strongdm 9.3.0__zip → 9.5.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-9.3.0 → strongdm-9.5.0}/PKG-INFO +2 -2
- {strongdm-9.3.0 → strongdm-9.5.0}/setup.py +2 -2
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/client.py +1 -1
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/constants.py +2 -2
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/drivers_pb2.py +196 -168
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/models.py +164 -16
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/organization_history_pb2.py +11 -5
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/plumbing.py +32 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-9.3.0 → strongdm-9.5.0}/LICENSE +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/README.md +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/setup.cfg +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/__init__.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/errors.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/options_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/spec_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/svc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-9.3.0 → strongdm-9.5.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -24,6 +24,8 @@ class AKS:
|
|
24
24
|
'certificate_authority',
|
25
25
|
'client_certificate',
|
26
26
|
'client_key',
|
27
|
+
'discovery_enabled',
|
28
|
+
'discovery_username',
|
27
29
|
'egress_filter',
|
28
30
|
'healthcheck_namespace',
|
29
31
|
'healthy',
|
@@ -45,6 +47,8 @@ class AKS:
|
|
45
47
|
certificate_authority=None,
|
46
48
|
client_certificate=None,
|
47
49
|
client_key=None,
|
50
|
+
discovery_enabled=None,
|
51
|
+
discovery_username=None,
|
48
52
|
egress_filter=None,
|
49
53
|
healthcheck_namespace=None,
|
50
54
|
healthy=None,
|
@@ -75,6 +79,15 @@ class AKS:
|
|
75
79
|
'''
|
76
80
|
The key to authenticate TLS connections with.
|
77
81
|
'''
|
82
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
83
|
+
'''
|
84
|
+
If true, configures discovery of a cluster to be run from a node.
|
85
|
+
'''
|
86
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
87
|
+
'''
|
88
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
89
|
+
running discovery.
|
90
|
+
'''
|
78
91
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
79
92
|
'''
|
80
93
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -134,6 +147,8 @@ class AKS:
|
|
134
147
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
135
148
|
'client_certificate: ' + repr(self.client_certificate) + ' ' +\
|
136
149
|
'client_key: ' + repr(self.client_key) + ' ' +\
|
150
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
151
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
137
152
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
138
153
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
139
154
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
@@ -155,6 +170,8 @@ class AKS:
|
|
155
170
|
'certificate_authority': self.certificate_authority,
|
156
171
|
'client_certificate': self.client_certificate,
|
157
172
|
'client_key': self.client_key,
|
173
|
+
'discovery_enabled': self.discovery_enabled,
|
174
|
+
'discovery_username': self.discovery_username,
|
158
175
|
'egress_filter': self.egress_filter,
|
159
176
|
'healthcheck_namespace': self.healthcheck_namespace,
|
160
177
|
'healthy': self.healthy,
|
@@ -178,6 +195,8 @@ class AKS:
|
|
178
195
|
certificate_authority=d.get('certificate_authority'),
|
179
196
|
client_certificate=d.get('client_certificate'),
|
180
197
|
client_key=d.get('client_key'),
|
198
|
+
discovery_enabled=d.get('discovery_enabled'),
|
199
|
+
discovery_username=d.get('discovery_username'),
|
181
200
|
egress_filter=d.get('egress_filter'),
|
182
201
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
183
202
|
healthy=d.get('healthy'),
|
@@ -346,6 +365,8 @@ class AKSBasicAuth:
|
|
346
365
|
class AKSServiceAccount:
|
347
366
|
__slots__ = [
|
348
367
|
'bind_interface',
|
368
|
+
'discovery_enabled',
|
369
|
+
'discovery_username',
|
349
370
|
'egress_filter',
|
350
371
|
'healthcheck_namespace',
|
351
372
|
'healthy',
|
@@ -365,6 +386,8 @@ class AKSServiceAccount:
|
|
365
386
|
def __init__(
|
366
387
|
self,
|
367
388
|
bind_interface=None,
|
389
|
+
discovery_enabled=None,
|
390
|
+
discovery_username=None,
|
368
391
|
egress_filter=None,
|
369
392
|
healthcheck_namespace=None,
|
370
393
|
healthy=None,
|
@@ -384,6 +407,15 @@ class AKSServiceAccount:
|
|
384
407
|
'''
|
385
408
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
386
409
|
'''
|
410
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
411
|
+
'''
|
412
|
+
If true, configures discovery of a cluster to be run from a node.
|
413
|
+
'''
|
414
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
415
|
+
'''
|
416
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
417
|
+
running discovery.
|
418
|
+
'''
|
387
419
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
388
420
|
'''
|
389
421
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -444,6 +476,8 @@ class AKSServiceAccount:
|
|
444
476
|
def __repr__(self):
|
445
477
|
return '<sdm.AKSServiceAccount ' + \
|
446
478
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
479
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
480
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
447
481
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
448
482
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
449
483
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
@@ -463,6 +497,8 @@ class AKSServiceAccount:
|
|
463
497
|
def to_dict(self):
|
464
498
|
return {
|
465
499
|
'bind_interface': self.bind_interface,
|
500
|
+
'discovery_enabled': self.discovery_enabled,
|
501
|
+
'discovery_username': self.discovery_username,
|
466
502
|
'egress_filter': self.egress_filter,
|
467
503
|
'healthcheck_namespace': self.healthcheck_namespace,
|
468
504
|
'healthy': self.healthy,
|
@@ -484,6 +520,8 @@ class AKSServiceAccount:
|
|
484
520
|
def from_dict(cls, d):
|
485
521
|
return cls(
|
486
522
|
bind_interface=d.get('bind_interface'),
|
523
|
+
discovery_enabled=d.get('discovery_enabled'),
|
524
|
+
discovery_username=d.get('discovery_username'),
|
487
525
|
egress_filter=d.get('egress_filter'),
|
488
526
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
489
527
|
healthy=d.get('healthy'),
|
@@ -2699,8 +2737,7 @@ class AccountPermission:
|
|
2699
2737
|
'''
|
2700
2738
|
self.permission = permission if permission is not None else ''
|
2701
2739
|
'''
|
2702
|
-
The value of this permission, split into vertical and action
|
2703
|
-
'secretstore:List', 'role:update'
|
2740
|
+
The value of this permission, split into vertical and action, one of the Permission constants.
|
2704
2741
|
'''
|
2705
2742
|
self.scope = scope if scope is not None else ''
|
2706
2743
|
'''
|
@@ -3075,7 +3112,7 @@ class Activity:
|
|
3075
3112
|
'''
|
3076
3113
|
self.verb = verb if verb is not None else ''
|
3077
3114
|
'''
|
3078
|
-
The kind of activity which has taken place.
|
3115
|
+
The kind of activity which has taken place, one of the ActivityVerb constants.
|
3079
3116
|
'''
|
3080
3117
|
|
3081
3118
|
def __repr__(self):
|
@@ -3218,7 +3255,7 @@ class ActivityEntity:
|
|
3218
3255
|
'''
|
3219
3256
|
self.type = type if type is not None else ''
|
3220
3257
|
'''
|
3221
|
-
The type of entity affected, one of the
|
3258
|
+
The type of entity affected, one of the ActivityEntityType constants.
|
3222
3259
|
'''
|
3223
3260
|
|
3224
3261
|
def __repr__(self):
|
@@ -3308,6 +3345,8 @@ class AmazonEKS:
|
|
3308
3345
|
'bind_interface',
|
3309
3346
|
'certificate_authority',
|
3310
3347
|
'cluster_name',
|
3348
|
+
'discovery_enabled',
|
3349
|
+
'discovery_username',
|
3311
3350
|
'egress_filter',
|
3312
3351
|
'endpoint',
|
3313
3352
|
'healthcheck_namespace',
|
@@ -3332,6 +3371,8 @@ class AmazonEKS:
|
|
3332
3371
|
bind_interface=None,
|
3333
3372
|
certificate_authority=None,
|
3334
3373
|
cluster_name=None,
|
3374
|
+
discovery_enabled=None,
|
3375
|
+
discovery_username=None,
|
3335
3376
|
egress_filter=None,
|
3336
3377
|
endpoint=None,
|
3337
3378
|
healthcheck_namespace=None,
|
@@ -3365,6 +3406,15 @@ class AmazonEKS:
|
|
3365
3406
|
'''
|
3366
3407
|
The name of the cluster to connect to.
|
3367
3408
|
'''
|
3409
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
3410
|
+
'''
|
3411
|
+
If true, configures discovery of a cluster to be run from a node.
|
3412
|
+
'''
|
3413
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
3414
|
+
'''
|
3415
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
3416
|
+
running discovery.
|
3417
|
+
'''
|
3368
3418
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
3369
3419
|
'''
|
3370
3420
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -3436,6 +3486,8 @@ class AmazonEKS:
|
|
3436
3486
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
3437
3487
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
3438
3488
|
'cluster_name: ' + repr(self.cluster_name) + ' ' +\
|
3489
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
3490
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
3439
3491
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
3440
3492
|
'endpoint: ' + repr(self.endpoint) + ' ' +\
|
3441
3493
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
@@ -3460,6 +3512,8 @@ class AmazonEKS:
|
|
3460
3512
|
'bind_interface': self.bind_interface,
|
3461
3513
|
'certificate_authority': self.certificate_authority,
|
3462
3514
|
'cluster_name': self.cluster_name,
|
3515
|
+
'discovery_enabled': self.discovery_enabled,
|
3516
|
+
'discovery_username': self.discovery_username,
|
3463
3517
|
'egress_filter': self.egress_filter,
|
3464
3518
|
'endpoint': self.endpoint,
|
3465
3519
|
'healthcheck_namespace': self.healthcheck_namespace,
|
@@ -3486,6 +3540,8 @@ class AmazonEKS:
|
|
3486
3540
|
bind_interface=d.get('bind_interface'),
|
3487
3541
|
certificate_authority=d.get('certificate_authority'),
|
3488
3542
|
cluster_name=d.get('cluster_name'),
|
3543
|
+
discovery_enabled=d.get('discovery_enabled'),
|
3544
|
+
discovery_username=d.get('discovery_username'),
|
3489
3545
|
egress_filter=d.get('egress_filter'),
|
3490
3546
|
endpoint=d.get('endpoint'),
|
3491
3547
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
@@ -3511,6 +3567,8 @@ class AmazonEKSInstanceProfile:
|
|
3511
3567
|
'bind_interface',
|
3512
3568
|
'certificate_authority',
|
3513
3569
|
'cluster_name',
|
3570
|
+
'discovery_enabled',
|
3571
|
+
'discovery_username',
|
3514
3572
|
'egress_filter',
|
3515
3573
|
'endpoint',
|
3516
3574
|
'healthcheck_namespace',
|
@@ -3533,6 +3591,8 @@ class AmazonEKSInstanceProfile:
|
|
3533
3591
|
bind_interface=None,
|
3534
3592
|
certificate_authority=None,
|
3535
3593
|
cluster_name=None,
|
3594
|
+
discovery_enabled=None,
|
3595
|
+
discovery_username=None,
|
3536
3596
|
egress_filter=None,
|
3537
3597
|
endpoint=None,
|
3538
3598
|
healthcheck_namespace=None,
|
@@ -3561,6 +3621,15 @@ class AmazonEKSInstanceProfile:
|
|
3561
3621
|
'''
|
3562
3622
|
The name of the cluster to connect to.
|
3563
3623
|
'''
|
3624
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
3625
|
+
'''
|
3626
|
+
If true, configures discovery of a cluster to be run from a node.
|
3627
|
+
'''
|
3628
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
3629
|
+
'''
|
3630
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
3631
|
+
running discovery.
|
3632
|
+
'''
|
3564
3633
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
3565
3634
|
'''
|
3566
3635
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -3627,6 +3696,8 @@ class AmazonEKSInstanceProfile:
|
|
3627
3696
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
3628
3697
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
3629
3698
|
'cluster_name: ' + repr(self.cluster_name) + ' ' +\
|
3699
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
3700
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
3630
3701
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
3631
3702
|
'endpoint: ' + repr(self.endpoint) + ' ' +\
|
3632
3703
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
@@ -3649,6 +3720,8 @@ class AmazonEKSInstanceProfile:
|
|
3649
3720
|
'bind_interface': self.bind_interface,
|
3650
3721
|
'certificate_authority': self.certificate_authority,
|
3651
3722
|
'cluster_name': self.cluster_name,
|
3723
|
+
'discovery_enabled': self.discovery_enabled,
|
3724
|
+
'discovery_username': self.discovery_username,
|
3652
3725
|
'egress_filter': self.egress_filter,
|
3653
3726
|
'endpoint': self.endpoint,
|
3654
3727
|
'healthcheck_namespace': self.healthcheck_namespace,
|
@@ -3673,6 +3746,8 @@ class AmazonEKSInstanceProfile:
|
|
3673
3746
|
bind_interface=d.get('bind_interface'),
|
3674
3747
|
certificate_authority=d.get('certificate_authority'),
|
3675
3748
|
cluster_name=d.get('cluster_name'),
|
3749
|
+
discovery_enabled=d.get('discovery_enabled'),
|
3750
|
+
discovery_username=d.get('discovery_username'),
|
3676
3751
|
egress_filter=d.get('egress_filter'),
|
3677
3752
|
endpoint=d.get('endpoint'),
|
3678
3753
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
@@ -9578,6 +9653,8 @@ class GoogleGKE:
|
|
9578
9653
|
__slots__ = [
|
9579
9654
|
'bind_interface',
|
9580
9655
|
'certificate_authority',
|
9656
|
+
'discovery_enabled',
|
9657
|
+
'discovery_username',
|
9581
9658
|
'egress_filter',
|
9582
9659
|
'endpoint',
|
9583
9660
|
'healthcheck_namespace',
|
@@ -9597,6 +9674,8 @@ class GoogleGKE:
|
|
9597
9674
|
self,
|
9598
9675
|
bind_interface=None,
|
9599
9676
|
certificate_authority=None,
|
9677
|
+
discovery_enabled=None,
|
9678
|
+
discovery_username=None,
|
9600
9679
|
egress_filter=None,
|
9601
9680
|
endpoint=None,
|
9602
9681
|
healthcheck_namespace=None,
|
@@ -9619,6 +9698,15 @@ class GoogleGKE:
|
|
9619
9698
|
'''
|
9620
9699
|
The CA to authenticate TLS connections with.
|
9621
9700
|
'''
|
9701
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
9702
|
+
'''
|
9703
|
+
If true, configures discovery of a cluster to be run from a node.
|
9704
|
+
'''
|
9705
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
9706
|
+
'''
|
9707
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
9708
|
+
running discovery.
|
9709
|
+
'''
|
9622
9710
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
9623
9711
|
'''
|
9624
9712
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -9676,6 +9764,8 @@ class GoogleGKE:
|
|
9676
9764
|
return '<sdm.GoogleGKE ' + \
|
9677
9765
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
9678
9766
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
9767
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
9768
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
9679
9769
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
9680
9770
|
'endpoint: ' + repr(self.endpoint) + ' ' +\
|
9681
9771
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
@@ -9695,6 +9785,8 @@ class GoogleGKE:
|
|
9695
9785
|
return {
|
9696
9786
|
'bind_interface': self.bind_interface,
|
9697
9787
|
'certificate_authority': self.certificate_authority,
|
9788
|
+
'discovery_enabled': self.discovery_enabled,
|
9789
|
+
'discovery_username': self.discovery_username,
|
9698
9790
|
'egress_filter': self.egress_filter,
|
9699
9791
|
'endpoint': self.endpoint,
|
9700
9792
|
'healthcheck_namespace': self.healthcheck_namespace,
|
@@ -9716,6 +9808,8 @@ class GoogleGKE:
|
|
9716
9808
|
return cls(
|
9717
9809
|
bind_interface=d.get('bind_interface'),
|
9718
9810
|
certificate_authority=d.get('certificate_authority'),
|
9811
|
+
discovery_enabled=d.get('discovery_enabled'),
|
9812
|
+
discovery_username=d.get('discovery_username'),
|
9719
9813
|
egress_filter=d.get('egress_filter'),
|
9720
9814
|
endpoint=d.get('endpoint'),
|
9721
9815
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
@@ -11397,6 +11491,8 @@ class Kubernetes:
|
|
11397
11491
|
'certificate_authority',
|
11398
11492
|
'client_certificate',
|
11399
11493
|
'client_key',
|
11494
|
+
'discovery_enabled',
|
11495
|
+
'discovery_username',
|
11400
11496
|
'egress_filter',
|
11401
11497
|
'healthcheck_namespace',
|
11402
11498
|
'healthy',
|
@@ -11418,6 +11514,8 @@ class Kubernetes:
|
|
11418
11514
|
certificate_authority=None,
|
11419
11515
|
client_certificate=None,
|
11420
11516
|
client_key=None,
|
11517
|
+
discovery_enabled=None,
|
11518
|
+
discovery_username=None,
|
11421
11519
|
egress_filter=None,
|
11422
11520
|
healthcheck_namespace=None,
|
11423
11521
|
healthy=None,
|
@@ -11448,6 +11546,15 @@ class Kubernetes:
|
|
11448
11546
|
'''
|
11449
11547
|
The key to authenticate TLS connections with.
|
11450
11548
|
'''
|
11549
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
11550
|
+
'''
|
11551
|
+
If true, configures discovery of a cluster to be run from a node.
|
11552
|
+
'''
|
11553
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
11554
|
+
'''
|
11555
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
11556
|
+
running discovery.
|
11557
|
+
'''
|
11451
11558
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
11452
11559
|
'''
|
11453
11560
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -11507,6 +11614,8 @@ class Kubernetes:
|
|
11507
11614
|
'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
|
11508
11615
|
'client_certificate: ' + repr(self.client_certificate) + ' ' +\
|
11509
11616
|
'client_key: ' + repr(self.client_key) + ' ' +\
|
11617
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
11618
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
11510
11619
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
11511
11620
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
11512
11621
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
@@ -11528,6 +11637,8 @@ class Kubernetes:
|
|
11528
11637
|
'certificate_authority': self.certificate_authority,
|
11529
11638
|
'client_certificate': self.client_certificate,
|
11530
11639
|
'client_key': self.client_key,
|
11640
|
+
'discovery_enabled': self.discovery_enabled,
|
11641
|
+
'discovery_username': self.discovery_username,
|
11531
11642
|
'egress_filter': self.egress_filter,
|
11532
11643
|
'healthcheck_namespace': self.healthcheck_namespace,
|
11533
11644
|
'healthy': self.healthy,
|
@@ -11551,6 +11662,8 @@ class Kubernetes:
|
|
11551
11662
|
certificate_authority=d.get('certificate_authority'),
|
11552
11663
|
client_certificate=d.get('client_certificate'),
|
11553
11664
|
client_key=d.get('client_key'),
|
11665
|
+
discovery_enabled=d.get('discovery_enabled'),
|
11666
|
+
discovery_username=d.get('discovery_username'),
|
11554
11667
|
egress_filter=d.get('egress_filter'),
|
11555
11668
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
11556
11669
|
healthy=d.get('healthy'),
|
@@ -11719,6 +11832,8 @@ class KubernetesBasicAuth:
|
|
11719
11832
|
class KubernetesServiceAccount:
|
11720
11833
|
__slots__ = [
|
11721
11834
|
'bind_interface',
|
11835
|
+
'discovery_enabled',
|
11836
|
+
'discovery_username',
|
11722
11837
|
'egress_filter',
|
11723
11838
|
'healthcheck_namespace',
|
11724
11839
|
'healthy',
|
@@ -11738,6 +11853,8 @@ class KubernetesServiceAccount:
|
|
11738
11853
|
def __init__(
|
11739
11854
|
self,
|
11740
11855
|
bind_interface=None,
|
11856
|
+
discovery_enabled=None,
|
11857
|
+
discovery_username=None,
|
11741
11858
|
egress_filter=None,
|
11742
11859
|
healthcheck_namespace=None,
|
11743
11860
|
healthy=None,
|
@@ -11757,6 +11874,15 @@ class KubernetesServiceAccount:
|
|
11757
11874
|
'''
|
11758
11875
|
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
11759
11876
|
'''
|
11877
|
+
self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
|
11878
|
+
'''
|
11879
|
+
If true, configures discovery of a cluster to be run from a node.
|
11880
|
+
'''
|
11881
|
+
self.discovery_username = discovery_username if discovery_username is not None else ''
|
11882
|
+
'''
|
11883
|
+
If a cluster is configured for user impersonation, this is the user to impersonate when
|
11884
|
+
running discovery.
|
11885
|
+
'''
|
11760
11886
|
self.egress_filter = egress_filter if egress_filter is not None else ''
|
11761
11887
|
'''
|
11762
11888
|
A filter applied to the routing logic to pin datasource to nodes.
|
@@ -11817,6 +11943,8 @@ class KubernetesServiceAccount:
|
|
11817
11943
|
def __repr__(self):
|
11818
11944
|
return '<sdm.KubernetesServiceAccount ' + \
|
11819
11945
|
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
11946
|
+
'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
|
11947
|
+
'discovery_username: ' + repr(self.discovery_username) + ' ' +\
|
11820
11948
|
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
11821
11949
|
'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
|
11822
11950
|
'healthy: ' + repr(self.healthy) + ' ' +\
|
@@ -11836,6 +11964,8 @@ class KubernetesServiceAccount:
|
|
11836
11964
|
def to_dict(self):
|
11837
11965
|
return {
|
11838
11966
|
'bind_interface': self.bind_interface,
|
11967
|
+
'discovery_enabled': self.discovery_enabled,
|
11968
|
+
'discovery_username': self.discovery_username,
|
11839
11969
|
'egress_filter': self.egress_filter,
|
11840
11970
|
'healthcheck_namespace': self.healthcheck_namespace,
|
11841
11971
|
'healthy': self.healthy,
|
@@ -11857,6 +11987,8 @@ class KubernetesServiceAccount:
|
|
11857
11987
|
def from_dict(cls, d):
|
11858
11988
|
return cls(
|
11859
11989
|
bind_interface=d.get('bind_interface'),
|
11990
|
+
discovery_enabled=d.get('discovery_enabled'),
|
11991
|
+
discovery_username=d.get('discovery_username'),
|
11860
11992
|
egress_filter=d.get('egress_filter'),
|
11861
11993
|
healthcheck_namespace=d.get('healthcheck_namespace'),
|
11862
11994
|
healthy=d.get('healthy'),
|
@@ -14801,6 +14933,8 @@ class Organization:
|
|
14801
14933
|
__slots__ = [
|
14802
14934
|
'auth_provider',
|
14803
14935
|
'created_at',
|
14936
|
+
'device_trust_enabled',
|
14937
|
+
'device_trust_provider',
|
14804
14938
|
'idle_timeout',
|
14805
14939
|
'idle_timeout_enabled',
|
14806
14940
|
'kind',
|
@@ -14829,6 +14963,8 @@ class Organization:
|
|
14829
14963
|
self,
|
14830
14964
|
auth_provider=None,
|
14831
14965
|
created_at=None,
|
14966
|
+
device_trust_enabled=None,
|
14967
|
+
device_trust_provider=None,
|
14832
14968
|
idle_timeout=None,
|
14833
14969
|
idle_timeout_enabled=None,
|
14834
14970
|
kind=None,
|
@@ -14854,12 +14990,20 @@ class Organization:
|
|
14854
14990
|
):
|
14855
14991
|
self.auth_provider = auth_provider if auth_provider is not None else ''
|
14856
14992
|
'''
|
14857
|
-
The Organization's authentication provider.
|
14993
|
+
The Organization's authentication provider, one of the AuthProvider constants.
|
14858
14994
|
'''
|
14859
14995
|
self.created_at = created_at if created_at is not None else None
|
14860
14996
|
'''
|
14861
14997
|
The time at which the Organization was created.
|
14862
14998
|
'''
|
14999
|
+
self.device_trust_enabled = device_trust_enabled if device_trust_enabled is not None else False
|
15000
|
+
'''
|
15001
|
+
Indicates if the Organization has device trust enabled.
|
15002
|
+
'''
|
15003
|
+
self.device_trust_provider = device_trust_provider if device_trust_provider is not None else ''
|
15004
|
+
'''
|
15005
|
+
The Organization's device trust provider, one of the DeviceTrustProvider constants.
|
15006
|
+
'''
|
14863
15007
|
self.idle_timeout = idle_timeout if idle_timeout is not None else None
|
14864
15008
|
'''
|
14865
15009
|
The Organization's idle timeout, if enabled.
|
@@ -14870,23 +15014,23 @@ class Organization:
|
|
14870
15014
|
'''
|
14871
15015
|
self.kind = kind if kind is not None else ''
|
14872
15016
|
'''
|
14873
|
-
The Organization's type.
|
15017
|
+
The Organization's type, one of the OrgKind constants.
|
14874
15018
|
'''
|
14875
15019
|
self.log_local_encoder = log_local_encoder if log_local_encoder is not None else ''
|
14876
15020
|
'''
|
14877
|
-
The Organization's local log encryption encoder.
|
15021
|
+
The Organization's local log encryption encoder, one of the LogLocalEncoder constants.
|
14878
15022
|
'''
|
14879
15023
|
self.log_local_format = log_local_format if log_local_format is not None else ''
|
14880
15024
|
'''
|
14881
|
-
The Organization's local log format.
|
15025
|
+
The Organization's local log format, one of the LogLocalFormat constants.
|
14882
15026
|
'''
|
14883
15027
|
self.log_local_storage = log_local_storage if log_local_storage is not None else ''
|
14884
15028
|
'''
|
14885
|
-
The Organization's local log storage.
|
15029
|
+
The Organization's local log storage, one of the LogLocalStorage constants.
|
14886
15030
|
'''
|
14887
15031
|
self.log_remote_encoder = log_remote_encoder if log_remote_encoder is not None else ''
|
14888
15032
|
'''
|
14889
|
-
The Organization's remote log encryption encoder.
|
15033
|
+
The Organization's remote log encryption encoder, one of the LogRemoteEncoder constants.
|
14890
15034
|
'''
|
14891
15035
|
self.log_socket_path = log_socket_path if log_socket_path is not None else ''
|
14892
15036
|
'''
|
@@ -14902,7 +15046,7 @@ class Organization:
|
|
14902
15046
|
'''
|
14903
15047
|
self.mfa_provider = mfa_provider if mfa_provider is not None else ''
|
14904
15048
|
'''
|
14905
|
-
The Organization's multi-factor authentication provider,
|
15049
|
+
The Organization's multi-factor authentication provider, one of the MFAProvider constants.
|
14906
15050
|
'''
|
14907
15051
|
self.name = name if name is not None else ''
|
14908
15052
|
'''
|
@@ -14918,7 +15062,7 @@ class Organization:
|
|
14918
15062
|
'''
|
14919
15063
|
self.scim_provider = scim_provider if scim_provider is not None else ''
|
14920
15064
|
'''
|
14921
|
-
The Organization's SCIM provider.
|
15065
|
+
The Organization's SCIM provider, one of the SCIMProvider constants.
|
14922
15066
|
'''
|
14923
15067
|
self.sensitive_label = sensitive_label if sensitive_label is not None else ''
|
14924
15068
|
'''
|
@@ -14953,6 +15097,8 @@ class Organization:
|
|
14953
15097
|
return '<sdm.Organization ' + \
|
14954
15098
|
'auth_provider: ' + repr(self.auth_provider) + ' ' +\
|
14955
15099
|
'created_at: ' + repr(self.created_at) + ' ' +\
|
15100
|
+
'device_trust_enabled: ' + repr(self.device_trust_enabled) + ' ' +\
|
15101
|
+
'device_trust_provider: ' + repr(self.device_trust_provider) + ' ' +\
|
14956
15102
|
'idle_timeout: ' + repr(self.idle_timeout) + ' ' +\
|
14957
15103
|
'idle_timeout_enabled: ' + repr(self.idle_timeout_enabled) + ' ' +\
|
14958
15104
|
'kind: ' + repr(self.kind) + ' ' +\
|
@@ -14981,6 +15127,8 @@ class Organization:
|
|
14981
15127
|
return {
|
14982
15128
|
'auth_provider': self.auth_provider,
|
14983
15129
|
'created_at': self.created_at,
|
15130
|
+
'device_trust_enabled': self.device_trust_enabled,
|
15131
|
+
'device_trust_provider': self.device_trust_provider,
|
14984
15132
|
'idle_timeout': self.idle_timeout,
|
14985
15133
|
'idle_timeout_enabled': self.idle_timeout_enabled,
|
14986
15134
|
'kind': self.kind,
|
@@ -15012,6 +15160,8 @@ class Organization:
|
|
15012
15160
|
return cls(
|
15013
15161
|
auth_provider=d.get('auth_provider'),
|
15014
15162
|
created_at=d.get('created_at'),
|
15163
|
+
device_trust_enabled=d.get('device_trust_enabled'),
|
15164
|
+
device_trust_provider=d.get('device_trust_provider'),
|
15015
15165
|
idle_timeout=d.get('idle_timeout'),
|
15016
15166
|
idle_timeout_enabled=d.get('idle_timeout_enabled'),
|
15017
15167
|
kind=d.get('kind'),
|
@@ -16554,7 +16704,7 @@ class QueryCapture:
|
|
16554
16704
|
'''
|
16555
16705
|
self.type = type if type is not None else ''
|
16556
16706
|
'''
|
16557
|
-
The CaptureType of this query capture.
|
16707
|
+
The CaptureType of this query capture, one of the CaptureType constants.
|
16558
16708
|
'''
|
16559
16709
|
self.width = width if width is not None else 0
|
16560
16710
|
'''
|
@@ -17793,9 +17943,7 @@ class Relay:
|
|
17793
17943
|
'''
|
17794
17944
|
self.state = state if state is not None else ''
|
17795
17945
|
'''
|
17796
|
-
The current state of the relay
|
17797
|
-
"awaiting_restart", "restarting", "started", "stopped", "dead",
|
17798
|
-
"unknown".
|
17946
|
+
The current state of the relay, one of the NodeState constants.
|
17799
17947
|
'''
|
17800
17948
|
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
17801
17949
|
'''
|
@@ -26,13 +26,13 @@ from google.protobuf import symbol_database as _symbol_database
|
|
26
26
|
_sym_db = _symbol_database.Default()
|
27
27
|
|
28
28
|
|
29
|
-
from google.protobuf import duration_pb2 as google_dot_protobuf_dot_duration__pb2
|
30
29
|
from google.protobuf import timestamp_pb2 as google_dot_protobuf_dot_timestamp__pb2
|
30
|
+
from google.protobuf import duration_pb2 as google_dot_protobuf_dot_duration__pb2
|
31
31
|
from . import options_pb2 as options__pb2
|
32
32
|
from . import spec_pb2 as spec__pb2
|
33
33
|
|
34
34
|
|
35
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\
|
35
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xfd\x0b\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\x32\n\x0floopback_subnet\x18\x1a \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12(\n\x14\x64\x65vice_trust_enabled\x18\x1b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x15\x64\x65vice_trust_provider\x18\x1c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
|
36
36
|
|
37
37
|
|
38
38
|
|
@@ -141,6 +141,12 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
141
141
|
_ORGANIZATION.fields_by_name['kind']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
142
142
|
_ORGANIZATION.fields_by_name['id']._options = None
|
143
143
|
_ORGANIZATION.fields_by_name['id']._serialized_options = b'\362\370\263\007\024\260\363\263\007\001\262\364\263\007\ngo_private'
|
144
|
+
_ORGANIZATION.fields_by_name['loopback_subnet']._options = None
|
145
|
+
_ORGANIZATION.fields_by_name['loopback_subnet']._serialized_options = b'\362\370\263\007\024\260\363\263\007\001\262\364\263\007\ngo_private'
|
146
|
+
_ORGANIZATION.fields_by_name['device_trust_enabled']._options = None
|
147
|
+
_ORGANIZATION.fields_by_name['device_trust_enabled']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
148
|
+
_ORGANIZATION.fields_by_name['device_trust_provider']._options = None
|
149
|
+
_ORGANIZATION.fields_by_name['device_trust_provider']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
144
150
|
_ORGANIZATION._options = None
|
145
151
|
_ORGANIZATION._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
|
146
152
|
_ORGANIZATIONHISTORY._options = None
|
@@ -154,7 +160,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
154
160
|
_ORGANIZATIONHISTORYRECORD._serialized_start=538
|
155
161
|
_ORGANIZATIONHISTORYRECORD._serialized_end=761
|
156
162
|
_ORGANIZATION._serialized_start=764
|
157
|
-
_ORGANIZATION._serialized_end=
|
158
|
-
_ORGANIZATIONHISTORY._serialized_start=
|
159
|
-
_ORGANIZATIONHISTORY._serialized_end=
|
163
|
+
_ORGANIZATION._serialized_end=2297
|
164
|
+
_ORGANIZATIONHISTORY._serialized_start=2300
|
165
|
+
_ORGANIZATIONHISTORY._serialized_end=2539
|
160
166
|
# @@protoc_insertion_point(module_scope)
|