strongdm 8.0.0__zip → 8.1.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-8.0.0 → strongdm-8.1.0}/PKG-INFO +2 -2
- {strongdm-8.0.0 → strongdm-8.1.0}/setup.py +2 -2
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/accounts_pb2.py +12 -12
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/client.py +1 -1
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/constants.py +4 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/models.py +151 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/options_pb2.py +20 -20
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/plumbing.py +68 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/secret_store_types_pb2.py +80 -40
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/svc.py +1 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-8.0.0 → strongdm-8.1.0}/LICENSE +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/README.md +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/setup.cfg +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/__init__.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/drivers_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/errors.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-8.0.0 → strongdm-8.1.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -1,12 +1,12 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: strongdm
|
3
|
-
Version: 8.
|
3
|
+
Version: 8.1.0
|
4
4
|
Summary: strongDM SDK for the Python programming language.
|
5
5
|
Home-page: https://github.com/strongdm/strongdm-sdk-python
|
6
6
|
Author: strongDM Team
|
7
7
|
Author-email: sdk-feedback@strongdm.com
|
8
8
|
License: apache-2.0
|
9
|
-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v8.
|
9
|
+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v8.1.0.tar.gz
|
10
10
|
Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
|
11
11
|
Platform: UNKNOWN
|
12
12
|
Classifier: Development Status :: 4 - Beta
|
@@ -23,7 +23,7 @@ from setuptools import setup
|
|
23
23
|
setup(
|
24
24
|
name='strongdm',
|
25
25
|
packages=['strongdm'],
|
26
|
-
version='8.
|
26
|
+
version='8.1.0',
|
27
27
|
license='apache-2.0',
|
28
28
|
description='strongDM SDK for the Python programming language.',
|
29
29
|
long_description=long_description,
|
@@ -32,7 +32,7 @@ setup(
|
|
32
32
|
author_email='sdk-feedback@strongdm.com',
|
33
33
|
url='https://github.com/strongdm/strongdm-sdk-python',
|
34
34
|
download_url=
|
35
|
-
'https://github.com/strongdm/strongdm-sdk-python/archive/v8.
|
35
|
+
'https://github.com/strongdm/strongdm-sdk-python/archive/v8.1.0.tar.gz',
|
36
36
|
keywords=[
|
37
37
|
'strongDM', 'sdm', 'api', 'automation', 'security', 'audit',
|
38
38
|
'database', 'server', 'ssh', 'rdp'
|
@@ -33,7 +33,7 @@ from . import spec_pb2 as spec__pb2
|
|
33
33
|
from . import tags_pb2 as tags__pb2
|
34
34
|
|
35
35
|
|
36
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x0e\x61\x63\x63ounts.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\"i\n\x14\x41\x63\x63ountCreateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.CreateRequestMetadata\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xf8\x02\n\x15\x41\x63\x63ountCreateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.CreateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\x05token\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xf0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x04 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12<\n\naccess_key\x18\x05 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider\x12<\n\nsecret_key\x18\x06 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"Q\n\x11\x41\x63\x63ountGetRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xd6\x01\n\x12\x41\x63\x63ountGetResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"u\n\x14\x41\x63\x63ountUpdateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.UpdateRequestMetadata\x12\n\n\x02id\x18\x02 \x01(\t\x12(\n\x07\x61\x63\x63ount\x18\x03 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xdc\x01\n\x15\x41\x63\x63ountUpdateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.UpdateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x14\x41\x63\x63ountDeleteRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.DeleteRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xb2\x01\n\x15\x41\x63\x63ountDeleteResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.DeleteResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x02 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x12\x41\x63\x63ountListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xc1\x01\n\x13\x41\x63\x63ountListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12)\n\x08\x61\x63\x63ounts\x18\x02 \x03(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\"\
|
36
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x0e\x61\x63\x63ounts.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\"i\n\x14\x41\x63\x63ountCreateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.CreateRequestMetadata\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xf8\x02\n\x15\x41\x63\x63ountCreateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.CreateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\x05token\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xf0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x04 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12<\n\naccess_key\x18\x05 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider\x12<\n\nsecret_key\x18\x06 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"Q\n\x11\x41\x63\x63ountGetRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xd6\x01\n\x12\x41\x63\x63ountGetResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"u\n\x14\x41\x63\x63ountUpdateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.UpdateRequestMetadata\x12\n\n\x02id\x18\x02 \x01(\t\x12(\n\x07\x61\x63\x63ount\x18\x03 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xdc\x01\n\x15\x41\x63\x63ountUpdateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.UpdateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x14\x41\x63\x63ountDeleteRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.DeleteRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xb2\x01\n\x15\x41\x63\x63ountDeleteResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.DeleteResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x02 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x12\x41\x63\x63ountListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xc1\x01\n\x13\x41\x63\x63ountListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12)\n\x08\x61\x63\x63ounts\x18\x02 \x03(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\"\x94\x02\n\x07\x41\x63\x63ount\x12$\n\x04user\x18\x01 \x01(\x0b\x32\x08.v1.UserB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00\x12*\n\x07service\x18\x02 \x01(\x0b\x32\x0b.v1.ServiceB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00\x12&\n\x05token\x18\x03 \x01(\x0b\x32\t.v1.TokenB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00:a\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07R\xc2\xf3\xb3\x07M\xa2\xf3\xb3\x07 tf_examples/account_resource.txt\xaa\xf3\xb3\x07#tf_examples/account_data_source.txtB,\n\x07\x61\x63\x63ount\x12!\xaa\xf8\xb3\x07\x0e\xaa\xf8\xb3\x07\tsuspended\xaa\xf8\xb3\x07\t\xaa\xf8\xb3\x07\x04tags\"\xd2\x06\n\x04User\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\x05\x65mail\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12#\n\nfirst_name\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\"\n\tlast_name\x18\x04 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12*\n\tsuspended\x18\x05 \x01(\x08\x42\x17\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12\"\n\x04tags\x18\x06 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x36\n\x10permission_level\x18\x07 \x01(\tB\x1c\xf2\xf8\xb3\x07\x17\x98\xf4\xb3\x07\x01\xb2\xf4\xb3\x07\r!json_gateway\x12#\n\nmanaged_by\x18\x08 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01\x12\x1f\n\x0b\x65xternal_id\x18\t \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\xdb\x01\n\x0bsuspendedRO\x18\n \x01(\x08\x42\xc5\x01\xf2\xf8\xb3\x07\xbf\x01\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\xaf\x01\xc2\xf4\xb3\x07\x0f\n\x02go\x12\tSuspended\xc2\xf4\xb3\x07\x10\n\x03\x63li\x12\tsuspended\xc2\xf4\xb3\x07\x11\n\x04ruby\x12\tsuspended\xc2\xf4\xb3\x07\x13\n\x06python\x12\tsuspended\xc2\xf4\xb3\x07\x11\n\x04java\x12\tSuspended\xc2\xf4\xb3\x07\x1f\n\x12terraform-provider\x12\tsuspended\xc2\xf4\xb3\x07\x19\n\x0cjson_gateway\x12\tsuspended\x98\xf4\xb3\x07\x01\x12\x90\x02\n\x12permission_levelRW\x18\x0b \x01(\tB\xf3\x01\xf2\xf8\xb3\x07\xed\x01\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\xdd\x01\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fPermissionLevel\xc2\xf4\xb3\x07\x17\n\x03\x63li\x12\x10permission-level\xc2\xf4\xb3\x07\x18\n\x04ruby\x12\x10permission_level\xc2\xf4\xb3\x07\x1a\n\x06python\x12\x10permission_level\xc2\xf4\xb3\x07\x17\n\x04java\x12\x0fPermissionLevel\xc2\xf4\xb3\x07&\n\x12terraform-provider\x12\x10permission_level\xc2\xf4\xb3\x07\x1f\n\x0cjson_gateway\x12\x0fpermissionLevel\xd0\xf4\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x8f\x01\n\x07Service\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\x04name\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1d\n\tsuspended\x18\x03 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x04tags\x18\x04 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x81\x03\n\x05Token\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\x04name\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1d\n\tsuspended\x18\x03 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x04tags\x18\x04 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x37\n\x07rekeyed\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x38\n\x08\x64\x65\x61\x64line\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12 \n\x0c\x61\x63\x63ount_type\x18\x07 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1f\n\x0bpermissions\x18\x08 \x03(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x37\n\x08\x64uration\x18\t \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\x0f\xfa\xf8\xb3\x07\n\xa8\xf3\xb3\x07\x01\xd8\xf3\xb3\x07\x01\x32\xab\x04\n\x08\x41\x63\x63ounts\x12\x63\n\x06\x43reate\x12\x18.v1.AccountCreateRequest\x1a\x19.v1.AccountCreateResponse\"$\x82\xf9\xb3\x07\t\xa2\xf3\xb3\x07\x04post\x82\xf9\xb3\x07\x11\xaa\xf3\xb3\x07\x0c/v1/accounts\x12^\n\x03Get\x12\x15.v1.AccountGetRequest\x1a\x16.v1.AccountGetResponse\"(\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x16\xaa\xf3\xb3\x07\x11/v1/accounts/{id}\x12g\n\x06Update\x12\x18.v1.AccountUpdateRequest\x1a\x19.v1.AccountUpdateResponse\"(\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03put\x82\xf9\xb3\x07\x16\xaa\xf3\xb3\x07\x11/v1/accounts/{id}\x12j\n\x06\x44\x65lete\x12\x18.v1.AccountDeleteRequest\x1a\x19.v1.AccountDeleteResponse\"+\x82\xf9\xb3\x07\x0b\xa2\xf3\xb3\x07\x06\x64\x65lete\x82\xf9\xb3\x07\x16\xaa\xf3\xb3\x07\x11/v1/accounts/{id}\x12\\\n\x04List\x12\x16.v1.AccountListRequest\x1a\x17.v1.AccountListResponse\"#\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x11\xaa\xf3\xb3\x07\x0c/v1/accounts\x1a\'\xca\xf9\xb3\x07\x0c\xc2\xf9\xb3\x07\x07\x41\x63\x63ount\xca\xf9\xb3\x07\x07\xd2\xf9\xb3\x07\x02\x61-\xca\xf9\xb3\x07\x05\xe0\xf9\xb3\x07\x01\x42\x64\n\x19\x63om.strongdm.api.plumbingB\x10\x41\x63\x63ountsPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
|
37
37
|
|
38
38
|
|
39
39
|
|
@@ -211,7 +211,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
211
211
|
_ACCOUNT.fields_by_name['service']._options = None
|
212
212
|
_ACCOUNT.fields_by_name['service']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
213
213
|
_ACCOUNT.fields_by_name['token']._options = None
|
214
|
-
_ACCOUNT.fields_by_name['token']._serialized_options = b'\362\370\263\007
|
214
|
+
_ACCOUNT.fields_by_name['token']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
215
215
|
_ACCOUNT._options = None
|
216
216
|
_ACCOUNT._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007R\302\363\263\007M\242\363\263\007 tf_examples/account_resource.txt\252\363\263\007#tf_examples/account_data_source.txt'
|
217
217
|
_USER.fields_by_name['id']._options = None
|
@@ -267,7 +267,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
267
267
|
_TOKEN.fields_by_name['duration']._options = None
|
268
268
|
_TOKEN.fields_by_name['duration']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
269
269
|
_TOKEN._options = None
|
270
|
-
_TOKEN._serialized_options = b'\372\370\263\007
|
270
|
+
_TOKEN._serialized_options = b'\372\370\263\007\n\250\363\263\007\001\330\363\263\007\001'
|
271
271
|
_ACCOUNTS._options = None
|
272
272
|
_ACCOUNTS._serialized_options = b'\312\371\263\007\014\302\371\263\007\007Account\312\371\263\007\007\322\371\263\007\002a-\312\371\263\007\005\340\371\263\007\001'
|
273
273
|
_ACCOUNTS.methods_by_name['Create']._options = None
|
@@ -301,13 +301,13 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
301
301
|
_ACCOUNTLISTRESPONSE._serialized_start=1614
|
302
302
|
_ACCOUNTLISTRESPONSE._serialized_end=1807
|
303
303
|
_ACCOUNT._serialized_start=1810
|
304
|
-
_ACCOUNT._serialized_end=
|
305
|
-
_USER._serialized_start=
|
306
|
-
_USER._serialized_end=
|
307
|
-
_SERVICE._serialized_start=
|
308
|
-
_SERVICE._serialized_end=
|
309
|
-
_TOKEN._serialized_start=
|
310
|
-
_TOKEN._serialized_end=
|
311
|
-
_ACCOUNTS._serialized_start=
|
312
|
-
_ACCOUNTS._serialized_end=
|
304
|
+
_ACCOUNT._serialized_end=2086
|
305
|
+
_USER._serialized_start=2089
|
306
|
+
_USER._serialized_end=2939
|
307
|
+
_SERVICE._serialized_start=2942
|
308
|
+
_SERVICE._serialized_end=3085
|
309
|
+
_TOKEN._serialized_start=3088
|
310
|
+
_TOKEN._serialized_end=3473
|
311
|
+
_ACCOUNTS._serialized_start=3476
|
312
|
+
_ACCOUNTS._serialized_end=4031
|
313
313
|
# @@protoc_insertion_point(module_scope)
|
@@ -240,9 +240,13 @@ class ActivityVerb:
|
|
240
240
|
REMOTE_IDENTITY_GROUP_CREATED = "remote identity group created"
|
241
241
|
REMOTE_IDENTITY_GROUP_UPDATED = "remote identity group updated"
|
242
242
|
REMOTE_IDENTITY_GROUP_DELETED = "remote identity group deleted"
|
243
|
+
IDENTITY_SET_PROVISIONING_ENABLED = "identity set provisioning enabled"
|
244
|
+
IDENTITY_SET_PROVISIONING_DISABLED = "identity set provisioning disabled"
|
243
245
|
REMOTE_IDENTITY_CREATED = "remote identity created"
|
244
246
|
REMOTE_IDENTITY_UPDATED = "remote identity updated"
|
245
247
|
REMOTE_IDENTITY_DELETED = "remote identity deleted"
|
248
|
+
IDENTITY_ALIAS_PROVISIONING_ENABLED = "identity alias provisioning enabled"
|
249
|
+
IDENTITY_ALIAS_PROVISIONING_DISABLED = "identity alias provisioning disabled"
|
246
250
|
ACCESS_REQUESTED_TO_RESOURCE = "access requested to resource"
|
247
251
|
ACCESS_REQUEST_TO_RESOURCE_APPROVAL_ADDED = "access request to resource approval added"
|
248
252
|
ACCESS_REQUEST_TO_RESOURCE_CANCELED = "access request to resource canceled"
|
@@ -10493,6 +10493,157 @@ class HTTPNoAuth:
|
|
10493
10493
|
)
|
10494
10494
|
|
10495
10495
|
|
10496
|
+
class KeyfactorX509Store:
|
10497
|
+
__slots__ = [
|
10498
|
+
'ca_file_path',
|
10499
|
+
'certificate_file_path',
|
10500
|
+
'default_certificate_authority_name',
|
10501
|
+
'default_certificate_profile_name',
|
10502
|
+
'default_end_entity_profile_name',
|
10503
|
+
'enrollment_code_env_var',
|
10504
|
+
'enrollment_username_env_var',
|
10505
|
+
'id',
|
10506
|
+
'key_file_path',
|
10507
|
+
'key_password_env_var',
|
10508
|
+
'name',
|
10509
|
+
'server_address',
|
10510
|
+
'tags',
|
10511
|
+
]
|
10512
|
+
|
10513
|
+
def __init__(
|
10514
|
+
self,
|
10515
|
+
ca_file_path=None,
|
10516
|
+
certificate_file_path=None,
|
10517
|
+
default_certificate_authority_name=None,
|
10518
|
+
default_certificate_profile_name=None,
|
10519
|
+
default_end_entity_profile_name=None,
|
10520
|
+
enrollment_code_env_var=None,
|
10521
|
+
enrollment_username_env_var=None,
|
10522
|
+
id=None,
|
10523
|
+
key_file_path=None,
|
10524
|
+
key_password_env_var=None,
|
10525
|
+
name=None,
|
10526
|
+
server_address=None,
|
10527
|
+
tags=None,
|
10528
|
+
):
|
10529
|
+
self.ca_file_path = ca_file_path if ca_file_path is not None else ''
|
10530
|
+
'''
|
10531
|
+
Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
10532
|
+
This is not required if the CA is trusted by the host operating system. This should be a PEM
|
10533
|
+
formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
|
10534
|
+
'''
|
10535
|
+
self.certificate_file_path = certificate_file_path if certificate_file_path is not None else ''
|
10536
|
+
'''
|
10537
|
+
Path to client certificate in PEM format. This certificate must contain a client certificate that
|
10538
|
+
is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
|
10539
|
+
key associated with the certificate, but KeyFile can also be set to configure the private key.
|
10540
|
+
'''
|
10541
|
+
self.default_certificate_authority_name = default_certificate_authority_name if default_certificate_authority_name is not None else ''
|
10542
|
+
'''
|
10543
|
+
Name of EJBCA certificate authority that will enroll CSR.
|
10544
|
+
'''
|
10545
|
+
self.default_certificate_profile_name = default_certificate_profile_name if default_certificate_profile_name is not None else ''
|
10546
|
+
'''
|
10547
|
+
Certificate profile name that EJBCA will enroll the CSR with.
|
10548
|
+
'''
|
10549
|
+
self.default_end_entity_profile_name = default_end_entity_profile_name if default_end_entity_profile_name is not None else ''
|
10550
|
+
'''
|
10551
|
+
End entity profile that EJBCA will enroll the CSR with.
|
10552
|
+
'''
|
10553
|
+
self.enrollment_code_env_var = enrollment_code_env_var if enrollment_code_env_var is not None else ''
|
10554
|
+
'''
|
10555
|
+
code used by EJBCA during enrollment. May be left blank if no code is required.
|
10556
|
+
'''
|
10557
|
+
self.enrollment_username_env_var = enrollment_username_env_var if enrollment_username_env_var is not None else ''
|
10558
|
+
'''
|
10559
|
+
username that used by the EJBCA during enrollment. This can be left out.
|
10560
|
+
If so, the username must be auto-generated on the Keyfactor side.
|
10561
|
+
'''
|
10562
|
+
self.id = id if id is not None else ''
|
10563
|
+
'''
|
10564
|
+
Unique identifier of the SecretStore.
|
10565
|
+
'''
|
10566
|
+
self.key_file_path = key_file_path if key_file_path is not None else ''
|
10567
|
+
'''
|
10568
|
+
Path to private key in PEM format. This file should contain the private key associated with the
|
10569
|
+
client certificate configured in CertificateFile.
|
10570
|
+
'''
|
10571
|
+
self.key_password_env_var = key_password_env_var if key_password_env_var is not None else ''
|
10572
|
+
'''
|
10573
|
+
optional environment variable housing the password that is used to decrypt the key file.
|
10574
|
+
'''
|
10575
|
+
self.name = name if name is not None else ''
|
10576
|
+
'''
|
10577
|
+
Unique human-readable name of the SecretStore.
|
10578
|
+
'''
|
10579
|
+
self.server_address = server_address if server_address is not None else ''
|
10580
|
+
'''
|
10581
|
+
the host of the Key Factor CA
|
10582
|
+
'''
|
10583
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
10584
|
+
'''
|
10585
|
+
Tags is a map of key, value pairs.
|
10586
|
+
'''
|
10587
|
+
|
10588
|
+
def __repr__(self):
|
10589
|
+
return '<sdm.KeyfactorX509Store ' + \
|
10590
|
+
'ca_file_path: ' + repr(self.ca_file_path) + ' ' +\
|
10591
|
+
'certificate_file_path: ' + repr(self.certificate_file_path) + ' ' +\
|
10592
|
+
'default_certificate_authority_name: ' + repr(self.default_certificate_authority_name) + ' ' +\
|
10593
|
+
'default_certificate_profile_name: ' + repr(self.default_certificate_profile_name) + ' ' +\
|
10594
|
+
'default_end_entity_profile_name: ' + repr(self.default_end_entity_profile_name) + ' ' +\
|
10595
|
+
'enrollment_code_env_var: ' + repr(self.enrollment_code_env_var) + ' ' +\
|
10596
|
+
'enrollment_username_env_var: ' + repr(self.enrollment_username_env_var) + ' ' +\
|
10597
|
+
'id: ' + repr(self.id) + ' ' +\
|
10598
|
+
'key_file_path: ' + repr(self.key_file_path) + ' ' +\
|
10599
|
+
'key_password_env_var: ' + repr(self.key_password_env_var) + ' ' +\
|
10600
|
+
'name: ' + repr(self.name) + ' ' +\
|
10601
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
10602
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
10603
|
+
'>'
|
10604
|
+
|
10605
|
+
def to_dict(self):
|
10606
|
+
return {
|
10607
|
+
'ca_file_path': self.ca_file_path,
|
10608
|
+
'certificate_file_path': self.certificate_file_path,
|
10609
|
+
'default_certificate_authority_name':
|
10610
|
+
self.default_certificate_authority_name,
|
10611
|
+
'default_certificate_profile_name':
|
10612
|
+
self.default_certificate_profile_name,
|
10613
|
+
'default_end_entity_profile_name':
|
10614
|
+
self.default_end_entity_profile_name,
|
10615
|
+
'enrollment_code_env_var': self.enrollment_code_env_var,
|
10616
|
+
'enrollment_username_env_var': self.enrollment_username_env_var,
|
10617
|
+
'id': self.id,
|
10618
|
+
'key_file_path': self.key_file_path,
|
10619
|
+
'key_password_env_var': self.key_password_env_var,
|
10620
|
+
'name': self.name,
|
10621
|
+
'server_address': self.server_address,
|
10622
|
+
'tags': self.tags,
|
10623
|
+
}
|
10624
|
+
|
10625
|
+
@classmethod
|
10626
|
+
def from_dict(cls, d):
|
10627
|
+
return cls(
|
10628
|
+
ca_file_path=d.get('ca_file_path'),
|
10629
|
+
certificate_file_path=d.get('certificate_file_path'),
|
10630
|
+
default_certificate_authority_name=d.get(
|
10631
|
+
'default_certificate_authority_name'),
|
10632
|
+
default_certificate_profile_name=d.get(
|
10633
|
+
'default_certificate_profile_name'),
|
10634
|
+
default_end_entity_profile_name=d.get(
|
10635
|
+
'default_end_entity_profile_name'),
|
10636
|
+
enrollment_code_env_var=d.get('enrollment_code_env_var'),
|
10637
|
+
enrollment_username_env_var=d.get('enrollment_username_env_var'),
|
10638
|
+
id=d.get('id'),
|
10639
|
+
key_file_path=d.get('key_file_path'),
|
10640
|
+
key_password_env_var=d.get('key_password_env_var'),
|
10641
|
+
name=d.get('name'),
|
10642
|
+
server_address=d.get('server_address'),
|
10643
|
+
tags=d.get('tags'),
|
10644
|
+
)
|
10645
|
+
|
10646
|
+
|
10496
10647
|
class Kubernetes:
|
10497
10648
|
__slots__ = [
|
10498
10649
|
'bind_interface',
|
@@ -29,7 +29,7 @@ _sym_db = _symbol_database.Default()
|
|
29
29
|
from google.protobuf import descriptor_pb2 as google_dot_protobuf_dot_descriptor__pb2
|
30
30
|
|
31
31
|
|
32
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\roptions.proto\x12\x02v1\x1a google/protobuf/descriptor.proto\"9\n\x0b\x46ileOptions\x12\x11\n\x07targets\x18\xc4\xc1v \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xaa\x01\n\x0eServiceOptions\x12\x13\n\tmain_noun\x18\x98\xbfv \x01(\t\x12\x13\n\tid_prefix\x18\x9a\xbfv \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t\x12#\n\x19\x64isable_snapshot_vertical\x18\x9b\xbfv \x01(\x08\x12\x1d\n\x13skip_cli_generation\x18\x9c\xbfv \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"x\n\rMethodOptions\x12\x10\n\x06method\x18\xb4\xbev \x01(\t\x12\r\n\x03url\x18\xb5\xbev \x01(\t\x12\x1a\n\x10\x64\x65precation_date\x18\xb6\xbev \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\
|
32
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\roptions.proto\x12\x02v1\x1a google/protobuf/descriptor.proto\"9\n\x0b\x46ileOptions\x12\x11\n\x07targets\x18\xc4\xc1v \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xaa\x01\n\x0eServiceOptions\x12\x13\n\tmain_noun\x18\x98\xbfv \x01(\t\x12\x13\n\tid_prefix\x18\x9a\xbfv \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t\x12#\n\x19\x64isable_snapshot_vertical\x18\x9b\xbfv \x01(\x08\x12\x1d\n\x13skip_cli_generation\x18\x9c\xbfv \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"x\n\rMethodOptions\x12\x10\n\x06method\x18\xb4\xbev \x01(\t\x12\r\n\x03url\x18\xb5\xbev \x01(\t\x12\x1a\n\x10\x64\x65precation_date\x18\xb6\xbev \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xf2\x01\n\x0eMessageOptions\x12\x13\n\tporcelain\x18\xb5\xbev \x01(\x08\x12\x0f\n\x05\x65rror\x18\xb6\xbev \x01(\x05\x12\x17\n\roptions_field\x18\xb7\xbev \x01(\t\x12\x11\n\x07targets\x18\xba\xbev \x03(\t\x12+\n\x0eterraform_docs\x18\xb8\xbev \x01(\x0b\x32\x11.v1.TerraformDocs\x12#\n\x06\x63ustom\x18\xb9\xbev \x01(\x0b\x32\x11.v1.CustomOptions\x12#\n\x19terraform_datasource_only\x18\xbb\xbev \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"@\n\x0cOneofOptions\x12\x17\n\rcommon_fields\x18\x85\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\x8f\x04\n\x0c\x46ieldOptions\x12\x13\n\tporcelain\x18\xb6\xbev \x01(\x08\x12\x12\n\x08iterable\x18\xb7\xbev \x01(\x08\x12\x12\n\x08required\x18\xb8\xbev \x01(\x08\x12\x14\n\nwrite_only\x18\xbd\xbev \x01(\x08\x12\x13\n\tread_only\x18\xc3\xbev \x01(\x08\x12\x17\n\ris_credential\x18\xc4\xbev \x01(\x08\x12\x11\n\x07targets\x18\xc6\xbev \x03(\t\x12\x1d\n\x13terraform_force_new\x18\xbc\xbev \x01(\x08\x12\x1d\n\x13terraform_sensitive\x18\xbe\xbev \x01(\x08\x12&\n\x1cterraform_diff_suppress_func\x18\xc7\xbev \x01(\t\x12\x1c\n\x12terraform_computed\x18\xca\xbev \x01(\x08\x12#\n\x06\x63ustom\x18\xb9\xbev \x01(\x0b\x32\x11.v1.CustomOptions\x12\x44\n\x12read_only_override\x18\xc0\xbev \x03(\x0b\x32&.v1.FieldOptions.ReadOnlyOverrideEntry\x12\x13\n\tcondition\x18\xcb\xbev \x01(\t\x12\x15\n\x0b\x65xpect_file\x18\xcc\xbev \x01(\x08\x1a\x37\n\x15ReadOnlyOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x08:\x02\x38\x01:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\x8f\x05\n\rCustomOptions\x12\x13\n\tconverter\x18\xbd\xbev \x01(\t\x12O\n\x17porcelain_type_override\x18\xbe\xbev \x03(\x0b\x32,.v1.CustomOptions.PorcelainTypeOverrideEntry\x12O\n\x17porcelain_name_override\x18\xc8\xbev \x03(\x0b\x32,.v1.CustomOptions.PorcelainNameOverrideEntry\x12\x42\n\x10\x63omment_override\x18\xd3\xbev \x03(\x0b\x32&.v1.CustomOptions.CommentOverrideEntry\x12H\n\x13\x64\x65precated_override\x18\xc0\xbev \x03(\x0b\x32).v1.CustomOptions.DeprecatedOverrideEntry\x12\x1d\n\x13terraform_elem_type\x18\xbf\xbev \x01(\t\x12\x12\n\x08unstable\x18\xc1\xbev \x01(\x08\x1a<\n\x1aPorcelainTypeOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a<\n\x1aPorcelainNameOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x36\n\x14\x43ommentOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x39\n\x17\x44\x65precatedOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x08:\x02\x38\x01:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"m\n\rTerraformDocs\x12\x1f\n\x15resource_example_path\x18\xb4\xbev \x01(\t\x12\"\n\x18\x64\x61ta_source_example_path\x18\xb5\xbev \x01(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway:E\n\x0c\x66ile_options\x12\x1c.google.protobuf.FileOptions\x18\xa8\xc2v \x01(\x0b\x32\x0f.v1.FileOptions:N\n\x0fservice_options\x12\x1f.google.protobuf.ServiceOptions\x18\x99\xbfv \x01(\x0b\x32\x12.v1.ServiceOptions:K\n\x0emethod_options\x12\x1e.google.protobuf.MethodOptions\x18\x90\xbfv \x01(\x0b\x32\x11.v1.MethodOptions:N\n\x0fmessage_options\x12\x1f.google.protobuf.MessageOptions\x18\x8f\xbfv \x01(\x0b\x32\x12.v1.MessageOptions:H\n\roneof_options\x12\x1d.google.protobuf.OneofOptions\x18\x85\xbfv \x01(\x0b\x32\x10.v1.OneofOptions:H\n\rfield_options\x12\x1d.google.protobuf.FieldOptions\x18\x8e\xbfv \x01(\x0b\x32\x10.v1.FieldOptionsBR\n\x19\x63om.strongdm.api.plumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
|
33
33
|
|
34
34
|
|
35
35
|
FILE_OPTIONS_FIELD_NUMBER = 1941800
|
@@ -197,23 +197,23 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
197
197
|
_METHODOPTIONS._serialized_start=287
|
198
198
|
_METHODOPTIONS._serialized_end=407
|
199
199
|
_MESSAGEOPTIONS._serialized_start=410
|
200
|
-
_MESSAGEOPTIONS._serialized_end=
|
201
|
-
_ONEOFOPTIONS._serialized_start=
|
202
|
-
_ONEOFOPTIONS._serialized_end=
|
203
|
-
_FIELDOPTIONS._serialized_start=
|
204
|
-
_FIELDOPTIONS._serialized_end=
|
205
|
-
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_start=
|
206
|
-
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_end=
|
207
|
-
_CUSTOMOPTIONS._serialized_start=
|
208
|
-
_CUSTOMOPTIONS._serialized_end=
|
209
|
-
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_start=
|
210
|
-
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_end=
|
211
|
-
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_start=
|
212
|
-
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_end=
|
213
|
-
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_start=
|
214
|
-
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_end=
|
215
|
-
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_start=
|
216
|
-
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_end=
|
217
|
-
_TERRAFORMDOCS._serialized_start=
|
218
|
-
_TERRAFORMDOCS._serialized_end=
|
200
|
+
_MESSAGEOPTIONS._serialized_end=652
|
201
|
+
_ONEOFOPTIONS._serialized_start=654
|
202
|
+
_ONEOFOPTIONS._serialized_end=718
|
203
|
+
_FIELDOPTIONS._serialized_start=721
|
204
|
+
_FIELDOPTIONS._serialized_end=1248
|
205
|
+
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_start=1168
|
206
|
+
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_end=1223
|
207
|
+
_CUSTOMOPTIONS._serialized_start=1251
|
208
|
+
_CUSTOMOPTIONS._serialized_end=1906
|
209
|
+
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_start=1644
|
210
|
+
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_end=1704
|
211
|
+
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_start=1706
|
212
|
+
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_end=1766
|
213
|
+
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_start=1768
|
214
|
+
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_end=1822
|
215
|
+
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_start=1824
|
216
|
+
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_end=1881
|
217
|
+
_TERRAFORMDOCS._serialized_start=1908
|
218
|
+
_TERRAFORMDOCS._serialized_end=2017
|
219
219
|
# @@protoc_insertion_point(module_scope)
|
@@ -5050,6 +5050,68 @@ def convert_repeated_http_no_auth_to_porcelain(plumbings):
|
|
5050
5050
|
]
|
5051
5051
|
|
5052
5052
|
|
5053
|
+
def convert_keyfactor_x_509_store_to_porcelain(plumbing):
|
5054
|
+
if plumbing is None:
|
5055
|
+
return None
|
5056
|
+
porcelain = models.KeyfactorX509Store()
|
5057
|
+
porcelain.ca_file_path = (plumbing.ca_file_path)
|
5058
|
+
porcelain.certificate_file_path = (plumbing.certificate_file_path)
|
5059
|
+
porcelain.default_certificate_authority_name = (
|
5060
|
+
plumbing.default_certificate_authority_name)
|
5061
|
+
porcelain.default_certificate_profile_name = (
|
5062
|
+
plumbing.default_certificate_profile_name)
|
5063
|
+
porcelain.default_end_entity_profile_name = (
|
5064
|
+
plumbing.default_end_entity_profile_name)
|
5065
|
+
porcelain.enrollment_code_env_var = (plumbing.enrollment_code_env_var)
|
5066
|
+
porcelain.enrollment_username_env_var = (
|
5067
|
+
plumbing.enrollment_username_env_var)
|
5068
|
+
porcelain.id = (plumbing.id)
|
5069
|
+
porcelain.key_file_path = (plumbing.key_file_path)
|
5070
|
+
porcelain.key_password_env_var = (plumbing.key_password_env_var)
|
5071
|
+
porcelain.name = (plumbing.name)
|
5072
|
+
porcelain.server_address = (plumbing.server_address)
|
5073
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
5074
|
+
return porcelain
|
5075
|
+
|
5076
|
+
|
5077
|
+
def convert_keyfactor_x_509_store_to_plumbing(porcelain):
|
5078
|
+
plumbing = KeyfactorX509Store()
|
5079
|
+
if porcelain is None:
|
5080
|
+
return plumbing
|
5081
|
+
plumbing.ca_file_path = (porcelain.ca_file_path)
|
5082
|
+
plumbing.certificate_file_path = (porcelain.certificate_file_path)
|
5083
|
+
plumbing.default_certificate_authority_name = (
|
5084
|
+
porcelain.default_certificate_authority_name)
|
5085
|
+
plumbing.default_certificate_profile_name = (
|
5086
|
+
porcelain.default_certificate_profile_name)
|
5087
|
+
plumbing.default_end_entity_profile_name = (
|
5088
|
+
porcelain.default_end_entity_profile_name)
|
5089
|
+
plumbing.enrollment_code_env_var = (porcelain.enrollment_code_env_var)
|
5090
|
+
plumbing.enrollment_username_env_var = (
|
5091
|
+
porcelain.enrollment_username_env_var)
|
5092
|
+
plumbing.id = (porcelain.id)
|
5093
|
+
plumbing.key_file_path = (porcelain.key_file_path)
|
5094
|
+
plumbing.key_password_env_var = (porcelain.key_password_env_var)
|
5095
|
+
plumbing.name = (porcelain.name)
|
5096
|
+
plumbing.server_address = (porcelain.server_address)
|
5097
|
+
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
5098
|
+
return plumbing
|
5099
|
+
|
5100
|
+
|
5101
|
+
def convert_repeated_keyfactor_x_509_store_to_plumbing(porcelains):
|
5102
|
+
return [
|
5103
|
+
convert_keyfactor_x_509_store_to_plumbing(porcelain)
|
5104
|
+
for porcelain in porcelains
|
5105
|
+
]
|
5106
|
+
|
5107
|
+
|
5108
|
+
def convert_repeated_keyfactor_x_509_store_to_porcelain(plumbings):
|
5109
|
+
return [
|
5110
|
+
convert_keyfactor_x_509_store_to_porcelain(plumbing)
|
5111
|
+
for plumbing in plumbings
|
5112
|
+
]
|
5113
|
+
|
5114
|
+
|
5053
5115
|
def convert_kubernetes_to_porcelain(plumbing):
|
5054
5116
|
if plumbing is None:
|
5055
5117
|
return None
|
@@ -9647,6 +9709,9 @@ def convert_secret_store_to_plumbing(porcelain):
|
|
9647
9709
|
if isinstance(porcelain, models.GCPCertX509Store):
|
9648
9710
|
plumbing.gcp_cert_x_509.CopyFrom(
|
9649
9711
|
convert_gcp_cert_x_509_store_to_plumbing(porcelain))
|
9712
|
+
if isinstance(porcelain, models.KeyfactorX509Store):
|
9713
|
+
plumbing.keyfactor_x_509.CopyFrom(
|
9714
|
+
convert_keyfactor_x_509_store_to_plumbing(porcelain))
|
9650
9715
|
if isinstance(porcelain, models.VaultAppRoleStore):
|
9651
9716
|
plumbing.vault_app_role.CopyFrom(
|
9652
9717
|
convert_vault_app_role_store_to_plumbing(porcelain))
|
@@ -9705,6 +9770,9 @@ def convert_secret_store_to_porcelain(plumbing):
|
|
9705
9770
|
if plumbing.HasField('gcp_cert_x_509'):
|
9706
9771
|
return convert_gcp_cert_x_509_store_to_porcelain(
|
9707
9772
|
plumbing.gcp_cert_x_509)
|
9773
|
+
if plumbing.HasField('keyfactor_x_509'):
|
9774
|
+
return convert_keyfactor_x_509_store_to_porcelain(
|
9775
|
+
plumbing.keyfactor_x_509)
|
9708
9776
|
if plumbing.HasField('vault_app_role'):
|
9709
9777
|
return convert_vault_app_role_store_to_porcelain(
|
9710
9778
|
plumbing.vault_app_role)
|