strongdm 9.5.0__zip → 9.7.0__zip
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {strongdm-9.5.0 → strongdm-9.7.0}/PKG-INFO +2 -2
- {strongdm-9.5.0 → strongdm-9.7.0}/setup.py +2 -2
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/client.py +1 -1
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/drivers_pb2.py +215 -171
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/models.py +172 -4
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/organization_history_pb2.py +6 -6
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/plumbing.py +65 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/spec_pb2.py +10 -8
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/svc.py +1 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm.egg-info/PKG-INFO +2 -2
- {strongdm-9.5.0 → strongdm-9.7.0}/LICENSE +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/README.md +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/setup.cfg +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/__init__.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_request_events_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_requests_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_requests_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_requests_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_attachments_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_attachments_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_grants_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_grants_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_grants_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_permissions_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_resources_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_resources_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_resources_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/accounts_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/accounts_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/accounts_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/activities_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/activities_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflows_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflows_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/constants.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/control_panel_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/control_panel_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/drivers_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/errors.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_aliases_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_aliases_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_sets_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_sets_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/nodes_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/nodes_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/nodes_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/options_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/options_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/organization_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_nodes_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_peers_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_resources_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_groups_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/queries_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/queries_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identities_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identities_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identity_groups_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/replays_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/replays_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/resources_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/resources_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/resources_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/resources_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/role_resources_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/role_resources_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/role_resources_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/roles_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/roles_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/roles_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/roles_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_store_healths_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_store_types_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_stores_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_stores_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/spec_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/tags_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/tags_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_approvers_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_assignments_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_roles_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_roles_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflows_history_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflows_pb2.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflows_pb2_grpc.py +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm.egg-info/SOURCES.txt +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm.egg-info/dependency_links.txt +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm.egg-info/requires.txt +0 -0
- {strongdm-9.5.0 → strongdm-9.7.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -13843,10 +13843,6 @@ class MongoReplicaSet:
|
|
13843
13843
|
|
13844
13844
|
|
13845
13845
|
class MongoShardedCluster:
|
13846
|
-
'''
|
13847
|
-
MongoShardedCluster is currently unstable, and its API may change, or it may be removed,
|
13848
|
-
without a major version bump.
|
13849
|
-
'''
|
13850
13846
|
__slots__ = [
|
13851
13847
|
'auth_database',
|
13852
13848
|
'bind_interface',
|
@@ -14944,6 +14940,7 @@ class Organization:
|
|
14944
14940
|
'log_remote_encoder',
|
14945
14941
|
'log_socket_path',
|
14946
14942
|
'log_tcp_address',
|
14943
|
+
'loopback_range',
|
14947
14944
|
'mfa_enabled',
|
14948
14945
|
'mfa_provider',
|
14949
14946
|
'name',
|
@@ -14974,6 +14971,7 @@ class Organization:
|
|
14974
14971
|
log_remote_encoder=None,
|
14975
14972
|
log_socket_path=None,
|
14976
14973
|
log_tcp_address=None,
|
14974
|
+
loopback_range=None,
|
14977
14975
|
mfa_enabled=None,
|
14978
14976
|
mfa_provider=None,
|
14979
14977
|
name=None,
|
@@ -15040,6 +15038,10 @@ class Organization:
|
|
15040
15038
|
'''
|
15041
15039
|
The Organization's TCP address for TCP or Syslog local log storage.
|
15042
15040
|
'''
|
15041
|
+
self.loopback_range = loopback_range if loopback_range is not None else ''
|
15042
|
+
'''
|
15043
|
+
The Organization's loopback range.
|
15044
|
+
'''
|
15043
15045
|
self.mfa_enabled = mfa_enabled if mfa_enabled is not None else False
|
15044
15046
|
'''
|
15045
15047
|
Indicates if the Organization has multi-factor authentication enabled.
|
@@ -15108,6 +15110,7 @@ class Organization:
|
|
15108
15110
|
'log_remote_encoder: ' + repr(self.log_remote_encoder) + ' ' +\
|
15109
15111
|
'log_socket_path: ' + repr(self.log_socket_path) + ' ' +\
|
15110
15112
|
'log_tcp_address: ' + repr(self.log_tcp_address) + ' ' +\
|
15113
|
+
'loopback_range: ' + repr(self.loopback_range) + ' ' +\
|
15111
15114
|
'mfa_enabled: ' + repr(self.mfa_enabled) + ' ' +\
|
15112
15115
|
'mfa_provider: ' + repr(self.mfa_provider) + ' ' +\
|
15113
15116
|
'name: ' + repr(self.name) + ' ' +\
|
@@ -15138,6 +15141,7 @@ class Organization:
|
|
15138
15141
|
'log_remote_encoder': self.log_remote_encoder,
|
15139
15142
|
'log_socket_path': self.log_socket_path,
|
15140
15143
|
'log_tcp_address': self.log_tcp_address,
|
15144
|
+
'loopback_range': self.loopback_range,
|
15141
15145
|
'mfa_enabled': self.mfa_enabled,
|
15142
15146
|
'mfa_provider': self.mfa_provider,
|
15143
15147
|
'name': self.name,
|
@@ -15171,6 +15175,7 @@ class Organization:
|
|
15171
15175
|
log_remote_encoder=d.get('log_remote_encoder'),
|
15172
15176
|
log_socket_path=d.get('log_socket_path'),
|
15173
15177
|
log_tcp_address=d.get('log_tcp_address'),
|
15178
|
+
loopback_range=d.get('loopback_range'),
|
15174
15179
|
mfa_enabled=d.get('mfa_enabled'),
|
15175
15180
|
mfa_provider=d.get('mfa_provider'),
|
15176
15181
|
name=d.get('name'),
|
@@ -20522,6 +20527,169 @@ class SSHCustomerKey:
|
|
20522
20527
|
)
|
20523
20528
|
|
20524
20529
|
|
20530
|
+
class SSHPassword:
|
20531
|
+
'''
|
20532
|
+
SSHPassword is currently unstable, and its API may change, or it may be removed,
|
20533
|
+
without a major version bump.
|
20534
|
+
'''
|
20535
|
+
__slots__ = [
|
20536
|
+
'allow_deprecated_key_exchanges',
|
20537
|
+
'bind_interface',
|
20538
|
+
'egress_filter',
|
20539
|
+
'healthy',
|
20540
|
+
'hostname',
|
20541
|
+
'id',
|
20542
|
+
'name',
|
20543
|
+
'password',
|
20544
|
+
'port',
|
20545
|
+
'port_forwarding',
|
20546
|
+
'port_override',
|
20547
|
+
'secret_store_id',
|
20548
|
+
'subdomain',
|
20549
|
+
'tags',
|
20550
|
+
'username',
|
20551
|
+
]
|
20552
|
+
|
20553
|
+
def __init__(
|
20554
|
+
self,
|
20555
|
+
allow_deprecated_key_exchanges=None,
|
20556
|
+
bind_interface=None,
|
20557
|
+
egress_filter=None,
|
20558
|
+
healthy=None,
|
20559
|
+
hostname=None,
|
20560
|
+
id=None,
|
20561
|
+
name=None,
|
20562
|
+
password=None,
|
20563
|
+
port=None,
|
20564
|
+
port_forwarding=None,
|
20565
|
+
port_override=None,
|
20566
|
+
secret_store_id=None,
|
20567
|
+
subdomain=None,
|
20568
|
+
tags=None,
|
20569
|
+
username=None,
|
20570
|
+
):
|
20571
|
+
self.allow_deprecated_key_exchanges = allow_deprecated_key_exchanges if allow_deprecated_key_exchanges is not None else False
|
20572
|
+
'''
|
20573
|
+
Whether deprecated, insecure key exchanges are allowed for use to connect to the target ssh server.
|
20574
|
+
'''
|
20575
|
+
self.bind_interface = bind_interface if bind_interface is not None else ''
|
20576
|
+
'''
|
20577
|
+
The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
|
20578
|
+
'''
|
20579
|
+
self.egress_filter = egress_filter if egress_filter is not None else ''
|
20580
|
+
'''
|
20581
|
+
A filter applied to the routing logic to pin datasource to nodes.
|
20582
|
+
'''
|
20583
|
+
self.healthy = healthy if healthy is not None else False
|
20584
|
+
'''
|
20585
|
+
True if the datasource is reachable and the credentials are valid.
|
20586
|
+
'''
|
20587
|
+
self.hostname = hostname if hostname is not None else ''
|
20588
|
+
'''
|
20589
|
+
The host to dial to initiate a connection from the egress node to this resource.
|
20590
|
+
'''
|
20591
|
+
self.id = id if id is not None else ''
|
20592
|
+
'''
|
20593
|
+
Unique identifier of the Resource.
|
20594
|
+
'''
|
20595
|
+
self.name = name if name is not None else ''
|
20596
|
+
'''
|
20597
|
+
Unique human-readable name of the Resource.
|
20598
|
+
'''
|
20599
|
+
self.password = password if password is not None else ''
|
20600
|
+
'''
|
20601
|
+
The password to authenticate with.
|
20602
|
+
'''
|
20603
|
+
self.port = port if port is not None else 0
|
20604
|
+
'''
|
20605
|
+
The port to dial to initiate a connection from the egress node to this resource.
|
20606
|
+
'''
|
20607
|
+
self.port_forwarding = port_forwarding if port_forwarding is not None else False
|
20608
|
+
'''
|
20609
|
+
Whether port forwarding is allowed through this server.
|
20610
|
+
'''
|
20611
|
+
self.port_override = port_override if port_override is not None else 0
|
20612
|
+
'''
|
20613
|
+
The local port used by clients to connect to this resource.
|
20614
|
+
'''
|
20615
|
+
self.secret_store_id = secret_store_id if secret_store_id is not None else ''
|
20616
|
+
'''
|
20617
|
+
ID of the secret store containing credentials for this resource, if any.
|
20618
|
+
'''
|
20619
|
+
self.subdomain = subdomain if subdomain is not None else ''
|
20620
|
+
'''
|
20621
|
+
Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
|
20622
|
+
'''
|
20623
|
+
self.tags = tags if tags is not None else _porcelain_zero_value_tags()
|
20624
|
+
'''
|
20625
|
+
Tags is a map of key, value pairs.
|
20626
|
+
'''
|
20627
|
+
self.username = username if username is not None else ''
|
20628
|
+
'''
|
20629
|
+
The username to authenticate with.
|
20630
|
+
'''
|
20631
|
+
|
20632
|
+
def __repr__(self):
|
20633
|
+
return '<sdm.SSHPassword ' + \
|
20634
|
+
'allow_deprecated_key_exchanges: ' + repr(self.allow_deprecated_key_exchanges) + ' ' +\
|
20635
|
+
'bind_interface: ' + repr(self.bind_interface) + ' ' +\
|
20636
|
+
'egress_filter: ' + repr(self.egress_filter) + ' ' +\
|
20637
|
+
'healthy: ' + repr(self.healthy) + ' ' +\
|
20638
|
+
'hostname: ' + repr(self.hostname) + ' ' +\
|
20639
|
+
'id: ' + repr(self.id) + ' ' +\
|
20640
|
+
'name: ' + repr(self.name) + ' ' +\
|
20641
|
+
'password: ' + repr(self.password) + ' ' +\
|
20642
|
+
'port: ' + repr(self.port) + ' ' +\
|
20643
|
+
'port_forwarding: ' + repr(self.port_forwarding) + ' ' +\
|
20644
|
+
'port_override: ' + repr(self.port_override) + ' ' +\
|
20645
|
+
'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
|
20646
|
+
'subdomain: ' + repr(self.subdomain) + ' ' +\
|
20647
|
+
'tags: ' + repr(self.tags) + ' ' +\
|
20648
|
+
'username: ' + repr(self.username) + ' ' +\
|
20649
|
+
'>'
|
20650
|
+
|
20651
|
+
def to_dict(self):
|
20652
|
+
return {
|
20653
|
+
'allow_deprecated_key_exchanges':
|
20654
|
+
self.allow_deprecated_key_exchanges,
|
20655
|
+
'bind_interface': self.bind_interface,
|
20656
|
+
'egress_filter': self.egress_filter,
|
20657
|
+
'healthy': self.healthy,
|
20658
|
+
'hostname': self.hostname,
|
20659
|
+
'id': self.id,
|
20660
|
+
'name': self.name,
|
20661
|
+
'password': self.password,
|
20662
|
+
'port': self.port,
|
20663
|
+
'port_forwarding': self.port_forwarding,
|
20664
|
+
'port_override': self.port_override,
|
20665
|
+
'secret_store_id': self.secret_store_id,
|
20666
|
+
'subdomain': self.subdomain,
|
20667
|
+
'tags': self.tags,
|
20668
|
+
'username': self.username,
|
20669
|
+
}
|
20670
|
+
|
20671
|
+
@classmethod
|
20672
|
+
def from_dict(cls, d):
|
20673
|
+
return cls(
|
20674
|
+
allow_deprecated_key_exchanges=d.get(
|
20675
|
+
'allow_deprecated_key_exchanges'),
|
20676
|
+
bind_interface=d.get('bind_interface'),
|
20677
|
+
egress_filter=d.get('egress_filter'),
|
20678
|
+
healthy=d.get('healthy'),
|
20679
|
+
hostname=d.get('hostname'),
|
20680
|
+
id=d.get('id'),
|
20681
|
+
name=d.get('name'),
|
20682
|
+
password=d.get('password'),
|
20683
|
+
port=d.get('port'),
|
20684
|
+
port_forwarding=d.get('port_forwarding'),
|
20685
|
+
port_override=d.get('port_override'),
|
20686
|
+
secret_store_id=d.get('secret_store_id'),
|
20687
|
+
subdomain=d.get('subdomain'),
|
20688
|
+
tags=d.get('tags'),
|
20689
|
+
username=d.get('username'),
|
20690
|
+
)
|
20691
|
+
|
20692
|
+
|
20525
20693
|
class SecretStoreCreateResponse:
|
20526
20694
|
'''
|
20527
20695
|
SecretStoreCreateResponse reports how the SecretStores were created in the system.
|
@@ -32,7 +32,7 @@ from . import options_pb2 as options__pb2
|
|
32
32
|
from . import spec_pb2 as spec__pb2
|
33
33
|
|
34
34
|
|
35
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\
|
35
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xed\x0b\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\"\n\x0eloopback_range\x18\x1a \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14\x64\x65vice_trust_enabled\x18\x1b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x15\x64\x65vice_trust_provider\x18\x1c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
|
36
36
|
|
37
37
|
|
38
38
|
|
@@ -141,8 +141,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
141
141
|
_ORGANIZATION.fields_by_name['kind']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
142
142
|
_ORGANIZATION.fields_by_name['id']._options = None
|
143
143
|
_ORGANIZATION.fields_by_name['id']._serialized_options = b'\362\370\263\007\024\260\363\263\007\001\262\364\263\007\ngo_private'
|
144
|
-
_ORGANIZATION.fields_by_name['
|
145
|
-
_ORGANIZATION.fields_by_name['
|
144
|
+
_ORGANIZATION.fields_by_name['loopback_range']._options = None
|
145
|
+
_ORGANIZATION.fields_by_name['loopback_range']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
146
146
|
_ORGANIZATION.fields_by_name['device_trust_enabled']._options = None
|
147
147
|
_ORGANIZATION.fields_by_name['device_trust_enabled']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
148
148
|
_ORGANIZATION.fields_by_name['device_trust_provider']._options = None
|
@@ -160,7 +160,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
160
160
|
_ORGANIZATIONHISTORYRECORD._serialized_start=538
|
161
161
|
_ORGANIZATIONHISTORYRECORD._serialized_end=761
|
162
162
|
_ORGANIZATION._serialized_start=764
|
163
|
-
_ORGANIZATION._serialized_end=
|
164
|
-
_ORGANIZATIONHISTORY._serialized_start=
|
165
|
-
_ORGANIZATIONHISTORY._serialized_end=
|
163
|
+
_ORGANIZATION._serialized_end=2281
|
164
|
+
_ORGANIZATIONHISTORY._serialized_start=2284
|
165
|
+
_ORGANIZATIONHISTORY._serialized_end=2523
|
166
166
|
# @@protoc_insertion_point(module_scope)
|
@@ -7009,6 +7009,7 @@ def convert_organization_to_porcelain(plumbing):
|
|
7009
7009
|
porcelain.log_remote_encoder = (plumbing.log_remote_encoder)
|
7010
7010
|
porcelain.log_socket_path = (plumbing.log_socket_path)
|
7011
7011
|
porcelain.log_tcp_address = (plumbing.log_tcp_address)
|
7012
|
+
porcelain.loopback_range = (plumbing.loopback_range)
|
7012
7013
|
porcelain.mfa_enabled = (plumbing.mfa_enabled)
|
7013
7014
|
porcelain.mfa_provider = (plumbing.mfa_provider)
|
7014
7015
|
porcelain.name = (plumbing.name)
|
@@ -7047,6 +7048,7 @@ def convert_organization_to_plumbing(porcelain):
|
|
7047
7048
|
plumbing.log_remote_encoder = (porcelain.log_remote_encoder)
|
7048
7049
|
plumbing.log_socket_path = (porcelain.log_socket_path)
|
7049
7050
|
plumbing.log_tcp_address = (porcelain.log_tcp_address)
|
7051
|
+
plumbing.loopback_range = (porcelain.loopback_range)
|
7050
7052
|
plumbing.mfa_enabled = (porcelain.mfa_enabled)
|
7051
7053
|
plumbing.mfa_provider = (porcelain.mfa_provider)
|
7052
7054
|
plumbing.name = (porcelain.name)
|
@@ -9077,6 +9079,9 @@ def convert_resource_to_plumbing(porcelain):
|
|
9077
9079
|
if isinstance(porcelain, models.SSHCustomerKey):
|
9078
9080
|
plumbing.ssh_customer_key.CopyFrom(
|
9079
9081
|
convert_ssh_customer_key_to_plumbing(porcelain))
|
9082
|
+
if isinstance(porcelain, models.SSHPassword):
|
9083
|
+
plumbing.ssh_password.CopyFrom(
|
9084
|
+
convert_ssh_password_to_plumbing(porcelain))
|
9080
9085
|
if isinstance(porcelain, models.Sybase):
|
9081
9086
|
plumbing.sybase.CopyFrom(convert_sybase_to_plumbing(porcelain))
|
9082
9087
|
if isinstance(porcelain, models.SybaseIQ):
|
@@ -9276,6 +9281,8 @@ def convert_resource_to_porcelain(plumbing):
|
|
9276
9281
|
return convert_ssh_cert_to_porcelain(plumbing.ssh_cert)
|
9277
9282
|
if plumbing.HasField('ssh_customer_key'):
|
9278
9283
|
return convert_ssh_customer_key_to_porcelain(plumbing.ssh_customer_key)
|
9284
|
+
if plumbing.HasField('ssh_password'):
|
9285
|
+
return convert_ssh_password_to_porcelain(plumbing.ssh_password)
|
9279
9286
|
if plumbing.HasField('sybase'):
|
9280
9287
|
return convert_sybase_to_porcelain(plumbing.sybase)
|
9281
9288
|
if plumbing.HasField('sybase_iq'):
|
@@ -10224,6 +10231,64 @@ def convert_repeated_ssh_customer_key_to_porcelain(plumbings):
|
|
10224
10231
|
]
|
10225
10232
|
|
10226
10233
|
|
10234
|
+
def convert_ssh_password_to_porcelain(plumbing):
|
10235
|
+
if plumbing is None:
|
10236
|
+
return None
|
10237
|
+
porcelain = models.SSHPassword()
|
10238
|
+
porcelain.allow_deprecated_key_exchanges = (
|
10239
|
+
plumbing.allow_deprecated_key_exchanges)
|
10240
|
+
porcelain.bind_interface = (plumbing.bind_interface)
|
10241
|
+
porcelain.egress_filter = (plumbing.egress_filter)
|
10242
|
+
porcelain.healthy = (plumbing.healthy)
|
10243
|
+
porcelain.hostname = (plumbing.hostname)
|
10244
|
+
porcelain.id = (plumbing.id)
|
10245
|
+
porcelain.name = (plumbing.name)
|
10246
|
+
porcelain.password = (plumbing.password)
|
10247
|
+
porcelain.port = (plumbing.port)
|
10248
|
+
porcelain.port_forwarding = (plumbing.port_forwarding)
|
10249
|
+
porcelain.port_override = (plumbing.port_override)
|
10250
|
+
porcelain.secret_store_id = (plumbing.secret_store_id)
|
10251
|
+
porcelain.subdomain = (plumbing.subdomain)
|
10252
|
+
porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
|
10253
|
+
porcelain.username = (plumbing.username)
|
10254
|
+
return porcelain
|
10255
|
+
|
10256
|
+
|
10257
|
+
def convert_ssh_password_to_plumbing(porcelain):
|
10258
|
+
plumbing = SSHPassword()
|
10259
|
+
if porcelain is None:
|
10260
|
+
return plumbing
|
10261
|
+
plumbing.allow_deprecated_key_exchanges = (
|
10262
|
+
porcelain.allow_deprecated_key_exchanges)
|
10263
|
+
plumbing.bind_interface = (porcelain.bind_interface)
|
10264
|
+
plumbing.egress_filter = (porcelain.egress_filter)
|
10265
|
+
plumbing.healthy = (porcelain.healthy)
|
10266
|
+
plumbing.hostname = (porcelain.hostname)
|
10267
|
+
plumbing.id = (porcelain.id)
|
10268
|
+
plumbing.name = (porcelain.name)
|
10269
|
+
plumbing.password = (porcelain.password)
|
10270
|
+
plumbing.port = (porcelain.port)
|
10271
|
+
plumbing.port_forwarding = (porcelain.port_forwarding)
|
10272
|
+
plumbing.port_override = (porcelain.port_override)
|
10273
|
+
plumbing.secret_store_id = (porcelain.secret_store_id)
|
10274
|
+
plumbing.subdomain = (porcelain.subdomain)
|
10275
|
+
plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
|
10276
|
+
plumbing.username = (porcelain.username)
|
10277
|
+
return plumbing
|
10278
|
+
|
10279
|
+
|
10280
|
+
def convert_repeated_ssh_password_to_plumbing(porcelains):
|
10281
|
+
return [
|
10282
|
+
convert_ssh_password_to_plumbing(porcelain) for porcelain in porcelains
|
10283
|
+
]
|
10284
|
+
|
10285
|
+
|
10286
|
+
def convert_repeated_ssh_password_to_porcelain(plumbings):
|
10287
|
+
return [
|
10288
|
+
convert_ssh_password_to_porcelain(plumbing) for plumbing in plumbings
|
10289
|
+
]
|
10290
|
+
|
10291
|
+
|
10227
10292
|
def convert_secret_store_to_plumbing(porcelain):
|
10228
10293
|
plumbing = SecretStore()
|
10229
10294
|
if porcelain is None:
|
@@ -30,7 +30,7 @@ from . import options_pb2 as options__pb2
|
|
30
30
|
from google.protobuf import timestamp_pb2 as google_dot_protobuf_dot_timestamp__pb2
|
31
31
|
|
32
32
|
|
33
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\nspec.proto\x12\x02v1\x1a\roptions.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"<\n\x12\x41lreadyExistsError\x12\x1a\n\x06\x65ntity\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x06\"7\n\rNotFoundError\x12\x1a\n\x06\x65ntity\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x05\"\x1d\n\x0f\x42\x61\x64RequestError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x03\"!\n\x13\x41uthenticationError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x10\"\x1d\n\x0fPermissionError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x07\"\x1b\n\rInternalError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\r\"u\n\x0eRateLimitError\x12W\n\nrate_limit\x18\x01 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x08\"\x17\n\x15\x43reateRequestMetadata\"$\n\x16\x43reateResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"E\n\x12GetRequestMetadata\x12/\n\x0bsnapshot_at\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\"!\n\x13GetResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x17\n\x15UpdateRequestMetadata\"$\n\x16UpdateResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x17\n\x15\x44\x65leteRequestMetadata\"$\n\x16\x44\x65leteResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x85\x01\n\x13ListRequestMetadata\x12\x0e\n\x06\x63ursor\x18\x01 \x01(\t\x12\x0c\n\x04page\x18\x02 \x01(\x05\x12\r\n\x05limit\x18\x03 \x01(\x05\x12\x10\n\x08order_by\x18\x04 \x01(\t\x12/\n\x0bsnapshot_at\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\"
|
33
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\nspec.proto\x12\x02v1\x1a\roptions.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"<\n\x12\x41lreadyExistsError\x12\x1a\n\x06\x65ntity\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x06\"7\n\rNotFoundError\x12\x1a\n\x06\x65ntity\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x05\"\x1d\n\x0f\x42\x61\x64RequestError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x03\"!\n\x13\x41uthenticationError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x10\"\x1d\n\x0fPermissionError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x07\"\x1b\n\rInternalError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\r\"u\n\x0eRateLimitError\x12W\n\nrate_limit\x18\x01 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x08\"\x17\n\x15\x43reateRequestMetadata\"$\n\x16\x43reateResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"E\n\x12GetRequestMetadata\x12/\n\x0bsnapshot_at\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\"!\n\x13GetResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x17\n\x15UpdateRequestMetadata\"$\n\x16UpdateResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x17\n\x15\x44\x65leteRequestMetadata\"$\n\x16\x44\x65leteResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x85\x01\n\x13ListRequestMetadata\x12\x0e\n\x06\x63ursor\x18\x01 \x01(\t\x12\x0c\n\x04page\x18\x02 \x01(\x05\x12\r\n\x05limit\x18\x03 \x01(\x05\x12\x10\n\x08order_by\x18\x04 \x01(\t\x12/\n\x0bsnapshot_at\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\">\n\x14ListResponseMetadata\x12\x13\n\x0bnext_cursor\x18\x01 \x01(\t\x12\x11\n\x05total\x18\x02 \x01(\x05\x42\x02\x18\x01\"\xaf\x01\n\x11RateLimitMetadata\x12\x19\n\x05limit\x18\x01 \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tremaining\x18\x02 \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x38\n\x08reset_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1a\n\x06\x62ucket\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x18\n\x16GenericRequestMetadata\"\x19\n\x17GenericResponseMetadataBR\n\x19\x63om.strongdm.api.plumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
|
34
34
|
|
35
35
|
|
36
36
|
|
@@ -226,6 +226,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
226
226
|
_UPDATERESPONSEMETADATA._serialized_options = b'\372\370\263\007\005\250\363\263\007\001'
|
227
227
|
_DELETERESPONSEMETADATA._options = None
|
228
228
|
_DELETERESPONSEMETADATA._serialized_options = b'\372\370\263\007\005\250\363\263\007\001'
|
229
|
+
_LISTRESPONSEMETADATA.fields_by_name['total']._options = None
|
230
|
+
_LISTRESPONSEMETADATA.fields_by_name['total']._serialized_options = b'\030\001'
|
229
231
|
_RATELIMITMETADATA.fields_by_name['limit']._options = None
|
230
232
|
_RATELIMITMETADATA.fields_by_name['limit']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
|
231
233
|
_RATELIMITMETADATA.fields_by_name['remaining']._options = None
|
@@ -269,11 +271,11 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
269
271
|
_LISTREQUESTMETADATA._serialized_start=726
|
270
272
|
_LISTREQUESTMETADATA._serialized_end=859
|
271
273
|
_LISTRESPONSEMETADATA._serialized_start=861
|
272
|
-
_LISTRESPONSEMETADATA._serialized_end=
|
273
|
-
_RATELIMITMETADATA._serialized_start=
|
274
|
-
_RATELIMITMETADATA._serialized_end=
|
275
|
-
_GENERICREQUESTMETADATA._serialized_start=
|
276
|
-
_GENERICREQUESTMETADATA._serialized_end=
|
277
|
-
_GENERICRESPONSEMETADATA._serialized_start=
|
278
|
-
_GENERICRESPONSEMETADATA._serialized_end=
|
274
|
+
_LISTRESPONSEMETADATA._serialized_end=923
|
275
|
+
_RATELIMITMETADATA._serialized_start=926
|
276
|
+
_RATELIMITMETADATA._serialized_end=1101
|
277
|
+
_GENERICREQUESTMETADATA._serialized_start=1103
|
278
|
+
_GENERICREQUESTMETADATA._serialized_end=1127
|
279
|
+
_GENERICRESPONSEMETADATA._serialized_start=1129
|
280
|
+
_GENERICRESPONSEMETADATA._serialized_end=1154
|
279
281
|
# @@protoc_insertion_point(module_scope)
|
@@ -1,12 +1,12 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: strongdm
|
3
|
-
Version: 9.
|
3
|
+
Version: 9.7.0
|
4
4
|
Summary: strongDM SDK for the Python programming language.
|
5
5
|
Home-page: https://github.com/strongdm/strongdm-sdk-python
|
6
6
|
Author: strongDM Team
|
7
7
|
Author-email: sdk-feedback@strongdm.com
|
8
8
|
License: apache-2.0
|
9
|
-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v9.
|
9
|
+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v9.7.0.tar.gz
|
10
10
|
Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
|
11
11
|
Platform: UNKNOWN
|
12
12
|
Classifier: Development Status :: 4 - Beta
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|