strongdm 15.5.0__zip → 15.6.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-15.5.0 → strongdm-15.6.0}/PKG-INFO +2 -2
- {strongdm-15.5.0 → strongdm-15.6.0}/setup.py +2 -2
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/client.py +1 -1
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/drivers_pb2.py +292 -284
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/models.py +189 -152
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/options_pb2.py +16 -16
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/plumbing.py +64 -60
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/svc.py +1 -1
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-15.5.0 → strongdm-15.6.0}/LICENSE +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/README.md +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/setup.cfg +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/__init__.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/constants.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/errors.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/health_checks_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/health_checks_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/managed_secrets_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/managed_secrets_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/policies_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/policies_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/policies_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/policies_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/proxy_cluster_keys_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/proxy_cluster_keys_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_engine_policy_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_engine_policy_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_engine_types_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_engine_types_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_engines_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_engines_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-15.5.0 → strongdm-15.6.0}/strongdm.egg-info/top_level.txt +0 -0
|
@@ -7844,158 +7844,6 @@ class AzureCertificate:
|
|
|
7844
7844
|
)
|
|
7845
7845
|
|
|
7846
7846
|
|
|
7847
|
-
class AzureConsole:
|
|
7848
|
-
'''
|
|
7849
|
-
AzureConsole is currently unstable, and its API may change, or it may be removed,
|
|
7850
|
-
without a major version bump.
|
|
7851
|
-
'''
|
|
7852
|
-
__slots__ = [
|
|
7853
|
-
'bind_interface',
|
|
7854
|
-
'connector_id',
|
|
7855
|
-
'egress_filter',
|
|
7856
|
-
'healthy',
|
|
7857
|
-
'id',
|
|
7858
|
-
'identity_set_id',
|
|
7859
|
-
'management_group_id',
|
|
7860
|
-
'name',
|
|
7861
|
-
'privilege_levels',
|
|
7862
|
-
'proxy_cluster_id',
|
|
7863
|
-
'secret_store_id',
|
|
7864
|
-
'subdomain',
|
|
7865
|
-
'subscription_id',
|
|
7866
|
-
'tags',
|
|
7867
|
-
]
|
|
7868
|
-
|
|
7869
|
-
def __init__(
|
|
7870
|
-
self,
|
|
7871
|
-
bind_interface=None,
|
|
7872
|
-
connector_id=None,
|
|
7873
|
-
egress_filter=None,
|
|
7874
|
-
healthy=None,
|
|
7875
|
-
id=None,
|
|
7876
|
-
identity_set_id=None,
|
|
7877
|
-
management_group_id=None,
|
|
7878
|
-
name=None,
|
|
7879
|
-
privilege_levels=None,
|
|
7880
|
-
proxy_cluster_id=None,
|
|
7881
|
-
secret_store_id=None,
|
|
7882
|
-
subdomain=None,
|
|
7883
|
-
subscription_id=None,
|
|
7884
|
-
tags=None,
|
|
7885
|
-
):
|
|
7886
|
-
self.bind_interface = bind_interface if bind_interface is not None else ''
|
|
7887
|
-
'''
|
|
7888
|
-
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
|
7889
|
-
'''
|
|
7890
|
-
self.connector_id = connector_id if connector_id is not None else ''
|
|
7891
|
-
'''
|
|
7892
|
-
The connector ID to authenticate through.
|
|
7893
|
-
'''
|
|
7894
|
-
self.egress_filter = egress_filter if egress_filter is not None else ''
|
|
7895
|
-
'''
|
|
7896
|
-
A filter applied to the routing logic to pin datasource to nodes.
|
|
7897
|
-
'''
|
|
7898
|
-
self.healthy = healthy if healthy is not None else False
|
|
7899
|
-
'''
|
|
7900
|
-
True if the datasource is reachable and the credentials are valid.
|
|
7901
|
-
'''
|
|
7902
|
-
self.id = id if id is not None else ''
|
|
7903
|
-
'''
|
|
7904
|
-
Unique identifier of the Resource.
|
|
7905
|
-
'''
|
|
7906
|
-
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
|
7907
|
-
'''
|
|
7908
|
-
The ID of the identity set to use for identity connections.
|
|
7909
|
-
'''
|
|
7910
|
-
self.management_group_id = management_group_id if management_group_id is not None else ''
|
|
7911
|
-
'''
|
|
7912
|
-
The management group ID to authenticate scope Privileges to.
|
|
7913
|
-
'''
|
|
7914
|
-
self.name = name if name is not None else ''
|
|
7915
|
-
'''
|
|
7916
|
-
Unique human-readable name of the Resource.
|
|
7917
|
-
'''
|
|
7918
|
-
self.privilege_levels = privilege_levels if privilege_levels is not None else ''
|
|
7919
|
-
'''
|
|
7920
|
-
The privilege levels specify which Groups are managed externally
|
|
7921
|
-
'''
|
|
7922
|
-
self.proxy_cluster_id = proxy_cluster_id if proxy_cluster_id is not None else ''
|
|
7923
|
-
'''
|
|
7924
|
-
ID of the proxy cluster for this resource, if any.
|
|
7925
|
-
'''
|
|
7926
|
-
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
|
7927
|
-
'''
|
|
7928
|
-
ID of the secret store containing credentials for this resource, if any.
|
|
7929
|
-
'''
|
|
7930
|
-
self.subdomain = subdomain if subdomain is not None else ''
|
|
7931
|
-
'''
|
|
7932
|
-
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
|
7933
|
-
'''
|
|
7934
|
-
self.subscription_id = subscription_id if subscription_id is not None else ''
|
|
7935
|
-
'''
|
|
7936
|
-
The subscription ID to authenticate scope Privileges to.
|
|
7937
|
-
'''
|
|
7938
|
-
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
7939
|
-
'''
|
|
7940
|
-
Tags is a map of key, value pairs.
|
|
7941
|
-
'''
|
|
7942
|
-
|
|
7943
|
-
def __repr__(self):
|
|
7944
|
-
return '<sdm.AzureConsole ' + \
|
|
7945
|
-
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
|
7946
|
-
'connector_id: ' + repr(self.connector_id) + ' ' +\
|
|
7947
|
-
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
|
7948
|
-
'healthy: ' + repr(self.healthy) + ' ' +\
|
|
7949
|
-
'id: ' + repr(self.id) + ' ' +\
|
|
7950
|
-
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
|
7951
|
-
'management_group_id: ' + repr(self.management_group_id) + ' ' +\
|
|
7952
|
-
'name: ' + repr(self.name) + ' ' +\
|
|
7953
|
-
'privilege_levels: ' + repr(self.privilege_levels) + ' ' +\
|
|
7954
|
-
'proxy_cluster_id: ' + repr(self.proxy_cluster_id) + ' ' +\
|
|
7955
|
-
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
|
7956
|
-
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
|
7957
|
-
'subscription_id: ' + repr(self.subscription_id) + ' ' +\
|
|
7958
|
-
'tags: ' + repr(self.tags) + ' ' +\
|
|
7959
|
-
'>'
|
|
7960
|
-
|
|
7961
|
-
def to_dict(self):
|
|
7962
|
-
return {
|
|
7963
|
-
'bind_interface': self.bind_interface,
|
|
7964
|
-
'connector_id': self.connector_id,
|
|
7965
|
-
'egress_filter': self.egress_filter,
|
|
7966
|
-
'healthy': self.healthy,
|
|
7967
|
-
'id': self.id,
|
|
7968
|
-
'identity_set_id': self.identity_set_id,
|
|
7969
|
-
'management_group_id': self.management_group_id,
|
|
7970
|
-
'name': self.name,
|
|
7971
|
-
'privilege_levels': self.privilege_levels,
|
|
7972
|
-
'proxy_cluster_id': self.proxy_cluster_id,
|
|
7973
|
-
'secret_store_id': self.secret_store_id,
|
|
7974
|
-
'subdomain': self.subdomain,
|
|
7975
|
-
'subscription_id': self.subscription_id,
|
|
7976
|
-
'tags': self.tags,
|
|
7977
|
-
}
|
|
7978
|
-
|
|
7979
|
-
@classmethod
|
|
7980
|
-
def from_dict(cls, d):
|
|
7981
|
-
return cls(
|
|
7982
|
-
bind_interface=d.get('bind_interface'),
|
|
7983
|
-
connector_id=d.get('connector_id'),
|
|
7984
|
-
egress_filter=d.get('egress_filter'),
|
|
7985
|
-
healthy=d.get('healthy'),
|
|
7986
|
-
id=d.get('id'),
|
|
7987
|
-
identity_set_id=d.get('identity_set_id'),
|
|
7988
|
-
management_group_id=d.get('management_group_id'),
|
|
7989
|
-
name=d.get('name'),
|
|
7990
|
-
privilege_levels=d.get('privilege_levels'),
|
|
7991
|
-
proxy_cluster_id=d.get('proxy_cluster_id'),
|
|
7992
|
-
secret_store_id=d.get('secret_store_id'),
|
|
7993
|
-
subdomain=d.get('subdomain'),
|
|
7994
|
-
subscription_id=d.get('subscription_id'),
|
|
7995
|
-
tags=d.get('tags'),
|
|
7996
|
-
)
|
|
7997
|
-
|
|
7998
|
-
|
|
7999
7847
|
class AzureMysql:
|
|
8000
7848
|
__slots__ = [
|
|
8001
7849
|
'bind_interface',
|
|
@@ -12487,6 +12335,185 @@ class ElasticacheRedis:
|
|
|
12487
12335
|
)
|
|
12488
12336
|
|
|
12489
12337
|
|
|
12338
|
+
class EntraID:
|
|
12339
|
+
'''
|
|
12340
|
+
EntraID is currently unstable, and its API may change, or it may be removed,
|
|
12341
|
+
without a major version bump.
|
|
12342
|
+
'''
|
|
12343
|
+
__slots__ = [
|
|
12344
|
+
'bind_interface',
|
|
12345
|
+
'discovery_enabled',
|
|
12346
|
+
'egress_filter',
|
|
12347
|
+
'group_names',
|
|
12348
|
+
'healthy',
|
|
12349
|
+
'id',
|
|
12350
|
+
'identity_set_id',
|
|
12351
|
+
'management_group_id',
|
|
12352
|
+
'name',
|
|
12353
|
+
'privilege_levels',
|
|
12354
|
+
'proxy_cluster_id',
|
|
12355
|
+
'resource_group_id',
|
|
12356
|
+
'secret_store_id',
|
|
12357
|
+
'subdomain',
|
|
12358
|
+
'subscription_id',
|
|
12359
|
+
'tags',
|
|
12360
|
+
'tenant_id',
|
|
12361
|
+
]
|
|
12362
|
+
|
|
12363
|
+
def __init__(
|
|
12364
|
+
self,
|
|
12365
|
+
bind_interface=None,
|
|
12366
|
+
discovery_enabled=None,
|
|
12367
|
+
egress_filter=None,
|
|
12368
|
+
group_names=None,
|
|
12369
|
+
healthy=None,
|
|
12370
|
+
id=None,
|
|
12371
|
+
identity_set_id=None,
|
|
12372
|
+
management_group_id=None,
|
|
12373
|
+
name=None,
|
|
12374
|
+
privilege_levels=None,
|
|
12375
|
+
proxy_cluster_id=None,
|
|
12376
|
+
resource_group_id=None,
|
|
12377
|
+
secret_store_id=None,
|
|
12378
|
+
subdomain=None,
|
|
12379
|
+
subscription_id=None,
|
|
12380
|
+
tags=None,
|
|
12381
|
+
tenant_id=None,
|
|
12382
|
+
):
|
|
12383
|
+
self.bind_interface = bind_interface if bind_interface is not None else ''
|
|
12384
|
+
'''
|
|
12385
|
+
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
|
12386
|
+
'''
|
|
12387
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
|
12388
|
+
'''
|
|
12389
|
+
If true, configures discovery of the tenant to be run from a node.
|
|
12390
|
+
'''
|
|
12391
|
+
self.egress_filter = egress_filter if egress_filter is not None else ''
|
|
12392
|
+
'''
|
|
12393
|
+
A filter applied to the routing logic to pin datasource to nodes.
|
|
12394
|
+
'''
|
|
12395
|
+
self.group_names = group_names if group_names is not None else ''
|
|
12396
|
+
'''
|
|
12397
|
+
comma separated list of group names to filter by. Supports wildcards (*)
|
|
12398
|
+
'''
|
|
12399
|
+
self.healthy = healthy if healthy is not None else False
|
|
12400
|
+
'''
|
|
12401
|
+
True if the datasource is reachable and the credentials are valid.
|
|
12402
|
+
'''
|
|
12403
|
+
self.id = id if id is not None else ''
|
|
12404
|
+
'''
|
|
12405
|
+
Unique identifier of the Resource.
|
|
12406
|
+
'''
|
|
12407
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
|
12408
|
+
'''
|
|
12409
|
+
The ID of the identity set to use for identity connections.
|
|
12410
|
+
'''
|
|
12411
|
+
self.management_group_id = management_group_id if management_group_id is not None else ''
|
|
12412
|
+
'''
|
|
12413
|
+
The management group ID to authenticate scope Privileges to.
|
|
12414
|
+
'''
|
|
12415
|
+
self.name = name if name is not None else ''
|
|
12416
|
+
'''
|
|
12417
|
+
Unique human-readable name of the Resource.
|
|
12418
|
+
'''
|
|
12419
|
+
self.privilege_levels = privilege_levels if privilege_levels is not None else ''
|
|
12420
|
+
'''
|
|
12421
|
+
The privilege levels specify which Groups are managed externally
|
|
12422
|
+
'''
|
|
12423
|
+
self.proxy_cluster_id = proxy_cluster_id if proxy_cluster_id is not None else ''
|
|
12424
|
+
'''
|
|
12425
|
+
ID of the proxy cluster for this resource, if any.
|
|
12426
|
+
'''
|
|
12427
|
+
self.resource_group_id = resource_group_id if resource_group_id is not None else ''
|
|
12428
|
+
'''
|
|
12429
|
+
filters discovered groups to the specified Resource Group
|
|
12430
|
+
'''
|
|
12431
|
+
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
|
12432
|
+
'''
|
|
12433
|
+
ID of the secret store containing credentials for this resource, if any.
|
|
12434
|
+
'''
|
|
12435
|
+
self.subdomain = subdomain if subdomain is not None else ''
|
|
12436
|
+
'''
|
|
12437
|
+
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
|
12438
|
+
'''
|
|
12439
|
+
self.subscription_id = subscription_id if subscription_id is not None else ''
|
|
12440
|
+
'''
|
|
12441
|
+
The subscription ID to authenticate scope Privileges to.
|
|
12442
|
+
'''
|
|
12443
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
|
12444
|
+
'''
|
|
12445
|
+
Tags is a map of key, value pairs.
|
|
12446
|
+
'''
|
|
12447
|
+
self.tenant_id = tenant_id if tenant_id is not None else ''
|
|
12448
|
+
'''
|
|
12449
|
+
The connector ID to authenticate through.
|
|
12450
|
+
'''
|
|
12451
|
+
|
|
12452
|
+
def __repr__(self):
|
|
12453
|
+
return '<sdm.EntraID ' + \
|
|
12454
|
+
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
|
12455
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
|
12456
|
+
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
|
12457
|
+
'group_names: ' + repr(self.group_names) + ' ' +\
|
|
12458
|
+
'healthy: ' + repr(self.healthy) + ' ' +\
|
|
12459
|
+
'id: ' + repr(self.id) + ' ' +\
|
|
12460
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
|
12461
|
+
'management_group_id: ' + repr(self.management_group_id) + ' ' +\
|
|
12462
|
+
'name: ' + repr(self.name) + ' ' +\
|
|
12463
|
+
'privilege_levels: ' + repr(self.privilege_levels) + ' ' +\
|
|
12464
|
+
'proxy_cluster_id: ' + repr(self.proxy_cluster_id) + ' ' +\
|
|
12465
|
+
'resource_group_id: ' + repr(self.resource_group_id) + ' ' +\
|
|
12466
|
+
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
|
12467
|
+
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
|
12468
|
+
'subscription_id: ' + repr(self.subscription_id) + ' ' +\
|
|
12469
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
|
12470
|
+
'tenant_id: ' + repr(self.tenant_id) + ' ' +\
|
|
12471
|
+
'>'
|
|
12472
|
+
|
|
12473
|
+
def to_dict(self):
|
|
12474
|
+
return {
|
|
12475
|
+
'bind_interface': self.bind_interface,
|
|
12476
|
+
'discovery_enabled': self.discovery_enabled,
|
|
12477
|
+
'egress_filter': self.egress_filter,
|
|
12478
|
+
'group_names': self.group_names,
|
|
12479
|
+
'healthy': self.healthy,
|
|
12480
|
+
'id': self.id,
|
|
12481
|
+
'identity_set_id': self.identity_set_id,
|
|
12482
|
+
'management_group_id': self.management_group_id,
|
|
12483
|
+
'name': self.name,
|
|
12484
|
+
'privilege_levels': self.privilege_levels,
|
|
12485
|
+
'proxy_cluster_id': self.proxy_cluster_id,
|
|
12486
|
+
'resource_group_id': self.resource_group_id,
|
|
12487
|
+
'secret_store_id': self.secret_store_id,
|
|
12488
|
+
'subdomain': self.subdomain,
|
|
12489
|
+
'subscription_id': self.subscription_id,
|
|
12490
|
+
'tags': self.tags,
|
|
12491
|
+
'tenant_id': self.tenant_id,
|
|
12492
|
+
}
|
|
12493
|
+
|
|
12494
|
+
@classmethod
|
|
12495
|
+
def from_dict(cls, d):
|
|
12496
|
+
return cls(
|
|
12497
|
+
bind_interface=d.get('bind_interface'),
|
|
12498
|
+
discovery_enabled=d.get('discovery_enabled'),
|
|
12499
|
+
egress_filter=d.get('egress_filter'),
|
|
12500
|
+
group_names=d.get('group_names'),
|
|
12501
|
+
healthy=d.get('healthy'),
|
|
12502
|
+
id=d.get('id'),
|
|
12503
|
+
identity_set_id=d.get('identity_set_id'),
|
|
12504
|
+
management_group_id=d.get('management_group_id'),
|
|
12505
|
+
name=d.get('name'),
|
|
12506
|
+
privilege_levels=d.get('privilege_levels'),
|
|
12507
|
+
proxy_cluster_id=d.get('proxy_cluster_id'),
|
|
12508
|
+
resource_group_id=d.get('resource_group_id'),
|
|
12509
|
+
secret_store_id=d.get('secret_store_id'),
|
|
12510
|
+
subdomain=d.get('subdomain'),
|
|
12511
|
+
subscription_id=d.get('subscription_id'),
|
|
12512
|
+
tags=d.get('tags'),
|
|
12513
|
+
tenant_id=d.get('tenant_id'),
|
|
12514
|
+
)
|
|
12515
|
+
|
|
12516
|
+
|
|
12490
12517
|
class GCP:
|
|
12491
12518
|
__slots__ = [
|
|
12492
12519
|
'bind_interface',
|
|
@@ -23534,6 +23561,7 @@ class RDPCert:
|
|
|
23534
23561
|
'port_override',
|
|
23535
23562
|
'proxy_cluster_id',
|
|
23536
23563
|
'secret_store_id',
|
|
23564
|
+
'sid',
|
|
23537
23565
|
'subdomain',
|
|
23538
23566
|
'tags',
|
|
23539
23567
|
'username',
|
|
@@ -23554,6 +23582,7 @@ class RDPCert:
|
|
|
23554
23582
|
port_override=None,
|
|
23555
23583
|
proxy_cluster_id=None,
|
|
23556
23584
|
secret_store_id=None,
|
|
23585
|
+
sid=None,
|
|
23557
23586
|
subdomain=None,
|
|
23558
23587
|
tags=None,
|
|
23559
23588
|
username=None,
|
|
@@ -23610,6 +23639,11 @@ class RDPCert:
|
|
|
23610
23639
|
'''
|
|
23611
23640
|
ID of the secret store containing credentials for this resource, if any.
|
|
23612
23641
|
'''
|
|
23642
|
+
self.sid = sid if sid is not None else ''
|
|
23643
|
+
'''
|
|
23644
|
+
The SID needed in leased credentials to generate a valid certificate.
|
|
23645
|
+
Using extraplain3 here as 1 and 2 are used in cert generation and internal driver config
|
|
23646
|
+
'''
|
|
23613
23647
|
self.subdomain = subdomain if subdomain is not None else ''
|
|
23614
23648
|
'''
|
|
23615
23649
|
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
|
@@ -23638,6 +23672,7 @@ class RDPCert:
|
|
|
23638
23672
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
|
23639
23673
|
'proxy_cluster_id: ' + repr(self.proxy_cluster_id) + ' ' +\
|
|
23640
23674
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
|
23675
|
+
'sid: ' + repr(self.sid) + ' ' +\
|
|
23641
23676
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
|
23642
23677
|
'tags: ' + repr(self.tags) + ' ' +\
|
|
23643
23678
|
'username: ' + repr(self.username) + ' ' +\
|
|
@@ -23659,6 +23694,7 @@ class RDPCert:
|
|
|
23659
23694
|
'port_override': self.port_override,
|
|
23660
23695
|
'proxy_cluster_id': self.proxy_cluster_id,
|
|
23661
23696
|
'secret_store_id': self.secret_store_id,
|
|
23697
|
+
'sid': self.sid,
|
|
23662
23698
|
'subdomain': self.subdomain,
|
|
23663
23699
|
'tags': self.tags,
|
|
23664
23700
|
'username': self.username,
|
|
@@ -23681,6 +23717,7 @@ class RDPCert:
|
|
|
23681
23717
|
port_override=d.get('port_override'),
|
|
23682
23718
|
proxy_cluster_id=d.get('proxy_cluster_id'),
|
|
23683
23719
|
secret_store_id=d.get('secret_store_id'),
|
|
23720
|
+
sid=d.get('sid'),
|
|
23684
23721
|
subdomain=d.get('subdomain'),
|
|
23685
23722
|
tags=d.get('tags'),
|
|
23686
23723
|
username=d.get('username'),
|
|
@@ -29,7 +29,7 @@ _sym_db = _symbol_database.Default()
|
|
|
29
29
|
from google.protobuf import descriptor_pb2 as google_dot_protobuf_dot_descriptor__pb2
|
|
30
30
|
|
|
31
31
|
|
|
32
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\roptions.proto\x12\x02v1\x1a google/protobuf/descriptor.proto\"9\n\x0b\x46ileOptions\x12\x11\n\x07targets\x18\xc4\xc1v \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xbd\x01\n\x0eServiceOptions\x12\x13\n\tmain_noun\x18\x98\xbfv \x01(\t\x12\x13\n\tid_prefix\x18\x9a\xbfv \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t\x12#\n\x19\x64isable_snapshot_vertical\x18\x9b\xbfv \x01(\x08\x12\x30\n&json_gateway_register_with_constructor\x18\x9d\xbfv \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"x\n\rMethodOptions\x12\x10\n\x06method\x18\xb4\xbev \x01(\t\x12\r\n\x03url\x18\xb5\xbev \x01(\t\x12\x1a\n\x10\x64\x65precation_date\x18\xb6\xbev \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xf2\x01\n\x0eMessageOptions\x12\x13\n\tporcelain\x18\xb5\xbev \x01(\x08\x12\x0f\n\x05\x65rror\x18\xb6\xbev \x01(\x05\x12\x17\n\roptions_field\x18\xb7\xbev \x01(\t\x12\x11\n\x07targets\x18\xba\xbev \x03(\t\x12+\n\x0eterraform_docs\x18\xb8\xbev \x01(\x0b\x32\x11.v1.TerraformDocs\x12#\n\x06\x63ustom\x18\xb9\xbev \x01(\x0b\x32\x11.v1.CustomOptions\x12#\n\x19terraform_datasource_only\x18\xbb\xbev \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"@\n\x0cOneofOptions\x12\x17\n\rcommon_fields\x18\x85\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\
|
|
32
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\roptions.proto\x12\x02v1\x1a google/protobuf/descriptor.proto\"9\n\x0b\x46ileOptions\x12\x11\n\x07targets\x18\xc4\xc1v \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xbd\x01\n\x0eServiceOptions\x12\x13\n\tmain_noun\x18\x98\xbfv \x01(\t\x12\x13\n\tid_prefix\x18\x9a\xbfv \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t\x12#\n\x19\x64isable_snapshot_vertical\x18\x9b\xbfv \x01(\x08\x12\x30\n&json_gateway_register_with_constructor\x18\x9d\xbfv \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"x\n\rMethodOptions\x12\x10\n\x06method\x18\xb4\xbev \x01(\t\x12\r\n\x03url\x18\xb5\xbev \x01(\t\x12\x1a\n\x10\x64\x65precation_date\x18\xb6\xbev \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xf2\x01\n\x0eMessageOptions\x12\x13\n\tporcelain\x18\xb5\xbev \x01(\x08\x12\x0f\n\x05\x65rror\x18\xb6\xbev \x01(\x05\x12\x17\n\roptions_field\x18\xb7\xbev \x01(\t\x12\x11\n\x07targets\x18\xba\xbev \x03(\t\x12+\n\x0eterraform_docs\x18\xb8\xbev \x01(\x0b\x32\x11.v1.TerraformDocs\x12#\n\x06\x63ustom\x18\xb9\xbev \x01(\x0b\x32\x11.v1.CustomOptions\x12#\n\x19terraform_datasource_only\x18\xbb\xbev \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"@\n\x0cOneofOptions\x12\x17\n\rcommon_fields\x18\x85\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xa5\x04\n\x0c\x46ieldOptions\x12\x13\n\tporcelain\x18\xb6\xbev \x01(\x08\x12\x12\n\x08iterable\x18\xb7\xbev \x01(\x08\x12\x12\n\x08required\x18\xb8\xbev \x01(\x08\x12\x14\n\nwrite_only\x18\xbd\xbev \x01(\x08\x12\x13\n\tread_only\x18\xc3\xbev \x01(\x08\x12\x17\n\ris_credential\x18\xc4\xbev \x01(\x08\x12\x11\n\x07targets\x18\xc6\xbev \x03(\t\x12\x1d\n\x13terraform_force_new\x18\xbc\xbev \x01(\x08\x12\x1d\n\x13terraform_sensitive\x18\xbe\xbev \x01(\x08\x12&\n\x1cterraform_diff_suppress_func\x18\xc7\xbev \x01(\t\x12\x1c\n\x12terraform_computed\x18\xca\xbev \x01(\x08\x12#\n\x06\x63ustom\x18\xb9\xbev \x01(\x0b\x32\x11.v1.CustomOptions\x12\x44\n\x12read_only_override\x18\xc0\xbev \x03(\x0b\x32&.v1.FieldOptions.ReadOnlyOverrideEntry\x12\x13\n\tcondition\x18\xcb\xbev \x01(\t\x12\x14\n\nconditions\x18\xcd\xbev \x03(\t\x12\x15\n\x0b\x65xpect_file\x18\xcc\xbev \x01(\x08\x1a\x37\n\x15ReadOnlyOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x08:\x02\x38\x01:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\x8f\x05\n\rCustomOptions\x12\x13\n\tconverter\x18\xbd\xbev \x01(\t\x12O\n\x17porcelain_type_override\x18\xbe\xbev \x03(\x0b\x32,.v1.CustomOptions.PorcelainTypeOverrideEntry\x12O\n\x17porcelain_name_override\x18\xc8\xbev \x03(\x0b\x32,.v1.CustomOptions.PorcelainNameOverrideEntry\x12\x42\n\x10\x63omment_override\x18\xd3\xbev \x03(\x0b\x32&.v1.CustomOptions.CommentOverrideEntry\x12H\n\x13\x64\x65precated_override\x18\xc0\xbev \x03(\x0b\x32).v1.CustomOptions.DeprecatedOverrideEntry\x12\x1d\n\x13terraform_elem_type\x18\xbf\xbev \x01(\t\x12\x12\n\x08unstable\x18\xc1\xbev \x01(\x08\x1a<\n\x1aPorcelainTypeOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a<\n\x1aPorcelainNameOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x36\n\x14\x43ommentOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x39\n\x17\x44\x65precatedOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x08:\x02\x38\x01:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"m\n\rTerraformDocs\x12\x1f\n\x15resource_example_path\x18\xb4\xbev \x01(\t\x12\"\n\x18\x64\x61ta_source_example_path\x18\xb5\xbev \x01(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway:E\n\x0c\x66ile_options\x12\x1c.google.protobuf.FileOptions\x18\xa8\xc2v \x01(\x0b\x32\x0f.v1.FileOptions:N\n\x0fservice_options\x12\x1f.google.protobuf.ServiceOptions\x18\x99\xbfv \x01(\x0b\x32\x12.v1.ServiceOptions:K\n\x0emethod_options\x12\x1e.google.protobuf.MethodOptions\x18\x90\xbfv \x01(\x0b\x32\x11.v1.MethodOptions:N\n\x0fmessage_options\x12\x1f.google.protobuf.MessageOptions\x18\x8f\xbfv \x01(\x0b\x32\x12.v1.MessageOptions:H\n\roneof_options\x12\x1d.google.protobuf.OneofOptions\x18\x85\xbfv \x01(\x0b\x32\x10.v1.OneofOptions:H\n\rfield_options\x12\x1d.google.protobuf.FieldOptions\x18\x8e\xbfv \x01(\x0b\x32\x10.v1.FieldOptionsBR\n\x19\x63om.strongdm.api.plumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
|
|
33
33
|
|
|
34
34
|
|
|
35
35
|
FILE_OPTIONS_FIELD_NUMBER = 1941800
|
|
@@ -201,19 +201,19 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
|
201
201
|
_ONEOFOPTIONS._serialized_start=673
|
|
202
202
|
_ONEOFOPTIONS._serialized_end=737
|
|
203
203
|
_FIELDOPTIONS._serialized_start=740
|
|
204
|
-
_FIELDOPTIONS._serialized_end=
|
|
205
|
-
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_start=
|
|
206
|
-
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_end=
|
|
207
|
-
_CUSTOMOPTIONS._serialized_start=
|
|
208
|
-
_CUSTOMOPTIONS._serialized_end=
|
|
209
|
-
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_start=
|
|
210
|
-
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_end=
|
|
211
|
-
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_start=
|
|
212
|
-
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_end=
|
|
213
|
-
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_start=
|
|
214
|
-
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_end=
|
|
215
|
-
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_start=
|
|
216
|
-
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_end=
|
|
217
|
-
_TERRAFORMDOCS._serialized_start=
|
|
218
|
-
_TERRAFORMDOCS._serialized_end=
|
|
204
|
+
_FIELDOPTIONS._serialized_end=1289
|
|
205
|
+
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_start=1209
|
|
206
|
+
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_end=1264
|
|
207
|
+
_CUSTOMOPTIONS._serialized_start=1292
|
|
208
|
+
_CUSTOMOPTIONS._serialized_end=1947
|
|
209
|
+
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_start=1685
|
|
210
|
+
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_end=1745
|
|
211
|
+
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_start=1747
|
|
212
|
+
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_end=1807
|
|
213
|
+
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_start=1809
|
|
214
|
+
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_end=1863
|
|
215
|
+
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_start=1865
|
|
216
|
+
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_end=1922
|
|
217
|
+
_TERRAFORMDOCS._serialized_start=1949
|
|
218
|
+
_TERRAFORMDOCS._serialized_end=2058
|
|
219
219
|
# @@protoc_insertion_point(module_scope)
|
|
@@ -3929,61 +3929,6 @@ def convert_repeated_azure_certificate_to_porcelain(plumbings):
|
|
|
3929
3929
|
]
|
|
3930
3930
|
|
|
3931
3931
|
|
|
3932
|
-
def convert_azure_console_to_porcelain(plumbing):
|
|
3933
|
-
if plumbing is None:
|
|
3934
|
-
return None
|
|
3935
|
-
porcelain = models.AzureConsole()
|
|
3936
|
-
porcelain.bind_interface = (plumbing.bind_interface)
|
|
3937
|
-
porcelain.connector_id = (plumbing.connector_id)
|
|
3938
|
-
porcelain.egress_filter = (plumbing.egress_filter)
|
|
3939
|
-
porcelain.healthy = (plumbing.healthy)
|
|
3940
|
-
porcelain.id = (plumbing.id)
|
|
3941
|
-
porcelain.identity_set_id = (plumbing.identity_set_id)
|
|
3942
|
-
porcelain.management_group_id = (plumbing.management_group_id)
|
|
3943
|
-
porcelain.name = (plumbing.name)
|
|
3944
|
-
porcelain.privilege_levels = (plumbing.privilege_levels)
|
|
3945
|
-
porcelain.proxy_cluster_id = (plumbing.proxy_cluster_id)
|
|
3946
|
-
porcelain.secret_store_id = (plumbing.secret_store_id)
|
|
3947
|
-
porcelain.subdomain = (plumbing.subdomain)
|
|
3948
|
-
porcelain.subscription_id = (plumbing.subscription_id)
|
|
3949
|
-
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
3950
|
-
return porcelain
|
|
3951
|
-
|
|
3952
|
-
|
|
3953
|
-
def convert_azure_console_to_plumbing(porcelain):
|
|
3954
|
-
plumbing = AzureConsole()
|
|
3955
|
-
if porcelain is None:
|
|
3956
|
-
return plumbing
|
|
3957
|
-
plumbing.bind_interface = (porcelain.bind_interface)
|
|
3958
|
-
plumbing.connector_id = (porcelain.connector_id)
|
|
3959
|
-
plumbing.egress_filter = (porcelain.egress_filter)
|
|
3960
|
-
plumbing.healthy = (porcelain.healthy)
|
|
3961
|
-
plumbing.id = (porcelain.id)
|
|
3962
|
-
plumbing.identity_set_id = (porcelain.identity_set_id)
|
|
3963
|
-
plumbing.management_group_id = (porcelain.management_group_id)
|
|
3964
|
-
plumbing.name = (porcelain.name)
|
|
3965
|
-
plumbing.privilege_levels = (porcelain.privilege_levels)
|
|
3966
|
-
plumbing.proxy_cluster_id = (porcelain.proxy_cluster_id)
|
|
3967
|
-
plumbing.secret_store_id = (porcelain.secret_store_id)
|
|
3968
|
-
plumbing.subdomain = (porcelain.subdomain)
|
|
3969
|
-
plumbing.subscription_id = (porcelain.subscription_id)
|
|
3970
|
-
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
|
3971
|
-
return plumbing
|
|
3972
|
-
|
|
3973
|
-
|
|
3974
|
-
def convert_repeated_azure_console_to_plumbing(porcelains):
|
|
3975
|
-
return [
|
|
3976
|
-
convert_azure_console_to_plumbing(porcelain)
|
|
3977
|
-
for porcelain in porcelains
|
|
3978
|
-
]
|
|
3979
|
-
|
|
3980
|
-
|
|
3981
|
-
def convert_repeated_azure_console_to_porcelain(plumbings):
|
|
3982
|
-
return [
|
|
3983
|
-
convert_azure_console_to_porcelain(plumbing) for plumbing in plumbings
|
|
3984
|
-
]
|
|
3985
|
-
|
|
3986
|
-
|
|
3987
3932
|
def convert_azure_mysql_to_porcelain(plumbing):
|
|
3988
3933
|
if plumbing is None:
|
|
3989
3934
|
return None
|
|
@@ -5749,6 +5694,64 @@ def convert_repeated_elasticache_redis_to_porcelain(plumbings):
|
|
|
5749
5694
|
]
|
|
5750
5695
|
|
|
5751
5696
|
|
|
5697
|
+
def convert_entra_id_to_porcelain(plumbing):
|
|
5698
|
+
if plumbing is None:
|
|
5699
|
+
return None
|
|
5700
|
+
porcelain = models.EntraID()
|
|
5701
|
+
porcelain.bind_interface = (plumbing.bind_interface)
|
|
5702
|
+
porcelain.discovery_enabled = (plumbing.discovery_enabled)
|
|
5703
|
+
porcelain.egress_filter = (plumbing.egress_filter)
|
|
5704
|
+
porcelain.group_names = (plumbing.group_names)
|
|
5705
|
+
porcelain.healthy = (plumbing.healthy)
|
|
5706
|
+
porcelain.id = (plumbing.id)
|
|
5707
|
+
porcelain.identity_set_id = (plumbing.identity_set_id)
|
|
5708
|
+
porcelain.management_group_id = (plumbing.management_group_id)
|
|
5709
|
+
porcelain.name = (plumbing.name)
|
|
5710
|
+
porcelain.privilege_levels = (plumbing.privilege_levels)
|
|
5711
|
+
porcelain.proxy_cluster_id = (plumbing.proxy_cluster_id)
|
|
5712
|
+
porcelain.resource_group_id = (plumbing.resource_group_id)
|
|
5713
|
+
porcelain.secret_store_id = (plumbing.secret_store_id)
|
|
5714
|
+
porcelain.subdomain = (plumbing.subdomain)
|
|
5715
|
+
porcelain.subscription_id = (plumbing.subscription_id)
|
|
5716
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
5717
|
+
porcelain.tenant_id = (plumbing.tenant_id)
|
|
5718
|
+
return porcelain
|
|
5719
|
+
|
|
5720
|
+
|
|
5721
|
+
def convert_entra_id_to_plumbing(porcelain):
|
|
5722
|
+
plumbing = EntraID()
|
|
5723
|
+
if porcelain is None:
|
|
5724
|
+
return plumbing
|
|
5725
|
+
plumbing.bind_interface = (porcelain.bind_interface)
|
|
5726
|
+
plumbing.discovery_enabled = (porcelain.discovery_enabled)
|
|
5727
|
+
plumbing.egress_filter = (porcelain.egress_filter)
|
|
5728
|
+
plumbing.group_names = (porcelain.group_names)
|
|
5729
|
+
plumbing.healthy = (porcelain.healthy)
|
|
5730
|
+
plumbing.id = (porcelain.id)
|
|
5731
|
+
plumbing.identity_set_id = (porcelain.identity_set_id)
|
|
5732
|
+
plumbing.management_group_id = (porcelain.management_group_id)
|
|
5733
|
+
plumbing.name = (porcelain.name)
|
|
5734
|
+
plumbing.privilege_levels = (porcelain.privilege_levels)
|
|
5735
|
+
plumbing.proxy_cluster_id = (porcelain.proxy_cluster_id)
|
|
5736
|
+
plumbing.resource_group_id = (porcelain.resource_group_id)
|
|
5737
|
+
plumbing.secret_store_id = (porcelain.secret_store_id)
|
|
5738
|
+
plumbing.subdomain = (porcelain.subdomain)
|
|
5739
|
+
plumbing.subscription_id = (porcelain.subscription_id)
|
|
5740
|
+
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
|
5741
|
+
plumbing.tenant_id = (porcelain.tenant_id)
|
|
5742
|
+
return plumbing
|
|
5743
|
+
|
|
5744
|
+
|
|
5745
|
+
def convert_repeated_entra_id_to_plumbing(porcelains):
|
|
5746
|
+
return [
|
|
5747
|
+
convert_entra_id_to_plumbing(porcelain) for porcelain in porcelains
|
|
5748
|
+
]
|
|
5749
|
+
|
|
5750
|
+
|
|
5751
|
+
def convert_repeated_entra_id_to_porcelain(plumbings):
|
|
5752
|
+
return [convert_entra_id_to_porcelain(plumbing) for plumbing in plumbings]
|
|
5753
|
+
|
|
5754
|
+
|
|
5752
5755
|
def convert_gcp_to_porcelain(plumbing):
|
|
5753
5756
|
if plumbing is None:
|
|
5754
5757
|
return None
|
|
@@ -11208,6 +11211,7 @@ def convert_rdp_cert_to_porcelain(plumbing):
|
|
|
11208
11211
|
porcelain.port_override = (plumbing.port_override)
|
|
11209
11212
|
porcelain.proxy_cluster_id = (plumbing.proxy_cluster_id)
|
|
11210
11213
|
porcelain.secret_store_id = (plumbing.secret_store_id)
|
|
11214
|
+
porcelain.sid = (plumbing.sid)
|
|
11211
11215
|
porcelain.subdomain = (plumbing.subdomain)
|
|
11212
11216
|
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
|
11213
11217
|
porcelain.username = (plumbing.username)
|
|
@@ -11232,6 +11236,7 @@ def convert_rdp_cert_to_plumbing(porcelain):
|
|
|
11232
11236
|
plumbing.port_override = (porcelain.port_override)
|
|
11233
11237
|
plumbing.proxy_cluster_id = (porcelain.proxy_cluster_id)
|
|
11234
11238
|
plumbing.secret_store_id = (porcelain.secret_store_id)
|
|
11239
|
+
plumbing.sid = (porcelain.sid)
|
|
11235
11240
|
plumbing.subdomain = (porcelain.subdomain)
|
|
11236
11241
|
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
|
11237
11242
|
plumbing.username = (porcelain.username)
|
|
@@ -12313,9 +12318,6 @@ def convert_resource_to_plumbing(porcelain):
|
|
|
12313
12318
|
if isinstance(porcelain, models.AzureCertificate):
|
|
12314
12319
|
plumbing.azure_certificate.CopyFrom(
|
|
12315
12320
|
convert_azure_certificate_to_plumbing(porcelain))
|
|
12316
|
-
if isinstance(porcelain, models.AzureConsole):
|
|
12317
|
-
plumbing.azure_console.CopyFrom(
|
|
12318
|
-
convert_azure_console_to_plumbing(porcelain))
|
|
12319
12321
|
if isinstance(porcelain, models.AzureMysql):
|
|
12320
12322
|
plumbing.azure_mysql.CopyFrom(
|
|
12321
12323
|
convert_azure_mysql_to_plumbing(porcelain))
|
|
@@ -12381,6 +12383,8 @@ def convert_resource_to_plumbing(porcelain):
|
|
|
12381
12383
|
if isinstance(porcelain, models.ElasticacheRedis):
|
|
12382
12384
|
plumbing.elasticache_redis.CopyFrom(
|
|
12383
12385
|
convert_elasticache_redis_to_plumbing(porcelain))
|
|
12386
|
+
if isinstance(porcelain, models.EntraID):
|
|
12387
|
+
plumbing.entra_id.CopyFrom(convert_entra_id_to_plumbing(porcelain))
|
|
12384
12388
|
if isinstance(porcelain, models.GCP):
|
|
12385
12389
|
plumbing.gcp.CopyFrom(convert_gcp_to_plumbing(porcelain))
|
|
12386
12390
|
if isinstance(porcelain, models.GCPConsole):
|
|
@@ -12590,8 +12594,6 @@ def convert_resource_to_porcelain(plumbing):
|
|
|
12590
12594
|
if plumbing.HasField('azure_certificate'):
|
|
12591
12595
|
return convert_azure_certificate_to_porcelain(
|
|
12592
12596
|
plumbing.azure_certificate)
|
|
12593
|
-
if plumbing.HasField('azure_console'):
|
|
12594
|
-
return convert_azure_console_to_porcelain(plumbing.azure_console)
|
|
12595
12597
|
if plumbing.HasField('azure_mysql'):
|
|
12596
12598
|
return convert_azure_mysql_to_porcelain(plumbing.azure_mysql)
|
|
12597
12599
|
if plumbing.HasField('azure_mysql_managed_identity'):
|
|
@@ -12650,6 +12652,8 @@ def convert_resource_to_porcelain(plumbing):
|
|
|
12650
12652
|
if plumbing.HasField('elasticache_redis'):
|
|
12651
12653
|
return convert_elasticache_redis_to_porcelain(
|
|
12652
12654
|
plumbing.elasticache_redis)
|
|
12655
|
+
if plumbing.HasField('entra_id'):
|
|
12656
|
+
return convert_entra_id_to_porcelain(plumbing.entra_id)
|
|
12653
12657
|
if plumbing.HasField('gcp'):
|
|
12654
12658
|
return convert_gcp_to_porcelain(plumbing.gcp)
|
|
12655
12659
|
if plumbing.HasField('gcp_console'):
|
|
@@ -5348,7 +5348,6 @@ class Resources:
|
|
|
5348
5348
|
`strongdm.models.AWSInstanceProfile`
|
|
5349
5349
|
`strongdm.models.Azure`
|
|
5350
5350
|
`strongdm.models.AzureCertificate`
|
|
5351
|
-
`strongdm.models.AzureConsole`
|
|
5352
5351
|
`strongdm.models.AzureMysql`
|
|
5353
5352
|
`strongdm.models.AzureMysqlManagedIdentity`
|
|
5354
5353
|
`strongdm.models.AzurePostgres`
|
|
@@ -5374,6 +5373,7 @@ class Resources:
|
|
|
5374
5373
|
`strongdm.models.DynamoDBIAM`
|
|
5375
5374
|
`strongdm.models.Elastic`
|
|
5376
5375
|
`strongdm.models.ElasticacheRedis`
|
|
5376
|
+
`strongdm.models.EntraID`
|
|
5377
5377
|
`strongdm.models.GCP`
|
|
5378
5378
|
`strongdm.models.GCPConsole`
|
|
5379
5379
|
`strongdm.models.GCPWIF`
|
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: strongdm
|
|
3
|
-
Version: 15.
|
|
3
|
+
Version: 15.6.0
|
|
4
4
|
Summary: strongDM SDK for the Python programming language.
|
|
5
5
|
Home-page: https://github.com/strongdm/strongdm-sdk-python
|
|
6
6
|
Author: strongDM Team
|
|
7
7
|
Author-email: sdk-feedback@strongdm.com
|
|
8
8
|
License: apache-2.0
|
|
9
|
-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v15.
|
|
9
|
+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v15.6.0.tar.gz
|
|
10
10
|
Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
|
|
11
11
|
Platform: UNKNOWN
|
|
12
12
|
Classifier: Development Status :: 4 - Beta
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|