Skip to content

Commit 0a9d15f

Browse files
committed
16.13.0
1 parent ec521cf commit 0a9d15f

15 files changed

+1349
-5
lines changed

MANIFEST

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,12 @@ strongdm/discovery_connectors_pb2_grpc.py
5858
strongdm/drivers_pb2.py
5959
strongdm/drivers_pb2_grpc.py
6060
strongdm/errors.py
61+
strongdm/granted_account_entitlements_pb2.py
62+
strongdm/granted_account_entitlements_pb2_grpc.py
63+
strongdm/granted_resource_entitlements_pb2.py
64+
strongdm/granted_resource_entitlements_pb2_grpc.py
65+
strongdm/granted_role_entitlements_pb2.py
66+
strongdm/granted_role_entitlements_pb2_grpc.py
6167
strongdm/groups_history_pb2.py
6268
strongdm/groups_history_pb2_grpc.py
6369
strongdm/groups_pb2.py

setup.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@
2323
setup(
2424
name='strongdm',
2525
packages=['strongdm'],
26-
version='16.12.0',
26+
version='16.13.0',
2727
license='apache-2.0',
2828
description='strongDM SDK for the Python programming language.',
2929
long_description=long_description,
@@ -32,7 +32,7 @@
3232
author_email='sdk-feedback@strongdm.com',
3333
url='https://github.com/strongdm/strongdm-sdk-python',
3434
download_url=
35-
'https://github.com/strongdm/strongdm-sdk-python/archive/v16.12.0.tar.gz',
35+
'https://github.com/strongdm/strongdm-sdk-python/archive/v16.13.0.tar.gz',
3636
keywords=[
3737
'strongDM', 'sdm', 'api', 'automation', 'security', 'audit',
3838
'database', 'server', 'ssh', 'rdp'

strongdm.egg-info/PKG-INFO

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
Metadata-Version: 2.1
22
Name: strongdm
3-
Version: 16.12.0
3+
Version: 16.13.0
44
Summary: strongDM SDK for the Python programming language.
55
Home-page: https://github.com/strongdm/strongdm-sdk-python
66
Author: strongDM Team
77
Author-email: sdk-feedback@strongdm.com
88
License: apache-2.0
9-
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v16.12.0.tar.gz
9+
Download-URL: https://github.com/strongdm/strongdm-sdk-python/archive/v16.13.0.tar.gz
1010
Keywords: strongDM,sdm,api,automation,security,audit,database,server,ssh,rdp
1111
Platform: UNKNOWN
1212
Classifier: Development Status :: 4 - Beta

strongdm.egg-info/SOURCES.txt

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,12 @@ strongdm/discovery_connectors_pb2_grpc.py
5757
strongdm/drivers_pb2.py
5858
strongdm/drivers_pb2_grpc.py
5959
strongdm/errors.py
60+
strongdm/granted_account_entitlements_pb2.py
61+
strongdm/granted_account_entitlements_pb2_grpc.py
62+
strongdm/granted_resource_entitlements_pb2.py
63+
strongdm/granted_resource_entitlements_pb2_grpc.py
64+
strongdm/granted_role_entitlements_pb2.py
65+
strongdm/granted_role_entitlements_pb2_grpc.py
6066
strongdm/groups_history_pb2.py
6167
strongdm/groups_history_pb2_grpc.py
6268
strongdm/groups_pb2.py

strongdm/client.py

Lines changed: 55 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@
4040
DEFAULT_RETRY_FACTOR = 1.6
4141
DEFAULT_RETRY_JITTER = 0.2
4242
API_VERSION = '2025-04-14'
43-
USER_AGENT = 'strongdm-sdk-python/16.12.0'
43+
USER_AGENT = 'strongdm-sdk-python/16.13.0'
4444

4545
method_regexp = re.compile(r'\W+')
4646

@@ -356,6 +356,30 @@ def __init__(self,
356356
357357
See `strongdm.svc.DiscoveryConnectors`.
358358
'''
359+
self.granted_account_entitlements = svc.GrantedAccountEntitlements(
360+
channel, self)
361+
'''
362+
GrantedAccountEntitlements enumerates the resources to which an account has been granted access.
363+
The GrantedAccountEntitlements service is read-only.
364+
365+
See `strongdm.svc.GrantedAccountEntitlements`.
366+
'''
367+
self.granted_resource_entitlements = svc.GrantedResourceEntitlements(
368+
channel, self)
369+
'''
370+
GrantedResourceEntitlements enumerates the accounts that have been granted access to a given resource.
371+
The GrantedResourceEntitlements service is read-only.
372+
373+
See `strongdm.svc.GrantedResourceEntitlements`.
374+
'''
375+
self.granted_role_entitlements = svc.GrantedRoleEntitlements(
376+
channel, self)
377+
'''
378+
GrantedRoleEntitlements enumerates the resources to which a role grants access.
379+
The GrantedRoleEntitlements service is read-only.
380+
381+
See `strongdm.svc.GrantedRoleEntitlements`.
382+
'''
359383
self.roles = svc.Roles(channel, self)
360384
'''
361385
A Role has a list of access rules which determine which Resources the members
@@ -741,6 +765,12 @@ def snapshot_at(self, snapshot_datetime):
741765
client.channel, client)
742766
client.discovery_connectors = svc.DiscoveryConnectors(
743767
client.channel, client)
768+
client.granted_account_entitlements = svc.GrantedAccountEntitlements(
769+
client.channel, client)
770+
client.granted_resource_entitlements = svc.GrantedResourceEntitlements(
771+
client.channel, client)
772+
client.granted_role_entitlements = svc.GrantedRoleEntitlements(
773+
client.channel, client)
744774
client.roles = svc.Roles(client.channel, client)
745775
client.groups = svc.Groups(client.channel, client)
746776
client.groups_roles = svc.GroupsRoles(client.channel, client)
@@ -848,6 +878,30 @@ def __init__(self, client):
848878
849879
See `strongdm.svc.SnapshotDiscoveryConnectors`.
850880
'''
881+
self.granted_account_entitlements = svc.SnapshotGrantedAccountEntitlements(
882+
client.granted_account_entitlements)
883+
'''
884+
GrantedAccountEntitlements enumerates the resources to which an account has been granted access.
885+
The GrantedAccountEntitlements service is read-only.
886+
887+
See `strongdm.svc.SnapshotGrantedAccountEntitlements`.
888+
'''
889+
self.granted_resource_entitlements = svc.SnapshotGrantedResourceEntitlements(
890+
client.granted_resource_entitlements)
891+
'''
892+
GrantedResourceEntitlements enumerates the accounts that have been granted access to a given resource.
893+
The GrantedResourceEntitlements service is read-only.
894+
895+
See `strongdm.svc.SnapshotGrantedResourceEntitlements`.
896+
'''
897+
self.granted_role_entitlements = svc.SnapshotGrantedRoleEntitlements(
898+
client.granted_role_entitlements)
899+
'''
900+
GrantedRoleEntitlements enumerates the resources to which a role grants access.
901+
The GrantedRoleEntitlements service is read-only.
902+
903+
See `strongdm.svc.SnapshotGrantedRoleEntitlements`.
904+
'''
851905
self.roles = svc.SnapshotRoles(client.roles)
852906
'''
853907
A Role has a list of access rules which determine which Resources the members

strongdm/constants.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -384,6 +384,7 @@ class Permission:
384384
DEPRECATED_DATASOURCE_GRANT = "datasource:grant"
385385
DISCOVERY_CONNECTOR_READ = "discoveryconnector:read"
386386
DISCOVERY_CONNECTOR_WRITE = "discoveryconnector:write"
387+
ENTITLEMENTS_READ = "entitlements:read"
387388
GRANT_READ = "grant:read"
388389
GRANT_WRITE = "grant:write"
389390
GROUP_READ = "group:read"
Lines changed: 131 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,131 @@
1+
# Copyright 2020 StrongDM Inc
2+
#
3+
# Licensed under the Apache License, Version 2.0 (the "License");
4+
# you may not use this file except in compliance with the License.
5+
# You may obtain a copy of the License at
6+
#
7+
# http://www.apache.org/licenses/LICENSE-2.0
8+
#
9+
# Unless required by applicable law or agreed to in writing, software
10+
# distributed under the License is distributed on an "AS IS" BASIS,
11+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12+
# See the License for the specific language governing permissions and
13+
# limitations under the License.
14+
#
15+
# -*- coding: utf-8 -*-
16+
# Generated by the protocol buffer compiler. DO NOT EDIT!
17+
# source: granted_account_entitlements.proto
18+
"""Generated protocol buffer code."""
19+
from google.protobuf import descriptor as _descriptor
20+
from google.protobuf import descriptor_pool as _descriptor_pool
21+
from google.protobuf import message as _message
22+
from google.protobuf import reflection as _reflection
23+
from google.protobuf import symbol_database as _symbol_database
24+
# @@protoc_insertion_point(imports)
25+
26+
_sym_db = _symbol_database.Default()
27+
28+
29+
from google.protobuf import timestamp_pb2 as google_dot_protobuf_dot_timestamp__pb2
30+
from . import options_pb2 as options__pb2
31+
from . import spec_pb2 as spec__pb2
32+
33+
34+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n\"granted_account_entitlements.proto\x12\x02v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\roptions.proto\x1a\nspec.proto\"\xb3\x01\n$GrantedAccountEntitlementListRequest\x12%\n\x04meta\x18\x01 \x01(\x0b\x32\x17.v1.ListRequestMetadata\x12\x1e\n\naccount_id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1a\n\x06\x66ilter\x18\x03 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xa3\x02\n%GrantedAccountEntitlementListResponse\x12&\n\x04meta\x18\x01 \x01(\x0b\x32\x18.v1.ListResponseMetadata\x12O\n\x1cgranted_account_entitlements\x18\x02 \x03(\x0b\x32\x1d.v1.GrantedAccountEntitlementB\n\xf2\xf8\xb3\x07\x05\xb8\xf3\xb3\x07\x01\x12W\n\nrate_limit\x18\x03 \x01(\x0b\x32\x15.v1.RateLimitMetadataB,\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\xf2\xf8\xb3\x07\x06\xb2\xf4\xb3\x07\x01*\xf2\xf8\xb3\x07\x12\xb2\xf4\xb3\x07\r!json_gateway:(\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\xa9\x02\n\x19GrantedAccountEntitlement\x12\x1f\n\x0bresource_id\x18\x01 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1d\n\torigin_id\x18\x02 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12=\n\rlast_accessed\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12;\n\x11mapped_identities\x18\x04 \x01(\x0b\x32\x14.v1.MappedIdentitiesB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01\x12\x1c\n\x08group_id\x18\x05 \x01(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"\x92\x01\n\x10MappedIdentities\x12J\n\nkubernetes\x18\x01 \x01(\x0b\x32*.v1.GrantedEntitlementKubernetesPrivilegesB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider\"x\n&GrantedEntitlementKubernetesPrivileges\x12\x1a\n\x06groups\x18\x01 \x03(\tB\n\xf2\xf8\xb3\x07\x05\xb0\xf3\xb3\x07\x01:2\xfa\xf8\xb3\x07\x05\xa8\xf3\xb3\x07\x01\xfa\xf8\xb3\x07\x06\xd2\xf3\xb3\x07\x01*\xfa\xf8\xb3\x07\x18\xd2\xf3\xb3\x07\x13!terraform-provider2\x8a\x02\n\x1aGrantedAccountEntitlements\x12\x94\x01\n\x04List\x12(.v1.GrantedAccountEntitlementListRequest\x1a).v1.GrantedAccountEntitlementListResponse\"7\x82\xf9\xb3\x07\x08\xa2\xf3\xb3\x07\x03get\x82\xf9\xb3\x07%\xaa\xf3\xb3\x07 /v1/granted-account-entitlements\x1aU\xca\xf9\xb3\x07\x1e\xc2\xf9\xb3\x07\x19GrantedAccountEntitlement\xca\xf9\xb3\x07\x06\xca\xf9\xb3\x07\x01*\xca\xf9\xb3\x07\x18\xca\xf9\xb3\x07\x13!terraform-provider\xca\xf9\xb3\x07\x05\xe8\xf9\xb3\x07\x01\x42\x9e\x01\n\x19\x63om.strongdm.api.plumbingB\"GrantedAccountEntitlementsPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\xc2\x92\xb4\x07\x06\xa2\x8c\xb4\x07\x01*\xc2\x92\xb4\x07\x18\xa2\x8c\xb4\x07\x13!terraform-providerb\x06proto3')
35+
36+
37+
38+
_GRANTEDACCOUNTENTITLEMENTLISTREQUEST = DESCRIPTOR.message_types_by_name['GrantedAccountEntitlementListRequest']
39+
_GRANTEDACCOUNTENTITLEMENTLISTRESPONSE = DESCRIPTOR.message_types_by_name['GrantedAccountEntitlementListResponse']
40+
_GRANTEDACCOUNTENTITLEMENT = DESCRIPTOR.message_types_by_name['GrantedAccountEntitlement']
41+
_MAPPEDIDENTITIES = DESCRIPTOR.message_types_by_name['MappedIdentities']
42+
_GRANTEDENTITLEMENTKUBERNETESPRIVILEGES = DESCRIPTOR.message_types_by_name['GrantedEntitlementKubernetesPrivileges']
43+
GrantedAccountEntitlementListRequest = _reflection.GeneratedProtocolMessageType('GrantedAccountEntitlementListRequest', (_message.Message,), {
44+
'DESCRIPTOR' : _GRANTEDACCOUNTENTITLEMENTLISTREQUEST,
45+
'__module__' : 'granted_account_entitlements_pb2'
46+
# @@protoc_insertion_point(class_scope:v1.GrantedAccountEntitlementListRequest)
47+
})
48+
_sym_db.RegisterMessage(GrantedAccountEntitlementListRequest)
49+
50+
GrantedAccountEntitlementListResponse = _reflection.GeneratedProtocolMessageType('GrantedAccountEntitlementListResponse', (_message.Message,), {
51+
'DESCRIPTOR' : _GRANTEDACCOUNTENTITLEMENTLISTRESPONSE,
52+
'__module__' : 'granted_account_entitlements_pb2'
53+
# @@protoc_insertion_point(class_scope:v1.GrantedAccountEntitlementListResponse)
54+
})
55+
_sym_db.RegisterMessage(GrantedAccountEntitlementListResponse)
56+
57+
GrantedAccountEntitlement = _reflection.GeneratedProtocolMessageType('GrantedAccountEntitlement', (_message.Message,), {
58+
'DESCRIPTOR' : _GRANTEDACCOUNTENTITLEMENT,
59+
'__module__' : 'granted_account_entitlements_pb2'
60+
# @@protoc_insertion_point(class_scope:v1.GrantedAccountEntitlement)
61+
})
62+
_sym_db.RegisterMessage(GrantedAccountEntitlement)
63+
64+
MappedIdentities = _reflection.GeneratedProtocolMessageType('MappedIdentities', (_message.Message,), {
65+
'DESCRIPTOR' : _MAPPEDIDENTITIES,
66+
'__module__' : 'granted_account_entitlements_pb2'
67+
# @@protoc_insertion_point(class_scope:v1.MappedIdentities)
68+
})
69+
_sym_db.RegisterMessage(MappedIdentities)
70+
71+
GrantedEntitlementKubernetesPrivileges = _reflection.GeneratedProtocolMessageType('GrantedEntitlementKubernetesPrivileges', (_message.Message,), {
72+
'DESCRIPTOR' : _GRANTEDENTITLEMENTKUBERNETESPRIVILEGES,
73+
'__module__' : 'granted_account_entitlements_pb2'
74+
# @@protoc_insertion_point(class_scope:v1.GrantedEntitlementKubernetesPrivileges)
75+
})
76+
_sym_db.RegisterMessage(GrantedEntitlementKubernetesPrivileges)
77+
78+
_GRANTEDACCOUNTENTITLEMENTS = DESCRIPTOR.services_by_name['GrantedAccountEntitlements']
79+
if _descriptor._USE_C_DESCRIPTORS == False:
80+
81+
DESCRIPTOR._options = None
82+
DESCRIPTOR._serialized_options = b'\n\031com.strongdm.api.plumbingB\"GrantedAccountEntitlementsPlumbingZ5github.com/strongdm/strongdm-sdk-go/v3/internal/v1;v1\302\222\264\007\006\242\214\264\007\001*\302\222\264\007\030\242\214\264\007\023!terraform-provider'
83+
_GRANTEDACCOUNTENTITLEMENTLISTREQUEST.fields_by_name['account_id']._options = None
84+
_GRANTEDACCOUNTENTITLEMENTLISTREQUEST.fields_by_name['account_id']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
85+
_GRANTEDACCOUNTENTITLEMENTLISTREQUEST.fields_by_name['filter']._options = None
86+
_GRANTEDACCOUNTENTITLEMENTLISTREQUEST.fields_by_name['filter']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
87+
_GRANTEDACCOUNTENTITLEMENTLISTREQUEST._options = None
88+
_GRANTEDACCOUNTENTITLEMENTLISTREQUEST._serialized_options = b'\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
89+
_GRANTEDACCOUNTENTITLEMENTLISTRESPONSE.fields_by_name['granted_account_entitlements']._options = None
90+
_GRANTEDACCOUNTENTITLEMENTLISTRESPONSE.fields_by_name['granted_account_entitlements']._serialized_options = b'\362\370\263\007\005\270\363\263\007\001'
91+
_GRANTEDACCOUNTENTITLEMENTLISTRESPONSE.fields_by_name['rate_limit']._options = None
92+
_GRANTEDACCOUNTENTITLEMENTLISTRESPONSE.fields_by_name['rate_limit']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001\362\370\263\007\006\262\364\263\007\001*\362\370\263\007\022\262\364\263\007\r!json_gateway'
93+
_GRANTEDACCOUNTENTITLEMENTLISTRESPONSE._options = None
94+
_GRANTEDACCOUNTENTITLEMENTLISTRESPONSE._serialized_options = b'\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
95+
_GRANTEDACCOUNTENTITLEMENT.fields_by_name['resource_id']._options = None
96+
_GRANTEDACCOUNTENTITLEMENT.fields_by_name['resource_id']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
97+
_GRANTEDACCOUNTENTITLEMENT.fields_by_name['origin_id']._options = None
98+
_GRANTEDACCOUNTENTITLEMENT.fields_by_name['origin_id']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
99+
_GRANTEDACCOUNTENTITLEMENT.fields_by_name['last_accessed']._options = None
100+
_GRANTEDACCOUNTENTITLEMENT.fields_by_name['last_accessed']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
101+
_GRANTEDACCOUNTENTITLEMENT.fields_by_name['mapped_identities']._options = None
102+
_GRANTEDACCOUNTENTITLEMENT.fields_by_name['mapped_identities']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
103+
_GRANTEDACCOUNTENTITLEMENT.fields_by_name['group_id']._options = None
104+
_GRANTEDACCOUNTENTITLEMENT.fields_by_name['group_id']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
105+
_GRANTEDACCOUNTENTITLEMENT._options = None
106+
_GRANTEDACCOUNTENTITLEMENT._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
107+
_MAPPEDIDENTITIES.fields_by_name['kubernetes']._options = None
108+
_MAPPEDIDENTITIES.fields_by_name['kubernetes']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
109+
_MAPPEDIDENTITIES._options = None
110+
_MAPPEDIDENTITIES._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
111+
_GRANTEDENTITLEMENTKUBERNETESPRIVILEGES.fields_by_name['groups']._options = None
112+
_GRANTEDENTITLEMENTKUBERNETESPRIVILEGES.fields_by_name['groups']._serialized_options = b'\362\370\263\007\005\260\363\263\007\001'
113+
_GRANTEDENTITLEMENTKUBERNETESPRIVILEGES._options = None
114+
_GRANTEDENTITLEMENTKUBERNETESPRIVILEGES._serialized_options = b'\372\370\263\007\005\250\363\263\007\001\372\370\263\007\006\322\363\263\007\001*\372\370\263\007\030\322\363\263\007\023!terraform-provider'
115+
_GRANTEDACCOUNTENTITLEMENTS._options = None
116+
_GRANTEDACCOUNTENTITLEMENTS._serialized_options = b'\312\371\263\007\036\302\371\263\007\031GrantedAccountEntitlement\312\371\263\007\006\312\371\263\007\001*\312\371\263\007\030\312\371\263\007\023!terraform-provider\312\371\263\007\005\350\371\263\007\001'
117+
_GRANTEDACCOUNTENTITLEMENTS.methods_by_name['List']._options = None
118+
_GRANTEDACCOUNTENTITLEMENTS.methods_by_name['List']._serialized_options = b'\202\371\263\007\010\242\363\263\007\003get\202\371\263\007%\252\363\263\007 /v1/granted-account-entitlements'
119+
_GRANTEDACCOUNTENTITLEMENTLISTREQUEST._serialized_start=103
120+
_GRANTEDACCOUNTENTITLEMENTLISTREQUEST._serialized_end=282
121+
_GRANTEDACCOUNTENTITLEMENTLISTRESPONSE._serialized_start=285
122+
_GRANTEDACCOUNTENTITLEMENTLISTRESPONSE._serialized_end=576
123+
_GRANTEDACCOUNTENTITLEMENT._serialized_start=579
124+
_GRANTEDACCOUNTENTITLEMENT._serialized_end=876
125+
_MAPPEDIDENTITIES._serialized_start=879
126+
_MAPPEDIDENTITIES._serialized_end=1025
127+
_GRANTEDENTITLEMENTKUBERNETESPRIVILEGES._serialized_start=1027
128+
_GRANTEDENTITLEMENTKUBERNETESPRIVILEGES._serialized_end=1147
129+
_GRANTEDACCOUNTENTITLEMENTS._serialized_start=1150
130+
_GRANTEDACCOUNTENTITLEMENTS._serialized_end=1416
131+
# @@protoc_insertion_point(module_scope)

0 commit comments

Comments
 (0)