strongdm 9.2.0__zip → 9.4.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-9.2.0 → strongdm-9.4.0}/PKG-INFO +2 -2
- {strongdm-9.2.0 → strongdm-9.4.0}/setup.py +2 -2
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/client.py +1 -1
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/drivers_pb2.py +196 -168
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/models.py +142 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/plumbing.py +30 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/queries_pb2.py +11 -9
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-9.2.0 → strongdm-9.4.0}/LICENSE +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/README.md +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/setup.cfg +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/__init__.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/constants.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/errors.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/options_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/organization_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/svc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-9.2.0 → strongdm-9.4.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -24,6 +24,8 @@ class AKS:
|
|
24
24
|
'certificate_authority',
|
25
25
|
'client_certificate',
|
26
26
|
'client_key',
|
27
|
+
'discovery_enabled',
|
28
|
+
'discovery_username',
|
27
29
|
'egress_filter',
|
28
30
|
'healthcheck_namespace',
|
29
31
|
'healthy',
|
@@ -45,6 +47,8 @@ class AKS:
|
|
45
47
|
certificate_authority=None,
|
46
48
|
client_certificate=None,
|
47
49
|
client_key=None,
|
50
|
+
discovery_enabled=None,
|
51
|
+
discovery_username=None,
|
48
52
|
egress_filter=None,
|
49
53
|
healthcheck_namespace=None,
|
50
54
|
healthy=None,
|
@@ -75,6 +79,15 @@ class AKS:
|
|
75
79
|
'''
|
76
80
|
The key to authenticate TLS connections with.
|
77
81
|
'''
|
82
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
83
|
+
'''
|
84
|
+
If true, configures discovery of a cluster to be run from a node.
|
85
|
+
'''
|
86
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
87
|
+
'''
|
88
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
89
|
+
running discovery.
|
90
|
+
'''
|
78
91
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
79
92
|
'''
|
80
93
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -134,6 +147,8 @@ class AKS:
|
|
134
147
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
135
148
|
'client_certificate: ' + repr(self.client_certificate) + ' ' +\
|
136
149
|
'client_key: ' + repr(self.client_key) + ' ' +\
|
150
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
151
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
137
152
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
138
153
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
139
154
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
@@ -155,6 +170,8 @@ class AKS:
|
|
155
170
|
'certificate_authority': self.certificate_authority,
|
156
171
|
'client_certificate': self.client_certificate,
|
157
172
|
'client_key': self.client_key,
|
173
|
+
'discovery_enabled': self.discovery_enabled,
|
174
|
+
'discovery_username': self.discovery_username,
|
158
175
|
'egress_filter': self.egress_filter,
|
159
176
|
'healthcheck_namespace': self.healthcheck_namespace,
|
160
177
|
'healthy': self.healthy,
|
@@ -178,6 +195,8 @@ class AKS:
|
|
178
195
|
certificate_authority=d.get('certificate_authority'),
|
179
196
|
client_certificate=d.get('client_certificate'),
|
180
197
|
client_key=d.get('client_key'),
|
198
|
+
discovery_enabled=d.get('discovery_enabled'),
|
199
|
+
discovery_username=d.get('discovery_username'),
|
181
200
|
egress_filter=d.get('egress_filter'),
|
182
201
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
183
202
|
healthy=d.get('healthy'),
|
@@ -346,6 +365,8 @@ class AKSBasicAuth:
|
|
346
365
|
class AKSServiceAccount:
|
347
366
|
__slots__ = [
|
348
367
|
'bind_interface',
|
368
|
+
'discovery_enabled',
|
369
|
+
'discovery_username',
|
349
370
|
'egress_filter',
|
350
371
|
'healthcheck_namespace',
|
351
372
|
'healthy',
|
@@ -365,6 +386,8 @@ class AKSServiceAccount:
|
|
365
386
|
def __init__(
|
366
387
|
self,
|
367
388
|
bind_interface=None,
|
389
|
+
discovery_enabled=None,
|
390
|
+
discovery_username=None,
|
368
391
|
egress_filter=None,
|
369
392
|
healthcheck_namespace=None,
|
370
393
|
healthy=None,
|
@@ -384,6 +407,15 @@ class AKSServiceAccount:
|
|
384
407
|
'''
|
385
408
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
386
409
|
'''
|
410
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
411
|
+
'''
|
412
|
+
If true, configures discovery of a cluster to be run from a node.
|
413
|
+
'''
|
414
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
415
|
+
'''
|
416
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
417
|
+
running discovery.
|
418
|
+
'''
|
387
419
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
388
420
|
'''
|
389
421
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -444,6 +476,8 @@ class AKSServiceAccount:
|
|
444
476
|
def __repr__(self):
|
445
477
|
return '<sdm.AKSServiceAccount ' + \
|
446
478
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
479
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
480
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
447
481
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
448
482
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
449
483
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
@@ -463,6 +497,8 @@ class AKSServiceAccount:
|
|
463
497
|
def to_dict(self):
|
464
498
|
return {
|
465
499
|
'bind_interface': self.bind_interface,
|
500
|
+
'discovery_enabled': self.discovery_enabled,
|
501
|
+
'discovery_username': self.discovery_username,
|
466
502
|
'egress_filter': self.egress_filter,
|
467
503
|
'healthcheck_namespace': self.healthcheck_namespace,
|
468
504
|
'healthy': self.healthy,
|
@@ -484,6 +520,8 @@ class AKSServiceAccount:
|
|
484
520
|
def from_dict(cls, d):
|
485
521
|
return cls(
|
486
522
|
bind_interface=d.get('bind_interface'),
|
523
|
+
discovery_enabled=d.get('discovery_enabled'),
|
524
|
+
discovery_username=d.get('discovery_username'),
|
487
525
|
egress_filter=d.get('egress_filter'),
|
488
526
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
489
527
|
healthy=d.get('healthy'),
|
@@ -3308,6 +3346,8 @@ class AmazonEKS:
|
|
3308
3346
|
'bind_interface',
|
3309
3347
|
'certificate_authority',
|
3310
3348
|
'cluster_name',
|
3349
|
+
'discovery_enabled',
|
3350
|
+
'discovery_username',
|
3311
3351
|
'egress_filter',
|
3312
3352
|
'endpoint',
|
3313
3353
|
'healthcheck_namespace',
|
@@ -3332,6 +3372,8 @@ class AmazonEKS:
|
|
3332
3372
|
bind_interface=None,
|
3333
3373
|
certificate_authority=None,
|
3334
3374
|
cluster_name=None,
|
3375
|
+
discovery_enabled=None,
|
3376
|
+
discovery_username=None,
|
3335
3377
|
egress_filter=None,
|
3336
3378
|
endpoint=None,
|
3337
3379
|
healthcheck_namespace=None,
|
@@ -3365,6 +3407,15 @@ class AmazonEKS:
|
|
3365
3407
|
'''
|
3366
3408
|
The name of the cluster to connect to.
|
3367
3409
|
'''
|
3410
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
3411
|
+
'''
|
3412
|
+
If true, configures discovery of a cluster to be run from a node.
|
3413
|
+
'''
|
3414
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
3415
|
+
'''
|
3416
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
3417
|
+
running discovery.
|
3418
|
+
'''
|
3368
3419
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
3369
3420
|
'''
|
3370
3421
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -3436,6 +3487,8 @@ class AmazonEKS:
|
|
3436
3487
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
3437
3488
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
3438
3489
|
'cluster_name: ' + repr(self.cluster_name) + ' ' +\
|
3490
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
3491
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
3439
3492
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
3440
3493
|
'endpoint: ' + repr(self.endpoint) + ' ' +\
|
3441
3494
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
@@ -3460,6 +3513,8 @@ class AmazonEKS:
|
|
3460
3513
|
'bind_interface': self.bind_interface,
|
3461
3514
|
'certificate_authority': self.certificate_authority,
|
3462
3515
|
'cluster_name': self.cluster_name,
|
3516
|
+
'discovery_enabled': self.discovery_enabled,
|
3517
|
+
'discovery_username': self.discovery_username,
|
3463
3518
|
'egress_filter': self.egress_filter,
|
3464
3519
|
'endpoint': self.endpoint,
|
3465
3520
|
'healthcheck_namespace': self.healthcheck_namespace,
|
@@ -3486,6 +3541,8 @@ class AmazonEKS:
|
|
3486
3541
|
bind_interface=d.get('bind_interface'),
|
3487
3542
|
certificate_authority=d.get('certificate_authority'),
|
3488
3543
|
cluster_name=d.get('cluster_name'),
|
3544
|
+
discovery_enabled=d.get('discovery_enabled'),
|
3545
|
+
discovery_username=d.get('discovery_username'),
|
3489
3546
|
egress_filter=d.get('egress_filter'),
|
3490
3547
|
endpoint=d.get('endpoint'),
|
3491
3548
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
@@ -3511,6 +3568,8 @@ class AmazonEKSInstanceProfile:
|
|
3511
3568
|
'bind_interface',
|
3512
3569
|
'certificate_authority',
|
3513
3570
|
'cluster_name',
|
3571
|
+
'discovery_enabled',
|
3572
|
+
'discovery_username',
|
3514
3573
|
'egress_filter',
|
3515
3574
|
'endpoint',
|
3516
3575
|
'healthcheck_namespace',
|
@@ -3533,6 +3592,8 @@ class AmazonEKSInstanceProfile:
|
|
3533
3592
|
bind_interface=None,
|
3534
3593
|
certificate_authority=None,
|
3535
3594
|
cluster_name=None,
|
3595
|
+
discovery_enabled=None,
|
3596
|
+
discovery_username=None,
|
3536
3597
|
egress_filter=None,
|
3537
3598
|
endpoint=None,
|
3538
3599
|
healthcheck_namespace=None,
|
@@ -3561,6 +3622,15 @@ class AmazonEKSInstanceProfile:
|
|
3561
3622
|
'''
|
3562
3623
|
The name of the cluster to connect to.
|
3563
3624
|
'''
|
3625
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
3626
|
+
'''
|
3627
|
+
If true, configures discovery of a cluster to be run from a node.
|
3628
|
+
'''
|
3629
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
3630
|
+
'''
|
3631
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
3632
|
+
running discovery.
|
3633
|
+
'''
|
3564
3634
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
3565
3635
|
'''
|
3566
3636
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -3627,6 +3697,8 @@ class AmazonEKSInstanceProfile:
|
|
3627
3697
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
3628
3698
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
3629
3699
|
'cluster_name: ' + repr(self.cluster_name) + ' ' +\
|
3700
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
3701
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
3630
3702
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
3631
3703
|
'endpoint: ' + repr(self.endpoint) + ' ' +\
|
3632
3704
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
@@ -3649,6 +3721,8 @@ class AmazonEKSInstanceProfile:
|
|
3649
3721
|
'bind_interface': self.bind_interface,
|
3650
3722
|
'certificate_authority': self.certificate_authority,
|
3651
3723
|
'cluster_name': self.cluster_name,
|
3724
|
+
'discovery_enabled': self.discovery_enabled,
|
3725
|
+
'discovery_username': self.discovery_username,
|
3652
3726
|
'egress_filter': self.egress_filter,
|
3653
3727
|
'endpoint': self.endpoint,
|
3654
3728
|
'healthcheck_namespace': self.healthcheck_namespace,
|
@@ -3673,6 +3747,8 @@ class AmazonEKSInstanceProfile:
|
|
3673
3747
|
bind_interface=d.get('bind_interface'),
|
3674
3748
|
certificate_authority=d.get('certificate_authority'),
|
3675
3749
|
cluster_name=d.get('cluster_name'),
|
3750
|
+
discovery_enabled=d.get('discovery_enabled'),
|
3751
|
+
discovery_username=d.get('discovery_username'),
|
3676
3752
|
egress_filter=d.get('egress_filter'),
|
3677
3753
|
endpoint=d.get('endpoint'),
|
3678
3754
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
@@ -9578,6 +9654,8 @@ class GoogleGKE:
|
|
9578
9654
|
__slots__ = [
|
9579
9655
|
'bind_interface',
|
9580
9656
|
'certificate_authority',
|
9657
|
+
'discovery_enabled',
|
9658
|
+
'discovery_username',
|
9581
9659
|
'egress_filter',
|
9582
9660
|
'endpoint',
|
9583
9661
|
'healthcheck_namespace',
|
@@ -9597,6 +9675,8 @@ class GoogleGKE:
|
|
9597
9675
|
self,
|
9598
9676
|
bind_interface=None,
|
9599
9677
|
certificate_authority=None,
|
9678
|
+
discovery_enabled=None,
|
9679
|
+
discovery_username=None,
|
9600
9680
|
egress_filter=None,
|
9601
9681
|
endpoint=None,
|
9602
9682
|
healthcheck_namespace=None,
|
@@ -9619,6 +9699,15 @@ class GoogleGKE:
|
|
9619
9699
|
'''
|
9620
9700
|
The CA to authenticate TLS connections with.
|
9621
9701
|
'''
|
9702
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
9703
|
+
'''
|
9704
|
+
If true, configures discovery of a cluster to be run from a node.
|
9705
|
+
'''
|
9706
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
9707
|
+
'''
|
9708
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
9709
|
+
running discovery.
|
9710
|
+
'''
|
9622
9711
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
9623
9712
|
'''
|
9624
9713
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -9676,6 +9765,8 @@ class GoogleGKE:
|
|
9676
9765
|
return '<sdm.GoogleGKE ' + \
|
9677
9766
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
9678
9767
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
9768
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
9769
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
9679
9770
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
9680
9771
|
'endpoint: ' + repr(self.endpoint) + ' ' +\
|
9681
9772
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
@@ -9695,6 +9786,8 @@ class GoogleGKE:
|
|
9695
9786
|
return {
|
9696
9787
|
'bind_interface': self.bind_interface,
|
9697
9788
|
'certificate_authority': self.certificate_authority,
|
9789
|
+
'discovery_enabled': self.discovery_enabled,
|
9790
|
+
'discovery_username': self.discovery_username,
|
9698
9791
|
'egress_filter': self.egress_filter,
|
9699
9792
|
'endpoint': self.endpoint,
|
9700
9793
|
'healthcheck_namespace': self.healthcheck_namespace,
|
@@ -9716,6 +9809,8 @@ class GoogleGKE:
|
|
9716
9809
|
return cls(
|
9717
9810
|
bind_interface=d.get('bind_interface'),
|
9718
9811
|
certificate_authority=d.get('certificate_authority'),
|
9812
|
+
discovery_enabled=d.get('discovery_enabled'),
|
9813
|
+
discovery_username=d.get('discovery_username'),
|
9719
9814
|
egress_filter=d.get('egress_filter'),
|
9720
9815
|
endpoint=d.get('endpoint'),
|
9721
9816
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
@@ -11397,6 +11492,8 @@ class Kubernetes:
|
|
11397
11492
|
'certificate_authority',
|
11398
11493
|
'client_certificate',
|
11399
11494
|
'client_key',
|
11495
|
+
'discovery_enabled',
|
11496
|
+
'discovery_username',
|
11400
11497
|
'egress_filter',
|
11401
11498
|
'healthcheck_namespace',
|
11402
11499
|
'healthy',
|
@@ -11418,6 +11515,8 @@ class Kubernetes:
|
|
11418
11515
|
certificate_authority=None,
|
11419
11516
|
client_certificate=None,
|
11420
11517
|
client_key=None,
|
11518
|
+
discovery_enabled=None,
|
11519
|
+
discovery_username=None,
|
11421
11520
|
egress_filter=None,
|
11422
11521
|
healthcheck_namespace=None,
|
11423
11522
|
healthy=None,
|
@@ -11448,6 +11547,15 @@ class Kubernetes:
|
|
11448
11547
|
'''
|
11449
11548
|
The key to authenticate TLS connections with.
|
11450
11549
|
'''
|
11550
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
11551
|
+
'''
|
11552
|
+
If true, configures discovery of a cluster to be run from a node.
|
11553
|
+
'''
|
11554
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
11555
|
+
'''
|
11556
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
11557
|
+
running discovery.
|
11558
|
+
'''
|
11451
11559
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
11452
11560
|
'''
|
11453
11561
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -11507,6 +11615,8 @@ class Kubernetes:
|
|
11507
11615
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
11508
11616
|
'client_certificate: ' + repr(self.client_certificate) + ' ' +\
|
11509
11617
|
'client_key: ' + repr(self.client_key) + ' ' +\
|
11618
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
11619
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
11510
11620
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
11511
11621
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
11512
11622
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
@@ -11528,6 +11638,8 @@ class Kubernetes:
|
|
11528
11638
|
'certificate_authority': self.certificate_authority,
|
11529
11639
|
'client_certificate': self.client_certificate,
|
11530
11640
|
'client_key': self.client_key,
|
11641
|
+
'discovery_enabled': self.discovery_enabled,
|
11642
|
+
'discovery_username': self.discovery_username,
|
11531
11643
|
'egress_filter': self.egress_filter,
|
11532
11644
|
'healthcheck_namespace': self.healthcheck_namespace,
|
11533
11645
|
'healthy': self.healthy,
|
@@ -11551,6 +11663,8 @@ class Kubernetes:
|
|
11551
11663
|
certificate_authority=d.get('certificate_authority'),
|
11552
11664
|
client_certificate=d.get('client_certificate'),
|
11553
11665
|
client_key=d.get('client_key'),
|
11666
|
+
discovery_enabled=d.get('discovery_enabled'),
|
11667
|
+
discovery_username=d.get('discovery_username'),
|
11554
11668
|
egress_filter=d.get('egress_filter'),
|
11555
11669
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
11556
11670
|
healthy=d.get('healthy'),
|
@@ -11719,6 +11833,8 @@ class KubernetesBasicAuth:
|
|
11719
11833
|
class KubernetesServiceAccount:
|
11720
11834
|
__slots__ = [
|
11721
11835
|
'bind_interface',
|
11836
|
+
'discovery_enabled',
|
11837
|
+
'discovery_username',
|
11722
11838
|
'egress_filter',
|
11723
11839
|
'healthcheck_namespace',
|
11724
11840
|
'healthy',
|
@@ -11738,6 +11854,8 @@ class KubernetesServiceAccount:
|
|
11738
11854
|
def __init__(
|
11739
11855
|
self,
|
11740
11856
|
bind_interface=None,
|
11857
|
+
discovery_enabled=None,
|
11858
|
+
discovery_username=None,
|
11741
11859
|
egress_filter=None,
|
11742
11860
|
healthcheck_namespace=None,
|
11743
11861
|
healthy=None,
|
@@ -11757,6 +11875,15 @@ class KubernetesServiceAccount:
|
|
11757
11875
|
'''
|
11758
11876
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
11759
11877
|
'''
|
11878
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
11879
|
+
'''
|
11880
|
+
If true, configures discovery of a cluster to be run from a node.
|
11881
|
+
'''
|
11882
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
11883
|
+
'''
|
11884
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
11885
|
+
running discovery.
|
11886
|
+
'''
|
11760
11887
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
11761
11888
|
'''
|
11762
11889
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -11817,6 +11944,8 @@ class KubernetesServiceAccount:
|
|
11817
11944
|
def __repr__(self):
|
11818
11945
|
return '<sdm.KubernetesServiceAccount ' + \
|
11819
11946
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
11947
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
11948
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
11820
11949
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
11821
11950
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
11822
11951
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
@@ -11836,6 +11965,8 @@ class KubernetesServiceAccount:
|
|
11836
11965
|
def to_dict(self):
|
11837
11966
|
return {
|
11838
11967
|
'bind_interface': self.bind_interface,
|
11968
|
+
'discovery_enabled': self.discovery_enabled,
|
11969
|
+
'discovery_username': self.discovery_username,
|
11839
11970
|
'egress_filter': self.egress_filter,
|
11840
11971
|
'healthcheck_namespace': self.healthcheck_namespace,
|
11841
11972
|
'healthy': self.healthy,
|
@@ -11857,6 +11988,8 @@ class KubernetesServiceAccount:
|
|
11857
11988
|
def from_dict(cls, d):
|
11858
11989
|
return cls(
|
11859
11990
|
bind_interface=d.get('bind_interface'),
|
11991
|
+
discovery_enabled=d.get('discovery_enabled'),
|
11992
|
+
discovery_username=d.get('discovery_username'),
|
11860
11993
|
egress_filter=d.get('egress_filter'),
|
11861
11994
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
11862
11995
|
healthy=d.get('healthy'),
|
@@ -16216,6 +16349,7 @@ class Query:
|
|
16216
16349
|
'egress_node_id',
|
16217
16350
|
'encrypted',
|
16218
16351
|
'id',
|
16352
|
+
'identity_alias_username',
|
16219
16353
|
'query_body',
|
16220
16354
|
'query_category',
|
16221
16355
|
'query_hash',
|
@@ -16245,6 +16379,7 @@ class Query:
|
|
16245
16379
|
egress_node_id=None,
|
16246
16380
|
encrypted=None,
|
16247
16381
|
id=None,
|
16382
|
+
identity_alias_username=None,
|
16248
16383
|
query_body=None,
|
16249
16384
|
query_category=None,
|
16250
16385
|
query_hash=None,
|
@@ -16314,6 +16449,10 @@ class Query:
|
|
16314
16449
|
'''
|
16315
16450
|
Unique identifier of the Query.
|
16316
16451
|
'''
|
16452
|
+
self.identity_alias_username = identity_alias_username if identity_alias_username is not None else ''
|
16453
|
+
'''
|
16454
|
+
The username of the IdentityAlias used to access the Resource.
|
16455
|
+
'''
|
16317
16456
|
self.query_body = query_body if query_body is not None else ''
|
16318
16457
|
'''
|
16319
16458
|
The captured content of the Query.
|
@@ -16388,6 +16527,7 @@ class Query:
|
|
16388
16527
|
'egress_node_id: ' + repr(self.egress_node_id) + ' ' +\
|
16389
16528
|
'encrypted: ' + repr(self.encrypted) + ' ' +\
|
16390
16529
|
'id: ' + repr(self.id) + ' ' +\
|
16530
|
+
'identity_alias_username: ' + repr(self.identity_alias_username) + ' ' +\
|
16391
16531
|
'query_body: ' + repr(self.query_body) + ' ' +\
|
16392
16532
|
'query_category: ' + repr(self.query_category) + ' ' +\
|
16393
16533
|
'query_hash: ' + repr(self.query_hash) + ' ' +\
|
@@ -16417,6 +16557,7 @@ class Query:
|
|
16417
16557
|
'egress_node_id': self.egress_node_id,
|
16418
16558
|
'encrypted': self.encrypted,
|
16419
16559
|
'id': self.id,
|
16560
|
+
'identity_alias_username': self.identity_alias_username,
|
16420
16561
|
'query_body': self.query_body,
|
16421
16562
|
'query_category': self.query_category,
|
16422
16563
|
'query_hash': self.query_hash,
|
@@ -16447,6 +16588,7 @@ class Query:
|
|
16447
16588
|
egress_node_id=d.get('egress_node_id'),
|
16448
16589
|
encrypted=d.get('encrypted'),
|
16449
16590
|
id=d.get('id'),
|
16591
|
+
identity_alias_username=d.get('identity_alias_username'),
|
16450
16592
|
query_body=d.get('query_body'),
|
16451
16593
|
query_category=d.get('query_category'),
|
16452
16594
|
query_hash=d.get('query_hash'),
|
@@ -164,6 +164,8 @@ def convert_aks_to_porcelain(plumbing):
|
|
164
164
|
porcelain.certificate_authority = (plumbing.certificate_authority)
|
165
165
|
porcelain.client_certificate = (plumbing.client_certificate)
|
166
166
|
porcelain.client_key = (plumbing.client_key)
|
167
|
+
porcelain.discovery_enabled = (plumbing.discovery_enabled)
|
168
|
+
porcelain.discovery_username = (plumbing.discovery_username)
|
167
169
|
porcelain.egress_filter = (plumbing.egress_filter)
|
168
170
|
porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
|
169
171
|
porcelain.healthy = (plumbing.healthy)
|
@@ -189,6 +191,8 @@ def convert_aks_to_plumbing(porcelain):
|
|
189
191
|
plumbing.certificate_authority = (porcelain.certificate_authority)
|
190
192
|
plumbing.client_certificate = (porcelain.client_certificate)
|
191
193
|
plumbing.client_key = (porcelain.client_key)
|
194
|
+
plumbing.discovery_enabled = (porcelain.discovery_enabled)
|
195
|
+
plumbing.discovery_username = (porcelain.discovery_username)
|
192
196
|
plumbing.egress_filter = (porcelain.egress_filter)
|
193
197
|
plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
|
194
198
|
plumbing.healthy = (porcelain.healthy)
|
@@ -274,6 +278,8 @@ def convert_aks_service_account_to_porcelain(plumbing):
|
|
274
278
|
return None
|
275
279
|
porcelain = models.AKSServiceAccount()
|
276
280
|
porcelain.bind_interface = (plumbing.bind_interface)
|
281
|
+
porcelain.discovery_enabled = (plumbing.discovery_enabled)
|
282
|
+
porcelain.discovery_username = (plumbing.discovery_username)
|
277
283
|
porcelain.egress_filter = (plumbing.egress_filter)
|
278
284
|
porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
|
279
285
|
porcelain.healthy = (plumbing.healthy)
|
@@ -297,6 +303,8 @@ def convert_aks_service_account_to_plumbing(porcelain):
|
|
297
303
|
if porcelain is None:
|
298
304
|
return plumbing
|
299
305
|
plumbing.bind_interface = (porcelain.bind_interface)
|
306
|
+
plumbing.discovery_enabled = (porcelain.discovery_enabled)
|
307
|
+
plumbing.discovery_username = (porcelain.discovery_username)
|
300
308
|
plumbing.egress_filter = (porcelain.egress_filter)
|
301
309
|
plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
|
302
310
|
plumbing.healthy = (porcelain.healthy)
|
@@ -1904,6 +1912,8 @@ def convert_amazon_eks_to_porcelain(plumbing):
|
|
1904
1912
|
porcelain.bind_interface = (plumbing.bind_interface)
|
1905
1913
|
porcelain.certificate_authority = (plumbing.certificate_authority)
|
1906
1914
|
porcelain.cluster_name = (plumbing.cluster_name)
|
1915
|
+
porcelain.discovery_enabled = (plumbing.discovery_enabled)
|
1916
|
+
porcelain.discovery_username = (plumbing.discovery_username)
|
1907
1917
|
porcelain.egress_filter = (plumbing.egress_filter)
|
1908
1918
|
porcelain.endpoint = (plumbing.endpoint)
|
1909
1919
|
porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
|
@@ -1932,6 +1942,8 @@ def convert_amazon_eks_to_plumbing(porcelain):
|
|
1932
1942
|
plumbing.bind_interface = (porcelain.bind_interface)
|
1933
1943
|
plumbing.certificate_authority = (porcelain.certificate_authority)
|
1934
1944
|
plumbing.cluster_name = (porcelain.cluster_name)
|
1945
|
+
plumbing.discovery_enabled = (porcelain.discovery_enabled)
|
1946
|
+
plumbing.discovery_username = (porcelain.discovery_username)
|
1935
1947
|
plumbing.egress_filter = (porcelain.egress_filter)
|
1936
1948
|
plumbing.endpoint = (porcelain.endpoint)
|
1937
1949
|
plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
|
@@ -1971,6 +1983,8 @@ def convert_amazon_eks_instance_profile_to_porcelain(plumbing):
|
|
1971
1983
|
porcelain.bind_interface = (plumbing.bind_interface)
|
1972
1984
|
porcelain.certificate_authority = (plumbing.certificate_authority)
|
1973
1985
|
porcelain.cluster_name = (plumbing.cluster_name)
|
1986
|
+
porcelain.discovery_enabled = (plumbing.discovery_enabled)
|
1987
|
+
porcelain.discovery_username = (plumbing.discovery_username)
|
1974
1988
|
porcelain.egress_filter = (plumbing.egress_filter)
|
1975
1989
|
porcelain.endpoint = (plumbing.endpoint)
|
1976
1990
|
porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
|
@@ -1997,6 +2011,8 @@ def convert_amazon_eks_instance_profile_to_plumbing(porcelain):
|
|
1997
2011
|
plumbing.bind_interface = (porcelain.bind_interface)
|
1998
2012
|
plumbing.certificate_authority = (porcelain.certificate_authority)
|
1999
2013
|
plumbing.cluster_name = (porcelain.cluster_name)
|
2014
|
+
plumbing.discovery_enabled = (porcelain.discovery_enabled)
|
2015
|
+
plumbing.discovery_username = (porcelain.discovery_username)
|
2000
2016
|
plumbing.egress_filter = (porcelain.egress_filter)
|
2001
2017
|
plumbing.endpoint = (porcelain.endpoint)
|
2002
2018
|
plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
|
@@ -4726,6 +4742,8 @@ def convert_google_gke_to_porcelain(plumbing):
|
|
4726
4742
|
porcelain = models.GoogleGKE()
|
4727
4743
|
porcelain.bind_interface = (plumbing.bind_interface)
|
4728
4744
|
porcelain.certificate_authority = (plumbing.certificate_authority)
|
4745
|
+
porcelain.discovery_enabled = (plumbing.discovery_enabled)
|
4746
|
+
porcelain.discovery_username = (plumbing.discovery_username)
|
4729
4747
|
porcelain.egress_filter = (plumbing.egress_filter)
|
4730
4748
|
porcelain.endpoint = (plumbing.endpoint)
|
4731
4749
|
porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
|
@@ -4749,6 +4767,8 @@ def convert_google_gke_to_plumbing(porcelain):
|
|
4749
4767
|
return plumbing
|
4750
4768
|
plumbing.bind_interface = (porcelain.bind_interface)
|
4751
4769
|
plumbing.certificate_authority = (porcelain.certificate_authority)
|
4770
|
+
plumbing.discovery_enabled = (porcelain.discovery_enabled)
|
4771
|
+
plumbing.discovery_username = (porcelain.discovery_username)
|
4752
4772
|
plumbing.egress_filter = (porcelain.egress_filter)
|
4753
4773
|
plumbing.endpoint = (porcelain.endpoint)
|
4754
4774
|
plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
|
@@ -5631,6 +5651,8 @@ def convert_kubernetes_to_porcelain(plumbing):
|
|
5631
5651
|
porcelain.certificate_authority = (plumbing.certificate_authority)
|
5632
5652
|
porcelain.client_certificate = (plumbing.client_certificate)
|
5633
5653
|
porcelain.client_key = (plumbing.client_key)
|
5654
|
+
porcelain.discovery_enabled = (plumbing.discovery_enabled)
|
5655
|
+
porcelain.discovery_username = (plumbing.discovery_username)
|
5634
5656
|
porcelain.egress_filter = (plumbing.egress_filter)
|
5635
5657
|
porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
|
5636
5658
|
porcelain.healthy = (plumbing.healthy)
|
@@ -5656,6 +5678,8 @@ def convert_kubernetes_to_plumbing(porcelain):
|
|
5656
5678
|
plumbing.certificate_authority = (porcelain.certificate_authority)
|
5657
5679
|
plumbing.client_certificate = (porcelain.client_certificate)
|
5658
5680
|
plumbing.client_key = (porcelain.client_key)
|
5681
|
+
plumbing.discovery_enabled = (porcelain.discovery_enabled)
|
5682
|
+
plumbing.discovery_username = (porcelain.discovery_username)
|
5659
5683
|
plumbing.egress_filter = (porcelain.egress_filter)
|
5660
5684
|
plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
|
5661
5685
|
plumbing.healthy = (porcelain.healthy)
|
@@ -5746,6 +5770,8 @@ def convert_kubernetes_service_account_to_porcelain(plumbing):
|
|
5746
5770
|
return None
|
5747
5771
|
porcelain = models.KubernetesServiceAccount()
|
5748
5772
|
porcelain.bind_interface = (plumbing.bind_interface)
|
5773
|
+
porcelain.discovery_enabled = (plumbing.discovery_enabled)
|
5774
|
+
porcelain.discovery_username = (plumbing.discovery_username)
|
5749
5775
|
porcelain.egress_filter = (plumbing.egress_filter)
|
5750
5776
|
porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
|
5751
5777
|
porcelain.healthy = (plumbing.healthy)
|
@@ -5769,6 +5795,8 @@ def convert_kubernetes_service_account_to_plumbing(porcelain):
|
|
5769
5795
|
if porcelain is None:
|
5770
5796
|
return plumbing
|
5771
5797
|
plumbing.bind_interface = (porcelain.bind_interface)
|
5798
|
+
plumbing.discovery_enabled = (porcelain.discovery_enabled)
|
5799
|
+
plumbing.discovery_username = (porcelain.discovery_username)
|
5772
5800
|
plumbing.egress_filter = (porcelain.egress_filter)
|
5773
5801
|
plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
|
5774
5802
|
plumbing.healthy = (porcelain.healthy)
|
@@ -7817,6 +7845,7 @@ def convert_query_to_porcelain(plumbing):
|
|
7817
7845
|
porcelain.egress_node_id = (plumbing.egress_node_id)
|
7818
7846
|
porcelain.encrypted = (plumbing.encrypted)
|
7819
7847
|
porcelain.id = (plumbing.id)
|
7848
|
+
porcelain.identity_alias_username = (plumbing.identity_alias_username)
|
7820
7849
|
porcelain.query_body = (plumbing.query_body)
|
7821
7850
|
porcelain.query_category = (plumbing.query_category)
|
7822
7851
|
porcelain.query_hash = (plumbing.query_hash)
|
@@ -7853,6 +7882,7 @@ def convert_query_to_plumbing(porcelain):
|
|
7853
7882
|
plumbing.egress_node_id = (porcelain.egress_node_id)
|
7854
7883
|
plumbing.encrypted = (porcelain.encrypted)
|
7855
7884
|
plumbing.id = (porcelain.id)
|
7885
|
+
plumbing.identity_alias_username = (porcelain.identity_alias_username)
|
7856
7886
|
plumbing.query_body = (porcelain.query_body)
|
7857
7887
|
plumbing.query_category = (porcelain.query_category)
|
7858
7888
|
plumbing.query_hash = (porcelain.query_hash)
|