strongdm 9.3.0__zip → 9.5.0__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (135) hide show
  1. {strongdm-9.3.0 → strongdm-9.5.0}/PKG-INFO +2 -2
  2. {strongdm-9.3.0 → strongdm-9.5.0}/setup.py +2 -2
  3. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/client.py +1 -1
  4. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/constants.py +2 -2
  5. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/drivers_pb2.py +196 -168
  6. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/models.py +164 -16
  7. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/organization_history_pb2.py +11 -5
  8. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/plumbing.py +32 -0
  9. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm.egg-info/PKG-INFO +2 -2
  10. {strongdm-9.3.0 → strongdm-9.5.0}/LICENSE +0 -0
  11. {strongdm-9.3.0 → strongdm-9.5.0}/README.md +0 -0
  12. {strongdm-9.3.0 → strongdm-9.5.0}/setup.cfg +0 -0
  13. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/__init__.py +0 -0
  14. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_request_events_history_pb2.py +0 -0
  15. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
  16. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_requests_history_pb2.py +0 -0
  17. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
  18. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_requests_pb2.py +0 -0
  19. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/access_requests_pb2_grpc.py +0 -0
  20. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_attachments_history_pb2.py +0 -0
  21. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  22. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_attachments_pb2.py +0 -0
  23. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
  24. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_grants_history_pb2.py +0 -0
  25. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  26. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_grants_pb2.py +0 -0
  27. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_grants_pb2_grpc.py +0 -0
  28. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_permissions_pb2.py +0 -0
  29. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
  30. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_resources_history_pb2.py +0 -0
  31. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  32. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_resources_pb2.py +0 -0
  33. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/account_resources_pb2_grpc.py +0 -0
  34. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/accounts_history_pb2.py +0 -0
  35. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
  36. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/accounts_pb2.py +0 -0
  37. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/accounts_pb2_grpc.py +0 -0
  38. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/activities_pb2.py +0 -0
  39. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/activities_pb2_grpc.py +0 -0
  40. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
  41. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
  42. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
  43. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
  44. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
  45. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
  46. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
  47. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
  48. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflows_history_pb2.py +0 -0
  49. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
  50. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflows_pb2.py +0 -0
  51. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
  52. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/control_panel_pb2.py +0 -0
  53. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/control_panel_pb2_grpc.py +0 -0
  54. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/drivers_pb2_grpc.py +0 -0
  55. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/errors.py +0 -0
  56. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_aliases_history_pb2.py +0 -0
  57. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
  58. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_aliases_pb2.py +0 -0
  59. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
  60. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_sets_history_pb2.py +0 -0
  61. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
  62. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_sets_pb2.py +0 -0
  63. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
  64. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/nodes_history_pb2.py +0 -0
  65. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
  66. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/nodes_pb2.py +0 -0
  67. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/nodes_pb2_grpc.py +0 -0
  68. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/options_pb2.py +0 -0
  69. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/options_pb2_grpc.py +0 -0
  70. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/organization_history_pb2_grpc.py +0 -0
  71. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_nodes_pb2.py +0 -0
  72. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
  73. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_peers_pb2.py +0 -0
  74. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
  75. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_resources_pb2.py +0 -0
  76. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
  77. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_groups_pb2.py +0 -0
  78. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
  79. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/queries_pb2.py +0 -0
  80. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/queries_pb2_grpc.py +0 -0
  81. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identities_history_pb2.py +0 -0
  82. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  83. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identities_pb2.py +0 -0
  84. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
  85. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
  86. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  87. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identity_groups_pb2.py +0 -0
  88. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  89. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/replays_pb2.py +0 -0
  90. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/replays_pb2_grpc.py +0 -0
  91. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/resources_history_pb2.py +0 -0
  92. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/resources_history_pb2_grpc.py +0 -0
  93. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/resources_pb2.py +0 -0
  94. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/resources_pb2_grpc.py +0 -0
  95. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/role_resources_history_pb2.py +0 -0
  96. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  97. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/role_resources_pb2.py +0 -0
  98. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/role_resources_pb2_grpc.py +0 -0
  99. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/roles_history_pb2.py +0 -0
  100. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/roles_history_pb2_grpc.py +0 -0
  101. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/roles_pb2.py +0 -0
  102. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/roles_pb2_grpc.py +0 -0
  103. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_store_healths_pb2.py +0 -0
  104. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
  105. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_store_types_pb2.py +0 -0
  106. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  107. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_stores_history_pb2.py +0 -0
  108. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  109. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_stores_pb2.py +0 -0
  110. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
  111. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/spec_pb2.py +0 -0
  112. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/spec_pb2_grpc.py +0 -0
  113. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/svc.py +0 -0
  114. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/tags_pb2.py +0 -0
  115. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/tags_pb2_grpc.py +0 -0
  116. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
  117. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
  118. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_approvers_pb2.py +0 -0
  119. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
  120. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
  121. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
  122. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_assignments_pb2.py +0 -0
  123. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
  124. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_roles_history_pb2.py +0 -0
  125. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
  126. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_roles_pb2.py +0 -0
  127. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
  128. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflows_history_pb2.py +0 -0
  129. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
  130. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflows_pb2.py +0 -0
  131. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm/workflows_pb2_grpc.py +0 -0
  132. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm.egg-info/SOURCES.txt +0 -0
  133. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm.egg-info/dependency_links.txt +0 -0
  134. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm.egg-info/requires.txt +0 -0
  135. {strongdm-9.3.0 → strongdm-9.5.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -24,6 +24,8 @@ class AKS:
24
24
  'certificate_authority',
25
25
  'client_certificate',
26
26
  'client_key',
27
+ 'discovery_enabled',
28
+ 'discovery_username',
27
29
  'egress_filter',
28
30
  'healthcheck_namespace',
29
31
  'healthy',
@@ -45,6 +47,8 @@ class AKS:
45
47
  certificate_authority=None,
46
48
  client_certificate=None,
47
49
  client_key=None,
50
+ discovery_enabled=None,
51
+ discovery_username=None,
48
52
  egress_filter=None,
49
53
  healthcheck_namespace=None,
50
54
  healthy=None,
@@ -75,6 +79,15 @@ class AKS:
75
79
  '''
76
80
  The key to authenticate TLS connections with.
77
81
  '''
82
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
83
+ '''
84
+ If true, configures discovery of a cluster to be run from a node.
85
+ '''
86
+ self.discovery_username = discovery_username if discovery_username is not None else ''
87
+ '''
88
+ If a cluster is configured for user impersonation, this is the user to impersonate when
89
+ running discovery.
90
+ '''
78
91
  self.egress_filter = egress_filter if egress_filter is not None else ''
79
92
  '''
80
93
  A filter applied to the routing logic to pin datasource to nodes.
@@ -134,6 +147,8 @@ class AKS:
134
147
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
135
148
  'client_certificate: ' + repr(self.client_certificate) + ' ' +\
136
149
  'client_key: ' + repr(self.client_key) + ' ' +\
150
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
151
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
137
152
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
138
153
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
139
154
  'healthy: ' + repr(self.healthy) + ' ' +\
@@ -155,6 +170,8 @@ class AKS:
155
170
  'certificate_authority': self.certificate_authority,
156
171
  'client_certificate': self.client_certificate,
157
172
  'client_key': self.client_key,
173
+ 'discovery_enabled': self.discovery_enabled,
174
+ 'discovery_username': self.discovery_username,
158
175
  'egress_filter': self.egress_filter,
159
176
  'healthcheck_namespace': self.healthcheck_namespace,
160
177
  'healthy': self.healthy,
@@ -178,6 +195,8 @@ class AKS:
178
195
  certificate_authority=d.get('certificate_authority'),
179
196
  client_certificate=d.get('client_certificate'),
180
197
  client_key=d.get('client_key'),
198
+ discovery_enabled=d.get('discovery_enabled'),
199
+ discovery_username=d.get('discovery_username'),
181
200
  egress_filter=d.get('egress_filter'),
182
201
  healthcheck_namespace=d.get('healthcheck_namespace'),
183
202
  healthy=d.get('healthy'),
@@ -346,6 +365,8 @@ class AKSBasicAuth:
346
365
  class AKSServiceAccount:
347
366
  __slots__ = [
348
367
  'bind_interface',
368
+ 'discovery_enabled',
369
+ 'discovery_username',
349
370
  'egress_filter',
350
371
  'healthcheck_namespace',
351
372
  'healthy',
@@ -365,6 +386,8 @@ class AKSServiceAccount:
365
386
  def __init__(
366
387
  self,
367
388
  bind_interface=None,
389
+ discovery_enabled=None,
390
+ discovery_username=None,
368
391
  egress_filter=None,
369
392
  healthcheck_namespace=None,
370
393
  healthy=None,
@@ -384,6 +407,15 @@ class AKSServiceAccount:
384
407
  '''
385
408
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
386
409
  '''
410
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
411
+ '''
412
+ If true, configures discovery of a cluster to be run from a node.
413
+ '''
414
+ self.discovery_username = discovery_username if discovery_username is not None else ''
415
+ '''
416
+ If a cluster is configured for user impersonation, this is the user to impersonate when
417
+ running discovery.
418
+ '''
387
419
  self.egress_filter = egress_filter if egress_filter is not None else ''
388
420
  '''
389
421
  A filter applied to the routing logic to pin datasource to nodes.
@@ -444,6 +476,8 @@ class AKSServiceAccount:
444
476
  def __repr__(self):
445
477
  return '<sdm.AKSServiceAccount ' + \
446
478
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
479
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
480
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
447
481
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
448
482
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
449
483
  'healthy: ' + repr(self.healthy) + ' ' +\
@@ -463,6 +497,8 @@ class AKSServiceAccount:
463
497
  def to_dict(self):
464
498
  return {
465
499
  'bind_interface': self.bind_interface,
500
+ 'discovery_enabled': self.discovery_enabled,
501
+ 'discovery_username': self.discovery_username,
466
502
  'egress_filter': self.egress_filter,
467
503
  'healthcheck_namespace': self.healthcheck_namespace,
468
504
  'healthy': self.healthy,
@@ -484,6 +520,8 @@ class AKSServiceAccount:
484
520
  def from_dict(cls, d):
485
521
  return cls(
486
522
  bind_interface=d.get('bind_interface'),
523
+ discovery_enabled=d.get('discovery_enabled'),
524
+ discovery_username=d.get('discovery_username'),
487
525
  egress_filter=d.get('egress_filter'),
488
526
  healthcheck_namespace=d.get('healthcheck_namespace'),
489
527
  healthy=d.get('healthy'),
@@ -2699,8 +2737,7 @@ class AccountPermission:
2699
2737
  '''
2700
2738
  self.permission = permission if permission is not None else ''
2701
2739
  '''
2702
- The value of this permission, split into vertical and action e.g.
2703
- 'secretstore:List', 'role:update'
2740
+ The value of this permission, split into vertical and action, one of the Permission constants.
2704
2741
  '''
2705
2742
  self.scope = scope if scope is not None else ''
2706
2743
  '''
@@ -3075,7 +3112,7 @@ class Activity:
3075
3112
  '''
3076
3113
  self.verb = verb if verb is not None else ''
3077
3114
  '''
3078
- The kind of activity which has taken place.
3115
+ The kind of activity which has taken place, one of the ActivityVerb constants.
3079
3116
  '''
3080
3117
 
3081
3118
  def __repr__(self):
@@ -3218,7 +3255,7 @@ class ActivityEntity:
3218
3255
  '''
3219
3256
  self.type = type if type is not None else ''
3220
3257
  '''
3221
- The type of entity affected, one of the Activity Entities constants.
3258
+ The type of entity affected, one of the ActivityEntityType constants.
3222
3259
  '''
3223
3260
 
3224
3261
  def __repr__(self):
@@ -3308,6 +3345,8 @@ class AmazonEKS:
3308
3345
  'bind_interface',
3309
3346
  'certificate_authority',
3310
3347
  'cluster_name',
3348
+ 'discovery_enabled',
3349
+ 'discovery_username',
3311
3350
  'egress_filter',
3312
3351
  'endpoint',
3313
3352
  'healthcheck_namespace',
@@ -3332,6 +3371,8 @@ class AmazonEKS:
3332
3371
  bind_interface=None,
3333
3372
  certificate_authority=None,
3334
3373
  cluster_name=None,
3374
+ discovery_enabled=None,
3375
+ discovery_username=None,
3335
3376
  egress_filter=None,
3336
3377
  endpoint=None,
3337
3378
  healthcheck_namespace=None,
@@ -3365,6 +3406,15 @@ class AmazonEKS:
3365
3406
  '''
3366
3407
  The name of the cluster to connect to.
3367
3408
  '''
3409
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
3410
+ '''
3411
+ If true, configures discovery of a cluster to be run from a node.
3412
+ '''
3413
+ self.discovery_username = discovery_username if discovery_username is not None else ''
3414
+ '''
3415
+ If a cluster is configured for user impersonation, this is the user to impersonate when
3416
+ running discovery.
3417
+ '''
3368
3418
  self.egress_filter = egress_filter if egress_filter is not None else ''
3369
3419
  '''
3370
3420
  A filter applied to the routing logic to pin datasource to nodes.
@@ -3436,6 +3486,8 @@ class AmazonEKS:
3436
3486
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
3437
3487
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
3438
3488
  'cluster_name: ' + repr(self.cluster_name) + ' ' +\
3489
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
3490
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
3439
3491
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
3440
3492
  'endpoint: ' + repr(self.endpoint) + ' ' +\
3441
3493
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
@@ -3460,6 +3512,8 @@ class AmazonEKS:
3460
3512
  'bind_interface': self.bind_interface,
3461
3513
  'certificate_authority': self.certificate_authority,
3462
3514
  'cluster_name': self.cluster_name,
3515
+ 'discovery_enabled': self.discovery_enabled,
3516
+ 'discovery_username': self.discovery_username,
3463
3517
  'egress_filter': self.egress_filter,
3464
3518
  'endpoint': self.endpoint,
3465
3519
  'healthcheck_namespace': self.healthcheck_namespace,
@@ -3486,6 +3540,8 @@ class AmazonEKS:
3486
3540
  bind_interface=d.get('bind_interface'),
3487
3541
  certificate_authority=d.get('certificate_authority'),
3488
3542
  cluster_name=d.get('cluster_name'),
3543
+ discovery_enabled=d.get('discovery_enabled'),
3544
+ discovery_username=d.get('discovery_username'),
3489
3545
  egress_filter=d.get('egress_filter'),
3490
3546
  endpoint=d.get('endpoint'),
3491
3547
  healthcheck_namespace=d.get('healthcheck_namespace'),
@@ -3511,6 +3567,8 @@ class AmazonEKSInstanceProfile:
3511
3567
  'bind_interface',
3512
3568
  'certificate_authority',
3513
3569
  'cluster_name',
3570
+ 'discovery_enabled',
3571
+ 'discovery_username',
3514
3572
  'egress_filter',
3515
3573
  'endpoint',
3516
3574
  'healthcheck_namespace',
@@ -3533,6 +3591,8 @@ class AmazonEKSInstanceProfile:
3533
3591
  bind_interface=None,
3534
3592
  certificate_authority=None,
3535
3593
  cluster_name=None,
3594
+ discovery_enabled=None,
3595
+ discovery_username=None,
3536
3596
  egress_filter=None,
3537
3597
  endpoint=None,
3538
3598
  healthcheck_namespace=None,
@@ -3561,6 +3621,15 @@ class AmazonEKSInstanceProfile:
3561
3621
  '''
3562
3622
  The name of the cluster to connect to.
3563
3623
  '''
3624
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
3625
+ '''
3626
+ If true, configures discovery of a cluster to be run from a node.
3627
+ '''
3628
+ self.discovery_username = discovery_username if discovery_username is not None else ''
3629
+ '''
3630
+ If a cluster is configured for user impersonation, this is the user to impersonate when
3631
+ running discovery.
3632
+ '''
3564
3633
  self.egress_filter = egress_filter if egress_filter is not None else ''
3565
3634
  '''
3566
3635
  A filter applied to the routing logic to pin datasource to nodes.
@@ -3627,6 +3696,8 @@ class AmazonEKSInstanceProfile:
3627
3696
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
3628
3697
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
3629
3698
  'cluster_name: ' + repr(self.cluster_name) + ' ' +\
3699
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
3700
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
3630
3701
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
3631
3702
  'endpoint: ' + repr(self.endpoint) + ' ' +\
3632
3703
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
@@ -3649,6 +3720,8 @@ class AmazonEKSInstanceProfile:
3649
3720
  'bind_interface': self.bind_interface,
3650
3721
  'certificate_authority': self.certificate_authority,
3651
3722
  'cluster_name': self.cluster_name,
3723
+ 'discovery_enabled': self.discovery_enabled,
3724
+ 'discovery_username': self.discovery_username,
3652
3725
  'egress_filter': self.egress_filter,
3653
3726
  'endpoint': self.endpoint,
3654
3727
  'healthcheck_namespace': self.healthcheck_namespace,
@@ -3673,6 +3746,8 @@ class AmazonEKSInstanceProfile:
3673
3746
  bind_interface=d.get('bind_interface'),
3674
3747
  certificate_authority=d.get('certificate_authority'),
3675
3748
  cluster_name=d.get('cluster_name'),
3749
+ discovery_enabled=d.get('discovery_enabled'),
3750
+ discovery_username=d.get('discovery_username'),
3676
3751
  egress_filter=d.get('egress_filter'),
3677
3752
  endpoint=d.get('endpoint'),
3678
3753
  healthcheck_namespace=d.get('healthcheck_namespace'),
@@ -9578,6 +9653,8 @@ class GoogleGKE:
9578
9653
  __slots__ = [
9579
9654
  'bind_interface',
9580
9655
  'certificate_authority',
9656
+ 'discovery_enabled',
9657
+ 'discovery_username',
9581
9658
  'egress_filter',
9582
9659
  'endpoint',
9583
9660
  'healthcheck_namespace',
@@ -9597,6 +9674,8 @@ class GoogleGKE:
9597
9674
  self,
9598
9675
  bind_interface=None,
9599
9676
  certificate_authority=None,
9677
+ discovery_enabled=None,
9678
+ discovery_username=None,
9600
9679
  egress_filter=None,
9601
9680
  endpoint=None,
9602
9681
  healthcheck_namespace=None,
@@ -9619,6 +9698,15 @@ class GoogleGKE:
9619
9698
  '''
9620
9699
  The CA to authenticate TLS connections with.
9621
9700
  '''
9701
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
9702
+ '''
9703
+ If true, configures discovery of a cluster to be run from a node.
9704
+ '''
9705
+ self.discovery_username = discovery_username if discovery_username is not None else ''
9706
+ '''
9707
+ If a cluster is configured for user impersonation, this is the user to impersonate when
9708
+ running discovery.
9709
+ '''
9622
9710
  self.egress_filter = egress_filter if egress_filter is not None else ''
9623
9711
  '''
9624
9712
  A filter applied to the routing logic to pin datasource to nodes.
@@ -9676,6 +9764,8 @@ class GoogleGKE:
9676
9764
  return '<sdm.GoogleGKE ' + \
9677
9765
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
9678
9766
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
9767
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
9768
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
9679
9769
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
9680
9770
  'endpoint: ' + repr(self.endpoint) + ' ' +\
9681
9771
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
@@ -9695,6 +9785,8 @@ class GoogleGKE:
9695
9785
  return {
9696
9786
  'bind_interface': self.bind_interface,
9697
9787
  'certificate_authority': self.certificate_authority,
9788
+ 'discovery_enabled': self.discovery_enabled,
9789
+ 'discovery_username': self.discovery_username,
9698
9790
  'egress_filter': self.egress_filter,
9699
9791
  'endpoint': self.endpoint,
9700
9792
  'healthcheck_namespace': self.healthcheck_namespace,
@@ -9716,6 +9808,8 @@ class GoogleGKE:
9716
9808
  return cls(
9717
9809
  bind_interface=d.get('bind_interface'),
9718
9810
  certificate_authority=d.get('certificate_authority'),
9811
+ discovery_enabled=d.get('discovery_enabled'),
9812
+ discovery_username=d.get('discovery_username'),
9719
9813
  egress_filter=d.get('egress_filter'),
9720
9814
  endpoint=d.get('endpoint'),
9721
9815
  healthcheck_namespace=d.get('healthcheck_namespace'),
@@ -11397,6 +11491,8 @@ class Kubernetes:
11397
11491
  'certificate_authority',
11398
11492
  'client_certificate',
11399
11493
  'client_key',
11494
+ 'discovery_enabled',
11495
+ 'discovery_username',
11400
11496
  'egress_filter',
11401
11497
  'healthcheck_namespace',
11402
11498
  'healthy',
@@ -11418,6 +11514,8 @@ class Kubernetes:
11418
11514
  certificate_authority=None,
11419
11515
  client_certificate=None,
11420
11516
  client_key=None,
11517
+ discovery_enabled=None,
11518
+ discovery_username=None,
11421
11519
  egress_filter=None,
11422
11520
  healthcheck_namespace=None,
11423
11521
  healthy=None,
@@ -11448,6 +11546,15 @@ class Kubernetes:
11448
11546
  '''
11449
11547
  The key to authenticate TLS connections with.
11450
11548
  '''
11549
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
11550
+ '''
11551
+ If true, configures discovery of a cluster to be run from a node.
11552
+ '''
11553
+ self.discovery_username = discovery_username if discovery_username is not None else ''
11554
+ '''
11555
+ If a cluster is configured for user impersonation, this is the user to impersonate when
11556
+ running discovery.
11557
+ '''
11451
11558
  self.egress_filter = egress_filter if egress_filter is not None else ''
11452
11559
  '''
11453
11560
  A filter applied to the routing logic to pin datasource to nodes.
@@ -11507,6 +11614,8 @@ class Kubernetes:
11507
11614
  'certificate_authority: ' + repr(self.certificate_authority) + ' ' +\
11508
11615
  'client_certificate: ' + repr(self.client_certificate) + ' ' +\
11509
11616
  'client_key: ' + repr(self.client_key) + ' ' +\
11617
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
11618
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
11510
11619
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
11511
11620
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
11512
11621
  'healthy: ' + repr(self.healthy) + ' ' +\
@@ -11528,6 +11637,8 @@ class Kubernetes:
11528
11637
  'certificate_authority': self.certificate_authority,
11529
11638
  'client_certificate': self.client_certificate,
11530
11639
  'client_key': self.client_key,
11640
+ 'discovery_enabled': self.discovery_enabled,
11641
+ 'discovery_username': self.discovery_username,
11531
11642
  'egress_filter': self.egress_filter,
11532
11643
  'healthcheck_namespace': self.healthcheck_namespace,
11533
11644
  'healthy': self.healthy,
@@ -11551,6 +11662,8 @@ class Kubernetes:
11551
11662
  certificate_authority=d.get('certificate_authority'),
11552
11663
  client_certificate=d.get('client_certificate'),
11553
11664
  client_key=d.get('client_key'),
11665
+ discovery_enabled=d.get('discovery_enabled'),
11666
+ discovery_username=d.get('discovery_username'),
11554
11667
  egress_filter=d.get('egress_filter'),
11555
11668
  healthcheck_namespace=d.get('healthcheck_namespace'),
11556
11669
  healthy=d.get('healthy'),
@@ -11719,6 +11832,8 @@ class KubernetesBasicAuth:
11719
11832
  class KubernetesServiceAccount:
11720
11833
  __slots__ = [
11721
11834
  'bind_interface',
11835
+ 'discovery_enabled',
11836
+ 'discovery_username',
11722
11837
  'egress_filter',
11723
11838
  'healthcheck_namespace',
11724
11839
  'healthy',
@@ -11738,6 +11853,8 @@ class KubernetesServiceAccount:
11738
11853
  def __init__(
11739
11854
  self,
11740
11855
  bind_interface=None,
11856
+ discovery_enabled=None,
11857
+ discovery_username=None,
11741
11858
  egress_filter=None,
11742
11859
  healthcheck_namespace=None,
11743
11860
  healthy=None,
@@ -11757,6 +11874,15 @@ class KubernetesServiceAccount:
11757
11874
  '''
11758
11875
  The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
11759
11876
  '''
11877
+ self.discovery_enabled = discovery_enabled if discovery_enabled is not None else False
11878
+ '''
11879
+ If true, configures discovery of a cluster to be run from a node.
11880
+ '''
11881
+ self.discovery_username = discovery_username if discovery_username is not None else ''
11882
+ '''
11883
+ If a cluster is configured for user impersonation, this is the user to impersonate when
11884
+ running discovery.
11885
+ '''
11760
11886
  self.egress_filter = egress_filter if egress_filter is not None else ''
11761
11887
  '''
11762
11888
  A filter applied to the routing logic to pin datasource to nodes.
@@ -11817,6 +11943,8 @@ class KubernetesServiceAccount:
11817
11943
  def __repr__(self):
11818
11944
  return '<sdm.KubernetesServiceAccount ' + \
11819
11945
  'bind_interface: ' + repr(self.bind_interface) + ' ' +\
11946
+ 'discovery_enabled: ' + repr(self.discovery_enabled) + ' ' +\
11947
+ 'discovery_username: ' + repr(self.discovery_username) + ' ' +\
11820
11948
  'egress_filter: ' + repr(self.egress_filter) + ' ' +\
11821
11949
  'healthcheck_namespace: ' + repr(self.healthcheck_namespace) + ' ' +\
11822
11950
  'healthy: ' + repr(self.healthy) + ' ' +\
@@ -11836,6 +11964,8 @@ class KubernetesServiceAccount:
11836
11964
  def to_dict(self):
11837
11965
  return {
11838
11966
  'bind_interface': self.bind_interface,
11967
+ 'discovery_enabled': self.discovery_enabled,
11968
+ 'discovery_username': self.discovery_username,
11839
11969
  'egress_filter': self.egress_filter,
11840
11970
  'healthcheck_namespace': self.healthcheck_namespace,
11841
11971
  'healthy': self.healthy,
@@ -11857,6 +11987,8 @@ class KubernetesServiceAccount:
11857
11987
  def from_dict(cls, d):
11858
11988
  return cls(
11859
11989
  bind_interface=d.get('bind_interface'),
11990
+ discovery_enabled=d.get('discovery_enabled'),
11991
+ discovery_username=d.get('discovery_username'),
11860
11992
  egress_filter=d.get('egress_filter'),
11861
11993
  healthcheck_namespace=d.get('healthcheck_namespace'),
11862
11994
  healthy=d.get('healthy'),
@@ -14801,6 +14933,8 @@ class Organization:
14801
14933
  __slots__ = [
14802
14934
  'auth_provider',
14803
14935
  'created_at',
14936
+ 'device_trust_enabled',
14937
+ 'device_trust_provider',
14804
14938
  'idle_timeout',
14805
14939
  'idle_timeout_enabled',
14806
14940
  'kind',
@@ -14829,6 +14963,8 @@ class Organization:
14829
14963
  self,
14830
14964
  auth_provider=None,
14831
14965
  created_at=None,
14966
+ device_trust_enabled=None,
14967
+ device_trust_provider=None,
14832
14968
  idle_timeout=None,
14833
14969
  idle_timeout_enabled=None,
14834
14970
  kind=None,
@@ -14854,12 +14990,20 @@ class Organization:
14854
14990
  ):
14855
14991
  self.auth_provider = auth_provider if auth_provider is not None else ''
14856
14992
  '''
14857
- The Organization's authentication provider.
14993
+ The Organization's authentication provider, one of the AuthProvider constants.
14858
14994
  '''
14859
14995
  self.created_at = created_at if created_at is not None else None
14860
14996
  '''
14861
14997
  The time at which the Organization was created.
14862
14998
  '''
14999
+ self.device_trust_enabled = device_trust_enabled if device_trust_enabled is not None else False
15000
+ '''
15001
+ Indicates if the Organization has device trust enabled.
15002
+ '''
15003
+ self.device_trust_provider = device_trust_provider if device_trust_provider is not None else ''
15004
+ '''
15005
+ The Organization's device trust provider, one of the DeviceTrustProvider constants.
15006
+ '''
14863
15007
  self.idle_timeout = idle_timeout if idle_timeout is not None else None
14864
15008
  '''
14865
15009
  The Organization's idle timeout, if enabled.
@@ -14870,23 +15014,23 @@ class Organization:
14870
15014
  '''
14871
15015
  self.kind = kind if kind is not None else ''
14872
15016
  '''
14873
- The Organization's type.
15017
+ The Organization's type, one of the OrgKind constants.
14874
15018
  '''
14875
15019
  self.log_local_encoder = log_local_encoder if log_local_encoder is not None else ''
14876
15020
  '''
14877
- The Organization's local log encryption encoder.
15021
+ The Organization's local log encryption encoder, one of the LogLocalEncoder constants.
14878
15022
  '''
14879
15023
  self.log_local_format = log_local_format if log_local_format is not None else ''
14880
15024
  '''
14881
- The Organization's local log format.
15025
+ The Organization's local log format, one of the LogLocalFormat constants.
14882
15026
  '''
14883
15027
  self.log_local_storage = log_local_storage if log_local_storage is not None else ''
14884
15028
  '''
14885
- The Organization's local log storage.
15029
+ The Organization's local log storage, one of the LogLocalStorage constants.
14886
15030
  '''
14887
15031
  self.log_remote_encoder = log_remote_encoder if log_remote_encoder is not None else ''
14888
15032
  '''
14889
- The Organization's remote log encryption encoder.
15033
+ The Organization's remote log encryption encoder, one of the LogRemoteEncoder constants.
14890
15034
  '''
14891
15035
  self.log_socket_path = log_socket_path if log_socket_path is not None else ''
14892
15036
  '''
@@ -14902,7 +15046,7 @@ class Organization:
14902
15046
  '''
14903
15047
  self.mfa_provider = mfa_provider if mfa_provider is not None else ''
14904
15048
  '''
14905
- The Organization's multi-factor authentication provider, if enabled.
15049
+ The Organization's multi-factor authentication provider, one of the MFAProvider constants.
14906
15050
  '''
14907
15051
  self.name = name if name is not None else ''
14908
15052
  '''
@@ -14918,7 +15062,7 @@ class Organization:
14918
15062
  '''
14919
15063
  self.scim_provider = scim_provider if scim_provider is not None else ''
14920
15064
  '''
14921
- The Organization's SCIM provider.
15065
+ The Organization's SCIM provider, one of the SCIMProvider constants.
14922
15066
  '''
14923
15067
  self.sensitive_label = sensitive_label if sensitive_label is not None else ''
14924
15068
  '''
@@ -14953,6 +15097,8 @@ class Organization:
14953
15097
  return '<sdm.Organization ' + \
14954
15098
  'auth_provider: ' + repr(self.auth_provider) + ' ' +\
14955
15099
  'created_at: ' + repr(self.created_at) + ' ' +\
15100
+ 'device_trust_enabled: ' + repr(self.device_trust_enabled) + ' ' +\
15101
+ 'device_trust_provider: ' + repr(self.device_trust_provider) + ' ' +\
14956
15102
  'idle_timeout: ' + repr(self.idle_timeout) + ' ' +\
14957
15103
  'idle_timeout_enabled: ' + repr(self.idle_timeout_enabled) + ' ' +\
14958
15104
  'kind: ' + repr(self.kind) + ' ' +\
@@ -14981,6 +15127,8 @@ class Organization:
14981
15127
  return {
14982
15128
  'auth_provider': self.auth_provider,
14983
15129
  'created_at': self.created_at,
15130
+ 'device_trust_enabled': self.device_trust_enabled,
15131
+ 'device_trust_provider': self.device_trust_provider,
14984
15132
  'idle_timeout': self.idle_timeout,
14985
15133
  'idle_timeout_enabled': self.idle_timeout_enabled,
14986
15134
  'kind': self.kind,
@@ -15012,6 +15160,8 @@ class Organization:
15012
15160
  return cls(
15013
15161
  auth_provider=d.get('auth_provider'),
15014
15162
  created_at=d.get('created_at'),
15163
+ device_trust_enabled=d.get('device_trust_enabled'),
15164
+ device_trust_provider=d.get('device_trust_provider'),
15015
15165
  idle_timeout=d.get('idle_timeout'),
15016
15166
  idle_timeout_enabled=d.get('idle_timeout_enabled'),
15017
15167
  kind=d.get('kind'),
@@ -16554,7 +16704,7 @@ class QueryCapture:
16554
16704
  '''
16555
16705
  self.type = type if type is not None else ''
16556
16706
  '''
16557
- The CaptureType of this query capture.
16707
+ The CaptureType of this query capture, one of the CaptureType constants.
16558
16708
  '''
16559
16709
  self.width = width if width is not None else 0
16560
16710
  '''
@@ -17793,9 +17943,7 @@ class Relay:
17793
17943
  '''
17794
17944
  self.state = state if state is not None else ''
17795
17945
  '''
17796
- The current state of the relay. One of: "new", "verifying_restart",
17797
- "awaiting_restart", "restarting", "started", "stopped", "dead",
17798
- "unknown".
17946
+ The current state of the relay, one of the NodeState constants.
17799
17947
  '''
17800
17948
  self.tags = tags if tags is not None else _porcelain_zero_value_tags()
17801
17949
  '''
@@ -26,13 +26,13 @@ from google.protobuf import symbol_database as _symbol_database
26
26
  _sym_db = _symbol_database.Default()
27
27
 
28
28
 
29
- from google.protobuf import duration_pb2 as google_dot_protobuf_dot_duration__pb2
30
29
  from google.protobuf import timestamp_pb2 as google_dot_protobuf_dot_timestamp__pb2
30
+ from google.protobuf import duration_pb2 as google_dot_protobuf_dot_duration__pb2
31
31
  from . import options_pb2 as options__pb2
32
32
  from . import spec_pb2 as spec__pb2
33
33
 
34
34
 
35
- DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xf4\n\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
35
+ DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xfd\x0b\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\x32\n\x0floopback_subnet\x18\x1a \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12(\n\x14\x64\x65vice_trust_enabled\x18\x1b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x15\x64\x65vice_trust_provider\x18\x1c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
36
36
 
37
37
 
38
38
 
@@ -141,6 +141,12 @@ if _descriptor._USE_C_DESCRIPTORS == False:
141
141
  _ORGANIZATION.fields_by_name['kind']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
142
142
  _ORGANIZATION.fields_by_name['id']._options = None
143
143
  _ORGANIZATION.fields_by_name['id']._serialized_options = b'\362\370\263\007\024\260\363\263\007\001\262\364\263\007\ngo_private'
144
+ _ORGANIZATION.fields_by_name['loopback_subnet']._options = None
145
+ _ORGANIZATION.fields_by_name['loopback_subnet']._serialized_options = b'\362\370\263\007\024\260\363\263\007\001\262\364\263\007\ngo_private'
146
+ _ORGANIZATION.fields_by_name['device_trust_enabled']._options = None
147
+ _ORGANIZATION.fields_by_name['device_trust_enabled']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
148
+ _ORGANIZATION.fields_by_name['device_trust_provider']._options = None
149
+ _ORGANIZATION.fields_by_name['device_trust_provider']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
144
150
  _ORGANIZATION._options = None
145
151
  _ORGANIZATION._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
146
152
  _ORGANIZATIONHISTORY._options = None
@@ -154,7 +160,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
154
160
  _ORGANIZATIONHISTORYRECORD._serialized_start=538
155
161
  _ORGANIZATIONHISTORYRECORD._serialized_end=761
156
162
  _ORGANIZATION._serialized_start=764
157
- _ORGANIZATION._serialized_end=2160
158
- _ORGANIZATIONHISTORY._serialized_start=2163
159
- _ORGANIZATIONHISTORY._serialized_end=2402
163
+ _ORGANIZATION._serialized_end=2297
164
+ _ORGANIZATIONHISTORY._serialized_start=2300
165
+ _ORGANIZATIONHISTORY._serialized_end=2539
160
166
  # @@protoc_insertion_point(module_scope)