strongdm 15.22.0__zip → 15.25.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-15.22.0 → strongdm-15.25.0}/PKG-INFO +2 -2
- {strongdm-15.22.0 → strongdm-15.25.0}/setup.py +2 -2
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/client.py +1 -1
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/models.py +463 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/plumbing.py +243 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_store_types_pb2.py +192 -48
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/svc.py +5 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-15.22.0 → strongdm-15.25.0}/LICENSE +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/README.md +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/setup.cfg +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/__init__.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_groups_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_groups_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_groups_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_groups_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/constants.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/drivers_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/errors.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_roles_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_roles_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_roles_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/groups_roles_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/health_checks_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/health_checks_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/managed_secrets_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/managed_secrets_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/options_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/policies_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/policies_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/policies_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/policies_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/proxy_cluster_keys_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/proxy_cluster_keys_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engine_policy_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engine_types_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engine_types_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engines_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_engines_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-15.22.0 → strongdm-15.25.0}/strongdm.egg-info/top_level.txt +0 -0
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: strongdm
|
|
3
|
-
Version: 15.
|
|
3
|
+
Version: 15.25.0
|
|
4
4
|
Summary: strongDM SDK for the Python programming language.
|
|
5
5
|
Home-page: https://github.com/strongdm/strongdm-sdk-python
|
|
6
6
|
Author: strongDM Team
|
|
7
7
|
Author-email: sdk-feedback@strongdm.com
|
|
8
8
|
License: apache-2.0
|
|
9
|
-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v15.
|
|
9
|
+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v15.25.0.tar.gz
|
|
10
10
|
Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
|
|
11
11
|
Platform: UNKNOWN
|
|
12
12
|
Classifier: Development Status :: 4 - Beta
|
|
@@ -23,7 +23,7 @@ from setuptools import setup
|
|
|
23
23
|
setup(
|
|
24
24
|
name='strongdm',
|
|
25
25
|
packages=['strongdm'],
|
|
26
|
-
version='15.
|
|
26
|
+
version='15.25.0',
|
|
27
27
|
license='apache-2.0',
|
|
28
28
|
description='strongDM SDK for the Python programming language.',
|
|
29
29
|
long_description=long_description,
|
|
@@ -32,7 +32,7 @@ setup(
|
|
|
32
32
|
author_email='sdk-feedback@strongdm.com',
|
|
33
33
|
url='https://github.com/strongdm/strongdm-sdk-python',
|
|
34
34
|
download_url=
|
|
35
|
-
'https://github.com/strongdm/strongdm-sdk-python/archive/v15.
|
|
35
|
+
'https://github.com/strongdm/strongdm-sdk-python/archive/v15.25.0.tar.gz',
|
|
36
36
|
keywords=[
|
|
37
37
|
'strongDM', 'sdm', 'api', 'automation', 'security', 'audit',
|
|
38
38
|
'database', 'server', 'ssh', 'rdp'
|
|
@@ -1839,6 +1839,8 @@ class AWSStore:
|
|
|
1839
1839
|
'id',
|
|
1840
1840
|
'name',
|
|
1841
1841
|
'region',
|
|
1842
|
+
'role_arn',
|
|
1843
|
+
'role_external_id',
|
|
1842
1844
|
'tags',
|
|
1843
1845
|
]
|
|
1844
1846
|
|
|
@@ -1847,6 +1849,8 @@ class AWSStore:
|
|
|
1847
1849
|
id=None,
|
|
1848
1850
|
name=None,
|
|
1849
1851
|
region=None,
|
|
1852
|
+
role_arn=None,
|
|
1853
|
+
role_external_id=None,
|
|
1850
1854
|
tags=None,
|
|
1851
1855
|
):
|
|
1852
1856
|
self.id = id if id is not None else ''
|
|
@@ -1861,6 +1865,14 @@ class AWSStore:
|
|
|
1861
1865
|
'''
|
|
1862
1866
|
The AWS region to target e.g. us-east-1
|
|
1863
1867
|
'''
|
|
1868
|
+
self.role_arn = role_arn if role_arn is not None else ''
|
|
1869
|
+
'''
|
|
1870
|
+
The role to assume after logging in.
|
|
1871
|
+
'''
|
|
1872
|
+
self.role_external_id = role_external_id if role_external_id is not None else ''
|
|
1873
|
+
'''
|
|
1874
|
+
The external ID to associate with assume role requests. Does nothing if a role ARN is not provided.
|
|
1875
|
+
'''
|
|
1864
1876
|
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
1865
1877
|
'''
|
|
1866
1878
|
Tags is a map of key, value pairs.
|
|
@@ -1871,6 +1883,8 @@ class AWSStore:
|
|
|
1871
1883
|
'id: ' + repr(self.id) + ' ' +\
|
|
1872
1884
|
'name: ' + repr(self.name) + ' ' +\
|
|
1873
1885
|
'region: ' + repr(self.region) + ' ' +\
|
|
1886
|
+
'role_arn: ' + repr(self.role_arn) + ' ' +\
|
|
1887
|
+
'role_external_id: ' + repr(self.role_external_id) + ' ' +\
|
|
1874
1888
|
'tags: ' + repr(self.tags) + ' ' +\
|
|
1875
1889
|
'>'
|
|
1876
1890
|
|
|
@@ -1879,6 +1893,8 @@ class AWSStore:
|
|
|
1879
1893
|
'id': self.id,
|
|
1880
1894
|
'name': self.name,
|
|
1881
1895
|
'region': self.region,
|
|
1896
|
+
'role_arn': self.role_arn,
|
|
1897
|
+
'role_external_id': self.role_external_id,
|
|
1882
1898
|
'tags': self.tags,
|
|
1883
1899
|
}
|
|
1884
1900
|
|
|
@@ -1888,6 +1904,8 @@ class AWSStore:
|
|
|
1888
1904
|
id=d.get('id'),
|
|
1889
1905
|
name=d.get('name'),
|
|
1890
1906
|
region=d.get('region'),
|
|
1907
|
+
role_arn=d.get('role_arn'),
|
|
1908
|
+
role_external_id=d.get('role_external_id'),
|
|
1891
1909
|
tags=d.get('tags'),
|
|
1892
1910
|
)
|
|
1893
1911
|
|
|
@@ -31312,6 +31330,59 @@ class Snowsight:
|
|
|
31312
31330
|
)
|
|
31313
31331
|
|
|
31314
31332
|
|
|
31333
|
+
class StrongVaultStore:
|
|
31334
|
+
'''
|
|
31335
|
+
StrongVaultStore is currently unstable, and its API may change, or it may be removed,
|
|
31336
|
+
without a major version bump.
|
|
31337
|
+
'''
|
|
31338
|
+
__slots__ = [
|
|
31339
|
+
'id',
|
|
31340
|
+
'name',
|
|
31341
|
+
'tags',
|
|
31342
|
+
]
|
|
31343
|
+
|
|
31344
|
+
def __init__(
|
|
31345
|
+
self,
|
|
31346
|
+
id=None,
|
|
31347
|
+
name=None,
|
|
31348
|
+
tags=None,
|
|
31349
|
+
):
|
|
31350
|
+
self.id = id if id is not None else ''
|
|
31351
|
+
'''
|
|
31352
|
+
Unique identifier of the SecretStore.
|
|
31353
|
+
'''
|
|
31354
|
+
self.name = name if name is not None else ''
|
|
31355
|
+
'''
|
|
31356
|
+
Unique human-readable name of the SecretStore.
|
|
31357
|
+
'''
|
|
31358
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
31359
|
+
'''
|
|
31360
|
+
Tags is a map of key, value pairs.
|
|
31361
|
+
'''
|
|
31362
|
+
|
|
31363
|
+
def __repr__(self):
|
|
31364
|
+
return '<sdm.StrongVaultStore ' + \
|
|
31365
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
31366
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
31367
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
31368
|
+
'>'
|
|
31369
|
+
|
|
31370
|
+
def to_dict(self):
|
|
31371
|
+
return {
|
|
31372
|
+
'id': self.id,
|
|
31373
|
+
'name': self.name,
|
|
31374
|
+
'tags': self.tags,
|
|
31375
|
+
}
|
|
31376
|
+
|
|
31377
|
+
@classmethod
|
|
31378
|
+
def from_dict(cls, d):
|
|
31379
|
+
return cls(
|
|
31380
|
+
id=d.get('id'),
|
|
31381
|
+
name=d.get('name'),
|
|
31382
|
+
tags=d.get('tags'),
|
|
31383
|
+
)
|
|
31384
|
+
|
|
31385
|
+
|
|
31315
31386
|
class Sybase:
|
|
31316
31387
|
__slots__ = [
|
|
31317
31388
|
'bind_interface',
|
|
@@ -32227,6 +32298,202 @@ class User:
|
|
|
32227
32298
|
)
|
|
32228
32299
|
|
|
32229
32300
|
|
|
32301
|
+
class VaultAWSEC2CertSSHStore:
|
|
32302
|
+
'''
|
|
32303
|
+
VaultAWSEC2CertSSHStore is currently unstable, and its API may change, or it may be removed,
|
|
32304
|
+
without a major version bump.
|
|
32305
|
+
'''
|
|
32306
|
+
__slots__ = [
|
|
32307
|
+
'id',
|
|
32308
|
+
'issuedcertttlminutes',
|
|
32309
|
+
'name',
|
|
32310
|
+
'namespace',
|
|
32311
|
+
'server_address',
|
|
32312
|
+
'signing_role',
|
|
32313
|
+
'ssh_mount_point',
|
|
32314
|
+
'tags',
|
|
32315
|
+
]
|
|
32316
|
+
|
|
32317
|
+
def __init__(
|
|
32318
|
+
self,
|
|
32319
|
+
id=None,
|
|
32320
|
+
issuedcertttlminutes=None,
|
|
32321
|
+
name=None,
|
|
32322
|
+
namespace=None,
|
|
32323
|
+
server_address=None,
|
|
32324
|
+
signing_role=None,
|
|
32325
|
+
ssh_mount_point=None,
|
|
32326
|
+
tags=None,
|
|
32327
|
+
):
|
|
32328
|
+
self.id = id if id is not None else ''
|
|
32329
|
+
'''
|
|
32330
|
+
Unique identifier of the SecretStore.
|
|
32331
|
+
'''
|
|
32332
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
|
32333
|
+
'''
|
|
32334
|
+
The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
|
32335
|
+
'''
|
|
32336
|
+
self.name = name if name is not None else ''
|
|
32337
|
+
'''
|
|
32338
|
+
Unique human-readable name of the SecretStore.
|
|
32339
|
+
'''
|
|
32340
|
+
self.namespace = namespace if namespace is not None else ''
|
|
32341
|
+
'''
|
|
32342
|
+
The namespace to make requests within
|
|
32343
|
+
'''
|
|
32344
|
+
self.server_address = server_address if server_address is not None else ''
|
|
32345
|
+
'''
|
|
32346
|
+
The URL of the Vault to target
|
|
32347
|
+
'''
|
|
32348
|
+
self.signing_role = signing_role if signing_role is not None else ''
|
|
32349
|
+
'''
|
|
32350
|
+
The signing role to be used for signing certificates
|
|
32351
|
+
'''
|
|
32352
|
+
self.ssh_mount_point = ssh_mount_point if ssh_mount_point is not None else ''
|
|
32353
|
+
'''
|
|
32354
|
+
The mount point of the SSH engine configured with the desired CA
|
|
32355
|
+
'''
|
|
32356
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
32357
|
+
'''
|
|
32358
|
+
Tags is a map of key, value pairs.
|
|
32359
|
+
'''
|
|
32360
|
+
|
|
32361
|
+
def __repr__(self):
|
|
32362
|
+
return '<sdm.VaultAWSEC2CertSSHStore ' + \
|
|
32363
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
32364
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
|
32365
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
32366
|
+
'namespace: ' + repr(self.namespace) + ' ' +\
|
|
32367
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
|
32368
|
+
'signing_role: ' + repr(self.signing_role) + ' ' +\
|
|
32369
|
+
'ssh_mount_point: ' + repr(self.ssh_mount_point) + ' ' +\
|
|
32370
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
32371
|
+
'>'
|
|
32372
|
+
|
|
32373
|
+
def to_dict(self):
|
|
32374
|
+
return {
|
|
32375
|
+
'id': self.id,
|
|
32376
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
|
32377
|
+
'name': self.name,
|
|
32378
|
+
'namespace': self.namespace,
|
|
32379
|
+
'server_address': self.server_address,
|
|
32380
|
+
'signing_role': self.signing_role,
|
|
32381
|
+
'ssh_mount_point': self.ssh_mount_point,
|
|
32382
|
+
'tags': self.tags,
|
|
32383
|
+
}
|
|
32384
|
+
|
|
32385
|
+
@classmethod
|
|
32386
|
+
def from_dict(cls, d):
|
|
32387
|
+
return cls(
|
|
32388
|
+
id=d.get('id'),
|
|
32389
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
|
32390
|
+
name=d.get('name'),
|
|
32391
|
+
namespace=d.get('namespace'),
|
|
32392
|
+
server_address=d.get('server_address'),
|
|
32393
|
+
signing_role=d.get('signing_role'),
|
|
32394
|
+
ssh_mount_point=d.get('ssh_mount_point'),
|
|
32395
|
+
tags=d.get('tags'),
|
|
32396
|
+
)
|
|
32397
|
+
|
|
32398
|
+
|
|
32399
|
+
class VaultAWSEC2CertX509Store:
|
|
32400
|
+
'''
|
|
32401
|
+
VaultAWSEC2CertX509Store is currently unstable, and its API may change, or it may be removed,
|
|
32402
|
+
without a major version bump.
|
|
32403
|
+
'''
|
|
32404
|
+
__slots__ = [
|
|
32405
|
+
'id',
|
|
32406
|
+
'issuedcertttlminutes',
|
|
32407
|
+
'name',
|
|
32408
|
+
'namespace',
|
|
32409
|
+
'pki_mount_point',
|
|
32410
|
+
'server_address',
|
|
32411
|
+
'signing_role',
|
|
32412
|
+
'tags',
|
|
32413
|
+
]
|
|
32414
|
+
|
|
32415
|
+
def __init__(
|
|
32416
|
+
self,
|
|
32417
|
+
id=None,
|
|
32418
|
+
issuedcertttlminutes=None,
|
|
32419
|
+
name=None,
|
|
32420
|
+
namespace=None,
|
|
32421
|
+
pki_mount_point=None,
|
|
32422
|
+
server_address=None,
|
|
32423
|
+
signing_role=None,
|
|
32424
|
+
tags=None,
|
|
32425
|
+
):
|
|
32426
|
+
self.id = id if id is not None else ''
|
|
32427
|
+
'''
|
|
32428
|
+
Unique identifier of the SecretStore.
|
|
32429
|
+
'''
|
|
32430
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
|
32431
|
+
'''
|
|
32432
|
+
The lifetime of certificates issued by this CA represented in minutes.
|
|
32433
|
+
'''
|
|
32434
|
+
self.name = name if name is not None else ''
|
|
32435
|
+
'''
|
|
32436
|
+
Unique human-readable name of the SecretStore.
|
|
32437
|
+
'''
|
|
32438
|
+
self.namespace = namespace if namespace is not None else ''
|
|
32439
|
+
'''
|
|
32440
|
+
The namespace to make requests within
|
|
32441
|
+
'''
|
|
32442
|
+
self.pki_mount_point = pki_mount_point if pki_mount_point is not None else ''
|
|
32443
|
+
'''
|
|
32444
|
+
The mount point of the PKI engine configured with the desired CA
|
|
32445
|
+
'''
|
|
32446
|
+
self.server_address = server_address if server_address is not None else ''
|
|
32447
|
+
'''
|
|
32448
|
+
The URL of the Vault to target
|
|
32449
|
+
'''
|
|
32450
|
+
self.signing_role = signing_role if signing_role is not None else ''
|
|
32451
|
+
'''
|
|
32452
|
+
The signing role to be used for signing certificates
|
|
32453
|
+
'''
|
|
32454
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
32455
|
+
'''
|
|
32456
|
+
Tags is a map of key, value pairs.
|
|
32457
|
+
'''
|
|
32458
|
+
|
|
32459
|
+
def __repr__(self):
|
|
32460
|
+
return '<sdm.VaultAWSEC2CertX509Store ' + \
|
|
32461
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
32462
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
|
32463
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
32464
|
+
'namespace: ' + repr(self.namespace) + ' ' +\
|
|
32465
|
+
'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
|
|
32466
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
|
32467
|
+
'signing_role: ' + repr(self.signing_role) + ' ' +\
|
|
32468
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
32469
|
+
'>'
|
|
32470
|
+
|
|
32471
|
+
def to_dict(self):
|
|
32472
|
+
return {
|
|
32473
|
+
'id': self.id,
|
|
32474
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
|
32475
|
+
'name': self.name,
|
|
32476
|
+
'namespace': self.namespace,
|
|
32477
|
+
'pki_mount_point': self.pki_mount_point,
|
|
32478
|
+
'server_address': self.server_address,
|
|
32479
|
+
'signing_role': self.signing_role,
|
|
32480
|
+
'tags': self.tags,
|
|
32481
|
+
}
|
|
32482
|
+
|
|
32483
|
+
@classmethod
|
|
32484
|
+
def from_dict(cls, d):
|
|
32485
|
+
return cls(
|
|
32486
|
+
id=d.get('id'),
|
|
32487
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
|
32488
|
+
name=d.get('name'),
|
|
32489
|
+
namespace=d.get('namespace'),
|
|
32490
|
+
pki_mount_point=d.get('pki_mount_point'),
|
|
32491
|
+
server_address=d.get('server_address'),
|
|
32492
|
+
signing_role=d.get('signing_role'),
|
|
32493
|
+
tags=d.get('tags'),
|
|
32494
|
+
)
|
|
32495
|
+
|
|
32496
|
+
|
|
32230
32497
|
class VaultAWSEC2Store:
|
|
32231
32498
|
__slots__ = [
|
|
32232
32499
|
'id',
|
|
@@ -32294,6 +32561,202 @@ class VaultAWSEC2Store:
|
|
|
32294
32561
|
)
|
|
32295
32562
|
|
|
32296
32563
|
|
|
32564
|
+
class VaultAWSIAMCertSSHStore:
|
|
32565
|
+
'''
|
|
32566
|
+
VaultAWSIAMCertSSHStore is currently unstable, and its API may change, or it may be removed,
|
|
32567
|
+
without a major version bump.
|
|
32568
|
+
'''
|
|
32569
|
+
__slots__ = [
|
|
32570
|
+
'id',
|
|
32571
|
+
'issuedcertttlminutes',
|
|
32572
|
+
'name',
|
|
32573
|
+
'namespace',
|
|
32574
|
+
'server_address',
|
|
32575
|
+
'signing_role',
|
|
32576
|
+
'ssh_mount_point',
|
|
32577
|
+
'tags',
|
|
32578
|
+
]
|
|
32579
|
+
|
|
32580
|
+
def __init__(
|
|
32581
|
+
self,
|
|
32582
|
+
id=None,
|
|
32583
|
+
issuedcertttlminutes=None,
|
|
32584
|
+
name=None,
|
|
32585
|
+
namespace=None,
|
|
32586
|
+
server_address=None,
|
|
32587
|
+
signing_role=None,
|
|
32588
|
+
ssh_mount_point=None,
|
|
32589
|
+
tags=None,
|
|
32590
|
+
):
|
|
32591
|
+
self.id = id if id is not None else ''
|
|
32592
|
+
'''
|
|
32593
|
+
Unique identifier of the SecretStore.
|
|
32594
|
+
'''
|
|
32595
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
|
32596
|
+
'''
|
|
32597
|
+
The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
|
32598
|
+
'''
|
|
32599
|
+
self.name = name if name is not None else ''
|
|
32600
|
+
'''
|
|
32601
|
+
Unique human-readable name of the SecretStore.
|
|
32602
|
+
'''
|
|
32603
|
+
self.namespace = namespace if namespace is not None else ''
|
|
32604
|
+
'''
|
|
32605
|
+
The namespace to make requests within
|
|
32606
|
+
'''
|
|
32607
|
+
self.server_address = server_address if server_address is not None else ''
|
|
32608
|
+
'''
|
|
32609
|
+
The URL of the Vault to target
|
|
32610
|
+
'''
|
|
32611
|
+
self.signing_role = signing_role if signing_role is not None else ''
|
|
32612
|
+
'''
|
|
32613
|
+
The signing role to be used for signing certificates
|
|
32614
|
+
'''
|
|
32615
|
+
self.ssh_mount_point = ssh_mount_point if ssh_mount_point is not None else ''
|
|
32616
|
+
'''
|
|
32617
|
+
The mount point of the SSH engine configured with the desired CA
|
|
32618
|
+
'''
|
|
32619
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
32620
|
+
'''
|
|
32621
|
+
Tags is a map of key, value pairs.
|
|
32622
|
+
'''
|
|
32623
|
+
|
|
32624
|
+
def __repr__(self):
|
|
32625
|
+
return '<sdm.VaultAWSIAMCertSSHStore ' + \
|
|
32626
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
32627
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
|
32628
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
32629
|
+
'namespace: ' + repr(self.namespace) + ' ' +\
|
|
32630
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
|
32631
|
+
'signing_role: ' + repr(self.signing_role) + ' ' +\
|
|
32632
|
+
'ssh_mount_point: ' + repr(self.ssh_mount_point) + ' ' +\
|
|
32633
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
32634
|
+
'>'
|
|
32635
|
+
|
|
32636
|
+
def to_dict(self):
|
|
32637
|
+
return {
|
|
32638
|
+
'id': self.id,
|
|
32639
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
|
32640
|
+
'name': self.name,
|
|
32641
|
+
'namespace': self.namespace,
|
|
32642
|
+
'server_address': self.server_address,
|
|
32643
|
+
'signing_role': self.signing_role,
|
|
32644
|
+
'ssh_mount_point': self.ssh_mount_point,
|
|
32645
|
+
'tags': self.tags,
|
|
32646
|
+
}
|
|
32647
|
+
|
|
32648
|
+
@classmethod
|
|
32649
|
+
def from_dict(cls, d):
|
|
32650
|
+
return cls(
|
|
32651
|
+
id=d.get('id'),
|
|
32652
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
|
32653
|
+
name=d.get('name'),
|
|
32654
|
+
namespace=d.get('namespace'),
|
|
32655
|
+
server_address=d.get('server_address'),
|
|
32656
|
+
signing_role=d.get('signing_role'),
|
|
32657
|
+
ssh_mount_point=d.get('ssh_mount_point'),
|
|
32658
|
+
tags=d.get('tags'),
|
|
32659
|
+
)
|
|
32660
|
+
|
|
32661
|
+
|
|
32662
|
+
class VaultAWSIAMCertX509Store:
|
|
32663
|
+
'''
|
|
32664
|
+
VaultAWSIAMCertX509Store is currently unstable, and its API may change, or it may be removed,
|
|
32665
|
+
without a major version bump.
|
|
32666
|
+
'''
|
|
32667
|
+
__slots__ = [
|
|
32668
|
+
'id',
|
|
32669
|
+
'issuedcertttlminutes',
|
|
32670
|
+
'name',
|
|
32671
|
+
'namespace',
|
|
32672
|
+
'pki_mount_point',
|
|
32673
|
+
'server_address',
|
|
32674
|
+
'signing_role',
|
|
32675
|
+
'tags',
|
|
32676
|
+
]
|
|
32677
|
+
|
|
32678
|
+
def __init__(
|
|
32679
|
+
self,
|
|
32680
|
+
id=None,
|
|
32681
|
+
issuedcertttlminutes=None,
|
|
32682
|
+
name=None,
|
|
32683
|
+
namespace=None,
|
|
32684
|
+
pki_mount_point=None,
|
|
32685
|
+
server_address=None,
|
|
32686
|
+
signing_role=None,
|
|
32687
|
+
tags=None,
|
|
32688
|
+
):
|
|
32689
|
+
self.id = id if id is not None else ''
|
|
32690
|
+
'''
|
|
32691
|
+
Unique identifier of the SecretStore.
|
|
32692
|
+
'''
|
|
32693
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
|
32694
|
+
'''
|
|
32695
|
+
The lifetime of certificates issued by this CA represented in minutes.
|
|
32696
|
+
'''
|
|
32697
|
+
self.name = name if name is not None else ''
|
|
32698
|
+
'''
|
|
32699
|
+
Unique human-readable name of the SecretStore.
|
|
32700
|
+
'''
|
|
32701
|
+
self.namespace = namespace if namespace is not None else ''
|
|
32702
|
+
'''
|
|
32703
|
+
The namespace to make requests within
|
|
32704
|
+
'''
|
|
32705
|
+
self.pki_mount_point = pki_mount_point if pki_mount_point is not None else ''
|
|
32706
|
+
'''
|
|
32707
|
+
The mount point of the PKI engine configured with the desired CA
|
|
32708
|
+
'''
|
|
32709
|
+
self.server_address = server_address if server_address is not None else ''
|
|
32710
|
+
'''
|
|
32711
|
+
The URL of the Vault to target
|
|
32712
|
+
'''
|
|
32713
|
+
self.signing_role = signing_role if signing_role is not None else ''
|
|
32714
|
+
'''
|
|
32715
|
+
The signing role to be used for signing certificates
|
|
32716
|
+
'''
|
|
32717
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
32718
|
+
'''
|
|
32719
|
+
Tags is a map of key, value pairs.
|
|
32720
|
+
'''
|
|
32721
|
+
|
|
32722
|
+
def __repr__(self):
|
|
32723
|
+
return '<sdm.VaultAWSIAMCertX509Store ' + \
|
|
32724
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
32725
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
|
32726
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
32727
|
+
'namespace: ' + repr(self.namespace) + ' ' +\
|
|
32728
|
+
'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
|
|
32729
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
|
32730
|
+
'signing_role: ' + repr(self.signing_role) + ' ' +\
|
|
32731
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
32732
|
+
'>'
|
|
32733
|
+
|
|
32734
|
+
def to_dict(self):
|
|
32735
|
+
return {
|
|
32736
|
+
'id': self.id,
|
|
32737
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
|
32738
|
+
'name': self.name,
|
|
32739
|
+
'namespace': self.namespace,
|
|
32740
|
+
'pki_mount_point': self.pki_mount_point,
|
|
32741
|
+
'server_address': self.server_address,
|
|
32742
|
+
'signing_role': self.signing_role,
|
|
32743
|
+
'tags': self.tags,
|
|
32744
|
+
}
|
|
32745
|
+
|
|
32746
|
+
@classmethod
|
|
32747
|
+
def from_dict(cls, d):
|
|
32748
|
+
return cls(
|
|
32749
|
+
id=d.get('id'),
|
|
32750
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
|
32751
|
+
name=d.get('name'),
|
|
32752
|
+
namespace=d.get('namespace'),
|
|
32753
|
+
pki_mount_point=d.get('pki_mount_point'),
|
|
32754
|
+
server_address=d.get('server_address'),
|
|
32755
|
+
signing_role=d.get('signing_role'),
|
|
32756
|
+
tags=d.get('tags'),
|
|
32757
|
+
)
|
|
32758
|
+
|
|
32759
|
+
|
|
32297
32760
|
class VaultAWSIAMStore:
|
|
32298
32761
|
__slots__ = [
|
|
32299
32762
|
'id',
|