strongdm 8.0.0__zip → 8.3.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-8.0.0 → strongdm-8.3.0}/PKG-INFO +2 -2
- {strongdm-8.0.0 → strongdm-8.3.0}/setup.py +2 -2
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/accounts_pb2.py +12 -12
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/client.py +1 -1
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/constants.py +5 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/models.py +284 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/options_pb2.py +20 -20
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/plumbing.py +131 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/secret_store_types_pb2.py +116 -40
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/svc.py +2 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-8.0.0 → strongdm-8.3.0}/LICENSE +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/README.md +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/setup.cfg +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/__init__.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/drivers_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/errors.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-8.0.0 → strongdm-8.3.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -1,12 +1,12 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: strongdm
|
3
|
-
Version: 8.
|
3
|
+
Version: 8.3.0
|
4
4
|
Summary: strongDM SDK for the Python programming language.
|
5
5
|
Home-page: https://github.com/strongdm/strongdm-sdk-python
|
6
6
|
Author: strongDM Team
|
7
7
|
Author-email: sdk-feedback@strongdm.com
|
8
8
|
License: apache-2.0
|
9
|
-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v8.
|
9
|
+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v8.3.0.tar.gz
|
10
10
|
Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
|
11
11
|
Platform: UNKNOWN
|
12
12
|
Classifier: Development Status :: 4 - Beta
|
@@ -23,7 +23,7 @@ from setuptools import setup
|
|
23
23
|
setup(
|
24
24
|
name='strongdm',
|
25
25
|
packages=['strongdm'],
|
26
|
-
version='8.
|
26
|
+
version='8.3.0',
|
27
27
|
license='apache-2.0',
|
28
28
|
description='strongDM SDK for the Python programming language.',
|
29
29
|
long_description=long_description,
|
@@ -32,7 +32,7 @@ setup(
|
|
32
32
|
author_email='sdk-feedback@strongdm.com',
|
33
33
|
url='https://github.com/strongdm/strongdm-sdk-python',
|
34
34
|
download_url=
|
35
|
-
'https://github.com/strongdm/strongdm-sdk-python/archive/v8.
|
35
|
+
'https://github.com/strongdm/strongdm-sdk-python/archive/v8.3.0.tar.gz',
|
36
36
|
keywords=[
|
37
37
|
'strongDM', 'sdm', 'api', 'automation', 'security', 'audit',
|
38
38
|
'database', 'server', 'ssh', 'rdp'
|
@@ -33,7 +33,7 @@ from . import spec_pb2 as spec__pb2
|
|
33
33
|
from . import tags_pb2 as tags__pb2
|
34
34
|
|
35
35
|
|
36
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x0e\x61\x63\x63ounts.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\"i\n\x14\x41\x63\x63ountCreateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.CreateRequestMetadata\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xf8\x02\n\x15\x41\x63\x63ountCreateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.CreateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\x05token\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xf0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x04 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12<\n\naccess_key\x18\x05 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider\x12<\n\nsecret_key\x18\x06 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"Q\n\x11\x41\x63\x63ountGetRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xd6\x01\n\x12\x41\x63\x63ountGetResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"u\n\x14\x41\x63\x63ountUpdateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.UpdateRequestMetadata\x12\n\n\x02id\x18\x02 \x01(\t\x12(\n\x07\x61\x63\x63ount\x18\x03 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xdc\x01\n\x15\x41\x63\x63ountUpdateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.UpdateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x14\x41\x63\x63ountDeleteRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.DeleteRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xb2\x01\n\x15\x41\x63\x63ountDeleteResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.DeleteResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x02 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x12\x41\x63\x63ountListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xc1\x01\n\x13\x41\x63\x63ountListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12)\n\x08\x61\x63\x63ounts\x18\x02 \x03(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\"\
|
36
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x0e\x61\x63\x63ounts.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\x1a\ntags.proto\"i\n\x14\x41\x63\x63ountCreateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.CreateRequestMetadata\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xf8\x02\n\x15\x41\x63\x63ountCreateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.CreateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\x05token\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xf0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x04 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12<\n\naccess_key\x18\x05 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider\x12<\n\nsecret_key\x18\x06 \x01(\tB(\xf2\xf8\xb3\x07#\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\x01*\xb2\xf4\xb3\x07\x13!terraform-provider:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"Q\n\x11\x41\x63\x63ountGetRequest\x12$\n\x04meta\x18\x01 \x01(\x0b\x32\x16.v1.GetRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xd6\x01\n\x12\x41\x63\x63ountGetResponse\x12\x31\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.GetResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"u\n\x14\x41\x63\x63ountUpdateRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.UpdateRequestMetadata\x12\n\n\x02id\x18\x02 \x01(\t\x12(\n\x07\x61\x63\x63ount\x18\x03 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xdc\x01\n\x15\x41\x63\x63ountUpdateResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.UpdateResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x07\x61\x63\x63ount\x18\x02 \x01(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x14\x41\x63\x63ountDeleteRequest\x12\'\n\x04meta\x18\x01 \x01(\x0b\x32\x19.v1.DeleteRequestMetadata\x12\x16\n\x02id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xb2\x01\n\x15\x41\x63\x63ountDeleteResponse\x12\x34\n\x04meta\x18\x01 \x01(\x0b\x32\x1a.v1.DeleteResponseMetadataB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x02 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"W\n\x12\x41\x63\x63ountListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\"\xc1\x01\n\x13\x41\x63\x63ountListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12)\n\x08\x61\x63\x63ounts\x18\x02 \x03(\x0b\x32\x0b.v1.AccountB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\"\x94\x02\n\x07\x41\x63\x63ount\x12$\n\x04user\x18\x01 \x01(\x0b\x32\x08.v1.UserB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00\x12*\n\x07service\x18\x02 \x01(\x0b\x32\x0b.v1.ServiceB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00\x12&\n\x05token\x18\x03 \x01(\x0b\x32\t.v1.TokenB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01H\x00:a\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07R\xc2\xf3\xb3\x07M\xa2\xf3\xb3\x07 tf_examples/account_resource.txt\xaa\xf3\xb3\x07#tf_examples/account_data_source.txtB,\n\x07\x61\x63\x63ount\x12!\xaa\xf8\xb3\x07\x0e\xaa\xf8\xb3\x07\tsuspended\xaa\xf8\xb3\x07\t\xaa\xf8\xb3\x07\x04tags\"\xd2\x06\n\x04User\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1e\n\x05\x65mail\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12#\n\nfirst_name\x18\x03 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\"\n\tlast_name\x18\x04 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12*\n\tsuspended\x18\x05 \x01(\x08\x42\x17\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway\x12\"\n\x04tags\x18\x06 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x36\n\x10permission_level\x18\x07 \x01(\tB\x1c\xf2\xf8\xb3\x07\x17\x98\xf4\xb3\x07\x01\xb2\xf4\xb3\x07\r!json_gateway\x12#\n\nmanaged_by\x18\x08 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\x98\xf4\xb3\x07\x01\x12\x1f\n\x0b\x65xternal_id\x18\t \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\xdb\x01\n\x0bsuspendedRO\x18\n \x01(\x08\x42\xc5\x01\xf2\xf8\xb3\x07\xbf\x01\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\xaf\x01\xc2\xf4\xb3\x07\x0f\n\x02go\x12\tSuspended\xc2\xf4\xb3\x07\x10\n\x03\x63li\x12\tsuspended\xc2\xf4\xb3\x07\x11\n\x04ruby\x12\tsuspended\xc2\xf4\xb3\x07\x13\n\x06python\x12\tsuspended\xc2\xf4\xb3\x07\x11\n\x04java\x12\tSuspended\xc2\xf4\xb3\x07\x1f\n\x12terraform-provider\x12\tsuspended\xc2\xf4\xb3\x07\x19\n\x0cjson_gateway\x12\tsuspended\x98\xf4\xb3\x07\x01\x12\x90\x02\n\x12permission_levelRW\x18\x0b \x01(\tB\xf3\x01\xf2\xf8\xb3\x07\xed\x01\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\xdd\x01\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fPermissionLevel\xc2\xf4\xb3\x07\x17\n\x03\x63li\x12\x10permission-level\xc2\xf4\xb3\x07\x18\n\x04ruby\x12\x10permission_level\xc2\xf4\xb3\x07\x1a\n\x06python\x12\x10permission_level\xc2\xf4\xb3\x07\x17\n\x04java\x12\x0fPermissionLevel\xc2\xf4\xb3\x07&\n\x12terraform-provider\x12\x10permission_level\xc2\xf4\xb3\x07\x1f\n\x0cjson_gateway\x12\x0fpermissionLevel\xd0\xf4\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x8f\x01\n\x07Service\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\x04name\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1d\n\tsuspended\x18\x03 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x04tags\x18\x04 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x81\x03\n\x05Token\x12\x16\n\x02id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\x04name\x18\x02 \x01(\tB\x0f\xf2\xf8\xb3\x07\n\xb0\xf3\xb3\x07\x01\xc0\xf3\xb3\x07\x01\x12\x1d\n\tsuspended\x18\x03 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\"\n\x04tags\x18\x04 \x01(\x0b\x32\x08.v1.TagsB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x37\n\x07rekeyed\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x38\n\x08\x64\x65\x61\x64line\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12 \n\x0c\x61\x63\x63ount_type\x18\x07 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1f\n\x0bpermissions\x18\x08 \x03(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x37\n\x08\x64uration\x18\t \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\x0f\xfa\xf8\xb3\x07\n\xa8\xf3\xb3\x07\x01\xd8\xf3\xb3\x07\x01\x32\xab\x04\n\x08\x41\x63\x63ounts\x12\x63\n\x06\x43reate\x12\x18.v1.AccountCreateRequest\x1a\x19.v1.AccountCreateResponse\"$\x82\xf9\xb3\x07\t\xa2\xf3\xb3\x07\x04post\x82\xf9\xb3\x07\x11\xaa\xf3\xb3\x07\x0c/v1/accounts\x12^\n\x03Get\x12\x15.v1.AccountGetRequest\x1a\x16.v1.AccountGetResponse\"(\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x16\xaa\xf3\xb3\x07\x11/v1/accounts/{id}\x12g\n\x06Update\x12\x18.v1.AccountUpdateRequest\x1a\x19.v1.AccountUpdateResponse\"(\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03put\x82\xf9\xb3\x07\x16\xaa\xf3\xb3\x07\x11/v1/accounts/{id}\x12j\n\x06\x44\x65lete\x12\x18.v1.AccountDeleteRequest\x1a\x19.v1.AccountDeleteResponse\"+\x82\xf9\xb3\x07\x0b\xa2\xf3\xb3\x07\x06\x64\x65lete\x82\xf9\xb3\x07\x16\xaa\xf3\xb3\x07\x11/v1/accounts/{id}\x12\\\n\x04List\x12\x16.v1.AccountListRequest\x1a\x17.v1.AccountListResponse\"#\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x11\xaa\xf3\xb3\x07\x0c/v1/accounts\x1a\'\xca\xf9\xb3\x07\x0c\xc2\xf9\xb3\x07\x07\x41\x63\x63ount\xca\xf9\xb3\x07\x07\xd2\xf9\xb3\x07\x02\x61-\xca\xf9\xb3\x07\x05\xe0\xf9\xb3\x07\x01\x42\x64\n\x19\x63om.strongdm.api.plumbingB\x10\x41\x63\x63ountsPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
|
37
37
|
|
38
38
|
|
39
39
|
|
@@ -211,7 +211,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
211
211
|
_ACCOUNT.fields_by_name['service']._options = None
|
212
212
|
_ACCOUNT.fields_by_name['service']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
213
213
|
_ACCOUNT.fields_by_name['token']._options = None
|
214
|
-
_ACCOUNT.fields_by_name['token']._serialized_options = b'\362\370\263\007
|
214
|
+
_ACCOUNT.fields_by_name['token']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
215
215
|
_ACCOUNT._options = None
|
216
216
|
_ACCOUNT._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007R\302\363\263\007M\242\363\263\007 tf_examples/account_resource.txt\252\363\263\007#tf_examples/account_data_source.txt'
|
217
217
|
_USER.fields_by_name['id']._options = None
|
@@ -267,7 +267,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
267
267
|
_TOKEN.fields_by_name['duration']._options = None
|
268
268
|
_TOKEN.fields_by_name['duration']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
269
269
|
_TOKEN._options = None
|
270
|
-
_TOKEN._serialized_options = b'\372\370\263\007
|
270
|
+
_TOKEN._serialized_options = b'\372\370\263\007\n\250\363\263\007\001\330\363\263\007\001'
|
271
271
|
_ACCOUNTS._options = None
|
272
272
|
_ACCOUNTS._serialized_options = b'\312\371\263\007\014\302\371\263\007\007Account\312\371\263\007\007\322\371\263\007\002a-\312\371\263\007\005\340\371\263\007\001'
|
273
273
|
_ACCOUNTS.methods_by_name['Create']._options = None
|
@@ -301,13 +301,13 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
301
301
|
_ACCOUNTLISTRESPONSE._serialized_start=1614
|
302
302
|
_ACCOUNTLISTRESPONSE._serialized_end=1807
|
303
303
|
_ACCOUNT._serialized_start=1810
|
304
|
-
_ACCOUNT._serialized_end=
|
305
|
-
_USER._serialized_start=
|
306
|
-
_USER._serialized_end=
|
307
|
-
_SERVICE._serialized_start=
|
308
|
-
_SERVICE._serialized_end=
|
309
|
-
_TOKEN._serialized_start=
|
310
|
-
_TOKEN._serialized_end=
|
311
|
-
_ACCOUNTS._serialized_start=
|
312
|
-
_ACCOUNTS._serialized_end=
|
304
|
+
_ACCOUNT._serialized_end=2086
|
305
|
+
_USER._serialized_start=2089
|
306
|
+
_USER._serialized_end=2939
|
307
|
+
_SERVICE._serialized_start=2942
|
308
|
+
_SERVICE._serialized_end=3085
|
309
|
+
_TOKEN._serialized_start=3088
|
310
|
+
_TOKEN._serialized_end=3473
|
311
|
+
_ACCOUNTS._serialized_start=3476
|
312
|
+
_ACCOUNTS._serialized_end=4031
|
313
313
|
# @@protoc_insertion_point(module_scope)
|
@@ -92,6 +92,7 @@ class MFAProvider:
|
|
92
92
|
NONE = ""
|
93
93
|
DUO = "duo"
|
94
94
|
TOTP = "totp"
|
95
|
+
OKTA = "okta"
|
95
96
|
|
96
97
|
|
97
98
|
# Activity Entities, all entity types that can be part of an activity.
|
@@ -240,9 +241,13 @@ class ActivityVerb:
|
|
240
241
|
REMOTE_IDENTITY_GROUP_CREATED = "remote identity group created"
|
241
242
|
REMOTE_IDENTITY_GROUP_UPDATED = "remote identity group updated"
|
242
243
|
REMOTE_IDENTITY_GROUP_DELETED = "remote identity group deleted"
|
244
|
+
IDENTITY_SET_PROVISIONING_ENABLED = "identity set provisioning enabled"
|
245
|
+
IDENTITY_SET_PROVISIONING_DISABLED = "identity set provisioning disabled"
|
243
246
|
REMOTE_IDENTITY_CREATED = "remote identity created"
|
244
247
|
REMOTE_IDENTITY_UPDATED = "remote identity updated"
|
245
248
|
REMOTE_IDENTITY_DELETED = "remote identity deleted"
|
249
|
+
IDENTITY_ALIAS_PROVISIONING_ENABLED = "identity alias provisioning enabled"
|
250
|
+
IDENTITY_ALIAS_PROVISIONING_DISABLED = "identity alias provisioning disabled"
|
246
251
|
ACCESS_REQUESTED_TO_RESOURCE = "access requested to resource"
|
247
252
|
ACCESS_REQUEST_TO_RESOURCE_APPROVAL_ADDED = "access request to resource approval added"
|
248
253
|
ACCESS_REQUEST_TO_RESOURCE_CANCELED = "access request to resource canceled"
|
@@ -10493,6 +10493,290 @@ class HTTPNoAuth:
|
|
10493
10493
|
)
|
10494
10494
|
|
10495
10495
|
|
10496
|
+
class KeyfactorSSHStore:
|
10497
|
+
__slots__ = [
|
10498
|
+
'ca_file_path',
|
10499
|
+
'certificate_file_path',
|
10500
|
+
'default_certificate_authority_name',
|
10501
|
+
'default_certificate_profile_name',
|
10502
|
+
'default_end_entity_profile_name',
|
10503
|
+
'enrollment_code_env_var',
|
10504
|
+
'enrollment_username_env_var',
|
10505
|
+
'id',
|
10506
|
+
'key_file_path',
|
10507
|
+
'name',
|
10508
|
+
'server_address',
|
10509
|
+
'tags',
|
10510
|
+
]
|
10511
|
+
|
10512
|
+
def __init__(
|
10513
|
+
self,
|
10514
|
+
ca_file_path=None,
|
10515
|
+
certificate_file_path=None,
|
10516
|
+
default_certificate_authority_name=None,
|
10517
|
+
default_certificate_profile_name=None,
|
10518
|
+
default_end_entity_profile_name=None,
|
10519
|
+
enrollment_code_env_var=None,
|
10520
|
+
enrollment_username_env_var=None,
|
10521
|
+
id=None,
|
10522
|
+
key_file_path=None,
|
10523
|
+
name=None,
|
10524
|
+
server_address=None,
|
10525
|
+
tags=None,
|
10526
|
+
):
|
10527
|
+
self.ca_file_path = ca_file_path if ca_file_path is not None else ''
|
10528
|
+
'''
|
10529
|
+
Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
10530
|
+
This is not required if the CA is trusted by the host operating system. This should be a PEM
|
10531
|
+
formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
|
10532
|
+
'''
|
10533
|
+
self.certificate_file_path = certificate_file_path if certificate_file_path is not None else ''
|
10534
|
+
'''
|
10535
|
+
Path to client certificate in PEM format. This certificate must contain a client certificate that
|
10536
|
+
is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
|
10537
|
+
key associated with the certificate, but KeyFile can also be set to configure the private key.
|
10538
|
+
'''
|
10539
|
+
self.default_certificate_authority_name = default_certificate_authority_name if default_certificate_authority_name is not None else ''
|
10540
|
+
'''
|
10541
|
+
Name of EJBCA certificate authority that will enroll CSR.
|
10542
|
+
'''
|
10543
|
+
self.default_certificate_profile_name = default_certificate_profile_name if default_certificate_profile_name is not None else ''
|
10544
|
+
'''
|
10545
|
+
Certificate profile name that EJBCA will enroll the CSR with.
|
10546
|
+
'''
|
10547
|
+
self.default_end_entity_profile_name = default_end_entity_profile_name if default_end_entity_profile_name is not None else ''
|
10548
|
+
'''
|
10549
|
+
End entity profile that EJBCA will enroll the CSR with.
|
10550
|
+
'''
|
10551
|
+
self.enrollment_code_env_var = enrollment_code_env_var if enrollment_code_env_var is not None else ''
|
10552
|
+
'''
|
10553
|
+
code used by EJBCA during enrollment. May be left blank if no code is required.
|
10554
|
+
'''
|
10555
|
+
self.enrollment_username_env_var = enrollment_username_env_var if enrollment_username_env_var is not None else ''
|
10556
|
+
'''
|
10557
|
+
username that used by the EJBCA during enrollment. This can be left out.
|
10558
|
+
If so, the username must be auto-generated on the Keyfactor side.
|
10559
|
+
'''
|
10560
|
+
self.id = id if id is not None else ''
|
10561
|
+
'''
|
10562
|
+
Unique identifier of the SecretStore.
|
10563
|
+
'''
|
10564
|
+
self.key_file_path = key_file_path if key_file_path is not None else ''
|
10565
|
+
'''
|
10566
|
+
Path to private key in PEM format. This file should contain the private key associated with the
|
10567
|
+
client certificate configured in CertificateFile.
|
10568
|
+
'''
|
10569
|
+
self.name = name if name is not None else ''
|
10570
|
+
'''
|
10571
|
+
Unique human-readable name of the SecretStore.
|
10572
|
+
'''
|
10573
|
+
self.server_address = server_address if server_address is not None else ''
|
10574
|
+
'''
|
10575
|
+
the host of the Key Factor CA
|
10576
|
+
'''
|
10577
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
10578
|
+
'''
|
10579
|
+
Tags is a map of key, value pairs.
|
10580
|
+
'''
|
10581
|
+
|
10582
|
+
def __repr__(self):
|
10583
|
+
return '<sdm.KeyfactorSSHStore ' + \
|
10584
|
+
'ca_file_path: ' + repr(self.ca_file_path) + ' ' +\
|
10585
|
+
'certificate_file_path: ' + repr(self.certificate_file_path) + ' ' +\
|
10586
|
+
'default_certificate_authority_name: ' + repr(self.default_certificate_authority_name) + ' ' +\
|
10587
|
+
'default_certificate_profile_name: ' + repr(self.default_certificate_profile_name) + ' ' +\
|
10588
|
+
'default_end_entity_profile_name: ' + repr(self.default_end_entity_profile_name) + ' ' +\
|
10589
|
+
'enrollment_code_env_var: ' + repr(self.enrollment_code_env_var) + ' ' +\
|
10590
|
+
'enrollment_username_env_var: ' + repr(self.enrollment_username_env_var) + ' ' +\
|
10591
|
+
'id: ' + repr(self.id) + ' ' +\
|
10592
|
+
'key_file_path: ' + repr(self.key_file_path) + ' ' +\
|
10593
|
+
'name: ' + repr(self.name) + ' ' +\
|
10594
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
10595
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
10596
|
+
'>'
|
10597
|
+
|
10598
|
+
def to_dict(self):
|
10599
|
+
return {
|
10600
|
+
'ca_file_path': self.ca_file_path,
|
10601
|
+
'certificate_file_path': self.certificate_file_path,
|
10602
|
+
'default_certificate_authority_name':
|
10603
|
+
self.default_certificate_authority_name,
|
10604
|
+
'default_certificate_profile_name':
|
10605
|
+
self.default_certificate_profile_name,
|
10606
|
+
'default_end_entity_profile_name':
|
10607
|
+
self.default_end_entity_profile_name,
|
10608
|
+
'enrollment_code_env_var': self.enrollment_code_env_var,
|
10609
|
+
'enrollment_username_env_var': self.enrollment_username_env_var,
|
10610
|
+
'id': self.id,
|
10611
|
+
'key_file_path': self.key_file_path,
|
10612
|
+
'name': self.name,
|
10613
|
+
'server_address': self.server_address,
|
10614
|
+
'tags': self.tags,
|
10615
|
+
}
|
10616
|
+
|
10617
|
+
@classmethod
|
10618
|
+
def from_dict(cls, d):
|
10619
|
+
return cls(
|
10620
|
+
ca_file_path=d.get('ca_file_path'),
|
10621
|
+
certificate_file_path=d.get('certificate_file_path'),
|
10622
|
+
default_certificate_authority_name=d.get(
|
10623
|
+
'default_certificate_authority_name'),
|
10624
|
+
default_certificate_profile_name=d.get(
|
10625
|
+
'default_certificate_profile_name'),
|
10626
|
+
default_end_entity_profile_name=d.get(
|
10627
|
+
'default_end_entity_profile_name'),
|
10628
|
+
enrollment_code_env_var=d.get('enrollment_code_env_var'),
|
10629
|
+
enrollment_username_env_var=d.get('enrollment_username_env_var'),
|
10630
|
+
id=d.get('id'),
|
10631
|
+
key_file_path=d.get('key_file_path'),
|
10632
|
+
name=d.get('name'),
|
10633
|
+
server_address=d.get('server_address'),
|
10634
|
+
tags=d.get('tags'),
|
10635
|
+
)
|
10636
|
+
|
10637
|
+
|
10638
|
+
class KeyfactorX509Store:
|
10639
|
+
__slots__ = [
|
10640
|
+
'ca_file_path',
|
10641
|
+
'certificate_file_path',
|
10642
|
+
'default_certificate_authority_name',
|
10643
|
+
'default_certificate_profile_name',
|
10644
|
+
'default_end_entity_profile_name',
|
10645
|
+
'enrollment_code_env_var',
|
10646
|
+
'enrollment_username_env_var',
|
10647
|
+
'id',
|
10648
|
+
'key_file_path',
|
10649
|
+
'name',
|
10650
|
+
'server_address',
|
10651
|
+
'tags',
|
10652
|
+
]
|
10653
|
+
|
10654
|
+
def __init__(
|
10655
|
+
self,
|
10656
|
+
ca_file_path=None,
|
10657
|
+
certificate_file_path=None,
|
10658
|
+
default_certificate_authority_name=None,
|
10659
|
+
default_certificate_profile_name=None,
|
10660
|
+
default_end_entity_profile_name=None,
|
10661
|
+
enrollment_code_env_var=None,
|
10662
|
+
enrollment_username_env_var=None,
|
10663
|
+
id=None,
|
10664
|
+
key_file_path=None,
|
10665
|
+
name=None,
|
10666
|
+
server_address=None,
|
10667
|
+
tags=None,
|
10668
|
+
):
|
10669
|
+
self.ca_file_path = ca_file_path if ca_file_path is not None else ''
|
10670
|
+
'''
|
10671
|
+
Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
10672
|
+
This is not required if the CA is trusted by the host operating system. This should be a PEM
|
10673
|
+
formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
|
10674
|
+
'''
|
10675
|
+
self.certificate_file_path = certificate_file_path if certificate_file_path is not None else ''
|
10676
|
+
'''
|
10677
|
+
Path to client certificate in PEM format. This certificate must contain a client certificate that
|
10678
|
+
is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
|
10679
|
+
key associated with the certificate, but KeyFile can also be set to configure the private key.
|
10680
|
+
'''
|
10681
|
+
self.default_certificate_authority_name = default_certificate_authority_name if default_certificate_authority_name is not None else ''
|
10682
|
+
'''
|
10683
|
+
Name of EJBCA certificate authority that will enroll CSR.
|
10684
|
+
'''
|
10685
|
+
self.default_certificate_profile_name = default_certificate_profile_name if default_certificate_profile_name is not None else ''
|
10686
|
+
'''
|
10687
|
+
Certificate profile name that EJBCA will enroll the CSR with.
|
10688
|
+
'''
|
10689
|
+
self.default_end_entity_profile_name = default_end_entity_profile_name if default_end_entity_profile_name is not None else ''
|
10690
|
+
'''
|
10691
|
+
End entity profile that EJBCA will enroll the CSR with.
|
10692
|
+
'''
|
10693
|
+
self.enrollment_code_env_var = enrollment_code_env_var if enrollment_code_env_var is not None else ''
|
10694
|
+
'''
|
10695
|
+
code used by EJBCA during enrollment. May be left blank if no code is required.
|
10696
|
+
'''
|
10697
|
+
self.enrollment_username_env_var = enrollment_username_env_var if enrollment_username_env_var is not None else ''
|
10698
|
+
'''
|
10699
|
+
username that used by the EJBCA during enrollment. This can be left out.
|
10700
|
+
If so, the username must be auto-generated on the Keyfactor side.
|
10701
|
+
'''
|
10702
|
+
self.id = id if id is not None else ''
|
10703
|
+
'''
|
10704
|
+
Unique identifier of the SecretStore.
|
10705
|
+
'''
|
10706
|
+
self.key_file_path = key_file_path if key_file_path is not None else ''
|
10707
|
+
'''
|
10708
|
+
Path to private key in PEM format. This file should contain the private key associated with the
|
10709
|
+
client certificate configured in CertificateFile.
|
10710
|
+
'''
|
10711
|
+
self.name = name if name is not None else ''
|
10712
|
+
'''
|
10713
|
+
Unique human-readable name of the SecretStore.
|
10714
|
+
'''
|
10715
|
+
self.server_address = server_address if server_address is not None else ''
|
10716
|
+
'''
|
10717
|
+
the host of the Key Factor CA
|
10718
|
+
'''
|
10719
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
10720
|
+
'''
|
10721
|
+
Tags is a map of key, value pairs.
|
10722
|
+
'''
|
10723
|
+
|
10724
|
+
def __repr__(self):
|
10725
|
+
return '<sdm.KeyfactorX509Store ' + \
|
10726
|
+
'ca_file_path: ' + repr(self.ca_file_path) + ' ' +\
|
10727
|
+
'certificate_file_path: ' + repr(self.certificate_file_path) + ' ' +\
|
10728
|
+
'default_certificate_authority_name: ' + repr(self.default_certificate_authority_name) + ' ' +\
|
10729
|
+
'default_certificate_profile_name: ' + repr(self.default_certificate_profile_name) + ' ' +\
|
10730
|
+
'default_end_entity_profile_name: ' + repr(self.default_end_entity_profile_name) + ' ' +\
|
10731
|
+
'enrollment_code_env_var: ' + repr(self.enrollment_code_env_var) + ' ' +\
|
10732
|
+
'enrollment_username_env_var: ' + repr(self.enrollment_username_env_var) + ' ' +\
|
10733
|
+
'id: ' + repr(self.id) + ' ' +\
|
10734
|
+
'key_file_path: ' + repr(self.key_file_path) + ' ' +\
|
10735
|
+
'name: ' + repr(self.name) + ' ' +\
|
10736
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
10737
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
10738
|
+
'>'
|
10739
|
+
|
10740
|
+
def to_dict(self):
|
10741
|
+
return {
|
10742
|
+
'ca_file_path': self.ca_file_path,
|
10743
|
+
'certificate_file_path': self.certificate_file_path,
|
10744
|
+
'default_certificate_authority_name':
|
10745
|
+
self.default_certificate_authority_name,
|
10746
|
+
'default_certificate_profile_name':
|
10747
|
+
self.default_certificate_profile_name,
|
10748
|
+
'default_end_entity_profile_name':
|
10749
|
+
self.default_end_entity_profile_name,
|
10750
|
+
'enrollment_code_env_var': self.enrollment_code_env_var,
|
10751
|
+
'enrollment_username_env_var': self.enrollment_username_env_var,
|
10752
|
+
'id': self.id,
|
10753
|
+
'key_file_path': self.key_file_path,
|
10754
|
+
'name': self.name,
|
10755
|
+
'server_address': self.server_address,
|
10756
|
+
'tags': self.tags,
|
10757
|
+
}
|
10758
|
+
|
10759
|
+
@classmethod
|
10760
|
+
def from_dict(cls, d):
|
10761
|
+
return cls(
|
10762
|
+
ca_file_path=d.get('ca_file_path'),
|
10763
|
+
certificate_file_path=d.get('certificate_file_path'),
|
10764
|
+
default_certificate_authority_name=d.get(
|
10765
|
+
'default_certificate_authority_name'),
|
10766
|
+
default_certificate_profile_name=d.get(
|
10767
|
+
'default_certificate_profile_name'),
|
10768
|
+
default_end_entity_profile_name=d.get(
|
10769
|
+
'default_end_entity_profile_name'),
|
10770
|
+
enrollment_code_env_var=d.get('enrollment_code_env_var'),
|
10771
|
+
enrollment_username_env_var=d.get('enrollment_username_env_var'),
|
10772
|
+
id=d.get('id'),
|
10773
|
+
key_file_path=d.get('key_file_path'),
|
10774
|
+
name=d.get('name'),
|
10775
|
+
server_address=d.get('server_address'),
|
10776
|
+
tags=d.get('tags'),
|
10777
|
+
)
|
10778
|
+
|
10779
|
+
|
10496
10780
|
class Kubernetes:
|
10497
10781
|
__slots__ = [
|
10498
10782
|
'bind_interface',
|
@@ -29,7 +29,7 @@ _sym_db = _symbol_database.Default()
|
|
29
29
|
from google.protobuf import descriptor_pb2 as google_dot_protobuf_dot_descriptor__pb2
|
30
30
|
|
31
31
|
|
32
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\roptions.proto\x12\x02v1\x1a google/protobuf/descriptor.proto\"9\n\x0b\x46ileOptions\x12\x11\n\x07targets\x18\xc4\xc1v \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xaa\x01\n\x0eServiceOptions\x12\x13\n\tmain_noun\x18\x98\xbfv \x01(\t\x12\x13\n\tid_prefix\x18\x9a\xbfv \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t\x12#\n\x19\x64isable_snapshot_vertical\x18\x9b\xbfv \x01(\x08\x12\x1d\n\x13skip_cli_generation\x18\x9c\xbfv \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"x\n\rMethodOptions\x12\x10\n\x06method\x18\xb4\xbev \x01(\t\x12\r\n\x03url\x18\xb5\xbev \x01(\t\x12\x1a\n\x10\x64\x65precation_date\x18\xb6\xbev \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\
|
32
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\roptions.proto\x12\x02v1\x1a google/protobuf/descriptor.proto\"9\n\x0b\x46ileOptions\x12\x11\n\x07targets\x18\xc4\xc1v \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xaa\x01\n\x0eServiceOptions\x12\x13\n\tmain_noun\x18\x98\xbfv \x01(\t\x12\x13\n\tid_prefix\x18\x9a\xbfv \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t\x12#\n\x19\x64isable_snapshot_vertical\x18\x9b\xbfv \x01(\x08\x12\x1d\n\x13skip_cli_generation\x18\x9c\xbfv \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"x\n\rMethodOptions\x12\x10\n\x06method\x18\xb4\xbev \x01(\t\x12\r\n\x03url\x18\xb5\xbev \x01(\t\x12\x1a\n\x10\x64\x65precation_date\x18\xb6\xbev \x01(\t\x12\x11\n\x07targets\x18\x99\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\xf2\x01\n\x0eMessageOptions\x12\x13\n\tporcelain\x18\xb5\xbev \x01(\x08\x12\x0f\n\x05\x65rror\x18\xb6\xbev \x01(\x05\x12\x17\n\roptions_field\x18\xb7\xbev \x01(\t\x12\x11\n\x07targets\x18\xba\xbev \x03(\t\x12+\n\x0eterraform_docs\x18\xb8\xbev \x01(\x0b\x32\x11.v1.TerraformDocs\x12#\n\x06\x63ustom\x18\xb9\xbev \x01(\x0b\x32\x11.v1.CustomOptions\x12#\n\x19terraform_datasource_only\x18\xbb\xbev \x01(\x08:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"@\n\x0cOneofOptions\x12\x17\n\rcommon_fields\x18\x85\xbfv \x03(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\x8f\x04\n\x0c\x46ieldOptions\x12\x13\n\tporcelain\x18\xb6\xbev \x01(\x08\x12\x12\n\x08iterable\x18\xb7\xbev \x01(\x08\x12\x12\n\x08required\x18\xb8\xbev \x01(\x08\x12\x14\n\nwrite_only\x18\xbd\xbev \x01(\x08\x12\x13\n\tread_only\x18\xc3\xbev \x01(\x08\x12\x17\n\ris_credential\x18\xc4\xbev \x01(\x08\x12\x11\n\x07targets\x18\xc6\xbev \x03(\t\x12\x1d\n\x13terraform_force_new\x18\xbc\xbev \x01(\x08\x12\x1d\n\x13terraform_sensitive\x18\xbe\xbev \x01(\x08\x12&\n\x1cterraform_diff_suppress_func\x18\xc7\xbev \x01(\t\x12\x1c\n\x12terraform_computed\x18\xca\xbev \x01(\x08\x12#\n\x06\x63ustom\x18\xb9\xbev \x01(\x0b\x32\x11.v1.CustomOptions\x12\x44\n\x12read_only_override\x18\xc0\xbev \x03(\x0b\x32&.v1.FieldOptions.ReadOnlyOverrideEntry\x12\x13\n\tcondition\x18\xcb\xbev \x01(\t\x12\x15\n\x0b\x65xpect_file\x18\xcc\xbev \x01(\x08\x1a\x37\n\x15ReadOnlyOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x08:\x02\x38\x01:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"\x8f\x05\n\rCustomOptions\x12\x13\n\tconverter\x18\xbd\xbev \x01(\t\x12O\n\x17porcelain_type_override\x18\xbe\xbev \x03(\x0b\x32,.v1.CustomOptions.PorcelainTypeOverrideEntry\x12O\n\x17porcelain_name_override\x18\xc8\xbev \x03(\x0b\x32,.v1.CustomOptions.PorcelainNameOverrideEntry\x12\x42\n\x10\x63omment_override\x18\xd3\xbev \x03(\x0b\x32&.v1.CustomOptions.CommentOverrideEntry\x12H\n\x13\x64\x65precated_override\x18\xc0\xbev \x03(\x0b\x32).v1.CustomOptions.DeprecatedOverrideEntry\x12\x1d\n\x13terraform_elem_type\x18\xbf\xbev \x01(\t\x12\x12\n\x08unstable\x18\xc1\xbev \x01(\x08\x1a<\n\x1aPorcelainTypeOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a<\n\x1aPorcelainNameOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x36\n\x14\x43ommentOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x39\n\x17\x44\x65precatedOverrideEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x08:\x02\x38\x01:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway\"m\n\rTerraformDocs\x12\x1f\n\x15resource_example_path\x18\xb4\xbev \x01(\t\x12\"\n\x18\x64\x61ta_source_example_path\x18\xb5\xbev \x01(\t:\x17\xfa\xf8\xb3\x07\x12\xd2\xf3\xb3\x07\r!json_gateway:E\n\x0c\x66ile_options\x12\x1c.google.protobuf.FileOptions\x18\xa8\xc2v \x01(\x0b\x32\x0f.v1.FileOptions:N\n\x0fservice_options\x12\x1f.google.protobuf.ServiceOptions\x18\x99\xbfv \x01(\x0b\x32\x12.v1.ServiceOptions:K\n\x0emethod_options\x12\x1e.google.protobuf.MethodOptions\x18\x90\xbfv \x01(\x0b\x32\x11.v1.MethodOptions:N\n\x0fmessage_options\x12\x1f.google.protobuf.MessageOptions\x18\x8f\xbfv \x01(\x0b\x32\x12.v1.MessageOptions:H\n\roneof_options\x12\x1d.google.protobuf.OneofOptions\x18\x85\xbfv \x01(\x0b\x32\x10.v1.OneofOptions:H\n\rfield_options\x12\x1d.google.protobuf.FieldOptions\x18\x8e\xbfv \x01(\x0b\x32\x10.v1.FieldOptionsBR\n\x19\x63om.strongdm.api.plumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
|
33
33
|
|
34
34
|
|
35
35
|
FILE_OPTIONS_FIELD_NUMBER = 1941800
|
@@ -197,23 +197,23 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
197
197
|
_METHODOPTIONS._serialized_start=287
|
198
198
|
_METHODOPTIONS._serialized_end=407
|
199
199
|
_MESSAGEOPTIONS._serialized_start=410
|
200
|
-
_MESSAGEOPTIONS._serialized_end=
|
201
|
-
_ONEOFOPTIONS._serialized_start=
|
202
|
-
_ONEOFOPTIONS._serialized_end=
|
203
|
-
_FIELDOPTIONS._serialized_start=
|
204
|
-
_FIELDOPTIONS._serialized_end=
|
205
|
-
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_start=
|
206
|
-
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_end=
|
207
|
-
_CUSTOMOPTIONS._serialized_start=
|
208
|
-
_CUSTOMOPTIONS._serialized_end=
|
209
|
-
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_start=
|
210
|
-
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_end=
|
211
|
-
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_start=
|
212
|
-
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_end=
|
213
|
-
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_start=
|
214
|
-
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_end=
|
215
|
-
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_start=
|
216
|
-
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_end=
|
217
|
-
_TERRAFORMDOCS._serialized_start=
|
218
|
-
_TERRAFORMDOCS._serialized_end=
|
200
|
+
_MESSAGEOPTIONS._serialized_end=652
|
201
|
+
_ONEOFOPTIONS._serialized_start=654
|
202
|
+
_ONEOFOPTIONS._serialized_end=718
|
203
|
+
_FIELDOPTIONS._serialized_start=721
|
204
|
+
_FIELDOPTIONS._serialized_end=1248
|
205
|
+
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_start=1168
|
206
|
+
_FIELDOPTIONS_READONLYOVERRIDEENTRY._serialized_end=1223
|
207
|
+
_CUSTOMOPTIONS._serialized_start=1251
|
208
|
+
_CUSTOMOPTIONS._serialized_end=1906
|
209
|
+
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_start=1644
|
210
|
+
_CUSTOMOPTIONS_PORCELAINTYPEOVERRIDEENTRY._serialized_end=1704
|
211
|
+
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_start=1706
|
212
|
+
_CUSTOMOPTIONS_PORCELAINNAMEOVERRIDEENTRY._serialized_end=1766
|
213
|
+
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_start=1768
|
214
|
+
_CUSTOMOPTIONS_COMMENTOVERRIDEENTRY._serialized_end=1822
|
215
|
+
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_start=1824
|
216
|
+
_CUSTOMOPTIONS_DEPRECATEDOVERRIDEENTRY._serialized_end=1881
|
217
|
+
_TERRAFORMDOCS._serialized_start=1908
|
218
|
+
_TERRAFORMDOCS._serialized_end=2017
|
219
219
|
# @@protoc_insertion_point(module_scope)
|