strongdm 3.12.0__zip → 3.14.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-3.12.0 → strongdm-3.14.0}/PKG-INFO +2 -2
- {strongdm-3.12.0 → strongdm-3.14.0}/setup.py +2 -2
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_resources_pb2.py +6 -4
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/client.py +1 -1
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/constants.py +2 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/drivers_pb2.py +162 -146
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/models.py +70 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/organization_history_pb2.py +6 -4
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/plumbing.py +19 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-3.12.0 → strongdm-3.14.0}/README.md +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/setup.cfg +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/__init__.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/errors.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/options_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/svc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-3.12.0 → strongdm-3.14.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -720,10 +720,12 @@ class AWS:
|
|
720
720
|
'healthy',
|
721
721
|
'id',
|
722
722
|
'name',
|
723
|
+
'port_override',
|
723
724
|
'role_arn',
|
724
725
|
'role_external_id',
|
725
726
|
'secret_access_key',
|
726
727
|
'secret_store_id',
|
728
|
+
'subdomain',
|
727
729
|
'tags',
|
728
730
|
]
|
729
731
|
|
@@ -736,10 +738,12 @@ class AWS:
|
|
736
738
|
healthy=None,
|
737
739
|
id=None,
|
738
740
|
name=None,
|
741
|
+
port_override=None,
|
739
742
|
role_arn=None,
|
740
743
|
role_external_id=None,
|
741
744
|
secret_access_key=None,
|
742
745
|
secret_store_id=None,
|
746
|
+
subdomain=None,
|
743
747
|
tags=None,
|
744
748
|
):
|
745
749
|
self.access_key = access_key if access_key is not None else ''
|
@@ -764,6 +768,7 @@ class AWS:
|
|
764
768
|
'''
|
765
769
|
Unique human-readable name of the Resource.
|
766
770
|
'''
|
771
|
+
self.port_override = port_override if port_override is not None else 0
|
767
772
|
self.role_arn = role_arn if role_arn is not None else ''
|
768
773
|
self.role_external_id = role_external_id if role_external_id is not None else ''
|
769
774
|
self.secret_access_key = secret_access_key if secret_access_key is not None else ''
|
@@ -771,6 +776,10 @@ class AWS:
|
|
771
776
|
'''
|
772
777
|
ID of the secret store containing credentials for this resource, if any.
|
773
778
|
'''
|
779
|
+
self.subdomain = subdomain if subdomain is not None else ''
|
780
|
+
'''
|
781
|
+
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
782
|
+
'''
|
774
783
|
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
775
784
|
'''
|
776
785
|
Tags is a map of key, value pairs.
|
@@ -785,10 +794,12 @@ class AWS:
|
|
785
794
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
786
795
|
'id: ' + repr(self.id) + ' ' +\
|
787
796
|
'name: ' + repr(self.name) + ' ' +\
|
797
|
+
'port_override: ' + repr(self.port_override) + ' ' +\
|
788
798
|
'role_arn: ' + repr(self.role_arn) + ' ' +\
|
789
799
|
'role_external_id: ' + repr(self.role_external_id) + ' ' +\
|
790
800
|
'secret_access_key: ' + repr(self.secret_access_key) + ' ' +\
|
791
801
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
802
|
+
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
792
803
|
'tags: ' + repr(self.tags) + ' ' +\
|
793
804
|
'>'
|
794
805
|
|
@@ -801,10 +812,12 @@ class AWS:
|
|
801
812
|
'healthy': self.healthy,
|
802
813
|
'id': self.id,
|
803
814
|
'name': self.name,
|
815
|
+
'port_override': self.port_override,
|
804
816
|
'role_arn': self.role_arn,
|
805
817
|
'role_external_id': self.role_external_id,
|
806
818
|
'secret_access_key': self.secret_access_key,
|
807
819
|
'secret_store_id': self.secret_store_id,
|
820
|
+
'subdomain': self.subdomain,
|
808
821
|
'tags': self.tags,
|
809
822
|
}
|
810
823
|
|
@@ -818,10 +831,12 @@ class AWS:
|
|
818
831
|
healthy=d.get('healthy'),
|
819
832
|
id=d.get('id'),
|
820
833
|
name=d.get('name'),
|
834
|
+
port_override=d.get('port_override'),
|
821
835
|
role_arn=d.get('role_arn'),
|
822
836
|
role_external_id=d.get('role_external_id'),
|
823
837
|
secret_access_key=d.get('secret_access_key'),
|
824
838
|
secret_store_id=d.get('secret_store_id'),
|
839
|
+
subdomain=d.get('subdomain'),
|
825
840
|
tags=d.get('tags'),
|
826
841
|
)
|
827
842
|
|
@@ -2026,6 +2041,7 @@ class AccountResource:
|
|
2026
2041
|
__slots__ = [
|
2027
2042
|
'account_grant_id',
|
2028
2043
|
'account_id',
|
2044
|
+
'created_at',
|
2029
2045
|
'expires_at',
|
2030
2046
|
'granted_at',
|
2031
2047
|
'resource_id',
|
@@ -2036,6 +2052,7 @@ class AccountResource:
|
|
2036
2052
|
self,
|
2037
2053
|
account_grant_id=None,
|
2038
2054
|
account_id=None,
|
2055
|
+
created_at=None,
|
2039
2056
|
expires_at=None,
|
2040
2057
|
granted_at=None,
|
2041
2058
|
resource_id=None,
|
@@ -2050,6 +2067,11 @@ class AccountResource:
|
|
2050
2067
|
'''
|
2051
2068
|
The unique identifier of the Account to which access is granted.
|
2052
2069
|
'''
|
2070
|
+
self.created_at = created_at if created_at is not None else None
|
2071
|
+
'''
|
2072
|
+
The time this grant was created, distinct from 'granted at' in the case where access is scheduled
|
2073
|
+
for the future. If access was granted, revoked, and granted again, this will reflect the later creation time.
|
2074
|
+
'''
|
2053
2075
|
self.expires_at = expires_at if expires_at is not None else None
|
2054
2076
|
'''
|
2055
2077
|
The time at which access will expire. If empty, this access has no expiration.
|
@@ -2073,6 +2095,7 @@ class AccountResource:
|
|
2073
2095
|
return '<sdm.AccountResource ' + \
|
2074
2096
|
'account_grant_id: ' + repr(self.account_grant_id) + ' ' +\
|
2075
2097
|
'account_id: ' + repr(self.account_id) + ' ' +\
|
2098
|
+
'created_at: ' + repr(self.created_at) + ' ' +\
|
2076
2099
|
'expires_at: ' + repr(self.expires_at) + ' ' +\
|
2077
2100
|
'granted_at: ' + repr(self.granted_at) + ' ' +\
|
2078
2101
|
'resource_id: ' + repr(self.resource_id) + ' ' +\
|
@@ -2083,6 +2106,7 @@ class AccountResource:
|
|
2083
2106
|
return {
|
2084
2107
|
'account_grant_id': self.account_grant_id,
|
2085
2108
|
'account_id': self.account_id,
|
2109
|
+
'created_at': self.created_at,
|
2086
2110
|
'expires_at': self.expires_at,
|
2087
2111
|
'granted_at': self.granted_at,
|
2088
2112
|
'resource_id': self.resource_id,
|
@@ -2094,6 +2118,7 @@ class AccountResource:
|
|
2094
2118
|
return cls(
|
2095
2119
|
account_grant_id=d.get('account_grant_id'),
|
2096
2120
|
account_id=d.get('account_id'),
|
2121
|
+
created_at=d.get('created_at'),
|
2097
2122
|
expires_at=d.get('expires_at'),
|
2098
2123
|
granted_at=d.get('granted_at'),
|
2099
2124
|
resource_id=d.get('resource_id'),
|
@@ -3796,7 +3821,9 @@ class Azure:
|
|
3796
3821
|
'id',
|
3797
3822
|
'name',
|
3798
3823
|
'password',
|
3824
|
+
'port_override',
|
3799
3825
|
'secret_store_id',
|
3826
|
+
'subdomain',
|
3800
3827
|
'tags',
|
3801
3828
|
'tenant_id',
|
3802
3829
|
]
|
@@ -3810,7 +3837,9 @@ class Azure:
|
|
3810
3837
|
id=None,
|
3811
3838
|
name=None,
|
3812
3839
|
password=None,
|
3840
|
+
port_override=None,
|
3813
3841
|
secret_store_id=None,
|
3842
|
+
subdomain=None,
|
3814
3843
|
tags=None,
|
3815
3844
|
tenant_id=None,
|
3816
3845
|
):
|
@@ -3836,10 +3865,15 @@ class Azure:
|
|
3836
3865
|
Unique human-readable name of the Resource.
|
3837
3866
|
'''
|
3838
3867
|
self.password = password if password is not None else ''
|
3868
|
+
self.port_override = port_override if port_override is not None else 0
|
3839
3869
|
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
3840
3870
|
'''
|
3841
3871
|
ID of the secret store containing credentials for this resource, if any.
|
3842
3872
|
'''
|
3873
|
+
self.subdomain = subdomain if subdomain is not None else ''
|
3874
|
+
'''
|
3875
|
+
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
3876
|
+
'''
|
3843
3877
|
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
3844
3878
|
'''
|
3845
3879
|
Tags is a map of key, value pairs.
|
@@ -3855,7 +3889,9 @@ class Azure:
|
|
3855
3889
|
'id: ' + repr(self.id) + ' ' +\
|
3856
3890
|
'name: ' + repr(self.name) + ' ' +\
|
3857
3891
|
'password: ' + repr(self.password) + ' ' +\
|
3892
|
+
'port_override: ' + repr(self.port_override) + ' ' +\
|
3858
3893
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
3894
|
+
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
3859
3895
|
'tags: ' + repr(self.tags) + ' ' +\
|
3860
3896
|
'tenant_id: ' + repr(self.tenant_id) + ' ' +\
|
3861
3897
|
'>'
|
@@ -3869,7 +3905,9 @@ class Azure:
|
|
3869
3905
|
'id': self.id,
|
3870
3906
|
'name': self.name,
|
3871
3907
|
'password': self.password,
|
3908
|
+
'port_override': self.port_override,
|
3872
3909
|
'secret_store_id': self.secret_store_id,
|
3910
|
+
'subdomain': self.subdomain,
|
3873
3911
|
'tags': self.tags,
|
3874
3912
|
'tenant_id': self.tenant_id,
|
3875
3913
|
}
|
@@ -3884,7 +3922,9 @@ class Azure:
|
|
3884
3922
|
id=d.get('id'),
|
3885
3923
|
name=d.get('name'),
|
3886
3924
|
password=d.get('password'),
|
3925
|
+
port_override=d.get('port_override'),
|
3887
3926
|
secret_store_id=d.get('secret_store_id'),
|
3927
|
+
subdomain=d.get('subdomain'),
|
3888
3928
|
tags=d.get('tags'),
|
3889
3929
|
tenant_id=d.get('tenant_id'),
|
3890
3930
|
)
|
@@ -3899,7 +3939,9 @@ class AzureCertificate:
|
|
3899
3939
|
'healthy',
|
3900
3940
|
'id',
|
3901
3941
|
'name',
|
3942
|
+
'port_override',
|
3902
3943
|
'secret_store_id',
|
3944
|
+
'subdomain',
|
3903
3945
|
'tags',
|
3904
3946
|
'tenant_id',
|
3905
3947
|
]
|
@@ -3913,7 +3955,9 @@ class AzureCertificate:
|
|
3913
3955
|
healthy=None,
|
3914
3956
|
id=None,
|
3915
3957
|
name=None,
|
3958
|
+
port_override=None,
|
3916
3959
|
secret_store_id=None,
|
3960
|
+
subdomain=None,
|
3917
3961
|
tags=None,
|
3918
3962
|
tenant_id=None,
|
3919
3963
|
):
|
@@ -3939,10 +3983,15 @@ class AzureCertificate:
|
|
3939
3983
|
'''
|
3940
3984
|
Unique human-readable name of the Resource.
|
3941
3985
|
'''
|
3986
|
+
self.port_override = port_override if port_override is not None else 0
|
3942
3987
|
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
3943
3988
|
'''
|
3944
3989
|
ID of the secret store containing credentials for this resource, if any.
|
3945
3990
|
'''
|
3991
|
+
self.subdomain = subdomain if subdomain is not None else ''
|
3992
|
+
'''
|
3993
|
+
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
3994
|
+
'''
|
3946
3995
|
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
3947
3996
|
'''
|
3948
3997
|
Tags is a map of key, value pairs.
|
@@ -3958,7 +4007,9 @@ class AzureCertificate:
|
|
3958
4007
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
3959
4008
|
'id: ' + repr(self.id) + ' ' +\
|
3960
4009
|
'name: ' + repr(self.name) + ' ' +\
|
4010
|
+
'port_override: ' + repr(self.port_override) + ' ' +\
|
3961
4011
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
4012
|
+
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
3962
4013
|
'tags: ' + repr(self.tags) + ' ' +\
|
3963
4014
|
'tenant_id: ' + repr(self.tenant_id) + ' ' +\
|
3964
4015
|
'>'
|
@@ -3972,7 +4023,9 @@ class AzureCertificate:
|
|
3972
4023
|
'healthy': self.healthy,
|
3973
4024
|
'id': self.id,
|
3974
4025
|
'name': self.name,
|
4026
|
+
'port_override': self.port_override,
|
3975
4027
|
'secret_store_id': self.secret_store_id,
|
4028
|
+
'subdomain': self.subdomain,
|
3976
4029
|
'tags': self.tags,
|
3977
4030
|
'tenant_id': self.tenant_id,
|
3978
4031
|
}
|
@@ -3987,7 +4040,9 @@ class AzureCertificate:
|
|
3987
4040
|
healthy=d.get('healthy'),
|
3988
4041
|
id=d.get('id'),
|
3989
4042
|
name=d.get('name'),
|
4043
|
+
port_override=d.get('port_override'),
|
3990
4044
|
secret_store_id=d.get('secret_store_id'),
|
4045
|
+
subdomain=d.get('subdomain'),
|
3991
4046
|
tags=d.get('tags'),
|
3992
4047
|
tenant_id=d.get('tenant_id'),
|
3993
4048
|
)
|
@@ -6405,8 +6460,10 @@ class GCP:
|
|
6405
6460
|
'id',
|
6406
6461
|
'keyfile',
|
6407
6462
|
'name',
|
6463
|
+
'port_override',
|
6408
6464
|
'scopes',
|
6409
6465
|
'secret_store_id',
|
6466
|
+
'subdomain',
|
6410
6467
|
'tags',
|
6411
6468
|
]
|
6412
6469
|
|
@@ -6418,8 +6475,10 @@ class GCP:
|
|
6418
6475
|
id=None,
|
6419
6476
|
keyfile=None,
|
6420
6477
|
name=None,
|
6478
|
+
port_override=None,
|
6421
6479
|
scopes=None,
|
6422
6480
|
secret_store_id=None,
|
6481
|
+
subdomain=None,
|
6423
6482
|
tags=None,
|
6424
6483
|
):
|
6425
6484
|
self.bind_interface = bind_interface if bind_interface is not None else ''
|
@@ -6443,11 +6502,16 @@ class GCP:
|
|
6443
6502
|
'''
|
6444
6503
|
Unique human-readable name of the Resource.
|
6445
6504
|
'''
|
6505
|
+
self.port_override = port_override if port_override is not None else 0
|
6446
6506
|
self.scopes = scopes if scopes is not None else ''
|
6447
6507
|
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
6448
6508
|
'''
|
6449
6509
|
ID of the secret store containing credentials for this resource, if any.
|
6450
6510
|
'''
|
6511
|
+
self.subdomain = subdomain if subdomain is not None else ''
|
6512
|
+
'''
|
6513
|
+
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
6514
|
+
'''
|
6451
6515
|
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
6452
6516
|
'''
|
6453
6517
|
Tags is a map of key, value pairs.
|
@@ -6461,8 +6525,10 @@ class GCP:
|
|
6461
6525
|
'id: ' + repr(self.id) + ' ' +\
|
6462
6526
|
'keyfile: ' + repr(self.keyfile) + ' ' +\
|
6463
6527
|
'name: ' + repr(self.name) + ' ' +\
|
6528
|
+
'port_override: ' + repr(self.port_override) + ' ' +\
|
6464
6529
|
'scopes: ' + repr(self.scopes) + ' ' +\
|
6465
6530
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
6531
|
+
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
6466
6532
|
'tags: ' + repr(self.tags) + ' ' +\
|
6467
6533
|
'>'
|
6468
6534
|
|
@@ -6474,8 +6540,10 @@ class GCP:
|
|
6474
6540
|
'id': self.id,
|
6475
6541
|
'keyfile': self.keyfile,
|
6476
6542
|
'name': self.name,
|
6543
|
+
'port_override': self.port_override,
|
6477
6544
|
'scopes': self.scopes,
|
6478
6545
|
'secret_store_id': self.secret_store_id,
|
6546
|
+
'subdomain': self.subdomain,
|
6479
6547
|
'tags': self.tags,
|
6480
6548
|
}
|
6481
6549
|
|
@@ -6488,8 +6556,10 @@ class GCP:
|
|
6488
6556
|
id=d.get('id'),
|
6489
6557
|
keyfile=d.get('keyfile'),
|
6490
6558
|
name=d.get('name'),
|
6559
|
+
port_override=d.get('port_override'),
|
6491
6560
|
scopes=d.get('scopes'),
|
6492
6561
|
secret_store_id=d.get('secret_store_id'),
|
6562
|
+
subdomain=d.get('subdomain'),
|
6493
6563
|
tags=d.get('tags'),
|
6494
6564
|
)
|
6495
6565
|
|
@@ -32,7 +32,7 @@ from . import options_pb2 as options__pb2
|
|
32
32
|
from . import spec_pb2 as spec__pb2
|
33
33
|
|
34
34
|
|
35
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\
|
35
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xf4\n\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
|
36
36
|
|
37
37
|
|
38
38
|
|
@@ -139,6 +139,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
139
139
|
_ORGANIZATION.fields_by_name['saml_metadata_url']._serialized_options = b'\362\370\263\007$\260\363\263\007\001\312\363\263\007\032\302\364\263\007\025\n\002go\022\017SAMLMetadataURL'
|
140
140
|
_ORGANIZATION.fields_by_name['kind']._options = None
|
141
141
|
_ORGANIZATION.fields_by_name['kind']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
142
|
+
_ORGANIZATION.fields_by_name['id']._options = None
|
143
|
+
_ORGANIZATION.fields_by_name['id']._serialized_options = b'\362\370\263\007\024\260\363\263\007\001\262\364\263\007\ngo_private'
|
142
144
|
_ORGANIZATION._options = None
|
143
145
|
_ORGANIZATION._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
|
144
146
|
_ORGANIZATIONHISTORY._options = None
|
@@ -152,7 +154,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
152
154
|
_ORGANIZATIONHISTORYRECORD._serialized_start=538
|
153
155
|
_ORGANIZATIONHISTORYRECORD._serialized_end=761
|
154
156
|
_ORGANIZATION._serialized_start=764
|
155
|
-
_ORGANIZATION._serialized_end=
|
156
|
-
_ORGANIZATIONHISTORY._serialized_start=
|
157
|
-
_ORGANIZATIONHISTORY._serialized_end=
|
157
|
+
_ORGANIZATION._serialized_end=2160
|
158
|
+
_ORGANIZATIONHISTORY._serialized_start=2163
|
159
|
+
_ORGANIZATIONHISTORY._serialized_end=2402
|
158
160
|
# @@protoc_insertion_point(module_scope)
|
@@ -428,10 +428,12 @@ def convert_aws_to_porcelain(plumbing):
|
|
428
428
|
porcelain.healthy = (plumbing.healthy)
|
429
429
|
porcelain.id = (plumbing.id)
|
430
430
|
porcelain.name = (plumbing.name)
|
431
|
+
porcelain.port_override = (plumbing.port_override)
|
431
432
|
porcelain.role_arn = (plumbing.role_arn)
|
432
433
|
porcelain.role_external_id = (plumbing.role_external_id)
|
433
434
|
porcelain.secret_access_key = (plumbing.secret_access_key)
|
434
435
|
porcelain.secret_store_id = (plumbing.secret_store_id)
|
436
|
+
porcelain.subdomain = (plumbing.subdomain)
|
435
437
|
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
436
438
|
return porcelain
|
437
439
|
|
@@ -447,10 +449,12 @@ def convert_aws_to_plumbing(porcelain):
|
|
447
449
|
plumbing.healthy = (porcelain.healthy)
|
448
450
|
plumbing.id = (porcelain.id)
|
449
451
|
plumbing.name = (porcelain.name)
|
452
|
+
plumbing.port_override = (porcelain.port_override)
|
450
453
|
plumbing.role_arn = (porcelain.role_arn)
|
451
454
|
plumbing.role_external_id = (porcelain.role_external_id)
|
452
455
|
plumbing.secret_access_key = (porcelain.secret_access_key)
|
453
456
|
plumbing.secret_store_id = (porcelain.secret_store_id)
|
457
|
+
plumbing.subdomain = (porcelain.subdomain)
|
454
458
|
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
455
459
|
return plumbing
|
456
460
|
|
@@ -1233,6 +1237,7 @@ def convert_account_resource_to_porcelain(plumbing):
|
|
1233
1237
|
porcelain = models.AccountResource()
|
1234
1238
|
porcelain.account_grant_id = (plumbing.account_grant_id)
|
1235
1239
|
porcelain.account_id = (plumbing.account_id)
|
1240
|
+
porcelain.created_at = convert_timestamp_to_porcelain(plumbing.created_at)
|
1236
1241
|
porcelain.expires_at = convert_timestamp_to_porcelain(plumbing.expires_at)
|
1237
1242
|
porcelain.granted_at = convert_timestamp_to_porcelain(plumbing.granted_at)
|
1238
1243
|
porcelain.resource_id = (plumbing.resource_id)
|
@@ -1246,6 +1251,8 @@ def convert_account_resource_to_plumbing(porcelain):
|
|
1246
1251
|
return plumbing
|
1247
1252
|
plumbing.account_grant_id = (porcelain.account_grant_id)
|
1248
1253
|
plumbing.account_id = (porcelain.account_id)
|
1254
|
+
plumbing.created_at.CopyFrom(
|
1255
|
+
convert_timestamp_to_plumbing(porcelain.created_at))
|
1249
1256
|
plumbing.expires_at.CopyFrom(
|
1250
1257
|
convert_timestamp_to_plumbing(porcelain.expires_at))
|
1251
1258
|
plumbing.granted_at.CopyFrom(
|
@@ -2049,7 +2056,9 @@ def convert_azure_to_porcelain(plumbing):
|
|
2049
2056
|
porcelain.id = (plumbing.id)
|
2050
2057
|
porcelain.name = (plumbing.name)
|
2051
2058
|
porcelain.password = (plumbing.password)
|
2059
|
+
porcelain.port_override = (plumbing.port_override)
|
2052
2060
|
porcelain.secret_store_id = (plumbing.secret_store_id)
|
2061
|
+
porcelain.subdomain = (plumbing.subdomain)
|
2053
2062
|
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
2054
2063
|
porcelain.tenant_id = (plumbing.tenant_id)
|
2055
2064
|
return porcelain
|
@@ -2066,7 +2075,9 @@ def convert_azure_to_plumbing(porcelain):
|
|
2066
2075
|
plumbing.id = (porcelain.id)
|
2067
2076
|
plumbing.name = (porcelain.name)
|
2068
2077
|
plumbing.password = (porcelain.password)
|
2078
|
+
plumbing.port_override = (porcelain.port_override)
|
2069
2079
|
plumbing.secret_store_id = (porcelain.secret_store_id)
|
2080
|
+
plumbing.subdomain = (porcelain.subdomain)
|
2070
2081
|
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
2071
2082
|
plumbing.tenant_id = (porcelain.tenant_id)
|
2072
2083
|
return plumbing
|
@@ -2091,7 +2102,9 @@ def convert_azure_certificate_to_porcelain(plumbing):
|
|
2091
2102
|
porcelain.healthy = (plumbing.healthy)
|
2092
2103
|
porcelain.id = (plumbing.id)
|
2093
2104
|
porcelain.name = (plumbing.name)
|
2105
|
+
porcelain.port_override = (plumbing.port_override)
|
2094
2106
|
porcelain.secret_store_id = (plumbing.secret_store_id)
|
2107
|
+
porcelain.subdomain = (plumbing.subdomain)
|
2095
2108
|
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
2096
2109
|
porcelain.tenant_id = (plumbing.tenant_id)
|
2097
2110
|
return porcelain
|
@@ -2108,7 +2121,9 @@ def convert_azure_certificate_to_plumbing(porcelain):
|
|
2108
2121
|
plumbing.healthy = (porcelain.healthy)
|
2109
2122
|
plumbing.id = (porcelain.id)
|
2110
2123
|
plumbing.name = (porcelain.name)
|
2124
|
+
plumbing.port_override = (porcelain.port_override)
|
2111
2125
|
plumbing.secret_store_id = (porcelain.secret_store_id)
|
2126
|
+
plumbing.subdomain = (porcelain.subdomain)
|
2112
2127
|
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
2113
2128
|
plumbing.tenant_id = (porcelain.tenant_id)
|
2114
2129
|
return plumbing
|
@@ -3244,8 +3259,10 @@ def convert_gcp_to_porcelain(plumbing):
|
|
3244
3259
|
porcelain.id = (plumbing.id)
|
3245
3260
|
porcelain.keyfile = (plumbing.keyfile)
|
3246
3261
|
porcelain.name = (plumbing.name)
|
3262
|
+
porcelain.port_override = (plumbing.port_override)
|
3247
3263
|
porcelain.scopes = (plumbing.scopes)
|
3248
3264
|
porcelain.secret_store_id = (plumbing.secret_store_id)
|
3265
|
+
porcelain.subdomain = (plumbing.subdomain)
|
3249
3266
|
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
3250
3267
|
return porcelain
|
3251
3268
|
|
@@ -3260,8 +3277,10 @@ def convert_gcp_to_plumbing(porcelain):
|
|
3260
3277
|
plumbing.id = (porcelain.id)
|
3261
3278
|
plumbing.keyfile = (porcelain.keyfile)
|
3262
3279
|
plumbing.name = (porcelain.name)
|
3280
|
+
plumbing.port_override = (porcelain.port_override)
|
3263
3281
|
plumbing.scopes = (porcelain.scopes)
|
3264
3282
|
plumbing.secret_store_id = (porcelain.secret_store_id)
|
3283
|
+
plumbing.subdomain = (porcelain.subdomain)
|
3265
3284
|
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
3266
3285
|
return plumbing
|
3267
3286
|
|
@@ -1,12 +1,12 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: strongdm
|
3
|
-
Version: 3.
|
3
|
+
Version: 3.14.0
|
4
4
|
Summary: strongDM SDK for the Python programming language.
|
5
5
|
Home-page: https://github.com/strongdm/strongdm-sdk-python
|
6
6
|
Author: strongDM Team
|
7
7
|
Author-email: sdk-feedback@strongdm.com
|
8
8
|
License: apache-2.0
|
9
|
-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v3.
|
9
|
+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v3.14.0.tar.gz
|
10
10
|
Description: # strongDM SDK for Python
|
11
11
|
|
12
12
|
This is the official [strongDM](https://www.strongdm.com/) SDK for the Python
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|