strongdm 7.0.0__zip → 7.1.1__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-7.0.0 → strongdm-7.1.1}/PKG-INFO +2 -2
- {strongdm-7.0.0 → strongdm-7.1.1}/setup.py +2 -2
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/client.py +6 -5
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/models.py +66 -39
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/plumbing.py +14 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_store_types_pb2.py +58 -44
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-7.0.0 → strongdm-7.1.1}/LICENSE +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/README.md +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/setup.cfg +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/__init__.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/accounts_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/activities_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/constants.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/drivers_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/errors.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/nodes_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/options_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/queries_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/replays_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/resources_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/roles_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/spec_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/svc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/tags_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflows_pb2.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-7.0.0 → strongdm-7.1.1}/strongdm.egg-info/top_level.txt +0 -0
@@ -1,12 +1,12 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: strongdm
|
3
|
-
Version: 7.
|
3
|
+
Version: 7.1.1
|
4
4
|
Summary: strongDM SDK for the Python programming language.
|
5
5
|
Home-page: https://github.com/strongdm/strongdm-sdk-python
|
6
6
|
Author: strongDM Team
|
7
7
|
Author-email: sdk-feedback@strongdm.com
|
8
8
|
License: apache-2.0
|
9
|
-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v7.
|
9
|
+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v7.1.1.tar.gz
|
10
10
|
Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
|
11
11
|
Platform: UNKNOWN
|
12
12
|
Classifier: Development Status :: 4 - Beta
|
@@ -23,7 +23,7 @@ from setuptools import setup
|
|
23
23
|
setup(
|
24
24
|
name='strongdm',
|
25
25
|
packages=['strongdm'],
|
26
|
-
version='7.
|
26
|
+
version='7.1.1',
|
27
27
|
license='apache-2.0',
|
28
28
|
description='strongDM SDK for the Python programming language.',
|
29
29
|
long_description=long_description,
|
@@ -32,7 +32,7 @@ setup(
|
|
32
32
|
author_email='sdk-feedback@strongdm.com',
|
33
33
|
url='https://github.com/strongdm/strongdm-sdk-python',
|
34
34
|
download_url=
|
35
|
-
'https://github.com/strongdm/strongdm-sdk-python/archive/v7.
|
35
|
+
'https://github.com/strongdm/strongdm-sdk-python/archive/v7.1.1.tar.gz',
|
36
36
|
keywords=[
|
37
37
|
'strongDM', 'sdm', 'api', 'automation', 'security', 'audit',
|
38
38
|
'database', 'server', 'ssh', 'rdp'
|
@@ -23,8 +23,9 @@ import hashlib
|
|
23
23
|
import hmac
|
24
24
|
import random
|
25
25
|
import time
|
26
|
-
from . import
|
26
|
+
from . import errors
|
27
27
|
from . import plumbing
|
28
|
+
from . import svc
|
28
29
|
|
29
30
|
# These defaults are taken from AWS. Customization of these values
|
30
31
|
# is a future step in the API.
|
@@ -32,7 +33,7 @@ DEFAULT_MAX_RETRIES = 3
|
|
32
33
|
DEFAULT_BASE_RETRY_DELAY = 0.0030 # 30 ms
|
33
34
|
DEFAULT_MAX_RETRY_DELAY = 300 # 300 seconds
|
34
35
|
API_VERSION = '2024-03-14'
|
35
|
-
USER_AGENT = 'strongdm-sdk-python/7.
|
36
|
+
USER_AGENT = 'strongdm-sdk-python/7.1.1'
|
36
37
|
|
37
38
|
|
38
39
|
class Client:
|
@@ -450,9 +451,9 @@ class Client:
|
|
450
451
|
return False
|
451
452
|
if not isinstance(err, grpc.RpcError):
|
452
453
|
return True
|
453
|
-
|
454
|
-
|
455
|
-
|
454
|
+
porcelain_err = plumbing.convert_error_to_porcelain(err)
|
455
|
+
if (not self.expose_rate_limit_errors) and isinstance(
|
456
|
+
porcelain_err, errors.RateLimitError):
|
456
457
|
wait_until = porcelain_err.rate_limit.reset_at
|
457
458
|
now = datetime.datetime.now(datetime.timezone.utc)
|
458
459
|
sleep_for = (wait_until - now).total_seconds()
|
@@ -947,10 +947,6 @@ class AWS:
|
|
947
947
|
|
948
948
|
|
949
949
|
class AWSCertX509Store:
|
950
|
-
'''
|
951
|
-
AWSCertX509Store is currently unstable, and its API may change, or it may be removed,
|
952
|
-
without a major version bump.
|
953
|
-
'''
|
954
950
|
__slots__ = [
|
955
951
|
'caarn',
|
956
952
|
'certificatetemplatearn',
|
@@ -985,9 +981,9 @@ class AWSCertX509Store:
|
|
985
981
|
'''
|
986
982
|
Unique identifier of the SecretStore.
|
987
983
|
'''
|
988
|
-
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else
|
984
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
989
985
|
'''
|
990
|
-
The lifetime of certificates issued by this CA represented in minutes
|
986
|
+
The lifetime of certificates issued by this CA represented in minutes.
|
991
987
|
'''
|
992
988
|
self.name = name if name is not None else ''
|
993
989
|
'''
|
@@ -2941,10 +2937,6 @@ class AccountUpdateResponse:
|
|
2941
2937
|
|
2942
2938
|
|
2943
2939
|
class ActiveDirectoryStore:
|
2944
|
-
'''
|
2945
|
-
ActiveDirectoryStore is currently unstable, and its API may change, or it may be removed,
|
2946
|
-
without a major version bump.
|
2947
|
-
'''
|
2948
2940
|
__slots__ = [
|
2949
2941
|
'id',
|
2950
2942
|
'name',
|
@@ -2969,7 +2961,7 @@ class ActiveDirectoryStore:
|
|
2969
2961
|
'''
|
2970
2962
|
self.server_address = server_address if server_address is not None else ''
|
2971
2963
|
'''
|
2972
|
-
Hostname of server that is hosting NDES (Network Device Enrollment Services).
|
2964
|
+
Hostname of server that is hosting NDES (Network Device Enrollment Services).
|
2973
2965
|
Often this is the same host as Active Directory Certificate Services
|
2974
2966
|
'''
|
2975
2967
|
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
@@ -9271,14 +9263,11 @@ class GCP:
|
|
9271
9263
|
|
9272
9264
|
|
9273
9265
|
class GCPCertX509Store:
|
9274
|
-
'''
|
9275
|
-
GCPCertX509Store is currently unstable, and its API may change, or it may be removed,
|
9276
|
-
without a major version bump.
|
9277
|
-
'''
|
9278
9266
|
__slots__ = [
|
9279
9267
|
'caid',
|
9280
9268
|
'capoolid',
|
9281
9269
|
'id',
|
9270
|
+
'issuedcertttlminutes',
|
9282
9271
|
'location',
|
9283
9272
|
'name',
|
9284
9273
|
'projectid',
|
@@ -9290,6 +9279,7 @@ class GCPCertX509Store:
|
|
9290
9279
|
caid=None,
|
9291
9280
|
capoolid=None,
|
9292
9281
|
id=None,
|
9282
|
+
issuedcertttlminutes=None,
|
9293
9283
|
location=None,
|
9294
9284
|
name=None,
|
9295
9285
|
projectid=None,
|
@@ -9307,6 +9297,10 @@ class GCPCertX509Store:
|
|
9307
9297
|
'''
|
9308
9298
|
Unique identifier of the SecretStore.
|
9309
9299
|
'''
|
9300
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
9301
|
+
'''
|
9302
|
+
The lifetime of certificates issued by this CA represented in minutes.
|
9303
|
+
'''
|
9310
9304
|
self.location = location if location is not None else ''
|
9311
9305
|
'''
|
9312
9306
|
The Region for the CA in GCP format e.g. us-west1
|
@@ -9329,6 +9323,7 @@ class GCPCertX509Store:
|
|
9329
9323
|
'caid: ' + repr(self.caid) + ' ' +\
|
9330
9324
|
'capoolid: ' + repr(self.capoolid) + ' ' +\
|
9331
9325
|
'id: ' + repr(self.id) + ' ' +\
|
9326
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
9332
9327
|
'location: ' + repr(self.location) + ' ' +\
|
9333
9328
|
'name: ' + repr(self.name) + ' ' +\
|
9334
9329
|
'projectid: ' + repr(self.projectid) + ' ' +\
|
@@ -9340,6 +9335,7 @@ class GCPCertX509Store:
|
|
9340
9335
|
'caid': self.caid,
|
9341
9336
|
'capoolid': self.capoolid,
|
9342
9337
|
'id': self.id,
|
9338
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
9343
9339
|
'location': self.location,
|
9344
9340
|
'name': self.name,
|
9345
9341
|
'projectid': self.projectid,
|
@@ -9352,6 +9348,7 @@ class GCPCertX509Store:
|
|
9352
9348
|
caid=d.get('caid'),
|
9353
9349
|
capoolid=d.get('capoolid'),
|
9354
9350
|
id=d.get('id'),
|
9351
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
9355
9352
|
location=d.get('location'),
|
9356
9353
|
name=d.get('name'),
|
9357
9354
|
projectid=d.get('projectid'),
|
@@ -21110,12 +21107,9 @@ class User:
|
|
21110
21107
|
|
21111
21108
|
|
21112
21109
|
class VaultAppRoleCertSSHStore:
|
21113
|
-
'''
|
21114
|
-
VaultAppRoleCertSSHStore is currently unstable, and its API may change, or it may be removed,
|
21115
|
-
without a major version bump.
|
21116
|
-
'''
|
21117
21110
|
__slots__ = [
|
21118
21111
|
'id',
|
21112
|
+
'issuedcertttlminutes',
|
21119
21113
|
'name',
|
21120
21114
|
'namespace',
|
21121
21115
|
'server_address',
|
@@ -21127,6 +21121,7 @@ class VaultAppRoleCertSSHStore:
|
|
21127
21121
|
def __init__(
|
21128
21122
|
self,
|
21129
21123
|
id=None,
|
21124
|
+
issuedcertttlminutes=None,
|
21130
21125
|
name=None,
|
21131
21126
|
namespace=None,
|
21132
21127
|
server_address=None,
|
@@ -21138,6 +21133,10 @@ class VaultAppRoleCertSSHStore:
|
|
21138
21133
|
'''
|
21139
21134
|
Unique identifier of the SecretStore.
|
21140
21135
|
'''
|
21136
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
21137
|
+
'''
|
21138
|
+
The lifetime of certificates issued by this CA represented in minutes.
|
21139
|
+
'''
|
21141
21140
|
self.name = name if name is not None else ''
|
21142
21141
|
'''
|
21143
21142
|
Unique human-readable name of the SecretStore.
|
@@ -21166,6 +21165,7 @@ class VaultAppRoleCertSSHStore:
|
|
21166
21165
|
def __repr__(self):
|
21167
21166
|
return '<sdm.VaultAppRoleCertSSHStore ' + \
|
21168
21167
|
'id: ' + repr(self.id) + ' ' +\
|
21168
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
21169
21169
|
'name: ' + repr(self.name) + ' ' +\
|
21170
21170
|
'namespace: ' + repr(self.namespace) + ' ' +\
|
21171
21171
|
'server_address: ' + repr(self.server_address) + ' ' +\
|
@@ -21177,6 +21177,7 @@ class VaultAppRoleCertSSHStore:
|
|
21177
21177
|
def to_dict(self):
|
21178
21178
|
return {
|
21179
21179
|
'id': self.id,
|
21180
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
21180
21181
|
'name': self.name,
|
21181
21182
|
'namespace': self.namespace,
|
21182
21183
|
'server_address': self.server_address,
|
@@ -21189,6 +21190,7 @@ class VaultAppRoleCertSSHStore:
|
|
21189
21190
|
def from_dict(cls, d):
|
21190
21191
|
return cls(
|
21191
21192
|
id=d.get('id'),
|
21193
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
21192
21194
|
name=d.get('name'),
|
21193
21195
|
namespace=d.get('namespace'),
|
21194
21196
|
server_address=d.get('server_address'),
|
@@ -21199,12 +21201,9 @@ class VaultAppRoleCertSSHStore:
|
|
21199
21201
|
|
21200
21202
|
|
21201
21203
|
class VaultAppRoleCertX509Store:
|
21202
|
-
'''
|
21203
|
-
VaultAppRoleCertX509Store is currently unstable, and its API may change, or it may be removed,
|
21204
|
-
without a major version bump.
|
21205
|
-
'''
|
21206
21204
|
__slots__ = [
|
21207
21205
|
'id',
|
21206
|
+
'issuedcertttlminutes',
|
21208
21207
|
'name',
|
21209
21208
|
'namespace',
|
21210
21209
|
'pki_mount_point',
|
@@ -21216,6 +21215,7 @@ class VaultAppRoleCertX509Store:
|
|
21216
21215
|
def __init__(
|
21217
21216
|
self,
|
21218
21217
|
id=None,
|
21218
|
+
issuedcertttlminutes=None,
|
21219
21219
|
name=None,
|
21220
21220
|
namespace=None,
|
21221
21221
|
pki_mount_point=None,
|
@@ -21227,6 +21227,10 @@ class VaultAppRoleCertX509Store:
|
|
21227
21227
|
'''
|
21228
21228
|
Unique identifier of the SecretStore.
|
21229
21229
|
'''
|
21230
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
21231
|
+
'''
|
21232
|
+
The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
21233
|
+
'''
|
21230
21234
|
self.name = name if name is not None else ''
|
21231
21235
|
'''
|
21232
21236
|
Unique human-readable name of the SecretStore.
|
@@ -21255,6 +21259,7 @@ class VaultAppRoleCertX509Store:
|
|
21255
21259
|
def __repr__(self):
|
21256
21260
|
return '<sdm.VaultAppRoleCertX509Store ' + \
|
21257
21261
|
'id: ' + repr(self.id) + ' ' +\
|
21262
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
21258
21263
|
'name: ' + repr(self.name) + ' ' +\
|
21259
21264
|
'namespace: ' + repr(self.namespace) + ' ' +\
|
21260
21265
|
'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
|
@@ -21266,6 +21271,7 @@ class VaultAppRoleCertX509Store:
|
|
21266
21271
|
def to_dict(self):
|
21267
21272
|
return {
|
21268
21273
|
'id': self.id,
|
21274
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
21269
21275
|
'name': self.name,
|
21270
21276
|
'namespace': self.namespace,
|
21271
21277
|
'pki_mount_point': self.pki_mount_point,
|
@@ -21278,6 +21284,7 @@ class VaultAppRoleCertX509Store:
|
|
21278
21284
|
def from_dict(cls, d):
|
21279
21285
|
return cls(
|
21280
21286
|
id=d.get('id'),
|
21287
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
21281
21288
|
name=d.get('name'),
|
21282
21289
|
namespace=d.get('namespace'),
|
21283
21290
|
pki_mount_point=d.get('pki_mount_point'),
|
@@ -21355,15 +21362,12 @@ class VaultAppRoleStore:
|
|
21355
21362
|
|
21356
21363
|
|
21357
21364
|
class VaultTLSCertSSHStore:
|
21358
|
-
'''
|
21359
|
-
VaultTLSCertSSHStore is currently unstable, and its API may change, or it may be removed,
|
21360
|
-
without a major version bump.
|
21361
|
-
'''
|
21362
21365
|
__slots__ = [
|
21363
21366
|
'ca_cert_path',
|
21364
21367
|
'client_cert_path',
|
21365
21368
|
'client_key_path',
|
21366
21369
|
'id',
|
21370
|
+
'issuedcertttlminutes',
|
21367
21371
|
'name',
|
21368
21372
|
'namespace',
|
21369
21373
|
'server_address',
|
@@ -21378,6 +21382,7 @@ class VaultTLSCertSSHStore:
|
|
21378
21382
|
client_cert_path=None,
|
21379
21383
|
client_key_path=None,
|
21380
21384
|
id=None,
|
21385
|
+
issuedcertttlminutes=None,
|
21381
21386
|
name=None,
|
21382
21387
|
namespace=None,
|
21383
21388
|
server_address=None,
|
@@ -21401,6 +21406,10 @@ class VaultTLSCertSSHStore:
|
|
21401
21406
|
'''
|
21402
21407
|
Unique identifier of the SecretStore.
|
21403
21408
|
'''
|
21409
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
21410
|
+
'''
|
21411
|
+
The lifetime of certificates issued by this CA represented in minutes.
|
21412
|
+
'''
|
21404
21413
|
self.name = name if name is not None else ''
|
21405
21414
|
'''
|
21406
21415
|
Unique human-readable name of the SecretStore.
|
@@ -21432,6 +21441,7 @@ class VaultTLSCertSSHStore:
|
|
21432
21441
|
'client_cert_path: ' + repr(self.client_cert_path) + ' ' +\
|
21433
21442
|
'client_key_path: ' + repr(self.client_key_path) + ' ' +\
|
21434
21443
|
'id: ' + repr(self.id) + ' ' +\
|
21444
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
21435
21445
|
'name: ' + repr(self.name) + ' ' +\
|
21436
21446
|
'namespace: ' + repr(self.namespace) + ' ' +\
|
21437
21447
|
'server_address: ' + repr(self.server_address) + ' ' +\
|
@@ -21446,6 +21456,7 @@ class VaultTLSCertSSHStore:
|
|
21446
21456
|
'client_cert_path': self.client_cert_path,
|
21447
21457
|
'client_key_path': self.client_key_path,
|
21448
21458
|
'id': self.id,
|
21459
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
21449
21460
|
'name': self.name,
|
21450
21461
|
'namespace': self.namespace,
|
21451
21462
|
'server_address': self.server_address,
|
@@ -21461,6 +21472,7 @@ class VaultTLSCertSSHStore:
|
|
21461
21472
|
client_cert_path=d.get('client_cert_path'),
|
21462
21473
|
client_key_path=d.get('client_key_path'),
|
21463
21474
|
id=d.get('id'),
|
21475
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
21464
21476
|
name=d.get('name'),
|
21465
21477
|
namespace=d.get('namespace'),
|
21466
21478
|
server_address=d.get('server_address'),
|
@@ -21471,15 +21483,12 @@ class VaultTLSCertSSHStore:
|
|
21471
21483
|
|
21472
21484
|
|
21473
21485
|
class VaultTLSCertX509Store:
|
21474
|
-
'''
|
21475
|
-
VaultTLSCertX509Store is currently unstable, and its API may change, or it may be removed,
|
21476
|
-
without a major version bump.
|
21477
|
-
'''
|
21478
21486
|
__slots__ = [
|
21479
21487
|
'ca_cert_path',
|
21480
21488
|
'client_cert_path',
|
21481
21489
|
'client_key_path',
|
21482
21490
|
'id',
|
21491
|
+
'issuedcertttlminutes',
|
21483
21492
|
'name',
|
21484
21493
|
'namespace',
|
21485
21494
|
'pki_mount_point',
|
@@ -21494,6 +21503,7 @@ class VaultTLSCertX509Store:
|
|
21494
21503
|
client_cert_path=None,
|
21495
21504
|
client_key_path=None,
|
21496
21505
|
id=None,
|
21506
|
+
issuedcertttlminutes=None,
|
21497
21507
|
name=None,
|
21498
21508
|
namespace=None,
|
21499
21509
|
pki_mount_point=None,
|
@@ -21517,6 +21527,10 @@ class VaultTLSCertX509Store:
|
|
21517
21527
|
'''
|
21518
21528
|
Unique identifier of the SecretStore.
|
21519
21529
|
'''
|
21530
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
21531
|
+
'''
|
21532
|
+
The lifetime of certificates issued by this CA represented in minutes.
|
21533
|
+
'''
|
21520
21534
|
self.name = name if name is not None else ''
|
21521
21535
|
'''
|
21522
21536
|
Unique human-readable name of the SecretStore.
|
@@ -21548,6 +21562,7 @@ class VaultTLSCertX509Store:
|
|
21548
21562
|
'client_cert_path: ' + repr(self.client_cert_path) + ' ' +\
|
21549
21563
|
'client_key_path: ' + repr(self.client_key_path) + ' ' +\
|
21550
21564
|
'id: ' + repr(self.id) + ' ' +\
|
21565
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
21551
21566
|
'name: ' + repr(self.name) + ' ' +\
|
21552
21567
|
'namespace: ' + repr(self.namespace) + ' ' +\
|
21553
21568
|
'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
|
@@ -21562,6 +21577,7 @@ class VaultTLSCertX509Store:
|
|
21562
21577
|
'client_cert_path': self.client_cert_path,
|
21563
21578
|
'client_key_path': self.client_key_path,
|
21564
21579
|
'id': self.id,
|
21580
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
21565
21581
|
'name': self.name,
|
21566
21582
|
'namespace': self.namespace,
|
21567
21583
|
'pki_mount_point': self.pki_mount_point,
|
@@ -21577,6 +21593,7 @@ class VaultTLSCertX509Store:
|
|
21577
21593
|
client_cert_path=d.get('client_cert_path'),
|
21578
21594
|
client_key_path=d.get('client_key_path'),
|
21579
21595
|
id=d.get('id'),
|
21596
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
21580
21597
|
name=d.get('name'),
|
21581
21598
|
namespace=d.get('namespace'),
|
21582
21599
|
pki_mount_point=d.get('pki_mount_point'),
|
@@ -21681,12 +21698,9 @@ class VaultTLSStore:
|
|
21681
21698
|
|
21682
21699
|
|
21683
21700
|
class VaultTokenCertSSHStore:
|
21684
|
-
'''
|
21685
|
-
VaultTokenCertSSHStore is currently unstable, and its API may change, or it may be removed,
|
21686
|
-
without a major version bump.
|
21687
|
-
'''
|
21688
21701
|
__slots__ = [
|
21689
21702
|
'id',
|
21703
|
+
'issuedcertttlminutes',
|
21690
21704
|
'name',
|
21691
21705
|
'namespace',
|
21692
21706
|
'server_address',
|
@@ -21698,6 +21712,7 @@ class VaultTokenCertSSHStore:
|
|
21698
21712
|
def __init__(
|
21699
21713
|
self,
|
21700
21714
|
id=None,
|
21715
|
+
issuedcertttlminutes=None,
|
21701
21716
|
name=None,
|
21702
21717
|
namespace=None,
|
21703
21718
|
server_address=None,
|
@@ -21709,6 +21724,10 @@ class VaultTokenCertSSHStore:
|
|
21709
21724
|
'''
|
21710
21725
|
Unique identifier of the SecretStore.
|
21711
21726
|
'''
|
21727
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
21728
|
+
'''
|
21729
|
+
The lifetime of certificates issued by this CA in minutes. Recommended value is 5.
|
21730
|
+
'''
|
21712
21731
|
self.name = name if name is not None else ''
|
21713
21732
|
'''
|
21714
21733
|
Unique human-readable name of the SecretStore.
|
@@ -21737,6 +21756,7 @@ class VaultTokenCertSSHStore:
|
|
21737
21756
|
def __repr__(self):
|
21738
21757
|
return '<sdm.VaultTokenCertSSHStore ' + \
|
21739
21758
|
'id: ' + repr(self.id) + ' ' +\
|
21759
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
21740
21760
|
'name: ' + repr(self.name) + ' ' +\
|
21741
21761
|
'namespace: ' + repr(self.namespace) + ' ' +\
|
21742
21762
|
'server_address: ' + repr(self.server_address) + ' ' +\
|
@@ -21748,6 +21768,7 @@ class VaultTokenCertSSHStore:
|
|
21748
21768
|
def to_dict(self):
|
21749
21769
|
return {
|
21750
21770
|
'id': self.id,
|
21771
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
21751
21772
|
'name': self.name,
|
21752
21773
|
'namespace': self.namespace,
|
21753
21774
|
'server_address': self.server_address,
|
@@ -21760,6 +21781,7 @@ class VaultTokenCertSSHStore:
|
|
21760
21781
|
def from_dict(cls, d):
|
21761
21782
|
return cls(
|
21762
21783
|
id=d.get('id'),
|
21784
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
21763
21785
|
name=d.get('name'),
|
21764
21786
|
namespace=d.get('namespace'),
|
21765
21787
|
server_address=d.get('server_address'),
|
@@ -21770,12 +21792,9 @@ class VaultTokenCertSSHStore:
|
|
21770
21792
|
|
21771
21793
|
|
21772
21794
|
class VaultTokenCertX509Store:
|
21773
|
-
'''
|
21774
|
-
VaultTokenCertX509Store is currently unstable, and its API may change, or it may be removed,
|
21775
|
-
without a major version bump.
|
21776
|
-
'''
|
21777
21795
|
__slots__ = [
|
21778
21796
|
'id',
|
21797
|
+
'issuedcertttlminutes',
|
21779
21798
|
'name',
|
21780
21799
|
'namespace',
|
21781
21800
|
'pki_mount_point',
|
@@ -21787,6 +21806,7 @@ class VaultTokenCertX509Store:
|
|
21787
21806
|
def __init__(
|
21788
21807
|
self,
|
21789
21808
|
id=None,
|
21809
|
+
issuedcertttlminutes=None,
|
21790
21810
|
name=None,
|
21791
21811
|
namespace=None,
|
21792
21812
|
pki_mount_point=None,
|
@@ -21798,6 +21818,10 @@ class VaultTokenCertX509Store:
|
|
21798
21818
|
'''
|
21799
21819
|
Unique identifier of the SecretStore.
|
21800
21820
|
'''
|
21821
|
+
self.issuedcertttlminutes = issuedcertttlminutes if issuedcertttlminutes is not None else 0
|
21822
|
+
'''
|
21823
|
+
The lifetime of certificates issued by this CA represented in minutes.
|
21824
|
+
'''
|
21801
21825
|
self.name = name if name is not None else ''
|
21802
21826
|
'''
|
21803
21827
|
Unique human-readable name of the SecretStore.
|
@@ -21826,6 +21850,7 @@ class VaultTokenCertX509Store:
|
|
21826
21850
|
def __repr__(self):
|
21827
21851
|
return '<sdm.VaultTokenCertX509Store ' + \
|
21828
21852
|
'id: ' + repr(self.id) + ' ' +\
|
21853
|
+
'issuedcertttlminutes: ' + repr(self.issuedcertttlminutes) + ' ' +\
|
21829
21854
|
'name: ' + repr(self.name) + ' ' +\
|
21830
21855
|
'namespace: ' + repr(self.namespace) + ' ' +\
|
21831
21856
|
'pki_mount_point: ' + repr(self.pki_mount_point) + ' ' +\
|
@@ -21837,6 +21862,7 @@ class VaultTokenCertX509Store:
|
|
21837
21862
|
def to_dict(self):
|
21838
21863
|
return {
|
21839
21864
|
'id': self.id,
|
21865
|
+
'issuedcertttlminutes': self.issuedcertttlminutes,
|
21840
21866
|
'name': self.name,
|
21841
21867
|
'namespace': self.namespace,
|
21842
21868
|
'pki_mount_point': self.pki_mount_point,
|
@@ -21849,6 +21875,7 @@ class VaultTokenCertX509Store:
|
|
21849
21875
|
def from_dict(cls, d):
|
21850
21876
|
return cls(
|
21851
21877
|
id=d.get('id'),
|
21878
|
+
issuedcertttlminutes=d.get('issuedcertttlminutes'),
|
21852
21879
|
name=d.get('name'),
|
21853
21880
|
namespace=d.get('namespace'),
|
21854
21881
|
pki_mount_point=d.get('pki_mount_point'),
|
@@ -4569,6 +4569,7 @@ def convert_gcp_cert_x_509_store_to_porcelain(plumbing):
|
|
4569
4569
|
porcelain.caid = (plumbing.caID)
|
4570
4570
|
porcelain.capoolid = (plumbing.caPoolID)
|
4571
4571
|
porcelain.id = (plumbing.id)
|
4572
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
4572
4573
|
porcelain.location = (plumbing.location)
|
4573
4574
|
porcelain.name = (plumbing.name)
|
4574
4575
|
porcelain.projectid = (plumbing.projectID)
|
@@ -4583,6 +4584,7 @@ def convert_gcp_cert_x_509_store_to_plumbing(porcelain):
|
|
4583
4584
|
plumbing.caID = (porcelain.caid)
|
4584
4585
|
plumbing.caPoolID = (porcelain.capoolid)
|
4585
4586
|
plumbing.id = (porcelain.id)
|
4587
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
4586
4588
|
plumbing.location = (porcelain.location)
|
4587
4589
|
plumbing.name = (porcelain.name)
|
4588
4590
|
plumbing.projectID = (porcelain.projectid)
|
@@ -10527,6 +10529,7 @@ def convert_vault_app_role_cert_ssh_store_to_porcelain(plumbing):
|
|
10527
10529
|
return None
|
10528
10530
|
porcelain = models.VaultAppRoleCertSSHStore()
|
10529
10531
|
porcelain.id = (plumbing.id)
|
10532
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
10530
10533
|
porcelain.name = (plumbing.name)
|
10531
10534
|
porcelain.namespace = (plumbing.namespace)
|
10532
10535
|
porcelain.server_address = (plumbing.server_address)
|
@@ -10541,6 +10544,7 @@ def convert_vault_app_role_cert_ssh_store_to_plumbing(porcelain):
|
|
10541
10544
|
if porcelain is None:
|
10542
10545
|
return plumbing
|
10543
10546
|
plumbing.id = (porcelain.id)
|
10547
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
10544
10548
|
plumbing.name = (porcelain.name)
|
10545
10549
|
plumbing.namespace = (porcelain.namespace)
|
10546
10550
|
plumbing.server_address = (porcelain.server_address)
|
@@ -10569,6 +10573,7 @@ def convert_vault_app_role_cert_x_509_store_to_porcelain(plumbing):
|
|
10569
10573
|
return None
|
10570
10574
|
porcelain = models.VaultAppRoleCertX509Store()
|
10571
10575
|
porcelain.id = (plumbing.id)
|
10576
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
10572
10577
|
porcelain.name = (plumbing.name)
|
10573
10578
|
porcelain.namespace = (plumbing.namespace)
|
10574
10579
|
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
@@ -10583,6 +10588,7 @@ def convert_vault_app_role_cert_x_509_store_to_plumbing(porcelain):
|
|
10583
10588
|
if porcelain is None:
|
10584
10589
|
return plumbing
|
10585
10590
|
plumbing.id = (porcelain.id)
|
10591
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
10586
10592
|
plumbing.name = (porcelain.name)
|
10587
10593
|
plumbing.namespace = (porcelain.namespace)
|
10588
10594
|
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
@@ -10652,6 +10658,7 @@ def convert_vault_tls_cert_ssh_store_to_porcelain(plumbing):
|
|
10652
10658
|
porcelain.client_cert_path = (plumbing.client_cert_path)
|
10653
10659
|
porcelain.client_key_path = (plumbing.client_key_path)
|
10654
10660
|
porcelain.id = (plumbing.id)
|
10661
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
10655
10662
|
porcelain.name = (plumbing.name)
|
10656
10663
|
porcelain.namespace = (plumbing.namespace)
|
10657
10664
|
porcelain.server_address = (plumbing.server_address)
|
@@ -10669,6 +10676,7 @@ def convert_vault_tls_cert_ssh_store_to_plumbing(porcelain):
|
|
10669
10676
|
plumbing.client_cert_path = (porcelain.client_cert_path)
|
10670
10677
|
plumbing.client_key_path = (porcelain.client_key_path)
|
10671
10678
|
plumbing.id = (porcelain.id)
|
10679
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
10672
10680
|
plumbing.name = (porcelain.name)
|
10673
10681
|
plumbing.namespace = (porcelain.namespace)
|
10674
10682
|
plumbing.server_address = (porcelain.server_address)
|
@@ -10700,6 +10708,7 @@ def convert_vault_tls_cert_x_509_store_to_porcelain(plumbing):
|
|
10700
10708
|
porcelain.client_cert_path = (plumbing.client_cert_path)
|
10701
10709
|
porcelain.client_key_path = (plumbing.client_key_path)
|
10702
10710
|
porcelain.id = (plumbing.id)
|
10711
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
10703
10712
|
porcelain.name = (plumbing.name)
|
10704
10713
|
porcelain.namespace = (plumbing.namespace)
|
10705
10714
|
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
@@ -10717,6 +10726,7 @@ def convert_vault_tls_cert_x_509_store_to_plumbing(porcelain):
|
|
10717
10726
|
plumbing.client_cert_path = (porcelain.client_cert_path)
|
10718
10727
|
plumbing.client_key_path = (porcelain.client_key_path)
|
10719
10728
|
plumbing.id = (porcelain.id)
|
10729
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
10720
10730
|
plumbing.name = (porcelain.name)
|
10721
10731
|
plumbing.namespace = (porcelain.namespace)
|
10722
10732
|
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|
@@ -10789,6 +10799,7 @@ def convert_vault_token_cert_ssh_store_to_porcelain(plumbing):
|
|
10789
10799
|
return None
|
10790
10800
|
porcelain = models.VaultTokenCertSSHStore()
|
10791
10801
|
porcelain.id = (plumbing.id)
|
10802
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
10792
10803
|
porcelain.name = (plumbing.name)
|
10793
10804
|
porcelain.namespace = (plumbing.namespace)
|
10794
10805
|
porcelain.server_address = (plumbing.server_address)
|
@@ -10803,6 +10814,7 @@ def convert_vault_token_cert_ssh_store_to_plumbing(porcelain):
|
|
10803
10814
|
if porcelain is None:
|
10804
10815
|
return plumbing
|
10805
10816
|
plumbing.id = (porcelain.id)
|
10817
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
10806
10818
|
plumbing.name = (porcelain.name)
|
10807
10819
|
plumbing.namespace = (porcelain.namespace)
|
10808
10820
|
plumbing.server_address = (porcelain.server_address)
|
@@ -10831,6 +10843,7 @@ def convert_vault_token_cert_x_509_store_to_porcelain(plumbing):
|
|
10831
10843
|
return None
|
10832
10844
|
porcelain = models.VaultTokenCertX509Store()
|
10833
10845
|
porcelain.id = (plumbing.id)
|
10846
|
+
porcelain.issuedcertttlminutes = (plumbing.issuedCertTTLMinutes)
|
10834
10847
|
porcelain.name = (plumbing.name)
|
10835
10848
|
porcelain.namespace = (plumbing.namespace)
|
10836
10849
|
porcelain.pki_mount_point = (plumbing.pki_mount_point)
|
@@ -10845,6 +10858,7 @@ def convert_vault_token_cert_x_509_store_to_plumbing(porcelain):
|
|
10845
10858
|
if porcelain is None:
|
10846
10859
|
return plumbing
|
10847
10860
|
plumbing.id = (porcelain.id)
|
10861
|
+
plumbing.issuedCertTTLMinutes = (porcelain.issuedcertttlminutes)
|
10848
10862
|
plumbing.name = (porcelain.name)
|
10849
10863
|
plumbing.namespace = (porcelain.namespace)
|
10850
10864
|
plumbing.pki_mount_point = (porcelain.pki_mount_point)
|