strongdm 15.4.0__zip → 15.6.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-15.4.0 → strongdm-15.6.0}/PKG-INFO +2 -2
- {strongdm-15.4.0 → strongdm-15.6.0}/setup.py +2 -2
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/client.py +1 -1
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/drivers_pb2.py +292 -284
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/managed_secrets_pb2.py +4 -2
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/managed_secrets_pb2_grpc.py +34 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/models.py +189 -152
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/options_pb2.py +16 -16
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/plumbing.py +64 -60
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/svc.py +32 -1
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-15.4.0 → strongdm-15.6.0}/LICENSE +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/README.md +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/setup.cfg +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/__init__.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/constants.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/errors.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/health_checks_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/health_checks_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/policies_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/policies_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/policies_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/policies_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/proxy_cluster_keys_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/proxy_cluster_keys_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_engine_policy_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_engine_types_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_engine_types_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_engines_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_engines_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-15.4.0 → strongdm-15.6.0}/strongdm.egg-info/top_level.txt +0 -0
|
@@ -32,7 +32,7 @@ from . import tags_pb2 as tags__pb2
|
|
|
32
32
|
from google.protobuf import timestamp_pb2 as google_dot_protobuf_dot_timestamp__pb2
|
|
33
33
|
|
|
34
34
|
|
|
35
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x15managed_secrets.proto\x12\x02v1\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"i\n\x18ManagedSecretLogsRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xe7\x01\n\x19ManagedSecretLogsResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12=\n\x13managed_secret_logs\x18\x02 \x03(\x0b\x32\x14.v1.ManagedSecretLogB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"i\n\x18ManagedSecretListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xbe\x01\n\x19ManagedSecretListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12\x36\n\x0fmanaged_secrets\x18\x02 \x03(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12\x35\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x88\x01\n\x1cManagedSecretRetrieveRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\npublic_key\x18\x03 \x01(\x0c\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xee\x01\n\x1dManagedSecretRetrieveResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\x0emanaged_secret\x18\x02 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"h\n\x1cManagedSecretValidateRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xf4\x01\n\x1dManagedSecretValidateResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x19\n\x05valid\x18\x02 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12 \n\x0cinvalid_info\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"c\n\x17ManagedSecretGetRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xe9\x01\n\x18ManagedSecretGetResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\x0emanaged_secret\x18\x02 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x88\x01\n\x1aManagedSecretCreateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.CreateRequestMetadata\x12\x35\n\x0emanaged_secret\x18\x02 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xef\x01\n\x1bManagedSecretCreateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.CreateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\x0emanaged_secret\x18\x02 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x94\x01\n\x1aManagedSecretUpdateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.UpdateRequestMetadata\x12\n\n\x02id\x18\x02 \x01(\t\x12\x35\n\x0emanaged_secret\x18\x03 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xef\x01\n\x1bManagedSecretUpdateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.UpdateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\x0emanaged_secret\x18\x02 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"j\n\x1aManagedSecretRotateRequest\x12(\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.GenericRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xb9\x01\n\x1bManagedSecretRotateResponse\x12\x35\n\x04meta\x18\x01 \x01(\x0b\x32\x1b.v1.GenericResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x02 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"i\n\x1aManagedSecretDeleteRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.UpdateRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xac\x01\n\x1bManagedSecretDeleteResponse\x12(\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.DeleteResponseMetadata\x12W\n\nrate_limit\x18\x02 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xaf\x02\n\x10ManagedSecretLog\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x10secret_engine_id\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12*\n\x11managed_secret_id\x18\x04 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12#\n\naccount_id\x18\x05 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1f\n\x06\x61\x63tion\x18\x06 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1e\n\x05\x64\x65\x62ug\x18\x07 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xcf\x03\n\rManagedSecret\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\x04name\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12)\n\x10secret_engine_id\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1e\n\x05value\x18\x04 \x01(\x0c\x42\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xf0\xf3\xb3\x07\x01\x12*\n\x11secret_store_path\x18\x05 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01\x12\x38\n\x06policy\x18\x06 \x01(\x0b\x32\x17.v1.ManagedSecretPolicyB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\"\n\x04tags\x18\x07 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x0flast_rotated_at\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01\x12?\n\nexpires_at\x18\t \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01\x12\x1f\n\x06\x63onfig\x18\n \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xad\x01\n\x13ManagedSecretPolicy\x12\x44\n\x0frotation_policy\x18\x01 \x01(\x0b\x32\x1f.v1.ManagedSecretRotationPolicyB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x0fpassword_policy\x18\x02 \x01(\x0b\x32\x1f.v1.ManagedSecretPasswordPolicyB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xf8\x01\n\x1bManagedSecretPasswordPolicy\x12\x1a\n\x06length\x18\x01 \x01(\rB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12&\n\x12\x65xclude_upper_case\x18\x02 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nnum_digits\x18\x03 \x01(\rB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1f\n\x0bnum_symbols\x18\x04 \x01(\rB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12 \n\x0c\x61llow_repeat\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12&\n\x12\x65xclude_characters\x18\x06 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\")\n\x1bManagedSecretRotationPolicy:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\x32\xc1\n\n\x0eManagedSecrets\x12o\n\x04List\x12\x1c.v1.ManagedSecretListRequest\x1a\x1d.v1.ManagedSecretListResponse\"*\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x18\xaa\xf3\xb3\x07\x13/v1/managed-secrets\x12|\n\x0bListByActor\x12\x1c.v1.ManagedSecretListRequest\x1a\x1d.v1.ManagedSecretListResponse\"0\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1e\xaa\xf3\xb3\x07\x19/v1/managed-secrets/actor\x12v\n\x06\x43reate\x12\x1e.v1.ManagedSecretCreateRequest\x1a\x1f.v1.ManagedSecretCreateResponse\"+\x82\xf9\xb3\x07\t\xa2\xf3\xb3\x07\x04post\x82\xf9\xb3\x07\x18\xaa\xf3\xb3\x07\x13/v1/managed-secrets\x12z\n\x06Update\x12\x1e.v1.ManagedSecretUpdateRequest\x1a\x1f.v1.ManagedSecretUpdateResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03put\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/managed-secrets/{id}\x12\x81\x01\n\x06Rotate\x12\x1e.v1.ManagedSecretRotateRequest\x1a\x1f.v1.ManagedSecretRotateResponse\"6\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03put\x82\xf9\xb3\x07$\xaa\xf3\xb3\x07\x1f/v1/managed-secrets/{id}/rotate\x12}\n\x06\x44\x65lete\x12\x1e.v1.ManagedSecretDeleteRequest\x1a\x1f.v1.ManagedSecretDeleteResponse\"2\x82\xf9\xb3\x07\x0b\xa2\xf3\xb3\x07\x06\x64\x65lete\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/managed-secrets/{id}\x12q\n\x03Get\x12\x1b.v1.ManagedSecretGetRequest\x1a\x1c.v1.ManagedSecretGetResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/managed-secrets/{id}\x12\x8a\x01\n\x08Retrieve\x12 .v1.ManagedSecretRetrieveRequest\x1a!.v1.ManagedSecretRetrieveResponse\"9\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\'\xaa\xf3\xb3\x07\"/v1/managed-secrets/{id}/sensitive\x12\x89\x01\n\x08Validate\x12 .v1.ManagedSecretValidateRequest\x1a!.v1.ManagedSecretValidateResponse\"8\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07&\xaa\xf3\xb3\x07!/v1/managed-secrets/{id}/validate\x12t\n\x04Logs\x12\x1c.v1.ManagedSecretLogsRequest\x1a\x1d.v1.ManagedSecretLogsResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/managed-secrets-logs\x1aG\xca\xf9\xb3\x07\x12\xc2\xf9\xb3\x07\rManagedSecret\xca\xf9\xb3\x07\x08\xd2\xf9\xb3\x07\x03ms-\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\t\xca\xf9\xb3\x07\x04!cliBj\n\x19\x63om.strongdm.api.plumbingB\x16ManagedSecretsPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
|
|
35
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x15managed_secrets.proto\x12\x02v1\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"i\n\x18ManagedSecretLogsRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xe7\x01\n\x19ManagedSecretLogsResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12=\n\x13managed_secret_logs\x18\x02 \x03(\x0b\x32\x14.v1.ManagedSecretLogB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"i\n\x18ManagedSecretListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xbe\x01\n\x19ManagedSecretListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12\x36\n\x0fmanaged_secrets\x18\x02 \x03(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12\x35\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x88\x01\n\x1cManagedSecretRetrieveRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\npublic_key\x18\x03 \x01(\x0c\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xee\x01\n\x1dManagedSecretRetrieveResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\x0emanaged_secret\x18\x02 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"h\n\x1cManagedSecretValidateRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xf4\x01\n\x1dManagedSecretValidateResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x19\n\x05valid\x18\x02 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12 \n\x0cinvalid_info\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"c\n\x17ManagedSecretGetRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xe9\x01\n\x18ManagedSecretGetResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\x0emanaged_secret\x18\x02 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x88\x01\n\x1aManagedSecretCreateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.CreateRequestMetadata\x12\x35\n\x0emanaged_secret\x18\x02 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xef\x01\n\x1bManagedSecretCreateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.CreateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\x0emanaged_secret\x18\x02 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x94\x01\n\x1aManagedSecretUpdateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.UpdateRequestMetadata\x12\n\n\x02id\x18\x02 \x01(\t\x12\x35\n\x0emanaged_secret\x18\x03 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xef\x01\n\x1bManagedSecretUpdateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.UpdateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x35\n\x0emanaged_secret\x18\x02 \x01(\x0b\x32\x11.v1.ManagedSecretB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"j\n\x1aManagedSecretRotateRequest\x12(\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.GenericRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xb9\x01\n\x1bManagedSecretRotateResponse\x12\x35\n\x04meta\x18\x01 \x01(\x0b\x32\x1b.v1.GenericResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x02 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"i\n\x1aManagedSecretDeleteRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.UpdateRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xac\x01\n\x1bManagedSecretDeleteResponse\x12(\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.DeleteResponseMetadata\x12W\n\nrate_limit\x18\x02 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xaf\x02\n\x10ManagedSecretLog\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x10secret_engine_id\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12*\n\x11managed_secret_id\x18\x04 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12#\n\naccount_id\x18\x05 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1f\n\x06\x61\x63tion\x18\x06 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1e\n\x05\x64\x65\x62ug\x18\x07 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xcf\x03\n\rManagedSecret\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\x04name\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12)\n\x10secret_engine_id\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1e\n\x05value\x18\x04 \x01(\x0c\x42\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xf0\xf3\xb3\x07\x01\x12*\n\x11secret_store_path\x18\x05 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01\x12\x38\n\x06policy\x18\x06 \x01(\x0b\x32\x17.v1.ManagedSecretPolicyB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\"\n\x04tags\x18\x07 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x0flast_rotated_at\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01\x12?\n\nexpires_at\x18\t \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01\x12\x1f\n\x06\x63onfig\x18\n \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xad\x01\n\x13ManagedSecretPolicy\x12\x44\n\x0frotation_policy\x18\x01 \x01(\x0b\x32\x1f.v1.ManagedSecretRotationPolicyB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x0fpassword_policy\x18\x02 \x01(\x0b\x32\x1f.v1.ManagedSecretPasswordPolicyB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\xf8\x01\n\x1bManagedSecretPasswordPolicy\x12\x1a\n\x06length\x18\x01 \x01(\rB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12&\n\x12\x65xclude_upper_case\x18\x02 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\nnum_digits\x18\x03 \x01(\rB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1f\n\x0bnum_symbols\x18\x04 \x01(\rB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12 \n\x0c\x61llow_repeat\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12&\n\x12\x65xclude_characters\x18\x06 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\")\n\x1bManagedSecretRotationPolicy:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\x32\xcc\x0b\n\x0eManagedSecrets\x12o\n\x04List\x12\x1c.v1.ManagedSecretListRequest\x1a\x1d.v1.ManagedSecretListResponse\"*\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x18\xaa\xf3\xb3\x07\x13/v1/managed-secrets\x12|\n\x0bListByActor\x12\x1c.v1.ManagedSecretListRequest\x1a\x1d.v1.ManagedSecretListResponse\"0\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1e\xaa\xf3\xb3\x07\x19/v1/managed-secrets/actor\x12v\n\x06\x43reate\x12\x1e.v1.ManagedSecretCreateRequest\x1a\x1f.v1.ManagedSecretCreateResponse\"+\x82\xf9\xb3\x07\t\xa2\xf3\xb3\x07\x04post\x82\xf9\xb3\x07\x18\xaa\xf3\xb3\x07\x13/v1/managed-secrets\x12z\n\x06Update\x12\x1e.v1.ManagedSecretUpdateRequest\x1a\x1f.v1.ManagedSecretUpdateResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03put\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/managed-secrets/{id}\x12\x81\x01\n\x06Rotate\x12\x1e.v1.ManagedSecretRotateRequest\x1a\x1f.v1.ManagedSecretRotateResponse\"6\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03put\x82\xf9\xb3\x07$\xaa\xf3\xb3\x07\x1f/v1/managed-secrets/{id}/rotate\x12}\n\x06\x44\x65lete\x12\x1e.v1.ManagedSecretDeleteRequest\x1a\x1f.v1.ManagedSecretDeleteResponse\"2\x82\xf9\xb3\x07\x0b\xa2\xf3\xb3\x07\x06\x64\x65lete\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/managed-secrets/{id}\x12\x88\x01\n\x0b\x46orceDelete\x12\x1e.v1.ManagedSecretDeleteRequest\x1a\x1f.v1.ManagedSecretDeleteResponse\"8\x82\xf9\xb3\x07\x0b\xa2\xf3\xb3\x07\x06\x64\x65lete\x82\xf9\xb3\x07#\xaa\xf3\xb3\x07\x1e/v1/managed-secrets/{id}/force\x12q\n\x03Get\x12\x1b.v1.ManagedSecretGetRequest\x1a\x1c.v1.ManagedSecretGetResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/managed-secrets/{id}\x12\x8a\x01\n\x08Retrieve\x12 .v1.ManagedSecretRetrieveRequest\x1a!.v1.ManagedSecretRetrieveResponse\"9\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\'\xaa\xf3\xb3\x07\"/v1/managed-secrets/{id}/sensitive\x12\x89\x01\n\x08Validate\x12 .v1.ManagedSecretValidateRequest\x1a!.v1.ManagedSecretValidateResponse\"8\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07&\xaa\xf3\xb3\x07!/v1/managed-secrets/{id}/validate\x12t\n\x04Logs\x12\x1c.v1.ManagedSecretLogsRequest\x1a\x1d.v1.ManagedSecretLogsResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/managed-secrets-logs\x1aG\xca\xf9\xb3\x07\x12\xc2\xf9\xb3\x07\rManagedSecret\xca\xf9\xb3\x07\x08\xd2\xf9\xb3\x07\x03ms-\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\t\xca\xf9\xb3\x07\x04!cliBj\n\x19\x63om.strongdm.api.plumbingB\x16ManagedSecretsPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
|
|
36
36
|
|
|
37
37
|
|
|
38
38
|
|
|
@@ -401,6 +401,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
|
401
401
|
_MANAGEDSECRETS.methods_by_name['Rotate']._serialized_options = b'\202\371\263\007\010\242\363\263\007\003put\202\371\263\007$\252\363\263\007\037/v1/managed-secrets/{id}/rotate'
|
|
402
402
|
_MANAGEDSECRETS.methods_by_name['Delete']._options = None
|
|
403
403
|
_MANAGEDSECRETS.methods_by_name['Delete']._serialized_options = b'\202\371\263\007\013\242\363\263\007\006delete\202\371\263\007\035\252\363\263\007\030/v1/managed-secrets/{id}'
|
|
404
|
+
_MANAGEDSECRETS.methods_by_name['ForceDelete']._options = None
|
|
405
|
+
_MANAGEDSECRETS.methods_by_name['ForceDelete']._serialized_options = b'\202\371\263\007\013\242\363\263\007\006delete\202\371\263\007#\252\363\263\007\036/v1/managed-secrets/{id}/force'
|
|
404
406
|
_MANAGEDSECRETS.methods_by_name['Get']._options = None
|
|
405
407
|
_MANAGEDSECRETS.methods_by_name['Get']._serialized_options = b'\202\371\263\007\010\242\363\263\007\003get\202\371\263\007\035\252\363\263\007\030/v1/managed-secrets/{id}'
|
|
406
408
|
_MANAGEDSECRETS.methods_by_name['Retrieve']._options = None
|
|
@@ -456,5 +458,5 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
|
456
458
|
_MANAGEDSECRETROTATIONPOLICY._serialized_start=4363
|
|
457
459
|
_MANAGEDSECRETROTATIONPOLICY._serialized_end=4404
|
|
458
460
|
_MANAGEDSECRETS._serialized_start=4407
|
|
459
|
-
_MANAGEDSECRETS._serialized_end=
|
|
461
|
+
_MANAGEDSECRETS._serialized_end=5891
|
|
460
462
|
# @@protoc_insertion_point(module_scope)
|
|
@@ -61,6 +61,11 @@ class ManagedSecretsStub(object):
|
|
|
61
61
|
request_serializer=managed__secrets__pb2.ManagedSecretDeleteRequest.SerializeToString,
|
|
62
62
|
response_deserializer=managed__secrets__pb2.ManagedSecretDeleteResponse.FromString,
|
|
63
63
|
)
|
|
64
|
+
self.ForceDelete = channel.unary_unary(
|
|
65
|
+
'/v1.ManagedSecrets/ForceDelete',
|
|
66
|
+
request_serializer=managed__secrets__pb2.ManagedSecretDeleteRequest.SerializeToString,
|
|
67
|
+
response_deserializer=managed__secrets__pb2.ManagedSecretDeleteResponse.FromString,
|
|
68
|
+
)
|
|
64
69
|
self.Get = channel.unary_unary(
|
|
65
70
|
'/v1.ManagedSecrets/Get',
|
|
66
71
|
request_serializer=managed__secrets__pb2.ManagedSecretGetRequest.SerializeToString,
|
|
@@ -131,6 +136,13 @@ class ManagedSecretsServicer(object):
|
|
|
131
136
|
context.set_details('Method not implemented!')
|
|
132
137
|
raise NotImplementedError('Method not implemented!')
|
|
133
138
|
|
|
139
|
+
def ForceDelete(self, request, context):
|
|
140
|
+
"""ForceDelete deletes a Managed Secret regardless of errors on external system
|
|
141
|
+
"""
|
|
142
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
|
143
|
+
context.set_details('Method not implemented!')
|
|
144
|
+
raise NotImplementedError('Method not implemented!')
|
|
145
|
+
|
|
134
146
|
def Get(self, request, context):
|
|
135
147
|
"""Get gets details of a Managed Secret without sensitive data
|
|
136
148
|
"""
|
|
@@ -194,6 +206,11 @@ def add_ManagedSecretsServicer_to_server(servicer, server):
|
|
|
194
206
|
request_deserializer=managed__secrets__pb2.ManagedSecretDeleteRequest.FromString,
|
|
195
207
|
response_serializer=managed__secrets__pb2.ManagedSecretDeleteResponse.SerializeToString,
|
|
196
208
|
),
|
|
209
|
+
'ForceDelete': grpc.unary_unary_rpc_method_handler(
|
|
210
|
+
servicer.ForceDelete,
|
|
211
|
+
request_deserializer=managed__secrets__pb2.ManagedSecretDeleteRequest.FromString,
|
|
212
|
+
response_serializer=managed__secrets__pb2.ManagedSecretDeleteResponse.SerializeToString,
|
|
213
|
+
),
|
|
197
214
|
'Get': grpc.unary_unary_rpc_method_handler(
|
|
198
215
|
servicer.Get,
|
|
199
216
|
request_deserializer=managed__secrets__pb2.ManagedSecretGetRequest.FromString,
|
|
@@ -329,6 +346,23 @@ class ManagedSecrets(object):
|
|
|
329
346
|
options, channel_credentials,
|
|
330
347
|
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
|
331
348
|
|
|
349
|
+
@staticmethod
|
|
350
|
+
def ForceDelete(request,
|
|
351
|
+
target,
|
|
352
|
+
options=(),
|
|
353
|
+
channel_credentials=None,
|
|
354
|
+
call_credentials=None,
|
|
355
|
+
insecure=False,
|
|
356
|
+
compression=None,
|
|
357
|
+
wait_for_ready=None,
|
|
358
|
+
timeout=None,
|
|
359
|
+
metadata=None):
|
|
360
|
+
return grpc.experimental.unary_unary(request, target, '/v1.ManagedSecrets/ForceDelete',
|
|
361
|
+
managed__secrets__pb2.ManagedSecretDeleteRequest.SerializeToString,
|
|
362
|
+
managed__secrets__pb2.ManagedSecretDeleteResponse.FromString,
|
|
363
|
+
options, channel_credentials,
|
|
364
|
+
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
|
|
365
|
+
|
|
332
366
|
@staticmethod
|
|
333
367
|
def Get(request,
|
|
334
368
|
target,
|
|
@@ -7844,158 +7844,6 @@ class AzureCertificate:
|
|
|
7844
7844
|
)
|
|
7845
7845
|
|
|
7846
7846
|
|
|
7847
|
-
class AzureConsole:
|
|
7848
|
-
'''
|
|
7849
|
-
AzureConsole is currently unstable, and its API may change, or it may be removed,
|
|
7850
|
-
without a major version bump.
|
|
7851
|
-
'''
|
|
7852
|
-
__slots__ = [
|
|
7853
|
-
'bind_interface',
|
|
7854
|
-
'connector_id',
|
|
7855
|
-
'egress_filter',
|
|
7856
|
-
'healthy',
|
|
7857
|
-
'id',
|
|
7858
|
-
'identity_set_id',
|
|
7859
|
-
'management_group_id',
|
|
7860
|
-
'name',
|
|
7861
|
-
'privilege_levels',
|
|
7862
|
-
'proxy_cluster_id',
|
|
7863
|
-
'secret_store_id',
|
|
7864
|
-
'subdomain',
|
|
7865
|
-
'subscription_id',
|
|
7866
|
-
'tags',
|
|
7867
|
-
]
|
|
7868
|
-
|
|
7869
|
-
def __init__(
|
|
7870
|
-
self,
|
|
7871
|
-
bind_interface=None,
|
|
7872
|
-
connector_id=None,
|
|
7873
|
-
egress_filter=None,
|
|
7874
|
-
healthy=None,
|
|
7875
|
-
id=None,
|
|
7876
|
-
identity_set_id=None,
|
|
7877
|
-
management_group_id=None,
|
|
7878
|
-
name=None,
|
|
7879
|
-
privilege_levels=None,
|
|
7880
|
-
proxy_cluster_id=None,
|
|
7881
|
-
secret_store_id=None,
|
|
7882
|
-
subdomain=None,
|
|
7883
|
-
subscription_id=None,
|
|
7884
|
-
tags=None,
|
|
7885
|
-
):
|
|
7886
|
-
self.bind_interface = bind_interface if bind_interface is not None else ''
|
|
7887
|
-
'''
|
|
7888
|
-
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
|
7889
|
-
'''
|
|
7890
|
-
self.connector_id = connector_id if connector_id is not None else ''
|
|
7891
|
-
'''
|
|
7892
|
-
The connector ID to authenticate through.
|
|
7893
|
-
'''
|
|
7894
|
-
self.egress_filter = egress_filter if egress_filter is not None else ''
|
|
7895
|
-
'''
|
|
7896
|
-
A filter applied to the routing logic to pin datasource to nodes.
|
|
7897
|
-
'''
|
|
7898
|
-
self.healthy = healthy if healthy is not None else False
|
|
7899
|
-
'''
|
|
7900
|
-
True if the datasource is reachable and the credentials are valid.
|
|
7901
|
-
'''
|
|
7902
|
-
self.id = id if id is not None else ''
|
|
7903
|
-
'''
|
|
7904
|
-
Unique identifier of the Resource.
|
|
7905
|
-
'''
|
|
7906
|
-
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
|
7907
|
-
'''
|
|
7908
|
-
The ID of the identity set to use for identity connections.
|
|
7909
|
-
'''
|
|
7910
|
-
self.management_group_id = management_group_id if management_group_id is not None else ''
|
|
7911
|
-
'''
|
|
7912
|
-
The management group ID to authenticate scope Privileges to.
|
|
7913
|
-
'''
|
|
7914
|
-
self.name = name if name is not None else ''
|
|
7915
|
-
'''
|
|
7916
|
-
Unique human-readable name of the Resource.
|
|
7917
|
-
'''
|
|
7918
|
-
self.privilege_levels = privilege_levels if privilege_levels is not None else ''
|
|
7919
|
-
'''
|
|
7920
|
-
The privilege levels specify which Groups are managed externally
|
|
7921
|
-
'''
|
|
7922
|
-
self.proxy_cluster_id = proxy_cluster_id if proxy_cluster_id is not None else ''
|
|
7923
|
-
'''
|
|
7924
|
-
ID of the proxy cluster for this resource, if any.
|
|
7925
|
-
'''
|
|
7926
|
-
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
|
7927
|
-
'''
|
|
7928
|
-
ID of the secret store containing credentials for this resource, if any.
|
|
7929
|
-
'''
|
|
7930
|
-
self.subdomain = subdomain if subdomain is not None else ''
|
|
7931
|
-
'''
|
|
7932
|
-
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
|
7933
|
-
'''
|
|
7934
|
-
self.subscription_id = subscription_id if subscription_id is not None else ''
|
|
7935
|
-
'''
|
|
7936
|
-
The subscription ID to authenticate scope Privileges to.
|
|
7937
|
-
'''
|
|
7938
|
-
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
7939
|
-
'''
|
|
7940
|
-
Tags is a map of key, value pairs.
|
|
7941
|
-
'''
|
|
7942
|
-
|
|
7943
|
-
def __repr__(self):
|
|
7944
|
-
return '<sdm.AzureConsole ' + \
|
|
7945
|
-
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
|
7946
|
-
'connector_id: ' + repr(self.connector_id) + ' ' +\
|
|
7947
|
-
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
|
7948
|
-
'healthy: ' + repr(self.healthy) + ' ' +\
|
|
7949
|
-
'id: ' + repr(self.id) + ' ' +\
|
|
7950
|
-
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
|
7951
|
-
'management_group_id: ' + repr(self.management_group_id) + ' ' +\
|
|
7952
|
-
'name: ' + repr(self.name) + ' ' +\
|
|
7953
|
-
'privilege_levels: ' + repr(self.privilege_levels) + ' ' +\
|
|
7954
|
-
'proxy_cluster_id: ' + repr(self.proxy_cluster_id) + ' ' +\
|
|
7955
|
-
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
|
7956
|
-
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
|
7957
|
-
'subscription_id: ' + repr(self.subscription_id) + ' ' +\
|
|
7958
|
-
'tags: ' + repr(self.tags) + ' ' +\
|
|
7959
|
-
'>'
|
|
7960
|
-
|
|
7961
|
-
def to_dict(self):
|
|
7962
|
-
return {
|
|
7963
|
-
'bind_interface': self.bind_interface,
|
|
7964
|
-
'connector_id': self.connector_id,
|
|
7965
|
-
'egress_filter': self.egress_filter,
|
|
7966
|
-
'healthy': self.healthy,
|
|
7967
|
-
'id': self.id,
|
|
7968
|
-
'identity_set_id': self.identity_set_id,
|
|
7969
|
-
'management_group_id': self.management_group_id,
|
|
7970
|
-
'name': self.name,
|
|
7971
|
-
'privilege_levels': self.privilege_levels,
|
|
7972
|
-
'proxy_cluster_id': self.proxy_cluster_id,
|
|
7973
|
-
'secret_store_id': self.secret_store_id,
|
|
7974
|
-
'subdomain': self.subdomain,
|
|
7975
|
-
'subscription_id': self.subscription_id,
|
|
7976
|
-
'tags': self.tags,
|
|
7977
|
-
}
|
|
7978
|
-
|
|
7979
|
-
@classmethod
|
|
7980
|
-
def from_dict(cls, d):
|
|
7981
|
-
return cls(
|
|
7982
|
-
bind_interface=d.get('bind_interface'),
|
|
7983
|
-
connector_id=d.get('connector_id'),
|
|
7984
|
-
egress_filter=d.get('egress_filter'),
|
|
7985
|
-
healthy=d.get('healthy'),
|
|
7986
|
-
id=d.get('id'),
|
|
7987
|
-
identity_set_id=d.get('identity_set_id'),
|
|
7988
|
-
management_group_id=d.get('management_group_id'),
|
|
7989
|
-
name=d.get('name'),
|
|
7990
|
-
privilege_levels=d.get('privilege_levels'),
|
|
7991
|
-
proxy_cluster_id=d.get('proxy_cluster_id'),
|
|
7992
|
-
secret_store_id=d.get('secret_store_id'),
|
|
7993
|
-
subdomain=d.get('subdomain'),
|
|
7994
|
-
subscription_id=d.get('subscription_id'),
|
|
7995
|
-
tags=d.get('tags'),
|
|
7996
|
-
)
|
|
7997
|
-
|
|
7998
|
-
|
|
7999
7847
|
class AzureMysql:
|
|
8000
7848
|
__slots__ = [
|
|
8001
7849
|
'bind_interface',
|
|
@@ -12487,6 +12335,185 @@ class ElasticacheRedis:
|
|
|
12487
12335
|
)
|
|
12488
12336
|
|
|
12489
12337
|
|
|
12338
|
+
class EntraID:
|
|
12339
|
+
'''
|
|
12340
|
+
EntraID is currently unstable, and its API may change, or it may be removed,
|
|
12341
|
+
without a major version bump.
|
|
12342
|
+
'''
|
|
12343
|
+
__slots__ = [
|
|
12344
|
+
'bind_interface',
|
|
12345
|
+
'discovery_enabled',
|
|
12346
|
+
'egress_filter',
|
|
12347
|
+
'group_names',
|
|
12348
|
+
'healthy',
|
|
12349
|
+
'id',
|
|
12350
|
+
'identity_set_id',
|
|
12351
|
+
'management_group_id',
|
|
12352
|
+
'name',
|
|
12353
|
+
'privilege_levels',
|
|
12354
|
+
'proxy_cluster_id',
|
|
12355
|
+
'resource_group_id',
|
|
12356
|
+
'secret_store_id',
|
|
12357
|
+
'subdomain',
|
|
12358
|
+
'subscription_id',
|
|
12359
|
+
'tags',
|
|
12360
|
+
'tenant_id',
|
|
12361
|
+
]
|
|
12362
|
+
|
|
12363
|
+
def __init__(
|
|
12364
|
+
self,
|
|
12365
|
+
bind_interface=None,
|
|
12366
|
+
discovery_enabled=None,
|
|
12367
|
+
egress_filter=None,
|
|
12368
|
+
group_names=None,
|
|
12369
|
+
healthy=None,
|
|
12370
|
+
id=None,
|
|
12371
|
+
identity_set_id=None,
|
|
12372
|
+
management_group_id=None,
|
|
12373
|
+
name=None,
|
|
12374
|
+
privilege_levels=None,
|
|
12375
|
+
proxy_cluster_id=None,
|
|
12376
|
+
resource_group_id=None,
|
|
12377
|
+
secret_store_id=None,
|
|
12378
|
+
subdomain=None,
|
|
12379
|
+
subscription_id=None,
|
|
12380
|
+
tags=None,
|
|
12381
|
+
tenant_id=None,
|
|
12382
|
+
):
|
|
12383
|
+
self.bind_interface = bind_interface if bind_interface is not None else ''
|
|
12384
|
+
'''
|
|
12385
|
+
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
|
12386
|
+
'''
|
|
12387
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
|
12388
|
+
'''
|
|
12389
|
+
If true, configures discovery of the tenant to be run from a node.
|
|
12390
|
+
'''
|
|
12391
|
+
self.egress_filter = egress_filter if egress_filter is not None else ''
|
|
12392
|
+
'''
|
|
12393
|
+
A filter applied to the routing logic to pin datasource to nodes.
|
|
12394
|
+
'''
|
|
12395
|
+
self.group_names = group_names if group_names is not None else ''
|
|
12396
|
+
'''
|
|
12397
|
+
comma separated list of group names to filter by. Supports wildcards (*)
|
|
12398
|
+
'''
|
|
12399
|
+
self.healthy = healthy if healthy is not None else False
|
|
12400
|
+
'''
|
|
12401
|
+
True if the datasource is reachable and the credentials are valid.
|
|
12402
|
+
'''
|
|
12403
|
+
self.id = id if id is not None else ''
|
|
12404
|
+
'''
|
|
12405
|
+
Unique identifier of the Resource.
|
|
12406
|
+
'''
|
|
12407
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
|
12408
|
+
'''
|
|
12409
|
+
The ID of the identity set to use for identity connections.
|
|
12410
|
+
'''
|
|
12411
|
+
self.management_group_id = management_group_id if management_group_id is not None else ''
|
|
12412
|
+
'''
|
|
12413
|
+
The management group ID to authenticate scope Privileges to.
|
|
12414
|
+
'''
|
|
12415
|
+
self.name = name if name is not None else ''
|
|
12416
|
+
'''
|
|
12417
|
+
Unique human-readable name of the Resource.
|
|
12418
|
+
'''
|
|
12419
|
+
self.privilege_levels = privilege_levels if privilege_levels is not None else ''
|
|
12420
|
+
'''
|
|
12421
|
+
The privilege levels specify which Groups are managed externally
|
|
12422
|
+
'''
|
|
12423
|
+
self.proxy_cluster_id = proxy_cluster_id if proxy_cluster_id is not None else ''
|
|
12424
|
+
'''
|
|
12425
|
+
ID of the proxy cluster for this resource, if any.
|
|
12426
|
+
'''
|
|
12427
|
+
self.resource_group_id = resource_group_id if resource_group_id is not None else ''
|
|
12428
|
+
'''
|
|
12429
|
+
filters discovered groups to the specified Resource Group
|
|
12430
|
+
'''
|
|
12431
|
+
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
|
12432
|
+
'''
|
|
12433
|
+
ID of the secret store containing credentials for this resource, if any.
|
|
12434
|
+
'''
|
|
12435
|
+
self.subdomain = subdomain if subdomain is not None else ''
|
|
12436
|
+
'''
|
|
12437
|
+
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
|
12438
|
+
'''
|
|
12439
|
+
self.subscription_id = subscription_id if subscription_id is not None else ''
|
|
12440
|
+
'''
|
|
12441
|
+
The subscription ID to authenticate scope Privileges to.
|
|
12442
|
+
'''
|
|
12443
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
12444
|
+
'''
|
|
12445
|
+
Tags is a map of key, value pairs.
|
|
12446
|
+
'''
|
|
12447
|
+
self.tenant_id = tenant_id if tenant_id is not None else ''
|
|
12448
|
+
'''
|
|
12449
|
+
The connector ID to authenticate through.
|
|
12450
|
+
'''
|
|
12451
|
+
|
|
12452
|
+
def __repr__(self):
|
|
12453
|
+
return '<sdm.EntraID ' + \
|
|
12454
|
+
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
|
12455
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
|
12456
|
+
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
|
12457
|
+
'group_names: ' + repr(self.group_names) + ' ' +\
|
|
12458
|
+
'healthy: ' + repr(self.healthy) + ' ' +\
|
|
12459
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
12460
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
|
12461
|
+
'management_group_id: ' + repr(self.management_group_id) + ' ' +\
|
|
12462
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
12463
|
+
'privilege_levels: ' + repr(self.privilege_levels) + ' ' +\
|
|
12464
|
+
'proxy_cluster_id: ' + repr(self.proxy_cluster_id) + ' ' +\
|
|
12465
|
+
'resource_group_id: ' + repr(self.resource_group_id) + ' ' +\
|
|
12466
|
+
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
|
12467
|
+
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
|
12468
|
+
'subscription_id: ' + repr(self.subscription_id) + ' ' +\
|
|
12469
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
12470
|
+
'tenant_id: ' + repr(self.tenant_id) + ' ' +\
|
|
12471
|
+
'>'
|
|
12472
|
+
|
|
12473
|
+
def to_dict(self):
|
|
12474
|
+
return {
|
|
12475
|
+
'bind_interface': self.bind_interface,
|
|
12476
|
+
'discovery_enabled': self.discovery_enabled,
|
|
12477
|
+
'egress_filter': self.egress_filter,
|
|
12478
|
+
'group_names': self.group_names,
|
|
12479
|
+
'healthy': self.healthy,
|
|
12480
|
+
'id': self.id,
|
|
12481
|
+
'identity_set_id': self.identity_set_id,
|
|
12482
|
+
'management_group_id': self.management_group_id,
|
|
12483
|
+
'name': self.name,
|
|
12484
|
+
'privilege_levels': self.privilege_levels,
|
|
12485
|
+
'proxy_cluster_id': self.proxy_cluster_id,
|
|
12486
|
+
'resource_group_id': self.resource_group_id,
|
|
12487
|
+
'secret_store_id': self.secret_store_id,
|
|
12488
|
+
'subdomain': self.subdomain,
|
|
12489
|
+
'subscription_id': self.subscription_id,
|
|
12490
|
+
'tags': self.tags,
|
|
12491
|
+
'tenant_id': self.tenant_id,
|
|
12492
|
+
}
|
|
12493
|
+
|
|
12494
|
+
@classmethod
|
|
12495
|
+
def from_dict(cls, d):
|
|
12496
|
+
return cls(
|
|
12497
|
+
bind_interface=d.get('bind_interface'),
|
|
12498
|
+
discovery_enabled=d.get('discovery_enabled'),
|
|
12499
|
+
egress_filter=d.get('egress_filter'),
|
|
12500
|
+
group_names=d.get('group_names'),
|
|
12501
|
+
healthy=d.get('healthy'),
|
|
12502
|
+
id=d.get('id'),
|
|
12503
|
+
identity_set_id=d.get('identity_set_id'),
|
|
12504
|
+
management_group_id=d.get('management_group_id'),
|
|
12505
|
+
name=d.get('name'),
|
|
12506
|
+
privilege_levels=d.get('privilege_levels'),
|
|
12507
|
+
proxy_cluster_id=d.get('proxy_cluster_id'),
|
|
12508
|
+
resource_group_id=d.get('resource_group_id'),
|
|
12509
|
+
secret_store_id=d.get('secret_store_id'),
|
|
12510
|
+
subdomain=d.get('subdomain'),
|
|
12511
|
+
subscription_id=d.get('subscription_id'),
|
|
12512
|
+
tags=d.get('tags'),
|
|
12513
|
+
tenant_id=d.get('tenant_id'),
|
|
12514
|
+
)
|
|
12515
|
+
|
|
12516
|
+
|
|
12490
12517
|
class GCP:
|
|
12491
12518
|
__slots__ = [
|
|
12492
12519
|
'bind_interface',
|
|
@@ -23534,6 +23561,7 @@ class RDPCert:
|
|
|
23534
23561
|
'port_override',
|
|
23535
23562
|
'proxy_cluster_id',
|
|
23536
23563
|
'secret_store_id',
|
|
23564
|
+
'sid',
|
|
23537
23565
|
'subdomain',
|
|
23538
23566
|
'tags',
|
|
23539
23567
|
'username',
|
|
@@ -23554,6 +23582,7 @@ class RDPCert:
|
|
|
23554
23582
|
port_override=None,
|
|
23555
23583
|
proxy_cluster_id=None,
|
|
23556
23584
|
secret_store_id=None,
|
|
23585
|
+
sid=None,
|
|
23557
23586
|
subdomain=None,
|
|
23558
23587
|
tags=None,
|
|
23559
23588
|
username=None,
|
|
@@ -23610,6 +23639,11 @@ class RDPCert:
|
|
|
23610
23639
|
'''
|
|
23611
23640
|
ID of the secret store containing credentials for this resource, if any.
|
|
23612
23641
|
'''
|
|
23642
|
+
self.sid = sid if sid is not None else ''
|
|
23643
|
+
'''
|
|
23644
|
+
The SID needed in leased credentials to generate a valid certificate.
|
|
23645
|
+
Using extraplain3 here as 1 and 2 are used in cert generation and internal driver config
|
|
23646
|
+
'''
|
|
23613
23647
|
self.subdomain = subdomain if subdomain is not None else ''
|
|
23614
23648
|
'''
|
|
23615
23649
|
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
|
@@ -23638,6 +23672,7 @@ class RDPCert:
|
|
|
23638
23672
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
|
23639
23673
|
'proxy_cluster_id: ' + repr(self.proxy_cluster_id) + ' ' +\
|
|
23640
23674
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
|
23675
|
+
'sid: ' + repr(self.sid) + ' ' +\
|
|
23641
23676
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
|
23642
23677
|
'tags: ' + repr(self.tags) + ' ' +\
|
|
23643
23678
|
'username: ' + repr(self.username) + ' ' +\
|
|
@@ -23659,6 +23694,7 @@ class RDPCert:
|
|
|
23659
23694
|
'port_override': self.port_override,
|
|
23660
23695
|
'proxy_cluster_id': self.proxy_cluster_id,
|
|
23661
23696
|
'secret_store_id': self.secret_store_id,
|
|
23697
|
+
'sid': self.sid,
|
|
23662
23698
|
'subdomain': self.subdomain,
|
|
23663
23699
|
'tags': self.tags,
|
|
23664
23700
|
'username': self.username,
|
|
@@ -23681,6 +23717,7 @@ class RDPCert:
|
|
|
23681
23717
|
port_override=d.get('port_override'),
|
|
23682
23718
|
proxy_cluster_id=d.get('proxy_cluster_id'),
|
|
23683
23719
|
secret_store_id=d.get('secret_store_id'),
|
|
23720
|
+
sid=d.get('sid'),
|
|
23684
23721
|
subdomain=d.get('subdomain'),
|
|
23685
23722
|
tags=d.get('tags'),
|
|
23686
23723
|
username=d.get('username'),
|
|
@@ -29,7 +29,7 @@ _sym_db = _symbol_database.Default()
|
|
|
29
29
|
from google.protobuf import descriptor_pb2 as google_dot_protobuf_dot_descriptor__pb2
|
|
30
30
|
|
|
31
31
|
|
|
32
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\roptions.proto\x12\x02v1\x1a google/protobuf/descriptor.proto\"9\n\x0b\x46ileOptions\x12\x11\n\x07targets\x18\xc4\xc1v \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xbd\x01\n\x0eServiceOptions\x12\x13\n\tmain_noun\x18\x98\xbfv \x01(\t\x12\x13\n\tid_prefix\x18\x9a\xbfv \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t\x12#\n\x19\x64isable_snapshot_vertical\x18\x9b\xbfv \x01(\x08\x12\x30\n&json_gateway_register_with_constructor\x18\x9d\xbfv \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"x\n\rMethodOptions\x12\x10\n\x06method\x18\xb4\xbev \x01(\t\x12\r\n\x03url\x18\xb5\xbev \x01(\t\x12\x1a\n\x10\x64\x65precation_date\x18\xb6\xbev \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xf2\x01\n\x0eMessageOptions\x12\x13\n\tporcelain\x18\xb5\xbev \x01(\x08\x12\x0f\n\x05\x65rror\x18\xb6\xbev \x01(\x05\x12\x17\n\roptions_field\x18\xb7\xbev \x01(\t\x12\x11\n\x07targets\x18\xba\xbev \x03(\t\x12+\n\x0eterraform_docs\x18\xb8\xbev \x01(\x0b\x32\x11.v1.TerraformDocs\x12#\n\x06\x63ustom\x18\xb9\xbev \x01(\x0b\x32\x11.v1.CustomOptions\x12#\n\x19terraform_datasource_only\x18\xbb\xbev \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"@\n\x0cOneofOptions\x12\x17\n\rcommon_fields\x18\x85\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\
|
|
32
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\roptions.proto\x12\x02v1\x1a google/protobuf/descriptor.proto\"9\n\x0b\x46ileOptions\x12\x11\n\x07targets\x18\xc4\xc1v \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xbd\x01\n\x0eServiceOptions\x12\x13\n\tmain_noun\x18\x98\xbfv \x01(\t\x12\x13\n\tid_prefix\x18\x9a\xbfv \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t\x12#\n\x19\x64isable_snapshot_vertical\x18\x9b\xbfv \x01(\x08\x12\x30\n&json_gateway_register_with_constructor\x18\x9d\xbfv \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"x\n\rMethodOptions\x12\x10\n\x06method\x18\xb4\xbev \x01(\t\x12\r\n\x03url\x18\xb5\xbev \x01(\t\x12\x1a\n\x10\x64\x65precation_date\x18\xb6\xbev \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xf2\x01\n\x0eMessageOptions\x12\x13\n\tporcelain\x18\xb5\xbev \x01(\x08\x12\x0f\n\x05\x65rror\x18\xb6\xbev \x01(\x05\x12\x17\n\roptions_field\x18\xb7\xbev \x01(\t\x12\x11\n\x07targets\x18\xba\xbev \x03(\t\x12+\n\x0eterraform_docs\x18\xb8\xbev \x01(\x0b\x32\x11.v1.TerraformDocs\x12#\n\x06\x63ustom\x18\xb9\xbev \x01(\x0b\x32\x11.v1.CustomOptions\x12#\n\x19terraform_datasource_only\x18\xbb\xbev \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"@\n\x0cOneofOptions\x12\x17\n\rcommon_fields\x18\x85\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xa5\x04\n\x0c\x46ieldOptions\x12\x13\n\tporcelain\x18\xb6\xbev \x01(\x08\x12\x12\n\x08iterable\x18\xb7\xbev \x01(\x08\x12\x12\n\x08required\x18\xb8\xbev \x01(\x08\x12\x14\n\nwrite_only\x18\xbd\xbev \x01(\x08\x12\x13\n\tread_only\x18\xc3\xbev \x01(\x08\x12\x17\n\ris_credential\x18\xc4\xbev \x01(\x08\x12\x11\n\x07targets\x18\xc6\xbev \x03(\t\x12\x1d\n\x13terraform_force_new\x18\xbc\xbev \x01(\x08\x12\x1d\n\x13terraform_sensitive\x18\xbe\xbev \x01(\x08\x12&\n\x1cterraform_diff_suppress_func\x18\xc7\xbev \x01(\t\x12\x1c\n\x12terraform_computed\x18\xca\xbev \x01(\x08\x12#\n\x06\x63ustom\x18\xb9\xbev \x01(\x0b\x32\x11.v1.CustomOptions\x12\x44\n\x12read_only_override\x18\xc0\xbev \x03(\x0b\x32&.v1.FieldOptions.ReadOnlyOverrideEntry\x12\x13\n\tcondition\x18\xcb\xbev \x01(\t\x12\x14\n\nconditions\x18\xcd\xbev \x03(\t\x12\x15\n\x0b\x65xpect_file\x18\xcc\xbev \x01(\x08\x1a\x37\n\x15ReadOnlyOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x08:\x02\x38\x01:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\x8f\x05\n\rCustomOptions\x12\x13\n\tconverter\x18\xbd\xbev \x01(\t\x12O\n\x17porcelain_type_override\x18\xbe\xbev \x03(\x0b\x32,.v1.CustomOptions.PorcelainTypeOverrideEntry\x12O\n\x17porcelain_name_override\x18\xc8\xbev \x03(\x0b\x32,.v1.CustomOptions.PorcelainNameOverrideEntry\x12\x42\n\x10\x63omment_override\x18\xd3\xbev \x03(\x0b\x32&.v1.CustomOptions.CommentOverrideEntry\x12H\n\x13\x64\x65precated_override\x18\xc0\xbev \x03(\x0b\x32).v1.CustomOptions.DeprecatedOverrideEntry\x12\x1d\n\x13terraform_elem_type\x18\xbf\xbev \x01(\t\x12\x12\n\x08unstable\x18\xc1\xbev \x01(\x08\x1a<\n\x1aPorcelainTypeOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a<\n\x1aPorcelainNameOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x36\n\x14\x43ommentOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x39\n\x17\x44\x65precatedOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x08:\x02\x38\x01:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"m\n\rTerraformDocs\x12\x1f\n\x15resource_example_path\x18\xb4\xbev \x01(\t\x12\"\n\x18\x64\x61ta_source_example_path\x18\xb5\xbev \x01(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway:E\n\x0c\x66ile_options\x12\x1c.google.protobuf.FileOptions\x18\xa8\xc2v \x01(\x0b\x32\x0f.v1.FileOptions:N\n\x0fservice_options\x12\x1f.google.protobuf.ServiceOptions\x18\x99\xbfv \x01(\x0b\x32\x12.v1.ServiceOptions:K\n\x0emethod_options\x12\x1e.google.protobuf.MethodOptions\x18\x90\xbfv \x01(\x0b\x32\x11.v1.MethodOptions:N\n\x0fmessage_options\x12\x1f.google.protobuf.MessageOptions\x18\x8f\xbfv \x01(\x0b\x32\x12.v1.MessageOptions:H\n\roneof_options\x12\x1d.google.protobuf.OneofOptions\x18\x85\xbfv \x01(\x0b\x32\x10.v1.OneofOptions:H\n\rfield_options\x12\x1d.google.protobuf.FieldOptions\x18\x8e\xbfv \x01(\x0b\x32\x10.v1.FieldOptionsBR\n\x19\x63om.strongdm.api.plumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
|
|
33
33
|
|
|
34
34
|
|
|
35
35
|
FILE_OPTIONS_FIELD_NUMBER = 1941800
|
|
@@ -201,19 +201,19 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
|
201
201
|
_ONEOFOPTIONS._serialized_start=673
|
|
202
202
|
_ONEOFOPTIONS._serialized_end=737
|
|
203
203
|
_FIELDOPTIONS._serialized_start=740
|
|
204
|
-
_FIELDOPTIONS._serialized_end=
|
|
205
|
-
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_start=
|
|
206
|
-
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_end=
|
|
207
|
-
_CUSTOMOPTIONS._serialized_start=
|
|
208
|
-
_CUSTOMOPTIONS._serialized_end=
|
|
209
|
-
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_start=
|
|
210
|
-
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_end=
|
|
211
|
-
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_start=
|
|
212
|
-
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_end=
|
|
213
|
-
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_start=
|
|
214
|
-
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_end=
|
|
215
|
-
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_start=
|
|
216
|
-
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_end=
|
|
217
|
-
_TERRAFORMDOCS._serialized_start=
|
|
218
|
-
_TERRAFORMDOCS._serialized_end=
|
|
204
|
+
_FIELDOPTIONS._serialized_end=1289
|
|
205
|
+
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_start=1209
|
|
206
|
+
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_end=1264
|
|
207
|
+
_CUSTOMOPTIONS._serialized_start=1292
|
|
208
|
+
_CUSTOMOPTIONS._serialized_end=1947
|
|
209
|
+
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_start=1685
|
|
210
|
+
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_end=1745
|
|
211
|
+
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_start=1747
|
|
212
|
+
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_end=1807
|
|
213
|
+
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_start=1809
|
|
214
|
+
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_end=1863
|
|
215
|
+
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_start=1865
|
|
216
|
+
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_end=1922
|
|
217
|
+
_TERRAFORMDOCS._serialized_start=1949
|
|
218
|
+
_TERRAFORMDOCS._serialized_end=2058
|
|
219
219
|
# @@protoc_insertion_point(module_scope)
|