of the Vault to target
32449
+ '''
32450
+ self.signing_role = signing_role if signing_role is not None else ''
32451
+ '''
32452
+ The signing role to be used for signing certificates
32453
+ '''
32454
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
32455
+ '''
32456
+ Tags is a map of key, value pairs.
32457
+ '''
32458
+
32459
+ def __repr__(self):
32460
+ return '<sdm.VaultAWSEC2CertX509Store ' + \
32461
+ 'id: ' + repr(self.id) + ' ' +\
32462
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
32463
+ 'name: ' + repr(self.name) + ' ' +\
32464
+ 'namespace: ' + repr(self.namespace) + ' ' +\
32465
+ 'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
32466
+ 'server_address: ' + repr(self.server_address) + ' ' +\
32467
+ 'signing_role: ' + repr(self.signing_role) + ' ' +\
32468
+ 'tags: ' + repr(self.tags) + ' ' +\
32469
+ '>'
32470
+
32471
+ def to_dict(self):
32472
+ return {
32473
+ 'id': self.id,
32474
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
32475
+ 'name': self.name,
32476
+ 'namespace': self.namespace,
32477
+ 'pki_mount_point': self.pki_mount_point,
32478
+ 'server_address': self.server_address,
32479
+ 'signing_role': self.signing_role,
32480
+ 'tags': self.tags,
32481
+ }
32482
+
32483
+ @classmethod
32484
+ def from_dict(cls, d):
32485
+ return cls(
32486
+ id=d.get('id'),
32487
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
32488
+ name=d.get('name'),
32489
+ namespace=d.get('namespace'),
32490
+ pki_mount_point=d.get('pki_mount_point'),
32491
+ server_address=d.get('server_address'),
32492
+ signing_role=d.get('signing_role'),
32493
+ tags=d.get('tags'),
32494
+ )
32495
+
32496
+
32230
32497
  class VaultAWSEC2Store:
32231
32498
  __slots__ = [
32232
32499
  'id',
@@ -32294,6 +32561,202 @@ class VaultAWSEC2Store:
32294
32561
  )
32295
32562
 
32296
32563
 
32564
+ class VaultAWSIAMCertSSHStore:
32565
+ '''
32566
+ VaultAWSIAMCertSSHStore is currently unstable, and its API may change, or it may be removed,
32567
+ without a major version bump.
32568
+ '''
32569
+ __slots__ = [
32570
+ 'id',
32571
+ 'issuedcertttlminutes',
32572
+ 'name',
32573
+ 'namespace',
32574
+ 'server_address',
32575
+ 'signing_role',
32576
+ 'ssh_mount_point',
32577
+ 'tags',
32578
+ ]
32579
+
32580
+ def __init__(
32581
+ self,
32582
+ id=None,
32583
+ issuedcertttlminutes=None,
32584
+ name=None,
32585
+ namespace=None,
32586
+ server_address=None,
32587
+ signing_role=None,
32588
+ ssh_mount_point=None,
32589
+ tags=None,
32590
+ ):
32591
+ self.id = id if id is not None else ''
32592
+ '''
32593
+ Unique identifier of the SecretStore.
32594
+ '''
32595
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
32596
+ '''
32597
+ The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
32598
+ '''
32599
+ self.name = name if name is not None else ''
32600
+ '''
32601
+ Unique human-readable name of the SecretStore.
32602
+ '''
32603
+ self.namespace = namespace if namespace is not None else ''
32604
+ '''
32605
+ The namespace to make requests within
32606
+ '''
32607
+ self.server_address = server_address if server_address is not None else ''
32608
+ '''
32609
+ The URL of the Vault to target
32610
+ '''
32611
+ self.signing_role = signing_role if signing_role is not None else ''
32612
+ '''
32613
+ The signing role to be used for signing certificates
32614
+ '''
32615
+ self.ssh_mount_point = ssh_mount_point if ssh_mount_point is not None else ''
32616
+ '''
32617
+ The mount point of the SSH engine configured with the desired CA
32618
+ '''
32619
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
32620
+ '''
32621
+ Tags is a map of key, value pairs.
32622
+ '''
32623
+
32624
+ def __repr__(self):
32625
+ return '<sdm.VaultAWSIAMCertSSHStore ' + \
32626
+ 'id: ' + repr(self.id) + ' ' +\
32627
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
32628
+ 'name: ' + repr(self.name) + ' ' +\
32629
+ 'namespace: ' + repr(self.namespace) + ' ' +\
32630
+ 'server_address: ' + repr(self.server_address) + ' ' +\
32631
+ 'signing_role: ' + repr(self.signing_role) + ' ' +\
32632
+ 'ssh_mount_point: ' + repr(self.ssh_mount_point) + ' ' +\
32633
+ 'tags: ' + repr(self.tags) + ' ' +\
32634
+ '>'
32635
+
32636
+ def to_dict(self):
32637
+ return {
32638
+ 'id': self.id,
32639
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
32640
+ 'name': self.name,
32641
+ 'namespace': self.namespace,
32642
+ 'server_address': self.server_address,
32643
+ 'signing_role': self.signing_role,
32644
+ 'ssh_mount_point': self.ssh_mount_point,
32645
+ 'tags': self.tags,
32646
+ }
32647
+
32648
+ @classmethod
32649
+ def from_dict(cls, d):
32650
+ return cls(
32651
+ id=d.get('id'),
32652
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
32653
+ name=d.get('name'),
32654
+ namespace=d.get('namespace'),
32655
+ server_address=d.get('server_address'),
32656
+ signing_role=d.get('signing_role'),
32657
+ ssh_mount_point=d.get('ssh_mount_point'),
32658
+ tags=d.get('tags'),
32659
+ )
32660
+
32661
+
32662
+ class VaultAWSIAMCertX509Store:
32663
+ '''
32664
+ VaultAWSIAMCertX509Store is currently unstable, and its API may change, or it may be removed,
32665
+ without a major version bump.
32666
+ '''
32667
+ __slots__ = [
32668
+ 'id',
32669
+ 'issuedcertttlminutes',
32670
+ 'name',
32671
+ 'namespace',
32672
+ 'pki_mount_point',
32673
+ 'server_address',
32674
+ 'signing_role',
32675
+ 'tags',
32676
+ ]
32677
+
32678
+ def __init__(
32679
+ self,
32680
+ id=None,
32681
+ issuedcertttlminutes=None,
32682
+ name=None,
32683
+ namespace=None,
32684
+ pki_mount_point=None,
32685
+ server_address=None,
32686
+ signing_role=None,
32687
+ tags=None,
32688
+ ):
32689
+ self.id = id if id is not None else ''
32690
+ '''
32691
+ Unique identifier of the SecretStore.
32692
+ '''
32693
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
32694
+ '''
32695
+ The lifetime of certificates issued by this CA represented in minutes.
32696
+ '''
32697
+ self.name = name if name is not None else ''
32698
+ '''
32699
+ Unique human-readable name of the SecretStore.
32700
+ '''
32701
+ self.namespace = namespace if namespace is not None else ''
32702
+ '''
32703
+ The namespace to make requests within
32704
+ '''
32705
+ self.pki_mount_point = pki_mount_point if pki_mount_point is not None else ''
32706
+ '''
32707
+ The mount point of the PKI engine configured with the desired CA
32708
+ '''
32709
+ self.server_address = server_address if server_address is not None else ''
32710
+ '''
32711
+ The URL of the Vault to target
32712
+ '''
32713
+ self.signing_role = signing_role if signing_role is not None else ''
32714
+ '''
32715
+ The signing role to be used for signing certificates
32716
+ '''
32717
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
32718
+ '''
32719
+ Tags is a map of key, value pairs.
32720
+ '''
32721
+
32722
+ def __repr__(self):
32723
+ return '<sdm.VaultAWSIAMCertX509Store ' + \
32724
+ 'id: ' + repr(self.id) + ' ' +\
32725
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
32726
+ 'name: ' + repr(self.name) + ' ' +\
32727
+ 'namespace: ' + repr(self.namespace) + ' ' +\
32728
+ 'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
32729
+ 'server_address: ' + repr(self.server_address) + ' ' +\
32730
+ 'signing_role: ' + repr(self.signing_role) + ' ' +\
32731
+ 'tags: ' + repr(self.tags) + ' ' +\
32732
+ '>'
32733
+
32734
+ def to_dict(self):
32735
+ return {
32736
+ 'id': self.id,
32737
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
32738
+ 'name': self.name,
32739
+ 'namespace': self.namespace,
32740
+ 'pki_mount_point': self.pki_mount_point,
32741
+ 'server_address': self.server_address,
32742
+ 'signing_role': self.signing_role,
32743
+ 'tags': self.tags,
32744
+ }
32745
+
32746
+ @classmethod
32747
+ def from_dict(cls, d):
32748
+ return cls(
32749
+ id=d.get('id'),
32750
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
32751
+ name=d.get('name'),
32752
+ namespace=d.get('namespace'),
32753
+ pki_mount_point=d.get('pki_mount_point'),
32754
+ server_address=d.get('server_address'),
32755
+ signing_role=d.get('signing_role'),
32756
+ tags=d.get('tags'),
32757
+ )
32758
+
32759
+
32297
32760
  class VaultAWSIAMStore:
32298
32761
  __slots__ = [
32299
32762
  'id',