strongdm 3.12.0__zip → 3.14.0__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (82) hide show
  1. {strongdm-3.12.0 → strongdm-3.14.0}/PKG-INFO +2 -2
  2. {strongdm-3.12.0 → strongdm-3.14.0}/setup.py +2 -2
  3. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_resources_pb2.py +6 -4
  4. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/client.py +1 -1
  5. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/constants.py +2 -0
  6. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/drivers_pb2.py +162 -146
  7. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/models.py +70 -0
  8. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/organization_history_pb2.py +6 -4
  9. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/plumbing.py +19 -0
  10. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm.egg-info/PKG-INFO +2 -2
  11. {strongdm-3.12.0 → strongdm-3.14.0}/README.md +0 -0
  12. {strongdm-3.12.0 → strongdm-3.14.0}/setup.cfg +0 -0
  13. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/__init__.py +0 -0
  14. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_attachments_history_pb2.py +0 -0
  15. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  16. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_attachments_pb2.py +0 -0
  17. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
  18. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_grants_history_pb2.py +0 -0
  19. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  20. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_grants_pb2.py +0 -0
  21. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_grants_pb2_grpc.py +0 -0
  22. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_permissions_pb2.py +0 -0
  23. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
  24. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_resources_history_pb2.py +0 -0
  25. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  26. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/account_resources_pb2_grpc.py +0 -0
  27. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/accounts_history_pb2.py +0 -0
  28. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
  29. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/accounts_pb2.py +0 -0
  30. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/accounts_pb2_grpc.py +0 -0
  31. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/activities_pb2.py +0 -0
  32. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/activities_pb2_grpc.py +0 -0
  33. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/control_panel_pb2.py +0 -0
  34. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/control_panel_pb2_grpc.py +0 -0
  35. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/drivers_pb2_grpc.py +0 -0
  36. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/errors.py +0 -0
  37. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/nodes_history_pb2.py +0 -0
  38. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
  39. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/nodes_pb2.py +0 -0
  40. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/nodes_pb2_grpc.py +0 -0
  41. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/options_pb2.py +0 -0
  42. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/options_pb2_grpc.py +0 -0
  43. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/organization_history_pb2_grpc.py +0 -0
  44. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/queries_pb2.py +0 -0
  45. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/queries_pb2_grpc.py +0 -0
  46. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identities_history_pb2.py +0 -0
  47. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  48. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identities_pb2.py +0 -0
  49. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
  50. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
  51. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  52. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identity_groups_pb2.py +0 -0
  53. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  54. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/replays_pb2.py +0 -0
  55. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/replays_pb2_grpc.py +0 -0
  56. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/resources_history_pb2.py +0 -0
  57. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/resources_history_pb2_grpc.py +0 -0
  58. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/resources_pb2.py +0 -0
  59. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/resources_pb2_grpc.py +0 -0
  60. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/role_resources_history_pb2.py +0 -0
  61. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  62. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/role_resources_pb2.py +0 -0
  63. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/role_resources_pb2_grpc.py +0 -0
  64. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/roles_history_pb2.py +0 -0
  65. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/roles_history_pb2_grpc.py +0 -0
  66. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/roles_pb2.py +0 -0
  67. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/roles_pb2_grpc.py +0 -0
  68. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_store_types_pb2.py +0 -0
  69. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  70. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_stores_history_pb2.py +0 -0
  71. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  72. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_stores_pb2.py +0 -0
  73. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
  74. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/spec_pb2.py +0 -0
  75. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/spec_pb2_grpc.py +0 -0
  76. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/svc.py +0 -0
  77. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/tags_pb2.py +0 -0
  78. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm/tags_pb2_grpc.py +0 -0
  79. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm.egg-info/SOURCES.txt +0 -0
  80. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm.egg-info/dependency_links.txt +0 -0
  81. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm.egg-info/requires.txt +0 -0
  82. {strongdm-3.12.0 → strongdm-3.14.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -720,10 +720,12 @@ class AWS:
720
720
  'healthy',
721
721
  'id',
722
722
  'name',
723
+ 'port_override',
723
724
  'role_arn',
724
725
  'role_external_id',
725
726
  'secret_access_key',
726
727
  'secret_store_id',
728
+ 'subdomain',
727
729
  'tags',
728
730
  ]
729
731
 
@@ -736,10 +738,12 @@ class AWS:
736
738
  healthy=None,
737
739
  id=None,
738
740
  name=None,
741
+ port_override=None,
739
742
  role_arn=None,
740
743
  role_external_id=None,
741
744
  secret_access_key=None,
742
745
  secret_store_id=None,
746
+ subdomain=None,
743
747
  tags=None,
744
748
  ):
745
749
  self.access_key = access_key if access_key is not None else ''
@@ -764,6 +768,7 @@ class AWS:
764
768
  '''
765
769
  Unique human-readable name of the Resource.
766
770
  '''
771
+ self.port_override = port_override if port_override is not None else 0
767
772
  self.role_arn = role_arn if role_arn is not None else ''
768
773
  self.role_external_id = role_external_id if role_external_id is not None else ''
769
774
  self.secret_access_key = secret_access_key if secret_access_key is not None else ''
@@ -771,6 +776,10 @@ class AWS:
771
776
  '''
772
777
  ID of the secret store containing credentials for this resource, if any.
773
778
  '''
779
+ self.subdomain = subdomain if subdomain is not None else ''
780
+ '''
781
+ Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
782
+ '''
774
783
  self.tags = tags if tags is not None else _porcelain_zero_value_tags()
775
784
  '''
776
785
  Tags is a map of key, value pairs.
@@ -785,10 +794,12 @@ class AWS:
785
794
  'healthy: ' + repr(self.healthy) + ' ' +\
786
795
  'id: ' + repr(self.id) + ' ' +\
787
796
  'name: ' + repr(self.name) + ' ' +\
797
+ 'port_override: ' + repr(self.port_override) + ' ' +\
788
798
  'role_arn: ' + repr(self.role_arn) + ' ' +\
789
799
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
790
800
  'secret_access_key: ' + repr(self.secret_access_key) + ' ' +\
791
801
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
802
+ 'subdomain: ' + repr(self.subdomain) + ' ' +\
792
803
  'tags: ' + repr(self.tags) + ' ' +\
793
804
  '>'
794
805
 
@@ -801,10 +812,12 @@ class AWS:
801
812
  'healthy': self.healthy,
802
813
  'id': self.id,
803
814
  'name': self.name,
815
+ 'port_override': self.port_override,
804
816
  'role_arn': self.role_arn,
805
817
  'role_external_id': self.role_external_id,
806
818
  'secret_access_key': self.secret_access_key,
807
819
  'secret_store_id': self.secret_store_id,
820
+ 'subdomain': self.subdomain,
808
821
  'tags': self.tags,
809
822
  }
810
823
 
@@ -818,10 +831,12 @@ class AWS:
818
831
  healthy=d.get('healthy'),
819
832
  id=d.get('id'),
820
833
  name=d.get('name'),
834
+ port_override=d.get('port_override'),
821
835
  role_arn=d.get('role_arn'),
822
836
  role_external_id=d.get('role_external_id'),
823
837
  secret_access_key=d.get('secret_access_key'),
824
838
  secret_store_id=d.get('secret_store_id'),
839
+ subdomain=d.get('subdomain'),
825
840
  tags=d.get('tags'),
826
841
  )
827
842
 
@@ -2026,6 +2041,7 @@ class AccountResource:
2026
2041
  __slots__ = [
2027
2042
  'account_grant_id',
2028
2043
  'account_id',
2044
+ 'created_at',
2029
2045
  'expires_at',
2030
2046
  'granted_at',
2031
2047
  'resource_id',
@@ -2036,6 +2052,7 @@ class AccountResource:
2036
2052
  self,
2037
2053
  account_grant_id=None,
2038
2054
  account_id=None,
2055
+ created_at=None,
2039
2056
  expires_at=None,
2040
2057
  granted_at=None,
2041
2058
  resource_id=None,
@@ -2050,6 +2067,11 @@ class AccountResource:
2050
2067
  '''
2051
2068
  The unique identifier of the Account to which access is granted.
2052
2069
  '''
2070
+ self.created_at = created_at if created_at is not None else None
2071
+ '''
2072
+ The time this grant was created, distinct from 'granted at' in the case where access is scheduled
2073
+ for the future. If access was granted, revoked, and granted again, this will reflect the later creation time.
2074
+ '''
2053
2075
  self.expires_at = expires_at if expires_at is not None else None
2054
2076
  '''
2055
2077
  The time at which access will expire. If empty, this access has no expiration.
@@ -2073,6 +2095,7 @@ class AccountResource:
2073
2095
  return '<sdm.AccountResource ' + \
2074
2096
  'account_grant_id: ' + repr(self.account_grant_id) + ' ' +\
2075
2097
  'account_id: ' + repr(self.account_id) + ' ' +\
2098
+ 'created_at: ' + repr(self.created_at) + ' ' +\
2076
2099
  'expires_at: ' + repr(self.expires_at) + ' ' +\
2077
2100
  'granted_at: ' + repr(self.granted_at) + ' ' +\
2078
2101
  'resource_id: ' + repr(self.resource_id) + ' ' +\
@@ -2083,6 +2106,7 @@ class AccountResource:
2083
2106
  return {
2084
2107
  'account_grant_id': self.account_grant_id,
2085
2108
  'account_id': self.account_id,
2109
+ 'created_at': self.created_at,
2086
2110
  'expires_at': self.expires_at,
2087
2111
  'granted_at': self.granted_at,
2088
2112
  'resource_id': self.resource_id,
@@ -2094,6 +2118,7 @@ class AccountResource:
2094
2118
  return cls(
2095
2119
  account_grant_id=d.get('account_grant_id'),
2096
2120
  account_id=d.get('account_id'),
2121
+ created_at=d.get('created_at'),
2097
2122
  expires_at=d.get('expires_at'),
2098
2123
  granted_at=d.get('granted_at'),
2099
2124
  resource_id=d.get('resource_id'),
@@ -3796,7 +3821,9 @@ class Azure:
3796
3821
  'id',
3797
3822
  'name',
3798
3823
  'password',
3824
+ 'port_override',
3799
3825
  'secret_store_id',
3826
+ 'subdomain',
3800
3827
  'tags',
3801
3828
  'tenant_id',
3802
3829
  ]
@@ -3810,7 +3837,9 @@ class Azure:
3810
3837
  id=None,
3811
3838
  name=None,
3812
3839
  password=None,
3840
+ port_override=None,
3813
3841
  secret_store_id=None,
3842
+ subdomain=None,
3814
3843
  tags=None,
3815
3844
  tenant_id=None,
3816
3845
  ):
@@ -3836,10 +3865,15 @@ class Azure:
3836
3865
  Unique human-readable name of the Resource.
3837
3866
  '''
3838
3867
  self.password = password if password is not None else ''
3868
+ self.port_override = port_override if port_override is not None else 0
3839
3869
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
3840
3870
  '''
3841
3871
  ID of the secret store containing credentials for this resource, if any.
3842
3872
  '''
3873
+ self.subdomain = subdomain if subdomain is not None else ''
3874
+ '''
3875
+ Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
3876
+ '''
3843
3877
  self.tags = tags if tags is not None else _porcelain_zero_value_tags()
3844
3878
  '''
3845
3879
  Tags is a map of key, value pairs.
@@ -3855,7 +3889,9 @@ class Azure:
3855
3889
  'id: ' + repr(self.id) + ' ' +\
3856
3890
  'name: ' + repr(self.name) + ' ' +\
3857
3891
  'password: ' + repr(self.password) + ' ' +\
3892
+ 'port_override: ' + repr(self.port_override) + ' ' +\
3858
3893
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
3894
+ 'subdomain: ' + repr(self.subdomain) + ' ' +\
3859
3895
  'tags: ' + repr(self.tags) + ' ' +\
3860
3896
  'tenant_id: ' + repr(self.tenant_id) + ' ' +\
3861
3897
  '>'
@@ -3869,7 +3905,9 @@ class Azure:
3869
3905
  'id': self.id,
3870
3906
  'name': self.name,
3871
3907
  'password': self.password,
3908
+ 'port_override': self.port_override,
3872
3909
  'secret_store_id': self.secret_store_id,
3910
+ 'subdomain': self.subdomain,
3873
3911
  'tags': self.tags,
3874
3912
  'tenant_id': self.tenant_id,
3875
3913
  }
@@ -3884,7 +3922,9 @@ class Azure:
3884
3922
  id=d.get('id'),
3885
3923
  name=d.get('name'),
3886
3924
  password=d.get('password'),
3925
+ port_override=d.get('port_override'),
3887
3926
  secret_store_id=d.get('secret_store_id'),
3927
+ subdomain=d.get('subdomain'),
3888
3928
  tags=d.get('tags'),
3889
3929
  tenant_id=d.get('tenant_id'),
3890
3930
  )
@@ -3899,7 +3939,9 @@ class AzureCertificate:
3899
3939
  'healthy',
3900
3940
  'id',
3901
3941
  'name',
3942
+ 'port_override',
3902
3943
  'secret_store_id',
3944
+ 'subdomain',
3903
3945
  'tags',
3904
3946
  'tenant_id',
3905
3947
  ]
@@ -3913,7 +3955,9 @@ class AzureCertificate:
3913
3955
  healthy=None,
3914
3956
  id=None,
3915
3957
  name=None,
3958
+ port_override=None,
3916
3959
  secret_store_id=None,
3960
+ subdomain=None,
3917
3961
  tags=None,
3918
3962
  tenant_id=None,
3919
3963
  ):
@@ -3939,10 +3983,15 @@ class AzureCertificate:
3939
3983
  '''
3940
3984
  Unique human-readable name of the Resource.
3941
3985
  '''
3986
+ self.port_override = port_override if port_override is not None else 0
3942
3987
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
3943
3988
  '''
3944
3989
  ID of the secret store containing credentials for this resource, if any.
3945
3990
  '''
3991
+ self.subdomain = subdomain if subdomain is not None else ''
3992
+ '''
3993
+ Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
3994
+ '''
3946
3995
  self.tags = tags if tags is not None else _porcelain_zero_value_tags()
3947
3996
  '''
3948
3997
  Tags is a map of key, value pairs.
@@ -3958,7 +4007,9 @@ class AzureCertificate:
3958
4007
  'healthy: ' + repr(self.healthy) + ' ' +\
3959
4008
  'id: ' + repr(self.id) + ' ' +\
3960
4009
  'name: ' + repr(self.name) + ' ' +\
4010
+ 'port_override: ' + repr(self.port_override) + ' ' +\
3961
4011
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
4012
+ 'subdomain: ' + repr(self.subdomain) + ' ' +\
3962
4013
  'tags: ' + repr(self.tags) + ' ' +\
3963
4014
  'tenant_id: ' + repr(self.tenant_id) + ' ' +\
3964
4015
  '>'
@@ -3972,7 +4023,9 @@ class AzureCertificate:
3972
4023
  'healthy': self.healthy,
3973
4024
  'id': self.id,
3974
4025
  'name': self.name,
4026
+ 'port_override': self.port_override,
3975
4027
  'secret_store_id': self.secret_store_id,
4028
+ 'subdomain': self.subdomain,
3976
4029
  'tags': self.tags,
3977
4030
  'tenant_id': self.tenant_id,
3978
4031
  }
@@ -3987,7 +4040,9 @@ class AzureCertificate:
3987
4040
  healthy=d.get('healthy'),
3988
4041
  id=d.get('id'),
3989
4042
  name=d.get('name'),
4043
+ port_override=d.get('port_override'),
3990
4044
  secret_store_id=d.get('secret_store_id'),
4045
+ subdomain=d.get('subdomain'),
3991
4046
  tags=d.get('tags'),
3992
4047
  tenant_id=d.get('tenant_id'),
3993
4048
  )
@@ -6405,8 +6460,10 @@ class GCP:
6405
6460
  'id',
6406
6461
  'keyfile',
6407
6462
  'name',
6463
+ 'port_override',
6408
6464
  'scopes',
6409
6465
  'secret_store_id',
6466
+ 'subdomain',
6410
6467
  'tags',
6411
6468
  ]
6412
6469
 
@@ -6418,8 +6475,10 @@ class GCP:
6418
6475
  id=None,
6419
6476
  keyfile=None,
6420
6477
  name=None,
6478
+ port_override=None,
6421
6479
  scopes=None,
6422
6480
  secret_store_id=None,
6481
+ subdomain=None,
6423
6482
  tags=None,
6424
6483
  ):
6425
6484
  self.bind_interface = bind_interface if bind_interface is not None else ''
@@ -6443,11 +6502,16 @@ class GCP:
6443
6502
  '''
6444
6503
  Unique human-readable name of the Resource.
6445
6504
  '''
6505
+ self.port_override = port_override if port_override is not None else 0
6446
6506
  self.scopes = scopes if scopes is not None else ''
6447
6507
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
6448
6508
  '''
6449
6509
  ID of the secret store containing credentials for this resource, if any.
6450
6510
  '''
6511
+ self.subdomain = subdomain if subdomain is not None else ''
6512
+ '''
6513
+ Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
6514
+ '''
6451
6515
  self.tags = tags if tags is not None else _porcelain_zero_value_tags()
6452
6516
  '''
6453
6517
  Tags is a map of key, value pairs.
@@ -6461,8 +6525,10 @@ class GCP:
6461
6525
  'id: ' + repr(self.id) + ' ' +\
6462
6526
  'keyfile: ' + repr(self.keyfile) + ' ' +\
6463
6527
  'name: ' + repr(self.name) + ' ' +\
6528
+ 'port_override: ' + repr(self.port_override) + ' ' +\
6464
6529
  'scopes: ' + repr(self.scopes) + ' ' +\
6465
6530
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
6531
+ 'subdomain: ' + repr(self.subdomain) + ' ' +\
6466
6532
  'tags: ' + repr(self.tags) + ' ' +\
6467
6533
  '>'
6468
6534
 
@@ -6474,8 +6540,10 @@ class GCP:
6474
6540
  'id': self.id,
6475
6541
  'keyfile': self.keyfile,
6476
6542
  'name': self.name,
6543
+ 'port_override': self.port_override,
6477
6544
  'scopes': self.scopes,
6478
6545
  'secret_store_id': self.secret_store_id,
6546
+ 'subdomain': self.subdomain,
6479
6547
  'tags': self.tags,
6480
6548
  }
6481
6549
 
@@ -6488,8 +6556,10 @@ class GCP:
6488
6556
  id=d.get('id'),
6489
6557
  keyfile=d.get('keyfile'),
6490
6558
  name=d.get('name'),
6559
+ port_override=d.get('port_override'),
6491
6560
  scopes=d.get('scopes'),
6492
6561
  secret_store_id=d.get('secret_store_id'),
6562
+ subdomain=d.get('subdomain'),
6493
6563
  tags=d.get('tags'),
6494
6564
  )
6495
6565
 
@@ -32,7 +32,7 @@ from . import options_pb2 as options__pb2
32
32
  from . import spec_pb2 as spec__pb2
33
33
 
34
34
 
35
- DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xcd\n\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
35
+ DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xf4\n\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
36
36
 
37
37
 
38
38
 
@@ -139,6 +139,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
139
139
  _ORGANIZATION.fields_by_name['saml_metadata_url']._serialized_options = b'\362\370\263\007$\260\363\263\007\001\312\363\263\007\032\302\364\263\007\025\n\002go\022\017SAMLMetadataURL'
140
140
  _ORGANIZATION.fields_by_name['kind']._options = None
141
141
  _ORGANIZATION.fields_by_name['kind']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
142
+ _ORGANIZATION.fields_by_name['id']._options = None
143
+ _ORGANIZATION.fields_by_name['id']._serialized_options = b'\362\370\263\007\024\260\363\263\007\001\262\364\263\007\ngo_private'
142
144
  _ORGANIZATION._options = None
143
145
  _ORGANIZATION._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
144
146
  _ORGANIZATIONHISTORY._options = None
@@ -152,7 +154,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
152
154
  _ORGANIZATIONHISTORYRECORD._serialized_start=538
153
155
  _ORGANIZATIONHISTORYRECORD._serialized_end=761
154
156
  _ORGANIZATION._serialized_start=764
155
- _ORGANIZATION._serialized_end=2121
156
- _ORGANIZATIONHISTORY._serialized_start=2124
157
- _ORGANIZATIONHISTORY._serialized_end=2363
157
+ _ORGANIZATION._serialized_end=2160
158
+ _ORGANIZATIONHISTORY._serialized_start=2163
159
+ _ORGANIZATIONHISTORY._serialized_end=2402
158
160
  # @@protoc_insertion_point(module_scope)
@@ -428,10 +428,12 @@ def convert_aws_to_porcelain(plumbing):
428
428
  porcelain.healthy = (plumbing.healthy)
429
429
  porcelain.id = (plumbing.id)
430
430
  porcelain.name = (plumbing.name)
431
+ porcelain.port_override = (plumbing.port_override)
431
432
  porcelain.role_arn = (plumbing.role_arn)
432
433
  porcelain.role_external_id = (plumbing.role_external_id)
433
434
  porcelain.secret_access_key = (plumbing.secret_access_key)
434
435
  porcelain.secret_store_id = (plumbing.secret_store_id)
436
+ porcelain.subdomain = (plumbing.subdomain)
435
437
  porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
436
438
  return porcelain
437
439
 
@@ -447,10 +449,12 @@ def convert_aws_to_plumbing(porcelain):
447
449
  plumbing.healthy = (porcelain.healthy)
448
450
  plumbing.id = (porcelain.id)
449
451
  plumbing.name = (porcelain.name)
452
+ plumbing.port_override = (porcelain.port_override)
450
453
  plumbing.role_arn = (porcelain.role_arn)
451
454
  plumbing.role_external_id = (porcelain.role_external_id)
452
455
  plumbing.secret_access_key = (porcelain.secret_access_key)
453
456
  plumbing.secret_store_id = (porcelain.secret_store_id)
457
+ plumbing.subdomain = (porcelain.subdomain)
454
458
  plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
455
459
  return plumbing
456
460
 
@@ -1233,6 +1237,7 @@ def convert_account_resource_to_porcelain(plumbing):
1233
1237
  porcelain = models.AccountResource()
1234
1238
  porcelain.account_grant_id = (plumbing.account_grant_id)
1235
1239
  porcelain.account_id = (plumbing.account_id)
1240
+ porcelain.created_at = convert_timestamp_to_porcelain(plumbing.created_at)
1236
1241
  porcelain.expires_at = convert_timestamp_to_porcelain(plumbing.expires_at)
1237
1242
  porcelain.granted_at = convert_timestamp_to_porcelain(plumbing.granted_at)
1238
1243
  porcelain.resource_id = (plumbing.resource_id)
@@ -1246,6 +1251,8 @@ def convert_account_resource_to_plumbing(porcelain):
1246
1251
  return plumbing
1247
1252
  plumbing.account_grant_id = (porcelain.account_grant_id)
1248
1253
  plumbing.account_id = (porcelain.account_id)
1254
+ plumbing.created_at.CopyFrom(
1255
+ convert_timestamp_to_plumbing(porcelain.created_at))
1249
1256
  plumbing.expires_at.CopyFrom(
1250
1257
  convert_timestamp_to_plumbing(porcelain.expires_at))
1251
1258
  plumbing.granted_at.CopyFrom(
@@ -2049,7 +2056,9 @@ def convert_azure_to_porcelain(plumbing):
2049
2056
  porcelain.id = (plumbing.id)
2050
2057
  porcelain.name = (plumbing.name)
2051
2058
  porcelain.password = (plumbing.password)
2059
+ porcelain.port_override = (plumbing.port_override)
2052
2060
  porcelain.secret_store_id = (plumbing.secret_store_id)
2061
+ porcelain.subdomain = (plumbing.subdomain)
2053
2062
  porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
2054
2063
  porcelain.tenant_id = (plumbing.tenant_id)
2055
2064
  return porcelain
@@ -2066,7 +2075,9 @@ def convert_azure_to_plumbing(porcelain):
2066
2075
  plumbing.id = (porcelain.id)
2067
2076
  plumbing.name = (porcelain.name)
2068
2077
  plumbing.password = (porcelain.password)
2078
+ plumbing.port_override = (porcelain.port_override)
2069
2079
  plumbing.secret_store_id = (porcelain.secret_store_id)
2080
+ plumbing.subdomain = (porcelain.subdomain)
2070
2081
  plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
2071
2082
  plumbing.tenant_id = (porcelain.tenant_id)
2072
2083
  return plumbing
@@ -2091,7 +2102,9 @@ def convert_azure_certificate_to_porcelain(plumbing):
2091
2102
  porcelain.healthy = (plumbing.healthy)
2092
2103
  porcelain.id = (plumbing.id)
2093
2104
  porcelain.name = (plumbing.name)
2105
+ porcelain.port_override = (plumbing.port_override)
2094
2106
  porcelain.secret_store_id = (plumbing.secret_store_id)
2107
+ porcelain.subdomain = (plumbing.subdomain)
2095
2108
  porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
2096
2109
  porcelain.tenant_id = (plumbing.tenant_id)
2097
2110
  return porcelain
@@ -2108,7 +2121,9 @@ def convert_azure_certificate_to_plumbing(porcelain):
2108
2121
  plumbing.healthy = (porcelain.healthy)
2109
2122
  plumbing.id = (porcelain.id)
2110
2123
  plumbing.name = (porcelain.name)
2124
+ plumbing.port_override = (porcelain.port_override)
2111
2125
  plumbing.secret_store_id = (porcelain.secret_store_id)
2126
+ plumbing.subdomain = (porcelain.subdomain)
2112
2127
  plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
2113
2128
  plumbing.tenant_id = (porcelain.tenant_id)
2114
2129
  return plumbing
@@ -3244,8 +3259,10 @@ def convert_gcp_to_porcelain(plumbing):
3244
3259
  porcelain.id = (plumbing.id)
3245
3260
  porcelain.keyfile = (plumbing.keyfile)
3246
3261
  porcelain.name = (plumbing.name)
3262
+ porcelain.port_override = (plumbing.port_override)
3247
3263
  porcelain.scopes = (plumbing.scopes)
3248
3264
  porcelain.secret_store_id = (plumbing.secret_store_id)
3265
+ porcelain.subdomain = (plumbing.subdomain)
3249
3266
  porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
3250
3267
  return porcelain
3251
3268
 
@@ -3260,8 +3277,10 @@ def convert_gcp_to_plumbing(porcelain):
3260
3277
  plumbing.id = (porcelain.id)
3261
3278
  plumbing.keyfile = (porcelain.keyfile)
3262
3279
  plumbing.name = (porcelain.name)
3280
+ plumbing.port_override = (porcelain.port_override)
3263
3281
  plumbing.scopes = (porcelain.scopes)
3264
3282
  plumbing.secret_store_id = (porcelain.secret_store_id)
3283
+ plumbing.subdomain = (porcelain.subdomain)
3265
3284
  plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
3266
3285
  return plumbing
3267
3286
 
@@ -1,12 +1,12 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: strongdm
3
- Version: 3.12.0
3
+ Version: 3.14.0
4
4
  Summary: strongDM SDK for the Python programming language.
5
5
  Home-page: https://github.com/strongdm/strongdm-sdk-python
6
6
  Author: strongDM Team
7
7
  Author-email: sdk-feedback@strongdm.com
8
8
  License: apache-2.0
9
- Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v3.12.0.tar.gz
9
+ Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v3.14.0.tar.gz
10
10
  Description: # strongDM SDK for Python
11
11
 
12
12
  This is the official [strongDM](https://www.strongdm.com/) SDK for the Python
File without changes
File without changes
File without changes