strongdm 7.0.0__zip → 7.1.1__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (127) hide show
  1. {strongdm-7.0.0 → strongdm-7.1.1}/PKG-INFO +2 -2
  2. {strongdm-7.0.0 → strongdm-7.1.1}/setup.py +2 -2
  3. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/client.py +6 -5
  4. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/models.py +66 -39
  5. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/plumbing.py +14 -0
  6. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_store_types_pb2.py +58 -44
  7. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm.egg-info/PKG-INFO +2 -2
  8. {strongdm-7.0.0 → strongdm-7.1.1}/LICENSE +0 -0
  9. {strongdm-7.0.0 → strongdm-7.1.1}/README.md +0 -0
  10. {strongdm-7.0.0 → strongdm-7.1.1}/setup.cfg +0 -0
  11. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/__init__.py +0 -0
  12. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_request_events_history_pb2.py +0 -0
  13. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
  14. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_requests_history_pb2.py +0 -0
  15. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_requests_history_pb2_grpc.py +0 -0
  16. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_requests_pb2.py +0 -0
  17. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_requests_pb2_grpc.py +0 -0
  18. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_attachments_history_pb2.py +0 -0
  19. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  20. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_attachments_pb2.py +0 -0
  21. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_attachments_pb2_grpc.py +0 -0
  22. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_grants_history_pb2.py +0 -0
  23. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  24. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_grants_pb2.py +0 -0
  25. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_grants_pb2_grpc.py +0 -0
  26. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_permissions_pb2.py +0 -0
  27. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_permissions_pb2_grpc.py +0 -0
  28. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_resources_history_pb2.py +0 -0
  29. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  30. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_resources_pb2.py +0 -0
  31. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_resources_pb2_grpc.py +0 -0
  32. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/accounts_history_pb2.py +0 -0
  33. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/accounts_history_pb2_grpc.py +0 -0
  34. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/accounts_pb2.py +0 -0
  35. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/accounts_pb2_grpc.py +0 -0
  36. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/activities_pb2.py +0 -0
  37. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/activities_pb2_grpc.py +0 -0
  38. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
  39. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
  40. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_approvers_pb2.py +0 -0
  41. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
  42. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
  43. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
  44. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_steps_pb2.py +0 -0
  45. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
  46. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflows_history_pb2.py +0 -0
  47. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
  48. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflows_pb2.py +0 -0
  49. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflows_pb2_grpc.py +0 -0
  50. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/constants.py +0 -0
  51. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/control_panel_pb2.py +0 -0
  52. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/control_panel_pb2_grpc.py +0 -0
  53. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/drivers_pb2.py +0 -0
  54. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/drivers_pb2_grpc.py +0 -0
  55. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/errors.py +0 -0
  56. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/nodes_history_pb2.py +0 -0
  57. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/nodes_history_pb2_grpc.py +0 -0
  58. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/nodes_pb2.py +0 -0
  59. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/nodes_pb2_grpc.py +0 -0
  60. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/options_pb2.py +0 -0
  61. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/options_pb2_grpc.py +0 -0
  62. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/organization_history_pb2.py +0 -0
  63. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/organization_history_pb2_grpc.py +0 -0
  64. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_nodes_pb2.py +0 -0
  65. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
  66. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_peers_pb2.py +0 -0
  67. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
  68. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_resources_pb2.py +0 -0
  69. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
  70. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_groups_pb2.py +0 -0
  71. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_groups_pb2_grpc.py +0 -0
  72. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/queries_pb2.py +0 -0
  73. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/queries_pb2_grpc.py +0 -0
  74. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identities_history_pb2.py +0 -0
  75. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  76. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identities_pb2.py +0 -0
  77. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identities_pb2_grpc.py +0 -0
  78. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identity_groups_history_pb2.py +0 -0
  79. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  80. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identity_groups_pb2.py +0 -0
  81. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  82. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/replays_pb2.py +0 -0
  83. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/replays_pb2_grpc.py +0 -0
  84. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/resources_history_pb2.py +0 -0
  85. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/resources_history_pb2_grpc.py +0 -0
  86. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/resources_pb2.py +0 -0
  87. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/resources_pb2_grpc.py +0 -0
  88. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/role_resources_history_pb2.py +0 -0
  89. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  90. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/role_resources_pb2.py +0 -0
  91. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/role_resources_pb2_grpc.py +0 -0
  92. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/roles_history_pb2.py +0 -0
  93. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/roles_history_pb2_grpc.py +0 -0
  94. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/roles_pb2.py +0 -0
  95. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/roles_pb2_grpc.py +0 -0
  96. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_store_healths_pb2.py +0 -0
  97. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
  98. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  99. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_stores_history_pb2.py +0 -0
  100. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  101. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_stores_pb2.py +0 -0
  102. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_stores_pb2_grpc.py +0 -0
  103. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/spec_pb2.py +0 -0
  104. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/spec_pb2_grpc.py +0 -0
  105. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/svc.py +0 -0
  106. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/tags_pb2.py +0 -0
  107. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/tags_pb2_grpc.py +0 -0
  108. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_approvers_history_pb2.py +0 -0
  109. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
  110. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_approvers_pb2.py +0 -0
  111. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
  112. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_assignments_history_pb2.py +0 -0
  113. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
  114. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_assignments_pb2.py +0 -0
  115. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
  116. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_roles_history_pb2.py +0 -0
  117. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
  118. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_roles_pb2.py +0 -0
  119. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_roles_pb2_grpc.py +0 -0
  120. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflows_history_pb2.py +0 -0
  121. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflows_history_pb2_grpc.py +0 -0
  122. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflows_pb2.py +0 -0
  123. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflows_pb2_grpc.py +0 -0
  124. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm.egg-info/SOURCES.txt +0 -0
  125. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm.egg-info/dependency_links.txt +0 -0
  126. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm.egg-info/requires.txt +0 -0
  127. {strongdm-7.0.0 → strongdm-7.1.1}/strongdm.egg-info/top_level.txt +0 -0
@@ -1,12 +1,12 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: strongdm
3
- Version: 7.0.0
3
+ Version: 7.1.1
4
4
  Summary: strongDM SDK for the Python programming language.
5
5
  Home-page: https://github.com/strongdm/strongdm-sdk-python
6
6
  Author: strongDM Team
7
7
  Author-email: sdk-feedback@strongdm.com
8
8
  License: apache-2.0
9
- Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v7.0.0.tar.gz
9
+ Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v7.1.1.tar.gz
10
10
  Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
11
11
  Platform: UNKNOWN
12
12
  Classifier: Development Status :: 4 - Beta
@@ -23,7 +23,7 @@ from setuptools import setup
23
23
  setup(
24
24
  name='strongdm',
25
25
  packages=['strongdm'],
26
- version='7.0.0',
26
+ version='7.1.1',
27
27
  license='apache-2.0',
28
28
  description='strongDM SDK for the Python programming language.',
29
29
  long_description=long_description,
@@ -32,7 +32,7 @@ setup(
32
32
  author_email='sdk-feedback@strongdm.com',
33
33
  url='https://github.com/strongdm/strongdm-sdk-python',
34
34
  download_url=
35
- 'https://github.com/strongdm/strongdm-sdk-python/archive/v7.0.0.tar.gz',
35
+ 'https://github.com/strongdm/strongdm-sdk-python/archive/v7.1.1.tar.gz',
36
36
  keywords=[
37
37
  'strongDM', 'sdm', 'api', 'automation', 'security', 'audit',
38
38
  'database', 'server', 'ssh', 'rdp'
@@ -23,8 +23,9 @@ import hashlib
23
23
  import hmac
24
24
  import random
25
25
  import time
26
- from . import svc
26
+ from . import errors
27
27
  from . import plumbing
28
+ from . import svc
28
29
 
29
30
  # These defaults are taken from AWS. Customization of these values
30
31
  # is a future step in the API.
@@ -32,7 +33,7 @@ DEFAULT_MAX_RETRIES = 3
32
33
  DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
33
34
  DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
34
35
  API_VERSION = '2024-03-14'
35
- USER_AGENT = 'strongdm-sdk-python/7.0.0'
36
+ USER_AGENT = 'strongdm-sdk-python/7.1.1'
36
37
 
37
38
 
38
39
  class Client:
@@ -450,9 +451,9 @@ class Client:
450
451
  return False
451
452
  if not isinstance(err, grpc.RpcError):
452
453
  return True
453
- if (not self.expose_rate_limit_errors
454
- ) and err.code() == grpc.StatusCode.RESOURCE_EXHAUSTED:
455
- porcelain_err = plumbing.convert_error_to_porcelain(err)
454
+ porcelain_err = plumbing.convert_error_to_porcelain(err)
455
+ if (not self.expose_rate_limit_errors) and isinstance(
456
+ porcelain_err, errors.RateLimitError):
456
457
  wait_until = porcelain_err.rate_limit.reset_at
457
458
  now = datetime.datetime.now(datetime.timezone.utc)
458
459
  sleep_for = (wait_until - now).total_seconds()
@@ -947,10 +947,6 @@ class AWS:
947
947
 
948
948
 
949
949
  class AWSCertX509Store:
950
- '''
951
- AWSCertX509Store is currently unstable, and its API may change, or it may be removed,
952
- without a major version bump.
953
- '''
954
950
  __slots__ = [
955
951
  'caarn',
956
952
  'certificatetemplatearn',
@@ -985,9 +981,9 @@ class AWSCertX509Store:
985
981
  '''
986
982
  Unique identifier of the SecretStore.
987
983
  '''
988
- self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else ''
984
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
989
985
  '''
990
- The lifetime of certificates issued by this CA represented in minutes e.g. 600 (for 10 hours). Defaults to 8 hours if not provided.
986
+ The lifetime of certificates issued by this CA represented in minutes.
991
987
  '''
992
988
  self.name = name if name is not None else ''
993
989
  '''
@@ -2941,10 +2937,6 @@ class AccountUpdateResponse:
2941
2937
 
2942
2938
 
2943
2939
  class ActiveDirectoryStore:
2944
- '''
2945
- ActiveDirectoryStore is currently unstable, and its API may change, or it may be removed,
2946
- without a major version bump.
2947
- '''
2948
2940
  __slots__ = [
2949
2941
  'id',
2950
2942
  'name',
@@ -2969,7 +2961,7 @@ class ActiveDirectoryStore:
2969
2961
  '''
2970
2962
  self.server_address = server_address if server_address is not None else ''
2971
2963
  '''
2972
- Hostname of server that is hosting NDES (Network Device Enrollment Services).
2964
+ Hostname of server that is hosting NDES (Network Device Enrollment Services).
2973
2965
  Often this is the same host as Active Directory Certificate Services
2974
2966
  '''
2975
2967
  self.tags = tags if tags is not None else _porcelain_zero_value_tags()
@@ -9271,14 +9263,11 @@ class GCP:
9271
9263
 
9272
9264
 
9273
9265
  class GCPCertX509Store:
9274
- '''
9275
- GCPCertX509Store is currently unstable, and its API may change, or it may be removed,
9276
- without a major version bump.
9277
- '''
9278
9266
  __slots__ = [
9279
9267
  'caid',
9280
9268
  'capoolid',
9281
9269
  'id',
9270
+ 'issuedcertttlminutes',
9282
9271
  'location',
9283
9272
  'name',
9284
9273
  'projectid',
@@ -9290,6 +9279,7 @@ class GCPCertX509Store:
9290
9279
  caid=None,
9291
9280
  capoolid=None,
9292
9281
  id=None,
9282
+ issuedcertttlminutes=None,
9293
9283
  location=None,
9294
9284
  name=None,
9295
9285
  projectid=None,
@@ -9307,6 +9297,10 @@ class GCPCertX509Store:
9307
9297
  '''
9308
9298
  Unique identifier of the SecretStore.
9309
9299
  '''
9300
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
9301
+ '''
9302
+ The lifetime of certificates issued by this CA represented in minutes.
9303
+ '''
9310
9304
  self.location = location if location is not None else ''
9311
9305
  '''
9312
9306
  The Region for the CA in GCP format e.g. us-west1
@@ -9329,6 +9323,7 @@ class GCPCertX509Store:
9329
9323
  'caid: ' + repr(self.caid) + ' ' +\
9330
9324
  'capoolid: ' + repr(self.capoolid) + ' ' +\
9331
9325
  'id: ' + repr(self.id) + ' ' +\
9326
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
9332
9327
  'location: ' + repr(self.location) + ' ' +\
9333
9328
  'name: ' + repr(self.name) + ' ' +\
9334
9329
  'projectid: ' + repr(self.projectid) + ' ' +\
@@ -9340,6 +9335,7 @@ class GCPCertX509Store:
9340
9335
  'caid': self.caid,
9341
9336
  'capoolid': self.capoolid,
9342
9337
  'id': self.id,
9338
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
9343
9339
  'location': self.location,
9344
9340
  'name': self.name,
9345
9341
  'projectid': self.projectid,
@@ -9352,6 +9348,7 @@ class GCPCertX509Store:
9352
9348
  caid=d.get('caid'),
9353
9349
  capoolid=d.get('capoolid'),
9354
9350
  id=d.get('id'),
9351
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
9355
9352
  location=d.get('location'),
9356
9353
  name=d.get('name'),
9357
9354
  projectid=d.get('projectid'),
@@ -21110,12 +21107,9 @@ class User:
21110
21107
 
21111
21108
 
21112
21109
  class VaultAppRoleCertSSHStore:
21113
- '''
21114
- VaultAppRoleCertSSHStore is currently unstable, and its API may change, or it may be removed,
21115
- without a major version bump.
21116
- '''
21117
21110
  __slots__ = [
21118
21111
  'id',
21112
+ 'issuedcertttlminutes',
21119
21113
  'name',
21120
21114
  'namespace',
21121
21115
  'server_address',
@@ -21127,6 +21121,7 @@ class VaultAppRoleCertSSHStore:
21127
21121
  def __init__(
21128
21122
  self,
21129
21123
  id=None,
21124
+ issuedcertttlminutes=None,
21130
21125
  name=None,
21131
21126
  namespace=None,
21132
21127
  server_address=None,
@@ -21138,6 +21133,10 @@ class VaultAppRoleCertSSHStore:
21138
21133
  '''
21139
21134
  Unique identifier of the SecretStore.
21140
21135
  '''
21136
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
21137
+ '''
21138
+ The lifetime of certificates issued by this CA represented in minutes.
21139
+ '''
21141
21140
  self.name = name if name is not None else ''
21142
21141
  '''
21143
21142
  Unique human-readable name of the SecretStore.
@@ -21166,6 +21165,7 @@ class VaultAppRoleCertSSHStore:
21166
21165
  def __repr__(self):
21167
21166
  return '<sdm.VaultAppRoleCertSSHStore ' + \
21168
21167
  'id: ' + repr(self.id) + ' ' +\
21168
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
21169
21169
  'name: ' + repr(self.name) + ' ' +\
21170
21170
  'namespace: ' + repr(self.namespace) + ' ' +\
21171
21171
  'server_address: ' + repr(self.server_address) + ' ' +\
@@ -21177,6 +21177,7 @@ class VaultAppRoleCertSSHStore:
21177
21177
  def to_dict(self):
21178
21178
  return {
21179
21179
  'id': self.id,
21180
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
21180
21181
  'name': self.name,
21181
21182
  'namespace': self.namespace,
21182
21183
  'server_address': self.server_address,
@@ -21189,6 +21190,7 @@ class VaultAppRoleCertSSHStore:
21189
21190
  def from_dict(cls, d):
21190
21191
  return cls(
21191
21192
  id=d.get('id'),
21193
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
21192
21194
  name=d.get('name'),
21193
21195
  namespace=d.get('namespace'),
21194
21196
  server_address=d.get('server_address'),
@@ -21199,12 +21201,9 @@ class VaultAppRoleCertSSHStore:
21199
21201
 
21200
21202
 
21201
21203
  class VaultAppRoleCertX509Store:
21202
- '''
21203
- VaultAppRoleCertX509Store is currently unstable, and its API may change, or it may be removed,
21204
- without a major version bump.
21205
- '''
21206
21204
  __slots__ = [
21207
21205
  'id',
21206
+ 'issuedcertttlminutes',
21208
21207
  'name',
21209
21208
  'namespace',
21210
21209
  'pki_mount_point',
@@ -21216,6 +21215,7 @@ class VaultAppRoleCertX509Store:
21216
21215
  def __init__(
21217
21216
  self,
21218
21217
  id=None,
21218
+ issuedcertttlminutes=None,
21219
21219
  name=None,
21220
21220
  namespace=None,
21221
21221
  pki_mount_point=None,
@@ -21227,6 +21227,10 @@ class VaultAppRoleCertX509Store:
21227
21227
  '''
21228
21228
  Unique identifier of the SecretStore.
21229
21229
  '''
21230
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
21231
+ '''
21232
+ The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
21233
+ '''
21230
21234
  self.name = name if name is not None else ''
21231
21235
  '''
21232
21236
  Unique human-readable name of the SecretStore.
@@ -21255,6 +21259,7 @@ class VaultAppRoleCertX509Store:
21255
21259
  def __repr__(self):
21256
21260
  return '<sdm.VaultAppRoleCertX509Store ' + \
21257
21261
  'id: ' + repr(self.id) + ' ' +\
21262
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
21258
21263
  'name: ' + repr(self.name) + ' ' +\
21259
21264
  'namespace: ' + repr(self.namespace) + ' ' +\
21260
21265
  'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
@@ -21266,6 +21271,7 @@ class VaultAppRoleCertX509Store:
21266
21271
  def to_dict(self):
21267
21272
  return {
21268
21273
  'id': self.id,
21274
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
21269
21275
  'name': self.name,
21270
21276
  'namespace': self.namespace,
21271
21277
  'pki_mount_point': self.pki_mount_point,
@@ -21278,6 +21284,7 @@ class VaultAppRoleCertX509Store:
21278
21284
  def from_dict(cls, d):
21279
21285
  return cls(
21280
21286
  id=d.get('id'),
21287
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
21281
21288
  name=d.get('name'),
21282
21289
  namespace=d.get('namespace'),
21283
21290
  pki_mount_point=d.get('pki_mount_point'),
@@ -21355,15 +21362,12 @@ class VaultAppRoleStore:
21355
21362
 
21356
21363
 
21357
21364
  class VaultTLSCertSSHStore:
21358
- '''
21359
- VaultTLSCertSSHStore is currently unstable, and its API may change, or it may be removed,
21360
- without a major version bump.
21361
- '''
21362
21365
  __slots__ = [
21363
21366
  'ca_cert_path',
21364
21367
  'client_cert_path',
21365
21368
  'client_key_path',
21366
21369
  'id',
21370
+ 'issuedcertttlminutes',
21367
21371
  'name',
21368
21372
  'namespace',
21369
21373
  'server_address',
@@ -21378,6 +21382,7 @@ class VaultTLSCertSSHStore:
21378
21382
  client_cert_path=None,
21379
21383
  client_key_path=None,
21380
21384
  id=None,
21385
+ issuedcertttlminutes=None,
21381
21386
  name=None,
21382
21387
  namespace=None,
21383
21388
  server_address=None,
@@ -21401,6 +21406,10 @@ class VaultTLSCertSSHStore:
21401
21406
  '''
21402
21407
  Unique identifier of the SecretStore.
21403
21408
  '''
21409
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
21410
+ '''
21411
+ The lifetime of certificates issued by this CA represented in minutes.
21412
+ '''
21404
21413
  self.name = name if name is not None else ''
21405
21414
  '''
21406
21415
  Unique human-readable name of the SecretStore.
@@ -21432,6 +21441,7 @@ class VaultTLSCertSSHStore:
21432
21441
  'client_cert_path: ' + repr(self.client_cert_path) + ' ' +\
21433
21442
  'client_key_path: ' + repr(self.client_key_path) + ' ' +\
21434
21443
  'id: ' + repr(self.id) + ' ' +\
21444
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
21435
21445
  'name: ' + repr(self.name) + ' ' +\
21436
21446
  'namespace: ' + repr(self.namespace) + ' ' +\
21437
21447
  'server_address: ' + repr(self.server_address) + ' ' +\
@@ -21446,6 +21456,7 @@ class VaultTLSCertSSHStore:
21446
21456
  'client_cert_path': self.client_cert_path,
21447
21457
  'client_key_path': self.client_key_path,
21448
21458
  'id': self.id,
21459
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
21449
21460
  'name': self.name,
21450
21461
  'namespace': self.namespace,
21451
21462
  'server_address': self.server_address,
@@ -21461,6 +21472,7 @@ class VaultTLSCertSSHStore:
21461
21472
  client_cert_path=d.get('client_cert_path'),
21462
21473
  client_key_path=d.get('client_key_path'),
21463
21474
  id=d.get('id'),
21475
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
21464
21476
  name=d.get('name'),
21465
21477
  namespace=d.get('namespace'),
21466
21478
  server_address=d.get('server_address'),
@@ -21471,15 +21483,12 @@ class VaultTLSCertSSHStore:
21471
21483
 
21472
21484
 
21473
21485
  class VaultTLSCertX509Store:
21474
- '''
21475
- VaultTLSCertX509Store is currently unstable, and its API may change, or it may be removed,
21476
- without a major version bump.
21477
- '''
21478
21486
  __slots__ = [
21479
21487
  'ca_cert_path',
21480
21488
  'client_cert_path',
21481
21489
  'client_key_path',
21482
21490
  'id',
21491
+ 'issuedcertttlminutes',
21483
21492
  'name',
21484
21493
  'namespace',
21485
21494
  'pki_mount_point',
@@ -21494,6 +21503,7 @@ class VaultTLSCertX509Store:
21494
21503
  client_cert_path=None,
21495
21504
  client_key_path=None,
21496
21505
  id=None,
21506
+ issuedcertttlminutes=None,
21497
21507
  name=None,
21498
21508
  namespace=None,
21499
21509
  pki_mount_point=None,
@@ -21517,6 +21527,10 @@ class VaultTLSCertX509Store:
21517
21527
  '''
21518
21528
  Unique identifier of the SecretStore.
21519
21529
  '''
21530
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
21531
+ '''
21532
+ The lifetime of certificates issued by this CA represented in minutes.
21533
+ '''
21520
21534
  self.name = name if name is not None else ''
21521
21535
  '''
21522
21536
  Unique human-readable name of the SecretStore.
@@ -21548,6 +21562,7 @@ class VaultTLSCertX509Store:
21548
21562
  'client_cert_path: ' + repr(self.client_cert_path) + ' ' +\
21549
21563
  'client_key_path: ' + repr(self.client_key_path) + ' ' +\
21550
21564
  'id: ' + repr(self.id) + ' ' +\
21565
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
21551
21566
  'name: ' + repr(self.name) + ' ' +\
21552
21567
  'namespace: ' + repr(self.namespace) + ' ' +\
21553
21568
  'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
@@ -21562,6 +21577,7 @@ class VaultTLSCertX509Store:
21562
21577
  'client_cert_path': self.client_cert_path,
21563
21578
  'client_key_path': self.client_key_path,
21564
21579
  'id': self.id,
21580
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
21565
21581
  'name': self.name,
21566
21582
  'namespace': self.namespace,
21567
21583
  'pki_mount_point': self.pki_mount_point,
@@ -21577,6 +21593,7 @@ class VaultTLSCertX509Store:
21577
21593
  client_cert_path=d.get('client_cert_path'),
21578
21594
  client_key_path=d.get('client_key_path'),
21579
21595
  id=d.get('id'),
21596
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
21580
21597
  name=d.get('name'),
21581
21598
  namespace=d.get('namespace'),
21582
21599
  pki_mount_point=d.get('pki_mount_point'),
@@ -21681,12 +21698,9 @@ class VaultTLSStore:
21681
21698
 
21682
21699
 
21683
21700
  class VaultTokenCertSSHStore:
21684
- '''
21685
- VaultTokenCertSSHStore is currently unstable, and its API may change, or it may be removed,
21686
- without a major version bump.
21687
- '''
21688
21701
  __slots__ = [
21689
21702
  'id',
21703
+ 'issuedcertttlminutes',
21690
21704
  'name',
21691
21705
  'namespace',
21692
21706
  'server_address',
@@ -21698,6 +21712,7 @@ class VaultTokenCertSSHStore:
21698
21712
  def __init__(
21699
21713
  self,
21700
21714
  id=None,
21715
+ issuedcertttlminutes=None,
21701
21716
  name=None,
21702
21717
  namespace=None,
21703
21718
  server_address=None,
@@ -21709,6 +21724,10 @@ class VaultTokenCertSSHStore:
21709
21724
  '''
21710
21725
  Unique identifier of the SecretStore.
21711
21726
  '''
21727
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
21728
+ '''
21729
+ The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
21730
+ '''
21712
21731
  self.name = name if name is not None else ''
21713
21732
  '''
21714
21733
  Unique human-readable name of the SecretStore.
@@ -21737,6 +21756,7 @@ class VaultTokenCertSSHStore:
21737
21756
  def __repr__(self):
21738
21757
  return '<sdm.VaultTokenCertSSHStore ' + \
21739
21758
  'id: ' + repr(self.id) + ' ' +\
21759
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
21740
21760
  'name: ' + repr(self.name) + ' ' +\
21741
21761
  'namespace: ' + repr(self.namespace) + ' ' +\
21742
21762
  'server_address: ' + repr(self.server_address) + ' ' +\
@@ -21748,6 +21768,7 @@ class VaultTokenCertSSHStore:
21748
21768
  def to_dict(self):
21749
21769
  return {
21750
21770
  'id': self.id,
21771
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
21751
21772
  'name': self.name,
21752
21773
  'namespace': self.namespace,
21753
21774
  'server_address': self.server_address,
@@ -21760,6 +21781,7 @@ class VaultTokenCertSSHStore:
21760
21781
  def from_dict(cls, d):
21761
21782
  return cls(
21762
21783
  id=d.get('id'),
21784
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
21763
21785
  name=d.get('name'),
21764
21786
  namespace=d.get('namespace'),
21765
21787
  server_address=d.get('server_address'),
@@ -21770,12 +21792,9 @@ class VaultTokenCertSSHStore:
21770
21792
 
21771
21793
 
21772
21794
  class VaultTokenCertX509Store:
21773
- '''
21774
- VaultTokenCertX509Store is currently unstable, and its API may change, or it may be removed,
21775
- without a major version bump.
21776
- '''
21777
21795
  __slots__ = [
21778
21796
  'id',
21797
+ 'issuedcertttlminutes',
21779
21798
  'name',
21780
21799
  'namespace',
21781
21800
  'pki_mount_point',
@@ -21787,6 +21806,7 @@ class VaultTokenCertX509Store:
21787
21806
  def __init__(
21788
21807
  self,
21789
21808
  id=None,
21809
+ issuedcertttlminutes=None,
21790
21810
  name=None,
21791
21811
  namespace=None,
21792
21812
  pki_mount_point=None,
@@ -21798,6 +21818,10 @@ class VaultTokenCertX509Store:
21798
21818
  '''
21799
21819
  Unique identifier of the SecretStore.
21800
21820
  '''
21821
+ self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
21822
+ '''
21823
+ The lifetime of certificates issued by this CA represented in minutes.
21824
+ '''
21801
21825
  self.name = name if name is not None else ''
21802
21826
  '''
21803
21827
  Unique human-readable name of the SecretStore.
@@ -21826,6 +21850,7 @@ class VaultTokenCertX509Store:
21826
21850
  def __repr__(self):
21827
21851
  return '<sdm.VaultTokenCertX509Store ' + \
21828
21852
  'id: ' + repr(self.id) + ' ' +\
21853
+ 'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
21829
21854
  'name: ' + repr(self.name) + ' ' +\
21830
21855
  'namespace: ' + repr(self.namespace) + ' ' +\
21831
21856
  'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
@@ -21837,6 +21862,7 @@ class VaultTokenCertX509Store:
21837
21862
  def to_dict(self):
21838
21863
  return {
21839
21864
  'id': self.id,
21865
+ 'issuedcertttlminutes': self.issuedcertttlminutes,
21840
21866
  'name': self.name,
21841
21867
  'namespace': self.namespace,
21842
21868
  'pki_mount_point': self.pki_mount_point,
@@ -21849,6 +21875,7 @@ class VaultTokenCertX509Store:
21849
21875
  def from_dict(cls, d):
21850
21876
  return cls(
21851
21877
  id=d.get('id'),
21878
+ issuedcertttlminutes=d.get('issuedcertttlminutes'),
21852
21879
  name=d.get('name'),
21853
21880
  namespace=d.get('namespace'),
21854
21881
  pki_mount_point=d.get('pki_mount_point'),
@@ -4569,6 +4569,7 @@ def convert_gcp_cert_x_509_store_to_porcelain(plumbing):
4569
4569
  porcelain.caid = (plumbing.caID)
4570
4570
  porcelain.capoolid = (plumbing.caPoolID)
4571
4571
  porcelain.id = (plumbing.id)
4572
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
4572
4573
  porcelain.location = (plumbing.location)
4573
4574
  porcelain.name = (plumbing.name)
4574
4575
  porcelain.projectid = (plumbing.projectID)
@@ -4583,6 +4584,7 @@ def convert_gcp_cert_x_509_store_to_plumbing(porcelain):
4583
4584
  plumbing.caID = (porcelain.caid)
4584
4585
  plumbing.caPoolID = (porcelain.capoolid)
4585
4586
  plumbing.id = (porcelain.id)
4587
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
4586
4588
  plumbing.location = (porcelain.location)
4587
4589
  plumbing.name = (porcelain.name)
4588
4590
  plumbing.projectID = (porcelain.projectid)
@@ -10527,6 +10529,7 @@ def convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing):
10527
10529
  return None
10528
10530
  porcelain = models.VaultAppRoleCertSSHStore()
10529
10531
  porcelain.id = (plumbing.id)
10532
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
10530
10533
  porcelain.name = (plumbing.name)
10531
10534
  porcelain.namespace = (plumbing.namespace)
10532
10535
  porcelain.server_address = (plumbing.server_address)
@@ -10541,6 +10544,7 @@ def convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain):
10541
10544
  if porcelain is None:
10542
10545
  return plumbing
10543
10546
  plumbing.id = (porcelain.id)
10547
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
10544
10548
  plumbing.name = (porcelain.name)
10545
10549
  plumbing.namespace = (porcelain.namespace)
10546
10550
  plumbing.server_address = (porcelain.server_address)
@@ -10569,6 +10573,7 @@ def convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing):
10569
10573
  return None
10570
10574
  porcelain = models.VaultAppRoleCertX509Store()
10571
10575
  porcelain.id = (plumbing.id)
10576
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
10572
10577
  porcelain.name = (plumbing.name)
10573
10578
  porcelain.namespace = (plumbing.namespace)
10574
10579
  porcelain.pki_mount_point = (plumbing.pki_mount_point)
@@ -10583,6 +10588,7 @@ def convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain):
10583
10588
  if porcelain is None:
10584
10589
  return plumbing
10585
10590
  plumbing.id = (porcelain.id)
10591
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
10586
10592
  plumbing.name = (porcelain.name)
10587
10593
  plumbing.namespace = (porcelain.namespace)
10588
10594
  plumbing.pki_mount_point = (porcelain.pki_mount_point)
@@ -10652,6 +10658,7 @@ def convert_vault_tls_cert_ssh_store_to_porcelain(plumbing):
10652
10658
  porcelain.client_cert_path = (plumbing.client_cert_path)
10653
10659
  porcelain.client_key_path = (plumbing.client_key_path)
10654
10660
  porcelain.id = (plumbing.id)
10661
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
10655
10662
  porcelain.name = (plumbing.name)
10656
10663
  porcelain.namespace = (plumbing.namespace)
10657
10664
  porcelain.server_address = (plumbing.server_address)
@@ -10669,6 +10676,7 @@ def convert_vault_tls_cert_ssh_store_to_plumbing(porcelain):
10669
10676
  plumbing.client_cert_path = (porcelain.client_cert_path)
10670
10677
  plumbing.client_key_path = (porcelain.client_key_path)
10671
10678
  plumbing.id = (porcelain.id)
10679
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
10672
10680
  plumbing.name = (porcelain.name)
10673
10681
  plumbing.namespace = (porcelain.namespace)
10674
10682
  plumbing.server_address = (porcelain.server_address)
@@ -10700,6 +10708,7 @@ def convert_vault_tls_cert_x_509_store_to_porcelain(plumbing):
10700
10708
  porcelain.client_cert_path = (plumbing.client_cert_path)
10701
10709
  porcelain.client_key_path = (plumbing.client_key_path)
10702
10710
  porcelain.id = (plumbing.id)
10711
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
10703
10712
  porcelain.name = (plumbing.name)
10704
10713
  porcelain.namespace = (plumbing.namespace)
10705
10714
  porcelain.pki_mount_point = (plumbing.pki_mount_point)
@@ -10717,6 +10726,7 @@ def convert_vault_tls_cert_x_509_store_to_plumbing(porcelain):
10717
10726
  plumbing.client_cert_path = (porcelain.client_cert_path)
10718
10727
  plumbing.client_key_path = (porcelain.client_key_path)
10719
10728
  plumbing.id = (porcelain.id)
10729
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
10720
10730
  plumbing.name = (porcelain.name)
10721
10731
  plumbing.namespace = (porcelain.namespace)
10722
10732
  plumbing.pki_mount_point = (porcelain.pki_mount_point)
@@ -10789,6 +10799,7 @@ def convert_vault_token_cert_ssh_store_to_porcelain(plumbing):
10789
10799
  return None
10790
10800
  porcelain = models.VaultTokenCertSSHStore()
10791
10801
  porcelain.id = (plumbing.id)
10802
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
10792
10803
  porcelain.name = (plumbing.name)
10793
10804
  porcelain.namespace = (plumbing.namespace)
10794
10805
  porcelain.server_address = (plumbing.server_address)
@@ -10803,6 +10814,7 @@ def convert_vault_token_cert_ssh_store_to_plumbing(porcelain):
10803
10814
  if porcelain is None:
10804
10815
  return plumbing
10805
10816
  plumbing.id = (porcelain.id)
10817
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
10806
10818
  plumbing.name = (porcelain.name)
10807
10819
  plumbing.namespace = (porcelain.namespace)
10808
10820
  plumbing.server_address = (porcelain.server_address)
@@ -10831,6 +10843,7 @@ def convert_vault_token_cert_x_509_store_to_porcelain(plumbing):
10831
10843
  return None
10832
10844
  porcelain = models.VaultTokenCertX509Store()
10833
10845
  porcelain.id = (plumbing.id)
10846
+ porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
10834
10847
  porcelain.name = (plumbing.name)
10835
10848
  porcelain.namespace = (plumbing.namespace)
10836
10849
  porcelain.pki_mount_point = (plumbing.pki_mount_point)
@@ -10845,6 +10858,7 @@ def convert_vault_token_cert_x_509_store_to_plumbing(porcelain):
10845
10858
  if porcelain is None:
10846
10859
  return plumbing
10847
10860
  plumbing.id = (porcelain.id)
10861
+ plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
10848
10862
  plumbing.name = (porcelain.name)
10849
10863
  plumbing.namespace = (porcelain.namespace)
10850
10864
  plumbing.pki_mount_point = (porcelain.pki_mount_point)