strongdm 8.4.0__zip → 9.1.0__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (135) hide show
  1. {strongdm-8.4.0 → strongdm-9.1.0}/PKG-INFO +2 -2
  2. {strongdm-8.4.0 → strongdm-9.1.0}/setup.py +2 -2
  3. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/client.py +45 -1
  4. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/drivers_pb2.py +212 -216
  5. strongdm-9.1.0/strongdm/identity_aliases_history_pb2.py +100 -0
  6. strongdm-9.1.0/strongdm/identity_aliases_history_pb2_grpc.py +84 -0
  7. strongdm-9.1.0/strongdm/identity_aliases_pb2.py +220 -0
  8. strongdm-9.1.0/strongdm/identity_aliases_pb2_grpc.py +223 -0
  9. strongdm-9.1.0/strongdm/identity_sets_history_pb2.py +100 -0
  10. strongdm-9.1.0/strongdm/identity_sets_history_pb2_grpc.py +84 -0
  11. strongdm-9.1.0/strongdm/identity_sets_pb2.py +216 -0
  12. strongdm-9.1.0/strongdm/identity_sets_pb2_grpc.py +223 -0
  13. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/models.py +984 -370
  14. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/plumbing.py +525 -72
  15. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/remote_identities_history_pb2.py +3 -3
  16. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/remote_identities_pb2.py +3 -3
  17. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/remote_identity_groups_history_pb2.py +3 -3
  18. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/remote_identity_groups_pb2.py +3 -3
  19. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/svc.py +517 -0
  20. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm.egg-info/PKG-INFO +2 -2
  21. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm.egg-info/SOURCES.txt +8 -0
  22. {strongdm-8.4.0 → strongdm-9.1.0}/LICENSE +0 -0
  23. {strongdm-8.4.0 → strongdm-9.1.0}/README.md +0 -0
  24. {strongdm-8.4.0 → strongdm-9.1.0}/setup.cfg +0 -0
  25. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/__init__.py +0 -0
  26. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/access_request_events_history_pb2.py +0 -0
  27. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
  28. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/access_requests_history_pb2.py +0 -0
  29. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
  30. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/access_requests_pb2.py +0 -0
  31. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/access_requests_pb2_grpc.py +0 -0
  32. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_attachments_history_pb2.py +0 -0
  33. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  34. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_attachments_pb2.py +0 -0
  35. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
  36. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_grants_history_pb2.py +0 -0
  37. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  38. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_grants_pb2.py +0 -0
  39. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_grants_pb2_grpc.py +0 -0
  40. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_permissions_pb2.py +0 -0
  41. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
  42. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_resources_history_pb2.py +0 -0
  43. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  44. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_resources_pb2.py +0 -0
  45. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/account_resources_pb2_grpc.py +0 -0
  46. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/accounts_history_pb2.py +0 -0
  47. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
  48. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/accounts_pb2.py +0 -0
  49. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/accounts_pb2_grpc.py +0 -0
  50. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/activities_pb2.py +0 -0
  51. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/activities_pb2_grpc.py +0 -0
  52. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
  53. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
  54. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
  55. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
  56. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
  57. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
  58. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
  59. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
  60. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflows_history_pb2.py +0 -0
  61. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
  62. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflows_pb2.py +0 -0
  63. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
  64. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/constants.py +0 -0
  65. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/control_panel_pb2.py +0 -0
  66. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/control_panel_pb2_grpc.py +0 -0
  67. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/drivers_pb2_grpc.py +0 -0
  68. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/errors.py +0 -0
  69. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/nodes_history_pb2.py +0 -0
  70. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
  71. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/nodes_pb2.py +0 -0
  72. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/nodes_pb2_grpc.py +0 -0
  73. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/options_pb2.py +0 -0
  74. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/options_pb2_grpc.py +0 -0
  75. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/organization_history_pb2.py +0 -0
  76. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/organization_history_pb2_grpc.py +0 -0
  77. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/peering_group_nodes_pb2.py +0 -0
  78. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
  79. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/peering_group_peers_pb2.py +0 -0
  80. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
  81. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/peering_group_resources_pb2.py +0 -0
  82. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
  83. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/peering_groups_pb2.py +0 -0
  84. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
  85. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/queries_pb2.py +0 -0
  86. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/queries_pb2_grpc.py +0 -0
  87. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  88. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
  89. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  90. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  91. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/replays_pb2.py +0 -0
  92. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/replays_pb2_grpc.py +0 -0
  93. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/resources_history_pb2.py +0 -0
  94. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/resources_history_pb2_grpc.py +0 -0
  95. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/resources_pb2.py +0 -0
  96. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/resources_pb2_grpc.py +0 -0
  97. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/role_resources_history_pb2.py +0 -0
  98. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  99. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/role_resources_pb2.py +0 -0
  100. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/role_resources_pb2_grpc.py +0 -0
  101. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/roles_history_pb2.py +0 -0
  102. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/roles_history_pb2_grpc.py +0 -0
  103. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/roles_pb2.py +0 -0
  104. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/roles_pb2_grpc.py +0 -0
  105. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/secret_store_healths_pb2.py +0 -0
  106. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
  107. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/secret_store_types_pb2.py +0 -0
  108. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  109. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/secret_stores_history_pb2.py +0 -0
  110. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  111. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/secret_stores_pb2.py +0 -0
  112. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
  113. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/spec_pb2.py +0 -0
  114. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/spec_pb2_grpc.py +0 -0
  115. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/tags_pb2.py +0 -0
  116. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/tags_pb2_grpc.py +0 -0
  117. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
  118. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
  119. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_approvers_pb2.py +0 -0
  120. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
  121. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
  122. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
  123. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_assignments_pb2.py +0 -0
  124. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
  125. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_roles_history_pb2.py +0 -0
  126. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
  127. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_roles_pb2.py +0 -0
  128. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
  129. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflows_history_pb2.py +0 -0
  130. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
  131. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflows_pb2.py +0 -0
  132. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm/workflows_pb2_grpc.py +0 -0
  133. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm.egg-info/dependency_links.txt +0 -0
  134. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm.egg-info/requires.txt +0 -0
  135. {strongdm-8.4.0 → strongdm-9.1.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -29,11 +29,11 @@ class AKS:
29
29
  'healthy',
30
30
  'hostname',
31
31
  'id',
32
+ 'identity_alias_healthcheck_username',
33
+ 'identity_set_id',
32
34
  'name',
33
35
  'port',
34
36
  'port_override',
35
- 'remote_identity_group_id',
36
- 'remote_identity_healthcheck_username',
37
37
  'secret_store_id',
38
38
  'subdomain',
39
39
  'tags',
@@ -50,11 +50,11 @@ class AKS:
50
50
  healthy=None,
51
51
  hostname=None,
52
52
  id=None,
53
+ identity_alias_healthcheck_username=None,
54
+ identity_set_id=None,
53
55
  name=None,
54
56
  port=None,
55
57
  port_override=None,
56
- remote_identity_group_id=None,
57
- remote_identity_healthcheck_username=None,
58
58
  secret_store_id=None,
59
59
  subdomain=None,
60
60
  tags=None,
@@ -95,6 +95,14 @@ class AKS:
95
95
  '''
96
96
  Unique identifier of the Resource.
97
97
  '''
98
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
99
+ '''
100
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
101
+ '''
102
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
103
+ '''
104
+ The ID of the identity set to use for identity connections.
105
+ '''
98
106
  self.name = name if name is not None else ''
99
107
  '''
100
108
  Unique human-readable name of the Resource.
@@ -107,14 +115,6 @@ class AKS:
107
115
  '''
108
116
  The local port used by clients to connect to this resource.
109
117
  '''
110
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
111
- '''
112
- The ID of the remote identity group to use for remote identity connections.
113
- '''
114
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
115
- '''
116
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
117
- '''
118
118
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
119
119
  '''
120
120
  ID of the secret store containing credentials for this resource, if any.
@@ -139,11 +139,11 @@ class AKS:
139
139
  'healthy: ' + repr(self.healthy) + ' ' +\
140
140
  'hostname: ' + repr(self.hostname) + ' ' +\
141
141
  'id: ' + repr(self.id) + ' ' +\
142
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
143
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
142
144
  'name: ' + repr(self.name) + ' ' +\
143
145
  'port: ' + repr(self.port) + ' ' +\
144
146
  'port_override: ' + repr(self.port_override) + ' ' +\
145
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
146
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
147
147
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
148
148
  'subdomain: ' + repr(self.subdomain) + ' ' +\
149
149
  'tags: ' + repr(self.tags) + ' ' +\
@@ -160,12 +160,12 @@ class AKS:
160
160
  'healthy': self.healthy,
161
161
  'hostname': self.hostname,
162
162
  'id': self.id,
163
+ 'identity_alias_healthcheck_username':
164
+ self.identity_alias_healthcheck_username,
165
+ 'identity_set_id': self.identity_set_id,
163
166
  'name': self.name,
164
167
  'port': self.port,
165
168
  'port_override': self.port_override,
166
- 'remote_identity_group_id': self.remote_identity_group_id,
167
- 'remote_identity_healthcheck_username':
168
- self.remote_identity_healthcheck_username,
169
169
  'secret_store_id': self.secret_store_id,
170
170
  'subdomain': self.subdomain,
171
171
  'tags': self.tags,
@@ -183,12 +183,12 @@ class AKS:
183
183
  healthy=d.get('healthy'),
184
184
  hostname=d.get('hostname'),
185
185
  id=d.get('id'),
186
+ identity_alias_healthcheck_username=d.get(
187
+ 'identity_alias_healthcheck_username'),
188
+ identity_set_id=d.get('identity_set_id'),
186
189
  name=d.get('name'),
187
190
  port=d.get('port'),
188
191
  port_override=d.get('port_override'),
189
- remote_identity_group_id=d.get('remote_identity_group_id'),
190
- remote_identity_healthcheck_username=d.get(
191
- 'remote_identity_healthcheck_username'),
192
192
  secret_store_id=d.get('secret_store_id'),
193
193
  subdomain=d.get('subdomain'),
194
194
  tags=d.get('tags'),
@@ -351,11 +351,11 @@ class AKSServiceAccount:
351
351
  'healthy',
352
352
  'hostname',
353
353
  'id',
354
+ 'identity_alias_healthcheck_username',
355
+ 'identity_set_id',
354
356
  'name',
355
357
  'port',
356
358
  'port_override',
357
- 'remote_identity_group_id',
358
- 'remote_identity_healthcheck_username',
359
359
  'secret_store_id',
360
360
  'subdomain',
361
361
  'tags',
@@ -370,11 +370,11 @@ class AKSServiceAccount:
370
370
  healthy=None,
371
371
  hostname=None,
372
372
  id=None,
373
+ identity_alias_healthcheck_username=None,
374
+ identity_set_id=None,
373
375
  name=None,
374
376
  port=None,
375
377
  port_override=None,
376
- remote_identity_group_id=None,
377
- remote_identity_healthcheck_username=None,
378
378
  secret_store_id=None,
379
379
  subdomain=None,
380
380
  tags=None,
@@ -404,6 +404,14 @@ class AKSServiceAccount:
404
404
  '''
405
405
  Unique identifier of the Resource.
406
406
  '''
407
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
408
+ '''
409
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
410
+ '''
411
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
412
+ '''
413
+ The ID of the identity set to use for identity connections.
414
+ '''
407
415
  self.name = name if name is not None else ''
408
416
  '''
409
417
  Unique human-readable name of the Resource.
@@ -416,14 +424,6 @@ class AKSServiceAccount:
416
424
  '''
417
425
  The local port used by clients to connect to this resource.
418
426
  '''
419
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
420
- '''
421
- The ID of the remote identity group to use for remote identity connections.
422
- '''
423
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
424
- '''
425
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
426
- '''
427
427
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
428
428
  '''
429
429
  ID of the secret store containing credentials for this resource, if any.
@@ -449,11 +449,11 @@ class AKSServiceAccount:
449
449
  'healthy: ' + repr(self.healthy) + ' ' +\
450
450
  'hostname: ' + repr(self.hostname) + ' ' +\
451
451
  'id: ' + repr(self.id) + ' ' +\
452
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
453
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
452
454
  'name: ' + repr(self.name) + ' ' +\
453
455
  'port: ' + repr(self.port) + ' ' +\
454
456
  'port_override: ' + repr(self.port_override) + ' ' +\
455
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
456
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
457
457
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
458
458
  'subdomain: ' + repr(self.subdomain) + ' ' +\
459
459
  'tags: ' + repr(self.tags) + ' ' +\
@@ -468,12 +468,12 @@ class AKSServiceAccount:
468
468
  'healthy': self.healthy,
469
469
  'hostname': self.hostname,
470
470
  'id': self.id,
471
+ 'identity_alias_healthcheck_username':
472
+ self.identity_alias_healthcheck_username,
473
+ 'identity_set_id': self.identity_set_id,
471
474
  'name': self.name,
472
475
  'port': self.port,
473
476
  'port_override': self.port_override,
474
- 'remote_identity_group_id': self.remote_identity_group_id,
475
- 'remote_identity_healthcheck_username':
476
- self.remote_identity_healthcheck_username,
477
477
  'secret_store_id': self.secret_store_id,
478
478
  'subdomain': self.subdomain,
479
479
  'tags': self.tags,
@@ -489,12 +489,12 @@ class AKSServiceAccount:
489
489
  healthy=d.get('healthy'),
490
490
  hostname=d.get('hostname'),
491
491
  id=d.get('id'),
492
+ identity_alias_healthcheck_username=d.get(
493
+ 'identity_alias_healthcheck_username'),
494
+ identity_set_id=d.get('identity_set_id'),
492
495
  name=d.get('name'),
493
496
  port=d.get('port'),
494
497
  port_override=d.get('port_override'),
495
- remote_identity_group_id=d.get('remote_identity_group_id'),
496
- remote_identity_healthcheck_username=d.get(
497
- 'remote_identity_healthcheck_username'),
498
498
  secret_store_id=d.get('secret_store_id'),
499
499
  subdomain=d.get('subdomain'),
500
500
  tags=d.get('tags'),
@@ -1047,11 +1047,11 @@ class AWSConsole:
1047
1047
  'enable_env_variables',
1048
1048
  'healthy',
1049
1049
  'id',
1050
+ 'identity_alias_healthcheck_username',
1051
+ 'identity_set_id',
1050
1052
  'name',
1051
1053
  'port_override',
1052
1054
  'region',
1053
- 'remote_identity_group_id',
1054
- 'remote_identity_healthcheck_username',
1055
1055
  'role_arn',
1056
1056
  'role_external_id',
1057
1057
  'secret_store_id',
@@ -1067,11 +1067,11 @@ class AWSConsole:
1067
1067
  enable_env_variables=None,
1068
1068
  healthy=None,
1069
1069
  id=None,
1070
+ identity_alias_healthcheck_username=None,
1071
+ identity_set_id=None,
1070
1072
  name=None,
1071
1073
  port_override=None,
1072
1074
  region=None,
1073
- remote_identity_group_id=None,
1074
- remote_identity_healthcheck_username=None,
1075
1075
  role_arn=None,
1076
1076
  role_external_id=None,
1077
1077
  secret_store_id=None,
@@ -1099,6 +1099,14 @@ class AWSConsole:
1099
1099
  '''
1100
1100
  Unique identifier of the Resource.
1101
1101
  '''
1102
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
1103
+ '''
1104
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
1105
+ '''
1106
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
1107
+ '''
1108
+ The ID of the identity set to use for identity connections.
1109
+ '''
1102
1110
  self.name = name if name is not None else ''
1103
1111
  '''
1104
1112
  Unique human-readable name of the Resource.
@@ -1111,14 +1119,6 @@ class AWSConsole:
1111
1119
  '''
1112
1120
  The AWS region to connect to.
1113
1121
  '''
1114
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
1115
- '''
1116
- The ID of the remote identity group to use for remote identity connections.
1117
- '''
1118
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
1119
- '''
1120
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
1121
- '''
1122
1122
  self.role_arn = role_arn if role_arn is not None else ''
1123
1123
  '''
1124
1124
  The role to assume after logging in.
@@ -1151,11 +1151,11 @@ class AWSConsole:
1151
1151
  'enable_env_variables: ' + repr(self.enable_env_variables) + ' ' +\
1152
1152
  'healthy: ' + repr(self.healthy) + ' ' +\
1153
1153
  'id: ' + repr(self.id) + ' ' +\
1154
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
1155
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
1154
1156
  'name: ' + repr(self.name) + ' ' +\
1155
1157
  'port_override: ' + repr(self.port_override) + ' ' +\
1156
1158
  'region: ' + repr(self.region) + ' ' +\
1157
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
1158
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
1159
1159
  'role_arn: ' + repr(self.role_arn) + ' ' +\
1160
1160
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
1161
1161
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
@@ -1171,12 +1171,12 @@ class AWSConsole:
1171
1171
  'enable_env_variables': self.enable_env_variables,
1172
1172
  'healthy': self.healthy,
1173
1173
  'id': self.id,
1174
+ 'identity_alias_healthcheck_username':
1175
+ self.identity_alias_healthcheck_username,
1176
+ 'identity_set_id': self.identity_set_id,
1174
1177
  'name': self.name,
1175
1178
  'port_override': self.port_override,
1176
1179
  'region': self.region,
1177
- 'remote_identity_group_id': self.remote_identity_group_id,
1178
- 'remote_identity_healthcheck_username':
1179
- self.remote_identity_healthcheck_username,
1180
1180
  'role_arn': self.role_arn,
1181
1181
  'role_external_id': self.role_external_id,
1182
1182
  'secret_store_id': self.secret_store_id,
@@ -1193,12 +1193,12 @@ class AWSConsole:
1193
1193
  enable_env_variables=d.get('enable_env_variables'),
1194
1194
  healthy=d.get('healthy'),
1195
1195
  id=d.get('id'),
1196
+ identity_alias_healthcheck_username=d.get(
1197
+ 'identity_alias_healthcheck_username'),
1198
+ identity_set_id=d.get('identity_set_id'),
1196
1199
  name=d.get('name'),
1197
1200
  port_override=d.get('port_override'),
1198
1201
  region=d.get('region'),
1199
- remote_identity_group_id=d.get('remote_identity_group_id'),
1200
- remote_identity_healthcheck_username=d.get(
1201
- 'remote_identity_healthcheck_username'),
1202
1202
  role_arn=d.get('role_arn'),
1203
1203
  role_external_id=d.get('role_external_id'),
1204
1204
  secret_store_id=d.get('secret_store_id'),
@@ -1215,11 +1215,11 @@ class AWSConsoleStaticKeyPair:
1215
1215
  'egress_filter',
1216
1216
  'healthy',
1217
1217
  'id',
1218
+ 'identity_alias_healthcheck_username',
1219
+ 'identity_set_id',
1218
1220
  'name',
1219
1221
  'port_override',
1220
1222
  'region',
1221
- 'remote_identity_group_id',
1222
- 'remote_identity_healthcheck_username',
1223
1223
  'role_arn',
1224
1224
  'role_external_id',
1225
1225
  'secret_access_key',
@@ -1236,11 +1236,11 @@ class AWSConsoleStaticKeyPair:
1236
1236
  egress_filter=None,
1237
1237
  healthy=None,
1238
1238
  id=None,
1239
+ identity_alias_healthcheck_username=None,
1240
+ identity_set_id=None,
1239
1241
  name=None,
1240
1242
  port_override=None,
1241
1243
  region=None,
1242
- remote_identity_group_id=None,
1243
- remote_identity_healthcheck_username=None,
1244
1244
  role_arn=None,
1245
1245
  role_external_id=None,
1246
1246
  secret_access_key=None,
@@ -1269,6 +1269,14 @@ class AWSConsoleStaticKeyPair:
1269
1269
  '''
1270
1270
  Unique identifier of the Resource.
1271
1271
  '''
1272
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
1273
+ '''
1274
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
1275
+ '''
1276
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
1277
+ '''
1278
+ The ID of the identity set to use for identity connections.
1279
+ '''
1272
1280
  self.name = name if name is not None else ''
1273
1281
  '''
1274
1282
  Unique human-readable name of the Resource.
@@ -1281,14 +1289,6 @@ class AWSConsoleStaticKeyPair:
1281
1289
  '''
1282
1290
  The AWS region to connect to.
1283
1291
  '''
1284
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
1285
- '''
1286
- The ID of the remote identity group to use for remote identity connections.
1287
- '''
1288
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
1289
- '''
1290
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
1291
- '''
1292
1292
  self.role_arn = role_arn if role_arn is not None else ''
1293
1293
  '''
1294
1294
  The role to assume after logging in.
@@ -1325,11 +1325,11 @@ class AWSConsoleStaticKeyPair:
1325
1325
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
1326
1326
  'healthy: ' + repr(self.healthy) + ' ' +\
1327
1327
  'id: ' + repr(self.id) + ' ' +\
1328
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
1329
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
1328
1330
  'name: ' + repr(self.name) + ' ' +\
1329
1331
  'port_override: ' + repr(self.port_override) + ' ' +\
1330
1332
  'region: ' + repr(self.region) + ' ' +\
1331
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
1332
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
1333
1333
  'role_arn: ' + repr(self.role_arn) + ' ' +\
1334
1334
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
1335
1335
  'secret_access_key: ' + repr(self.secret_access_key) + ' ' +\
@@ -1346,12 +1346,12 @@ class AWSConsoleStaticKeyPair:
1346
1346
  'egress_filter': self.egress_filter,
1347
1347
  'healthy': self.healthy,
1348
1348
  'id': self.id,
1349
+ 'identity_alias_healthcheck_username':
1350
+ self.identity_alias_healthcheck_username,
1351
+ 'identity_set_id': self.identity_set_id,
1349
1352
  'name': self.name,
1350
1353
  'port_override': self.port_override,
1351
1354
  'region': self.region,
1352
- 'remote_identity_group_id': self.remote_identity_group_id,
1353
- 'remote_identity_healthcheck_username':
1354
- self.remote_identity_healthcheck_username,
1355
1355
  'role_arn': self.role_arn,
1356
1356
  'role_external_id': self.role_external_id,
1357
1357
  'secret_access_key': self.secret_access_key,
@@ -1369,12 +1369,12 @@ class AWSConsoleStaticKeyPair:
1369
1369
  egress_filter=d.get('egress_filter'),
1370
1370
  healthy=d.get('healthy'),
1371
1371
  id=d.get('id'),
1372
+ identity_alias_healthcheck_username=d.get(
1373
+ 'identity_alias_healthcheck_username'),
1374
+ identity_set_id=d.get('identity_set_id'),
1372
1375
  name=d.get('name'),
1373
1376
  port_override=d.get('port_override'),
1374
1377
  region=d.get('region'),
1375
- remote_identity_group_id=d.get('remote_identity_group_id'),
1376
- remote_identity_healthcheck_username=d.get(
1377
- 'remote_identity_healthcheck_username'),
1378
1378
  role_arn=d.get('role_arn'),
1379
1379
  role_external_id=d.get('role_external_id'),
1380
1380
  secret_access_key=d.get('secret_access_key'),
@@ -3313,11 +3313,11 @@ class AmazonEKS:
3313
3313
  'healthcheck_namespace',
3314
3314
  'healthy',
3315
3315
  'id',
3316
+ 'identity_alias_healthcheck_username',
3317
+ 'identity_set_id',
3316
3318
  'name',
3317
3319
  'port_override',
3318
3320
  'region',
3319
- 'remote_identity_group_id',
3320
- 'remote_identity_healthcheck_username',
3321
3321
  'role_arn',
3322
3322
  'role_external_id',
3323
3323
  'secret_access_key',
@@ -3337,11 +3337,11 @@ class AmazonEKS:
3337
3337
  healthcheck_namespace=None,
3338
3338
  healthy=None,
3339
3339
  id=None,
3340
+ identity_alias_healthcheck_username=None,
3341
+ identity_set_id=None,
3340
3342
  name=None,
3341
3343
  port_override=None,
3342
3344
  region=None,
3343
- remote_identity_group_id=None,
3344
- remote_identity_healthcheck_username=None,
3345
3345
  role_arn=None,
3346
3346
  role_external_id=None,
3347
3347
  secret_access_key=None,
@@ -3385,6 +3385,14 @@ class AmazonEKS:
3385
3385
  '''
3386
3386
  Unique identifier of the Resource.
3387
3387
  '''
3388
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
3389
+ '''
3390
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
3391
+ '''
3392
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
3393
+ '''
3394
+ The ID of the identity set to use for identity connections.
3395
+ '''
3388
3396
  self.name = name if name is not None else ''
3389
3397
  '''
3390
3398
  Unique human-readable name of the Resource.
@@ -3397,14 +3405,6 @@ class AmazonEKS:
3397
3405
  '''
3398
3406
  The AWS region to connect to e.g. us-east-1.
3399
3407
  '''
3400
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
3401
- '''
3402
- The ID of the remote identity group to use for remote identity connections.
3403
- '''
3404
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
3405
- '''
3406
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
3407
- '''
3408
3408
  self.role_arn = role_arn if role_arn is not None else ''
3409
3409
  '''
3410
3410
  The role to assume after logging in.
@@ -3441,11 +3441,11 @@ class AmazonEKS:
3441
3441
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
3442
3442
  'healthy: ' + repr(self.healthy) + ' ' +\
3443
3443
  'id: ' + repr(self.id) + ' ' +\
3444
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
3445
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
3444
3446
  'name: ' + repr(self.name) + ' ' +\
3445
3447
  'port_override: ' + repr(self.port_override) + ' ' +\
3446
3448
  'region: ' + repr(self.region) + ' ' +\
3447
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
3448
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
3449
3449
  'role_arn: ' + repr(self.role_arn) + ' ' +\
3450
3450
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
3451
3451
  'secret_access_key: ' + repr(self.secret_access_key) + ' ' +\
@@ -3465,12 +3465,12 @@ class AmazonEKS:
3465
3465
  'healthcheck_namespace': self.healthcheck_namespace,
3466
3466
  'healthy': self.healthy,
3467
3467
  'id': self.id,
3468
+ 'identity_alias_healthcheck_username':
3469
+ self.identity_alias_healthcheck_username,
3470
+ 'identity_set_id': self.identity_set_id,
3468
3471
  'name': self.name,
3469
3472
  'port_override': self.port_override,
3470
3473
  'region': self.region,
3471
- 'remote_identity_group_id': self.remote_identity_group_id,
3472
- 'remote_identity_healthcheck_username':
3473
- self.remote_identity_healthcheck_username,
3474
3474
  'role_arn': self.role_arn,
3475
3475
  'role_external_id': self.role_external_id,
3476
3476
  'secret_access_key': self.secret_access_key,
@@ -3491,12 +3491,12 @@ class AmazonEKS:
3491
3491
  healthcheck_namespace=d.get('healthcheck_namespace'),
3492
3492
  healthy=d.get('healthy'),
3493
3493
  id=d.get('id'),
3494
+ identity_alias_healthcheck_username=d.get(
3495
+ 'identity_alias_healthcheck_username'),
3496
+ identity_set_id=d.get('identity_set_id'),
3494
3497
  name=d.get('name'),
3495
3498
  port_override=d.get('port_override'),
3496
3499
  region=d.get('region'),
3497
- remote_identity_group_id=d.get('remote_identity_group_id'),
3498
- remote_identity_healthcheck_username=d.get(
3499
- 'remote_identity_healthcheck_username'),
3500
3500
  role_arn=d.get('role_arn'),
3501
3501
  role_external_id=d.get('role_external_id'),
3502
3502
  secret_access_key=d.get('secret_access_key'),
@@ -3516,11 +3516,11 @@ class AmazonEKSInstanceProfile:
3516
3516
  'healthcheck_namespace',
3517
3517
  'healthy',
3518
3518
  'id',
3519
+ 'identity_alias_healthcheck_username',
3520
+ 'identity_set_id',
3519
3521
  'name',
3520
3522
  'port_override',
3521
3523
  'region',
3522
- 'remote_identity_group_id',
3523
- 'remote_identity_healthcheck_username',
3524
3524
  'role_arn',
3525
3525
  'role_external_id',
3526
3526
  'secret_store_id',
@@ -3538,11 +3538,11 @@ class AmazonEKSInstanceProfile:
3538
3538
  healthcheck_namespace=None,
3539
3539
  healthy=None,
3540
3540
  id=None,
3541
+ identity_alias_healthcheck_username=None,
3542
+ identity_set_id=None,
3541
3543
  name=None,
3542
3544
  port_override=None,
3543
3545
  region=None,
3544
- remote_identity_group_id=None,
3545
- remote_identity_healthcheck_username=None,
3546
3546
  role_arn=None,
3547
3547
  role_external_id=None,
3548
3548
  secret_store_id=None,
@@ -3581,6 +3581,14 @@ class AmazonEKSInstanceProfile:
3581
3581
  '''
3582
3582
  Unique identifier of the Resource.
3583
3583
  '''
3584
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
3585
+ '''
3586
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
3587
+ '''
3588
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
3589
+ '''
3590
+ The ID of the identity set to use for identity connections.
3591
+ '''
3584
3592
  self.name = name if name is not None else ''
3585
3593
  '''
3586
3594
  Unique human-readable name of the Resource.
@@ -3593,14 +3601,6 @@ class AmazonEKSInstanceProfile:
3593
3601
  '''
3594
3602
  The AWS region to connect to e.g. us-east-1.
3595
3603
  '''
3596
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
3597
- '''
3598
- The ID of the remote identity group to use for remote identity connections.
3599
- '''
3600
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
3601
- '''
3602
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
3603
- '''
3604
3604
  self.role_arn = role_arn if role_arn is not None else ''
3605
3605
  '''
3606
3606
  The role to assume after logging in.
@@ -3632,11 +3632,11 @@ class AmazonEKSInstanceProfile:
3632
3632
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
3633
3633
  'healthy: ' + repr(self.healthy) + ' ' +\
3634
3634
  'id: ' + repr(self.id) + ' ' +\
3635
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
3636
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
3635
3637
  'name: ' + repr(self.name) + ' ' +\
3636
3638
  'port_override: ' + repr(self.port_override) + ' ' +\
3637
3639
  'region: ' + repr(self.region) + ' ' +\
3638
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
3639
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
3640
3640
  'role_arn: ' + repr(self.role_arn) + ' ' +\
3641
3641
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
3642
3642
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
@@ -3654,12 +3654,12 @@ class AmazonEKSInstanceProfile:
3654
3654
  'healthcheck_namespace': self.healthcheck_namespace,
3655
3655
  'healthy': self.healthy,
3656
3656
  'id': self.id,
3657
+ 'identity_alias_healthcheck_username':
3658
+ self.identity_alias_healthcheck_username,
3659
+ 'identity_set_id': self.identity_set_id,
3657
3660
  'name': self.name,
3658
3661
  'port_override': self.port_override,
3659
3662
  'region': self.region,
3660
- 'remote_identity_group_id': self.remote_identity_group_id,
3661
- 'remote_identity_healthcheck_username':
3662
- self.remote_identity_healthcheck_username,
3663
3663
  'role_arn': self.role_arn,
3664
3664
  'role_external_id': self.role_external_id,
3665
3665
  'secret_store_id': self.secret_store_id,
@@ -3678,12 +3678,12 @@ class AmazonEKSInstanceProfile:
3678
3678
  healthcheck_namespace=d.get('healthcheck_namespace'),
3679
3679
  healthy=d.get('healthy'),
3680
3680
  id=d.get('id'),
3681
+ identity_alias_healthcheck_username=d.get(
3682
+ 'identity_alias_healthcheck_username'),
3683
+ identity_set_id=d.get('identity_set_id'),
3681
3684
  name=d.get('name'),
3682
3685
  port_override=d.get('port_override'),
3683
3686
  region=d.get('region'),
3684
- remote_identity_group_id=d.get('remote_identity_group_id'),
3685
- remote_identity_healthcheck_username=d.get(
3686
- 'remote_identity_healthcheck_username'),
3687
3687
  role_arn=d.get('role_arn'),
3688
3688
  role_external_id=d.get('role_external_id'),
3689
3689
  secret_store_id=d.get('secret_store_id'),
@@ -3705,8 +3705,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3705
3705
  'name',
3706
3706
  'port_override',
3707
3707
  'region',
3708
- 'remote_identity_group_id',
3709
- 'remote_identity_healthcheck_username',
3710
3708
  'role_arn',
3711
3709
  'role_external_id',
3712
3710
  'secret_store_id',
@@ -3727,8 +3725,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3727
3725
  name=None,
3728
3726
  port_override=None,
3729
3727
  region=None,
3730
- remote_identity_group_id=None,
3731
- remote_identity_healthcheck_username=None,
3732
3728
  role_arn=None,
3733
3729
  role_external_id=None,
3734
3730
  secret_store_id=None,
@@ -3779,14 +3775,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3779
3775
  '''
3780
3776
  The AWS region to connect to e.g. us-east-1.
3781
3777
  '''
3782
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
3783
- '''
3784
- The ID of the remote identity group to use for remote identity connections.
3785
- '''
3786
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
3787
- '''
3788
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
3789
- '''
3790
3778
  self.role_arn = role_arn if role_arn is not None else ''
3791
3779
  '''
3792
3780
  The role to assume after logging in.
@@ -3821,8 +3809,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3821
3809
  'name: ' + repr(self.name) + ' ' +\
3822
3810
  'port_override: ' + repr(self.port_override) + ' ' +\
3823
3811
  'region: ' + repr(self.region) + ' ' +\
3824
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
3825
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
3826
3812
  'role_arn: ' + repr(self.role_arn) + ' ' +\
3827
3813
  'role_external_id: ' + repr(self.role_external_id) + ' ' +\
3828
3814
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
@@ -3843,9 +3829,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3843
3829
  'name': self.name,
3844
3830
  'port_override': self.port_override,
3845
3831
  'region': self.region,
3846
- 'remote_identity_group_id': self.remote_identity_group_id,
3847
- 'remote_identity_healthcheck_username':
3848
- self.remote_identity_healthcheck_username,
3849
3832
  'role_arn': self.role_arn,
3850
3833
  'role_external_id': self.role_external_id,
3851
3834
  'secret_store_id': self.secret_store_id,
@@ -3867,9 +3850,6 @@ class AmazonEKSInstanceProfileUserImpersonation:
3867
3850
  name=d.get('name'),
3868
3851
  port_override=d.get('port_override'),
3869
3852
  region=d.get('region'),
3870
- remote_identity_group_id=d.get('remote_identity_group_id'),
3871
- remote_identity_healthcheck_username=d.get(
3872
- 'remote_identity_healthcheck_username'),
3873
3853
  role_arn=d.get('role_arn'),
3874
3854
  role_external_id=d.get('role_external_id'),
3875
3855
  secret_store_id=d.get('secret_store_id'),
@@ -9603,10 +9583,10 @@ class GoogleGKE:
9603
9583
  'healthcheck_namespace',
9604
9584
  'healthy',
9605
9585
  'id',
9586
+ 'identity_alias_healthcheck_username',
9587
+ 'identity_set_id',
9606
9588
  'name',
9607
9589
  'port_override',
9608
- 'remote_identity_group_id',
9609
- 'remote_identity_healthcheck_username',
9610
9590
  'secret_store_id',
9611
9591
  'service_account_key',
9612
9592
  'subdomain',
@@ -9622,10 +9602,10 @@ class GoogleGKE:
9622
9602
  healthcheck_namespace=None,
9623
9603
  healthy=None,
9624
9604
  id=None,
9605
+ identity_alias_healthcheck_username=None,
9606
+ identity_set_id=None,
9625
9607
  name=None,
9626
9608
  port_override=None,
9627
- remote_identity_group_id=None,
9628
- remote_identity_healthcheck_username=None,
9629
9609
  secret_store_id=None,
9630
9610
  service_account_key=None,
9631
9611
  subdomain=None,
@@ -9659,21 +9639,21 @@ class GoogleGKE:
9659
9639
  '''
9660
9640
  Unique identifier of the Resource.
9661
9641
  '''
9662
- self.name = name if name is not None else ''
9642
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
9663
9643
  '''
9664
- Unique human-readable name of the Resource.
9644
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
9665
9645
  '''
9666
- self.port_override = port_override if port_override is not None else 0
9646
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
9667
9647
  '''
9668
- The local port used by clients to connect to this resource.
9648
+ The ID of the identity set to use for identity connections.
9669
9649
  '''
9670
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
9650
+ self.name = name if name is not None else ''
9671
9651
  '''
9672
- The ID of the remote identity group to use for remote identity connections.
9652
+ Unique human-readable name of the Resource.
9673
9653
  '''
9674
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
9654
+ self.port_override = port_override if port_override is not None else 0
9675
9655
  '''
9676
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
9656
+ The local port used by clients to connect to this resource.
9677
9657
  '''
9678
9658
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
9679
9659
  '''
@@ -9701,10 +9681,10 @@ class GoogleGKE:
9701
9681
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
9702
9682
  'healthy: ' + repr(self.healthy) + ' ' +\
9703
9683
  'id: ' + repr(self.id) + ' ' +\
9684
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
9685
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
9704
9686
  'name: ' + repr(self.name) + ' ' +\
9705
9687
  'port_override: ' + repr(self.port_override) + ' ' +\
9706
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
9707
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
9708
9688
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
9709
9689
  'service_account_key: ' + repr(self.service_account_key) + ' ' +\
9710
9690
  'subdomain: ' + repr(self.subdomain) + ' ' +\
@@ -9720,11 +9700,11 @@ class GoogleGKE:
9720
9700
  'healthcheck_namespace': self.healthcheck_namespace,
9721
9701
  'healthy': self.healthy,
9722
9702
  'id': self.id,
9703
+ 'identity_alias_healthcheck_username':
9704
+ self.identity_alias_healthcheck_username,
9705
+ 'identity_set_id': self.identity_set_id,
9723
9706
  'name': self.name,
9724
9707
  'port_override': self.port_override,
9725
- 'remote_identity_group_id': self.remote_identity_group_id,
9726
- 'remote_identity_healthcheck_username':
9727
- self.remote_identity_healthcheck_username,
9728
9708
  'secret_store_id': self.secret_store_id,
9729
9709
  'service_account_key': self.service_account_key,
9730
9710
  'subdomain': self.subdomain,
@@ -9741,11 +9721,11 @@ class GoogleGKE:
9741
9721
  healthcheck_namespace=d.get('healthcheck_namespace'),
9742
9722
  healthy=d.get('healthy'),
9743
9723
  id=d.get('id'),
9724
+ identity_alias_healthcheck_username=d.get(
9725
+ 'identity_alias_healthcheck_username'),
9726
+ identity_set_id=d.get('identity_set_id'),
9744
9727
  name=d.get('name'),
9745
9728
  port_override=d.get('port_override'),
9746
- remote_identity_group_id=d.get('remote_identity_group_id'),
9747
- remote_identity_healthcheck_username=d.get(
9748
- 'remote_identity_healthcheck_username'),
9749
9729
  secret_store_id=d.get('secret_store_id'),
9750
9730
  service_account_key=d.get('service_account_key'),
9751
9731
  subdomain=d.get('subdomain'),
@@ -10493,175 +10473,809 @@ class HTTPNoAuth:
10493
10473
  )
10494
10474
 
10495
10475
 
10496
- class KeyfactorSSHStore:
10476
+ class IdentityAlias:
10477
+ '''
10478
+ IdentityAliases define the username to be used for a specific account
10479
+ when connecting to a remote resource using that identity set.
10480
+ '''
10497
10481
  __slots__ = [
10498
- 'ca_file_path',
10499
- 'certificate_file_path',
10500
- 'default_certificate_authority_name',
10501
- 'default_certificate_profile_name',
10502
- 'default_end_entity_profile_name',
10503
- 'enrollment_code_env_var',
10504
- 'enrollment_username_env_var',
10482
+ 'account_id',
10505
10483
  'id',
10506
- 'key_file_path',
10507
- 'name',
10508
- 'server_address',
10509
- 'tags',
10484
+ 'identity_set_id',
10485
+ 'username',
10510
10486
  ]
10511
10487
 
10512
10488
  def __init__(
10513
10489
  self,
10514
- ca_file_path=None,
10515
- certificate_file_path=None,
10516
- default_certificate_authority_name=None,
10517
- default_certificate_profile_name=None,
10518
- default_end_entity_profile_name=None,
10519
- enrollment_code_env_var=None,
10520
- enrollment_username_env_var=None,
10490
+ account_id=None,
10521
10491
  id=None,
10522
- key_file_path=None,
10523
- name=None,
10524
- server_address=None,
10525
- tags=None,
10492
+ identity_set_id=None,
10493
+ username=None,
10526
10494
  ):
10527
- self.ca_file_path = ca_file_path if ca_file_path is not None else ''
10528
- '''
10529
- Path to the root CA that signed the certificate passed to the client for HTTPS connection.
10530
- This is not required if the CA is trusted by the host operating system. This should be a PEM
10531
- formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
10532
- '''
10533
- self.certificate_file_path = certificate_file_path if certificate_file_path is not None else ''
10534
- '''
10535
- Path to client certificate in PEM format. This certificate must contain a client certificate that
10536
- is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
10537
- key associated with the certificate, but KeyFile can also be set to configure the private key.
10538
- '''
10539
- self.default_certificate_authority_name = default_certificate_authority_name if default_certificate_authority_name is not None else ''
10540
- '''
10541
- Name of EJBCA certificate authority that will enroll CSR.
10542
- '''
10543
- self.default_certificate_profile_name = default_certificate_profile_name if default_certificate_profile_name is not None else ''
10544
- '''
10545
- Certificate profile name that EJBCA will enroll the CSR with.
10546
- '''
10547
- self.default_end_entity_profile_name = default_end_entity_profile_name if default_end_entity_profile_name is not None else ''
10548
- '''
10549
- End entity profile that EJBCA will enroll the CSR with.
10550
- '''
10551
- self.enrollment_code_env_var = enrollment_code_env_var if enrollment_code_env_var is not None else ''
10552
- '''
10553
- code used by EJBCA during enrollment. May be left blank if no code is required.
10554
- '''
10555
- self.enrollment_username_env_var = enrollment_username_env_var if enrollment_username_env_var is not None else ''
10495
+ self.account_id = account_id if account_id is not None else ''
10556
10496
  '''
10557
- username that used by the EJBCA during enrollment. This can be left out.
10558
- If so, the username must be auto-generated on the Keyfactor side.
10497
+ The account for this identity alias.
10559
10498
  '''
10560
10499
  self.id = id if id is not None else ''
10561
10500
  '''
10562
- Unique identifier of the SecretStore.
10563
- '''
10564
- self.key_file_path = key_file_path if key_file_path is not None else ''
10565
- '''
10566
- Path to private key in PEM format. This file should contain the private key associated with the
10567
- client certificate configured in CertificateFile.
10568
- '''
10569
- self.name = name if name is not None else ''
10570
- '''
10571
- Unique human-readable name of the SecretStore.
10501
+ Unique identifier of the IdentityAlias.
10572
10502
  '''
10573
- self.server_address = server_address if server_address is not None else ''
10503
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
10574
10504
  '''
10575
- the host of the Key Factor CA
10505
+ The identity set.
10576
10506
  '''
10577
- self.tags = tags if tags is not None else _porcelain_zero_value_tags()
10507
+ self.username = username if username is not None else ''
10578
10508
  '''
10579
- Tags is a map of key, value pairs.
10509
+ The username to be used as the identity alias for this account.
10580
10510
  '''
10581
10511
 
10582
10512
  def __repr__(self):
10583
- return '<sdm.KeyfactorSSHStore ' + \
10584
- 'ca_file_path: ' + repr(self.ca_file_path) + ' ' +\
10585
- 'certificate_file_path: ' + repr(self.certificate_file_path) + ' ' +\
10586
- 'default_certificate_authority_name: ' + repr(self.default_certificate_authority_name) + ' ' +\
10587
- 'default_certificate_profile_name: ' + repr(self.default_certificate_profile_name) + ' ' +\
10588
- 'default_end_entity_profile_name: ' + repr(self.default_end_entity_profile_name) + ' ' +\
10589
- 'enrollment_code_env_var: ' + repr(self.enrollment_code_env_var) + ' ' +\
10590
- 'enrollment_username_env_var: ' + repr(self.enrollment_username_env_var) + ' ' +\
10513
+ return '<sdm.IdentityAlias ' + \
10514
+ 'account_id: ' + repr(self.account_id) + ' ' +\
10591
10515
  'id: ' + repr(self.id) + ' ' +\
10592
- 'key_file_path: ' + repr(self.key_file_path) + ' ' +\
10593
- 'name: ' + repr(self.name) + ' ' +\
10594
- 'server_address: ' + repr(self.server_address) + ' ' +\
10595
- 'tags: ' + repr(self.tags) + ' ' +\
10516
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
10517
+ 'username: ' + repr(self.username) + ' ' +\
10596
10518
  '>'
10597
10519
 
10598
10520
  def to_dict(self):
10599
10521
  return {
10600
- 'ca_file_path': self.ca_file_path,
10601
- 'certificate_file_path': self.certificate_file_path,
10602
- 'default_certificate_authority_name':
10603
- self.default_certificate_authority_name,
10604
- 'default_certificate_profile_name':
10605
- self.default_certificate_profile_name,
10606
- 'default_end_entity_profile_name':
10607
- self.default_end_entity_profile_name,
10608
- 'enrollment_code_env_var': self.enrollment_code_env_var,
10609
- 'enrollment_username_env_var': self.enrollment_username_env_var,
10522
+ 'account_id': self.account_id,
10610
10523
  'id': self.id,
10611
- 'key_file_path': self.key_file_path,
10612
- 'name': self.name,
10613
- 'server_address': self.server_address,
10614
- 'tags': self.tags,
10524
+ 'identity_set_id': self.identity_set_id,
10525
+ 'username': self.username,
10615
10526
  }
10616
10527
 
10617
10528
  @classmethod
10618
10529
  def from_dict(cls, d):
10619
10530
  return cls(
10620
- ca_file_path=d.get('ca_file_path'),
10621
- certificate_file_path=d.get('certificate_file_path'),
10622
- default_certificate_authority_name=d.get(
10623
- 'default_certificate_authority_name'),
10624
- default_certificate_profile_name=d.get(
10625
- 'default_certificate_profile_name'),
10626
- default_end_entity_profile_name=d.get(
10627
- 'default_end_entity_profile_name'),
10628
- enrollment_code_env_var=d.get('enrollment_code_env_var'),
10629
- enrollment_username_env_var=d.get('enrollment_username_env_var'),
10531
+ account_id=d.get('account_id'),
10630
10532
  id=d.get('id'),
10631
- key_file_path=d.get('key_file_path'),
10632
- name=d.get('name'),
10633
- server_address=d.get('server_address'),
10634
- tags=d.get('tags'),
10533
+ identity_set_id=d.get('identity_set_id'),
10534
+ username=d.get('username'),
10635
10535
  )
10636
10536
 
10637
10537
 
10638
- class KeyfactorX509Store:
10538
+ class IdentityAliasCreateResponse:
10539
+ '''
10540
+ IdentityAliasCreateResponse reports how the IdentityAliases were created in the system.
10541
+ '''
10639
10542
  __slots__ = [
10640
- 'ca_file_path',
10641
- 'certificate_file_path',
10642
- 'default_certificate_authority_name',
10643
- 'default_certificate_profile_name',
10644
- 'default_end_entity_profile_name',
10645
- 'enrollment_code_env_var',
10646
- 'enrollment_username_env_var',
10647
- 'id',
10648
- 'key_file_path',
10649
- 'name',
10650
- 'server_address',
10651
- 'tags',
10543
+ 'identity_alias',
10544
+ 'meta',
10545
+ 'rate_limit',
10652
10546
  ]
10653
10547
 
10654
10548
  def __init__(
10655
10549
  self,
10656
- ca_file_path=None,
10657
- certificate_file_path=None,
10658
- default_certificate_authority_name=None,
10659
- default_certificate_profile_name=None,
10660
- default_end_entity_profile_name=None,
10661
- enrollment_code_env_var=None,
10662
- enrollment_username_env_var=None,
10663
- id=None,
10664
- key_file_path=None,
10550
+ identity_alias=None,
10551
+ meta=None,
10552
+ rate_limit=None,
10553
+ ):
10554
+ self.identity_alias = identity_alias if identity_alias is not None else None
10555
+ '''
10556
+ The created IdentityAlias.
10557
+ '''
10558
+ self.meta = meta if meta is not None else None
10559
+ '''
10560
+ Reserved for future use.
10561
+ '''
10562
+ self.rate_limit = rate_limit if rate_limit is not None else None
10563
+ '''
10564
+ Rate limit information.
10565
+ '''
10566
+
10567
+ def __repr__(self):
10568
+ return '<sdm.IdentityAliasCreateResponse ' + \
10569
+ 'identity_alias: ' + repr(self.identity_alias) + ' ' +\
10570
+ 'meta: ' + repr(self.meta) + ' ' +\
10571
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10572
+ '>'
10573
+
10574
+ def to_dict(self):
10575
+ return {
10576
+ 'identity_alias': self.identity_alias,
10577
+ 'meta': self.meta,
10578
+ 'rate_limit': self.rate_limit,
10579
+ }
10580
+
10581
+ @classmethod
10582
+ def from_dict(cls, d):
10583
+ return cls(
10584
+ identity_alias=d.get('identity_alias'),
10585
+ meta=d.get('meta'),
10586
+ rate_limit=d.get('rate_limit'),
10587
+ )
10588
+
10589
+
10590
+ class IdentityAliasDeleteResponse:
10591
+ '''
10592
+ IdentityAliasDeleteResponse returns information about a IdentityAlias that was deleted.
10593
+ '''
10594
+ __slots__ = [
10595
+ 'meta',
10596
+ 'rate_limit',
10597
+ ]
10598
+
10599
+ def __init__(
10600
+ self,
10601
+ meta=None,
10602
+ rate_limit=None,
10603
+ ):
10604
+ self.meta = meta if meta is not None else None
10605
+ '''
10606
+ Reserved for future use.
10607
+ '''
10608
+ self.rate_limit = rate_limit if rate_limit is not None else None
10609
+ '''
10610
+ Rate limit information.
10611
+ '''
10612
+
10613
+ def __repr__(self):
10614
+ return '<sdm.IdentityAliasDeleteResponse ' + \
10615
+ 'meta: ' + repr(self.meta) + ' ' +\
10616
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10617
+ '>'
10618
+
10619
+ def to_dict(self):
10620
+ return {
10621
+ 'meta': self.meta,
10622
+ 'rate_limit': self.rate_limit,
10623
+ }
10624
+
10625
+ @classmethod
10626
+ def from_dict(cls, d):
10627
+ return cls(
10628
+ meta=d.get('meta'),
10629
+ rate_limit=d.get('rate_limit'),
10630
+ )
10631
+
10632
+
10633
+ class IdentityAliasGetResponse:
10634
+ '''
10635
+ IdentityAliasGetResponse returns a requested IdentityAlias.
10636
+ '''
10637
+ __slots__ = [
10638
+ 'identity_alias',
10639
+ 'meta',
10640
+ 'rate_limit',
10641
+ ]
10642
+
10643
+ def __init__(
10644
+ self,
10645
+ identity_alias=None,
10646
+ meta=None,
10647
+ rate_limit=None,
10648
+ ):
10649
+ self.identity_alias = identity_alias if identity_alias is not None else None
10650
+ '''
10651
+ The requested IdentityAlias.
10652
+ '''
10653
+ self.meta = meta if meta is not None else None
10654
+ '''
10655
+ Reserved for future use.
10656
+ '''
10657
+ self.rate_limit = rate_limit if rate_limit is not None else None
10658
+ '''
10659
+ Rate limit information.
10660
+ '''
10661
+
10662
+ def __repr__(self):
10663
+ return '<sdm.IdentityAliasGetResponse ' + \
10664
+ 'identity_alias: ' + repr(self.identity_alias) + ' ' +\
10665
+ 'meta: ' + repr(self.meta) + ' ' +\
10666
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10667
+ '>'
10668
+
10669
+ def to_dict(self):
10670
+ return {
10671
+ 'identity_alias': self.identity_alias,
10672
+ 'meta': self.meta,
10673
+ 'rate_limit': self.rate_limit,
10674
+ }
10675
+
10676
+ @classmethod
10677
+ def from_dict(cls, d):
10678
+ return cls(
10679
+ identity_alias=d.get('identity_alias'),
10680
+ meta=d.get('meta'),
10681
+ rate_limit=d.get('rate_limit'),
10682
+ )
10683
+
10684
+
10685
+ class IdentityAliasHistory:
10686
+ '''
10687
+ IdentityAliasHistory records the state of a IdentityAlias at a given point in time,
10688
+ where every change (create, update and delete) to a IdentityAlias produces an
10689
+ IdentityAliasHistory record.
10690
+ '''
10691
+ __slots__ = [
10692
+ 'activity_id',
10693
+ 'deleted_at',
10694
+ 'identity_alias',
10695
+ 'timestamp',
10696
+ ]
10697
+
10698
+ def __init__(
10699
+ self,
10700
+ activity_id=None,
10701
+ deleted_at=None,
10702
+ identity_alias=None,
10703
+ timestamp=None,
10704
+ ):
10705
+ self.activity_id = activity_id if activity_id is not None else ''
10706
+ '''
10707
+ The unique identifier of the Activity that produced this change to the IdentityAlias.
10708
+ May be empty for some system-initiated updates.
10709
+ '''
10710
+ self.deleted_at = deleted_at if deleted_at is not None else None
10711
+ '''
10712
+ If this IdentityAlias was deleted, the time it was deleted.
10713
+ '''
10714
+ self.identity_alias = identity_alias if identity_alias is not None else None
10715
+ '''
10716
+ The complete IdentityAlias state at this time.
10717
+ '''
10718
+ self.timestamp = timestamp if timestamp is not None else None
10719
+ '''
10720
+ The time at which the IdentityAlias state was recorded.
10721
+ '''
10722
+
10723
+ def __repr__(self):
10724
+ return '<sdm.IdentityAliasHistory ' + \
10725
+ 'activity_id: ' + repr(self.activity_id) + ' ' +\
10726
+ 'deleted_at: ' + repr(self.deleted_at) + ' ' +\
10727
+ 'identity_alias: ' + repr(self.identity_alias) + ' ' +\
10728
+ 'timestamp: ' + repr(self.timestamp) + ' ' +\
10729
+ '>'
10730
+
10731
+ def to_dict(self):
10732
+ return {
10733
+ 'activity_id': self.activity_id,
10734
+ 'deleted_at': self.deleted_at,
10735
+ 'identity_alias': self.identity_alias,
10736
+ 'timestamp': self.timestamp,
10737
+ }
10738
+
10739
+ @classmethod
10740
+ def from_dict(cls, d):
10741
+ return cls(
10742
+ activity_id=d.get('activity_id'),
10743
+ deleted_at=d.get('deleted_at'),
10744
+ identity_alias=d.get('identity_alias'),
10745
+ timestamp=d.get('timestamp'),
10746
+ )
10747
+
10748
+
10749
+ class IdentityAliasUpdateResponse:
10750
+ '''
10751
+ IdentityAliasUpdateResponse returns the fields of a IdentityAlias after it has been updated by
10752
+ a IdentityAliasUpdateRequest.
10753
+ '''
10754
+ __slots__ = [
10755
+ 'identity_alias',
10756
+ 'meta',
10757
+ 'rate_limit',
10758
+ ]
10759
+
10760
+ def __init__(
10761
+ self,
10762
+ identity_alias=None,
10763
+ meta=None,
10764
+ rate_limit=None,
10765
+ ):
10766
+ self.identity_alias = identity_alias if identity_alias is not None else None
10767
+ '''
10768
+ The updated IdentityAlias.
10769
+ '''
10770
+ self.meta = meta if meta is not None else None
10771
+ '''
10772
+ Reserved for future use.
10773
+ '''
10774
+ self.rate_limit = rate_limit if rate_limit is not None else None
10775
+ '''
10776
+ Rate limit information.
10777
+ '''
10778
+
10779
+ def __repr__(self):
10780
+ return '<sdm.IdentityAliasUpdateResponse ' + \
10781
+ 'identity_alias: ' + repr(self.identity_alias) + ' ' +\
10782
+ 'meta: ' + repr(self.meta) + ' ' +\
10783
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10784
+ '>'
10785
+
10786
+ def to_dict(self):
10787
+ return {
10788
+ 'identity_alias': self.identity_alias,
10789
+ 'meta': self.meta,
10790
+ 'rate_limit': self.rate_limit,
10791
+ }
10792
+
10793
+ @classmethod
10794
+ def from_dict(cls, d):
10795
+ return cls(
10796
+ identity_alias=d.get('identity_alias'),
10797
+ meta=d.get('meta'),
10798
+ rate_limit=d.get('rate_limit'),
10799
+ )
10800
+
10801
+
10802
+ class IdentitySet:
10803
+ '''
10804
+ A IdentitySet defines a group of identity aliases.
10805
+ '''
10806
+ __slots__ = [
10807
+ 'id',
10808
+ 'name',
10809
+ ]
10810
+
10811
+ def __init__(
10812
+ self,
10813
+ id=None,
10814
+ name=None,
10815
+ ):
10816
+ self.id = id if id is not None else ''
10817
+ '''
10818
+ Unique identifier of the IdentitySet.
10819
+ '''
10820
+ self.name = name if name is not None else ''
10821
+ '''
10822
+ Unique human-readable name of the IdentitySet.
10823
+ '''
10824
+
10825
+ def __repr__(self):
10826
+ return '<sdm.IdentitySet ' + \
10827
+ 'id: ' + repr(self.id) + ' ' +\
10828
+ 'name: ' + repr(self.name) + ' ' +\
10829
+ '>'
10830
+
10831
+ def to_dict(self):
10832
+ return {
10833
+ 'id': self.id,
10834
+ 'name': self.name,
10835
+ }
10836
+
10837
+ @classmethod
10838
+ def from_dict(cls, d):
10839
+ return cls(
10840
+ id=d.get('id'),
10841
+ name=d.get('name'),
10842
+ )
10843
+
10844
+
10845
+ class IdentitySetCreateResponse:
10846
+ '''
10847
+ IdentitySetCreateResponse reports how the IdentitySets were created in the system. It can
10848
+ communicate partial successes or failures.
10849
+ '''
10850
+ __slots__ = [
10851
+ 'identity_set',
10852
+ 'meta',
10853
+ 'rate_limit',
10854
+ ]
10855
+
10856
+ def __init__(
10857
+ self,
10858
+ identity_set=None,
10859
+ meta=None,
10860
+ rate_limit=None,
10861
+ ):
10862
+ self.identity_set = identity_set if identity_set is not None else None
10863
+ '''
10864
+ The created IdentitySet.
10865
+ '''
10866
+ self.meta = meta if meta is not None else None
10867
+ '''
10868
+ Reserved for future use.
10869
+ '''
10870
+ self.rate_limit = rate_limit if rate_limit is not None else None
10871
+ '''
10872
+ Rate limit information.
10873
+ '''
10874
+
10875
+ def __repr__(self):
10876
+ return '<sdm.IdentitySetCreateResponse ' + \
10877
+ 'identity_set: ' + repr(self.identity_set) + ' ' +\
10878
+ 'meta: ' + repr(self.meta) + ' ' +\
10879
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10880
+ '>'
10881
+
10882
+ def to_dict(self):
10883
+ return {
10884
+ 'identity_set': self.identity_set,
10885
+ 'meta': self.meta,
10886
+ 'rate_limit': self.rate_limit,
10887
+ }
10888
+
10889
+ @classmethod
10890
+ def from_dict(cls, d):
10891
+ return cls(
10892
+ identity_set=d.get('identity_set'),
10893
+ meta=d.get('meta'),
10894
+ rate_limit=d.get('rate_limit'),
10895
+ )
10896
+
10897
+
10898
+ class IdentitySetDeleteResponse:
10899
+ '''
10900
+ IdentitySetDeleteResponse returns information about a IdentitySet that was deleted.
10901
+ '''
10902
+ __slots__ = [
10903
+ 'meta',
10904
+ 'rate_limit',
10905
+ ]
10906
+
10907
+ def __init__(
10908
+ self,
10909
+ meta=None,
10910
+ rate_limit=None,
10911
+ ):
10912
+ self.meta = meta if meta is not None else None
10913
+ '''
10914
+ Reserved for future use.
10915
+ '''
10916
+ self.rate_limit = rate_limit if rate_limit is not None else None
10917
+ '''
10918
+ Rate limit information.
10919
+ '''
10920
+
10921
+ def __repr__(self):
10922
+ return '<sdm.IdentitySetDeleteResponse ' + \
10923
+ 'meta: ' + repr(self.meta) + ' ' +\
10924
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10925
+ '>'
10926
+
10927
+ def to_dict(self):
10928
+ return {
10929
+ 'meta': self.meta,
10930
+ 'rate_limit': self.rate_limit,
10931
+ }
10932
+
10933
+ @classmethod
10934
+ def from_dict(cls, d):
10935
+ return cls(
10936
+ meta=d.get('meta'),
10937
+ rate_limit=d.get('rate_limit'),
10938
+ )
10939
+
10940
+
10941
+ class IdentitySetGetResponse:
10942
+ '''
10943
+ IdentitySetGetResponse returns a requested IdentitySet.
10944
+ '''
10945
+ __slots__ = [
10946
+ 'identity_set',
10947
+ 'meta',
10948
+ 'rate_limit',
10949
+ ]
10950
+
10951
+ def __init__(
10952
+ self,
10953
+ identity_set=None,
10954
+ meta=None,
10955
+ rate_limit=None,
10956
+ ):
10957
+ self.identity_set = identity_set if identity_set is not None else None
10958
+ '''
10959
+ The requested IdentitySet.
10960
+ '''
10961
+ self.meta = meta if meta is not None else None
10962
+ '''
10963
+ Reserved for future use.
10964
+ '''
10965
+ self.rate_limit = rate_limit if rate_limit is not None else None
10966
+ '''
10967
+ Rate limit information.
10968
+ '''
10969
+
10970
+ def __repr__(self):
10971
+ return '<sdm.IdentitySetGetResponse ' + \
10972
+ 'identity_set: ' + repr(self.identity_set) + ' ' +\
10973
+ 'meta: ' + repr(self.meta) + ' ' +\
10974
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
10975
+ '>'
10976
+
10977
+ def to_dict(self):
10978
+ return {
10979
+ 'identity_set': self.identity_set,
10980
+ 'meta': self.meta,
10981
+ 'rate_limit': self.rate_limit,
10982
+ }
10983
+
10984
+ @classmethod
10985
+ def from_dict(cls, d):
10986
+ return cls(
10987
+ identity_set=d.get('identity_set'),
10988
+ meta=d.get('meta'),
10989
+ rate_limit=d.get('rate_limit'),
10990
+ )
10991
+
10992
+
10993
+ class IdentitySetHistory:
10994
+ '''
10995
+ IdentitySetHistory records the state of a IdentitySet at a given point in time,
10996
+ where every change (create, update and delete) to a IdentitySet produces an
10997
+ IdentitySetHistory record.
10998
+ '''
10999
+ __slots__ = [
11000
+ 'activity_id',
11001
+ 'deleted_at',
11002
+ 'identity_set',
11003
+ 'timestamp',
11004
+ ]
11005
+
11006
+ def __init__(
11007
+ self,
11008
+ activity_id=None,
11009
+ deleted_at=None,
11010
+ identity_set=None,
11011
+ timestamp=None,
11012
+ ):
11013
+ self.activity_id = activity_id if activity_id is not None else ''
11014
+ '''
11015
+ The unique identifier of the Activity that produced this change to the IdentitySet.
11016
+ May be empty for some system-initiated updates.
11017
+ '''
11018
+ self.deleted_at = deleted_at if deleted_at is not None else None
11019
+ '''
11020
+ If this IdentitySet was deleted, the time it was deleted.
11021
+ '''
11022
+ self.identity_set = identity_set if identity_set is not None else None
11023
+ '''
11024
+ The complete IdentitySet state at this time.
11025
+ '''
11026
+ self.timestamp = timestamp if timestamp is not None else None
11027
+ '''
11028
+ The time at which the IdentitySet state was recorded.
11029
+ '''
11030
+
11031
+ def __repr__(self):
11032
+ return '<sdm.IdentitySetHistory ' + \
11033
+ 'activity_id: ' + repr(self.activity_id) + ' ' +\
11034
+ 'deleted_at: ' + repr(self.deleted_at) + ' ' +\
11035
+ 'identity_set: ' + repr(self.identity_set) + ' ' +\
11036
+ 'timestamp: ' + repr(self.timestamp) + ' ' +\
11037
+ '>'
11038
+
11039
+ def to_dict(self):
11040
+ return {
11041
+ 'activity_id': self.activity_id,
11042
+ 'deleted_at': self.deleted_at,
11043
+ 'identity_set': self.identity_set,
11044
+ 'timestamp': self.timestamp,
11045
+ }
11046
+
11047
+ @classmethod
11048
+ def from_dict(cls, d):
11049
+ return cls(
11050
+ activity_id=d.get('activity_id'),
11051
+ deleted_at=d.get('deleted_at'),
11052
+ identity_set=d.get('identity_set'),
11053
+ timestamp=d.get('timestamp'),
11054
+ )
11055
+
11056
+
11057
+ class IdentitySetUpdateResponse:
11058
+ '''
11059
+ IdentitySetUpdateResponse returns the fields of a IdentitySet after it has been updated by
11060
+ a IdentitySetUpdateRequest.
11061
+ '''
11062
+ __slots__ = [
11063
+ 'identity_set',
11064
+ 'meta',
11065
+ 'rate_limit',
11066
+ ]
11067
+
11068
+ def __init__(
11069
+ self,
11070
+ identity_set=None,
11071
+ meta=None,
11072
+ rate_limit=None,
11073
+ ):
11074
+ self.identity_set = identity_set if identity_set is not None else None
11075
+ '''
11076
+ The updated IdentitySet.
11077
+ '''
11078
+ self.meta = meta if meta is not None else None
11079
+ '''
11080
+ Reserved for future use.
11081
+ '''
11082
+ self.rate_limit = rate_limit if rate_limit is not None else None
11083
+ '''
11084
+ Rate limit information.
11085
+ '''
11086
+
11087
+ def __repr__(self):
11088
+ return '<sdm.IdentitySetUpdateResponse ' + \
11089
+ 'identity_set: ' + repr(self.identity_set) + ' ' +\
11090
+ 'meta: ' + repr(self.meta) + ' ' +\
11091
+ 'rate_limit: ' + repr(self.rate_limit) + ' ' +\
11092
+ '>'
11093
+
11094
+ def to_dict(self):
11095
+ return {
11096
+ 'identity_set': self.identity_set,
11097
+ 'meta': self.meta,
11098
+ 'rate_limit': self.rate_limit,
11099
+ }
11100
+
11101
+ @classmethod
11102
+ def from_dict(cls, d):
11103
+ return cls(
11104
+ identity_set=d.get('identity_set'),
11105
+ meta=d.get('meta'),
11106
+ rate_limit=d.get('rate_limit'),
11107
+ )
11108
+
11109
+
11110
+ class KeyfactorSSHStore:
11111
+ __slots__ = [
11112
+ 'ca_file_path',
11113
+ 'certificate_file_path',
11114
+ 'default_certificate_authority_name',
11115
+ 'default_certificate_profile_name',
11116
+ 'default_end_entity_profile_name',
11117
+ 'enrollment_code_env_var',
11118
+ 'enrollment_username_env_var',
11119
+ 'id',
11120
+ 'key_file_path',
11121
+ 'name',
11122
+ 'server_address',
11123
+ 'tags',
11124
+ ]
11125
+
11126
+ def __init__(
11127
+ self,
11128
+ ca_file_path=None,
11129
+ certificate_file_path=None,
11130
+ default_certificate_authority_name=None,
11131
+ default_certificate_profile_name=None,
11132
+ default_end_entity_profile_name=None,
11133
+ enrollment_code_env_var=None,
11134
+ enrollment_username_env_var=None,
11135
+ id=None,
11136
+ key_file_path=None,
11137
+ name=None,
11138
+ server_address=None,
11139
+ tags=None,
11140
+ ):
11141
+ self.ca_file_path = ca_file_path if ca_file_path is not None else ''
11142
+ '''
11143
+ Path to the root CA that signed the certificate passed to the client for HTTPS connection.
11144
+ This is not required if the CA is trusted by the host operating system. This should be a PEM
11145
+ formatted certificate, and doesn't necessarily have to be the CA that signed CertificateFile.
11146
+ '''
11147
+ self.certificate_file_path = certificate_file_path if certificate_file_path is not None else ''
11148
+ '''
11149
+ Path to client certificate in PEM format. This certificate must contain a client certificate that
11150
+ is recognized by the EJBCA instance represented by Hostname. This PEM file may also contain the private
11151
+ key associated with the certificate, but KeyFile can also be set to configure the private key.
11152
+ '''
11153
+ self.default_certificate_authority_name = default_certificate_authority_name if default_certificate_authority_name is not None else ''
11154
+ '''
11155
+ Name of EJBCA certificate authority that will enroll CSR.
11156
+ '''
11157
+ self.default_certificate_profile_name = default_certificate_profile_name if default_certificate_profile_name is not None else ''
11158
+ '''
11159
+ Certificate profile name that EJBCA will enroll the CSR with.
11160
+ '''
11161
+ self.default_end_entity_profile_name = default_end_entity_profile_name if default_end_entity_profile_name is not None else ''
11162
+ '''
11163
+ End entity profile that EJBCA will enroll the CSR with.
11164
+ '''
11165
+ self.enrollment_code_env_var = enrollment_code_env_var if enrollment_code_env_var is not None else ''
11166
+ '''
11167
+ code used by EJBCA during enrollment. May be left blank if no code is required.
11168
+ '''
11169
+ self.enrollment_username_env_var = enrollment_username_env_var if enrollment_username_env_var is not None else ''
11170
+ '''
11171
+ username that used by the EJBCA during enrollment. This can be left out.
11172
+ If so, the username must be auto-generated on the Keyfactor side.
11173
+ '''
11174
+ self.id = id if id is not None else ''
11175
+ '''
11176
+ Unique identifier of the SecretStore.
11177
+ '''
11178
+ self.key_file_path = key_file_path if key_file_path is not None else ''
11179
+ '''
11180
+ Path to private key in PEM format. This file should contain the private key associated with the
11181
+ client certificate configured in CertificateFile.
11182
+ '''
11183
+ self.name = name if name is not None else ''
11184
+ '''
11185
+ Unique human-readable name of the SecretStore.
11186
+ '''
11187
+ self.server_address = server_address if server_address is not None else ''
11188
+ '''
11189
+ the host of the Key Factor CA
11190
+ '''
11191
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
11192
+ '''
11193
+ Tags is a map of key, value pairs.
11194
+ '''
11195
+
11196
+ def __repr__(self):
11197
+ return '<sdm.KeyfactorSSHStore ' + \
11198
+ 'ca_file_path: ' + repr(self.ca_file_path) + ' ' +\
11199
+ 'certificate_file_path: ' + repr(self.certificate_file_path) + ' ' +\
11200
+ 'default_certificate_authority_name: ' + repr(self.default_certificate_authority_name) + ' ' +\
11201
+ 'default_certificate_profile_name: ' + repr(self.default_certificate_profile_name) + ' ' +\
11202
+ 'default_end_entity_profile_name: ' + repr(self.default_end_entity_profile_name) + ' ' +\
11203
+ 'enrollment_code_env_var: ' + repr(self.enrollment_code_env_var) + ' ' +\
11204
+ 'enrollment_username_env_var: ' + repr(self.enrollment_username_env_var) + ' ' +\
11205
+ 'id: ' + repr(self.id) + ' ' +\
11206
+ 'key_file_path: ' + repr(self.key_file_path) + ' ' +\
11207
+ 'name: ' + repr(self.name) + ' ' +\
11208
+ 'server_address: ' + repr(self.server_address) + ' ' +\
11209
+ 'tags: ' + repr(self.tags) + ' ' +\
11210
+ '>'
11211
+
11212
+ def to_dict(self):
11213
+ return {
11214
+ 'ca_file_path': self.ca_file_path,
11215
+ 'certificate_file_path': self.certificate_file_path,
11216
+ 'default_certificate_authority_name':
11217
+ self.default_certificate_authority_name,
11218
+ 'default_certificate_profile_name':
11219
+ self.default_certificate_profile_name,
11220
+ 'default_end_entity_profile_name':
11221
+ self.default_end_entity_profile_name,
11222
+ 'enrollment_code_env_var': self.enrollment_code_env_var,
11223
+ 'enrollment_username_env_var': self.enrollment_username_env_var,
11224
+ 'id': self.id,
11225
+ 'key_file_path': self.key_file_path,
11226
+ 'name': self.name,
11227
+ 'server_address': self.server_address,
11228
+ 'tags': self.tags,
11229
+ }
11230
+
11231
+ @classmethod
11232
+ def from_dict(cls, d):
11233
+ return cls(
11234
+ ca_file_path=d.get('ca_file_path'),
11235
+ certificate_file_path=d.get('certificate_file_path'),
11236
+ default_certificate_authority_name=d.get(
11237
+ 'default_certificate_authority_name'),
11238
+ default_certificate_profile_name=d.get(
11239
+ 'default_certificate_profile_name'),
11240
+ default_end_entity_profile_name=d.get(
11241
+ 'default_end_entity_profile_name'),
11242
+ enrollment_code_env_var=d.get('enrollment_code_env_var'),
11243
+ enrollment_username_env_var=d.get('enrollment_username_env_var'),
11244
+ id=d.get('id'),
11245
+ key_file_path=d.get('key_file_path'),
11246
+ name=d.get('name'),
11247
+ server_address=d.get('server_address'),
11248
+ tags=d.get('tags'),
11249
+ )
11250
+
11251
+
11252
+ class KeyfactorX509Store:
11253
+ __slots__ = [
11254
+ 'ca_file_path',
11255
+ 'certificate_file_path',
11256
+ 'default_certificate_authority_name',
11257
+ 'default_certificate_profile_name',
11258
+ 'default_end_entity_profile_name',
11259
+ 'enrollment_code_env_var',
11260
+ 'enrollment_username_env_var',
11261
+ 'id',
11262
+ 'key_file_path',
11263
+ 'name',
11264
+ 'server_address',
11265
+ 'tags',
11266
+ ]
11267
+
11268
+ def __init__(
11269
+ self,
11270
+ ca_file_path=None,
11271
+ certificate_file_path=None,
11272
+ default_certificate_authority_name=None,
11273
+ default_certificate_profile_name=None,
11274
+ default_end_entity_profile_name=None,
11275
+ enrollment_code_env_var=None,
11276
+ enrollment_username_env_var=None,
11277
+ id=None,
11278
+ key_file_path=None,
10665
11279
  name=None,
10666
11280
  server_address=None,
10667
11281
  tags=None,
@@ -10788,11 +11402,11 @@ class Kubernetes:
10788
11402
  'healthy',
10789
11403
  'hostname',
10790
11404
  'id',
11405
+ 'identity_alias_healthcheck_username',
11406
+ 'identity_set_id',
10791
11407
  'name',
10792
11408
  'port',
10793
11409
  'port_override',
10794
- 'remote_identity_group_id',
10795
- 'remote_identity_healthcheck_username',
10796
11410
  'secret_store_id',
10797
11411
  'subdomain',
10798
11412
  'tags',
@@ -10809,11 +11423,11 @@ class Kubernetes:
10809
11423
  healthy=None,
10810
11424
  hostname=None,
10811
11425
  id=None,
11426
+ identity_alias_healthcheck_username=None,
11427
+ identity_set_id=None,
10812
11428
  name=None,
10813
11429
  port=None,
10814
11430
  port_override=None,
10815
- remote_identity_group_id=None,
10816
- remote_identity_healthcheck_username=None,
10817
11431
  secret_store_id=None,
10818
11432
  subdomain=None,
10819
11433
  tags=None,
@@ -10854,6 +11468,14 @@ class Kubernetes:
10854
11468
  '''
10855
11469
  Unique identifier of the Resource.
10856
11470
  '''
11471
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
11472
+ '''
11473
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
11474
+ '''
11475
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
11476
+ '''
11477
+ The ID of the identity set to use for identity connections.
11478
+ '''
10857
11479
  self.name = name if name is not None else ''
10858
11480
  '''
10859
11481
  Unique human-readable name of the Resource.
@@ -10866,14 +11488,6 @@ class Kubernetes:
10866
11488
  '''
10867
11489
  The local port used by clients to connect to this resource.
10868
11490
  '''
10869
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
10870
- '''
10871
- The ID of the remote identity group to use for remote identity connections.
10872
- '''
10873
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
10874
- '''
10875
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
10876
- '''
10877
11491
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
10878
11492
  '''
10879
11493
  ID of the secret store containing credentials for this resource, if any.
@@ -10898,11 +11512,11 @@ class Kubernetes:
10898
11512
  'healthy: ' + repr(self.healthy) + ' ' +\
10899
11513
  'hostname: ' + repr(self.hostname) + ' ' +\
10900
11514
  'id: ' + repr(self.id) + ' ' +\
11515
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
11516
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
10901
11517
  'name: ' + repr(self.name) + ' ' +\
10902
11518
  'port: ' + repr(self.port) + ' ' +\
10903
11519
  'port_override: ' + repr(self.port_override) + ' ' +\
10904
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
10905
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
10906
11520
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
10907
11521
  'subdomain: ' + repr(self.subdomain) + ' ' +\
10908
11522
  'tags: ' + repr(self.tags) + ' ' +\
@@ -10919,12 +11533,12 @@ class Kubernetes:
10919
11533
  'healthy': self.healthy,
10920
11534
  'hostname': self.hostname,
10921
11535
  'id': self.id,
11536
+ 'identity_alias_healthcheck_username':
11537
+ self.identity_alias_healthcheck_username,
11538
+ 'identity_set_id': self.identity_set_id,
10922
11539
  'name': self.name,
10923
11540
  'port': self.port,
10924
11541
  'port_override': self.port_override,
10925
- 'remote_identity_group_id': self.remote_identity_group_id,
10926
- 'remote_identity_healthcheck_username':
10927
- self.remote_identity_healthcheck_username,
10928
11542
  'secret_store_id': self.secret_store_id,
10929
11543
  'subdomain': self.subdomain,
10930
11544
  'tags': self.tags,
@@ -10942,12 +11556,12 @@ class Kubernetes:
10942
11556
  healthy=d.get('healthy'),
10943
11557
  hostname=d.get('hostname'),
10944
11558
  id=d.get('id'),
11559
+ identity_alias_healthcheck_username=d.get(
11560
+ 'identity_alias_healthcheck_username'),
11561
+ identity_set_id=d.get('identity_set_id'),
10945
11562
  name=d.get('name'),
10946
11563
  port=d.get('port'),
10947
11564
  port_override=d.get('port_override'),
10948
- remote_identity_group_id=d.get('remote_identity_group_id'),
10949
- remote_identity_healthcheck_username=d.get(
10950
- 'remote_identity_healthcheck_username'),
10951
11565
  secret_store_id=d.get('secret_store_id'),
10952
11566
  subdomain=d.get('subdomain'),
10953
11567
  tags=d.get('tags'),
@@ -11110,11 +11724,11 @@ class KubernetesServiceAccount:
11110
11724
  'healthy',
11111
11725
  'hostname',
11112
11726
  'id',
11727
+ 'identity_alias_healthcheck_username',
11728
+ 'identity_set_id',
11113
11729
  'name',
11114
11730
  'port',
11115
11731
  'port_override',
11116
- 'remote_identity_group_id',
11117
- 'remote_identity_healthcheck_username',
11118
11732
  'secret_store_id',
11119
11733
  'subdomain',
11120
11734
  'tags',
@@ -11129,11 +11743,11 @@ class KubernetesServiceAccount:
11129
11743
  healthy=None,
11130
11744
  hostname=None,
11131
11745
  id=None,
11746
+ identity_alias_healthcheck_username=None,
11747
+ identity_set_id=None,
11132
11748
  name=None,
11133
11749
  port=None,
11134
11750
  port_override=None,
11135
- remote_identity_group_id=None,
11136
- remote_identity_healthcheck_username=None,
11137
11751
  secret_store_id=None,
11138
11752
  subdomain=None,
11139
11753
  tags=None,
@@ -11163,6 +11777,14 @@ class KubernetesServiceAccount:
11163
11777
  '''
11164
11778
  Unique identifier of the Resource.
11165
11779
  '''
11780
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
11781
+ '''
11782
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
11783
+ '''
11784
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
11785
+ '''
11786
+ The ID of the identity set to use for identity connections.
11787
+ '''
11166
11788
  self.name = name if name is not None else ''
11167
11789
  '''
11168
11790
  Unique human-readable name of the Resource.
@@ -11175,14 +11797,6 @@ class KubernetesServiceAccount:
11175
11797
  '''
11176
11798
  The local port used by clients to connect to this resource.
11177
11799
  '''
11178
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
11179
- '''
11180
- The ID of the remote identity group to use for remote identity connections.
11181
- '''
11182
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
11183
- '''
11184
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
11185
- '''
11186
11800
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
11187
11801
  '''
11188
11802
  ID of the secret store containing credentials for this resource, if any.
@@ -11208,11 +11822,11 @@ class KubernetesServiceAccount:
11208
11822
  'healthy: ' + repr(self.healthy) + ' ' +\
11209
11823
  'hostname: ' + repr(self.hostname) + ' ' +\
11210
11824
  'id: ' + repr(self.id) + ' ' +\
11825
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
11826
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
11211
11827
  'name: ' + repr(self.name) + ' ' +\
11212
11828
  'port: ' + repr(self.port) + ' ' +\
11213
11829
  'port_override: ' + repr(self.port_override) + ' ' +\
11214
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
11215
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
11216
11830
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
11217
11831
  'subdomain: ' + repr(self.subdomain) + ' ' +\
11218
11832
  'tags: ' + repr(self.tags) + ' ' +\
@@ -11227,12 +11841,12 @@ class KubernetesServiceAccount:
11227
11841
  'healthy': self.healthy,
11228
11842
  'hostname': self.hostname,
11229
11843
  'id': self.id,
11844
+ 'identity_alias_healthcheck_username':
11845
+ self.identity_alias_healthcheck_username,
11846
+ 'identity_set_id': self.identity_set_id,
11230
11847
  'name': self.name,
11231
11848
  'port': self.port,
11232
11849
  'port_override': self.port_override,
11233
- 'remote_identity_group_id': self.remote_identity_group_id,
11234
- 'remote_identity_healthcheck_username':
11235
- self.remote_identity_healthcheck_username,
11236
11850
  'secret_store_id': self.secret_store_id,
11237
11851
  'subdomain': self.subdomain,
11238
11852
  'tags': self.tags,
@@ -11248,12 +11862,12 @@ class KubernetesServiceAccount:
11248
11862
  healthy=d.get('healthy'),
11249
11863
  hostname=d.get('hostname'),
11250
11864
  id=d.get('id'),
11865
+ identity_alias_healthcheck_username=d.get(
11866
+ 'identity_alias_healthcheck_username'),
11867
+ identity_set_id=d.get('identity_set_id'),
11251
11868
  name=d.get('name'),
11252
11869
  port=d.get('port'),
11253
11870
  port_override=d.get('port_override'),
11254
- remote_identity_group_id=d.get('remote_identity_group_id'),
11255
- remote_identity_healthcheck_username=d.get(
11256
- 'remote_identity_healthcheck_username'),
11257
11871
  secret_store_id=d.get('secret_store_id'),
11258
11872
  subdomain=d.get('subdomain'),
11259
11873
  tags=d.get('tags'),
@@ -16155,11 +16769,11 @@ class RDPCert:
16155
16769
  'healthy',
16156
16770
  'hostname',
16157
16771
  'id',
16772
+ 'identity_alias_healthcheck_username',
16773
+ 'identity_set_id',
16158
16774
  'name',
16159
16775
  'port',
16160
16776
  'port_override',
16161
- 'remote_identity_group_id',
16162
- 'remote_identity_healthcheck_username',
16163
16777
  'secret_store_id',
16164
16778
  'subdomain',
16165
16779
  'tags',
@@ -16173,11 +16787,11 @@ class RDPCert:
16173
16787
  healthy=None,
16174
16788
  hostname=None,
16175
16789
  id=None,
16790
+ identity_alias_healthcheck_username=None,
16791
+ identity_set_id=None,
16176
16792
  name=None,
16177
16793
  port=None,
16178
16794
  port_override=None,
16179
- remote_identity_group_id=None,
16180
- remote_identity_healthcheck_username=None,
16181
16795
  secret_store_id=None,
16182
16796
  subdomain=None,
16183
16797
  tags=None,
@@ -16203,6 +16817,14 @@ class RDPCert:
16203
16817
  '''
16204
16818
  Unique identifier of the Resource.
16205
16819
  '''
16820
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
16821
+ '''
16822
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
16823
+ '''
16824
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
16825
+ '''
16826
+ The ID of the identity set to use for identity connections.
16827
+ '''
16206
16828
  self.name = name if name is not None else ''
16207
16829
  '''
16208
16830
  Unique human-readable name of the Resource.
@@ -16215,14 +16837,6 @@ class RDPCert:
16215
16837
  '''
16216
16838
  The local port used by clients to connect to this resource.
16217
16839
  '''
16218
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
16219
- '''
16220
- The ID of the remote identity group to use for remote identity connections.
16221
- '''
16222
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
16223
- '''
16224
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
16225
- '''
16226
16840
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
16227
16841
  '''
16228
16842
  ID of the secret store containing credentials for this resource, if any.
@@ -16247,11 +16861,11 @@ class RDPCert:
16247
16861
  'healthy: ' + repr(self.healthy) + ' ' +\
16248
16862
  'hostname: ' + repr(self.hostname) + ' ' +\
16249
16863
  'id: ' + repr(self.id) + ' ' +\
16864
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
16865
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
16250
16866
  'name: ' + repr(self.name) + ' ' +\
16251
16867
  'port: ' + repr(self.port) + ' ' +\
16252
16868
  'port_override: ' + repr(self.port_override) + ' ' +\
16253
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
16254
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
16255
16869
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
16256
16870
  'subdomain: ' + repr(self.subdomain) + ' ' +\
16257
16871
  'tags: ' + repr(self.tags) + ' ' +\
@@ -16265,12 +16879,12 @@ class RDPCert:
16265
16879
  'healthy': self.healthy,
16266
16880
  'hostname': self.hostname,
16267
16881
  'id': self.id,
16882
+ 'identity_alias_healthcheck_username':
16883
+ self.identity_alias_healthcheck_username,
16884
+ 'identity_set_id': self.identity_set_id,
16268
16885
  'name': self.name,
16269
16886
  'port': self.port,
16270
16887
  'port_override': self.port_override,
16271
- 'remote_identity_group_id': self.remote_identity_group_id,
16272
- 'remote_identity_healthcheck_username':
16273
- self.remote_identity_healthcheck_username,
16274
16888
  'secret_store_id': self.secret_store_id,
16275
16889
  'subdomain': self.subdomain,
16276
16890
  'tags': self.tags,
@@ -16285,12 +16899,12 @@ class RDPCert:
16285
16899
  healthy=d.get('healthy'),
16286
16900
  hostname=d.get('hostname'),
16287
16901
  id=d.get('id'),
16902
+ identity_alias_healthcheck_username=d.get(
16903
+ 'identity_alias_healthcheck_username'),
16904
+ identity_set_id=d.get('identity_set_id'),
16288
16905
  name=d.get('name'),
16289
16906
  port=d.get('port'),
16290
16907
  port_override=d.get('port_override'),
16291
- remote_identity_group_id=d.get('remote_identity_group_id'),
16292
- remote_identity_healthcheck_username=d.get(
16293
- 'remote_identity_healthcheck_username'),
16294
16908
  secret_store_id=d.get('secret_store_id'),
16295
16909
  subdomain=d.get('subdomain'),
16296
16910
  tags=d.get('tags'),
@@ -19421,13 +20035,13 @@ class SSHCert:
19421
20035
  'healthy',
19422
20036
  'hostname',
19423
20037
  'id',
20038
+ 'identity_alias_healthcheck_username',
20039
+ 'identity_set_id',
19424
20040
  'key_type',
19425
20041
  'name',
19426
20042
  'port',
19427
20043
  'port_forwarding',
19428
20044
  'port_override',
19429
- 'remote_identity_group_id',
19430
- 'remote_identity_healthcheck_username',
19431
20045
  'secret_store_id',
19432
20046
  'subdomain',
19433
20047
  'tags',
@@ -19442,13 +20056,13 @@ class SSHCert:
19442
20056
  healthy=None,
19443
20057
  hostname=None,
19444
20058
  id=None,
20059
+ identity_alias_healthcheck_username=None,
20060
+ identity_set_id=None,
19445
20061
  key_type=None,
19446
20062
  name=None,
19447
20063
  port=None,
19448
20064
  port_forwarding=None,
19449
20065
  port_override=None,
19450
- remote_identity_group_id=None,
19451
- remote_identity_healthcheck_username=None,
19452
20066
  secret_store_id=None,
19453
20067
  subdomain=None,
19454
20068
  tags=None,
@@ -19478,6 +20092,14 @@ class SSHCert:
19478
20092
  '''
19479
20093
  Unique identifier of the Resource.
19480
20094
  '''
20095
+ self.identity_alias_healthcheck_username = identity_alias_healthcheck_username if identity_alias_healthcheck_username is not None else ''
20096
+ '''
20097
+ The username to use for healthchecks, when clients otherwise connect with their own identity alias username.
20098
+ '''
20099
+ self.identity_set_id = identity_set_id if identity_set_id is not None else ''
20100
+ '''
20101
+ The ID of the identity set to use for identity connections.
20102
+ '''
19481
20103
  self.key_type = key_type if key_type is not None else ''
19482
20104
  '''
19483
20105
  The key type to use e.g. rsa-2048 or ed25519
@@ -19498,14 +20120,6 @@ class SSHCert:
19498
20120
  '''
19499
20121
  The local port used by clients to connect to this resource.
19500
20122
  '''
19501
- self.remote_identity_group_id = remote_identity_group_id if remote_identity_group_id is not None else ''
19502
- '''
19503
- The ID of the remote identity group to use for remote identity connections.
19504
- '''
19505
- self.remote_identity_healthcheck_username = remote_identity_healthcheck_username if remote_identity_healthcheck_username is not None else ''
19506
- '''
19507
- The username to use for healthchecks, when clients otherwise connect with their own remote identity username.
19508
- '''
19509
20123
  self.secret_store_id = secret_store_id if secret_store_id is not None else ''
19510
20124
  '''
19511
20125
  ID of the secret store containing credentials for this resource, if any.
@@ -19531,13 +20145,13 @@ class SSHCert:
19531
20145
  'healthy: ' + repr(self.healthy) + ' ' +\
19532
20146
  'hostname: ' + repr(self.hostname) + ' ' +\
19533
20147
  'id: ' + repr(self.id) + ' ' +\
20148
+ 'identity_alias_healthcheck_username: ' + repr(self.identity_alias_healthcheck_username) + ' ' +\
20149
+ 'identity_set_id: ' + repr(self.identity_set_id) + ' ' +\
19534
20150
  'key_type: ' + repr(self.key_type) + ' ' +\
19535
20151
  'name: ' + repr(self.name) + ' ' +\
19536
20152
  'port: ' + repr(self.port) + ' ' +\
19537
20153
  'port_forwarding: ' + repr(self.port_forwarding) + ' ' +\
19538
20154
  'port_override: ' + repr(self.port_override) + ' ' +\
19539
- 'remote_identity_group_id: ' + repr(self.remote_identity_group_id) + ' ' +\
19540
- 'remote_identity_healthcheck_username: ' + repr(self.remote_identity_healthcheck_username) + ' ' +\
19541
20155
  'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
19542
20156
  'subdomain: ' + repr(self.subdomain) + ' ' +\
19543
20157
  'tags: ' + repr(self.tags) + ' ' +\
@@ -19553,14 +20167,14 @@ class SSHCert:
19553
20167
  'healthy': self.healthy,
19554
20168
  'hostname': self.hostname,
19555
20169
  'id': self.id,
20170
+ 'identity_alias_healthcheck_username':
20171
+ self.identity_alias_healthcheck_username,
20172
+ 'identity_set_id': self.identity_set_id,
19556
20173
  'key_type': self.key_type,
19557
20174
  'name': self.name,
19558
20175
  'port': self.port,
19559
20176
  'port_forwarding': self.port_forwarding,
19560
20177
  'port_override': self.port_override,
19561
- 'remote_identity_group_id': self.remote_identity_group_id,
19562
- 'remote_identity_healthcheck_username':
19563
- self.remote_identity_healthcheck_username,
19564
20178
  'secret_store_id': self.secret_store_id,
19565
20179
  'subdomain': self.subdomain,
19566
20180
  'tags': self.tags,
@@ -19577,14 +20191,14 @@ class SSHCert:
19577
20191
  healthy=d.get('healthy'),
19578
20192
  hostname=d.get('hostname'),
19579
20193
  id=d.get('id'),
20194
+ identity_alias_healthcheck_username=d.get(
20195
+ 'identity_alias_healthcheck_username'),
20196
+ identity_set_id=d.get('identity_set_id'),
19580
20197
  key_type=d.get('key_type'),
19581
20198
  name=d.get('name'),
19582
20199
  port=d.get('port'),
19583
20200
  port_forwarding=d.get('port_forwarding'),
19584
20201
  port_override=d.get('port_override'),
19585
- remote_identity_group_id=d.get('remote_identity_group_id'),
19586
- remote_identity_healthcheck_username=d.get(
19587
- 'remote_identity_healthcheck_username'),
19588
20202
  secret_store_id=d.get('secret_store_id'),
19589
20203
  subdomain=d.get('subdomain'),
19590
20204
  tags=d.get('tags'),