strongdm 9.2.0__zip → 9.4.0__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (135) hide show
  1. {strongdm-9.2.0 → strongdm-9.4.0}/PKG-INFO +2 -2
  2. {strongdm-9.2.0 → strongdm-9.4.0}/setup.py +2 -2
  3. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/client.py +1 -1
  4. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/drivers_pb2.py +196 -168
  5. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/models.py +142 -0
  6. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/plumbing.py +30 -0
  7. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/queries_pb2.py +11 -9
  8. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm.egg-info/PKG-INFO +2 -2
  9. {strongdm-9.2.0 → strongdm-9.4.0}/LICENSE +0 -0
  10. {strongdm-9.2.0 → strongdm-9.4.0}/README.md +0 -0
  11. {strongdm-9.2.0 → strongdm-9.4.0}/setup.cfg +0 -0
  12. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/__init__.py +0 -0
  13. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_request_events_history_pb2.py +0 -0
  14. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
  15. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_requests_history_pb2.py +0 -0
  16. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
  17. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_requests_pb2.py +0 -0
  18. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/access_requests_pb2_grpc.py +0 -0
  19. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_attachments_history_pb2.py +0 -0
  20. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  21. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_attachments_pb2.py +0 -0
  22. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
  23. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_grants_history_pb2.py +0 -0
  24. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  25. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_grants_pb2.py +0 -0
  26. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_grants_pb2_grpc.py +0 -0
  27. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_permissions_pb2.py +0 -0
  28. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
  29. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_resources_history_pb2.py +0 -0
  30. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  31. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_resources_pb2.py +0 -0
  32. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/account_resources_pb2_grpc.py +0 -0
  33. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/accounts_history_pb2.py +0 -0
  34. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
  35. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/accounts_pb2.py +0 -0
  36. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/accounts_pb2_grpc.py +0 -0
  37. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/activities_pb2.py +0 -0
  38. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/activities_pb2_grpc.py +0 -0
  39. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
  40. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
  41. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
  42. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
  43. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
  44. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
  45. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
  46. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
  47. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflows_history_pb2.py +0 -0
  48. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
  49. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflows_pb2.py +0 -0
  50. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
  51. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/constants.py +0 -0
  52. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/control_panel_pb2.py +0 -0
  53. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/control_panel_pb2_grpc.py +0 -0
  54. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/drivers_pb2_grpc.py +0 -0
  55. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/errors.py +0 -0
  56. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_aliases_history_pb2.py +0 -0
  57. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
  58. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_aliases_pb2.py +0 -0
  59. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
  60. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_sets_history_pb2.py +0 -0
  61. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
  62. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_sets_pb2.py +0 -0
  63. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
  64. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/nodes_history_pb2.py +0 -0
  65. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
  66. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/nodes_pb2.py +0 -0
  67. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/nodes_pb2_grpc.py +0 -0
  68. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/options_pb2.py +0 -0
  69. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/options_pb2_grpc.py +0 -0
  70. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/organization_history_pb2.py +0 -0
  71. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/organization_history_pb2_grpc.py +0 -0
  72. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_nodes_pb2.py +0 -0
  73. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
  74. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_peers_pb2.py +0 -0
  75. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
  76. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_resources_pb2.py +0 -0
  77. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
  78. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_groups_pb2.py +0 -0
  79. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
  80. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/queries_pb2_grpc.py +0 -0
  81. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identities_history_pb2.py +0 -0
  82. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  83. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identities_pb2.py +0 -0
  84. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
  85. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
  86. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  87. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identity_groups_pb2.py +0 -0
  88. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  89. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/replays_pb2.py +0 -0
  90. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/replays_pb2_grpc.py +0 -0
  91. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/resources_history_pb2.py +0 -0
  92. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/resources_history_pb2_grpc.py +0 -0
  93. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/resources_pb2.py +0 -0
  94. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/resources_pb2_grpc.py +0 -0
  95. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/role_resources_history_pb2.py +0 -0
  96. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  97. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/role_resources_pb2.py +0 -0
  98. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/role_resources_pb2_grpc.py +0 -0
  99. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/roles_history_pb2.py +0 -0
  100. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/roles_history_pb2_grpc.py +0 -0
  101. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/roles_pb2.py +0 -0
  102. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/roles_pb2_grpc.py +0 -0
  103. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_store_healths_pb2.py +0 -0
  104. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
  105. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_store_types_pb2.py +0 -0
  106. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  107. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_stores_history_pb2.py +0 -0
  108. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  109. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_stores_pb2.py +0 -0
  110. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
  111. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/spec_pb2.py +0 -0
  112. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/spec_pb2_grpc.py +0 -0
  113. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/svc.py +0 -0
  114. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/tags_pb2.py +0 -0
  115. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/tags_pb2_grpc.py +0 -0
  116. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
  117. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
  118. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_approvers_pb2.py +0 -0
  119. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
  120. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
  121. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
  122. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_assignments_pb2.py +0 -0
  123. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
  124. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_roles_history_pb2.py +0 -0
  125. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
  126. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_roles_pb2.py +0 -0
  127. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
  128. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflows_history_pb2.py +0 -0
  129. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
  130. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflows_pb2.py +0 -0
  131. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm/workflows_pb2_grpc.py +0 -0
  132. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm.egg-info/SOURCES.txt +0 -0
  133. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm.egg-info/dependency_links.txt +0 -0
  134. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm.egg-info/requires.txt +0 -0
  135. {strongdm-9.2.0 → strongdm-9.4.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -24,6 +24,8 @@ class AKS:
24
24
  'certificate_authority',
25
25
  'client_certificate',
26
26
  'client_key',
27
+ 'discovery_enabled',
28
+ 'discovery_username',
27
29
  'egress_filter',
28
30
  'healthcheck_namespace',
29
31
  'healthy',
@@ -45,6 +47,8 @@ class AKS:
45
47
  certificate_authority=None,
46
48
  client_certificate=None,
47
49
  client_key=None,
50
+ discovery_enabled=None,
51
+ discovery_username=None,
48
52
  egress_filter=None,
49
53
  healthcheck_namespace=None,
50
54
  healthy=None,
@@ -75,6 +79,15 @@ class AKS:
75
79
  '''
76
80
  The key to authenticate TLS connections with.
77
81
  '''
82
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
83
+ '''
84
+ If true, configures discovery of a cluster to be run from a node.
85
+ '''
86
+ self.discovery_username = discovery_username if discovery_username is not None else ''
87
+ '''
88
+ If a cluster is configured for user impersonation, this is the user to impersonate when
89
+ running discovery.
90
+ '''
78
91
  self.egress_filter = egress_filter if egress_filter is not None else ''
79
92
  '''
80
93
  A filter applied to the routing logic to pin datasource to nodes.
@@ -134,6 +147,8 @@ class AKS:
134
147
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
135
148
  'client_certificate: ' + repr(self.client_certificate) + ' ' +\
136
149
  'client_key: ' + repr(self.client_key) + ' ' +\
150
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
151
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
137
152
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
138
153
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
139
154
  'healthy: ' + repr(self.healthy) + ' ' +\
@@ -155,6 +170,8 @@ class AKS:
155
170
  'certificate_authority': self.certificate_authority,
156
171
  'client_certificate': self.client_certificate,
157
172
  'client_key': self.client_key,
173
+ 'discovery_enabled': self.discovery_enabled,
174
+ 'discovery_username': self.discovery_username,
158
175
  'egress_filter': self.egress_filter,
159
176
  'healthcheck_namespace': self.healthcheck_namespace,
160
177
  'healthy': self.healthy,
@@ -178,6 +195,8 @@ class AKS:
178
195
  certificate_authority=d.get('certificate_authority'),
179
196
  client_certificate=d.get('client_certificate'),
180
197
  client_key=d.get('client_key'),
198
+ discovery_enabled=d.get('discovery_enabled'),
199
+ discovery_username=d.get('discovery_username'),
181
200
  egress_filter=d.get('egress_filter'),
182
201
  healthcheck_namespace=d.get('healthcheck_namespace'),
183
202
  healthy=d.get('healthy'),
@@ -346,6 +365,8 @@ class AKSBasicAuth:
346
365
  class AKSServiceAccount:
347
366
  __slots__ = [
348
367
  'bind_interface',
368
+ 'discovery_enabled',
369
+ 'discovery_username',
349
370
  'egress_filter',
350
371
  'healthcheck_namespace',
351
372
  'healthy',
@@ -365,6 +386,8 @@ class AKSServiceAccount:
365
386
  def __init__(
366
387
  self,
367
388
  bind_interface=None,
389
+ discovery_enabled=None,
390
+ discovery_username=None,
368
391
  egress_filter=None,
369
392
  healthcheck_namespace=None,
370
393
  healthy=None,
@@ -384,6 +407,15 @@ class AKSServiceAccount:
384
407
  '''
385
408
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
386
409
  '''
410
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
411
+ '''
412
+ If true, configures discovery of a cluster to be run from a node.
413
+ '''
414
+ self.discovery_username = discovery_username if discovery_username is not None else ''
415
+ '''
416
+ If a cluster is configured for user impersonation, this is the user to impersonate when
417
+ running discovery.
418
+ '''
387
419
  self.egress_filter = egress_filter if egress_filter is not None else ''
388
420
  '''
389
421
  A filter applied to the routing logic to pin datasource to nodes.
@@ -444,6 +476,8 @@ class AKSServiceAccount:
444
476
  def __repr__(self):
445
477
  return '<sdm.AKSServiceAccount ' + \
446
478
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
479
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
480
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
447
481
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
448
482
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
449
483
  'healthy: ' + repr(self.healthy) + ' ' +\
@@ -463,6 +497,8 @@ class AKSServiceAccount:
463
497
  def to_dict(self):
464
498
  return {
465
499
  'bind_interface': self.bind_interface,
500
+ 'discovery_enabled': self.discovery_enabled,
501
+ 'discovery_username': self.discovery_username,
466
502
  'egress_filter': self.egress_filter,
467
503
  'healthcheck_namespace': self.healthcheck_namespace,
468
504
  'healthy': self.healthy,
@@ -484,6 +520,8 @@ class AKSServiceAccount:
484
520
  def from_dict(cls, d):
485
521
  return cls(
486
522
  bind_interface=d.get('bind_interface'),
523
+ discovery_enabled=d.get('discovery_enabled'),
524
+ discovery_username=d.get('discovery_username'),
487
525
  egress_filter=d.get('egress_filter'),
488
526
  healthcheck_namespace=d.get('healthcheck_namespace'),
489
527
  healthy=d.get('healthy'),
@@ -3308,6 +3346,8 @@ class AmazonEKS:
3308
3346
  'bind_interface',
3309
3347
  'certificate_authority',
3310
3348
  'cluster_name',
3349
+ 'discovery_enabled',
3350
+ 'discovery_username',
3311
3351
  'egress_filter',
3312
3352
  'endpoint',
3313
3353
  'healthcheck_namespace',
@@ -3332,6 +3372,8 @@ class AmazonEKS:
3332
3372
  bind_interface=None,
3333
3373
  certificate_authority=None,
3334
3374
  cluster_name=None,
3375
+ discovery_enabled=None,
3376
+ discovery_username=None,
3335
3377
  egress_filter=None,
3336
3378
  endpoint=None,
3337
3379
  healthcheck_namespace=None,
@@ -3365,6 +3407,15 @@ class AmazonEKS:
3365
3407
  '''
3366
3408
  The name of the cluster to connect to.
3367
3409
  '''
3410
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
3411
+ '''
3412
+ If true, configures discovery of a cluster to be run from a node.
3413
+ '''
3414
+ self.discovery_username = discovery_username if discovery_username is not None else ''
3415
+ '''
3416
+ If a cluster is configured for user impersonation, this is the user to impersonate when
3417
+ running discovery.
3418
+ '''
3368
3419
  self.egress_filter = egress_filter if egress_filter is not None else ''
3369
3420
  '''
3370
3421
  A filter applied to the routing logic to pin datasource to nodes.
@@ -3436,6 +3487,8 @@ class AmazonEKS:
3436
3487
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
3437
3488
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
3438
3489
  'cluster_name: ' + repr(self.cluster_name) + ' ' +\
3490
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
3491
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
3439
3492
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
3440
3493
  'endpoint: ' + repr(self.endpoint) + ' ' +\
3441
3494
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
@@ -3460,6 +3513,8 @@ class AmazonEKS:
3460
3513
  'bind_interface': self.bind_interface,
3461
3514
  'certificate_authority': self.certificate_authority,
3462
3515
  'cluster_name': self.cluster_name,
3516
+ 'discovery_enabled': self.discovery_enabled,
3517
+ 'discovery_username': self.discovery_username,
3463
3518
  'egress_filter': self.egress_filter,
3464
3519
  'endpoint': self.endpoint,
3465
3520
  'healthcheck_namespace': self.healthcheck_namespace,
@@ -3486,6 +3541,8 @@ class AmazonEKS:
3486
3541
  bind_interface=d.get('bind_interface'),
3487
3542
  certificate_authority=d.get('certificate_authority'),
3488
3543
  cluster_name=d.get('cluster_name'),
3544
+ discovery_enabled=d.get('discovery_enabled'),
3545
+ discovery_username=d.get('discovery_username'),
3489
3546
  egress_filter=d.get('egress_filter'),
3490
3547
  endpoint=d.get('endpoint'),
3491
3548
  healthcheck_namespace=d.get('healthcheck_namespace'),
@@ -3511,6 +3568,8 @@ class AmazonEKSInstanceProfile:
3511
3568
  'bind_interface',
3512
3569
  'certificate_authority',
3513
3570
  'cluster_name',
3571
+ 'discovery_enabled',
3572
+ 'discovery_username',
3514
3573
  'egress_filter',
3515
3574
  'endpoint',
3516
3575
  'healthcheck_namespace',
@@ -3533,6 +3592,8 @@ class AmazonEKSInstanceProfile:
3533
3592
  bind_interface=None,
3534
3593
  certificate_authority=None,
3535
3594
  cluster_name=None,
3595
+ discovery_enabled=None,
3596
+ discovery_username=None,
3536
3597
  egress_filter=None,
3537
3598
  endpoint=None,
3538
3599
  healthcheck_namespace=None,
@@ -3561,6 +3622,15 @@ class AmazonEKSInstanceProfile:
3561
3622
  '''
3562
3623
  The name of the cluster to connect to.
3563
3624
  '''
3625
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
3626
+ '''
3627
+ If true, configures discovery of a cluster to be run from a node.
3628
+ '''
3629
+ self.discovery_username = discovery_username if discovery_username is not None else ''
3630
+ '''
3631
+ If a cluster is configured for user impersonation, this is the user to impersonate when
3632
+ running discovery.
3633
+ '''
3564
3634
  self.egress_filter = egress_filter if egress_filter is not None else ''
3565
3635
  '''
3566
3636
  A filter applied to the routing logic to pin datasource to nodes.
@@ -3627,6 +3697,8 @@ class AmazonEKSInstanceProfile:
3627
3697
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
3628
3698
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
3629
3699
  'cluster_name: ' + repr(self.cluster_name) + ' ' +\
3700
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
3701
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
3630
3702
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
3631
3703
  'endpoint: ' + repr(self.endpoint) + ' ' +\
3632
3704
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
@@ -3649,6 +3721,8 @@ class AmazonEKSInstanceProfile:
3649
3721
  'bind_interface': self.bind_interface,
3650
3722
  'certificate_authority': self.certificate_authority,
3651
3723
  'cluster_name': self.cluster_name,
3724
+ 'discovery_enabled': self.discovery_enabled,
3725
+ 'discovery_username': self.discovery_username,
3652
3726
  'egress_filter': self.egress_filter,
3653
3727
  'endpoint': self.endpoint,
3654
3728
  'healthcheck_namespace': self.healthcheck_namespace,
@@ -3673,6 +3747,8 @@ class AmazonEKSInstanceProfile:
3673
3747
  bind_interface=d.get('bind_interface'),
3674
3748
  certificate_authority=d.get('certificate_authority'),
3675
3749
  cluster_name=d.get('cluster_name'),
3750
+ discovery_enabled=d.get('discovery_enabled'),
3751
+ discovery_username=d.get('discovery_username'),
3676
3752
  egress_filter=d.get('egress_filter'),
3677
3753
  endpoint=d.get('endpoint'),
3678
3754
  healthcheck_namespace=d.get('healthcheck_namespace'),
@@ -9578,6 +9654,8 @@ class GoogleGKE:
9578
9654
  __slots__ = [
9579
9655
  'bind_interface',
9580
9656
  'certificate_authority',
9657
+ 'discovery_enabled',
9658
+ 'discovery_username',
9581
9659
  'egress_filter',
9582
9660
  'endpoint',
9583
9661
  'healthcheck_namespace',
@@ -9597,6 +9675,8 @@ class GoogleGKE:
9597
9675
  self,
9598
9676
  bind_interface=None,
9599
9677
  certificate_authority=None,
9678
+ discovery_enabled=None,
9679
+ discovery_username=None,
9600
9680
  egress_filter=None,
9601
9681
  endpoint=None,
9602
9682
  healthcheck_namespace=None,
@@ -9619,6 +9699,15 @@ class GoogleGKE:
9619
9699
  '''
9620
9700
  The CA to authenticate TLS connections with.
9621
9701
  '''
9702
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
9703
+ '''
9704
+ If true, configures discovery of a cluster to be run from a node.
9705
+ '''
9706
+ self.discovery_username = discovery_username if discovery_username is not None else ''
9707
+ '''
9708
+ If a cluster is configured for user impersonation, this is the user to impersonate when
9709
+ running discovery.
9710
+ '''
9622
9711
  self.egress_filter = egress_filter if egress_filter is not None else ''
9623
9712
  '''
9624
9713
  A filter applied to the routing logic to pin datasource to nodes.
@@ -9676,6 +9765,8 @@ class GoogleGKE:
9676
9765
  return '<sdm.GoogleGKE ' + \
9677
9766
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
9678
9767
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
9768
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
9769
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
9679
9770
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
9680
9771
  'endpoint: ' + repr(self.endpoint) + ' ' +\
9681
9772
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
@@ -9695,6 +9786,8 @@ class GoogleGKE:
9695
9786
  return {
9696
9787
  'bind_interface': self.bind_interface,
9697
9788
  'certificate_authority': self.certificate_authority,
9789
+ 'discovery_enabled': self.discovery_enabled,
9790
+ 'discovery_username': self.discovery_username,
9698
9791
  'egress_filter': self.egress_filter,
9699
9792
  'endpoint': self.endpoint,
9700
9793
  'healthcheck_namespace': self.healthcheck_namespace,
@@ -9716,6 +9809,8 @@ class GoogleGKE:
9716
9809
  return cls(
9717
9810
  bind_interface=d.get('bind_interface'),
9718
9811
  certificate_authority=d.get('certificate_authority'),
9812
+ discovery_enabled=d.get('discovery_enabled'),
9813
+ discovery_username=d.get('discovery_username'),
9719
9814
  egress_filter=d.get('egress_filter'),
9720
9815
  endpoint=d.get('endpoint'),
9721
9816
  healthcheck_namespace=d.get('healthcheck_namespace'),
@@ -11397,6 +11492,8 @@ class Kubernetes:
11397
11492
  'certificate_authority',
11398
11493
  'client_certificate',
11399
11494
  'client_key',
11495
+ 'discovery_enabled',
11496
+ 'discovery_username',
11400
11497
  'egress_filter',
11401
11498
  'healthcheck_namespace',
11402
11499
  'healthy',
@@ -11418,6 +11515,8 @@ class Kubernetes:
11418
11515
  certificate_authority=None,
11419
11516
  client_certificate=None,
11420
11517
  client_key=None,
11518
+ discovery_enabled=None,
11519
+ discovery_username=None,
11421
11520
  egress_filter=None,
11422
11521
  healthcheck_namespace=None,
11423
11522
  healthy=None,
@@ -11448,6 +11547,15 @@ class Kubernetes:
11448
11547
  '''
11449
11548
  The key to authenticate TLS connections with.
11450
11549
  '''
11550
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
11551
+ '''
11552
+ If true, configures discovery of a cluster to be run from a node.
11553
+ '''
11554
+ self.discovery_username = discovery_username if discovery_username is not None else ''
11555
+ '''
11556
+ If a cluster is configured for user impersonation, this is the user to impersonate when
11557
+ running discovery.
11558
+ '''
11451
11559
  self.egress_filter = egress_filter if egress_filter is not None else ''
11452
11560
  '''
11453
11561
  A filter applied to the routing logic to pin datasource to nodes.
@@ -11507,6 +11615,8 @@ class Kubernetes:
11507
11615
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
11508
11616
  'client_certificate: ' + repr(self.client_certificate) + ' ' +\
11509
11617
  'client_key: ' + repr(self.client_key) + ' ' +\
11618
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
11619
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
11510
11620
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
11511
11621
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
11512
11622
  'healthy: ' + repr(self.healthy) + ' ' +\
@@ -11528,6 +11638,8 @@ class Kubernetes:
11528
11638
  'certificate_authority': self.certificate_authority,
11529
11639
  'client_certificate': self.client_certificate,
11530
11640
  'client_key': self.client_key,
11641
+ 'discovery_enabled': self.discovery_enabled,
11642
+ 'discovery_username': self.discovery_username,
11531
11643
  'egress_filter': self.egress_filter,
11532
11644
  'healthcheck_namespace': self.healthcheck_namespace,
11533
11645
  'healthy': self.healthy,
@@ -11551,6 +11663,8 @@ class Kubernetes:
11551
11663
  certificate_authority=d.get('certificate_authority'),
11552
11664
  client_certificate=d.get('client_certificate'),
11553
11665
  client_key=d.get('client_key'),
11666
+ discovery_enabled=d.get('discovery_enabled'),
11667
+ discovery_username=d.get('discovery_username'),
11554
11668
  egress_filter=d.get('egress_filter'),
11555
11669
  healthcheck_namespace=d.get('healthcheck_namespace'),
11556
11670
  healthy=d.get('healthy'),
@@ -11719,6 +11833,8 @@ class KubernetesBasicAuth:
11719
11833
  class KubernetesServiceAccount:
11720
11834
  __slots__ = [
11721
11835
  'bind_interface',
11836
+ 'discovery_enabled',
11837
+ 'discovery_username',
11722
11838
  'egress_filter',
11723
11839
  'healthcheck_namespace',
11724
11840
  'healthy',
@@ -11738,6 +11854,8 @@ class KubernetesServiceAccount:
11738
11854
  def __init__(
11739
11855
  self,
11740
11856
  bind_interface=None,
11857
+ discovery_enabled=None,
11858
+ discovery_username=None,
11741
11859
  egress_filter=None,
11742
11860
  healthcheck_namespace=None,
11743
11861
  healthy=None,
@@ -11757,6 +11875,15 @@ class KubernetesServiceAccount:
11757
11875
  '''
11758
11876
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
11759
11877
  '''
11878
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
11879
+ '''
11880
+ If true, configures discovery of a cluster to be run from a node.
11881
+ '''
11882
+ self.discovery_username = discovery_username if discovery_username is not None else ''
11883
+ '''
11884
+ If a cluster is configured for user impersonation, this is the user to impersonate when
11885
+ running discovery.
11886
+ '''
11760
11887
  self.egress_filter = egress_filter if egress_filter is not None else ''
11761
11888
  '''
11762
11889
  A filter applied to the routing logic to pin datasource to nodes.
@@ -11817,6 +11944,8 @@ class KubernetesServiceAccount:
11817
11944
  def __repr__(self):
11818
11945
  return '<sdm.KubernetesServiceAccount ' + \
11819
11946
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
11947
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
11948
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
11820
11949
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
11821
11950
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
11822
11951
  'healthy: ' + repr(self.healthy) + ' ' +\
@@ -11836,6 +11965,8 @@ class KubernetesServiceAccount:
11836
11965
  def to_dict(self):
11837
11966
  return {
11838
11967
  'bind_interface': self.bind_interface,
11968
+ 'discovery_enabled': self.discovery_enabled,
11969
+ 'discovery_username': self.discovery_username,
11839
11970
  'egress_filter': self.egress_filter,
11840
11971
  'healthcheck_namespace': self.healthcheck_namespace,
11841
11972
  'healthy': self.healthy,
@@ -11857,6 +11988,8 @@ class KubernetesServiceAccount:
11857
11988
  def from_dict(cls, d):
11858
11989
  return cls(
11859
11990
  bind_interface=d.get('bind_interface'),
11991
+ discovery_enabled=d.get('discovery_enabled'),
11992
+ discovery_username=d.get('discovery_username'),
11860
11993
  egress_filter=d.get('egress_filter'),
11861
11994
  healthcheck_namespace=d.get('healthcheck_namespace'),
11862
11995
  healthy=d.get('healthy'),
@@ -16216,6 +16349,7 @@ class Query:
16216
16349
  'egress_node_id',
16217
16350
  'encrypted',
16218
16351
  'id',
16352
+ 'identity_alias_username',
16219
16353
  'query_body',
16220
16354
  'query_category',
16221
16355
  'query_hash',
@@ -16245,6 +16379,7 @@ class Query:
16245
16379
  egress_node_id=None,
16246
16380
  encrypted=None,
16247
16381
  id=None,
16382
+ identity_alias_username=None,
16248
16383
  query_body=None,
16249
16384
  query_category=None,
16250
16385
  query_hash=None,
@@ -16314,6 +16449,10 @@ class Query:
16314
16449
  '''
16315
16450
  Unique identifier of the Query.
16316
16451
  '''
16452
+ self.identity_alias_username = identity_alias_username if identity_alias_username is not None else ''
16453
+ '''
16454
+ The username of the IdentityAlias used to access the Resource.
16455
+ '''
16317
16456
  self.query_body = query_body if query_body is not None else ''
16318
16457
  '''
16319
16458
  The captured content of the Query.
@@ -16388,6 +16527,7 @@ class Query:
16388
16527
  'egress_node_id: ' + repr(self.egress_node_id) + ' ' +\
16389
16528
  'encrypted: ' + repr(self.encrypted) + ' ' +\
16390
16529
  'id: ' + repr(self.id) + ' ' +\
16530
+ 'identity_alias_username: ' + repr(self.identity_alias_username) + ' ' +\
16391
16531
  'query_body: ' + repr(self.query_body) + ' ' +\
16392
16532
  'query_category: ' + repr(self.query_category) + ' ' +\
16393
16533
  'query_hash: ' + repr(self.query_hash) + ' ' +\
@@ -16417,6 +16557,7 @@ class Query:
16417
16557
  'egress_node_id': self.egress_node_id,
16418
16558
  'encrypted': self.encrypted,
16419
16559
  'id': self.id,
16560
+ 'identity_alias_username': self.identity_alias_username,
16420
16561
  'query_body': self.query_body,
16421
16562
  'query_category': self.query_category,
16422
16563
  'query_hash': self.query_hash,
@@ -16447,6 +16588,7 @@ class Query:
16447
16588
  egress_node_id=d.get('egress_node_id'),
16448
16589
  encrypted=d.get('encrypted'),
16449
16590
  id=d.get('id'),
16591
+ identity_alias_username=d.get('identity_alias_username'),
16450
16592
  query_body=d.get('query_body'),
16451
16593
  query_category=d.get('query_category'),
16452
16594
  query_hash=d.get('query_hash'),
@@ -164,6 +164,8 @@ def convert_aks_to_porcelain(plumbing):
164
164
  porcelain.certificate_authority = (plumbing.certificate_authority)
165
165
  porcelain.client_certificate = (plumbing.client_certificate)
166
166
  porcelain.client_key = (plumbing.client_key)
167
+ porcelain.discovery_enabled = (plumbing.discovery_enabled)
168
+ porcelain.discovery_username = (plumbing.discovery_username)
167
169
  porcelain.egress_filter = (plumbing.egress_filter)
168
170
  porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
169
171
  porcelain.healthy = (plumbing.healthy)
@@ -189,6 +191,8 @@ def convert_aks_to_plumbing(porcelain):
189
191
  plumbing.certificate_authority = (porcelain.certificate_authority)
190
192
  plumbing.client_certificate = (porcelain.client_certificate)
191
193
  plumbing.client_key = (porcelain.client_key)
194
+ plumbing.discovery_enabled = (porcelain.discovery_enabled)
195
+ plumbing.discovery_username = (porcelain.discovery_username)
192
196
  plumbing.egress_filter = (porcelain.egress_filter)
193
197
  plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
194
198
  plumbing.healthy = (porcelain.healthy)
@@ -274,6 +278,8 @@ def convert_aks_service_account_to_porcelain(plumbing):
274
278
  return None
275
279
  porcelain = models.AKSServiceAccount()
276
280
  porcelain.bind_interface = (plumbing.bind_interface)
281
+ porcelain.discovery_enabled = (plumbing.discovery_enabled)
282
+ porcelain.discovery_username = (plumbing.discovery_username)
277
283
  porcelain.egress_filter = (plumbing.egress_filter)
278
284
  porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
279
285
  porcelain.healthy = (plumbing.healthy)
@@ -297,6 +303,8 @@ def convert_aks_service_account_to_plumbing(porcelain):
297
303
  if porcelain is None:
298
304
  return plumbing
299
305
  plumbing.bind_interface = (porcelain.bind_interface)
306
+ plumbing.discovery_enabled = (porcelain.discovery_enabled)
307
+ plumbing.discovery_username = (porcelain.discovery_username)
300
308
  plumbing.egress_filter = (porcelain.egress_filter)
301
309
  plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
302
310
  plumbing.healthy = (porcelain.healthy)
@@ -1904,6 +1912,8 @@ def convert_amazon_eks_to_porcelain(plumbing):
1904
1912
  porcelain.bind_interface = (plumbing.bind_interface)
1905
1913
  porcelain.certificate_authority = (plumbing.certificate_authority)
1906
1914
  porcelain.cluster_name = (plumbing.cluster_name)
1915
+ porcelain.discovery_enabled = (plumbing.discovery_enabled)
1916
+ porcelain.discovery_username = (plumbing.discovery_username)
1907
1917
  porcelain.egress_filter = (plumbing.egress_filter)
1908
1918
  porcelain.endpoint = (plumbing.endpoint)
1909
1919
  porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
@@ -1932,6 +1942,8 @@ def convert_amazon_eks_to_plumbing(porcelain):
1932
1942
  plumbing.bind_interface = (porcelain.bind_interface)
1933
1943
  plumbing.certificate_authority = (porcelain.certificate_authority)
1934
1944
  plumbing.cluster_name = (porcelain.cluster_name)
1945
+ plumbing.discovery_enabled = (porcelain.discovery_enabled)
1946
+ plumbing.discovery_username = (porcelain.discovery_username)
1935
1947
  plumbing.egress_filter = (porcelain.egress_filter)
1936
1948
  plumbing.endpoint = (porcelain.endpoint)
1937
1949
  plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
@@ -1971,6 +1983,8 @@ def convert_amazon_eks_instance_profile_to_porcelain(plumbing):
1971
1983
  porcelain.bind_interface = (plumbing.bind_interface)
1972
1984
  porcelain.certificate_authority = (plumbing.certificate_authority)
1973
1985
  porcelain.cluster_name = (plumbing.cluster_name)
1986
+ porcelain.discovery_enabled = (plumbing.discovery_enabled)
1987
+ porcelain.discovery_username = (plumbing.discovery_username)
1974
1988
  porcelain.egress_filter = (plumbing.egress_filter)
1975
1989
  porcelain.endpoint = (plumbing.endpoint)
1976
1990
  porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
@@ -1997,6 +2011,8 @@ def convert_amazon_eks_instance_profile_to_plumbing(porcelain):
1997
2011
  plumbing.bind_interface = (porcelain.bind_interface)
1998
2012
  plumbing.certificate_authority = (porcelain.certificate_authority)
1999
2013
  plumbing.cluster_name = (porcelain.cluster_name)
2014
+ plumbing.discovery_enabled = (porcelain.discovery_enabled)
2015
+ plumbing.discovery_username = (porcelain.discovery_username)
2000
2016
  plumbing.egress_filter = (porcelain.egress_filter)
2001
2017
  plumbing.endpoint = (porcelain.endpoint)
2002
2018
  plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
@@ -4726,6 +4742,8 @@ def convert_google_gke_to_porcelain(plumbing):
4726
4742
  porcelain = models.GoogleGKE()
4727
4743
  porcelain.bind_interface = (plumbing.bind_interface)
4728
4744
  porcelain.certificate_authority = (plumbing.certificate_authority)
4745
+ porcelain.discovery_enabled = (plumbing.discovery_enabled)
4746
+ porcelain.discovery_username = (plumbing.discovery_username)
4729
4747
  porcelain.egress_filter = (plumbing.egress_filter)
4730
4748
  porcelain.endpoint = (plumbing.endpoint)
4731
4749
  porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
@@ -4749,6 +4767,8 @@ def convert_google_gke_to_plumbing(porcelain):
4749
4767
  return plumbing
4750
4768
  plumbing.bind_interface = (porcelain.bind_interface)
4751
4769
  plumbing.certificate_authority = (porcelain.certificate_authority)
4770
+ plumbing.discovery_enabled = (porcelain.discovery_enabled)
4771
+ plumbing.discovery_username = (porcelain.discovery_username)
4752
4772
  plumbing.egress_filter = (porcelain.egress_filter)
4753
4773
  plumbing.endpoint = (porcelain.endpoint)
4754
4774
  plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
@@ -5631,6 +5651,8 @@ def convert_kubernetes_to_porcelain(plumbing):
5631
5651
  porcelain.certificate_authority = (plumbing.certificate_authority)
5632
5652
  porcelain.client_certificate = (plumbing.client_certificate)
5633
5653
  porcelain.client_key = (plumbing.client_key)
5654
+ porcelain.discovery_enabled = (plumbing.discovery_enabled)
5655
+ porcelain.discovery_username = (plumbing.discovery_username)
5634
5656
  porcelain.egress_filter = (plumbing.egress_filter)
5635
5657
  porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
5636
5658
  porcelain.healthy = (plumbing.healthy)
@@ -5656,6 +5678,8 @@ def convert_kubernetes_to_plumbing(porcelain):
5656
5678
  plumbing.certificate_authority = (porcelain.certificate_authority)
5657
5679
  plumbing.client_certificate = (porcelain.client_certificate)
5658
5680
  plumbing.client_key = (porcelain.client_key)
5681
+ plumbing.discovery_enabled = (porcelain.discovery_enabled)
5682
+ plumbing.discovery_username = (porcelain.discovery_username)
5659
5683
  plumbing.egress_filter = (porcelain.egress_filter)
5660
5684
  plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
5661
5685
  plumbing.healthy = (porcelain.healthy)
@@ -5746,6 +5770,8 @@ def convert_kubernetes_service_account_to_porcelain(plumbing):
5746
5770
  return None
5747
5771
  porcelain = models.KubernetesServiceAccount()
5748
5772
  porcelain.bind_interface = (plumbing.bind_interface)
5773
+ porcelain.discovery_enabled = (plumbing.discovery_enabled)
5774
+ porcelain.discovery_username = (plumbing.discovery_username)
5749
5775
  porcelain.egress_filter = (plumbing.egress_filter)
5750
5776
  porcelain.healthcheck_namespace = (plumbing.healthcheck_namespace)
5751
5777
  porcelain.healthy = (plumbing.healthy)
@@ -5769,6 +5795,8 @@ def convert_kubernetes_service_account_to_plumbing(porcelain):
5769
5795
  if porcelain is None:
5770
5796
  return plumbing
5771
5797
  plumbing.bind_interface = (porcelain.bind_interface)
5798
+ plumbing.discovery_enabled = (porcelain.discovery_enabled)
5799
+ plumbing.discovery_username = (porcelain.discovery_username)
5772
5800
  plumbing.egress_filter = (porcelain.egress_filter)
5773
5801
  plumbing.healthcheck_namespace = (porcelain.healthcheck_namespace)
5774
5802
  plumbing.healthy = (porcelain.healthy)
@@ -7817,6 +7845,7 @@ def convert_query_to_porcelain(plumbing):
7817
7845
  porcelain.egress_node_id = (plumbing.egress_node_id)
7818
7846
  porcelain.encrypted = (plumbing.encrypted)
7819
7847
  porcelain.id = (plumbing.id)
7848
+ porcelain.identity_alias_username = (plumbing.identity_alias_username)
7820
7849
  porcelain.query_body = (plumbing.query_body)
7821
7850
  porcelain.query_category = (plumbing.query_category)
7822
7851
  porcelain.query_hash = (plumbing.query_hash)
@@ -7853,6 +7882,7 @@ def convert_query_to_plumbing(porcelain):
7853
7882
  plumbing.egress_node_id = (porcelain.egress_node_id)
7854
7883
  plumbing.encrypted = (porcelain.encrypted)
7855
7884
  plumbing.id = (porcelain.id)
7885
+ plumbing.identity_alias_username = (porcelain.identity_alias_username)
7856
7886
  plumbing.query_body = (porcelain.query_body)
7857
7887
  plumbing.query_category = (porcelain.query_category)
7858
7888
  plumbing.query_hash = (porcelain.query_hash)