strongdm 8.4.0__zip → 9.0.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-8.4.0 → strongdm-9.0.0}/PKG-INFO +2 -2
- {strongdm-8.4.0 → strongdm-9.0.0}/setup.py +2 -2
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/client.py +45 -1
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/drivers_pb2.py +212 -216
- strongdm-9.0.0/strongdm/identity_aliases_history_pb2.py +100 -0
- strongdm-9.0.0/strongdm/identity_aliases_history_pb2_grpc.py +84 -0
- strongdm-9.0.0/strongdm/identity_aliases_pb2.py +220 -0
- strongdm-9.0.0/strongdm/identity_aliases_pb2_grpc.py +223 -0
- strongdm-9.0.0/strongdm/identity_sets_history_pb2.py +100 -0
- strongdm-9.0.0/strongdm/identity_sets_history_pb2_grpc.py +84 -0
- strongdm-9.0.0/strongdm/identity_sets_pb2.py +122 -0
- strongdm-9.0.0/strongdm/identity_sets_pb2_grpc.py +139 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/models.py +835 -370
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/plumbing.py +409 -72
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/remote_identities_history_pb2.py +3 -3
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/remote_identities_pb2.py +3 -3
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/remote_identity_groups_history_pb2.py +3 -3
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/remote_identity_groups_pb2.py +3 -3
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/svc.py +416 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm.egg-info/SOURCES.txt +8 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/LICENSE +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/README.md +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/setup.cfg +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/__init__.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/constants.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/errors.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/options_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-8.4.0 → strongdm-9.0.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -29,11 +29,11 @@ class AKS:
|
|
29
29
|
'healthy',
|
30
30
|
'hostname',
|
31
31
|
'id',
|
32
|
+
'identity_alias_healthcheck_username',
|
33
|
+
'identity_set_id',
|
32
34
|
'name',
|
33
35
|
'port',
|
34
36
|
'port_override',
|
35
|
-
'remote_identity_group_id',
|
36
|
-
'remote_identity_healthcheck_username',
|
37
37
|
'secret_store_id',
|
38
38
|
'subdomain',
|
39
39
|
'tags',
|
@@ -50,11 +50,11 @@ class AKS:
|
|
50
50
|
healthy=None,
|
51
51
|
hostname=None,
|
52
52
|
id=None,
|
53
|
+
identity_alias_healthcheck_username=None,
|
54
|
+
identity_set_id=None,
|
53
55
|
name=None,
|
54
56
|
port=None,
|
55
57
|
port_override=None,
|
56
|
-
remote_identity_group_id=None,
|
57
|
-
remote_identity_healthcheck_username=None,
|
58
58
|
secret_store_id=None,
|
59
59
|
subdomain=None,
|
60
60
|
tags=None,
|
@@ -95,6 +95,14 @@ class AKS:
|
|
95
95
|
'''
|
96
96
|
Unique identifier of the Resource.
|
97
97
|
'''
|
98
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
99
|
+
'''
|
100
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
101
|
+
'''
|
102
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
103
|
+
'''
|
104
|
+
The ID of the identity set to use for identity connections.
|
105
|
+
'''
|
98
106
|
self.name = name if name is not None else ''
|
99
107
|
'''
|
100
108
|
Unique human-readable name of the Resource.
|
@@ -107,14 +115,6 @@ class AKS:
|
|
107
115
|
'''
|
108
116
|
The local port used by clients to connect to this resource.
|
109
117
|
'''
|
110
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
111
|
-
'''
|
112
|
-
The ID of the remote identity group to use for remote identity connections.
|
113
|
-
'''
|
114
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
115
|
-
'''
|
116
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
117
|
-
'''
|
118
118
|
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
119
119
|
'''
|
120
120
|
ID of the secret store containing credentials for this resource, if any.
|
@@ -139,11 +139,11 @@ class AKS:
|
|
139
139
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
140
140
|
'hostname: ' + repr(self.hostname) + ' ' +\
|
141
141
|
'id: ' + repr(self.id) + ' ' +\
|
142
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
143
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
142
144
|
'name: ' + repr(self.name) + ' ' +\
|
143
145
|
'port: ' + repr(self.port) + ' ' +\
|
144
146
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
145
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
146
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
147
147
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
148
148
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
149
149
|
'tags: ' + repr(self.tags) + ' ' +\
|
@@ -160,12 +160,12 @@ class AKS:
|
|
160
160
|
'healthy': self.healthy,
|
161
161
|
'hostname': self.hostname,
|
162
162
|
'id': self.id,
|
163
|
+
'identity_alias_healthcheck_username':
|
164
|
+
self.identity_alias_healthcheck_username,
|
165
|
+
'identity_set_id': self.identity_set_id,
|
163
166
|
'name': self.name,
|
164
167
|
'port': self.port,
|
165
168
|
'port_override': self.port_override,
|
166
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
167
|
-
'remote_identity_healthcheck_username':
|
168
|
-
self.remote_identity_healthcheck_username,
|
169
169
|
'secret_store_id': self.secret_store_id,
|
170
170
|
'subdomain': self.subdomain,
|
171
171
|
'tags': self.tags,
|
@@ -183,12 +183,12 @@ class AKS:
|
|
183
183
|
healthy=d.get('healthy'),
|
184
184
|
hostname=d.get('hostname'),
|
185
185
|
id=d.get('id'),
|
186
|
+
identity_alias_healthcheck_username=d.get(
|
187
|
+
'identity_alias_healthcheck_username'),
|
188
|
+
identity_set_id=d.get('identity_set_id'),
|
186
189
|
name=d.get('name'),
|
187
190
|
port=d.get('port'),
|
188
191
|
port_override=d.get('port_override'),
|
189
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
190
|
-
remote_identity_healthcheck_username=d.get(
|
191
|
-
'remote_identity_healthcheck_username'),
|
192
192
|
secret_store_id=d.get('secret_store_id'),
|
193
193
|
subdomain=d.get('subdomain'),
|
194
194
|
tags=d.get('tags'),
|
@@ -351,11 +351,11 @@ class AKSServiceAccount:
|
|
351
351
|
'healthy',
|
352
352
|
'hostname',
|
353
353
|
'id',
|
354
|
+
'identity_alias_healthcheck_username',
|
355
|
+
'identity_set_id',
|
354
356
|
'name',
|
355
357
|
'port',
|
356
358
|
'port_override',
|
357
|
-
'remote_identity_group_id',
|
358
|
-
'remote_identity_healthcheck_username',
|
359
359
|
'secret_store_id',
|
360
360
|
'subdomain',
|
361
361
|
'tags',
|
@@ -370,11 +370,11 @@ class AKSServiceAccount:
|
|
370
370
|
healthy=None,
|
371
371
|
hostname=None,
|
372
372
|
id=None,
|
373
|
+
identity_alias_healthcheck_username=None,
|
374
|
+
identity_set_id=None,
|
373
375
|
name=None,
|
374
376
|
port=None,
|
375
377
|
port_override=None,
|
376
|
-
remote_identity_group_id=None,
|
377
|
-
remote_identity_healthcheck_username=None,
|
378
378
|
secret_store_id=None,
|
379
379
|
subdomain=None,
|
380
380
|
tags=None,
|
@@ -404,6 +404,14 @@ class AKSServiceAccount:
|
|
404
404
|
'''
|
405
405
|
Unique identifier of the Resource.
|
406
406
|
'''
|
407
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
408
|
+
'''
|
409
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
410
|
+
'''
|
411
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
412
|
+
'''
|
413
|
+
The ID of the identity set to use for identity connections.
|
414
|
+
'''
|
407
415
|
self.name = name if name is not None else ''
|
408
416
|
'''
|
409
417
|
Unique human-readable name of the Resource.
|
@@ -416,14 +424,6 @@ class AKSServiceAccount:
|
|
416
424
|
'''
|
417
425
|
The local port used by clients to connect to this resource.
|
418
426
|
'''
|
419
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
420
|
-
'''
|
421
|
-
The ID of the remote identity group to use for remote identity connections.
|
422
|
-
'''
|
423
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
424
|
-
'''
|
425
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
426
|
-
'''
|
427
427
|
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
428
428
|
'''
|
429
429
|
ID of the secret store containing credentials for this resource, if any.
|
@@ -449,11 +449,11 @@ class AKSServiceAccount:
|
|
449
449
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
450
450
|
'hostname: ' + repr(self.hostname) + ' ' +\
|
451
451
|
'id: ' + repr(self.id) + ' ' +\
|
452
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
453
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
452
454
|
'name: ' + repr(self.name) + ' ' +\
|
453
455
|
'port: ' + repr(self.port) + ' ' +\
|
454
456
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
455
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
456
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
457
457
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
458
458
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
459
459
|
'tags: ' + repr(self.tags) + ' ' +\
|
@@ -468,12 +468,12 @@ class AKSServiceAccount:
|
|
468
468
|
'healthy': self.healthy,
|
469
469
|
'hostname': self.hostname,
|
470
470
|
'id': self.id,
|
471
|
+
'identity_alias_healthcheck_username':
|
472
|
+
self.identity_alias_healthcheck_username,
|
473
|
+
'identity_set_id': self.identity_set_id,
|
471
474
|
'name': self.name,
|
472
475
|
'port': self.port,
|
473
476
|
'port_override': self.port_override,
|
474
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
475
|
-
'remote_identity_healthcheck_username':
|
476
|
-
self.remote_identity_healthcheck_username,
|
477
477
|
'secret_store_id': self.secret_store_id,
|
478
478
|
'subdomain': self.subdomain,
|
479
479
|
'tags': self.tags,
|
@@ -489,12 +489,12 @@ class AKSServiceAccount:
|
|
489
489
|
healthy=d.get('healthy'),
|
490
490
|
hostname=d.get('hostname'),
|
491
491
|
id=d.get('id'),
|
492
|
+
identity_alias_healthcheck_username=d.get(
|
493
|
+
'identity_alias_healthcheck_username'),
|
494
|
+
identity_set_id=d.get('identity_set_id'),
|
492
495
|
name=d.get('name'),
|
493
496
|
port=d.get('port'),
|
494
497
|
port_override=d.get('port_override'),
|
495
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
496
|
-
remote_identity_healthcheck_username=d.get(
|
497
|
-
'remote_identity_healthcheck_username'),
|
498
498
|
secret_store_id=d.get('secret_store_id'),
|
499
499
|
subdomain=d.get('subdomain'),
|
500
500
|
tags=d.get('tags'),
|
@@ -1047,11 +1047,11 @@ class AWSConsole:
|
|
1047
1047
|
'enable_env_variables',
|
1048
1048
|
'healthy',
|
1049
1049
|
'id',
|
1050
|
+
'identity_alias_healthcheck_username',
|
1051
|
+
'identity_set_id',
|
1050
1052
|
'name',
|
1051
1053
|
'port_override',
|
1052
1054
|
'region',
|
1053
|
-
'remote_identity_group_id',
|
1054
|
-
'remote_identity_healthcheck_username',
|
1055
1055
|
'role_arn',
|
1056
1056
|
'role_external_id',
|
1057
1057
|
'secret_store_id',
|
@@ -1067,11 +1067,11 @@ class AWSConsole:
|
|
1067
1067
|
enable_env_variables=None,
|
1068
1068
|
healthy=None,
|
1069
1069
|
id=None,
|
1070
|
+
identity_alias_healthcheck_username=None,
|
1071
|
+
identity_set_id=None,
|
1070
1072
|
name=None,
|
1071
1073
|
port_override=None,
|
1072
1074
|
region=None,
|
1073
|
-
remote_identity_group_id=None,
|
1074
|
-
remote_identity_healthcheck_username=None,
|
1075
1075
|
role_arn=None,
|
1076
1076
|
role_external_id=None,
|
1077
1077
|
secret_store_id=None,
|
@@ -1099,6 +1099,14 @@ class AWSConsole:
|
|
1099
1099
|
'''
|
1100
1100
|
Unique identifier of the Resource.
|
1101
1101
|
'''
|
1102
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
1103
|
+
'''
|
1104
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
1105
|
+
'''
|
1106
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
1107
|
+
'''
|
1108
|
+
The ID of the identity set to use for identity connections.
|
1109
|
+
'''
|
1102
1110
|
self.name = name if name is not None else ''
|
1103
1111
|
'''
|
1104
1112
|
Unique human-readable name of the Resource.
|
@@ -1111,14 +1119,6 @@ class AWSConsole:
|
|
1111
1119
|
'''
|
1112
1120
|
The AWS region to connect to.
|
1113
1121
|
'''
|
1114
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
1115
|
-
'''
|
1116
|
-
The ID of the remote identity group to use for remote identity connections.
|
1117
|
-
'''
|
1118
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
1119
|
-
'''
|
1120
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
1121
|
-
'''
|
1122
1122
|
self.role_arn = role_arn if role_arn is not None else ''
|
1123
1123
|
'''
|
1124
1124
|
The role to assume after logging in.
|
@@ -1151,11 +1151,11 @@ class AWSConsole:
|
|
1151
1151
|
'enable_env_variables: ' + repr(self.enable_env_variables) + ' ' +\
|
1152
1152
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
1153
1153
|
'id: ' + repr(self.id) + ' ' +\
|
1154
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
1155
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
1154
1156
|
'name: ' + repr(self.name) + ' ' +\
|
1155
1157
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
1156
1158
|
'region: ' + repr(self.region) + ' ' +\
|
1157
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
1158
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
1159
1159
|
'role_arn: ' + repr(self.role_arn) + ' ' +\
|
1160
1160
|
'role_external_id: ' + repr(self.role_external_id) + ' ' +\
|
1161
1161
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
@@ -1171,12 +1171,12 @@ class AWSConsole:
|
|
1171
1171
|
'enable_env_variables': self.enable_env_variables,
|
1172
1172
|
'healthy': self.healthy,
|
1173
1173
|
'id': self.id,
|
1174
|
+
'identity_alias_healthcheck_username':
|
1175
|
+
self.identity_alias_healthcheck_username,
|
1176
|
+
'identity_set_id': self.identity_set_id,
|
1174
1177
|
'name': self.name,
|
1175
1178
|
'port_override': self.port_override,
|
1176
1179
|
'region': self.region,
|
1177
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
1178
|
-
'remote_identity_healthcheck_username':
|
1179
|
-
self.remote_identity_healthcheck_username,
|
1180
1180
|
'role_arn': self.role_arn,
|
1181
1181
|
'role_external_id': self.role_external_id,
|
1182
1182
|
'secret_store_id': self.secret_store_id,
|
@@ -1193,12 +1193,12 @@ class AWSConsole:
|
|
1193
1193
|
enable_env_variables=d.get('enable_env_variables'),
|
1194
1194
|
healthy=d.get('healthy'),
|
1195
1195
|
id=d.get('id'),
|
1196
|
+
identity_alias_healthcheck_username=d.get(
|
1197
|
+
'identity_alias_healthcheck_username'),
|
1198
|
+
identity_set_id=d.get('identity_set_id'),
|
1196
1199
|
name=d.get('name'),
|
1197
1200
|
port_override=d.get('port_override'),
|
1198
1201
|
region=d.get('region'),
|
1199
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
1200
|
-
remote_identity_healthcheck_username=d.get(
|
1201
|
-
'remote_identity_healthcheck_username'),
|
1202
1202
|
role_arn=d.get('role_arn'),
|
1203
1203
|
role_external_id=d.get('role_external_id'),
|
1204
1204
|
secret_store_id=d.get('secret_store_id'),
|
@@ -1215,11 +1215,11 @@ class AWSConsoleStaticKeyPair:
|
|
1215
1215
|
'egress_filter',
|
1216
1216
|
'healthy',
|
1217
1217
|
'id',
|
1218
|
+
'identity_alias_healthcheck_username',
|
1219
|
+
'identity_set_id',
|
1218
1220
|
'name',
|
1219
1221
|
'port_override',
|
1220
1222
|
'region',
|
1221
|
-
'remote_identity_group_id',
|
1222
|
-
'remote_identity_healthcheck_username',
|
1223
1223
|
'role_arn',
|
1224
1224
|
'role_external_id',
|
1225
1225
|
'secret_access_key',
|
@@ -1236,11 +1236,11 @@ class AWSConsoleStaticKeyPair:
|
|
1236
1236
|
egress_filter=None,
|
1237
1237
|
healthy=None,
|
1238
1238
|
id=None,
|
1239
|
+
identity_alias_healthcheck_username=None,
|
1240
|
+
identity_set_id=None,
|
1239
1241
|
name=None,
|
1240
1242
|
port_override=None,
|
1241
1243
|
region=None,
|
1242
|
-
remote_identity_group_id=None,
|
1243
|
-
remote_identity_healthcheck_username=None,
|
1244
1244
|
role_arn=None,
|
1245
1245
|
role_external_id=None,
|
1246
1246
|
secret_access_key=None,
|
@@ -1269,6 +1269,14 @@ class AWSConsoleStaticKeyPair:
|
|
1269
1269
|
'''
|
1270
1270
|
Unique identifier of the Resource.
|
1271
1271
|
'''
|
1272
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
1273
|
+
'''
|
1274
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
1275
|
+
'''
|
1276
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
1277
|
+
'''
|
1278
|
+
The ID of the identity set to use for identity connections.
|
1279
|
+
'''
|
1272
1280
|
self.name = name if name is not None else ''
|
1273
1281
|
'''
|
1274
1282
|
Unique human-readable name of the Resource.
|
@@ -1281,14 +1289,6 @@ class AWSConsoleStaticKeyPair:
|
|
1281
1289
|
'''
|
1282
1290
|
The AWS region to connect to.
|
1283
1291
|
'''
|
1284
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
1285
|
-
'''
|
1286
|
-
The ID of the remote identity group to use for remote identity connections.
|
1287
|
-
'''
|
1288
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
1289
|
-
'''
|
1290
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
1291
|
-
'''
|
1292
1292
|
self.role_arn = role_arn if role_arn is not None else ''
|
1293
1293
|
'''
|
1294
1294
|
The role to assume after logging in.
|
@@ -1325,11 +1325,11 @@ class AWSConsoleStaticKeyPair:
|
|
1325
1325
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
1326
1326
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
1327
1327
|
'id: ' + repr(self.id) + ' ' +\
|
1328
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
1329
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
1328
1330
|
'name: ' + repr(self.name) + ' ' +\
|
1329
1331
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
1330
1332
|
'region: ' + repr(self.region) + ' ' +\
|
1331
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
1332
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
1333
1333
|
'role_arn: ' + repr(self.role_arn) + ' ' +\
|
1334
1334
|
'role_external_id: ' + repr(self.role_external_id) + ' ' +\
|
1335
1335
|
'secret_access_key: ' + repr(self.secret_access_key) + ' ' +\
|
@@ -1346,12 +1346,12 @@ class AWSConsoleStaticKeyPair:
|
|
1346
1346
|
'egress_filter': self.egress_filter,
|
1347
1347
|
'healthy': self.healthy,
|
1348
1348
|
'id': self.id,
|
1349
|
+
'identity_alias_healthcheck_username':
|
1350
|
+
self.identity_alias_healthcheck_username,
|
1351
|
+
'identity_set_id': self.identity_set_id,
|
1349
1352
|
'name': self.name,
|
1350
1353
|
'port_override': self.port_override,
|
1351
1354
|
'region': self.region,
|
1352
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
1353
|
-
'remote_identity_healthcheck_username':
|
1354
|
-
self.remote_identity_healthcheck_username,
|
1355
1355
|
'role_arn': self.role_arn,
|
1356
1356
|
'role_external_id': self.role_external_id,
|
1357
1357
|
'secret_access_key': self.secret_access_key,
|
@@ -1369,12 +1369,12 @@ class AWSConsoleStaticKeyPair:
|
|
1369
1369
|
egress_filter=d.get('egress_filter'),
|
1370
1370
|
healthy=d.get('healthy'),
|
1371
1371
|
id=d.get('id'),
|
1372
|
+
identity_alias_healthcheck_username=d.get(
|
1373
|
+
'identity_alias_healthcheck_username'),
|
1374
|
+
identity_set_id=d.get('identity_set_id'),
|
1372
1375
|
name=d.get('name'),
|
1373
1376
|
port_override=d.get('port_override'),
|
1374
1377
|
region=d.get('region'),
|
1375
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
1376
|
-
remote_identity_healthcheck_username=d.get(
|
1377
|
-
'remote_identity_healthcheck_username'),
|
1378
1378
|
role_arn=d.get('role_arn'),
|
1379
1379
|
role_external_id=d.get('role_external_id'),
|
1380
1380
|
secret_access_key=d.get('secret_access_key'),
|
@@ -3313,11 +3313,11 @@ class AmazonEKS:
|
|
3313
3313
|
'healthcheck_namespace',
|
3314
3314
|
'healthy',
|
3315
3315
|
'id',
|
3316
|
+
'identity_alias_healthcheck_username',
|
3317
|
+
'identity_set_id',
|
3316
3318
|
'name',
|
3317
3319
|
'port_override',
|
3318
3320
|
'region',
|
3319
|
-
'remote_identity_group_id',
|
3320
|
-
'remote_identity_healthcheck_username',
|
3321
3321
|
'role_arn',
|
3322
3322
|
'role_external_id',
|
3323
3323
|
'secret_access_key',
|
@@ -3337,11 +3337,11 @@ class AmazonEKS:
|
|
3337
3337
|
healthcheck_namespace=None,
|
3338
3338
|
healthy=None,
|
3339
3339
|
id=None,
|
3340
|
+
identity_alias_healthcheck_username=None,
|
3341
|
+
identity_set_id=None,
|
3340
3342
|
name=None,
|
3341
3343
|
port_override=None,
|
3342
3344
|
region=None,
|
3343
|
-
remote_identity_group_id=None,
|
3344
|
-
remote_identity_healthcheck_username=None,
|
3345
3345
|
role_arn=None,
|
3346
3346
|
role_external_id=None,
|
3347
3347
|
secret_access_key=None,
|
@@ -3385,6 +3385,14 @@ class AmazonEKS:
|
|
3385
3385
|
'''
|
3386
3386
|
Unique identifier of the Resource.
|
3387
3387
|
'''
|
3388
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
3389
|
+
'''
|
3390
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
3391
|
+
'''
|
3392
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
3393
|
+
'''
|
3394
|
+
The ID of the identity set to use for identity connections.
|
3395
|
+
'''
|
3388
3396
|
self.name = name if name is not None else ''
|
3389
3397
|
'''
|
3390
3398
|
Unique human-readable name of the Resource.
|
@@ -3397,14 +3405,6 @@ class AmazonEKS:
|
|
3397
3405
|
'''
|
3398
3406
|
The AWS region to connect to e.g. us-east-1.
|
3399
3407
|
'''
|
3400
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
3401
|
-
'''
|
3402
|
-
The ID of the remote identity group to use for remote identity connections.
|
3403
|
-
'''
|
3404
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
3405
|
-
'''
|
3406
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
3407
|
-
'''
|
3408
3408
|
self.role_arn = role_arn if role_arn is not None else ''
|
3409
3409
|
'''
|
3410
3410
|
The role to assume after logging in.
|
@@ -3441,11 +3441,11 @@ class AmazonEKS:
|
|
3441
3441
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
3442
3442
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
3443
3443
|
'id: ' + repr(self.id) + ' ' +\
|
3444
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
3445
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
3444
3446
|
'name: ' + repr(self.name) + ' ' +\
|
3445
3447
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
3446
3448
|
'region: ' + repr(self.region) + ' ' +\
|
3447
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
3448
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
3449
3449
|
'role_arn: ' + repr(self.role_arn) + ' ' +\
|
3450
3450
|
'role_external_id: ' + repr(self.role_external_id) + ' ' +\
|
3451
3451
|
'secret_access_key: ' + repr(self.secret_access_key) + ' ' +\
|
@@ -3465,12 +3465,12 @@ class AmazonEKS:
|
|
3465
3465
|
'healthcheck_namespace': self.healthcheck_namespace,
|
3466
3466
|
'healthy': self.healthy,
|
3467
3467
|
'id': self.id,
|
3468
|
+
'identity_alias_healthcheck_username':
|
3469
|
+
self.identity_alias_healthcheck_username,
|
3470
|
+
'identity_set_id': self.identity_set_id,
|
3468
3471
|
'name': self.name,
|
3469
3472
|
'port_override': self.port_override,
|
3470
3473
|
'region': self.region,
|
3471
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
3472
|
-
'remote_identity_healthcheck_username':
|
3473
|
-
self.remote_identity_healthcheck_username,
|
3474
3474
|
'role_arn': self.role_arn,
|
3475
3475
|
'role_external_id': self.role_external_id,
|
3476
3476
|
'secret_access_key': self.secret_access_key,
|
@@ -3491,12 +3491,12 @@ class AmazonEKS:
|
|
3491
3491
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
3492
3492
|
healthy=d.get('healthy'),
|
3493
3493
|
id=d.get('id'),
|
3494
|
+
identity_alias_healthcheck_username=d.get(
|
3495
|
+
'identity_alias_healthcheck_username'),
|
3496
|
+
identity_set_id=d.get('identity_set_id'),
|
3494
3497
|
name=d.get('name'),
|
3495
3498
|
port_override=d.get('port_override'),
|
3496
3499
|
region=d.get('region'),
|
3497
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
3498
|
-
remote_identity_healthcheck_username=d.get(
|
3499
|
-
'remote_identity_healthcheck_username'),
|
3500
3500
|
role_arn=d.get('role_arn'),
|
3501
3501
|
role_external_id=d.get('role_external_id'),
|
3502
3502
|
secret_access_key=d.get('secret_access_key'),
|
@@ -3516,11 +3516,11 @@ class AmazonEKSInstanceProfile:
|
|
3516
3516
|
'healthcheck_namespace',
|
3517
3517
|
'healthy',
|
3518
3518
|
'id',
|
3519
|
+
'identity_alias_healthcheck_username',
|
3520
|
+
'identity_set_id',
|
3519
3521
|
'name',
|
3520
3522
|
'port_override',
|
3521
3523
|
'region',
|
3522
|
-
'remote_identity_group_id',
|
3523
|
-
'remote_identity_healthcheck_username',
|
3524
3524
|
'role_arn',
|
3525
3525
|
'role_external_id',
|
3526
3526
|
'secret_store_id',
|
@@ -3538,11 +3538,11 @@ class AmazonEKSInstanceProfile:
|
|
3538
3538
|
healthcheck_namespace=None,
|
3539
3539
|
healthy=None,
|
3540
3540
|
id=None,
|
3541
|
+
identity_alias_healthcheck_username=None,
|
3542
|
+
identity_set_id=None,
|
3541
3543
|
name=None,
|
3542
3544
|
port_override=None,
|
3543
3545
|
region=None,
|
3544
|
-
remote_identity_group_id=None,
|
3545
|
-
remote_identity_healthcheck_username=None,
|
3546
3546
|
role_arn=None,
|
3547
3547
|
role_external_id=None,
|
3548
3548
|
secret_store_id=None,
|
@@ -3581,6 +3581,14 @@ class AmazonEKSInstanceProfile:
|
|
3581
3581
|
'''
|
3582
3582
|
Unique identifier of the Resource.
|
3583
3583
|
'''
|
3584
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
3585
|
+
'''
|
3586
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
3587
|
+
'''
|
3588
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
3589
|
+
'''
|
3590
|
+
The ID of the identity set to use for identity connections.
|
3591
|
+
'''
|
3584
3592
|
self.name = name if name is not None else ''
|
3585
3593
|
'''
|
3586
3594
|
Unique human-readable name of the Resource.
|
@@ -3593,14 +3601,6 @@ class AmazonEKSInstanceProfile:
|
|
3593
3601
|
'''
|
3594
3602
|
The AWS region to connect to e.g. us-east-1.
|
3595
3603
|
'''
|
3596
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
3597
|
-
'''
|
3598
|
-
The ID of the remote identity group to use for remote identity connections.
|
3599
|
-
'''
|
3600
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
3601
|
-
'''
|
3602
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
3603
|
-
'''
|
3604
3604
|
self.role_arn = role_arn if role_arn is not None else ''
|
3605
3605
|
'''
|
3606
3606
|
The role to assume after logging in.
|
@@ -3632,11 +3632,11 @@ class AmazonEKSInstanceProfile:
|
|
3632
3632
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
3633
3633
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
3634
3634
|
'id: ' + repr(self.id) + ' ' +\
|
3635
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
3636
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
3635
3637
|
'name: ' + repr(self.name) + ' ' +\
|
3636
3638
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
3637
3639
|
'region: ' + repr(self.region) + ' ' +\
|
3638
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
3639
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
3640
3640
|
'role_arn: ' + repr(self.role_arn) + ' ' +\
|
3641
3641
|
'role_external_id: ' + repr(self.role_external_id) + ' ' +\
|
3642
3642
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
@@ -3654,12 +3654,12 @@ class AmazonEKSInstanceProfile:
|
|
3654
3654
|
'healthcheck_namespace': self.healthcheck_namespace,
|
3655
3655
|
'healthy': self.healthy,
|
3656
3656
|
'id': self.id,
|
3657
|
+
'identity_alias_healthcheck_username':
|
3658
|
+
self.identity_alias_healthcheck_username,
|
3659
|
+
'identity_set_id': self.identity_set_id,
|
3657
3660
|
'name': self.name,
|
3658
3661
|
'port_override': self.port_override,
|
3659
3662
|
'region': self.region,
|
3660
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
3661
|
-
'remote_identity_healthcheck_username':
|
3662
|
-
self.remote_identity_healthcheck_username,
|
3663
3663
|
'role_arn': self.role_arn,
|
3664
3664
|
'role_external_id': self.role_external_id,
|
3665
3665
|
'secret_store_id': self.secret_store_id,
|
@@ -3678,12 +3678,12 @@ class AmazonEKSInstanceProfile:
|
|
3678
3678
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
3679
3679
|
healthy=d.get('healthy'),
|
3680
3680
|
id=d.get('id'),
|
3681
|
+
identity_alias_healthcheck_username=d.get(
|
3682
|
+
'identity_alias_healthcheck_username'),
|
3683
|
+
identity_set_id=d.get('identity_set_id'),
|
3681
3684
|
name=d.get('name'),
|
3682
3685
|
port_override=d.get('port_override'),
|
3683
3686
|
region=d.get('region'),
|
3684
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
3685
|
-
remote_identity_healthcheck_username=d.get(
|
3686
|
-
'remote_identity_healthcheck_username'),
|
3687
3687
|
role_arn=d.get('role_arn'),
|
3688
3688
|
role_external_id=d.get('role_external_id'),
|
3689
3689
|
secret_store_id=d.get('secret_store_id'),
|
@@ -3705,8 +3705,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
|
|
3705
3705
|
'name',
|
3706
3706
|
'port_override',
|
3707
3707
|
'region',
|
3708
|
-
'remote_identity_group_id',
|
3709
|
-
'remote_identity_healthcheck_username',
|
3710
3708
|
'role_arn',
|
3711
3709
|
'role_external_id',
|
3712
3710
|
'secret_store_id',
|
@@ -3727,8 +3725,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
|
|
3727
3725
|
name=None,
|
3728
3726
|
port_override=None,
|
3729
3727
|
region=None,
|
3730
|
-
remote_identity_group_id=None,
|
3731
|
-
remote_identity_healthcheck_username=None,
|
3732
3728
|
role_arn=None,
|
3733
3729
|
role_external_id=None,
|
3734
3730
|
secret_store_id=None,
|
@@ -3779,14 +3775,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
|
|
3779
3775
|
'''
|
3780
3776
|
The AWS region to connect to e.g. us-east-1.
|
3781
3777
|
'''
|
3782
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
3783
|
-
'''
|
3784
|
-
The ID of the remote identity group to use for remote identity connections.
|
3785
|
-
'''
|
3786
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
3787
|
-
'''
|
3788
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
3789
|
-
'''
|
3790
3778
|
self.role_arn = role_arn if role_arn is not None else ''
|
3791
3779
|
'''
|
3792
3780
|
The role to assume after logging in.
|
@@ -3821,8 +3809,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
|
|
3821
3809
|
'name: ' + repr(self.name) + ' ' +\
|
3822
3810
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
3823
3811
|
'region: ' + repr(self.region) + ' ' +\
|
3824
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
3825
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
3826
3812
|
'role_arn: ' + repr(self.role_arn) + ' ' +\
|
3827
3813
|
'role_external_id: ' + repr(self.role_external_id) + ' ' +\
|
3828
3814
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
@@ -3843,9 +3829,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
|
|
3843
3829
|
'name': self.name,
|
3844
3830
|
'port_override': self.port_override,
|
3845
3831
|
'region': self.region,
|
3846
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
3847
|
-
'remote_identity_healthcheck_username':
|
3848
|
-
self.remote_identity_healthcheck_username,
|
3849
3832
|
'role_arn': self.role_arn,
|
3850
3833
|
'role_external_id': self.role_external_id,
|
3851
3834
|
'secret_store_id': self.secret_store_id,
|
@@ -3867,9 +3850,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
|
|
3867
3850
|
name=d.get('name'),
|
3868
3851
|
port_override=d.get('port_override'),
|
3869
3852
|
region=d.get('region'),
|
3870
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
3871
|
-
remote_identity_healthcheck_username=d.get(
|
3872
|
-
'remote_identity_healthcheck_username'),
|
3873
3853
|
role_arn=d.get('role_arn'),
|
3874
3854
|
role_external_id=d.get('role_external_id'),
|
3875
3855
|
secret_store_id=d.get('secret_store_id'),
|
@@ -9603,10 +9583,10 @@ class GoogleGKE:
|
|
9603
9583
|
'healthcheck_namespace',
|
9604
9584
|
'healthy',
|
9605
9585
|
'id',
|
9586
|
+
'identity_alias_healthcheck_username',
|
9587
|
+
'identity_set_id',
|
9606
9588
|
'name',
|
9607
9589
|
'port_override',
|
9608
|
-
'remote_identity_group_id',
|
9609
|
-
'remote_identity_healthcheck_username',
|
9610
9590
|
'secret_store_id',
|
9611
9591
|
'service_account_key',
|
9612
9592
|
'subdomain',
|
@@ -9622,10 +9602,10 @@ class GoogleGKE:
|
|
9622
9602
|
healthcheck_namespace=None,
|
9623
9603
|
healthy=None,
|
9624
9604
|
id=None,
|
9605
|
+
identity_alias_healthcheck_username=None,
|
9606
|
+
identity_set_id=None,
|
9625
9607
|
name=None,
|
9626
9608
|
port_override=None,
|
9627
|
-
remote_identity_group_id=None,
|
9628
|
-
remote_identity_healthcheck_username=None,
|
9629
9609
|
secret_store_id=None,
|
9630
9610
|
service_account_key=None,
|
9631
9611
|
subdomain=None,
|
@@ -9659,21 +9639,21 @@ class GoogleGKE:
|
|
9659
9639
|
'''
|
9660
9640
|
Unique identifier of the Resource.
|
9661
9641
|
'''
|
9662
|
-
self.
|
9642
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
9663
9643
|
'''
|
9664
|
-
|
9644
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
9665
9645
|
'''
|
9666
|
-
self.
|
9646
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
9667
9647
|
'''
|
9668
|
-
The
|
9648
|
+
The ID of the identity set to use for identity connections.
|
9669
9649
|
'''
|
9670
|
-
self.
|
9650
|
+
self.name = name if name is not None else ''
|
9671
9651
|
'''
|
9672
|
-
|
9652
|
+
Unique human-readable name of the Resource.
|
9673
9653
|
'''
|
9674
|
-
self.
|
9654
|
+
self.port_override = port_override if port_override is not None else 0
|
9675
9655
|
'''
|
9676
|
-
The
|
9656
|
+
The local port used by clients to connect to this resource.
|
9677
9657
|
'''
|
9678
9658
|
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
9679
9659
|
'''
|
@@ -9701,10 +9681,10 @@ class GoogleGKE:
|
|
9701
9681
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
9702
9682
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
9703
9683
|
'id: ' + repr(self.id) + ' ' +\
|
9684
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
9685
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
9704
9686
|
'name: ' + repr(self.name) + ' ' +\
|
9705
9687
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
9706
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
9707
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
9708
9688
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
9709
9689
|
'service_account_key: ' + repr(self.service_account_key) + ' ' +\
|
9710
9690
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
@@ -9720,11 +9700,11 @@ class GoogleGKE:
|
|
9720
9700
|
'healthcheck_namespace': self.healthcheck_namespace,
|
9721
9701
|
'healthy': self.healthy,
|
9722
9702
|
'id': self.id,
|
9703
|
+
'identity_alias_healthcheck_username':
|
9704
|
+
self.identity_alias_healthcheck_username,
|
9705
|
+
'identity_set_id': self.identity_set_id,
|
9723
9706
|
'name': self.name,
|
9724
9707
|
'port_override': self.port_override,
|
9725
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
9726
|
-
'remote_identity_healthcheck_username':
|
9727
|
-
self.remote_identity_healthcheck_username,
|
9728
9708
|
'secret_store_id': self.secret_store_id,
|
9729
9709
|
'service_account_key': self.service_account_key,
|
9730
9710
|
'subdomain': self.subdomain,
|
@@ -9741,11 +9721,11 @@ class GoogleGKE:
|
|
9741
9721
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
9742
9722
|
healthy=d.get('healthy'),
|
9743
9723
|
id=d.get('id'),
|
9724
|
+
identity_alias_healthcheck_username=d.get(
|
9725
|
+
'identity_alias_healthcheck_username'),
|
9726
|
+
identity_set_id=d.get('identity_set_id'),
|
9744
9727
|
name=d.get('name'),
|
9745
9728
|
port_override=d.get('port_override'),
|
9746
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
9747
|
-
remote_identity_healthcheck_username=d.get(
|
9748
|
-
'remote_identity_healthcheck_username'),
|
9749
9729
|
secret_store_id=d.get('secret_store_id'),
|
9750
9730
|
service_account_key=d.get('service_account_key'),
|
9751
9731
|
subdomain=d.get('subdomain'),
|
@@ -10493,175 +10473,660 @@ class HTTPNoAuth:
|
|
10493
10473
|
)
|
10494
10474
|
|
10495
10475
|
|
10496
|
-
class
|
10476
|
+
class IdentityAlias:
|
10477
|
+
'''
|
10478
|
+
IdentityAliases define the username to be used for a specific account
|
10479
|
+
when connecting to a remote resource using that identity set.
|
10480
|
+
'''
|
10497
10481
|
__slots__ = [
|
10498
|
-
'
|
10499
|
-
'certificate_file_path',
|
10500
|
-
'default_certificate_authority_name',
|
10501
|
-
'default_certificate_profile_name',
|
10502
|
-
'default_end_entity_profile_name',
|
10503
|
-
'enrollment_code_env_var',
|
10504
|
-
'enrollment_username_env_var',
|
10482
|
+
'account_id',
|
10505
10483
|
'id',
|
10506
|
-
'
|
10507
|
-
'
|
10508
|
-
'server_address',
|
10509
|
-
'tags',
|
10484
|
+
'identity_set_id',
|
10485
|
+
'username',
|
10510
10486
|
]
|
10511
10487
|
|
10512
10488
|
def __init__(
|
10513
10489
|
self,
|
10514
|
-
|
10515
|
-
certificate_file_path=None,
|
10516
|
-
default_certificate_authority_name=None,
|
10517
|
-
default_certificate_profile_name=None,
|
10518
|
-
default_end_entity_profile_name=None,
|
10519
|
-
enrollment_code_env_var=None,
|
10520
|
-
enrollment_username_env_var=None,
|
10490
|
+
account_id=None,
|
10521
10491
|
id=None,
|
10522
|
-
|
10523
|
-
|
10524
|
-
server_address=None,
|
10525
|
-
tags=None,
|
10492
|
+
identity_set_id=None,
|
10493
|
+
username=None,
|
10526
10494
|
):
|
10527
|
-
self.
|
10528
|
-
'''
|
10529
|
-
Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
10530
|
-
This is not required if the CA is trusted by the host operating system. This should be a PEM
|
10531
|
-
formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
|
10532
|
-
'''
|
10533
|
-
self.certificate_file_path = certificate_file_path if certificate_file_path is not None else ''
|
10534
|
-
'''
|
10535
|
-
Path to client certificate in PEM format. This certificate must contain a client certificate that
|
10536
|
-
is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
|
10537
|
-
key associated with the certificate, but KeyFile can also be set to configure the private key.
|
10538
|
-
'''
|
10539
|
-
self.default_certificate_authority_name = default_certificate_authority_name if default_certificate_authority_name is not None else ''
|
10540
|
-
'''
|
10541
|
-
Name of EJBCA certificate authority that will enroll CSR.
|
10542
|
-
'''
|
10543
|
-
self.default_certificate_profile_name = default_certificate_profile_name if default_certificate_profile_name is not None else ''
|
10544
|
-
'''
|
10545
|
-
Certificate profile name that EJBCA will enroll the CSR with.
|
10546
|
-
'''
|
10547
|
-
self.default_end_entity_profile_name = default_end_entity_profile_name if default_end_entity_profile_name is not None else ''
|
10548
|
-
'''
|
10549
|
-
End entity profile that EJBCA will enroll the CSR with.
|
10550
|
-
'''
|
10551
|
-
self.enrollment_code_env_var = enrollment_code_env_var if enrollment_code_env_var is not None else ''
|
10552
|
-
'''
|
10553
|
-
code used by EJBCA during enrollment. May be left blank if no code is required.
|
10554
|
-
'''
|
10555
|
-
self.enrollment_username_env_var = enrollment_username_env_var if enrollment_username_env_var is not None else ''
|
10495
|
+
self.account_id = account_id if account_id is not None else ''
|
10556
10496
|
'''
|
10557
|
-
|
10558
|
-
If so, the username must be auto-generated on the Keyfactor side.
|
10497
|
+
The account for this identity alias.
|
10559
10498
|
'''
|
10560
10499
|
self.id = id if id is not None else ''
|
10561
10500
|
'''
|
10562
|
-
Unique identifier of the
|
10563
|
-
'''
|
10564
|
-
self.key_file_path = key_file_path if key_file_path is not None else ''
|
10565
|
-
'''
|
10566
|
-
Path to private key in PEM format. This file should contain the private key associated with the
|
10567
|
-
client certificate configured in CertificateFile.
|
10568
|
-
'''
|
10569
|
-
self.name = name if name is not None else ''
|
10570
|
-
'''
|
10571
|
-
Unique human-readable name of the SecretStore.
|
10501
|
+
Unique identifier of the IdentityAlias.
|
10572
10502
|
'''
|
10573
|
-
self.
|
10503
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
10574
10504
|
'''
|
10575
|
-
|
10505
|
+
The identity set.
|
10576
10506
|
'''
|
10577
|
-
self.
|
10507
|
+
self.username = username if username is not None else ''
|
10578
10508
|
'''
|
10579
|
-
|
10509
|
+
The username to be used as the identity alias for this account.
|
10580
10510
|
'''
|
10581
10511
|
|
10582
10512
|
def __repr__(self):
|
10583
|
-
return '<sdm.
|
10584
|
-
'
|
10585
|
-
'certificate_file_path: ' + repr(self.certificate_file_path) + ' ' +\
|
10586
|
-
'default_certificate_authority_name: ' + repr(self.default_certificate_authority_name) + ' ' +\
|
10587
|
-
'default_certificate_profile_name: ' + repr(self.default_certificate_profile_name) + ' ' +\
|
10588
|
-
'default_end_entity_profile_name: ' + repr(self.default_end_entity_profile_name) + ' ' +\
|
10589
|
-
'enrollment_code_env_var: ' + repr(self.enrollment_code_env_var) + ' ' +\
|
10590
|
-
'enrollment_username_env_var: ' + repr(self.enrollment_username_env_var) + ' ' +\
|
10513
|
+
return '<sdm.IdentityAlias ' + \
|
10514
|
+
'account_id: ' + repr(self.account_id) + ' ' +\
|
10591
10515
|
'id: ' + repr(self.id) + ' ' +\
|
10592
|
-
'
|
10593
|
-
'
|
10594
|
-
'server_address: ' + repr(self.server_address) + ' ' +\
|
10595
|
-
'tags: ' + repr(self.tags) + ' ' +\
|
10516
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
10517
|
+
'username: ' + repr(self.username) + ' ' +\
|
10596
10518
|
'>'
|
10597
10519
|
|
10598
10520
|
def to_dict(self):
|
10599
10521
|
return {
|
10600
|
-
'
|
10601
|
-
'certificate_file_path': self.certificate_file_path,
|
10602
|
-
'default_certificate_authority_name':
|
10603
|
-
self.default_certificate_authority_name,
|
10604
|
-
'default_certificate_profile_name':
|
10605
|
-
self.default_certificate_profile_name,
|
10606
|
-
'default_end_entity_profile_name':
|
10607
|
-
self.default_end_entity_profile_name,
|
10608
|
-
'enrollment_code_env_var': self.enrollment_code_env_var,
|
10609
|
-
'enrollment_username_env_var': self.enrollment_username_env_var,
|
10522
|
+
'account_id': self.account_id,
|
10610
10523
|
'id': self.id,
|
10611
|
-
'
|
10612
|
-
'
|
10613
|
-
'server_address': self.server_address,
|
10614
|
-
'tags': self.tags,
|
10524
|
+
'identity_set_id': self.identity_set_id,
|
10525
|
+
'username': self.username,
|
10615
10526
|
}
|
10616
10527
|
|
10617
10528
|
@classmethod
|
10618
10529
|
def from_dict(cls, d):
|
10619
10530
|
return cls(
|
10620
|
-
|
10621
|
-
certificate_file_path=d.get('certificate_file_path'),
|
10622
|
-
default_certificate_authority_name=d.get(
|
10623
|
-
'default_certificate_authority_name'),
|
10624
|
-
default_certificate_profile_name=d.get(
|
10625
|
-
'default_certificate_profile_name'),
|
10626
|
-
default_end_entity_profile_name=d.get(
|
10627
|
-
'default_end_entity_profile_name'),
|
10628
|
-
enrollment_code_env_var=d.get('enrollment_code_env_var'),
|
10629
|
-
enrollment_username_env_var=d.get('enrollment_username_env_var'),
|
10531
|
+
account_id=d.get('account_id'),
|
10630
10532
|
id=d.get('id'),
|
10631
|
-
|
10632
|
-
|
10633
|
-
server_address=d.get('server_address'),
|
10634
|
-
tags=d.get('tags'),
|
10533
|
+
identity_set_id=d.get('identity_set_id'),
|
10534
|
+
username=d.get('username'),
|
10635
10535
|
)
|
10636
10536
|
|
10637
10537
|
|
10638
|
-
class
|
10538
|
+
class IdentityAliasCreateResponse:
|
10539
|
+
'''
|
10540
|
+
IdentityAliasCreateResponse reports how the IdentityAliases were created in the system.
|
10541
|
+
'''
|
10639
10542
|
__slots__ = [
|
10640
|
-
'
|
10641
|
-
'
|
10642
|
-
'
|
10643
|
-
'default_certificate_profile_name',
|
10644
|
-
'default_end_entity_profile_name',
|
10645
|
-
'enrollment_code_env_var',
|
10646
|
-
'enrollment_username_env_var',
|
10647
|
-
'id',
|
10648
|
-
'key_file_path',
|
10649
|
-
'name',
|
10650
|
-
'server_address',
|
10651
|
-
'tags',
|
10543
|
+
'identity_alias',
|
10544
|
+
'meta',
|
10545
|
+
'rate_limit',
|
10652
10546
|
]
|
10653
10547
|
|
10654
10548
|
def __init__(
|
10655
10549
|
self,
|
10656
|
-
|
10657
|
-
|
10658
|
-
|
10659
|
-
|
10660
|
-
|
10661
|
-
|
10662
|
-
|
10663
|
-
|
10664
|
-
|
10550
|
+
identity_alias=None,
|
10551
|
+
meta=None,
|
10552
|
+
rate_limit=None,
|
10553
|
+
):
|
10554
|
+
self.identity_alias = identity_alias if identity_alias is not None else None
|
10555
|
+
'''
|
10556
|
+
The created IdentityAlias.
|
10557
|
+
'''
|
10558
|
+
self.meta = meta if meta is not None else None
|
10559
|
+
'''
|
10560
|
+
Reserved for future use.
|
10561
|
+
'''
|
10562
|
+
self.rate_limit = rate_limit if rate_limit is not None else None
|
10563
|
+
'''
|
10564
|
+
Rate limit information.
|
10565
|
+
'''
|
10566
|
+
|
10567
|
+
def __repr__(self):
|
10568
|
+
return '<sdm.IdentityAliasCreateResponse ' + \
|
10569
|
+
'identity_alias: ' + repr(self.identity_alias) + ' ' +\
|
10570
|
+
'meta: ' + repr(self.meta) + ' ' +\
|
10571
|
+
'rate_limit: ' + repr(self.rate_limit) + ' ' +\
|
10572
|
+
'>'
|
10573
|
+
|
10574
|
+
def to_dict(self):
|
10575
|
+
return {
|
10576
|
+
'identity_alias': self.identity_alias,
|
10577
|
+
'meta': self.meta,
|
10578
|
+
'rate_limit': self.rate_limit,
|
10579
|
+
}
|
10580
|
+
|
10581
|
+
@classmethod
|
10582
|
+
def from_dict(cls, d):
|
10583
|
+
return cls(
|
10584
|
+
identity_alias=d.get('identity_alias'),
|
10585
|
+
meta=d.get('meta'),
|
10586
|
+
rate_limit=d.get('rate_limit'),
|
10587
|
+
)
|
10588
|
+
|
10589
|
+
|
10590
|
+
class IdentityAliasDeleteResponse:
|
10591
|
+
'''
|
10592
|
+
IdentityAliasDeleteResponse returns information about a IdentityAlias that was deleted.
|
10593
|
+
'''
|
10594
|
+
__slots__ = [
|
10595
|
+
'meta',
|
10596
|
+
'rate_limit',
|
10597
|
+
]
|
10598
|
+
|
10599
|
+
def __init__(
|
10600
|
+
self,
|
10601
|
+
meta=None,
|
10602
|
+
rate_limit=None,
|
10603
|
+
):
|
10604
|
+
self.meta = meta if meta is not None else None
|
10605
|
+
'''
|
10606
|
+
Reserved for future use.
|
10607
|
+
'''
|
10608
|
+
self.rate_limit = rate_limit if rate_limit is not None else None
|
10609
|
+
'''
|
10610
|
+
Rate limit information.
|
10611
|
+
'''
|
10612
|
+
|
10613
|
+
def __repr__(self):
|
10614
|
+
return '<sdm.IdentityAliasDeleteResponse ' + \
|
10615
|
+
'meta: ' + repr(self.meta) + ' ' +\
|
10616
|
+
'rate_limit: ' + repr(self.rate_limit) + ' ' +\
|
10617
|
+
'>'
|
10618
|
+
|
10619
|
+
def to_dict(self):
|
10620
|
+
return {
|
10621
|
+
'meta': self.meta,
|
10622
|
+
'rate_limit': self.rate_limit,
|
10623
|
+
}
|
10624
|
+
|
10625
|
+
@classmethod
|
10626
|
+
def from_dict(cls, d):
|
10627
|
+
return cls(
|
10628
|
+
meta=d.get('meta'),
|
10629
|
+
rate_limit=d.get('rate_limit'),
|
10630
|
+
)
|
10631
|
+
|
10632
|
+
|
10633
|
+
class IdentityAliasGetResponse:
|
10634
|
+
'''
|
10635
|
+
IdentityAliasGetResponse returns a requested IdentityAlias.
|
10636
|
+
'''
|
10637
|
+
__slots__ = [
|
10638
|
+
'identity_alias',
|
10639
|
+
'meta',
|
10640
|
+
'rate_limit',
|
10641
|
+
]
|
10642
|
+
|
10643
|
+
def __init__(
|
10644
|
+
self,
|
10645
|
+
identity_alias=None,
|
10646
|
+
meta=None,
|
10647
|
+
rate_limit=None,
|
10648
|
+
):
|
10649
|
+
self.identity_alias = identity_alias if identity_alias is not None else None
|
10650
|
+
'''
|
10651
|
+
The requested IdentityAlias.
|
10652
|
+
'''
|
10653
|
+
self.meta = meta if meta is not None else None
|
10654
|
+
'''
|
10655
|
+
Reserved for future use.
|
10656
|
+
'''
|
10657
|
+
self.rate_limit = rate_limit if rate_limit is not None else None
|
10658
|
+
'''
|
10659
|
+
Rate limit information.
|
10660
|
+
'''
|
10661
|
+
|
10662
|
+
def __repr__(self):
|
10663
|
+
return '<sdm.IdentityAliasGetResponse ' + \
|
10664
|
+
'identity_alias: ' + repr(self.identity_alias) + ' ' +\
|
10665
|
+
'meta: ' + repr(self.meta) + ' ' +\
|
10666
|
+
'rate_limit: ' + repr(self.rate_limit) + ' ' +\
|
10667
|
+
'>'
|
10668
|
+
|
10669
|
+
def to_dict(self):
|
10670
|
+
return {
|
10671
|
+
'identity_alias': self.identity_alias,
|
10672
|
+
'meta': self.meta,
|
10673
|
+
'rate_limit': self.rate_limit,
|
10674
|
+
}
|
10675
|
+
|
10676
|
+
@classmethod
|
10677
|
+
def from_dict(cls, d):
|
10678
|
+
return cls(
|
10679
|
+
identity_alias=d.get('identity_alias'),
|
10680
|
+
meta=d.get('meta'),
|
10681
|
+
rate_limit=d.get('rate_limit'),
|
10682
|
+
)
|
10683
|
+
|
10684
|
+
|
10685
|
+
class IdentityAliasHistory:
|
10686
|
+
'''
|
10687
|
+
IdentityAliasHistory records the state of a IdentityAlias at a given point in time,
|
10688
|
+
where every change (create, update and delete) to a IdentityAlias produces an
|
10689
|
+
IdentityAliasHistory record.
|
10690
|
+
'''
|
10691
|
+
__slots__ = [
|
10692
|
+
'activity_id',
|
10693
|
+
'deleted_at',
|
10694
|
+
'identity_alias',
|
10695
|
+
'timestamp',
|
10696
|
+
]
|
10697
|
+
|
10698
|
+
def __init__(
|
10699
|
+
self,
|
10700
|
+
activity_id=None,
|
10701
|
+
deleted_at=None,
|
10702
|
+
identity_alias=None,
|
10703
|
+
timestamp=None,
|
10704
|
+
):
|
10705
|
+
self.activity_id = activity_id if activity_id is not None else ''
|
10706
|
+
'''
|
10707
|
+
The unique identifier of the Activity that produced this change to the IdentityAlias.
|
10708
|
+
May be empty for some system-initiated updates.
|
10709
|
+
'''
|
10710
|
+
self.deleted_at = deleted_at if deleted_at is not None else None
|
10711
|
+
'''
|
10712
|
+
If this IdentityAlias was deleted, the time it was deleted.
|
10713
|
+
'''
|
10714
|
+
self.identity_alias = identity_alias if identity_alias is not None else None
|
10715
|
+
'''
|
10716
|
+
The complete IdentityAlias state at this time.
|
10717
|
+
'''
|
10718
|
+
self.timestamp = timestamp if timestamp is not None else None
|
10719
|
+
'''
|
10720
|
+
The time at which the IdentityAlias state was recorded.
|
10721
|
+
'''
|
10722
|
+
|
10723
|
+
def __repr__(self):
|
10724
|
+
return '<sdm.IdentityAliasHistory ' + \
|
10725
|
+
'activity_id: ' + repr(self.activity_id) + ' ' +\
|
10726
|
+
'deleted_at: ' + repr(self.deleted_at) + ' ' +\
|
10727
|
+
'identity_alias: ' + repr(self.identity_alias) + ' ' +\
|
10728
|
+
'timestamp: ' + repr(self.timestamp) + ' ' +\
|
10729
|
+
'>'
|
10730
|
+
|
10731
|
+
def to_dict(self):
|
10732
|
+
return {
|
10733
|
+
'activity_id': self.activity_id,
|
10734
|
+
'deleted_at': self.deleted_at,
|
10735
|
+
'identity_alias': self.identity_alias,
|
10736
|
+
'timestamp': self.timestamp,
|
10737
|
+
}
|
10738
|
+
|
10739
|
+
@classmethod
|
10740
|
+
def from_dict(cls, d):
|
10741
|
+
return cls(
|
10742
|
+
activity_id=d.get('activity_id'),
|
10743
|
+
deleted_at=d.get('deleted_at'),
|
10744
|
+
identity_alias=d.get('identity_alias'),
|
10745
|
+
timestamp=d.get('timestamp'),
|
10746
|
+
)
|
10747
|
+
|
10748
|
+
|
10749
|
+
class IdentityAliasUpdateResponse:
|
10750
|
+
'''
|
10751
|
+
IdentityAliasUpdateResponse returns the fields of a IdentityAlias after it has been updated by
|
10752
|
+
a IdentityAliasUpdateRequest.
|
10753
|
+
'''
|
10754
|
+
__slots__ = [
|
10755
|
+
'identity_alias',
|
10756
|
+
'meta',
|
10757
|
+
'rate_limit',
|
10758
|
+
]
|
10759
|
+
|
10760
|
+
def __init__(
|
10761
|
+
self,
|
10762
|
+
identity_alias=None,
|
10763
|
+
meta=None,
|
10764
|
+
rate_limit=None,
|
10765
|
+
):
|
10766
|
+
self.identity_alias = identity_alias if identity_alias is not None else None
|
10767
|
+
'''
|
10768
|
+
The updated IdentityAlias.
|
10769
|
+
'''
|
10770
|
+
self.meta = meta if meta is not None else None
|
10771
|
+
'''
|
10772
|
+
Reserved for future use.
|
10773
|
+
'''
|
10774
|
+
self.rate_limit = rate_limit if rate_limit is not None else None
|
10775
|
+
'''
|
10776
|
+
Rate limit information.
|
10777
|
+
'''
|
10778
|
+
|
10779
|
+
def __repr__(self):
|
10780
|
+
return '<sdm.IdentityAliasUpdateResponse ' + \
|
10781
|
+
'identity_alias: ' + repr(self.identity_alias) + ' ' +\
|
10782
|
+
'meta: ' + repr(self.meta) + ' ' +\
|
10783
|
+
'rate_limit: ' + repr(self.rate_limit) + ' ' +\
|
10784
|
+
'>'
|
10785
|
+
|
10786
|
+
def to_dict(self):
|
10787
|
+
return {
|
10788
|
+
'identity_alias': self.identity_alias,
|
10789
|
+
'meta': self.meta,
|
10790
|
+
'rate_limit': self.rate_limit,
|
10791
|
+
}
|
10792
|
+
|
10793
|
+
@classmethod
|
10794
|
+
def from_dict(cls, d):
|
10795
|
+
return cls(
|
10796
|
+
identity_alias=d.get('identity_alias'),
|
10797
|
+
meta=d.get('meta'),
|
10798
|
+
rate_limit=d.get('rate_limit'),
|
10799
|
+
)
|
10800
|
+
|
10801
|
+
|
10802
|
+
class IdentitySet:
|
10803
|
+
'''
|
10804
|
+
A IdentitySet defines a group of identity aliases.
|
10805
|
+
'''
|
10806
|
+
__slots__ = [
|
10807
|
+
'id',
|
10808
|
+
'name',
|
10809
|
+
]
|
10810
|
+
|
10811
|
+
def __init__(
|
10812
|
+
self,
|
10813
|
+
id=None,
|
10814
|
+
name=None,
|
10815
|
+
):
|
10816
|
+
self.id = id if id is not None else ''
|
10817
|
+
'''
|
10818
|
+
Unique identifier of the IdentitySet.
|
10819
|
+
'''
|
10820
|
+
self.name = name if name is not None else ''
|
10821
|
+
'''
|
10822
|
+
Unique human-readable name of the IdentitySet.
|
10823
|
+
'''
|
10824
|
+
|
10825
|
+
def __repr__(self):
|
10826
|
+
return '<sdm.IdentitySet ' + \
|
10827
|
+
'id: ' + repr(self.id) + ' ' +\
|
10828
|
+
'name: ' + repr(self.name) + ' ' +\
|
10829
|
+
'>'
|
10830
|
+
|
10831
|
+
def to_dict(self):
|
10832
|
+
return {
|
10833
|
+
'id': self.id,
|
10834
|
+
'name': self.name,
|
10835
|
+
}
|
10836
|
+
|
10837
|
+
@classmethod
|
10838
|
+
def from_dict(cls, d):
|
10839
|
+
return cls(
|
10840
|
+
id=d.get('id'),
|
10841
|
+
name=d.get('name'),
|
10842
|
+
)
|
10843
|
+
|
10844
|
+
|
10845
|
+
class IdentitySetGetResponse:
|
10846
|
+
'''
|
10847
|
+
IdentitySetGetResponse returns a requested IdentitySet.
|
10848
|
+
'''
|
10849
|
+
__slots__ = [
|
10850
|
+
'identity_set',
|
10851
|
+
'meta',
|
10852
|
+
'rate_limit',
|
10853
|
+
]
|
10854
|
+
|
10855
|
+
def __init__(
|
10856
|
+
self,
|
10857
|
+
identity_set=None,
|
10858
|
+
meta=None,
|
10859
|
+
rate_limit=None,
|
10860
|
+
):
|
10861
|
+
self.identity_set = identity_set if identity_set is not None else None
|
10862
|
+
'''
|
10863
|
+
The requested IdentitySet.
|
10864
|
+
'''
|
10865
|
+
self.meta = meta if meta is not None else None
|
10866
|
+
'''
|
10867
|
+
Reserved for future use.
|
10868
|
+
'''
|
10869
|
+
self.rate_limit = rate_limit if rate_limit is not None else None
|
10870
|
+
'''
|
10871
|
+
Rate limit information.
|
10872
|
+
'''
|
10873
|
+
|
10874
|
+
def __repr__(self):
|
10875
|
+
return '<sdm.IdentitySetGetResponse ' + \
|
10876
|
+
'identity_set: ' + repr(self.identity_set) + ' ' +\
|
10877
|
+
'meta: ' + repr(self.meta) + ' ' +\
|
10878
|
+
'rate_limit: ' + repr(self.rate_limit) + ' ' +\
|
10879
|
+
'>'
|
10880
|
+
|
10881
|
+
def to_dict(self):
|
10882
|
+
return {
|
10883
|
+
'identity_set': self.identity_set,
|
10884
|
+
'meta': self.meta,
|
10885
|
+
'rate_limit': self.rate_limit,
|
10886
|
+
}
|
10887
|
+
|
10888
|
+
@classmethod
|
10889
|
+
def from_dict(cls, d):
|
10890
|
+
return cls(
|
10891
|
+
identity_set=d.get('identity_set'),
|
10892
|
+
meta=d.get('meta'),
|
10893
|
+
rate_limit=d.get('rate_limit'),
|
10894
|
+
)
|
10895
|
+
|
10896
|
+
|
10897
|
+
class IdentitySetHistory:
|
10898
|
+
'''
|
10899
|
+
IdentitySetHistory records the state of a IdentitySet at a given point in time,
|
10900
|
+
where every change (create, update and delete) to a IdentitySet produces an
|
10901
|
+
IdentitySetHistory record.
|
10902
|
+
'''
|
10903
|
+
__slots__ = [
|
10904
|
+
'activity_id',
|
10905
|
+
'deleted_at',
|
10906
|
+
'identity_set',
|
10907
|
+
'timestamp',
|
10908
|
+
]
|
10909
|
+
|
10910
|
+
def __init__(
|
10911
|
+
self,
|
10912
|
+
activity_id=None,
|
10913
|
+
deleted_at=None,
|
10914
|
+
identity_set=None,
|
10915
|
+
timestamp=None,
|
10916
|
+
):
|
10917
|
+
self.activity_id = activity_id if activity_id is not None else ''
|
10918
|
+
'''
|
10919
|
+
The unique identifier of the Activity that produced this change to the IdentitySet.
|
10920
|
+
May be empty for some system-initiated updates.
|
10921
|
+
'''
|
10922
|
+
self.deleted_at = deleted_at if deleted_at is not None else None
|
10923
|
+
'''
|
10924
|
+
If this IdentitySet was deleted, the time it was deleted.
|
10925
|
+
'''
|
10926
|
+
self.identity_set = identity_set if identity_set is not None else None
|
10927
|
+
'''
|
10928
|
+
The complete IdentitySet state at this time.
|
10929
|
+
'''
|
10930
|
+
self.timestamp = timestamp if timestamp is not None else None
|
10931
|
+
'''
|
10932
|
+
The time at which the IdentitySet state was recorded.
|
10933
|
+
'''
|
10934
|
+
|
10935
|
+
def __repr__(self):
|
10936
|
+
return '<sdm.IdentitySetHistory ' + \
|
10937
|
+
'activity_id: ' + repr(self.activity_id) + ' ' +\
|
10938
|
+
'deleted_at: ' + repr(self.deleted_at) + ' ' +\
|
10939
|
+
'identity_set: ' + repr(self.identity_set) + ' ' +\
|
10940
|
+
'timestamp: ' + repr(self.timestamp) + ' ' +\
|
10941
|
+
'>'
|
10942
|
+
|
10943
|
+
def to_dict(self):
|
10944
|
+
return {
|
10945
|
+
'activity_id': self.activity_id,
|
10946
|
+
'deleted_at': self.deleted_at,
|
10947
|
+
'identity_set': self.identity_set,
|
10948
|
+
'timestamp': self.timestamp,
|
10949
|
+
}
|
10950
|
+
|
10951
|
+
@classmethod
|
10952
|
+
def from_dict(cls, d):
|
10953
|
+
return cls(
|
10954
|
+
activity_id=d.get('activity_id'),
|
10955
|
+
deleted_at=d.get('deleted_at'),
|
10956
|
+
identity_set=d.get('identity_set'),
|
10957
|
+
timestamp=d.get('timestamp'),
|
10958
|
+
)
|
10959
|
+
|
10960
|
+
|
10961
|
+
class KeyfactorSSHStore:
|
10962
|
+
__slots__ = [
|
10963
|
+
'ca_file_path',
|
10964
|
+
'certificate_file_path',
|
10965
|
+
'default_certificate_authority_name',
|
10966
|
+
'default_certificate_profile_name',
|
10967
|
+
'default_end_entity_profile_name',
|
10968
|
+
'enrollment_code_env_var',
|
10969
|
+
'enrollment_username_env_var',
|
10970
|
+
'id',
|
10971
|
+
'key_file_path',
|
10972
|
+
'name',
|
10973
|
+
'server_address',
|
10974
|
+
'tags',
|
10975
|
+
]
|
10976
|
+
|
10977
|
+
def __init__(
|
10978
|
+
self,
|
10979
|
+
ca_file_path=None,
|
10980
|
+
certificate_file_path=None,
|
10981
|
+
default_certificate_authority_name=None,
|
10982
|
+
default_certificate_profile_name=None,
|
10983
|
+
default_end_entity_profile_name=None,
|
10984
|
+
enrollment_code_env_var=None,
|
10985
|
+
enrollment_username_env_var=None,
|
10986
|
+
id=None,
|
10987
|
+
key_file_path=None,
|
10988
|
+
name=None,
|
10989
|
+
server_address=None,
|
10990
|
+
tags=None,
|
10991
|
+
):
|
10992
|
+
self.ca_file_path = ca_file_path if ca_file_path is not None else ''
|
10993
|
+
'''
|
10994
|
+
Path to the root CA that signed the certificate passed to the client for HTTPS connection.
|
10995
|
+
This is not required if the CA is trusted by the host operating system. This should be a PEM
|
10996
|
+
formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
|
10997
|
+
'''
|
10998
|
+
self.certificate_file_path = certificate_file_path if certificate_file_path is not None else ''
|
10999
|
+
'''
|
11000
|
+
Path to client certificate in PEM format. This certificate must contain a client certificate that
|
11001
|
+
is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
|
11002
|
+
key associated with the certificate, but KeyFile can also be set to configure the private key.
|
11003
|
+
'''
|
11004
|
+
self.default_certificate_authority_name = default_certificate_authority_name if default_certificate_authority_name is not None else ''
|
11005
|
+
'''
|
11006
|
+
Name of EJBCA certificate authority that will enroll CSR.
|
11007
|
+
'''
|
11008
|
+
self.default_certificate_profile_name = default_certificate_profile_name if default_certificate_profile_name is not None else ''
|
11009
|
+
'''
|
11010
|
+
Certificate profile name that EJBCA will enroll the CSR with.
|
11011
|
+
'''
|
11012
|
+
self.default_end_entity_profile_name = default_end_entity_profile_name if default_end_entity_profile_name is not None else ''
|
11013
|
+
'''
|
11014
|
+
End entity profile that EJBCA will enroll the CSR with.
|
11015
|
+
'''
|
11016
|
+
self.enrollment_code_env_var = enrollment_code_env_var if enrollment_code_env_var is not None else ''
|
11017
|
+
'''
|
11018
|
+
code used by EJBCA during enrollment. May be left blank if no code is required.
|
11019
|
+
'''
|
11020
|
+
self.enrollment_username_env_var = enrollment_username_env_var if enrollment_username_env_var is not None else ''
|
11021
|
+
'''
|
11022
|
+
username that used by the EJBCA during enrollment. This can be left out.
|
11023
|
+
If so, the username must be auto-generated on the Keyfactor side.
|
11024
|
+
'''
|
11025
|
+
self.id = id if id is not None else ''
|
11026
|
+
'''
|
11027
|
+
Unique identifier of the SecretStore.
|
11028
|
+
'''
|
11029
|
+
self.key_file_path = key_file_path if key_file_path is not None else ''
|
11030
|
+
'''
|
11031
|
+
Path to private key in PEM format. This file should contain the private key associated with the
|
11032
|
+
client certificate configured in CertificateFile.
|
11033
|
+
'''
|
11034
|
+
self.name = name if name is not None else ''
|
11035
|
+
'''
|
11036
|
+
Unique human-readable name of the SecretStore.
|
11037
|
+
'''
|
11038
|
+
self.server_address = server_address if server_address is not None else ''
|
11039
|
+
'''
|
11040
|
+
the host of the Key Factor CA
|
11041
|
+
'''
|
11042
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
11043
|
+
'''
|
11044
|
+
Tags is a map of key, value pairs.
|
11045
|
+
'''
|
11046
|
+
|
11047
|
+
def __repr__(self):
|
11048
|
+
return '<sdm.KeyfactorSSHStore ' + \
|
11049
|
+
'ca_file_path: ' + repr(self.ca_file_path) + ' ' +\
|
11050
|
+
'certificate_file_path: ' + repr(self.certificate_file_path) + ' ' +\
|
11051
|
+
'default_certificate_authority_name: ' + repr(self.default_certificate_authority_name) + ' ' +\
|
11052
|
+
'default_certificate_profile_name: ' + repr(self.default_certificate_profile_name) + ' ' +\
|
11053
|
+
'default_end_entity_profile_name: ' + repr(self.default_end_entity_profile_name) + ' ' +\
|
11054
|
+
'enrollment_code_env_var: ' + repr(self.enrollment_code_env_var) + ' ' +\
|
11055
|
+
'enrollment_username_env_var: ' + repr(self.enrollment_username_env_var) + ' ' +\
|
11056
|
+
'id: ' + repr(self.id) + ' ' +\
|
11057
|
+
'key_file_path: ' + repr(self.key_file_path) + ' ' +\
|
11058
|
+
'name: ' + repr(self.name) + ' ' +\
|
11059
|
+
'server_address: ' + repr(self.server_address) + ' ' +\
|
11060
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
11061
|
+
'>'
|
11062
|
+
|
11063
|
+
def to_dict(self):
|
11064
|
+
return {
|
11065
|
+
'ca_file_path': self.ca_file_path,
|
11066
|
+
'certificate_file_path': self.certificate_file_path,
|
11067
|
+
'default_certificate_authority_name':
|
11068
|
+
self.default_certificate_authority_name,
|
11069
|
+
'default_certificate_profile_name':
|
11070
|
+
self.default_certificate_profile_name,
|
11071
|
+
'default_end_entity_profile_name':
|
11072
|
+
self.default_end_entity_profile_name,
|
11073
|
+
'enrollment_code_env_var': self.enrollment_code_env_var,
|
11074
|
+
'enrollment_username_env_var': self.enrollment_username_env_var,
|
11075
|
+
'id': self.id,
|
11076
|
+
'key_file_path': self.key_file_path,
|
11077
|
+
'name': self.name,
|
11078
|
+
'server_address': self.server_address,
|
11079
|
+
'tags': self.tags,
|
11080
|
+
}
|
11081
|
+
|
11082
|
+
@classmethod
|
11083
|
+
def from_dict(cls, d):
|
11084
|
+
return cls(
|
11085
|
+
ca_file_path=d.get('ca_file_path'),
|
11086
|
+
certificate_file_path=d.get('certificate_file_path'),
|
11087
|
+
default_certificate_authority_name=d.get(
|
11088
|
+
'default_certificate_authority_name'),
|
11089
|
+
default_certificate_profile_name=d.get(
|
11090
|
+
'default_certificate_profile_name'),
|
11091
|
+
default_end_entity_profile_name=d.get(
|
11092
|
+
'default_end_entity_profile_name'),
|
11093
|
+
enrollment_code_env_var=d.get('enrollment_code_env_var'),
|
11094
|
+
enrollment_username_env_var=d.get('enrollment_username_env_var'),
|
11095
|
+
id=d.get('id'),
|
11096
|
+
key_file_path=d.get('key_file_path'),
|
11097
|
+
name=d.get('name'),
|
11098
|
+
server_address=d.get('server_address'),
|
11099
|
+
tags=d.get('tags'),
|
11100
|
+
)
|
11101
|
+
|
11102
|
+
|
11103
|
+
class KeyfactorX509Store:
|
11104
|
+
__slots__ = [
|
11105
|
+
'ca_file_path',
|
11106
|
+
'certificate_file_path',
|
11107
|
+
'default_certificate_authority_name',
|
11108
|
+
'default_certificate_profile_name',
|
11109
|
+
'default_end_entity_profile_name',
|
11110
|
+
'enrollment_code_env_var',
|
11111
|
+
'enrollment_username_env_var',
|
11112
|
+
'id',
|
11113
|
+
'key_file_path',
|
11114
|
+
'name',
|
11115
|
+
'server_address',
|
11116
|
+
'tags',
|
11117
|
+
]
|
11118
|
+
|
11119
|
+
def __init__(
|
11120
|
+
self,
|
11121
|
+
ca_file_path=None,
|
11122
|
+
certificate_file_path=None,
|
11123
|
+
default_certificate_authority_name=None,
|
11124
|
+
default_certificate_profile_name=None,
|
11125
|
+
default_end_entity_profile_name=None,
|
11126
|
+
enrollment_code_env_var=None,
|
11127
|
+
enrollment_username_env_var=None,
|
11128
|
+
id=None,
|
11129
|
+
key_file_path=None,
|
10665
11130
|
name=None,
|
10666
11131
|
server_address=None,
|
10667
11132
|
tags=None,
|
@@ -10788,11 +11253,11 @@ class Kubernetes:
|
|
10788
11253
|
'healthy',
|
10789
11254
|
'hostname',
|
10790
11255
|
'id',
|
11256
|
+
'identity_alias_healthcheck_username',
|
11257
|
+
'identity_set_id',
|
10791
11258
|
'name',
|
10792
11259
|
'port',
|
10793
11260
|
'port_override',
|
10794
|
-
'remote_identity_group_id',
|
10795
|
-
'remote_identity_healthcheck_username',
|
10796
11261
|
'secret_store_id',
|
10797
11262
|
'subdomain',
|
10798
11263
|
'tags',
|
@@ -10809,11 +11274,11 @@ class Kubernetes:
|
|
10809
11274
|
healthy=None,
|
10810
11275
|
hostname=None,
|
10811
11276
|
id=None,
|
11277
|
+
identity_alias_healthcheck_username=None,
|
11278
|
+
identity_set_id=None,
|
10812
11279
|
name=None,
|
10813
11280
|
port=None,
|
10814
11281
|
port_override=None,
|
10815
|
-
remote_identity_group_id=None,
|
10816
|
-
remote_identity_healthcheck_username=None,
|
10817
11282
|
secret_store_id=None,
|
10818
11283
|
subdomain=None,
|
10819
11284
|
tags=None,
|
@@ -10854,6 +11319,14 @@ class Kubernetes:
|
|
10854
11319
|
'''
|
10855
11320
|
Unique identifier of the Resource.
|
10856
11321
|
'''
|
11322
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
11323
|
+
'''
|
11324
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
11325
|
+
'''
|
11326
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
11327
|
+
'''
|
11328
|
+
The ID of the identity set to use for identity connections.
|
11329
|
+
'''
|
10857
11330
|
self.name = name if name is not None else ''
|
10858
11331
|
'''
|
10859
11332
|
Unique human-readable name of the Resource.
|
@@ -10866,14 +11339,6 @@ class Kubernetes:
|
|
10866
11339
|
'''
|
10867
11340
|
The local port used by clients to connect to this resource.
|
10868
11341
|
'''
|
10869
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
10870
|
-
'''
|
10871
|
-
The ID of the remote identity group to use for remote identity connections.
|
10872
|
-
'''
|
10873
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
10874
|
-
'''
|
10875
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
10876
|
-
'''
|
10877
11342
|
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
10878
11343
|
'''
|
10879
11344
|
ID of the secret store containing credentials for this resource, if any.
|
@@ -10898,11 +11363,11 @@ class Kubernetes:
|
|
10898
11363
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
10899
11364
|
'hostname: ' + repr(self.hostname) + ' ' +\
|
10900
11365
|
'id: ' + repr(self.id) + ' ' +\
|
11366
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
11367
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
10901
11368
|
'name: ' + repr(self.name) + ' ' +\
|
10902
11369
|
'port: ' + repr(self.port) + ' ' +\
|
10903
11370
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
10904
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
10905
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
10906
11371
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
10907
11372
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
10908
11373
|
'tags: ' + repr(self.tags) + ' ' +\
|
@@ -10919,12 +11384,12 @@ class Kubernetes:
|
|
10919
11384
|
'healthy': self.healthy,
|
10920
11385
|
'hostname': self.hostname,
|
10921
11386
|
'id': self.id,
|
11387
|
+
'identity_alias_healthcheck_username':
|
11388
|
+
self.identity_alias_healthcheck_username,
|
11389
|
+
'identity_set_id': self.identity_set_id,
|
10922
11390
|
'name': self.name,
|
10923
11391
|
'port': self.port,
|
10924
11392
|
'port_override': self.port_override,
|
10925
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
10926
|
-
'remote_identity_healthcheck_username':
|
10927
|
-
self.remote_identity_healthcheck_username,
|
10928
11393
|
'secret_store_id': self.secret_store_id,
|
10929
11394
|
'subdomain': self.subdomain,
|
10930
11395
|
'tags': self.tags,
|
@@ -10942,12 +11407,12 @@ class Kubernetes:
|
|
10942
11407
|
healthy=d.get('healthy'),
|
10943
11408
|
hostname=d.get('hostname'),
|
10944
11409
|
id=d.get('id'),
|
11410
|
+
identity_alias_healthcheck_username=d.get(
|
11411
|
+
'identity_alias_healthcheck_username'),
|
11412
|
+
identity_set_id=d.get('identity_set_id'),
|
10945
11413
|
name=d.get('name'),
|
10946
11414
|
port=d.get('port'),
|
10947
11415
|
port_override=d.get('port_override'),
|
10948
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
10949
|
-
remote_identity_healthcheck_username=d.get(
|
10950
|
-
'remote_identity_healthcheck_username'),
|
10951
11416
|
secret_store_id=d.get('secret_store_id'),
|
10952
11417
|
subdomain=d.get('subdomain'),
|
10953
11418
|
tags=d.get('tags'),
|
@@ -11110,11 +11575,11 @@ class KubernetesServiceAccount:
|
|
11110
11575
|
'healthy',
|
11111
11576
|
'hostname',
|
11112
11577
|
'id',
|
11578
|
+
'identity_alias_healthcheck_username',
|
11579
|
+
'identity_set_id',
|
11113
11580
|
'name',
|
11114
11581
|
'port',
|
11115
11582
|
'port_override',
|
11116
|
-
'remote_identity_group_id',
|
11117
|
-
'remote_identity_healthcheck_username',
|
11118
11583
|
'secret_store_id',
|
11119
11584
|
'subdomain',
|
11120
11585
|
'tags',
|
@@ -11129,11 +11594,11 @@ class KubernetesServiceAccount:
|
|
11129
11594
|
healthy=None,
|
11130
11595
|
hostname=None,
|
11131
11596
|
id=None,
|
11597
|
+
identity_alias_healthcheck_username=None,
|
11598
|
+
identity_set_id=None,
|
11132
11599
|
name=None,
|
11133
11600
|
port=None,
|
11134
11601
|
port_override=None,
|
11135
|
-
remote_identity_group_id=None,
|
11136
|
-
remote_identity_healthcheck_username=None,
|
11137
11602
|
secret_store_id=None,
|
11138
11603
|
subdomain=None,
|
11139
11604
|
tags=None,
|
@@ -11163,6 +11628,14 @@ class KubernetesServiceAccount:
|
|
11163
11628
|
'''
|
11164
11629
|
Unique identifier of the Resource.
|
11165
11630
|
'''
|
11631
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
11632
|
+
'''
|
11633
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
11634
|
+
'''
|
11635
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
11636
|
+
'''
|
11637
|
+
The ID of the identity set to use for identity connections.
|
11638
|
+
'''
|
11166
11639
|
self.name = name if name is not None else ''
|
11167
11640
|
'''
|
11168
11641
|
Unique human-readable name of the Resource.
|
@@ -11175,14 +11648,6 @@ class KubernetesServiceAccount:
|
|
11175
11648
|
'''
|
11176
11649
|
The local port used by clients to connect to this resource.
|
11177
11650
|
'''
|
11178
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
11179
|
-
'''
|
11180
|
-
The ID of the remote identity group to use for remote identity connections.
|
11181
|
-
'''
|
11182
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
11183
|
-
'''
|
11184
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
11185
|
-
'''
|
11186
11651
|
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
11187
11652
|
'''
|
11188
11653
|
ID of the secret store containing credentials for this resource, if any.
|
@@ -11208,11 +11673,11 @@ class KubernetesServiceAccount:
|
|
11208
11673
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
11209
11674
|
'hostname: ' + repr(self.hostname) + ' ' +\
|
11210
11675
|
'id: ' + repr(self.id) + ' ' +\
|
11676
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
11677
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
11211
11678
|
'name: ' + repr(self.name) + ' ' +\
|
11212
11679
|
'port: ' + repr(self.port) + ' ' +\
|
11213
11680
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
11214
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
11215
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
11216
11681
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
11217
11682
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
11218
11683
|
'tags: ' + repr(self.tags) + ' ' +\
|
@@ -11227,12 +11692,12 @@ class KubernetesServiceAccount:
|
|
11227
11692
|
'healthy': self.healthy,
|
11228
11693
|
'hostname': self.hostname,
|
11229
11694
|
'id': self.id,
|
11695
|
+
'identity_alias_healthcheck_username':
|
11696
|
+
self.identity_alias_healthcheck_username,
|
11697
|
+
'identity_set_id': self.identity_set_id,
|
11230
11698
|
'name': self.name,
|
11231
11699
|
'port': self.port,
|
11232
11700
|
'port_override': self.port_override,
|
11233
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
11234
|
-
'remote_identity_healthcheck_username':
|
11235
|
-
self.remote_identity_healthcheck_username,
|
11236
11701
|
'secret_store_id': self.secret_store_id,
|
11237
11702
|
'subdomain': self.subdomain,
|
11238
11703
|
'tags': self.tags,
|
@@ -11248,12 +11713,12 @@ class KubernetesServiceAccount:
|
|
11248
11713
|
healthy=d.get('healthy'),
|
11249
11714
|
hostname=d.get('hostname'),
|
11250
11715
|
id=d.get('id'),
|
11716
|
+
identity_alias_healthcheck_username=d.get(
|
11717
|
+
'identity_alias_healthcheck_username'),
|
11718
|
+
identity_set_id=d.get('identity_set_id'),
|
11251
11719
|
name=d.get('name'),
|
11252
11720
|
port=d.get('port'),
|
11253
11721
|
port_override=d.get('port_override'),
|
11254
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
11255
|
-
remote_identity_healthcheck_username=d.get(
|
11256
|
-
'remote_identity_healthcheck_username'),
|
11257
11722
|
secret_store_id=d.get('secret_store_id'),
|
11258
11723
|
subdomain=d.get('subdomain'),
|
11259
11724
|
tags=d.get('tags'),
|
@@ -16155,11 +16620,11 @@ class RDPCert:
|
|
16155
16620
|
'healthy',
|
16156
16621
|
'hostname',
|
16157
16622
|
'id',
|
16623
|
+
'identity_alias_healthcheck_username',
|
16624
|
+
'identity_set_id',
|
16158
16625
|
'name',
|
16159
16626
|
'port',
|
16160
16627
|
'port_override',
|
16161
|
-
'remote_identity_group_id',
|
16162
|
-
'remote_identity_healthcheck_username',
|
16163
16628
|
'secret_store_id',
|
16164
16629
|
'subdomain',
|
16165
16630
|
'tags',
|
@@ -16173,11 +16638,11 @@ class RDPCert:
|
|
16173
16638
|
healthy=None,
|
16174
16639
|
hostname=None,
|
16175
16640
|
id=None,
|
16641
|
+
identity_alias_healthcheck_username=None,
|
16642
|
+
identity_set_id=None,
|
16176
16643
|
name=None,
|
16177
16644
|
port=None,
|
16178
16645
|
port_override=None,
|
16179
|
-
remote_identity_group_id=None,
|
16180
|
-
remote_identity_healthcheck_username=None,
|
16181
16646
|
secret_store_id=None,
|
16182
16647
|
subdomain=None,
|
16183
16648
|
tags=None,
|
@@ -16203,6 +16668,14 @@ class RDPCert:
|
|
16203
16668
|
'''
|
16204
16669
|
Unique identifier of the Resource.
|
16205
16670
|
'''
|
16671
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
16672
|
+
'''
|
16673
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
16674
|
+
'''
|
16675
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
16676
|
+
'''
|
16677
|
+
The ID of the identity set to use for identity connections.
|
16678
|
+
'''
|
16206
16679
|
self.name = name if name is not None else ''
|
16207
16680
|
'''
|
16208
16681
|
Unique human-readable name of the Resource.
|
@@ -16215,14 +16688,6 @@ class RDPCert:
|
|
16215
16688
|
'''
|
16216
16689
|
The local port used by clients to connect to this resource.
|
16217
16690
|
'''
|
16218
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
16219
|
-
'''
|
16220
|
-
The ID of the remote identity group to use for remote identity connections.
|
16221
|
-
'''
|
16222
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
16223
|
-
'''
|
16224
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
16225
|
-
'''
|
16226
16691
|
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
16227
16692
|
'''
|
16228
16693
|
ID of the secret store containing credentials for this resource, if any.
|
@@ -16247,11 +16712,11 @@ class RDPCert:
|
|
16247
16712
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
16248
16713
|
'hostname: ' + repr(self.hostname) + ' ' +\
|
16249
16714
|
'id: ' + repr(self.id) + ' ' +\
|
16715
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
16716
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
16250
16717
|
'name: ' + repr(self.name) + ' ' +\
|
16251
16718
|
'port: ' + repr(self.port) + ' ' +\
|
16252
16719
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
16253
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
16254
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
16255
16720
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
16256
16721
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
16257
16722
|
'tags: ' + repr(self.tags) + ' ' +\
|
@@ -16265,12 +16730,12 @@ class RDPCert:
|
|
16265
16730
|
'healthy': self.healthy,
|
16266
16731
|
'hostname': self.hostname,
|
16267
16732
|
'id': self.id,
|
16733
|
+
'identity_alias_healthcheck_username':
|
16734
|
+
self.identity_alias_healthcheck_username,
|
16735
|
+
'identity_set_id': self.identity_set_id,
|
16268
16736
|
'name': self.name,
|
16269
16737
|
'port': self.port,
|
16270
16738
|
'port_override': self.port_override,
|
16271
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
16272
|
-
'remote_identity_healthcheck_username':
|
16273
|
-
self.remote_identity_healthcheck_username,
|
16274
16739
|
'secret_store_id': self.secret_store_id,
|
16275
16740
|
'subdomain': self.subdomain,
|
16276
16741
|
'tags': self.tags,
|
@@ -16285,12 +16750,12 @@ class RDPCert:
|
|
16285
16750
|
healthy=d.get('healthy'),
|
16286
16751
|
hostname=d.get('hostname'),
|
16287
16752
|
id=d.get('id'),
|
16753
|
+
identity_alias_healthcheck_username=d.get(
|
16754
|
+
'identity_alias_healthcheck_username'),
|
16755
|
+
identity_set_id=d.get('identity_set_id'),
|
16288
16756
|
name=d.get('name'),
|
16289
16757
|
port=d.get('port'),
|
16290
16758
|
port_override=d.get('port_override'),
|
16291
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
16292
|
-
remote_identity_healthcheck_username=d.get(
|
16293
|
-
'remote_identity_healthcheck_username'),
|
16294
16759
|
secret_store_id=d.get('secret_store_id'),
|
16295
16760
|
subdomain=d.get('subdomain'),
|
16296
16761
|
tags=d.get('tags'),
|
@@ -19421,13 +19886,13 @@ class SSHCert:
|
|
19421
19886
|
'healthy',
|
19422
19887
|
'hostname',
|
19423
19888
|
'id',
|
19889
|
+
'identity_alias_healthcheck_username',
|
19890
|
+
'identity_set_id',
|
19424
19891
|
'key_type',
|
19425
19892
|
'name',
|
19426
19893
|
'port',
|
19427
19894
|
'port_forwarding',
|
19428
19895
|
'port_override',
|
19429
|
-
'remote_identity_group_id',
|
19430
|
-
'remote_identity_healthcheck_username',
|
19431
19896
|
'secret_store_id',
|
19432
19897
|
'subdomain',
|
19433
19898
|
'tags',
|
@@ -19442,13 +19907,13 @@ class SSHCert:
|
|
19442
19907
|
healthy=None,
|
19443
19908
|
hostname=None,
|
19444
19909
|
id=None,
|
19910
|
+
identity_alias_healthcheck_username=None,
|
19911
|
+
identity_set_id=None,
|
19445
19912
|
key_type=None,
|
19446
19913
|
name=None,
|
19447
19914
|
port=None,
|
19448
19915
|
port_forwarding=None,
|
19449
19916
|
port_override=None,
|
19450
|
-
remote_identity_group_id=None,
|
19451
|
-
remote_identity_healthcheck_username=None,
|
19452
19917
|
secret_store_id=None,
|
19453
19918
|
subdomain=None,
|
19454
19919
|
tags=None,
|
@@ -19478,6 +19943,14 @@ class SSHCert:
|
|
19478
19943
|
'''
|
19479
19944
|
Unique identifier of the Resource.
|
19480
19945
|
'''
|
19946
|
+
self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
|
19947
|
+
'''
|
19948
|
+
The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
|
19949
|
+
'''
|
19950
|
+
self.identity_set_id = identity_set_id if identity_set_id is not None else ''
|
19951
|
+
'''
|
19952
|
+
The ID of the identity set to use for identity connections.
|
19953
|
+
'''
|
19481
19954
|
self.key_type = key_type if key_type is not None else ''
|
19482
19955
|
'''
|
19483
19956
|
The key type to use e.g. rsa-2048 or ed25519
|
@@ -19498,14 +19971,6 @@ class SSHCert:
|
|
19498
19971
|
'''
|
19499
19972
|
The local port used by clients to connect to this resource.
|
19500
19973
|
'''
|
19501
|
-
self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
|
19502
|
-
'''
|
19503
|
-
The ID of the remote identity group to use for remote identity connections.
|
19504
|
-
'''
|
19505
|
-
self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
|
19506
|
-
'''
|
19507
|
-
The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
|
19508
|
-
'''
|
19509
19974
|
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
19510
19975
|
'''
|
19511
19976
|
ID of the secret store containing credentials for this resource, if any.
|
@@ -19531,13 +19996,13 @@ class SSHCert:
|
|
19531
19996
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
19532
19997
|
'hostname: ' + repr(self.hostname) + ' ' +\
|
19533
19998
|
'id: ' + repr(self.id) + ' ' +\
|
19999
|
+
'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
|
20000
|
+
'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
|
19534
20001
|
'key_type: ' + repr(self.key_type) + ' ' +\
|
19535
20002
|
'name: ' + repr(self.name) + ' ' +\
|
19536
20003
|
'port: ' + repr(self.port) + ' ' +\
|
19537
20004
|
'port_forwarding: ' + repr(self.port_forwarding) + ' ' +\
|
19538
20005
|
'port_override: ' + repr(self.port_override) + ' ' +\
|
19539
|
-
'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
|
19540
|
-
'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
|
19541
20006
|
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
19542
20007
|
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
19543
20008
|
'tags: ' + repr(self.tags) + ' ' +\
|
@@ -19553,14 +20018,14 @@ class SSHCert:
|
|
19553
20018
|
'healthy': self.healthy,
|
19554
20019
|
'hostname': self.hostname,
|
19555
20020
|
'id': self.id,
|
20021
|
+
'identity_alias_healthcheck_username':
|
20022
|
+
self.identity_alias_healthcheck_username,
|
20023
|
+
'identity_set_id': self.identity_set_id,
|
19556
20024
|
'key_type': self.key_type,
|
19557
20025
|
'name': self.name,
|
19558
20026
|
'port': self.port,
|
19559
20027
|
'port_forwarding': self.port_forwarding,
|
19560
20028
|
'port_override': self.port_override,
|
19561
|
-
'remote_identity_group_id': self.remote_identity_group_id,
|
19562
|
-
'remote_identity_healthcheck_username':
|
19563
|
-
self.remote_identity_healthcheck_username,
|
19564
20029
|
'secret_store_id': self.secret_store_id,
|
19565
20030
|
'subdomain': self.subdomain,
|
19566
20031
|
'tags': self.tags,
|
@@ -19577,14 +20042,14 @@ class SSHCert:
|
|
19577
20042
|
healthy=d.get('healthy'),
|
19578
20043
|
hostname=d.get('hostname'),
|
19579
20044
|
id=d.get('id'),
|
20045
|
+
identity_alias_healthcheck_username=d.get(
|
20046
|
+
'identity_alias_healthcheck_username'),
|
20047
|
+
identity_set_id=d.get('identity_set_id'),
|
19580
20048
|
key_type=d.get('key_type'),
|
19581
20049
|
name=d.get('name'),
|
19582
20050
|
port=d.get('port'),
|
19583
20051
|
port_forwarding=d.get('port_forwarding'),
|
19584
20052
|
port_override=d.get('port_override'),
|
19585
|
-
remote_identity_group_id=d.get('remote_identity_group_id'),
|
19586
|
-
remote_identity_healthcheck_username=d.get(
|
19587
|
-
'remote_identity_healthcheck_username'),
|
19588
20053
|
secret_store_id=d.get('secret_store_id'),
|
19589
20054
|
subdomain=d.get('subdomain'),
|
19590
20055
|
tags=d.get('tags'),
|