strongdm 8.3.0__zip → 9.0.0__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (135) hide show
  1. {strongdm-8.3.0 → strongdm-9.0.0}/PKG-INFO +2 -2
  2. {strongdm-8.3.0 → strongdm-9.0.0}/setup.py +2 -2
  3. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/client.py +45 -1
  4. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/drivers_pb2.py +212 -216
  5. strongdm-9.0.0/strongdm/identity_aliases_history_pb2.py +100 -0
  6. strongdm-9.0.0/strongdm/identity_aliases_history_pb2_grpc.py +84 -0
  7. strongdm-9.0.0/strongdm/identity_aliases_pb2.py +220 -0
  8. strongdm-9.0.0/strongdm/identity_aliases_pb2_grpc.py +223 -0
  9. strongdm-9.0.0/strongdm/identity_sets_history_pb2.py +100 -0
  10. strongdm-9.0.0/strongdm/identity_sets_history_pb2_grpc.py +84 -0
  11. strongdm-9.0.0/strongdm/identity_sets_pb2.py +122 -0
  12. strongdm-9.0.0/strongdm/identity_sets_pb2_grpc.py +139 -0
  13. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/models.py +894 -287
  14. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/plumbing.py +495 -72
  15. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/remote_identities_history_pb2.py +3 -3
  16. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/remote_identities_pb2.py +3 -3
  17. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/remote_identity_groups_history_pb2.py +3 -3
  18. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/remote_identity_groups_pb2.py +3 -3
  19. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/secret_store_types_pb2.py +92 -44
  20. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/svc.py +418 -0
  21. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm.egg-info/PKG-INFO +2 -2
  22. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm.egg-info/SOURCES.txt +8 -0
  23. {strongdm-8.3.0 → strongdm-9.0.0}/LICENSE +0 -0
  24. {strongdm-8.3.0 → strongdm-9.0.0}/README.md +0 -0
  25. {strongdm-8.3.0 → strongdm-9.0.0}/setup.cfg +0 -0
  26. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/__init__.py +0 -0
  27. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/access_request_events_history_pb2.py +0 -0
  28. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
  29. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/access_requests_history_pb2.py +0 -0
  30. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
  31. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/access_requests_pb2.py +0 -0
  32. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/access_requests_pb2_grpc.py +0 -0
  33. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_attachments_history_pb2.py +0 -0
  34. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  35. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_attachments_pb2.py +0 -0
  36. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
  37. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_grants_history_pb2.py +0 -0
  38. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  39. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_grants_pb2.py +0 -0
  40. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_grants_pb2_grpc.py +0 -0
  41. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_permissions_pb2.py +0 -0
  42. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
  43. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_resources_history_pb2.py +0 -0
  44. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  45. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_resources_pb2.py +0 -0
  46. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/account_resources_pb2_grpc.py +0 -0
  47. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/accounts_history_pb2.py +0 -0
  48. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
  49. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/accounts_pb2.py +0 -0
  50. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/accounts_pb2_grpc.py +0 -0
  51. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/activities_pb2.py +0 -0
  52. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/activities_pb2_grpc.py +0 -0
  53. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
  54. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
  55. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
  56. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
  57. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
  58. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
  59. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
  60. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
  61. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflows_history_pb2.py +0 -0
  62. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
  63. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflows_pb2.py +0 -0
  64. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
  65. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/constants.py +0 -0
  66. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/control_panel_pb2.py +0 -0
  67. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/control_panel_pb2_grpc.py +0 -0
  68. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/drivers_pb2_grpc.py +0 -0
  69. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/errors.py +0 -0
  70. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/nodes_history_pb2.py +0 -0
  71. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
  72. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/nodes_pb2.py +0 -0
  73. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/nodes_pb2_grpc.py +0 -0
  74. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/options_pb2.py +0 -0
  75. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/options_pb2_grpc.py +0 -0
  76. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/organization_history_pb2.py +0 -0
  77. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/organization_history_pb2_grpc.py +0 -0
  78. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/peering_group_nodes_pb2.py +0 -0
  79. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
  80. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/peering_group_peers_pb2.py +0 -0
  81. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
  82. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/peering_group_resources_pb2.py +0 -0
  83. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
  84. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/peering_groups_pb2.py +0 -0
  85. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
  86. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/queries_pb2.py +0 -0
  87. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/queries_pb2_grpc.py +0 -0
  88. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  89. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
  90. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  91. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  92. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/replays_pb2.py +0 -0
  93. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/replays_pb2_grpc.py +0 -0
  94. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/resources_history_pb2.py +0 -0
  95. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/resources_history_pb2_grpc.py +0 -0
  96. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/resources_pb2.py +0 -0
  97. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/resources_pb2_grpc.py +0 -0
  98. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/role_resources_history_pb2.py +0 -0
  99. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  100. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/role_resources_pb2.py +0 -0
  101. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/role_resources_pb2_grpc.py +0 -0
  102. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/roles_history_pb2.py +0 -0
  103. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/roles_history_pb2_grpc.py +0 -0
  104. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/roles_pb2.py +0 -0
  105. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/roles_pb2_grpc.py +0 -0
  106. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/secret_store_healths_pb2.py +0 -0
  107. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
  108. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  109. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/secret_stores_history_pb2.py +0 -0
  110. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  111. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/secret_stores_pb2.py +0 -0
  112. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
  113. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/spec_pb2.py +0 -0
  114. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/spec_pb2_grpc.py +0 -0
  115. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/tags_pb2.py +0 -0
  116. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/tags_pb2_grpc.py +0 -0
  117. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
  118. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
  119. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_approvers_pb2.py +0 -0
  120. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
  121. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
  122. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
  123. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_assignments_pb2.py +0 -0
  124. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
  125. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_roles_history_pb2.py +0 -0
  126. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
  127. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_roles_pb2.py +0 -0
  128. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
  129. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflows_history_pb2.py +0 -0
  130. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
  131. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflows_pb2.py +0 -0
  132. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm/workflows_pb2_grpc.py +0 -0
  133. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm.egg-info/dependency_links.txt +0 -0
  134. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm.egg-info/requires.txt +0 -0
  135. {strongdm-8.3.0 → strongdm-9.0.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -29,11 +29,11 @@ class AKS:
29
29
  'healthy',
30
30
  'hostname',
31
31
  'id',
32
+ 'identity_alias_healthcheck_username',
33
+ 'identity_set_id',
32
34
  'name',
33
35
  'port',
34
36
  'port_override',
35
- 'remote_identity_group_id',
36
- 'remote_identity_healthcheck_username',
37
37
  'secret_store_id',
38
38
  'subdomain',
39
39
  'tags',
@@ -50,11 +50,11 @@ class AKS:
50
50
  healthy=None,
51
51
  hostname=None,
52
52
  id=None,
53
+ identity_alias_healthcheck_username=None,
54
+ identity_set_id=None,
53
55
  name=None,
54
56
  port=None,
55
57
  port_override=None,
56
- remote_identity_group_id=None,
57
- remote_identity_healthcheck_username=None,
58
58
  secret_store_id=None,
59
59
  subdomain=None,
60
60
  tags=None,
@@ -95,6 +95,14 @@ class AKS:
95
95
  '''
96
96
  Unique identifier of the Resource.
97
97
  '''
98
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
99
+ '''
100
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
101
+ '''
102
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
103
+ '''
104
+ The ID of the identity set to use for identity connections.
105
+ '''
98
106
  self.name = name if name is not None else ''
99
107
  '''
100
108
  Unique human-readable name of the Resource.
@@ -107,14 +115,6 @@ class AKS:
107
115
  '''
108
116
  The local port used by clients to connect to this resource.
109
117
  '''
110
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
111
- '''
112
- The ID of the remote identity group to use for remote identity connections.
113
- '''
114
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
115
- '''
116
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
117
- '''
118
118
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
119
119
  '''
120
120
  ID of the secret store containing credentials for this resource, if any.
@@ -139,11 +139,11 @@ class AKS:
139
139
  'healthy: ' + repr(self.healthy) + ' ' +\
140
140
  'hostname: ' + repr(self.hostname) + ' ' +\
141
141
  'id: ' + repr(self.id) + ' ' +\
142
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
143
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
142
144
  'name: ' + repr(self.name) + ' ' +\
143
145
  'port: ' + repr(self.port) + ' ' +\
144
146
  'port_override: ' + repr(self.port_override) + ' ' +\
145
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
146
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
147
147
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
148
148
  'subdomain: ' + repr(self.subdomain) + ' ' +\
149
149
  'tags: ' + repr(self.tags) + ' ' +\
@@ -160,12 +160,12 @@ class AKS:
160
160
  'healthy': self.healthy,
161
161
  'hostname': self.hostname,
162
162
  'id': self.id,
163
+ 'identity_alias_healthcheck_username':
164
+ self.identity_alias_healthcheck_username,
165
+ 'identity_set_id': self.identity_set_id,
163
166
  'name': self.name,
164
167
  'port': self.port,
165
168
  'port_override': self.port_override,
166
- 'remote_identity_group_id': self.remote_identity_group_id,
167
- 'remote_identity_healthcheck_username':
168
- self.remote_identity_healthcheck_username,
169
169
  'secret_store_id': self.secret_store_id,
170
170
  'subdomain': self.subdomain,
171
171
  'tags': self.tags,
@@ -183,12 +183,12 @@ class AKS:
183
183
  healthy=d.get('healthy'),
184
184
  hostname=d.get('hostname'),
185
185
  id=d.get('id'),
186
+ identity_alias_healthcheck_username=d.get(
187
+ 'identity_alias_healthcheck_username'),
188
+ identity_set_id=d.get('identity_set_id'),
186
189
  name=d.get('name'),
187
190
  port=d.get('port'),
188
191
  port_override=d.get('port_override'),
189
- remote_identity_group_id=d.get('remote_identity_group_id'),
190
- remote_identity_healthcheck_username=d.get(
191
- 'remote_identity_healthcheck_username'),
192
192
  secret_store_id=d.get('secret_store_id'),
193
193
  subdomain=d.get('subdomain'),
194
194
  tags=d.get('tags'),
@@ -351,11 +351,11 @@ class AKSServiceAccount:
351
351
  'healthy',
352
352
  'hostname',
353
353
  'id',
354
+ 'identity_alias_healthcheck_username',
355
+ 'identity_set_id',
354
356
  'name',
355
357
  'port',
356
358
  'port_override',
357
- 'remote_identity_group_id',
358
- 'remote_identity_healthcheck_username',
359
359
  'secret_store_id',
360
360
  'subdomain',
361
361
  'tags',
@@ -370,11 +370,11 @@ class AKSServiceAccount:
370
370
  healthy=None,
371
371
  hostname=None,
372
372
  id=None,
373
+ identity_alias_healthcheck_username=None,
374
+ identity_set_id=None,
373
375
  name=None,
374
376
  port=None,
375
377
  port_override=None,
376
- remote_identity_group_id=None,
377
- remote_identity_healthcheck_username=None,
378
378
  secret_store_id=None,
379
379
  subdomain=None,
380
380
  tags=None,
@@ -404,6 +404,14 @@ class AKSServiceAccount:
404
404
  '''
405
405
  Unique identifier of the Resource.
406
406
  '''
407
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
408
+ '''
409
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
410
+ '''
411
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
412
+ '''
413
+ The ID of the identity set to use for identity connections.
414
+ '''
407
415
  self.name = name if name is not None else ''
408
416
  '''
409
417
  Unique human-readable name of the Resource.
@@ -416,14 +424,6 @@ class AKSServiceAccount:
416
424
  '''
417
425
  The local port used by clients to connect to this resource.
418
426
  '''
419
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
420
- '''
421
- The ID of the remote identity group to use for remote identity connections.
422
- '''
423
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
424
- '''
425
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
426
- '''
427
427
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
428
428
  '''
429
429
  ID of the secret store containing credentials for this resource, if any.
@@ -449,11 +449,11 @@ class AKSServiceAccount:
449
449
  'healthy: ' + repr(self.healthy) + ' ' +\
450
450
  'hostname: ' + repr(self.hostname) + ' ' +\
451
451
  'id: ' + repr(self.id) + ' ' +\
452
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
453
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
452
454
  'name: ' + repr(self.name) + ' ' +\
453
455
  'port: ' + repr(self.port) + ' ' +\
454
456
  'port_override: ' + repr(self.port_override) + ' ' +\
455
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
456
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
457
457
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
458
458
  'subdomain: ' + repr(self.subdomain) + ' ' +\
459
459
  'tags: ' + repr(self.tags) + ' ' +\
@@ -468,12 +468,12 @@ class AKSServiceAccount:
468
468
  'healthy': self.healthy,
469
469
  'hostname': self.hostname,
470
470
  'id': self.id,
471
+ 'identity_alias_healthcheck_username':
472
+ self.identity_alias_healthcheck_username,
473
+ 'identity_set_id': self.identity_set_id,
471
474
  'name': self.name,
472
475
  'port': self.port,
473
476
  'port_override': self.port_override,
474
- 'remote_identity_group_id': self.remote_identity_group_id,
475
- 'remote_identity_healthcheck_username':
476
- self.remote_identity_healthcheck_username,
477
477
  'secret_store_id': self.secret_store_id,
478
478
  'subdomain': self.subdomain,
479
479
  'tags': self.tags,
@@ -489,12 +489,12 @@ class AKSServiceAccount:
489
489
  healthy=d.get('healthy'),
490
490
  hostname=d.get('hostname'),
491
491
  id=d.get('id'),
492
+ identity_alias_healthcheck_username=d.get(
493
+ 'identity_alias_healthcheck_username'),
494
+ identity_set_id=d.get('identity_set_id'),
492
495
  name=d.get('name'),
493
496
  port=d.get('port'),
494
497
  port_override=d.get('port_override'),
495
- remote_identity_group_id=d.get('remote_identity_group_id'),
496
- remote_identity_healthcheck_username=d.get(
497
- 'remote_identity_healthcheck_username'),
498
498
  secret_store_id=d.get('secret_store_id'),
499
499
  subdomain=d.get('subdomain'),
500
500
  tags=d.get('tags'),
@@ -1047,11 +1047,11 @@ class AWSConsole:
1047
1047
  'enable_env_variables',
1048
1048
  'healthy',
1049
1049
  'id',
1050
+ 'identity_alias_healthcheck_username',
1051
+ 'identity_set_id',
1050
1052
  'name',
1051
1053
  'port_override',
1052
1054
  'region',
1053
- 'remote_identity_group_id',
1054
- 'remote_identity_healthcheck_username',
1055
1055
  'role_arn',
1056
1056
  'role_external_id',
1057
1057
  'secret_store_id',
@@ -1067,11 +1067,11 @@ class AWSConsole:
1067
1067
  enable_env_variables=None,
1068
1068
  healthy=None,
1069
1069
  id=None,
1070
+ identity_alias_healthcheck_username=None,
1071
+ identity_set_id=None,
1070
1072
  name=None,
1071
1073
  port_override=None,
1072
1074
  region=None,
1073
- remote_identity_group_id=None,
1074
- remote_identity_healthcheck_username=None,
1075
1075
  role_arn=None,
1076
1076
  role_external_id=None,
1077
1077
  secret_store_id=None,
@@ -1099,6 +1099,14 @@ class AWSConsole:
1099
1099
  '''
1100
1100
  Unique identifier of the Resource.
1101
1101
  '''
1102
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
1103
+ '''
1104
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
1105
+ '''
1106
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
1107
+ '''
1108
+ The ID of the identity set to use for identity connections.
1109
+ '''
1102
1110
  self.name = name if name is not None else ''
1103
1111
  '''
1104
1112
  Unique human-readable name of the Resource.
@@ -1111,14 +1119,6 @@ class AWSConsole:
1111
1119
  '''
1112
1120
  The AWS region to connect to.
1113
1121
  '''
1114
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
1115
- '''
1116
- The ID of the remote identity group to use for remote identity connections.
1117
- '''
1118
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
1119
- '''
1120
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
1121
- '''
1122
1122
  self.role_arn = role_arn if role_arn is not None else ''
1123
1123
  '''
1124
1124
  The role to assume after logging in.
@@ -1151,11 +1151,11 @@ class AWSConsole:
1151
1151
  'enable_env_variables: ' + repr(self.enable_env_variables) + ' ' +\
1152
1152
  'healthy: ' + repr(self.healthy) + ' ' +\
1153
1153
  'id: ' + repr(self.id) + ' ' +\
1154
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
1155
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
1154
1156
  'name: ' + repr(self.name) + ' ' +\
1155
1157
  'port_override: ' + repr(self.port_override) + ' ' +\
1156
1158
  'region: ' + repr(self.region) + ' ' +\
1157
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
1158
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
1159
1159
  'role_arn: ' + repr(self.role_arn) + ' ' +\
1160
1160
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
1161
1161
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
@@ -1171,12 +1171,12 @@ class AWSConsole:
1171
1171
  'enable_env_variables': self.enable_env_variables,
1172
1172
  'healthy': self.healthy,
1173
1173
  'id': self.id,
1174
+ 'identity_alias_healthcheck_username':
1175
+ self.identity_alias_healthcheck_username,
1176
+ 'identity_set_id': self.identity_set_id,
1174
1177
  'name': self.name,
1175
1178
  'port_override': self.port_override,
1176
1179
  'region': self.region,
1177
- 'remote_identity_group_id': self.remote_identity_group_id,
1178
- 'remote_identity_healthcheck_username':
1179
- self.remote_identity_healthcheck_username,
1180
1180
  'role_arn': self.role_arn,
1181
1181
  'role_external_id': self.role_external_id,
1182
1182
  'secret_store_id': self.secret_store_id,
@@ -1193,12 +1193,12 @@ class AWSConsole:
1193
1193
  enable_env_variables=d.get('enable_env_variables'),
1194
1194
  healthy=d.get('healthy'),
1195
1195
  id=d.get('id'),
1196
+ identity_alias_healthcheck_username=d.get(
1197
+ 'identity_alias_healthcheck_username'),
1198
+ identity_set_id=d.get('identity_set_id'),
1196
1199
  name=d.get('name'),
1197
1200
  port_override=d.get('port_override'),
1198
1201
  region=d.get('region'),
1199
- remote_identity_group_id=d.get('remote_identity_group_id'),
1200
- remote_identity_healthcheck_username=d.get(
1201
- 'remote_identity_healthcheck_username'),
1202
1202
  role_arn=d.get('role_arn'),
1203
1203
  role_external_id=d.get('role_external_id'),
1204
1204
  secret_store_id=d.get('secret_store_id'),
@@ -1215,11 +1215,11 @@ class AWSConsoleStaticKeyPair:
1215
1215
  'egress_filter',
1216
1216
  'healthy',
1217
1217
  'id',
1218
+ 'identity_alias_healthcheck_username',
1219
+ 'identity_set_id',
1218
1220
  'name',
1219
1221
  'port_override',
1220
1222
  'region',
1221
- 'remote_identity_group_id',
1222
- 'remote_identity_healthcheck_username',
1223
1223
  'role_arn',
1224
1224
  'role_external_id',
1225
1225
  'secret_access_key',
@@ -1236,11 +1236,11 @@ class AWSConsoleStaticKeyPair:
1236
1236
  egress_filter=None,
1237
1237
  healthy=None,
1238
1238
  id=None,
1239
+ identity_alias_healthcheck_username=None,
1240
+ identity_set_id=None,
1239
1241
  name=None,
1240
1242
  port_override=None,
1241
1243
  region=None,
1242
- remote_identity_group_id=None,
1243
- remote_identity_healthcheck_username=None,
1244
1244
  role_arn=None,
1245
1245
  role_external_id=None,
1246
1246
  secret_access_key=None,
@@ -1269,6 +1269,14 @@ class AWSConsoleStaticKeyPair:
1269
1269
  '''
1270
1270
  Unique identifier of the Resource.
1271
1271
  '''
1272
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
1273
+ '''
1274
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
1275
+ '''
1276
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
1277
+ '''
1278
+ The ID of the identity set to use for identity connections.
1279
+ '''
1272
1280
  self.name = name if name is not None else ''
1273
1281
  '''
1274
1282
  Unique human-readable name of the Resource.
@@ -1281,14 +1289,6 @@ class AWSConsoleStaticKeyPair:
1281
1289
  '''
1282
1290
  The AWS region to connect to.
1283
1291
  '''
1284
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
1285
- '''
1286
- The ID of the remote identity group to use for remote identity connections.
1287
- '''
1288
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
1289
- '''
1290
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
1291
- '''
1292
1292
  self.role_arn = role_arn if role_arn is not None else ''
1293
1293
  '''
1294
1294
  The role to assume after logging in.
@@ -1325,11 +1325,11 @@ class AWSConsoleStaticKeyPair:
1325
1325
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
1326
1326
  'healthy: ' + repr(self.healthy) + ' ' +\
1327
1327
  'id: ' + repr(self.id) + ' ' +\
1328
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
1329
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
1328
1330
  'name: ' + repr(self.name) + ' ' +\
1329
1331
  'port_override: ' + repr(self.port_override) + ' ' +\
1330
1332
  'region: ' + repr(self.region) + ' ' +\
1331
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
1332
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
1333
1333
  'role_arn: ' + repr(self.role_arn) + ' ' +\
1334
1334
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
1335
1335
  'secret_access_key: ' + repr(self.secret_access_key) + ' ' +\
@@ -1346,12 +1346,12 @@ class AWSConsoleStaticKeyPair:
1346
1346
  'egress_filter': self.egress_filter,
1347
1347
  'healthy': self.healthy,
1348
1348
  'id': self.id,
1349
+ 'identity_alias_healthcheck_username':
1350
+ self.identity_alias_healthcheck_username,
1351
+ 'identity_set_id': self.identity_set_id,
1349
1352
  'name': self.name,
1350
1353
  'port_override': self.port_override,
1351
1354
  'region': self.region,
1352
- 'remote_identity_group_id': self.remote_identity_group_id,
1353
- 'remote_identity_healthcheck_username':
1354
- self.remote_identity_healthcheck_username,
1355
1355
  'role_arn': self.role_arn,
1356
1356
  'role_external_id': self.role_external_id,
1357
1357
  'secret_access_key': self.secret_access_key,
@@ -1369,12 +1369,12 @@ class AWSConsoleStaticKeyPair:
1369
1369
  egress_filter=d.get('egress_filter'),
1370
1370
  healthy=d.get('healthy'),
1371
1371
  id=d.get('id'),
1372
+ identity_alias_healthcheck_username=d.get(
1373
+ 'identity_alias_healthcheck_username'),
1374
+ identity_set_id=d.get('identity_set_id'),
1372
1375
  name=d.get('name'),
1373
1376
  port_override=d.get('port_override'),
1374
1377
  region=d.get('region'),
1375
- remote_identity_group_id=d.get('remote_identity_group_id'),
1376
- remote_identity_healthcheck_username=d.get(
1377
- 'remote_identity_healthcheck_username'),
1378
1378
  role_arn=d.get('role_arn'),
1379
1379
  role_external_id=d.get('role_external_id'),
1380
1380
  secret_access_key=d.get('secret_access_key'),
@@ -3313,11 +3313,11 @@ class AmazonEKS:
3313
3313
  'healthcheck_namespace',
3314
3314
  'healthy',
3315
3315
  'id',
3316
+ 'identity_alias_healthcheck_username',
3317
+ 'identity_set_id',
3316
3318
  'name',
3317
3319
  'port_override',
3318
3320
  'region',
3319
- 'remote_identity_group_id',
3320
- 'remote_identity_healthcheck_username',
3321
3321
  'role_arn',
3322
3322
  'role_external_id',
3323
3323
  'secret_access_key',
@@ -3337,11 +3337,11 @@ class AmazonEKS:
3337
3337
  healthcheck_namespace=None,
3338
3338
  healthy=None,
3339
3339
  id=None,
3340
+ identity_alias_healthcheck_username=None,
3341
+ identity_set_id=None,
3340
3342
  name=None,
3341
3343
  port_override=None,
3342
3344
  region=None,
3343
- remote_identity_group_id=None,
3344
- remote_identity_healthcheck_username=None,
3345
3345
  role_arn=None,
3346
3346
  role_external_id=None,
3347
3347
  secret_access_key=None,
@@ -3385,6 +3385,14 @@ class AmazonEKS:
3385
3385
  '''
3386
3386
  Unique identifier of the Resource.
3387
3387
  '''
3388
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
3389
+ '''
3390
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
3391
+ '''
3392
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
3393
+ '''
3394
+ The ID of the identity set to use for identity connections.
3395
+ '''
3388
3396
  self.name = name if name is not None else ''
3389
3397
  '''
3390
3398
  Unique human-readable name of the Resource.
@@ -3397,14 +3405,6 @@ class AmazonEKS:
3397
3405
  '''
3398
3406
  The AWS region to connect to e.g. us-east-1.
3399
3407
  '''
3400
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
3401
- '''
3402
- The ID of the remote identity group to use for remote identity connections.
3403
- '''
3404
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
3405
- '''
3406
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
3407
- '''
3408
3408
  self.role_arn = role_arn if role_arn is not None else ''
3409
3409
  '''
3410
3410
  The role to assume after logging in.
@@ -3441,11 +3441,11 @@ class AmazonEKS:
3441
3441
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
3442
3442
  'healthy: ' + repr(self.healthy) + ' ' +\
3443
3443
  'id: ' + repr(self.id) + ' ' +\
3444
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
3445
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
3444
3446
  'name: ' + repr(self.name) + ' ' +\
3445
3447
  'port_override: ' + repr(self.port_override) + ' ' +\
3446
3448
  'region: ' + repr(self.region) + ' ' +\
3447
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
3448
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
3449
3449
  'role_arn: ' + repr(self.role_arn) + ' ' +\
3450
3450
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
3451
3451
  'secret_access_key: ' + repr(self.secret_access_key) + ' ' +\
@@ -3465,12 +3465,12 @@ class AmazonEKS:
3465
3465
  'healthcheck_namespace': self.healthcheck_namespace,
3466
3466
  'healthy': self.healthy,
3467
3467
  'id': self.id,
3468
+ 'identity_alias_healthcheck_username':
3469
+ self.identity_alias_healthcheck_username,
3470
+ 'identity_set_id': self.identity_set_id,
3468
3471
  'name': self.name,
3469
3472
  'port_override': self.port_override,
3470
3473
  'region': self.region,
3471
- 'remote_identity_group_id': self.remote_identity_group_id,
3472
- 'remote_identity_healthcheck_username':
3473
- self.remote_identity_healthcheck_username,
3474
3474
  'role_arn': self.role_arn,
3475
3475
  'role_external_id': self.role_external_id,
3476
3476
  'secret_access_key': self.secret_access_key,
@@ -3491,12 +3491,12 @@ class AmazonEKS:
3491
3491
  healthcheck_namespace=d.get('healthcheck_namespace'),
3492
3492
  healthy=d.get('healthy'),
3493
3493
  id=d.get('id'),
3494
+ identity_alias_healthcheck_username=d.get(
3495
+ 'identity_alias_healthcheck_username'),
3496
+ identity_set_id=d.get('identity_set_id'),
3494
3497
  name=d.get('name'),
3495
3498
  port_override=d.get('port_override'),
3496
3499
  region=d.get('region'),
3497
- remote_identity_group_id=d.get('remote_identity_group_id'),
3498
- remote_identity_healthcheck_username=d.get(
3499
- 'remote_identity_healthcheck_username'),
3500
3500
  role_arn=d.get('role_arn'),
3501
3501
  role_external_id=d.get('role_external_id'),
3502
3502
  secret_access_key=d.get('secret_access_key'),
@@ -3516,11 +3516,11 @@ class AmazonEKSInstanceProfile:
3516
3516
  'healthcheck_namespace',
3517
3517
  'healthy',
3518
3518
  'id',
3519
+ 'identity_alias_healthcheck_username',
3520
+ 'identity_set_id',
3519
3521
  'name',
3520
3522
  'port_override',
3521
3523
  'region',
3522
- 'remote_identity_group_id',
3523
- 'remote_identity_healthcheck_username',
3524
3524
  'role_arn',
3525
3525
  'role_external_id',
3526
3526
  'secret_store_id',
@@ -3538,11 +3538,11 @@ class AmazonEKSInstanceProfile:
3538
3538
  healthcheck_namespace=None,
3539
3539
  healthy=None,
3540
3540
  id=None,
3541
+ identity_alias_healthcheck_username=None,
3542
+ identity_set_id=None,
3541
3543
  name=None,
3542
3544
  port_override=None,
3543
3545
  region=None,
3544
- remote_identity_group_id=None,
3545
- remote_identity_healthcheck_username=None,
3546
3546
  role_arn=None,
3547
3547
  role_external_id=None,
3548
3548
  secret_store_id=None,
@@ -3581,6 +3581,14 @@ class AmazonEKSInstanceProfile:
3581
3581
  '''
3582
3582
  Unique identifier of the Resource.
3583
3583
  '''
3584
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
3585
+ '''
3586
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
3587
+ '''
3588
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
3589
+ '''
3590
+ The ID of the identity set to use for identity connections.
3591
+ '''
3584
3592
  self.name = name if name is not None else ''
3585
3593
  '''
3586
3594
  Unique human-readable name of the Resource.
@@ -3593,14 +3601,6 @@ class AmazonEKSInstanceProfile:
3593
3601
  '''
3594
3602
  The AWS region to connect to e.g. us-east-1.
3595
3603
  '''
3596
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
3597
- '''
3598
- The ID of the remote identity group to use for remote identity connections.
3599
- '''
3600
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
3601
- '''
3602
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
3603
- '''
3604
3604
  self.role_arn = role_arn if role_arn is not None else ''
3605
3605
  '''
3606
3606
  The role to assume after logging in.
@@ -3632,11 +3632,11 @@ class AmazonEKSInstanceProfile:
3632
3632
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
3633
3633
  'healthy: ' + repr(self.healthy) + ' ' +\
3634
3634
  'id: ' + repr(self.id) + ' ' +\
3635
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
3636
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
3635
3637
  'name: ' + repr(self.name) + ' ' +\
3636
3638
  'port_override: ' + repr(self.port_override) + ' ' +\
3637
3639
  'region: ' + repr(self.region) + ' ' +\
3638
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
3639
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
3640
3640
  'role_arn: ' + repr(self.role_arn) + ' ' +\
3641
3641
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
3642
3642
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
@@ -3654,12 +3654,12 @@ class AmazonEKSInstanceProfile:
3654
3654
  'healthcheck_namespace': self.healthcheck_namespace,
3655
3655
  'healthy': self.healthy,
3656
3656
  'id': self.id,
3657
+ 'identity_alias_healthcheck_username':
3658
+ self.identity_alias_healthcheck_username,
3659
+ 'identity_set_id': self.identity_set_id,
3657
3660
  'name': self.name,
3658
3661
  'port_override': self.port_override,
3659
3662
  'region': self.region,
3660
- 'remote_identity_group_id': self.remote_identity_group_id,
3661
- 'remote_identity_healthcheck_username':
3662
- self.remote_identity_healthcheck_username,
3663
3663
  'role_arn': self.role_arn,
3664
3664
  'role_external_id': self.role_external_id,
3665
3665
  'secret_store_id': self.secret_store_id,
@@ -3678,12 +3678,12 @@ class AmazonEKSInstanceProfile:
3678
3678
  healthcheck_namespace=d.get('healthcheck_namespace'),
3679
3679
  healthy=d.get('healthy'),
3680
3680
  id=d.get('id'),
3681
+ identity_alias_healthcheck_username=d.get(
3682
+ 'identity_alias_healthcheck_username'),
3683
+ identity_set_id=d.get('identity_set_id'),
3681
3684
  name=d.get('name'),
3682
3685
  port_override=d.get('port_override'),
3683
3686
  region=d.get('region'),
3684
- remote_identity_group_id=d.get('remote_identity_group_id'),
3685
- remote_identity_healthcheck_username=d.get(
3686
- 'remote_identity_healthcheck_username'),
3687
3687
  role_arn=d.get('role_arn'),
3688
3688
  role_external_id=d.get('role_external_id'),
3689
3689
  secret_store_id=d.get('secret_store_id'),
@@ -3705,8 +3705,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3705
3705
  'name',
3706
3706
  'port_override',
3707
3707
  'region',
3708
- 'remote_identity_group_id',
3709
- 'remote_identity_healthcheck_username',
3710
3708
  'role_arn',
3711
3709
  'role_external_id',
3712
3710
  'secret_store_id',
@@ -3727,8 +3725,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3727
3725
  name=None,
3728
3726
  port_override=None,
3729
3727
  region=None,
3730
- remote_identity_group_id=None,
3731
- remote_identity_healthcheck_username=None,
3732
3728
  role_arn=None,
3733
3729
  role_external_id=None,
3734
3730
  secret_store_id=None,
@@ -3779,14 +3775,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3779
3775
  '''
3780
3776
  The AWS region to connect to e.g. us-east-1.
3781
3777
  '''
3782
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
3783
- '''
3784
- The ID of the remote identity group to use for remote identity connections.
3785
- '''
3786
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
3787
- '''
3788
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
3789
- '''
3790
3778
  self.role_arn = role_arn if role_arn is not None else ''
3791
3779
  '''
3792
3780
  The role to assume after logging in.
@@ -3821,8 +3809,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3821
3809
  'name: ' + repr(self.name) + ' ' +\
3822
3810
  'port_override: ' + repr(self.port_override) + ' ' +\
3823
3811
  'region: ' + repr(self.region) + ' ' +\
3824
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
3825
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
3826
3812
  'role_arn: ' + repr(self.role_arn) + ' ' +\
3827
3813
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
3828
3814
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
@@ -3843,9 +3829,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3843
3829
  'name': self.name,
3844
3830
  'port_override': self.port_override,
3845
3831
  'region': self.region,
3846
- 'remote_identity_group_id': self.remote_identity_group_id,
3847
- 'remote_identity_healthcheck_username':
3848
- self.remote_identity_healthcheck_username,
3849
3832
  'role_arn': self.role_arn,
3850
3833
  'role_external_id': self.role_external_id,
3851
3834
  'secret_store_id': self.secret_store_id,
@@ -3867,9 +3850,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3867
3850
  name=d.get('name'),
3868
3851
  port_override=d.get('port_override'),
3869
3852
  region=d.get('region'),
3870
- remote_identity_group_id=d.get('remote_identity_group_id'),
3871
- remote_identity_healthcheck_username=d.get(
3872
- 'remote_identity_healthcheck_username'),
3873
3853
  role_arn=d.get('role_arn'),
3874
3854
  role_external_id=d.get('role_external_id'),
3875
3855
  secret_store_id=d.get('secret_store_id'),
@@ -9603,10 +9583,10 @@ class GoogleGKE:
9603
9583
  'healthcheck_namespace',
9604
9584
  'healthy',
9605
9585
  'id',
9586
+ 'identity_alias_healthcheck_username',
9587
+ 'identity_set_id',
9606
9588
  'name',
9607
9589
  'port_override',
9608
- 'remote_identity_group_id',
9609
- 'remote_identity_healthcheck_username',
9610
9590
  'secret_store_id',
9611
9591
  'service_account_key',
9612
9592
  'subdomain',
@@ -9622,10 +9602,10 @@ class GoogleGKE:
9622
9602
  healthcheck_namespace=None,
9623
9603
  healthy=None,
9624
9604
  id=None,
9605
+ identity_alias_healthcheck_username=None,
9606
+ identity_set_id=None,
9625
9607
  name=None,
9626
9608
  port_override=None,
9627
- remote_identity_group_id=None,
9628
- remote_identity_healthcheck_username=None,
9629
9609
  secret_store_id=None,
9630
9610
  service_account_key=None,
9631
9611
  subdomain=None,
@@ -9659,21 +9639,21 @@ class GoogleGKE:
9659
9639
  '''
9660
9640
  Unique identifier of the Resource.
9661
9641
  '''
9662
- self.name = name if name is not None else ''
9642
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
9663
9643
  '''
9664
- Unique human-readable name of the Resource.
9644
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
9665
9645
  '''
9666
- self.port_override = port_override if port_override is not None else 0
9646
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
9667
9647
  '''
9668
- The local port used by clients to connect to this resource.
9648
+ The ID of the identity set to use for identity connections.
9669
9649
  '''
9670
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
9650
+ self.name = name if name is not None else ''
9671
9651
  '''
9672
- The ID of the remote identity group to use for remote identity connections.
9652
+ Unique human-readable name of the Resource.
9673
9653
  '''
9674
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
9654
+ self.port_override = port_override if port_override is not None else 0
9675
9655
  '''
9676
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
9656
+ The local port used by clients to connect to this resource.
9677
9657
  '''
9678
9658
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
9679
9659
  '''
@@ -9701,10 +9681,10 @@ class GoogleGKE:
9701
9681
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
9702
9682
  'healthy: ' + repr(self.healthy) + ' ' +\
9703
9683
  'id: ' + repr(self.id) + ' ' +\
9684
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
9685
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
9704
9686
  'name: ' + repr(self.name) + ' ' +\
9705
9687
  'port_override: ' + repr(self.port_override) + ' ' +\
9706
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
9707
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
9708
9688
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
9709
9689
  'service_account_key: ' + repr(self.service_account_key) + ' ' +\
9710
9690
  'subdomain: ' + repr(self.subdomain) + ' ' +\
@@ -9720,11 +9700,11 @@ class GoogleGKE:
9720
9700
  'healthcheck_namespace': self.healthcheck_namespace,
9721
9701
  'healthy': self.healthy,
9722
9702
  'id': self.id,
9703
+ 'identity_alias_healthcheck_username':
9704
+ self.identity_alias_healthcheck_username,
9705
+ 'identity_set_id': self.identity_set_id,
9723
9706
  'name': self.name,
9724
9707
  'port_override': self.port_override,
9725
- 'remote_identity_group_id': self.remote_identity_group_id,
9726
- 'remote_identity_healthcheck_username':
9727
- self.remote_identity_healthcheck_username,
9728
9708
  'secret_store_id': self.secret_store_id,
9729
9709
  'service_account_key': self.service_account_key,
9730
9710
  'subdomain': self.subdomain,
@@ -9741,11 +9721,11 @@ class GoogleGKE:
9741
9721
  healthcheck_namespace=d.get('healthcheck_namespace'),
9742
9722
  healthy=d.get('healthy'),
9743
9723
  id=d.get('id'),
9724
+ identity_alias_healthcheck_username=d.get(
9725
+ 'identity_alias_healthcheck_username'),
9726
+ identity_set_id=d.get('identity_set_id'),
9744
9727
  name=d.get('name'),
9745
9728
  port_override=d.get('port_override'),
9746
- remote_identity_group_id=d.get('remote_identity_group_id'),
9747
- remote_identity_healthcheck_username=d.get(
9748
- 'remote_identity_healthcheck_username'),
9749
9729
  secret_store_id=d.get('secret_store_id'),
9750
9730
  service_account_key=d.get('service_account_key'),
9751
9731
  subdomain=d.get('subdomain'),
@@ -10425,71 +10405,556 @@ class HTTPNoAuth:
10425
10405
  '''
10426
10406
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
10427
10407
  '''
10428
- ID of the secret store containing credentials for this resource, if any.
10408
+ ID of the secret store containing credentials for this resource, if any.
10409
+ '''
10410
+ self.subdomain = subdomain if subdomain is not None else ''
10411
+ '''
10412
+ Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
10413
+ '''
10414
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
10415
+ '''
10416
+ Tags is a map of key, value pairs.
10417
+ '''
10418
+ self.url = url if url is not None else ''
10419
+ '''
10420
+ The base address of your website without the path.
10421
+ '''
10422
+
10423
+ def __repr__(self):
10424
+ return '<sdm.HTTPNoAuth ' + \
10425
+ 'bind_interface: ' + repr(self.bind_interface) + ' ' +\
10426
+ 'default_path: ' + repr(self.default_path) + ' ' +\
10427
+ 'egress_filter: ' + repr(self.egress_filter) + ' ' +\
10428
+ 'headers_blacklist: ' + repr(self.headers_blacklist) + ' ' +\
10429
+ 'healthcheck_path: ' + repr(self.healthcheck_path) + ' ' +\
10430
+ 'healthy: ' + repr(self.healthy) + ' ' +\
10431
+ 'host_override: ' + repr(self.host_override) + ' ' +\
10432
+ 'id: ' + repr(self.id) + ' ' +\
10433
+ 'name: ' + repr(self.name) + ' ' +\
10434
+ 'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
10435
+ 'subdomain: ' + repr(self.subdomain) + ' ' +\
10436
+ 'tags: ' + repr(self.tags) + ' ' +\
10437
+ 'url: ' + repr(self.url) + ' ' +\
10438
+ '>'
10439
+
10440
+ def to_dict(self):
10441
+ return {
10442
+ 'bind_interface': self.bind_interface,
10443
+ 'default_path': self.default_path,
10444
+ 'egress_filter': self.egress_filter,
10445
+ 'headers_blacklist': self.headers_blacklist,
10446
+ 'healthcheck_path': self.healthcheck_path,
10447
+ 'healthy': self.healthy,
10448
+ 'host_override': self.host_override,
10449
+ 'id': self.id,
10450
+ 'name': self.name,
10451
+ 'secret_store_id': self.secret_store_id,
10452
+ 'subdomain': self.subdomain,
10453
+ 'tags': self.tags,
10454
+ 'url': self.url,
10455
+ }
10456
+
10457
+ @classmethod
10458
+ def from_dict(cls, d):
10459
+ return cls(
10460
+ bind_interface=d.get('bind_interface'),
10461
+ default_path=d.get('default_path'),
10462
+ egress_filter=d.get('egress_filter'),
10463
+ headers_blacklist=d.get('headers_blacklist'),
10464
+ healthcheck_path=d.get('healthcheck_path'),
10465
+ healthy=d.get('healthy'),
10466
+ host_override=d.get('host_override'),
10467
+ id=d.get('id'),
10468
+ name=d.get('name'),
10469
+ secret_store_id=d.get('secret_store_id'),
10470
+ subdomain=d.get('subdomain'),
10471
+ tags=d.get('tags'),
10472
+ url=d.get('url'),
10473
+ )
10474
+
10475
+
10476
+ class IdentityAlias:
10477
+ '''
10478
+ IdentityAliases define the username to be used for a specific account
10479
+ when connecting to a remote resource using that identity set.
10480
+ '''
10481
+ __slots__ = [
10482
+ 'account_id',
10483
+ 'id',
10484
+ 'identity_set_id',
10485
+ 'username',
10486
+ ]
10487
+
10488
+ def __init__(
10489
+ self,
10490
+ account_id=None,
10491
+ id=None,
10492
+ identity_set_id=None,
10493
+ username=None,
10494
+ ):
10495
+ self.account_id = account_id if account_id is not None else ''
10496
+ '''
10497
+ The account for this identity alias.
10498
+ '''
10499
+ self.id = id if id is not None else ''
10500
+ '''
10501
+ Unique identifier of the IdentityAlias.
10502
+ '''
10503
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
10504
+ '''
10505
+ The identity set.
10506
+ '''
10507
+ self.username = username if username is not None else ''
10508
+ '''
10509
+ The username to be used as the identity alias for this account.
10510
+ '''
10511
+
10512
+ def __repr__(self):
10513
+ return '<sdm.IdentityAlias ' + \
10514
+ 'account_id: ' + repr(self.account_id) + ' ' +\
10515
+ 'id: ' + repr(self.id) + ' ' +\
10516
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
10517
+ 'username: ' + repr(self.username) + ' ' +\
10518
+ '>'
10519
+
10520
+ def to_dict(self):
10521
+ return {
10522
+ 'account_id': self.account_id,
10523
+ 'id': self.id,
10524
+ 'identity_set_id': self.identity_set_id,
10525
+ 'username': self.username,
10526
+ }
10527
+
10528
+ @classmethod
10529
+ def from_dict(cls, d):
10530
+ return cls(
10531
+ account_id=d.get('account_id'),
10532
+ id=d.get('id'),
10533
+ identity_set_id=d.get('identity_set_id'),
10534
+ username=d.get('username'),
10535
+ )
10536
+
10537
+
10538
+ class IdentityAliasCreateResponse:
10539
+ '''
10540
+ IdentityAliasCreateResponse reports how the IdentityAliases were created in the system.
10541
+ '''
10542
+ __slots__ = [
10543
+ 'identity_alias',
10544
+ 'meta',
10545
+ 'rate_limit',
10546
+ ]
10547
+
10548
+ def __init__(
10549
+ self,
10550
+ identity_alias=None,
10551
+ meta=None,
10552
+ rate_limit=None,
10553
+ ):
10554
+ self.identity_alias = identity_alias if identity_alias is not None else None
10555
+ '''
10556
+ The created IdentityAlias.
10557
+ '''
10558
+ self.meta = meta if meta is not None else None
10559
+ '''
10560
+ Reserved for future use.
10561
+ '''
10562
+ self.rate_limit = rate_limit if rate_limit is not None else None
10563
+ '''
10564
+ Rate limit information.
10565
+ '''
10566
+
10567
+ def __repr__(self):
10568
+ return '<sdm.IdentityAliasCreateResponse ' + \
10569
+ 'identity_alias: ' + repr(self.identity_alias) + ' ' +\
10570
+ 'meta: ' + repr(self.meta) + ' ' +\
10571
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10572
+ '>'
10573
+
10574
+ def to_dict(self):
10575
+ return {
10576
+ 'identity_alias': self.identity_alias,
10577
+ 'meta': self.meta,
10578
+ 'rate_limit': self.rate_limit,
10579
+ }
10580
+
10581
+ @classmethod
10582
+ def from_dict(cls, d):
10583
+ return cls(
10584
+ identity_alias=d.get('identity_alias'),
10585
+ meta=d.get('meta'),
10586
+ rate_limit=d.get('rate_limit'),
10587
+ )
10588
+
10589
+
10590
+ class IdentityAliasDeleteResponse:
10591
+ '''
10592
+ IdentityAliasDeleteResponse returns information about a IdentityAlias that was deleted.
10593
+ '''
10594
+ __slots__ = [
10595
+ 'meta',
10596
+ 'rate_limit',
10597
+ ]
10598
+
10599
+ def __init__(
10600
+ self,
10601
+ meta=None,
10602
+ rate_limit=None,
10603
+ ):
10604
+ self.meta = meta if meta is not None else None
10605
+ '''
10606
+ Reserved for future use.
10607
+ '''
10608
+ self.rate_limit = rate_limit if rate_limit is not None else None
10609
+ '''
10610
+ Rate limit information.
10611
+ '''
10612
+
10613
+ def __repr__(self):
10614
+ return '<sdm.IdentityAliasDeleteResponse ' + \
10615
+ 'meta: ' + repr(self.meta) + ' ' +\
10616
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10617
+ '>'
10618
+
10619
+ def to_dict(self):
10620
+ return {
10621
+ 'meta': self.meta,
10622
+ 'rate_limit': self.rate_limit,
10623
+ }
10624
+
10625
+ @classmethod
10626
+ def from_dict(cls, d):
10627
+ return cls(
10628
+ meta=d.get('meta'),
10629
+ rate_limit=d.get('rate_limit'),
10630
+ )
10631
+
10632
+
10633
+ class IdentityAliasGetResponse:
10634
+ '''
10635
+ IdentityAliasGetResponse returns a requested IdentityAlias.
10636
+ '''
10637
+ __slots__ = [
10638
+ 'identity_alias',
10639
+ 'meta',
10640
+ 'rate_limit',
10641
+ ]
10642
+
10643
+ def __init__(
10644
+ self,
10645
+ identity_alias=None,
10646
+ meta=None,
10647
+ rate_limit=None,
10648
+ ):
10649
+ self.identity_alias = identity_alias if identity_alias is not None else None
10650
+ '''
10651
+ The requested IdentityAlias.
10652
+ '''
10653
+ self.meta = meta if meta is not None else None
10654
+ '''
10655
+ Reserved for future use.
10656
+ '''
10657
+ self.rate_limit = rate_limit if rate_limit is not None else None
10658
+ '''
10659
+ Rate limit information.
10660
+ '''
10661
+
10662
+ def __repr__(self):
10663
+ return '<sdm.IdentityAliasGetResponse ' + \
10664
+ 'identity_alias: ' + repr(self.identity_alias) + ' ' +\
10665
+ 'meta: ' + repr(self.meta) + ' ' +\
10666
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10667
+ '>'
10668
+
10669
+ def to_dict(self):
10670
+ return {
10671
+ 'identity_alias': self.identity_alias,
10672
+ 'meta': self.meta,
10673
+ 'rate_limit': self.rate_limit,
10674
+ }
10675
+
10676
+ @classmethod
10677
+ def from_dict(cls, d):
10678
+ return cls(
10679
+ identity_alias=d.get('identity_alias'),
10680
+ meta=d.get('meta'),
10681
+ rate_limit=d.get('rate_limit'),
10682
+ )
10683
+
10684
+
10685
+ class IdentityAliasHistory:
10686
+ '''
10687
+ IdentityAliasHistory records the state of a IdentityAlias at a given point in time,
10688
+ where every change (create, update and delete) to a IdentityAlias produces an
10689
+ IdentityAliasHistory record.
10690
+ '''
10691
+ __slots__ = [
10692
+ 'activity_id',
10693
+ 'deleted_at',
10694
+ 'identity_alias',
10695
+ 'timestamp',
10696
+ ]
10697
+
10698
+ def __init__(
10699
+ self,
10700
+ activity_id=None,
10701
+ deleted_at=None,
10702
+ identity_alias=None,
10703
+ timestamp=None,
10704
+ ):
10705
+ self.activity_id = activity_id if activity_id is not None else ''
10706
+ '''
10707
+ The unique identifier of the Activity that produced this change to the IdentityAlias.
10708
+ May be empty for some system-initiated updates.
10709
+ '''
10710
+ self.deleted_at = deleted_at if deleted_at is not None else None
10711
+ '''
10712
+ If this IdentityAlias was deleted, the time it was deleted.
10713
+ '''
10714
+ self.identity_alias = identity_alias if identity_alias is not None else None
10715
+ '''
10716
+ The complete IdentityAlias state at this time.
10717
+ '''
10718
+ self.timestamp = timestamp if timestamp is not None else None
10719
+ '''
10720
+ The time at which the IdentityAlias state was recorded.
10721
+ '''
10722
+
10723
+ def __repr__(self):
10724
+ return '<sdm.IdentityAliasHistory ' + \
10725
+ 'activity_id: ' + repr(self.activity_id) + ' ' +\
10726
+ 'deleted_at: ' + repr(self.deleted_at) + ' ' +\
10727
+ 'identity_alias: ' + repr(self.identity_alias) + ' ' +\
10728
+ 'timestamp: ' + repr(self.timestamp) + ' ' +\
10729
+ '>'
10730
+
10731
+ def to_dict(self):
10732
+ return {
10733
+ 'activity_id': self.activity_id,
10734
+ 'deleted_at': self.deleted_at,
10735
+ 'identity_alias': self.identity_alias,
10736
+ 'timestamp': self.timestamp,
10737
+ }
10738
+
10739
+ @classmethod
10740
+ def from_dict(cls, d):
10741
+ return cls(
10742
+ activity_id=d.get('activity_id'),
10743
+ deleted_at=d.get('deleted_at'),
10744
+ identity_alias=d.get('identity_alias'),
10745
+ timestamp=d.get('timestamp'),
10746
+ )
10747
+
10748
+
10749
+ class IdentityAliasUpdateResponse:
10750
+ '''
10751
+ IdentityAliasUpdateResponse returns the fields of a IdentityAlias after it has been updated by
10752
+ a IdentityAliasUpdateRequest.
10753
+ '''
10754
+ __slots__ = [
10755
+ 'identity_alias',
10756
+ 'meta',
10757
+ 'rate_limit',
10758
+ ]
10759
+
10760
+ def __init__(
10761
+ self,
10762
+ identity_alias=None,
10763
+ meta=None,
10764
+ rate_limit=None,
10765
+ ):
10766
+ self.identity_alias = identity_alias if identity_alias is not None else None
10767
+ '''
10768
+ The updated IdentityAlias.
10769
+ '''
10770
+ self.meta = meta if meta is not None else None
10771
+ '''
10772
+ Reserved for future use.
10773
+ '''
10774
+ self.rate_limit = rate_limit if rate_limit is not None else None
10775
+ '''
10776
+ Rate limit information.
10777
+ '''
10778
+
10779
+ def __repr__(self):
10780
+ return '<sdm.IdentityAliasUpdateResponse ' + \
10781
+ 'identity_alias: ' + repr(self.identity_alias) + ' ' +\
10782
+ 'meta: ' + repr(self.meta) + ' ' +\
10783
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10784
+ '>'
10785
+
10786
+ def to_dict(self):
10787
+ return {
10788
+ 'identity_alias': self.identity_alias,
10789
+ 'meta': self.meta,
10790
+ 'rate_limit': self.rate_limit,
10791
+ }
10792
+
10793
+ @classmethod
10794
+ def from_dict(cls, d):
10795
+ return cls(
10796
+ identity_alias=d.get('identity_alias'),
10797
+ meta=d.get('meta'),
10798
+ rate_limit=d.get('rate_limit'),
10799
+ )
10800
+
10801
+
10802
+ class IdentitySet:
10803
+ '''
10804
+ A IdentitySet defines a group of identity aliases.
10805
+ '''
10806
+ __slots__ = [
10807
+ 'id',
10808
+ 'name',
10809
+ ]
10810
+
10811
+ def __init__(
10812
+ self,
10813
+ id=None,
10814
+ name=None,
10815
+ ):
10816
+ self.id = id if id is not None else ''
10817
+ '''
10818
+ Unique identifier of the IdentitySet.
10819
+ '''
10820
+ self.name = name if name is not None else ''
10821
+ '''
10822
+ Unique human-readable name of the IdentitySet.
10823
+ '''
10824
+
10825
+ def __repr__(self):
10826
+ return '<sdm.IdentitySet ' + \
10827
+ 'id: ' + repr(self.id) + ' ' +\
10828
+ 'name: ' + repr(self.name) + ' ' +\
10829
+ '>'
10830
+
10831
+ def to_dict(self):
10832
+ return {
10833
+ 'id': self.id,
10834
+ 'name': self.name,
10835
+ }
10836
+
10837
+ @classmethod
10838
+ def from_dict(cls, d):
10839
+ return cls(
10840
+ id=d.get('id'),
10841
+ name=d.get('name'),
10842
+ )
10843
+
10844
+
10845
+ class IdentitySetGetResponse:
10846
+ '''
10847
+ IdentitySetGetResponse returns a requested IdentitySet.
10848
+ '''
10849
+ __slots__ = [
10850
+ 'identity_set',
10851
+ 'meta',
10852
+ 'rate_limit',
10853
+ ]
10854
+
10855
+ def __init__(
10856
+ self,
10857
+ identity_set=None,
10858
+ meta=None,
10859
+ rate_limit=None,
10860
+ ):
10861
+ self.identity_set = identity_set if identity_set is not None else None
10862
+ '''
10863
+ The requested IdentitySet.
10864
+ '''
10865
+ self.meta = meta if meta is not None else None
10866
+ '''
10867
+ Reserved for future use.
10868
+ '''
10869
+ self.rate_limit = rate_limit if rate_limit is not None else None
10870
+ '''
10871
+ Rate limit information.
10872
+ '''
10873
+
10874
+ def __repr__(self):
10875
+ return '<sdm.IdentitySetGetResponse ' + \
10876
+ 'identity_set: ' + repr(self.identity_set) + ' ' +\
10877
+ 'meta: ' + repr(self.meta) + ' ' +\
10878
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10879
+ '>'
10880
+
10881
+ def to_dict(self):
10882
+ return {
10883
+ 'identity_set': self.identity_set,
10884
+ 'meta': self.meta,
10885
+ 'rate_limit': self.rate_limit,
10886
+ }
10887
+
10888
+ @classmethod
10889
+ def from_dict(cls, d):
10890
+ return cls(
10891
+ identity_set=d.get('identity_set'),
10892
+ meta=d.get('meta'),
10893
+ rate_limit=d.get('rate_limit'),
10894
+ )
10895
+
10896
+
10897
+ class IdentitySetHistory:
10898
+ '''
10899
+ IdentitySetHistory records the state of a IdentitySet at a given point in time,
10900
+ where every change (create, update and delete) to a IdentitySet produces an
10901
+ IdentitySetHistory record.
10902
+ '''
10903
+ __slots__ = [
10904
+ 'activity_id',
10905
+ 'deleted_at',
10906
+ 'identity_set',
10907
+ 'timestamp',
10908
+ ]
10909
+
10910
+ def __init__(
10911
+ self,
10912
+ activity_id=None,
10913
+ deleted_at=None,
10914
+ identity_set=None,
10915
+ timestamp=None,
10916
+ ):
10917
+ self.activity_id = activity_id if activity_id is not None else ''
10918
+ '''
10919
+ The unique identifier of the Activity that produced this change to the IdentitySet.
10920
+ May be empty for some system-initiated updates.
10429
10921
  '''
10430
- self.subdomain = subdomain if subdomain is not None else ''
10922
+ self.deleted_at = deleted_at if deleted_at is not None else None
10431
10923
  '''
10432
- Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
10924
+ If this IdentitySet was deleted, the time it was deleted.
10433
10925
  '''
10434
- self.tags = tags if tags is not None else _porcelain_zero_value_tags()
10926
+ self.identity_set = identity_set if identity_set is not None else None
10435
10927
  '''
10436
- Tags is a map of key, value pairs.
10928
+ The complete IdentitySet state at this time.
10437
10929
  '''
10438
- self.url = url if url is not None else ''
10930
+ self.timestamp = timestamp if timestamp is not None else None
10439
10931
  '''
10440
- The base address of your website without the path.
10932
+ The time at which the IdentitySet state was recorded.
10441
10933
  '''
10442
10934
 
10443
10935
  def __repr__(self):
10444
- return '<sdm.HTTPNoAuth ' + \
10445
- 'bind_interface: ' + repr(self.bind_interface) + ' ' +\
10446
- 'default_path: ' + repr(self.default_path) + ' ' +\
10447
- 'egress_filter: ' + repr(self.egress_filter) + ' ' +\
10448
- 'headers_blacklist: ' + repr(self.headers_blacklist) + ' ' +\
10449
- 'healthcheck_path: ' + repr(self.healthcheck_path) + ' ' +\
10450
- 'healthy: ' + repr(self.healthy) + ' ' +\
10451
- 'host_override: ' + repr(self.host_override) + ' ' +\
10452
- 'id: ' + repr(self.id) + ' ' +\
10453
- 'name: ' + repr(self.name) + ' ' +\
10454
- 'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
10455
- 'subdomain: ' + repr(self.subdomain) + ' ' +\
10456
- 'tags: ' + repr(self.tags) + ' ' +\
10457
- 'url: ' + repr(self.url) + ' ' +\
10936
+ return '<sdm.IdentitySetHistory ' + \
10937
+ 'activity_id: ' + repr(self.activity_id) + ' ' +\
10938
+ 'deleted_at: ' + repr(self.deleted_at) + ' ' +\
10939
+ 'identity_set: ' + repr(self.identity_set) + ' ' +\
10940
+ 'timestamp: ' + repr(self.timestamp) + ' ' +\
10458
10941
  '>'
10459
10942
 
10460
10943
  def to_dict(self):
10461
10944
  return {
10462
- 'bind_interface': self.bind_interface,
10463
- 'default_path': self.default_path,
10464
- 'egress_filter': self.egress_filter,
10465
- 'headers_blacklist': self.headers_blacklist,
10466
- 'healthcheck_path': self.healthcheck_path,
10467
- 'healthy': self.healthy,
10468
- 'host_override': self.host_override,
10469
- 'id': self.id,
10470
- 'name': self.name,
10471
- 'secret_store_id': self.secret_store_id,
10472
- 'subdomain': self.subdomain,
10473
- 'tags': self.tags,
10474
- 'url': self.url,
10945
+ 'activity_id': self.activity_id,
10946
+ 'deleted_at': self.deleted_at,
10947
+ 'identity_set': self.identity_set,
10948
+ 'timestamp': self.timestamp,
10475
10949
  }
10476
10950
 
10477
10951
  @classmethod
10478
10952
  def from_dict(cls, d):
10479
10953
  return cls(
10480
- bind_interface=d.get('bind_interface'),
10481
- default_path=d.get('default_path'),
10482
- egress_filter=d.get('egress_filter'),
10483
- headers_blacklist=d.get('headers_blacklist'),
10484
- healthcheck_path=d.get('healthcheck_path'),
10485
- healthy=d.get('healthy'),
10486
- host_override=d.get('host_override'),
10487
- id=d.get('id'),
10488
- name=d.get('name'),
10489
- secret_store_id=d.get('secret_store_id'),
10490
- subdomain=d.get('subdomain'),
10491
- tags=d.get('tags'),
10492
- url=d.get('url'),
10954
+ activity_id=d.get('activity_id'),
10955
+ deleted_at=d.get('deleted_at'),
10956
+ identity_set=d.get('identity_set'),
10957
+ timestamp=d.get('timestamp'),
10493
10958
  )
10494
10959
 
10495
10960
 
@@ -10788,11 +11253,11 @@ class Kubernetes:
10788
11253
  'healthy',
10789
11254
  'hostname',
10790
11255
  'id',
11256
+ 'identity_alias_healthcheck_username',
11257
+ 'identity_set_id',
10791
11258
  'name',
10792
11259
  'port',
10793
11260
  'port_override',
10794
- 'remote_identity_group_id',
10795
- 'remote_identity_healthcheck_username',
10796
11261
  'secret_store_id',
10797
11262
  'subdomain',
10798
11263
  'tags',
@@ -10809,11 +11274,11 @@ class Kubernetes:
10809
11274
  healthy=None,
10810
11275
  hostname=None,
10811
11276
  id=None,
11277
+ identity_alias_healthcheck_username=None,
11278
+ identity_set_id=None,
10812
11279
  name=None,
10813
11280
  port=None,
10814
11281
  port_override=None,
10815
- remote_identity_group_id=None,
10816
- remote_identity_healthcheck_username=None,
10817
11282
  secret_store_id=None,
10818
11283
  subdomain=None,
10819
11284
  tags=None,
@@ -10854,6 +11319,14 @@ class Kubernetes:
10854
11319
  '''
10855
11320
  Unique identifier of the Resource.
10856
11321
  '''
11322
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
11323
+ '''
11324
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
11325
+ '''
11326
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
11327
+ '''
11328
+ The ID of the identity set to use for identity connections.
11329
+ '''
10857
11330
  self.name = name if name is not None else ''
10858
11331
  '''
10859
11332
  Unique human-readable name of the Resource.
@@ -10866,14 +11339,6 @@ class Kubernetes:
10866
11339
  '''
10867
11340
  The local port used by clients to connect to this resource.
10868
11341
  '''
10869
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
10870
- '''
10871
- The ID of the remote identity group to use for remote identity connections.
10872
- '''
10873
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
10874
- '''
10875
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
10876
- '''
10877
11342
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
10878
11343
  '''
10879
11344
  ID of the secret store containing credentials for this resource, if any.
@@ -10898,11 +11363,11 @@ class Kubernetes:
10898
11363
  'healthy: ' + repr(self.healthy) + ' ' +\
10899
11364
  'hostname: ' + repr(self.hostname) + ' ' +\
10900
11365
  'id: ' + repr(self.id) + ' ' +\
11366
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
11367
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
10901
11368
  'name: ' + repr(self.name) + ' ' +\
10902
11369
  'port: ' + repr(self.port) + ' ' +\
10903
11370
  'port_override: ' + repr(self.port_override) + ' ' +\
10904
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
10905
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
10906
11371
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
10907
11372
  'subdomain: ' + repr(self.subdomain) + ' ' +\
10908
11373
  'tags: ' + repr(self.tags) + ' ' +\
@@ -10919,12 +11384,12 @@ class Kubernetes:
10919
11384
  'healthy': self.healthy,
10920
11385
  'hostname': self.hostname,
10921
11386
  'id': self.id,
11387
+ 'identity_alias_healthcheck_username':
11388
+ self.identity_alias_healthcheck_username,
11389
+ 'identity_set_id': self.identity_set_id,
10922
11390
  'name': self.name,
10923
11391
  'port': self.port,
10924
11392
  'port_override': self.port_override,
10925
- 'remote_identity_group_id': self.remote_identity_group_id,
10926
- 'remote_identity_healthcheck_username':
10927
- self.remote_identity_healthcheck_username,
10928
11393
  'secret_store_id': self.secret_store_id,
10929
11394
  'subdomain': self.subdomain,
10930
11395
  'tags': self.tags,
@@ -10942,12 +11407,12 @@ class Kubernetes:
10942
11407
  healthy=d.get('healthy'),
10943
11408
  hostname=d.get('hostname'),
10944
11409
  id=d.get('id'),
11410
+ identity_alias_healthcheck_username=d.get(
11411
+ 'identity_alias_healthcheck_username'),
11412
+ identity_set_id=d.get('identity_set_id'),
10945
11413
  name=d.get('name'),
10946
11414
  port=d.get('port'),
10947
11415
  port_override=d.get('port_override'),
10948
- remote_identity_group_id=d.get('remote_identity_group_id'),
10949
- remote_identity_healthcheck_username=d.get(
10950
- 'remote_identity_healthcheck_username'),
10951
11416
  secret_store_id=d.get('secret_store_id'),
10952
11417
  subdomain=d.get('subdomain'),
10953
11418
  tags=d.get('tags'),
@@ -11110,11 +11575,11 @@ class KubernetesServiceAccount:
11110
11575
  'healthy',
11111
11576
  'hostname',
11112
11577
  'id',
11578
+ 'identity_alias_healthcheck_username',
11579
+ 'identity_set_id',
11113
11580
  'name',
11114
11581
  'port',
11115
11582
  'port_override',
11116
- 'remote_identity_group_id',
11117
- 'remote_identity_healthcheck_username',
11118
11583
  'secret_store_id',
11119
11584
  'subdomain',
11120
11585
  'tags',
@@ -11129,11 +11594,11 @@ class KubernetesServiceAccount:
11129
11594
  healthy=None,
11130
11595
  hostname=None,
11131
11596
  id=None,
11597
+ identity_alias_healthcheck_username=None,
11598
+ identity_set_id=None,
11132
11599
  name=None,
11133
11600
  port=None,
11134
11601
  port_override=None,
11135
- remote_identity_group_id=None,
11136
- remote_identity_healthcheck_username=None,
11137
11602
  secret_store_id=None,
11138
11603
  subdomain=None,
11139
11604
  tags=None,
@@ -11163,6 +11628,14 @@ class KubernetesServiceAccount:
11163
11628
  '''
11164
11629
  Unique identifier of the Resource.
11165
11630
  '''
11631
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
11632
+ '''
11633
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
11634
+ '''
11635
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
11636
+ '''
11637
+ The ID of the identity set to use for identity connections.
11638
+ '''
11166
11639
  self.name = name if name is not None else ''
11167
11640
  '''
11168
11641
  Unique human-readable name of the Resource.
@@ -11175,14 +11648,6 @@ class KubernetesServiceAccount:
11175
11648
  '''
11176
11649
  The local port used by clients to connect to this resource.
11177
11650
  '''
11178
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
11179
- '''
11180
- The ID of the remote identity group to use for remote identity connections.
11181
- '''
11182
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
11183
- '''
11184
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
11185
- '''
11186
11651
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
11187
11652
  '''
11188
11653
  ID of the secret store containing credentials for this resource, if any.
@@ -11208,11 +11673,11 @@ class KubernetesServiceAccount:
11208
11673
  'healthy: ' + repr(self.healthy) + ' ' +\
11209
11674
  'hostname: ' + repr(self.hostname) + ' ' +\
11210
11675
  'id: ' + repr(self.id) + ' ' +\
11676
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
11677
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
11211
11678
  'name: ' + repr(self.name) + ' ' +\
11212
11679
  'port: ' + repr(self.port) + ' ' +\
11213
11680
  'port_override: ' + repr(self.port_override) + ' ' +\
11214
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
11215
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
11216
11681
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
11217
11682
  'subdomain: ' + repr(self.subdomain) + ' ' +\
11218
11683
  'tags: ' + repr(self.tags) + ' ' +\
@@ -11227,12 +11692,12 @@ class KubernetesServiceAccount:
11227
11692
  'healthy': self.healthy,
11228
11693
  'hostname': self.hostname,
11229
11694
  'id': self.id,
11695
+ 'identity_alias_healthcheck_username':
11696
+ self.identity_alias_healthcheck_username,
11697
+ 'identity_set_id': self.identity_set_id,
11230
11698
  'name': self.name,
11231
11699
  'port': self.port,
11232
11700
  'port_override': self.port_override,
11233
- 'remote_identity_group_id': self.remote_identity_group_id,
11234
- 'remote_identity_healthcheck_username':
11235
- self.remote_identity_healthcheck_username,
11236
11701
  'secret_store_id': self.secret_store_id,
11237
11702
  'subdomain': self.subdomain,
11238
11703
  'tags': self.tags,
@@ -11248,12 +11713,12 @@ class KubernetesServiceAccount:
11248
11713
  healthy=d.get('healthy'),
11249
11714
  hostname=d.get('hostname'),
11250
11715
  id=d.get('id'),
11716
+ identity_alias_healthcheck_username=d.get(
11717
+ 'identity_alias_healthcheck_username'),
11718
+ identity_set_id=d.get('identity_set_id'),
11251
11719
  name=d.get('name'),
11252
11720
  port=d.get('port'),
11253
11721
  port_override=d.get('port_override'),
11254
- remote_identity_group_id=d.get('remote_identity_group_id'),
11255
- remote_identity_healthcheck_username=d.get(
11256
- 'remote_identity_healthcheck_username'),
11257
11722
  secret_store_id=d.get('secret_store_id'),
11258
11723
  subdomain=d.get('subdomain'),
11259
11724
  tags=d.get('tags'),
@@ -16155,11 +16620,11 @@ class RDPCert:
16155
16620
  'healthy',
16156
16621
  'hostname',
16157
16622
  'id',
16623
+ 'identity_alias_healthcheck_username',
16624
+ 'identity_set_id',
16158
16625
  'name',
16159
16626
  'port',
16160
16627
  'port_override',
16161
- 'remote_identity_group_id',
16162
- 'remote_identity_healthcheck_username',
16163
16628
  'secret_store_id',
16164
16629
  'subdomain',
16165
16630
  'tags',
@@ -16173,11 +16638,11 @@ class RDPCert:
16173
16638
  healthy=None,
16174
16639
  hostname=None,
16175
16640
  id=None,
16641
+ identity_alias_healthcheck_username=None,
16642
+ identity_set_id=None,
16176
16643
  name=None,
16177
16644
  port=None,
16178
16645
  port_override=None,
16179
- remote_identity_group_id=None,
16180
- remote_identity_healthcheck_username=None,
16181
16646
  secret_store_id=None,
16182
16647
  subdomain=None,
16183
16648
  tags=None,
@@ -16203,6 +16668,14 @@ class RDPCert:
16203
16668
  '''
16204
16669
  Unique identifier of the Resource.
16205
16670
  '''
16671
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
16672
+ '''
16673
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
16674
+ '''
16675
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
16676
+ '''
16677
+ The ID of the identity set to use for identity connections.
16678
+ '''
16206
16679
  self.name = name if name is not None else ''
16207
16680
  '''
16208
16681
  Unique human-readable name of the Resource.
@@ -16215,14 +16688,6 @@ class RDPCert:
16215
16688
  '''
16216
16689
  The local port used by clients to connect to this resource.
16217
16690
  '''
16218
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
16219
- '''
16220
- The ID of the remote identity group to use for remote identity connections.
16221
- '''
16222
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
16223
- '''
16224
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
16225
- '''
16226
16691
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
16227
16692
  '''
16228
16693
  ID of the secret store containing credentials for this resource, if any.
@@ -16247,11 +16712,11 @@ class RDPCert:
16247
16712
  'healthy: ' + repr(self.healthy) + ' ' +\
16248
16713
  'hostname: ' + repr(self.hostname) + ' ' +\
16249
16714
  'id: ' + repr(self.id) + ' ' +\
16715
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
16716
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
16250
16717
  'name: ' + repr(self.name) + ' ' +\
16251
16718
  'port: ' + repr(self.port) + ' ' +\
16252
16719
  'port_override: ' + repr(self.port_override) + ' ' +\
16253
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
16254
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
16255
16720
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
16256
16721
  'subdomain: ' + repr(self.subdomain) + ' ' +\
16257
16722
  'tags: ' + repr(self.tags) + ' ' +\
@@ -16265,12 +16730,12 @@ class RDPCert:
16265
16730
  'healthy': self.healthy,
16266
16731
  'hostname': self.hostname,
16267
16732
  'id': self.id,
16733
+ 'identity_alias_healthcheck_username':
16734
+ self.identity_alias_healthcheck_username,
16735
+ 'identity_set_id': self.identity_set_id,
16268
16736
  'name': self.name,
16269
16737
  'port': self.port,
16270
16738
  'port_override': self.port_override,
16271
- 'remote_identity_group_id': self.remote_identity_group_id,
16272
- 'remote_identity_healthcheck_username':
16273
- self.remote_identity_healthcheck_username,
16274
16739
  'secret_store_id': self.secret_store_id,
16275
16740
  'subdomain': self.subdomain,
16276
16741
  'tags': self.tags,
@@ -16285,12 +16750,12 @@ class RDPCert:
16285
16750
  healthy=d.get('healthy'),
16286
16751
  hostname=d.get('hostname'),
16287
16752
  id=d.get('id'),
16753
+ identity_alias_healthcheck_username=d.get(
16754
+ 'identity_alias_healthcheck_username'),
16755
+ identity_set_id=d.get('identity_set_id'),
16288
16756
  name=d.get('name'),
16289
16757
  port=d.get('port'),
16290
16758
  port_override=d.get('port_override'),
16291
- remote_identity_group_id=d.get('remote_identity_group_id'),
16292
- remote_identity_healthcheck_username=d.get(
16293
- 'remote_identity_healthcheck_username'),
16294
16759
  secret_store_id=d.get('secret_store_id'),
16295
16760
  subdomain=d.get('subdomain'),
16296
16761
  tags=d.get('tags'),
@@ -19421,13 +19886,13 @@ class SSHCert:
19421
19886
  'healthy',
19422
19887
  'hostname',
19423
19888
  'id',
19889
+ 'identity_alias_healthcheck_username',
19890
+ 'identity_set_id',
19424
19891
  'key_type',
19425
19892
  'name',
19426
19893
  'port',
19427
19894
  'port_forwarding',
19428
19895
  'port_override',
19429
- 'remote_identity_group_id',
19430
- 'remote_identity_healthcheck_username',
19431
19896
  'secret_store_id',
19432
19897
  'subdomain',
19433
19898
  'tags',
@@ -19442,13 +19907,13 @@ class SSHCert:
19442
19907
  healthy=None,
19443
19908
  hostname=None,
19444
19909
  id=None,
19910
+ identity_alias_healthcheck_username=None,
19911
+ identity_set_id=None,
19445
19912
  key_type=None,
19446
19913
  name=None,
19447
19914
  port=None,
19448
19915
  port_forwarding=None,
19449
19916
  port_override=None,
19450
- remote_identity_group_id=None,
19451
- remote_identity_healthcheck_username=None,
19452
19917
  secret_store_id=None,
19453
19918
  subdomain=None,
19454
19919
  tags=None,
@@ -19478,6 +19943,14 @@ class SSHCert:
19478
19943
  '''
19479
19944
  Unique identifier of the Resource.
19480
19945
  '''
19946
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
19947
+ '''
19948
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
19949
+ '''
19950
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
19951
+ '''
19952
+ The ID of the identity set to use for identity connections.
19953
+ '''
19481
19954
  self.key_type = key_type if key_type is not None else ''
19482
19955
  '''
19483
19956
  The key type to use e.g. rsa-2048 or ed25519
@@ -19498,14 +19971,6 @@ class SSHCert:
19498
19971
  '''
19499
19972
  The local port used by clients to connect to this resource.
19500
19973
  '''
19501
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
19502
- '''
19503
- The ID of the remote identity group to use for remote identity connections.
19504
- '''
19505
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
19506
- '''
19507
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
19508
- '''
19509
19974
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
19510
19975
  '''
19511
19976
  ID of the secret store containing credentials for this resource, if any.
@@ -19531,13 +19996,13 @@ class SSHCert:
19531
19996
  'healthy: ' + repr(self.healthy) + ' ' +\
19532
19997
  'hostname: ' + repr(self.hostname) + ' ' +\
19533
19998
  'id: ' + repr(self.id) + ' ' +\
19999
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
20000
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
19534
20001
  'key_type: ' + repr(self.key_type) + ' ' +\
19535
20002
  'name: ' + repr(self.name) + ' ' +\
19536
20003
  'port: ' + repr(self.port) + ' ' +\
19537
20004
  'port_forwarding: ' + repr(self.port_forwarding) + ' ' +\
19538
20005
  'port_override: ' + repr(self.port_override) + ' ' +\
19539
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
19540
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
19541
20006
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
19542
20007
  'subdomain: ' + repr(self.subdomain) + ' ' +\
19543
20008
  'tags: ' + repr(self.tags) + ' ' +\
@@ -19553,14 +20018,14 @@ class SSHCert:
19553
20018
  'healthy': self.healthy,
19554
20019
  'hostname': self.hostname,
19555
20020
  'id': self.id,
20021
+ 'identity_alias_healthcheck_username':
20022
+ self.identity_alias_healthcheck_username,
20023
+ 'identity_set_id': self.identity_set_id,
19556
20024
  'key_type': self.key_type,
19557
20025
  'name': self.name,
19558
20026
  'port': self.port,
19559
20027
  'port_forwarding': self.port_forwarding,
19560
20028
  'port_override': self.port_override,
19561
- 'remote_identity_group_id': self.remote_identity_group_id,
19562
- 'remote_identity_healthcheck_username':
19563
- self.remote_identity_healthcheck_username,
19564
20029
  'secret_store_id': self.secret_store_id,
19565
20030
  'subdomain': self.subdomain,
19566
20031
  'tags': self.tags,
@@ -19577,14 +20042,14 @@ class SSHCert:
19577
20042
  healthy=d.get('healthy'),
19578
20043
  hostname=d.get('hostname'),
19579
20044
  id=d.get('id'),
20045
+ identity_alias_healthcheck_username=d.get(
20046
+ 'identity_alias_healthcheck_username'),
20047
+ identity_set_id=d.get('identity_set_id'),
19580
20048
  key_type=d.get('key_type'),
19581
20049
  name=d.get('name'),
19582
20050
  port=d.get('port'),
19583
20051
  port_forwarding=d.get('port_forwarding'),
19584
20052
  port_override=d.get('port_override'),
19585
- remote_identity_group_id=d.get('remote_identity_group_id'),
19586
- remote_identity_healthcheck_username=d.get(
19587
- 'remote_identity_healthcheck_username'),
19588
20053
  secret_store_id=d.get('secret_store_id'),
19589
20054
  subdomain=d.get('subdomain'),
19590
20055
  tags=d.get('tags'),
@@ -21515,6 +21980,148 @@ class User:
21515
21980
  )
21516
21981
 
21517
21982
 
21983
+ class VaultAWSEC2Store:
21984
+ '''
21985
+ VaultAWSEC2Store is currently unstable, and its API may change, or it may be removed,
21986
+ without a major version bump.
21987
+ '''
21988
+ __slots__ = [
21989
+ 'id',
21990
+ 'name',
21991
+ 'namespace',
21992
+ 'server_address',
21993
+ 'tags',
21994
+ ]
21995
+
21996
+ def __init__(
21997
+ self,
21998
+ id=None,
21999
+ name=None,
22000
+ namespace=None,
22001
+ server_address=None,
22002
+ tags=None,
22003
+ ):
22004
+ self.id = id if id is not None else ''
22005
+ '''
22006
+ Unique identifier of the SecretStore.
22007
+ '''
22008
+ self.name = name if name is not None else ''
22009
+ '''
22010
+ Unique human-readable name of the SecretStore.
22011
+ '''
22012
+ self.namespace = namespace if namespace is not None else ''
22013
+ '''
22014
+ The namespace to make requests within
22015
+ '''
22016
+ self.server_address = server_address if server_address is not None else ''
22017
+ '''
22018
+ The URL of the Vault to target
22019
+ '''
22020
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
22021
+ '''
22022
+ Tags is a map of key, value pairs.
22023
+ '''
22024
+
22025
+ def __repr__(self):
22026
+ return '<sdm.VaultAWSEC2Store ' + \
22027
+ 'id: ' + repr(self.id) + ' ' +\
22028
+ 'name: ' + repr(self.name) + ' ' +\
22029
+ 'namespace: ' + repr(self.namespace) + ' ' +\
22030
+ 'server_address: ' + repr(self.server_address) + ' ' +\
22031
+ 'tags: ' + repr(self.tags) + ' ' +\
22032
+ '>'
22033
+
22034
+ def to_dict(self):
22035
+ return {
22036
+ 'id': self.id,
22037
+ 'name': self.name,
22038
+ 'namespace': self.namespace,
22039
+ 'server_address': self.server_address,
22040
+ 'tags': self.tags,
22041
+ }
22042
+
22043
+ @classmethod
22044
+ def from_dict(cls, d):
22045
+ return cls(
22046
+ id=d.get('id'),
22047
+ name=d.get('name'),
22048
+ namespace=d.get('namespace'),
22049
+ server_address=d.get('server_address'),
22050
+ tags=d.get('tags'),
22051
+ )
22052
+
22053
+
22054
+ class VaultAWSIAMStore:
22055
+ '''
22056
+ VaultAWSIAMStore is currently unstable, and its API may change, or it may be removed,
22057
+ without a major version bump.
22058
+ '''
22059
+ __slots__ = [
22060
+ 'id',
22061
+ 'name',
22062
+ 'namespace',
22063
+ 'server_address',
22064
+ 'tags',
22065
+ ]
22066
+
22067
+ def __init__(
22068
+ self,
22069
+ id=None,
22070
+ name=None,
22071
+ namespace=None,
22072
+ server_address=None,
22073
+ tags=None,
22074
+ ):
22075
+ self.id = id if id is not None else ''
22076
+ '''
22077
+ Unique identifier of the SecretStore.
22078
+ '''
22079
+ self.name = name if name is not None else ''
22080
+ '''
22081
+ Unique human-readable name of the SecretStore.
22082
+ '''
22083
+ self.namespace = namespace if namespace is not None else ''
22084
+ '''
22085
+ The namespace to make requests within
22086
+ '''
22087
+ self.server_address = server_address if server_address is not None else ''
22088
+ '''
22089
+ The URL of the Vault to target
22090
+ '''
22091
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
22092
+ '''
22093
+ Tags is a map of key, value pairs.
22094
+ '''
22095
+
22096
+ def __repr__(self):
22097
+ return '<sdm.VaultAWSIAMStore ' + \
22098
+ 'id: ' + repr(self.id) + ' ' +\
22099
+ 'name: ' + repr(self.name) + ' ' +\
22100
+ 'namespace: ' + repr(self.namespace) + ' ' +\
22101
+ 'server_address: ' + repr(self.server_address) + ' ' +\
22102
+ 'tags: ' + repr(self.tags) + ' ' +\
22103
+ '>'
22104
+
22105
+ def to_dict(self):
22106
+ return {
22107
+ 'id': self.id,
22108
+ 'name': self.name,
22109
+ 'namespace': self.namespace,
22110
+ 'server_address': self.server_address,
22111
+ 'tags': self.tags,
22112
+ }
22113
+
22114
+ @classmethod
22115
+ def from_dict(cls, d):
22116
+ return cls(
22117
+ id=d.get('id'),
22118
+ name=d.get('name'),
22119
+ namespace=d.get('namespace'),
22120
+ server_address=d.get('server_address'),
22121
+ tags=d.get('tags'),
22122
+ )
22123
+
22124
+
21518
22125
  class VaultAppRoleCertSSHStore:
21519
22126
  __slots__ = [
21520
22127
  'id',