strongdm 3.6.0__zip → 3.7.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-3.6.0 → strongdm-3.7.0}/PKG-INFO +2 -2
- {strongdm-3.6.0 → strongdm-3.7.0}/setup.py +2 -2
- strongdm-3.7.0/strongdm/account_attachments_history_pb2.py +96 -0
- strongdm-3.7.0/strongdm/account_attachments_history_pb2_grpc.py +84 -0
- strongdm-3.7.0/strongdm/account_grants_history_pb2.py +96 -0
- strongdm-3.7.0/strongdm/account_grants_history_pb2_grpc.py +84 -0
- strongdm-3.7.0/strongdm/account_permissions_pb2.py +97 -0
- strongdm-3.7.0/strongdm/account_permissions_pb2_grpc.py +87 -0
- strongdm-3.7.0/strongdm/account_resources_pb2.py +99 -0
- strongdm-3.7.0/strongdm/account_resources_pb2_grpc.py +87 -0
- strongdm-3.7.0/strongdm/accounts_history_pb2.py +96 -0
- strongdm-3.7.0/strongdm/accounts_history_pb2_grpc.py +84 -0
- strongdm-3.7.0/strongdm/activities_pb2.py +177 -0
- strongdm-3.7.0/strongdm/activities_pb2_grpc.py +124 -0
- strongdm-3.7.0/strongdm/client.py +432 -0
- strongdm-3.7.0/strongdm/constants.py +377 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/drivers_pb2.py +172 -172
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/models.py +1868 -132
- strongdm-3.7.0/strongdm/nodes_history_pb2.py +96 -0
- strongdm-3.7.0/strongdm/nodes_history_pb2_grpc.py +84 -0
- strongdm-3.7.0/strongdm/organization_history_pb2.py +154 -0
- strongdm-3.7.0/strongdm/organization_history_pb2_grpc.py +84 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/plumbing.py +947 -0
- strongdm-3.7.0/strongdm/queries_pb2.py +133 -0
- strongdm-3.7.0/strongdm/queries_pb2_grpc.py +90 -0
- strongdm-3.7.0/strongdm/remote_identities_history_pb2.py +96 -0
- strongdm-3.7.0/strongdm/remote_identities_history_pb2_grpc.py +84 -0
- strongdm-3.7.0/strongdm/remote_identity_groups_history_pb2.py +96 -0
- strongdm-3.7.0/strongdm/remote_identity_groups_history_pb2_grpc.py +84 -0
- strongdm-3.7.0/strongdm/replays_pb2.py +107 -0
- strongdm-3.7.0/strongdm/replays_pb2_grpc.py +87 -0
- strongdm-3.7.0/strongdm/resources_history_pb2.py +96 -0
- strongdm-3.7.0/strongdm/resources_history_pb2_grpc.py +84 -0
- strongdm-3.7.0/strongdm/role_resources_history_pb2.py +96 -0
- strongdm-3.7.0/strongdm/role_resources_history_pb2_grpc.py +84 -0
- strongdm-3.7.0/strongdm/role_resources_pb2.py +93 -0
- strongdm-3.7.0/strongdm/role_resources_pb2_grpc.py +87 -0
- strongdm-3.7.0/strongdm/roles_history_pb2.py +96 -0
- strongdm-3.7.0/strongdm/roles_history_pb2_grpc.py +84 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/secret_store_types_pb2.py +11 -11
- strongdm-3.7.0/strongdm/secret_stores_history_pb2.py +96 -0
- strongdm-3.7.0/strongdm/secret_stores_history_pb2_grpc.py +84 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/svc.py +1199 -12
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm.egg-info/PKG-INFO +2 -2
- strongdm-3.7.0/strongdm.egg-info/SOURCES.txt +78 -0
- strongdm-3.6.0/strongdm/client.py +0 -199
- strongdm-3.6.0/strongdm/constants.py +0 -53
- strongdm-3.6.0/strongdm.egg-info/SOURCES.txt +0 -44
- {strongdm-3.6.0 → strongdm-3.7.0}/README.md +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/setup.cfg +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/__init__.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/errors.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/options_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm.egg-info/requires.txt +1 -1
- {strongdm-3.6.0 → strongdm-3.7.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -0,0 +1,377 @@
|
|
1
|
+
# Copyright 2020 StrongDM Inc
|
2
|
+
#
|
3
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
4
|
+
# you may not use this file except in compliance with the License.
|
5
|
+
# You may obtain a copy of the License at
|
6
|
+
#
|
7
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
8
|
+
#
|
9
|
+
# Unless required by applicable law or agreed to in writing, software
|
10
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
11
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
12
|
+
# See the License for the specific language governing permissions and
|
13
|
+
# limitations under the License.
|
14
|
+
#
|
15
|
+
# @internal This file was generated by constgen. DO NOT EDIT.
|
16
|
+
|
17
|
+
|
18
|
+
# Permission Levels, shared by all entities capable of making authenticated requests against StrongDM.
|
19
|
+
class PermissionLevel:
|
20
|
+
ROOT_ADMIN = "root-admin"
|
21
|
+
ADMIN = "admin"
|
22
|
+
DATABASE_ADMIN = "database-admin"
|
23
|
+
TEAM_LEADER = "multi-team-leader"
|
24
|
+
USER = "user"
|
25
|
+
RELAY = "relay"
|
26
|
+
ADMIN_TOKEN = "admin-token"
|
27
|
+
SCIM_TOKEN = "scim-token"
|
28
|
+
SERVICE = "service"
|
29
|
+
SUSPENDED = "suspended"
|
30
|
+
EMPTY = ""
|
31
|
+
|
32
|
+
|
33
|
+
# Node Lifecycle States, defining whether a node was last reported online, offline, restarting, etc.
|
34
|
+
class NodeState:
|
35
|
+
NEW = "new"
|
36
|
+
VERIFYING_RESTART = "verifying_restart"
|
37
|
+
AWAITING_RESTART = "awaiting_restart"
|
38
|
+
RESTARTING = "restarting"
|
39
|
+
STARTED = "started"
|
40
|
+
STOPPED = "stopped"
|
41
|
+
DEAD = "dead"
|
42
|
+
|
43
|
+
|
44
|
+
# Providers responsible for managing roles and users.
|
45
|
+
# None, or an empty string, implies the user is managed by strongDM.
|
46
|
+
# Deprecated: Please use SCIMProvider instead.
|
47
|
+
class Provider:
|
48
|
+
NONE = ""
|
49
|
+
OKTA = "okta"
|
50
|
+
SAIL_POINT = "sailpoint"
|
51
|
+
AZURE = "azure"
|
52
|
+
GENERIC = "generic"
|
53
|
+
ONE_LOGIN = "onelogin"
|
54
|
+
GOOGLE = "google"
|
55
|
+
|
56
|
+
|
57
|
+
# Providers responsible for managing roles and users.
|
58
|
+
# None, or an empty string, implies the user is managed by strongDM.
|
59
|
+
class SCIMProvider:
|
60
|
+
NONE = ""
|
61
|
+
OKTA = "okta"
|
62
|
+
SAIL_POINT = "sailpoint"
|
63
|
+
AZURE = "azure"
|
64
|
+
GENERIC = "generic"
|
65
|
+
ONE_LOGIN = "onelogin"
|
66
|
+
GOOGLE = "google"
|
67
|
+
|
68
|
+
|
69
|
+
# Providers responsible for SSO authentication.
|
70
|
+
class AuthProvider:
|
71
|
+
AZURE = "azure"
|
72
|
+
BITIUM = "bitium"
|
73
|
+
GOOGLE = "google"
|
74
|
+
OKTA = "okta"
|
75
|
+
STRONG_DM = "strongdm"
|
76
|
+
ACTIVE_DIRECTORY = "active directory"
|
77
|
+
GENERIC_OIDC = "generic oidc"
|
78
|
+
ONE_LOGIN_OIDC = "oneloginv2"
|
79
|
+
KEYCLOAK = "keycloak"
|
80
|
+
SHIBBOLETH = "shibboleth"
|
81
|
+
AUTH_0 = "auth0"
|
82
|
+
WORKSPACE_ONE = "workspace one"
|
83
|
+
ONE_LOGIN_SAML = "onelogin-saml"
|
84
|
+
GENERIC_SAML = "generic-saml"
|
85
|
+
PING_IDSAML = "ping-identity-saml"
|
86
|
+
|
87
|
+
|
88
|
+
# Providers responsible for multi-factor authentication
|
89
|
+
class MFAProvider:
|
90
|
+
NONE = ""
|
91
|
+
DUO = "duo"
|
92
|
+
|
93
|
+
|
94
|
+
# Activity Entities, all entity types that can be part of an activity.
|
95
|
+
class ActivityEntityType:
|
96
|
+
USER = "user"
|
97
|
+
ROLE = "role"
|
98
|
+
LEGACY_COMPOSITE_ROLE = "composite_role"
|
99
|
+
DATASOURCE = "datasource"
|
100
|
+
ORGANIZATION = "organization"
|
101
|
+
INSTALLATION = "installation"
|
102
|
+
SECRET_STORE = "secretstore"
|
103
|
+
REMOTE_IDENTITY_GROUP = "remote_identity_group"
|
104
|
+
REMOTE_IDENTITY = "remote_identity"
|
105
|
+
ACCESS_REQUEST = "access_request"
|
106
|
+
WORKFLOW = "workflow"
|
107
|
+
|
108
|
+
|
109
|
+
# Activity Verbs, describe which kind of activity has taken place.
|
110
|
+
class ActivityVerb:
|
111
|
+
USER_ADDED = "user added"
|
112
|
+
USER_DELETED = "user deleted"
|
113
|
+
USER_UPDATED = "user updated"
|
114
|
+
USER_SIGNUP = "user signup"
|
115
|
+
USER_TYPE_CHANGED = "user type changed"
|
116
|
+
USER_TEMPORARY_ACCESS_GRANTED = "user temporary access granted"
|
117
|
+
USER_TEMPORARY_ACCESS_REVOKED = "user temporary access revoked"
|
118
|
+
USER_TEMPORARY_ACCESS_EXPIRED = "user temporary access expired"
|
119
|
+
USER_ADDED_TO_ROLE = "user added to role"
|
120
|
+
USER_DELETED_FROM_ROLE = "user deleted from role"
|
121
|
+
USER_SUSPENDED = "user suspended"
|
122
|
+
USER_REINSTATED = "user reinstated"
|
123
|
+
USER_LOGGED_INTO_THE_UI = "user logged into the Admin UI"
|
124
|
+
PARENT_ADMIN_LOGGED_INTO_CHILD_ORG = "parent admin logged into the child org"
|
125
|
+
USER_LOGGED_INTO_THE_CLIENT = "user logged into the local client"
|
126
|
+
SERVICE_ACCOUNT_CREATED = "service account created"
|
127
|
+
SERVICE_ACCOUNT_EXPIRED = "service account expired"
|
128
|
+
ADMIN_TOKEN_ADDED = "admin token created"
|
129
|
+
ADMIN_TOKEN_DELETED = "admin token deleted"
|
130
|
+
ADMIN_TOKEN_EXPIRED = "admin token expired"
|
131
|
+
ADMIN_TOKEN_REKEYED = "admin token rekeyed"
|
132
|
+
ADMIN_TOKEN_CLONED = "admin token cloned"
|
133
|
+
ADMIN_TOKEN_SUSPENDED = "admin token suspended"
|
134
|
+
ADMIN_TOKEN_REINSTATED = "admin token reinstated"
|
135
|
+
SSO_USER_LOGGED_INTO_THE_UI = "user logged into the Admin UI using SSO"
|
136
|
+
SSO_USER_LOGGED_INTO_THE_CLIENT = "user logged into the local client using SSO"
|
137
|
+
USER_LOGGED_OUT_FROM_THE_CLIENT = "user logged out from the local client"
|
138
|
+
USER_LOGGED_OUT_FROM_THE_UI = "user logged out from the Admin UI"
|
139
|
+
FAILED_LOGIN_FROM_THE_UI = "failed login attempt from the Admin UI"
|
140
|
+
FAILED_LOGIN_FROM_THE_CLIENT = "failed login attempt from the local client"
|
141
|
+
MFA_DENIED_FROM_THE_UI = "MFA denied access for the Admin UI"
|
142
|
+
MFA_DENIED_FROM_THE_CLIENT = "MFA denied access for the local client"
|
143
|
+
TOO_MANY_ATTEMPTS_LOCKOUT = "user account locked due to failed login attempts"
|
144
|
+
ATTEMPT_COUNTER_RESET = "failed login attempt counter reset"
|
145
|
+
SUSPENDED_USER_LOGIN_ATTEMPT_FROM_THE_CLIENT = "attempt to login by a suspended user from the local client"
|
146
|
+
SUSPENDED_USER_LOGIN_ATTEMPT_FROM_THE_UI = "attempt to login by a suspended user from the Admin UI"
|
147
|
+
SERVICE_ACCOUNT_LOGIN_ATTEMPT_FROM_THE_UI = "attempted to login by a service account from the Admin UI"
|
148
|
+
SUSPENDED_SERVICE_ACCOUNT_LOGIN_ATTEMPT_FROM_THE_UI = "attempted to login by a suspended service account from the Admin UI"
|
149
|
+
SUSPENDED_SERVICE_ACCOUNT_LOGIN_ATTEMPT_FROM_THE_CLIENT = "attempt to login by a suspended service account from the local client"
|
150
|
+
USER_SET_A_PASSWORD = "user set a password"
|
151
|
+
USER_RESET_A_PASSWORD = "user reset their password"
|
152
|
+
USER_CHANGED_PASSWORD = "user changed their password"
|
153
|
+
USER_INVITED = "user invited"
|
154
|
+
USER_CLICKED_INVITATION = "user clicked on their invitation"
|
155
|
+
USER_CLICKED_PASSWORD_RESET = "user clicked on their password reset"
|
156
|
+
USER_ALLOW_PASSWORD_LOGIN = "user allowed to login via password"
|
157
|
+
USER_REQUIRE_SSO_LOGIN = "user required to login via SSO"
|
158
|
+
USER_PROVISIONING_ENABLED = "user provisioning enabled"
|
159
|
+
USER_PROVISIONING_DISABLED = "user provisioning disabled"
|
160
|
+
ADMIN_INITIATED_PASSWORD_RESET = "admin initiated password reset"
|
161
|
+
ROLE_ADDED = "role added"
|
162
|
+
ROLE_DELETED = "role deleted"
|
163
|
+
ROLE_UPDATED = "role updated"
|
164
|
+
ROLE_ACCESS_RULES_UPDATED = "access rules updated"
|
165
|
+
ROLE_ACCESS_RULES_CREATED = "access rules created"
|
166
|
+
ROLE_ACCESS_RULES_DELETED = "access rules deleted"
|
167
|
+
ROLE_PROVISIONING_ENABLED = "role provisioning enabled"
|
168
|
+
ROLE_PROVISIONING_DISABLED = "role provisioning disabled"
|
169
|
+
DATASOURCE_ADDED = "datasource added"
|
170
|
+
DATASOURCE_CLONED = "datasource cloned"
|
171
|
+
DATASOURCE_DELETED = "datasource deleted"
|
172
|
+
DATASOURCE_UPDATED = "datasource updated"
|
173
|
+
DATASOURCE_PORT_OVERRIDE = "datasource connection port overriden"
|
174
|
+
MULTIPLE_DATASOURCE_PORT_OVERRIDE = "multiple datasource ports overriden"
|
175
|
+
SERVER_ADDED = "server added"
|
176
|
+
SERVER_CLONED = "server cloned"
|
177
|
+
SERVER_DELETED = "server deleted"
|
178
|
+
SERVER_UPDATED = "server updated"
|
179
|
+
SERVER_PORT_OVERRIDE = "server connection port overriden"
|
180
|
+
MULTIPLE_SERVER_PORT_OVERRIDE = "multiple server ports overriden"
|
181
|
+
CLUSTER_ADDED = "cluster added"
|
182
|
+
CLUSTER_CLONED = "cluster cloned"
|
183
|
+
CLUSTER_DELETED = "cluster deleted"
|
184
|
+
CLUSTER_UPDATED = "cluster updated"
|
185
|
+
CLUSTER_PORT_OVERRIDE = "cluster connection port overriden"
|
186
|
+
MULTIPLE_CLUSTER_PORT_OVERRIDE = "multiple cluster ports overriden"
|
187
|
+
CLOUD_ADDED = "cloud added"
|
188
|
+
CLOUD_CLONED = "cloud cloned"
|
189
|
+
CLOUD_DELETED = "cloud deleted"
|
190
|
+
CLOUD_UPDATED = "cloud updated"
|
191
|
+
WEBSITE_ADDED = "website added"
|
192
|
+
WEBSITE_CLONED = "website cloned"
|
193
|
+
WEBSITE_DELETED = "website deleted"
|
194
|
+
WEBSITE_UPDATED = "website updated"
|
195
|
+
INSTALLATION_CREATED = "installation created"
|
196
|
+
RELAY_INSTALLATION_CREATED = "installation created for relay"
|
197
|
+
INSTALLATION_APPROVED = "installation approved"
|
198
|
+
INSTALLATION_REVOKED = "installation revoked"
|
199
|
+
RELAY_CREATED = "relay created"
|
200
|
+
RELAY_UPDATED_NAME = "relay name updated"
|
201
|
+
RELAY_DELETED = "relay deleted"
|
202
|
+
ORG_PUBLIC_KEY_UPDATED = "public key updated"
|
203
|
+
ORG_ENFORCE_PORT_OVERRIDES_UPDATED = "port override enforcement updated"
|
204
|
+
ORG_SERVICE_AUTO_CONNECT_UPDATED = "service account auto-connect updated"
|
205
|
+
ORG_SELF_REGISTRATION_ACTIVATED = "self-registration activated"
|
206
|
+
ORG_SELF_REGISTRATION_DEACTIVATED = "self-registration deactivated"
|
207
|
+
ORG_NAME_UPDATED = "organization name updated"
|
208
|
+
ORG_SETTING_UPDATED = "organization setting updated"
|
209
|
+
ORG_CREATED = "organization created"
|
210
|
+
ORG_SCIM_PROVISIONING_UPDATED = "SCIM provider set"
|
211
|
+
ORG_SCIM_PROVISIONING_DELETED = "SCIM provider deleted"
|
212
|
+
ORG_CUSTOM_PROVISIONING_UPDATED = "Provisioning provider set"
|
213
|
+
ORG_CUSTOM_PROVISIONING_DELETED = "Provisioning provider deleted"
|
214
|
+
CHILD_ORG_ADMIN_INVITED = "child organization admin invited"
|
215
|
+
SERVICE_ACCOUNT_REKEYED = "service account rekeyed"
|
216
|
+
SCIM_TOKEN_ADDED = "SCIM token created"
|
217
|
+
SCIM_TOKEN_DELETED = "SCIM token deleted"
|
218
|
+
SCIM_TOKEN_REKEYED = "SCIM token rekeyed"
|
219
|
+
API_KEY_DELETED = "API key deleted"
|
220
|
+
ORG_SSH_CERTIFICATE_AUTHORITY_ROTATED = "organization SSH certificate authority rotated"
|
221
|
+
ORG_SSH_ALLOW_PORT_FORWARDING = "allowed SSH port forwarding"
|
222
|
+
ORG_SSH_DISALLOW_PORT_FORWARDING = "disallowed SSH port forwarding"
|
223
|
+
ORG_ADD_CHILD = "add child organization"
|
224
|
+
ORG_REMOVE_CHILD = "remove child organization"
|
225
|
+
ORG_EXTEND_TRIAL = "trial extended"
|
226
|
+
SECRET_STORE_ADDED = "secret store added"
|
227
|
+
SECRET_STORE_UPDATED = "secret store updated"
|
228
|
+
SECRET_STORE_DELETED = "secret store deleted"
|
229
|
+
REMOTE_IDENTITY_GROUP_CREATED = "remote identity group created"
|
230
|
+
REMOTE_IDENTITY_GROUP_UPDATED = "remote identity group updated"
|
231
|
+
REMOTE_IDENTITY_GROUP_DELETED = "remote identity group deleted"
|
232
|
+
REMOTE_IDENTITY_CREATED = "remote identity created"
|
233
|
+
REMOTE_IDENTITY_UPDATED = "remote identity updated"
|
234
|
+
REMOTE_IDENTITY_DELETED = "remote identity deleted"
|
235
|
+
ACCESS_REQUESTED_TO_RESOURCE = "access requested to resource"
|
236
|
+
ACCESS_REQUEST_TO_RESOURCE_APPROVED = "access request to resource approved"
|
237
|
+
ACCESS_REQUEST_TO_RESOURCE_CANCELED = "access request to resource canceled"
|
238
|
+
ACCESS_REQUEST_TO_RESOURCE_DENIED = "access request to resource denied"
|
239
|
+
ACCESS_REQUEST_TO_RESOURCE_TIMED_OUT = "access request to resource timed out"
|
240
|
+
WORKFLOW_RESOURCE_ASSIGNED = "resource assigned to workflow"
|
241
|
+
WORKFLOW_RESOURCE_UNASSIGNED = "resource unassigned from workflow"
|
242
|
+
WORKFLOW_RESOURCE_MULTIPLE_ASSIGNED = "multiple resources assigned to workflow"
|
243
|
+
WORKFLOW_RESOURCE_MULTIPLE_UNASSIGNED = "multiple resources unassigned from workflow"
|
244
|
+
WORKFLOW_NOTIFICATION_OPTION_ADDED = "workflow notification type added"
|
245
|
+
WORKFLOW_NOTIFICATION_OPTION_REMOVED = "workflow notification type removed"
|
246
|
+
WORKFLOW_NOTIFICATION_OPTIONS_UPDATED = "workflow notification settings updated"
|
247
|
+
ORG_VNM_SUBNET_UPDATED = "organization VNM subnet updated"
|
248
|
+
DEPRECATED_ORG_ACTIVATE_DEVICE_APPROVAL = "activate device approval"
|
249
|
+
DEPRECATED_ORG_DEACTIVATE_DEVICE_APPROVAL = "deactivate device approval"
|
250
|
+
EMULATION_MIGRATION_COMPLETED = "emulation migration completed"
|
251
|
+
ACCESS_OVERHAUL_MIGRATION_COMPLETED = "access overhaul migration completed"
|
252
|
+
ACTIVATED_SSH_PORT_FORWARDING_ALL_SERVER = "enabled SSH port forwarding on all servers"
|
253
|
+
|
254
|
+
|
255
|
+
# Permissions, all permissions that may be granted to an account.
|
256
|
+
class Permission:
|
257
|
+
RELAY_LIST = "relay:list"
|
258
|
+
RELAY_CREATE = "relay:create"
|
259
|
+
DATASOURCE_LIST = "datasource:list"
|
260
|
+
DATASOURCE_CREATE = "datasource:create"
|
261
|
+
DATASOURCE_HEALTHCHECK = "datasource:healthcheck"
|
262
|
+
DEPRECATED_DATASOURCE_GRANT = "datasource:grant"
|
263
|
+
DATASOURCE_DELETE = "datasource:delete"
|
264
|
+
DATASOURCE_UPDATE = "datasource:update"
|
265
|
+
SECRET_STORE_CREATE = "secretstore:create"
|
266
|
+
SECRET_STORE_LIST = "secretstore:list"
|
267
|
+
SECRET_STORE_DELETE = "secretstore:delete"
|
268
|
+
SECRET_STORE_UPDATE = "secretstore:update"
|
269
|
+
SECRET_STORE_STATUS = "secretstore:status"
|
270
|
+
REMOTE_IDENTITY_GROUP_WRITE = "remoteidentitygroup:write"
|
271
|
+
REMOTE_IDENTITY_GROUP_READ = "remoteidentitygroup:read"
|
272
|
+
REMOTE_IDENTITY_WRITE = "remoteidentity:write"
|
273
|
+
REMOTE_IDENTITY_READ = "remoteidentity:read"
|
274
|
+
USER_CREATE = "user:create"
|
275
|
+
USER_LIST = "user:list"
|
276
|
+
USER_UPDATE_ADMIN = "user:update_admin"
|
277
|
+
USER_CREATE_ADMIN_TOKEN = "user:create_admin_token"
|
278
|
+
USER_CREATE_SERVICE_ACCOUNT = "user:create_service_account"
|
279
|
+
USER_SET_PERMISSION_LEVEL = "user:set_strong_role"
|
280
|
+
USER_UPDATE = "user:update"
|
281
|
+
USER_INITIATE_PASSWORD_RESET = "user:initiate_password_reset"
|
282
|
+
USER_DELETE = "user:delete"
|
283
|
+
USER_ASSIGN = "user:assign"
|
284
|
+
USER_SUSPEND = "user:suspend"
|
285
|
+
DEMO_PROVISIONING_REQUEST_CREATE = "demoprovisioningrequest:create"
|
286
|
+
DEMO_PROVISIONING_REQUEST_LIST = "demoprovisioningrequest:list"
|
287
|
+
ROLE_LIST = "role:list"
|
288
|
+
ROLE_CREATE = "role:create"
|
289
|
+
ROLE_DELETE = "role:delete"
|
290
|
+
ROLE_UPDATE = "role:update"
|
291
|
+
ORG_VIEW_SETTINGS = "organization:view_settings"
|
292
|
+
ORG_EDIT_SETTINGS = "organization:edit_settings"
|
293
|
+
ORG_DEPLOYMENT_DOCTOR = "organization:deployment_doctor"
|
294
|
+
ORG_LIST_CHILDREN = "organization:list_children"
|
295
|
+
ORG_CREATE_CHILD_ORGANIZATION = "organization:create_child_organization"
|
296
|
+
ORG_AUDIT_USERS = "audit:users"
|
297
|
+
ORG_AUDIT_ROLES = "audit:roles"
|
298
|
+
ORG_AUDIT_DATASOURCES = "audit:datasources"
|
299
|
+
ORG_AUDIT_NODES = "audit:nodes"
|
300
|
+
ORG_AUDIT_PERMISSIONS = "audit:permissions"
|
301
|
+
ORG_AUDIT_QUERIES = "audit:queries"
|
302
|
+
ORG_AUDIT_ACTIVITIES = "audit:activities"
|
303
|
+
ORG_AUDIT_SSH = "audit:ssh"
|
304
|
+
ORG_AUDIT_ACCOUNT_GRANTS = "audit:accountgrants"
|
305
|
+
ORG_AUDIT_ORG = "audit:organization"
|
306
|
+
ORG_AUDIT_REMOTE_IDENTITIES = "audit:remoteidentities"
|
307
|
+
ORG_AUDIT_REMOTE_IDENTITY_GROUPS = "audit:remoteidentitygroups"
|
308
|
+
ORG_AUDIT_SECRET_STORES = "audit:secretstores"
|
309
|
+
WORKFLOW_LIST = "workflow:list"
|
310
|
+
WORKFLOW_EDIT = "workflow:edit"
|
311
|
+
ACCESS_REQUEST_EDIT = "accessrequest:edit"
|
312
|
+
ACCESS_REQUEST_LIST = "accessrequest:list"
|
313
|
+
ACCESS_REQUEST_REQUESTER = "accessrequest:requester"
|
314
|
+
GLOBAL_RDP_RENDER = "rdp:render"
|
315
|
+
GLOBAL_QUERY_BUCKET_TRACKER = "query:bucket_tracker"
|
316
|
+
GLOBAL_ASSETS_GET_LATEST_VERSION_COMMIT_HASH = "assets:get_latest_version_commit_hash"
|
317
|
+
GLOBAL_SDMOS_SERVICE = "sdmos:service"
|
318
|
+
GLOBAL_SDMOS_DEPLOYMENT = "sdmos:deployment"
|
319
|
+
GLOBAL_SDMOS_RELEASE = "sdmos:release"
|
320
|
+
GLOBAL_DEMO_PROVISIONER = "demo:provision"
|
321
|
+
INSTALLATION_BLESS = "installation:bless"
|
322
|
+
INSTALLATION_CREATE = "installation:create"
|
323
|
+
INSTALLATION_REVOKE = "installation:revoke"
|
324
|
+
TESTING_ORG_CREATE = "testing:organization:create"
|
325
|
+
TESTING_ORG_DELETE = "testing:organization:delete"
|
326
|
+
TESTING_NO_PERMISSIONS = "testing:noperms"
|
327
|
+
TESTING_FETCH_QUERIES = "testing:queries:get"
|
328
|
+
GRANT_READ = "grant:read"
|
329
|
+
GRANT_WRITE = "grant:write"
|
330
|
+
REPORT_READ = "report:read"
|
331
|
+
|
332
|
+
|
333
|
+
# Query Categories, all the categories of resource against which queries are logged.
|
334
|
+
class QueryCategory:
|
335
|
+
KUBERNETES = "k8s"
|
336
|
+
DATASOURCES = "queries"
|
337
|
+
RDP = "rdp"
|
338
|
+
SSH = "ssh"
|
339
|
+
WEB = "web"
|
340
|
+
CLOUD = "cloud"
|
341
|
+
ALL = "all"
|
342
|
+
|
343
|
+
|
344
|
+
# LogRemoteEncoder defines the encryption encoder for the queries are stored in the API.
|
345
|
+
class LogRemoteEncoder:
|
346
|
+
STRONG_DM = "strongdm"
|
347
|
+
PUB_KEY = "pubkey"
|
348
|
+
HASH = "hash"
|
349
|
+
|
350
|
+
|
351
|
+
# LogLocalStorage defines how queries are stored locally.
|
352
|
+
class LogLocalStorage:
|
353
|
+
STDOUT = "stdout"
|
354
|
+
FILE = "file"
|
355
|
+
TCP = "tcp"
|
356
|
+
SOCKET = "socket"
|
357
|
+
SYSLOG = "syslog"
|
358
|
+
NONE = "none"
|
359
|
+
|
360
|
+
|
361
|
+
# LogLocalEncoder defines the encryption encoder for queries are stored locally in the relay.
|
362
|
+
class LogLocalEncoder:
|
363
|
+
PLAINTEXT = "plaintext"
|
364
|
+
PUB_KEY = "pubkey"
|
365
|
+
|
366
|
+
|
367
|
+
# LogLocalFormat defines the format the queries are stored locally in the relay.
|
368
|
+
class LogLocalFormat:
|
369
|
+
CSV = "csv"
|
370
|
+
JSON = "json"
|
371
|
+
|
372
|
+
|
373
|
+
# OrgKind defines the types of organizations that may exist.
|
374
|
+
class OrgKind:
|
375
|
+
SOLO = "solo"
|
376
|
+
ROOT = "root"
|
377
|
+
CHILD = "child"
|