strongdm 9.5.0__zip → 9.7.0__zip

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (135) hide show
  1. {strongdm-9.5.0 → strongdm-9.7.0}/PKG-INFO +2 -2
  2. {strongdm-9.5.0 → strongdm-9.7.0}/setup.py +2 -2
  3. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/client.py +1 -1
  4. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/drivers_pb2.py +215 -171
  5. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/models.py +172 -4
  6. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/organization_history_pb2.py +6 -6
  7. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/plumbing.py +65 -0
  8. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/spec_pb2.py +10 -8
  9. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/svc.py +1 -0
  10. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm.egg-info/PKG-INFO +2 -2
  11. {strongdm-9.5.0 → strongdm-9.7.0}/LICENSE +0 -0
  12. {strongdm-9.5.0 → strongdm-9.7.0}/README.md +0 -0
  13. {strongdm-9.5.0 → strongdm-9.7.0}/setup.cfg +0 -0
  14. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/__init__.py +0 -0
  15. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_request_events_history_pb2.py +0 -0
  16. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_request_events_history_pb2_grpc.py +0 -0
  17. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_requests_history_pb2.py +0 -0
  18. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_requests_history_pb2_grpc.py +0 -0
  19. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_requests_pb2.py +0 -0
  20. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/access_requests_pb2_grpc.py +0 -0
  21. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_attachments_history_pb2.py +0 -0
  22. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_attachments_history_pb2_grpc.py +0 -0
  23. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_attachments_pb2.py +0 -0
  24. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_attachments_pb2_grpc.py +0 -0
  25. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_grants_history_pb2.py +0 -0
  26. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_grants_history_pb2_grpc.py +0 -0
  27. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_grants_pb2.py +0 -0
  28. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_grants_pb2_grpc.py +0 -0
  29. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_permissions_pb2.py +0 -0
  30. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_permissions_pb2_grpc.py +0 -0
  31. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_resources_history_pb2.py +0 -0
  32. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_resources_history_pb2_grpc.py +0 -0
  33. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_resources_pb2.py +0 -0
  34. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/account_resources_pb2_grpc.py +0 -0
  35. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/accounts_history_pb2.py +0 -0
  36. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/accounts_history_pb2_grpc.py +0 -0
  37. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/accounts_pb2.py +0 -0
  38. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/accounts_pb2_grpc.py +0 -0
  39. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/activities_pb2.py +0 -0
  40. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/activities_pb2_grpc.py +0 -0
  41. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_approvers_history_pb2.py +0 -0
  42. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_approvers_history_pb2_grpc.py +0 -0
  43. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_approvers_pb2.py +0 -0
  44. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_approvers_pb2_grpc.py +0 -0
  45. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_steps_history_pb2.py +0 -0
  46. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_steps_history_pb2_grpc.py +0 -0
  47. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_steps_pb2.py +0 -0
  48. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflow_steps_pb2_grpc.py +0 -0
  49. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflows_history_pb2.py +0 -0
  50. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflows_history_pb2_grpc.py +0 -0
  51. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflows_pb2.py +0 -0
  52. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/approval_workflows_pb2_grpc.py +0 -0
  53. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/constants.py +0 -0
  54. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/control_panel_pb2.py +0 -0
  55. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/control_panel_pb2_grpc.py +0 -0
  56. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/drivers_pb2_grpc.py +0 -0
  57. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/errors.py +0 -0
  58. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_aliases_history_pb2.py +0 -0
  59. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_aliases_history_pb2_grpc.py +0 -0
  60. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_aliases_pb2.py +0 -0
  61. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_aliases_pb2_grpc.py +0 -0
  62. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_sets_history_pb2.py +0 -0
  63. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_sets_history_pb2_grpc.py +0 -0
  64. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_sets_pb2.py +0 -0
  65. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/identity_sets_pb2_grpc.py +0 -0
  66. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/nodes_history_pb2.py +0 -0
  67. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/nodes_history_pb2_grpc.py +0 -0
  68. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/nodes_pb2.py +0 -0
  69. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/nodes_pb2_grpc.py +0 -0
  70. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/options_pb2.py +0 -0
  71. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/options_pb2_grpc.py +0 -0
  72. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/organization_history_pb2_grpc.py +0 -0
  73. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_nodes_pb2.py +0 -0
  74. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_nodes_pb2_grpc.py +0 -0
  75. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_peers_pb2.py +0 -0
  76. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_peers_pb2_grpc.py +0 -0
  77. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_resources_pb2.py +0 -0
  78. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_group_resources_pb2_grpc.py +0 -0
  79. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_groups_pb2.py +0 -0
  80. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/peering_groups_pb2_grpc.py +0 -0
  81. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/queries_pb2.py +0 -0
  82. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/queries_pb2_grpc.py +0 -0
  83. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identities_history_pb2.py +0 -0
  84. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identities_history_pb2_grpc.py +0 -0
  85. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identities_pb2.py +0 -0
  86. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identities_pb2_grpc.py +0 -0
  87. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identity_groups_history_pb2.py +0 -0
  88. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identity_groups_history_pb2_grpc.py +0 -0
  89. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identity_groups_pb2.py +0 -0
  90. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/remote_identity_groups_pb2_grpc.py +0 -0
  91. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/replays_pb2.py +0 -0
  92. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/replays_pb2_grpc.py +0 -0
  93. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/resources_history_pb2.py +0 -0
  94. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/resources_history_pb2_grpc.py +0 -0
  95. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/resources_pb2.py +0 -0
  96. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/resources_pb2_grpc.py +0 -0
  97. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/role_resources_history_pb2.py +0 -0
  98. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/role_resources_history_pb2_grpc.py +0 -0
  99. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/role_resources_pb2.py +0 -0
  100. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/role_resources_pb2_grpc.py +0 -0
  101. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/roles_history_pb2.py +0 -0
  102. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/roles_history_pb2_grpc.py +0 -0
  103. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/roles_pb2.py +0 -0
  104. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/roles_pb2_grpc.py +0 -0
  105. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_store_healths_pb2.py +0 -0
  106. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_store_healths_pb2_grpc.py +0 -0
  107. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_store_types_pb2.py +0 -0
  108. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_store_types_pb2_grpc.py +0 -0
  109. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_stores_history_pb2.py +0 -0
  110. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_stores_history_pb2_grpc.py +0 -0
  111. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_stores_pb2.py +0 -0
  112. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/secret_stores_pb2_grpc.py +0 -0
  113. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/spec_pb2_grpc.py +0 -0
  114. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/tags_pb2.py +0 -0
  115. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/tags_pb2_grpc.py +0 -0
  116. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_approvers_history_pb2.py +0 -0
  117. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_approvers_history_pb2_grpc.py +0 -0
  118. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_approvers_pb2.py +0 -0
  119. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_approvers_pb2_grpc.py +0 -0
  120. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_assignments_history_pb2.py +0 -0
  121. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_assignments_history_pb2_grpc.py +0 -0
  122. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_assignments_pb2.py +0 -0
  123. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_assignments_pb2_grpc.py +0 -0
  124. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_roles_history_pb2.py +0 -0
  125. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_roles_history_pb2_grpc.py +0 -0
  126. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_roles_pb2.py +0 -0
  127. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflow_roles_pb2_grpc.py +0 -0
  128. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflows_history_pb2.py +0 -0
  129. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflows_history_pb2_grpc.py +0 -0
  130. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflows_pb2.py +0 -0
  131. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm/workflows_pb2_grpc.py +0 -0
  132. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm.egg-info/SOURCES.txt +0 -0
  133. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm.egg-info/dependency_links.txt +0 -0
  134. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm.egg-info/requires.txt +0 -0
  135. {strongdm-9.5.0 → strongdm-9.7.0}/strongdm.egg-info/top_level.txt +0 -0
@@ -13843,10 +13843,6 @@ class MongoReplicaSet:
13843
13843
 
13844
13844
 
13845
13845
  class MongoShardedCluster:
13846
- '''
13847
- MongoShardedCluster is currently unstable, and its API may change, or it may be removed,
13848
- without a major version bump.
13849
- '''
13850
13846
  __slots__ = [
13851
13847
  'auth_database',
13852
13848
  'bind_interface',
@@ -14944,6 +14940,7 @@ class Organization:
14944
14940
  'log_remote_encoder',
14945
14941
  'log_socket_path',
14946
14942
  'log_tcp_address',
14943
+ 'loopback_range',
14947
14944
  'mfa_enabled',
14948
14945
  'mfa_provider',
14949
14946
  'name',
@@ -14974,6 +14971,7 @@ class Organization:
14974
14971
  log_remote_encoder=None,
14975
14972
  log_socket_path=None,
14976
14973
  log_tcp_address=None,
14974
+ loopback_range=None,
14977
14975
  mfa_enabled=None,
14978
14976
  mfa_provider=None,
14979
14977
  name=None,
@@ -15040,6 +15038,10 @@ class Organization:
15040
15038
  '''
15041
15039
  The Organization's TCP address for TCP or Syslog local log storage.
15042
15040
  '''
15041
+ self.loopback_range = loopback_range if loopback_range is not None else ''
15042
+ '''
15043
+ The Organization's loopback range.
15044
+ '''
15043
15045
  self.mfa_enabled = mfa_enabled if mfa_enabled is not None else False
15044
15046
  '''
15045
15047
  Indicates if the Organization has multi-factor authentication enabled.
@@ -15108,6 +15110,7 @@ class Organization:
15108
15110
  'log_remote_encoder: ' + repr(self.log_remote_encoder) + ' ' +\
15109
15111
  'log_socket_path: ' + repr(self.log_socket_path) + ' ' +\
15110
15112
  'log_tcp_address: ' + repr(self.log_tcp_address) + ' ' +\
15113
+ 'loopback_range: ' + repr(self.loopback_range) + ' ' +\
15111
15114
  'mfa_enabled: ' + repr(self.mfa_enabled) + ' ' +\
15112
15115
  'mfa_provider: ' + repr(self.mfa_provider) + ' ' +\
15113
15116
  'name: ' + repr(self.name) + ' ' +\
@@ -15138,6 +15141,7 @@ class Organization:
15138
15141
  'log_remote_encoder': self.log_remote_encoder,
15139
15142
  'log_socket_path': self.log_socket_path,
15140
15143
  'log_tcp_address': self.log_tcp_address,
15144
+ 'loopback_range': self.loopback_range,
15141
15145
  'mfa_enabled': self.mfa_enabled,
15142
15146
  'mfa_provider': self.mfa_provider,
15143
15147
  'name': self.name,
@@ -15171,6 +15175,7 @@ class Organization:
15171
15175
  log_remote_encoder=d.get('log_remote_encoder'),
15172
15176
  log_socket_path=d.get('log_socket_path'),
15173
15177
  log_tcp_address=d.get('log_tcp_address'),
15178
+ loopback_range=d.get('loopback_range'),
15174
15179
  mfa_enabled=d.get('mfa_enabled'),
15175
15180
  mfa_provider=d.get('mfa_provider'),
15176
15181
  name=d.get('name'),
@@ -20522,6 +20527,169 @@ class SSHCustomerKey:
20522
20527
  )
20523
20528
 
20524
20529
 
20530
+ class SSHPassword:
20531
+ '''
20532
+ SSHPassword is currently unstable, and its API may change, or it may be removed,
20533
+ without a major version bump.
20534
+ '''
20535
+ __slots__ = [
20536
+ 'allow_deprecated_key_exchanges',
20537
+ 'bind_interface',
20538
+ 'egress_filter',
20539
+ 'healthy',
20540
+ 'hostname',
20541
+ 'id',
20542
+ 'name',
20543
+ 'password',
20544
+ 'port',
20545
+ 'port_forwarding',
20546
+ 'port_override',
20547
+ 'secret_store_id',
20548
+ 'subdomain',
20549
+ 'tags',
20550
+ 'username',
20551
+ ]
20552
+
20553
+ def __init__(
20554
+ self,
20555
+ allow_deprecated_key_exchanges=None,
20556
+ bind_interface=None,
20557
+ egress_filter=None,
20558
+ healthy=None,
20559
+ hostname=None,
20560
+ id=None,
20561
+ name=None,
20562
+ password=None,
20563
+ port=None,
20564
+ port_forwarding=None,
20565
+ port_override=None,
20566
+ secret_store_id=None,
20567
+ subdomain=None,
20568
+ tags=None,
20569
+ username=None,
20570
+ ):
20571
+ self.allow_deprecated_key_exchanges = allow_deprecated_key_exchanges if allow_deprecated_key_exchanges is not None else False
20572
+ '''
20573
+ Whether deprecated, insecure key exchanges are allowed for use to connect to the target ssh server.
20574
+ '''
20575
+ self.bind_interface = bind_interface if bind_interface is not None else ''
20576
+ '''
20577
+ The bind interface is the IP address to which the port override of a resource is bound (for example, 127.0.0.1). It is automatically generated if not provided.
20578
+ '''
20579
+ self.egress_filter = egress_filter if egress_filter is not None else ''
20580
+ '''
20581
+ A filter applied to the routing logic to pin datasource to nodes.
20582
+ '''
20583
+ self.healthy = healthy if healthy is not None else False
20584
+ '''
20585
+ True if the datasource is reachable and the credentials are valid.
20586
+ '''
20587
+ self.hostname = hostname if hostname is not None else ''
20588
+ '''
20589
+ The host to dial to initiate a connection from the egress node to this resource.
20590
+ '''
20591
+ self.id = id if id is not None else ''
20592
+ '''
20593
+ Unique identifier of the Resource.
20594
+ '''
20595
+ self.name = name if name is not None else ''
20596
+ '''
20597
+ Unique human-readable name of the Resource.
20598
+ '''
20599
+ self.password = password if password is not None else ''
20600
+ '''
20601
+ The password to authenticate with.
20602
+ '''
20603
+ self.port = port if port is not None else 0
20604
+ '''
20605
+ The port to dial to initiate a connection from the egress node to this resource.
20606
+ '''
20607
+ self.port_forwarding = port_forwarding if port_forwarding is not None else False
20608
+ '''
20609
+ Whether port forwarding is allowed through this server.
20610
+ '''
20611
+ self.port_override = port_override if port_override is not None else 0
20612
+ '''
20613
+ The local port used by clients to connect to this resource.
20614
+ '''
20615
+ self.secret_store_id = secret_store_id if secret_store_id is not None else ''
20616
+ '''
20617
+ ID of the secret store containing credentials for this resource, if any.
20618
+ '''
20619
+ self.subdomain = subdomain if subdomain is not None else ''
20620
+ '''
20621
+ Subdomain is the local DNS address. (e.g. app-prod1 turns into app-prod1.your-org-name.sdm.network)
20622
+ '''
20623
+ self.tags = tags if tags is not None else _porcelain_zero_value_tags()
20624
+ '''
20625
+ Tags is a map of key, value pairs.
20626
+ '''
20627
+ self.username = username if username is not None else ''
20628
+ '''
20629
+ The username to authenticate with.
20630
+ '''
20631
+
20632
+ def __repr__(self):
20633
+ return '<sdm.SSHPassword ' + \
20634
+ 'allow_deprecated_key_exchanges: ' + repr(self.allow_deprecated_key_exchanges) + ' ' +\
20635
+ 'bind_interface: ' + repr(self.bind_interface) + ' ' +\
20636
+ 'egress_filter: ' + repr(self.egress_filter) + ' ' +\
20637
+ 'healthy: ' + repr(self.healthy) + ' ' +\
20638
+ 'hostname: ' + repr(self.hostname) + ' ' +\
20639
+ 'id: ' + repr(self.id) + ' ' +\
20640
+ 'name: ' + repr(self.name) + ' ' +\
20641
+ 'password: ' + repr(self.password) + ' ' +\
20642
+ 'port: ' + repr(self.port) + ' ' +\
20643
+ 'port_forwarding: ' + repr(self.port_forwarding) + ' ' +\
20644
+ 'port_override: ' + repr(self.port_override) + ' ' +\
20645
+ 'secret_store_id: ' + repr(self.secret_store_id) + ' ' +\
20646
+ 'subdomain: ' + repr(self.subdomain) + ' ' +\
20647
+ 'tags: ' + repr(self.tags) + ' ' +\
20648
+ 'username: ' + repr(self.username) + ' ' +\
20649
+ '>'
20650
+
20651
+ def to_dict(self):
20652
+ return {
20653
+ 'allow_deprecated_key_exchanges':
20654
+ self.allow_deprecated_key_exchanges,
20655
+ 'bind_interface': self.bind_interface,
20656
+ 'egress_filter': self.egress_filter,
20657
+ 'healthy': self.healthy,
20658
+ 'hostname': self.hostname,
20659
+ 'id': self.id,
20660
+ 'name': self.name,
20661
+ 'password': self.password,
20662
+ 'port': self.port,
20663
+ 'port_forwarding': self.port_forwarding,
20664
+ 'port_override': self.port_override,
20665
+ 'secret_store_id': self.secret_store_id,
20666
+ 'subdomain': self.subdomain,
20667
+ 'tags': self.tags,
20668
+ 'username': self.username,
20669
+ }
20670
+
20671
+ @classmethod
20672
+ def from_dict(cls, d):
20673
+ return cls(
20674
+ allow_deprecated_key_exchanges=d.get(
20675
+ 'allow_deprecated_key_exchanges'),
20676
+ bind_interface=d.get('bind_interface'),
20677
+ egress_filter=d.get('egress_filter'),
20678
+ healthy=d.get('healthy'),
20679
+ hostname=d.get('hostname'),
20680
+ id=d.get('id'),
20681
+ name=d.get('name'),
20682
+ password=d.get('password'),
20683
+ port=d.get('port'),
20684
+ port_forwarding=d.get('port_forwarding'),
20685
+ port_override=d.get('port_override'),
20686
+ secret_store_id=d.get('secret_store_id'),
20687
+ subdomain=d.get('subdomain'),
20688
+ tags=d.get('tags'),
20689
+ username=d.get('username'),
20690
+ )
20691
+
20692
+
20525
20693
  class SecretStoreCreateResponse:
20526
20694
  '''
20527
20695
  SecretStoreCreateResponse reports how the SecretStores were created in the system.
@@ -32,7 +32,7 @@ from . import options_pb2 as options__pb2
32
32
  from . import spec_pb2 as spec__pb2
33
33
 
34
34
 
35
- DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xfd\x0b\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\x32\n\x0floopback_subnet\x18\x1a \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12(\n\x14\x64\x65vice_trust_enabled\x18\x1b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x15\x64\x65vice_trust_provider\x18\x1c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
35
+ DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\x1aorganization_history.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\roptions.proto\x1a\nspec.proto\"\x8d\x01\n\x1eOrganizationHistoryListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1a\n\x06\x66ilter\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x88\x02\n\x1fOrganizationHistoryListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12:\n\x07history\x18\x02 \x03(\x0b\x32\x1d.v1.OrganizationHistoryRecordB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xdf\x01\n\x19OrganizationHistoryRecord\x12\x1f\n\x0b\x61\x63tivity_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\ttimestamp\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x32\n\x0corganization\x18\x03 \x01(\x0b\x32\x10.v1.OrganizationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xed\x0b\n\x0cOrganization\x12\x18\n\x04name\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\ncreated_at\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12:\n\nupdated_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12!\n\rauth_provider\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14idle_timeout_enabled\x18\x05 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x0cidle_timeout\x18\x06 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12+\n\x17session_timeout_enabled\x18\x07 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12>\n\x0fsession_timeout\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x39\n\x0bmfa_enabled\x18\t \x01(\x08\x42$\xf2\xf8\xb3\x07\x1f\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x15\xc2\xf4\xb3\x07\x10\n\x02go\x12\nMFAEnabled\x12;\n\x0cmfa_provider\x18\n \x01(\tB%\xf2\xf8\xb3\x07 \xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x16\xc2\xf4\xb3\x07\x11\n\x02go\x12\x0bMFAProvider\x12&\n\x12log_remote_encoder\x18\x0b \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_storage\x18\x0c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x11log_local_encoder\x18\r \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12$\n\x10log_local_format\x18\x0e \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12@\n\x0flog_tcp_address\x18\x0f \x01(\tB\'\xf2\xf8\xb3\x07\"\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x18\xc2\xf4\xb3\x07\x13\n\x02go\x12\rLogTCPAddress\x12#\n\x0flog_socket_path\x18\x10 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rscim_provider\x18\x11 \x01(\tB&\xf2\xf8\xb3\x07!\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x17\xc2\xf4\xb3\x07\x12\n\x02go\x12\x0cSCIMProvider\x12&\n\x12websites_subdomain\x18\x12 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12h\n$ssh_certificate_authority_public_key\x18\x13 \x01(\tB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityPublicKey\x12\x84\x01\n$ssh_certificate_authority_updated_at\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB:\xf2\xf8\xb3\x07\x35\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07+\xc2\xf4\xb3\x07&\n\x02go\x12 SSHCertificateAuthorityUpdatedAt\x12(\n\x14require_secret_store\x18\x15 \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12#\n\x0fsensitive_label\x18\x16 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x44\n\x11saml_metadata_url\x18\x17 \x01(\tB)\xf2\xf8\xb3\x07$\xb0\xf3\xb3\x07\x01\xca\xf3\xb3\x07\x1a\xc2\xf4\xb3\x07\x15\n\x02go\x12\x0fSAMLMetadataURL\x12\x18\n\x04kind\x18\x18 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12%\n\x02id\x18\x19 \x01(\tB\x19\xf2\xf8\xb3\x07\x14\xb0\xf3\xb3\x07\x01\xb2\xf4\xb3\x07\ngo_private\x12\"\n\x0eloopback_range\x18\x1a \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12(\n\x14\x64\x65vice_trust_enabled\x18\x1b \x01(\x08\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12)\n\x15\x64\x65vice_trust_provider\x18\x1c \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\xef\x01\n\x13OrganizationHistory\x12\x80\x01\n\x04List\x12\".v1.OrganizationHistoryListRequest\x1a#.v1.OrganizationHistoryListResponse\"/\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07\x1d\xaa\xf3\xb3\x07\x18/v1/organization-history\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19OrganizationHistoryRecord\xca\xf9\xb3\x07\x05\xd8\xf9\xb3\x07\x01\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-providerB\x97\x01\n\x19\x63om.strongdm.api.plumbingB\x1bOrganizationHistoryPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
36
36
 
37
37
 
38
38
 
@@ -141,8 +141,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
141
141
  _ORGANIZATION.fields_by_name['kind']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
142
142
  _ORGANIZATION.fields_by_name['id']._options = None
143
143
  _ORGANIZATION.fields_by_name['id']._serialized_options = b'\362\370\263\007\024\260\363\263\007\001\262\364\263\007\ngo_private'
144
- _ORGANIZATION.fields_by_name['loopback_subnet']._options = None
145
- _ORGANIZATION.fields_by_name['loopback_subnet']._serialized_options = b'\362\370\263\007\024\260\363\263\007\001\262\364\263\007\ngo_private'
144
+ _ORGANIZATION.fields_by_name['loopback_range']._options = None
145
+ _ORGANIZATION.fields_by_name['loopback_range']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
146
146
  _ORGANIZATION.fields_by_name['device_trust_enabled']._options = None
147
147
  _ORGANIZATION.fields_by_name['device_trust_enabled']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
148
148
  _ORGANIZATION.fields_by_name['device_trust_provider']._options = None
@@ -160,7 +160,7 @@ if _descriptor._USE_C_DESCRIPTORS == False:
160
160
  _ORGANIZATIONHISTORYRECORD._serialized_start=538
161
161
  _ORGANIZATIONHISTORYRECORD._serialized_end=761
162
162
  _ORGANIZATION._serialized_start=764
163
- _ORGANIZATION._serialized_end=2297
164
- _ORGANIZATIONHISTORY._serialized_start=2300
165
- _ORGANIZATIONHISTORY._serialized_end=2539
163
+ _ORGANIZATION._serialized_end=2281
164
+ _ORGANIZATIONHISTORY._serialized_start=2284
165
+ _ORGANIZATIONHISTORY._serialized_end=2523
166
166
  # @@protoc_insertion_point(module_scope)
@@ -7009,6 +7009,7 @@ def convert_organization_to_porcelain(plumbing):
7009
7009
  porcelain.log_remote_encoder = (plumbing.log_remote_encoder)
7010
7010
  porcelain.log_socket_path = (plumbing.log_socket_path)
7011
7011
  porcelain.log_tcp_address = (plumbing.log_tcp_address)
7012
+ porcelain.loopback_range = (plumbing.loopback_range)
7012
7013
  porcelain.mfa_enabled = (plumbing.mfa_enabled)
7013
7014
  porcelain.mfa_provider = (plumbing.mfa_provider)
7014
7015
  porcelain.name = (plumbing.name)
@@ -7047,6 +7048,7 @@ def convert_organization_to_plumbing(porcelain):
7047
7048
  plumbing.log_remote_encoder = (porcelain.log_remote_encoder)
7048
7049
  plumbing.log_socket_path = (porcelain.log_socket_path)
7049
7050
  plumbing.log_tcp_address = (porcelain.log_tcp_address)
7051
+ plumbing.loopback_range = (porcelain.loopback_range)
7050
7052
  plumbing.mfa_enabled = (porcelain.mfa_enabled)
7051
7053
  plumbing.mfa_provider = (porcelain.mfa_provider)
7052
7054
  plumbing.name = (porcelain.name)
@@ -9077,6 +9079,9 @@ def convert_resource_to_plumbing(porcelain):
9077
9079
  if isinstance(porcelain, models.SSHCustomerKey):
9078
9080
  plumbing.ssh_customer_key.CopyFrom(
9079
9081
  convert_ssh_customer_key_to_plumbing(porcelain))
9082
+ if isinstance(porcelain, models.SSHPassword):
9083
+ plumbing.ssh_password.CopyFrom(
9084
+ convert_ssh_password_to_plumbing(porcelain))
9080
9085
  if isinstance(porcelain, models.Sybase):
9081
9086
  plumbing.sybase.CopyFrom(convert_sybase_to_plumbing(porcelain))
9082
9087
  if isinstance(porcelain, models.SybaseIQ):
@@ -9276,6 +9281,8 @@ def convert_resource_to_porcelain(plumbing):
9276
9281
  return convert_ssh_cert_to_porcelain(plumbing.ssh_cert)
9277
9282
  if plumbing.HasField('ssh_customer_key'):
9278
9283
  return convert_ssh_customer_key_to_porcelain(plumbing.ssh_customer_key)
9284
+ if plumbing.HasField('ssh_password'):
9285
+ return convert_ssh_password_to_porcelain(plumbing.ssh_password)
9279
9286
  if plumbing.HasField('sybase'):
9280
9287
  return convert_sybase_to_porcelain(plumbing.sybase)
9281
9288
  if plumbing.HasField('sybase_iq'):
@@ -10224,6 +10231,64 @@ def convert_repeated_ssh_customer_key_to_porcelain(plumbings):
10224
10231
  ]
10225
10232
 
10226
10233
 
10234
+ def convert_ssh_password_to_porcelain(plumbing):
10235
+ if plumbing is None:
10236
+ return None
10237
+ porcelain = models.SSHPassword()
10238
+ porcelain.allow_deprecated_key_exchanges = (
10239
+ plumbing.allow_deprecated_key_exchanges)
10240
+ porcelain.bind_interface = (plumbing.bind_interface)
10241
+ porcelain.egress_filter = (plumbing.egress_filter)
10242
+ porcelain.healthy = (plumbing.healthy)
10243
+ porcelain.hostname = (plumbing.hostname)
10244
+ porcelain.id = (plumbing.id)
10245
+ porcelain.name = (plumbing.name)
10246
+ porcelain.password = (plumbing.password)
10247
+ porcelain.port = (plumbing.port)
10248
+ porcelain.port_forwarding = (plumbing.port_forwarding)
10249
+ porcelain.port_override = (plumbing.port_override)
10250
+ porcelain.secret_store_id = (plumbing.secret_store_id)
10251
+ porcelain.subdomain = (plumbing.subdomain)
10252
+ porcelain.tags = convert_tags_to_porcelain(plumbing.tags)
10253
+ porcelain.username = (plumbing.username)
10254
+ return porcelain
10255
+
10256
+
10257
+ def convert_ssh_password_to_plumbing(porcelain):
10258
+ plumbing = SSHPassword()
10259
+ if porcelain is None:
10260
+ return plumbing
10261
+ plumbing.allow_deprecated_key_exchanges = (
10262
+ porcelain.allow_deprecated_key_exchanges)
10263
+ plumbing.bind_interface = (porcelain.bind_interface)
10264
+ plumbing.egress_filter = (porcelain.egress_filter)
10265
+ plumbing.healthy = (porcelain.healthy)
10266
+ plumbing.hostname = (porcelain.hostname)
10267
+ plumbing.id = (porcelain.id)
10268
+ plumbing.name = (porcelain.name)
10269
+ plumbing.password = (porcelain.password)
10270
+ plumbing.port = (porcelain.port)
10271
+ plumbing.port_forwarding = (porcelain.port_forwarding)
10272
+ plumbing.port_override = (porcelain.port_override)
10273
+ plumbing.secret_store_id = (porcelain.secret_store_id)
10274
+ plumbing.subdomain = (porcelain.subdomain)
10275
+ plumbing.tags.CopyFrom(convert_tags_to_plumbing(porcelain.tags))
10276
+ plumbing.username = (porcelain.username)
10277
+ return plumbing
10278
+
10279
+
10280
+ def convert_repeated_ssh_password_to_plumbing(porcelains):
10281
+ return [
10282
+ convert_ssh_password_to_plumbing(porcelain) for porcelain in porcelains
10283
+ ]
10284
+
10285
+
10286
+ def convert_repeated_ssh_password_to_porcelain(plumbings):
10287
+ return [
10288
+ convert_ssh_password_to_porcelain(plumbing) for plumbing in plumbings
10289
+ ]
10290
+
10291
+
10227
10292
  def convert_secret_store_to_plumbing(porcelain):
10228
10293
  plumbing = SecretStore()
10229
10294
  if porcelain is None:
@@ -30,7 +30,7 @@ from . import options_pb2 as options__pb2
30
30
  from google.protobuf import timestamp_pb2 as google_dot_protobuf_dot_timestamp__pb2
31
31
 
32
32
 
33
- DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\nspec.proto\x12\x02v1\x1a\roptions.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"<\n\x12\x41lreadyExistsError\x12\x1a\n\x06\x65ntity\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x06\"7\n\rNotFoundError\x12\x1a\n\x06\x65ntity\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x05\"\x1d\n\x0f\x42\x61\x64RequestError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x03\"!\n\x13\x41uthenticationError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x10\"\x1d\n\x0fPermissionError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x07\"\x1b\n\rInternalError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\r\"u\n\x0eRateLimitError\x12W\n\nrate_limit\x18\x01 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x08\"\x17\n\x15\x43reateRequestMetadata\"$\n\x16\x43reateResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"E\n\x12GetRequestMetadata\x12/\n\x0bsnapshot_at\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\"!\n\x13GetResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x17\n\x15UpdateRequestMetadata\"$\n\x16UpdateResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x17\n\x15\x44\x65leteRequestMetadata\"$\n\x16\x44\x65leteResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x85\x01\n\x13ListRequestMetadata\x12\x0e\n\x06\x63ursor\x18\x01 \x01(\t\x12\x0c\n\x04page\x18\x02 \x01(\x05\x12\r\n\x05limit\x18\x03 \x01(\x05\x12\x10\n\x08order_by\x18\x04 \x01(\t\x12/\n\x0bsnapshot_at\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\":\n\x14ListResponseMetadata\x12\x13\n\x0bnext_cursor\x18\x01 \x01(\t\x12\r\n\x05total\x18\x02 \x01(\x05\"\xaf\x01\n\x11RateLimitMetadata\x12\x19\n\x05limit\x18\x01 \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tremaining\x18\x02 \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x38\n\x08reset_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1a\n\x06\x62ucket\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x18\n\x16GenericRequestMetadata\"\x19\n\x17GenericResponseMetadataBR\n\x19\x63om.strongdm.api.plumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
33
+ DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\nspec.proto\x12\x02v1\x1a\roptions.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"<\n\x12\x41lreadyExistsError\x12\x1a\n\x06\x65ntity\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x06\"7\n\rNotFoundError\x12\x1a\n\x06\x65ntity\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x05\"\x1d\n\x0f\x42\x61\x64RequestError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x03\"!\n\x13\x41uthenticationError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x10\"\x1d\n\x0fPermissionError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x07\"\x1b\n\rInternalError:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\r\"u\n\x0eRateLimitError\x12W\n\nrate_limit\x18\x01 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:\n\xfa\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x08\"\x17\n\x15\x43reateRequestMetadata\"$\n\x16\x43reateResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"E\n\x12GetRequestMetadata\x12/\n\x0bsnapshot_at\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\"!\n\x13GetResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x17\n\x15UpdateRequestMetadata\"$\n\x16UpdateResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x17\n\x15\x44\x65leteRequestMetadata\"$\n\x16\x44\x65leteResponseMetadata:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x85\x01\n\x13ListRequestMetadata\x12\x0e\n\x06\x63ursor\x18\x01 \x01(\t\x12\x0c\n\x04page\x18\x02 \x01(\x05\x12\r\n\x05limit\x18\x03 \x01(\x05\x12\x10\n\x08order_by\x18\x04 \x01(\t\x12/\n\x0bsnapshot_at\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\">\n\x14ListResponseMetadata\x12\x13\n\x0bnext_cursor\x18\x01 \x01(\t\x12\x11\n\x05total\x18\x02 \x01(\x05\x42\x02\x18\x01\"\xaf\x01\n\x11RateLimitMetadata\x12\x19\n\x05limit\x18\x01 \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\tremaining\x18\x02 \x01(\x03\x42\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x38\n\x08reset_at\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1a\n\x06\x62ucket\x18\x04 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:\n\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\"\x18\n\x16GenericRequestMetadata\"\x19\n\x17GenericResponseMetadataBR\n\x19\x63om.strongdm.api.plumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1b\x06proto3')
34
34
 
35
35
 
36
36
 
@@ -226,6 +226,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
226
226
  _UPDATERESPONSEMETADATA._serialized_options = b'\372\370\263\007\005\250\363\263\007\001'
227
227
  _DELETERESPONSEMETADATA._options = None
228
228
  _DELETERESPONSEMETADATA._serialized_options = b'\372\370\263\007\005\250\363\263\007\001'
229
+ _LISTRESPONSEMETADATA.fields_by_name['total']._options = None
230
+ _LISTRESPONSEMETADATA.fields_by_name['total']._serialized_options = b'\030\001'
229
231
  _RATELIMITMETADATA.fields_by_name['limit']._options = None
230
232
  _RATELIMITMETADATA.fields_by_name['limit']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
231
233
  _RATELIMITMETADATA.fields_by_name['remaining']._options = None
@@ -269,11 +271,11 @@ if _descriptor._USE_C_DESCRIPTORS == False:
269
271
  _LISTREQUESTMETADATA._serialized_start=726
270
272
  _LISTREQUESTMETADATA._serialized_end=859
271
273
  _LISTRESPONSEMETADATA._serialized_start=861
272
- _LISTRESPONSEMETADATA._serialized_end=919
273
- _RATELIMITMETADATA._serialized_start=922
274
- _RATELIMITMETADATA._serialized_end=1097
275
- _GENERICREQUESTMETADATA._serialized_start=1099
276
- _GENERICREQUESTMETADATA._serialized_end=1123
277
- _GENERICRESPONSEMETADATA._serialized_start=1125
278
- _GENERICRESPONSEMETADATA._serialized_end=1150
274
+ _LISTRESPONSEMETADATA._serialized_end=923
275
+ _RATELIMITMETADATA._serialized_start=926
276
+ _RATELIMITMETADATA._serialized_end=1101
277
+ _GENERICREQUESTMETADATA._serialized_start=1103
278
+ _GENERICREQUESTMETADATA._serialized_end=1127
279
+ _GENERICRESPONSEMETADATA._serialized_start=1129
280
+ _GENERICRESPONSEMETADATA._serialized_end=1154
279
281
  # @@protoc_insertion_point(module_scope)
@@ -4060,6 +4060,7 @@ class Resources:
4060
4060
  `strongdm.models.SSH`
4061
4061
  `strongdm.models.SSHCert`
4062
4062
  `strongdm.models.SSHCustomerKey`
4063
+ `strongdm.models.SSHPassword`
4063
4064
  `strongdm.models.Sybase`
4064
4065
  `strongdm.models.SybaseIQ`
4065
4066
  `strongdm.models.Teradata`
@@ -1,12 +1,12 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: strongdm
3
- Version: 9.5.0
3
+ Version: 9.7.0
4
4
  Summary: strongDM SDK for the Python programming language.
5
5
  Home-page: https://github.com/strongdm/strongdm-sdk-python
6
6
  Author: strongDM Team
7
7
  Author-email: sdk-feedback@strongdm.com
8
8
  License: apache-2.0
9
- Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v9.5.0.tar.gz
9
+ Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v9.7.0.tar.gz
10
10
  Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
11
11
  Platform: UNKNOWN
12
12
  Classifier: Development Status :: 4 - Beta
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes