diff --git a/README.md b/README.md index e0b6be9..538dda4 100644 --- a/README.md +++ b/README.md @@ -17,7 +17,6 @@ A Python client library to interact with the [IBM Cloud® Secrets Manager APIs]( ## Overview - The IBM Cloud Secrets Manager Python SDK allows developers to programmatically interact with the following IBM Cloud services: | Service name | Imported class name | diff --git a/ibm_secrets_manager_sdk/secrets_manager_v2.py b/ibm_secrets_manager_sdk/secrets_manager_v2.py index 30f18dc..2b875f0 100644 --- a/ibm_secrets_manager_sdk/secrets_manager_v2.py +++ b/ibm_secrets_manager_sdk/secrets_manager_v2.py @@ -14,7 +14,7 @@ # See the License for the specific language governing permissions and # limitations under the License. -# IBM OpenAPI SDK Code Generator Version: 3.94.1-71478489-20240820-161623 +# IBM OpenAPI SDK Code Generator Version: 3.95.0-d0e386be-20240906-183310 """ With IBM Cloud® Secrets Manager, you can create, lease, and centrally manage secrets that @@ -24,11 +24,11 @@ See: https://cloud.ibm.com/docs/secrets-manager """ -import json -import sys from datetime import datetime from enum import Enum from typing import Dict, List, Optional +import json +import sys from ibm_cloud_sdk_core import BaseService, DetailedResponse, get_query_param from ibm_cloud_sdk_core.authenticators.authenticator import Authenticator @@ -37,7 +37,6 @@ from .common import get_sdk_headers - ############################################################################## # Service ############################################################################## @@ -53,8 +52,8 @@ class SecretsManagerV2(BaseService): @classmethod def new_instance( - cls, - service_name: str = DEFAULT_SERVICE_NAME, + cls, + service_name: str = DEFAULT_SERVICE_NAME, ) -> 'SecretsManagerV2': """ Return a new client for the secrets-manager service using the specified @@ -63,15 +62,15 @@ def new_instance( authenticator = get_authenticator_from_environment(service_name) service = cls( authenticator - ) + ) service.configure_service(service_name) return service @classmethod def construct_service_url( - cls, - instance_id: str = 'provide-here-your-smgr-instanceuuid', - region: str = 'us-south', + cls, + instance_id: str = 'provide-here-your-smgr-instanceuuid', + region: str = 'us-south', ) -> str: """ Construct a service URL by formatting the parameterized service URL. @@ -92,8 +91,8 @@ def construct_service_url( ) def __init__( - self, - authenticator: Authenticator = None, + self, + authenticator: Authenticator = None, ) -> None: """ Construct a new client for the secrets-manager service. @@ -109,11 +108,11 @@ def __init__( ######################### def create_secret_group( - self, - name: str, - *, - description: Optional[str] = None, - **kwargs, + self, + name: str, + *, + description: Optional[str] = None, + **kwargs, ) -> DetailedResponse: """ Create a new secret group. @@ -169,8 +168,8 @@ def create_secret_group( return response def list_secret_groups( - self, - **kwargs, + self, + **kwargs, ) -> DetailedResponse: """ List secret groups. @@ -206,9 +205,9 @@ def list_secret_groups( return response def get_secret_group( - self, - id: str, - **kwargs, + self, + id: str, + **kwargs, ) -> DetailedResponse: """ Get a secret group. @@ -250,10 +249,10 @@ def get_secret_group( return response def update_secret_group( - self, - id: str, - secret_group_patch: 'SecretGroupPatch', - **kwargs, + self, + id: str, + secret_group_patch: 'SecretGroupPatch', + **kwargs, ) -> DetailedResponse: """ Update a secret group. @@ -306,9 +305,9 @@ def update_secret_group( return response def delete_secret_group( - self, - id: str, - **kwargs, + self, + id: str, + **kwargs, ) -> DetailedResponse: """ Delete a secret group. @@ -356,9 +355,9 @@ def delete_secret_group( ######################### def create_secret( - self, - secret_prototype: 'SecretPrototype', - **kwargs, + self, + secret_prototype: 'SecretPrototype', + **kwargs, ) -> DetailedResponse: """ Create a new secret. @@ -412,16 +411,16 @@ def create_secret( return response def list_secrets( - self, - *, - offset: Optional[int] = None, - limit: Optional[int] = None, - sort: Optional[str] = None, - search: Optional[str] = None, - groups: Optional[List[str]] = None, - secret_types: Optional[List[str]] = None, - match_all_labels: Optional[List[str]] = None, - **kwargs, + self, + *, + offset: Optional[int] = None, + limit: Optional[int] = None, + sort: Optional[str] = None, + search: Optional[str] = None, + groups: Optional[List[str]] = None, + secret_types: Optional[List[str]] = None, + match_all_labels: Optional[List[str]] = None, + **kwargs, ) -> DetailedResponse: """ List secrets. @@ -512,9 +511,9 @@ def list_secrets( return response def get_secret( - self, - id: str, - **kwargs, + self, + id: str, + **kwargs, ) -> DetailedResponse: """ Get a secret. @@ -559,9 +558,9 @@ def get_secret( return response def delete_secret( - self, - id: str, - **kwargs, + self, + id: str, + **kwargs, ) -> DetailedResponse: """ Delete a secret. @@ -602,9 +601,9 @@ def delete_secret( return response def get_secret_metadata( - self, - id: str, - **kwargs, + self, + id: str, + **kwargs, ) -> DetailedResponse: """ Get the metadata of a secret. @@ -646,10 +645,10 @@ def get_secret_metadata( return response def update_secret_metadata( - self, - id: str, - secret_metadata_patch: 'SecretMetadataPatch', - **kwargs, + self, + id: str, + secret_metadata_patch: 'SecretMetadataPatch', + **kwargs, ) -> DetailedResponse: """ Update the metadata of a secret. @@ -700,10 +699,10 @@ def update_secret_metadata( return response def create_secret_action( - self, - id: str, - secret_action_prototype: 'SecretActionPrototype', - **kwargs, + self, + id: str, + secret_action_prototype: 'SecretActionPrototype', + **kwargs, ) -> DetailedResponse: """ Create a secret action. @@ -754,11 +753,11 @@ def create_secret_action( return response def get_secret_by_name_type( - self, - secret_type: str, - name: str, - secret_group_name: str, - **kwargs, + self, + secret_type: str, + name: str, + secret_group_name: str, + **kwargs, ) -> DetailedResponse: """ Get a secret by name. @@ -802,8 +801,7 @@ def get_secret_by_name_type( path_param_keys = ['secret_type', 'name', 'secret_group_name'] path_param_values = self.encode_path_vars(secret_type, name, secret_group_name) path_param_dict = dict(zip(path_param_keys, path_param_values)) - url = '/api/v2/secret_groups/{secret_group_name}/secret_types/{secret_type}/secrets/{name}'.format( - **path_param_dict) + url = '/api/v2/secret_groups/{secret_group_name}/secret_types/{secret_type}/secrets/{name}'.format(**path_param_dict) request = self.prepare_request( method='GET', url=url, @@ -818,10 +816,10 @@ def get_secret_by_name_type( ######################### def create_secret_version( - self, - secret_id: str, - secret_version_prototype: 'SecretVersionPrototype', - **kwargs, + self, + secret_id: str, + secret_version_prototype: 'SecretVersionPrototype', + **kwargs, ) -> DetailedResponse: """ Create a new secret version. @@ -872,9 +870,9 @@ def create_secret_version( return response def list_secret_versions( - self, - secret_id: str, - **kwargs, + self, + secret_id: str, + **kwargs, ) -> DetailedResponse: """ List versions of a secret. @@ -918,10 +916,10 @@ def list_secret_versions( return response def get_secret_version( - self, - secret_id: str, - id: str, - **kwargs, + self, + secret_id: str, + id: str, + **kwargs, ) -> DetailedResponse: """ Get a version of a secret. @@ -972,10 +970,10 @@ def get_secret_version( return response def delete_secret_version_data( - self, - secret_id: str, - id: str, - **kwargs, + self, + secret_id: str, + id: str, + **kwargs, ) -> DetailedResponse: """ Delete the data of a secret version. @@ -1022,10 +1020,10 @@ def delete_secret_version_data( return response def get_secret_version_metadata( - self, - secret_id: str, - id: str, - **kwargs, + self, + secret_id: str, + id: str, + **kwargs, ) -> DetailedResponse: """ Get the metadata of a secret version. @@ -1076,11 +1074,11 @@ def get_secret_version_metadata( return response def update_secret_version_metadata( - self, - secret_id: str, - id: str, - secret_version_metadata_patch: 'SecretVersionMetadataPatch', - **kwargs, + self, + secret_id: str, + id: str, + secret_version_metadata_patch: 'SecretVersionMetadataPatch', + **kwargs, ) -> DetailedResponse: """ Update the metadata of a secret version. @@ -1136,11 +1134,11 @@ def update_secret_version_metadata( return response def create_secret_version_action( - self, - secret_id: str, - id: str, - secret_version_action_prototype: 'SecretVersionActionPrototype', - **kwargs, + self, + secret_id: str, + id: str, + secret_version_action_prototype: 'SecretVersionActionPrototype', + **kwargs, ) -> DetailedResponse: """ Create a version action. @@ -1202,13 +1200,13 @@ def create_secret_version_action( ######################### def list_secrets_locks( - self, - *, - offset: Optional[int] = None, - limit: Optional[int] = None, - search: Optional[str] = None, - groups: Optional[List[str]] = None, - **kwargs, + self, + *, + offset: Optional[int] = None, + limit: Optional[int] = None, + search: Optional[str] = None, + groups: Optional[List[str]] = None, + **kwargs, ) -> DetailedResponse: """ List secrets and their locks. @@ -1277,14 +1275,14 @@ def list_secrets_locks( return response def list_secret_locks( - self, - id: str, - *, - offset: Optional[int] = None, - limit: Optional[int] = None, - sort: Optional[str] = None, - search: Optional[str] = None, - **kwargs, + self, + id: str, + *, + offset: Optional[int] = None, + limit: Optional[int] = None, + sort: Optional[str] = None, + search: Optional[str] = None, + **kwargs, ) -> DetailedResponse: """ List secret locks. @@ -1357,12 +1355,12 @@ def list_secret_locks( return response def create_secret_locks_bulk( - self, - id: str, - locks: List['SecretLockPrototype'], - *, - mode: Optional[str] = None, - **kwargs, + self, + id: str, + locks: List['SecretLockPrototype'], + *, + mode: Optional[str] = None, + **kwargs, ) -> DetailedResponse: """ Create secret locks. @@ -1440,11 +1438,11 @@ def create_secret_locks_bulk( return response def delete_secret_locks_bulk( - self, - id: str, - *, - name: Optional[List[str]] = None, - **kwargs, + self, + id: str, + *, + name: Optional[List[str]] = None, + **kwargs, ) -> DetailedResponse: """ Delete secret locks. @@ -1500,15 +1498,15 @@ def delete_secret_locks_bulk( return response def list_secret_version_locks( - self, - secret_id: str, - id: str, - *, - offset: Optional[int] = None, - limit: Optional[int] = None, - sort: Optional[str] = None, - search: Optional[str] = None, - **kwargs, + self, + secret_id: str, + id: str, + *, + offset: Optional[int] = None, + limit: Optional[int] = None, + sort: Optional[str] = None, + search: Optional[str] = None, + **kwargs, ) -> DetailedResponse: """ List secret version locks. @@ -1586,13 +1584,13 @@ def list_secret_version_locks( return response def create_secret_version_locks_bulk( - self, - secret_id: str, - id: str, - locks: List['SecretLockPrototype'], - *, - mode: Optional[str] = None, - **kwargs, + self, + secret_id: str, + id: str, + locks: List['SecretLockPrototype'], + *, + mode: Optional[str] = None, + **kwargs, ) -> DetailedResponse: """ Create secret version locks. @@ -1675,12 +1673,12 @@ def create_secret_version_locks_bulk( return response def delete_secret_version_locks_bulk( - self, - secret_id: str, - id: str, - *, - name: Optional[List[str]] = None, - **kwargs, + self, + secret_id: str, + id: str, + *, + name: Optional[List[str]] = None, + **kwargs, ) -> DetailedResponse: """ Delete locks on a secret version. @@ -1745,9 +1743,9 @@ def delete_secret_version_locks_bulk( ######################### def create_configuration( - self, - configuration_prototype: 'ConfigurationPrototype', - **kwargs, + self, + configuration_prototype: 'ConfigurationPrototype', + **kwargs, ) -> DetailedResponse: """ Create a new configuration. @@ -1802,14 +1800,14 @@ def create_configuration( return response def list_configurations( - self, - *, - offset: Optional[int] = None, - limit: Optional[int] = None, - sort: Optional[str] = None, - search: Optional[str] = None, - secret_types: Optional[List[str]] = None, - **kwargs, + self, + *, + offset: Optional[int] = None, + limit: Optional[int] = None, + sort: Optional[str] = None, + search: Optional[str] = None, + secret_types: Optional[List[str]] = None, + **kwargs, ) -> DetailedResponse: """ List configurations. @@ -1887,11 +1885,11 @@ def list_configurations( return response def get_configuration( - self, - name: str, - *, - x_sm_accept_configuration_type: Optional[str] = None, - **kwargs, + self, + name: str, + *, + x_sm_accept_configuration_type: Optional[str] = None, + **kwargs, ) -> DetailedResponse: """ Get a configuration. @@ -1939,12 +1937,12 @@ def get_configuration( return response def update_configuration( - self, - name: str, - configuration_patch: 'ConfigurationPatch', - *, - x_sm_accept_configuration_type: Optional[str] = None, - **kwargs, + self, + name: str, + configuration_patch: 'ConfigurationPatch', + *, + x_sm_accept_configuration_type: Optional[str] = None, + **kwargs, ) -> DetailedResponse: """ Update configuration. @@ -2000,11 +1998,11 @@ def update_configuration( return response def delete_configuration( - self, - name: str, - *, - x_sm_accept_configuration_type: Optional[str] = None, - **kwargs, + self, + name: str, + *, + x_sm_accept_configuration_type: Optional[str] = None, + **kwargs, ) -> DetailedResponse: """ Delete a configuration. @@ -2050,12 +2048,12 @@ def delete_configuration( return response def create_configuration_action( - self, - name: str, - config_action_prototype: 'ConfigurationActionPrototype', - *, - x_sm_accept_configuration_type: Optional[str] = None, - **kwargs, + self, + name: str, + config_action_prototype: 'ConfigurationActionPrototype', + *, + x_sm_accept_configuration_type: Optional[str] = None, + **kwargs, ) -> DetailedResponse: """ Create a configuration action. @@ -2125,12 +2123,12 @@ def create_configuration_action( ######################### def create_notifications_registration( - self, - event_notifications_instance_crn: str, - event_notifications_source_name: str, - *, - event_notifications_source_description: Optional[str] = None, - **kwargs, + self, + event_notifications_instance_crn: str, + event_notifications_source_name: str, + *, + event_notifications_source_description: Optional[str] = None, + **kwargs, ) -> DetailedResponse: """ Register with Event Notifications instance. @@ -2191,8 +2189,8 @@ def create_notifications_registration( return response def get_notifications_registration( - self, - **kwargs, + self, + **kwargs, ) -> DetailedResponse: """ Get Event Notifications registration details. @@ -2229,8 +2227,8 @@ def get_notifications_registration( return response def delete_notifications_registration( - self, - **kwargs, + self, + **kwargs, ) -> DetailedResponse: """ Unregister from Event Notifications instance. @@ -2268,8 +2266,8 @@ def delete_notifications_registration( return response def get_notifications_registration_test( - self, - **kwargs, + self, + **kwargs, ) -> DetailedResponse: """ Send a test event for Event Notifications registrations. @@ -2522,16 +2520,16 @@ class CertificateIssuanceInfo: """ def __init__( - self, - *, - auto_rotated: Optional[bool] = None, - challenges: Optional[List['ChallengeResource']] = None, - dns_challenge_validation_time: Optional[datetime] = None, - error_code: Optional[str] = None, - error_message: Optional[str] = None, - ordered_on: Optional[datetime] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, + self, + *, + auto_rotated: Optional[bool] = None, + challenges: Optional[List['ChallengeResource']] = None, + dns_challenge_validation_time: Optional[datetime] = None, + error_code: Optional[str] = None, + error_message: Optional[str] = None, + ordered_on: Optional[datetime] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, ) -> None: """ Initialize a CertificateIssuanceInfo object. @@ -2586,8 +2584,7 @@ def to_dict(self) -> Dict: else: challenges_list.append(v.to_dict()) _dict['challenges'] = challenges_list - if hasattr(self, 'dns_challenge_validation_time') and getattr(self, - 'dns_challenge_validation_time') is not None: + if hasattr(self, 'dns_challenge_validation_time') and getattr(self, 'dns_challenge_validation_time') is not None: _dict['dns_challenge_validation_time'] = datetime_to_string(getattr(self, 'dns_challenge_validation_time')) if hasattr(self, 'error_code') and getattr(self, 'error_code') is not None: _dict['error_code'] = getattr(self, 'error_code') @@ -2631,6 +2628,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class CertificateValidity: """ The date and time that the certificate validity period begins and ends. @@ -2640,9 +2638,9 @@ class CertificateValidity: """ def __init__( - self, - not_before: datetime, - not_after: datetime, + self, + not_before: datetime, + not_after: datetime, ) -> None: """ Initialize a CertificateValidity object. @@ -2713,13 +2711,13 @@ class ChallengeResource: """ def __init__( - self, - *, - domain: Optional[str] = None, - expiration: Optional[datetime] = None, - status: Optional[str] = None, - txt_record_name: Optional[str] = None, - txt_record_value: Optional[str] = None, + self, + *, + domain: Optional[str] = None, + expiration: Optional[datetime] = None, + status: Optional[str] = None, + txt_record_name: Optional[str] = None, + txt_record_value: Optional[str] = None, ) -> None: """ Initialize a ChallengeResource object. @@ -2793,18 +2791,14 @@ class Configuration: """ def __init__( - self, + self, ) -> None: """ Initialize a Configuration object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['PublicCertificateConfigurationCALetsEncrypt', - 'PublicCertificateConfigurationDNSCloudInternetServices', - 'PublicCertificateConfigurationDNSClassicInfrastructure', 'IAMCredentialsConfiguration', - 'PrivateCertificateConfigurationRootCA', 'PrivateCertificateConfigurationIntermediateCA', - 'PrivateCertificateConfigurationTemplate']) + ", ".join(['PublicCertificateConfigurationCALetsEncrypt', 'PublicCertificateConfigurationDNSCloudInternetServices', 'PublicCertificateConfigurationDNSClassicInfrastructure', 'IAMCredentialsConfiguration', 'PrivateCertificateConfigurationRootCA', 'PrivateCertificateConfigurationIntermediateCA', 'PrivateCertificateConfigurationTemplate']) ) raise Exception(msg) @@ -2815,11 +2809,7 @@ def from_dict(cls, _dict: Dict) -> 'Configuration': if disc_class != cls: return disc_class.from_dict(_dict) msg = "Cannot convert dictionary into an instance of base class 'Configuration'. The discriminator value should map to a valid subclass: {1}".format( - ", ".join(['PublicCertificateConfigurationCALetsEncrypt', - 'PublicCertificateConfigurationDNSCloudInternetServices', - 'PublicCertificateConfigurationDNSClassicInfrastructure', 'IAMCredentialsConfiguration', - 'PrivateCertificateConfigurationRootCA', 'PrivateCertificateConfigurationIntermediateCA', - 'PrivateCertificateConfigurationTemplate']) + ", ".join(['PublicCertificateConfigurationCALetsEncrypt', 'PublicCertificateConfigurationDNSCloudInternetServices', 'PublicCertificateConfigurationDNSClassicInfrastructure', 'IAMCredentialsConfiguration', 'PrivateCertificateConfigurationRootCA', 'PrivateCertificateConfigurationIntermediateCA', 'PrivateCertificateConfigurationTemplate']) ) raise Exception(msg) @@ -2831,10 +2821,8 @@ def _from_dict(cls, _dict: Dict): @classmethod def _get_class_by_discriminator(cls, _dict: Dict) -> object: mapping = {} - mapping[ - 'public_cert_configuration_dns_cloud_internet_services'] = 'PublicCertificateConfigurationDNSCloudInternetServices' - mapping[ - 'public_cert_configuration_dns_classic_infrastructure'] = 'PublicCertificateConfigurationDNSClassicInfrastructure' + mapping['public_cert_configuration_dns_cloud_internet_services'] = 'PublicCertificateConfigurationDNSCloudInternetServices' + mapping['public_cert_configuration_dns_classic_infrastructure'] = 'PublicCertificateConfigurationDNSClassicInfrastructure' mapping['public_cert_configuration_ca_lets_encrypt'] = 'PublicCertificateConfigurationCALetsEncrypt' mapping['iam_credentials_configuration'] = 'IAMCredentialsConfiguration' mapping['private_cert_configuration_root_ca'] = 'PrivateCertificateConfigurationRootCA' @@ -2860,17 +2848,14 @@ class ConfigurationAction: """ def __init__( - self, + self, ) -> None: """ Initialize a ConfigurationAction object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['PrivateCertificateConfigurationActionRevoke', 'PrivateCertificateConfigurationActionSignCSR', - 'PrivateCertificateConfigurationActionSignIntermediate', - 'PrivateCertificateConfigurationActionSetSigned', - 'PrivateCertificateConfigurationActionRotateCRL']) + ", ".join(['PrivateCertificateConfigurationActionRevoke', 'PrivateCertificateConfigurationActionSignCSR', 'PrivateCertificateConfigurationActionSignIntermediate', 'PrivateCertificateConfigurationActionSetSigned', 'PrivateCertificateConfigurationActionRotateCRL']) ) raise Exception(msg) @@ -2881,10 +2866,7 @@ def from_dict(cls, _dict: Dict) -> 'ConfigurationAction': if disc_class != cls: return disc_class.from_dict(_dict) msg = "Cannot convert dictionary into an instance of base class 'ConfigurationAction'. The discriminator value should map to a valid subclass: {1}".format( - ", ".join(['PrivateCertificateConfigurationActionRevoke', 'PrivateCertificateConfigurationActionSignCSR', - 'PrivateCertificateConfigurationActionSignIntermediate', - 'PrivateCertificateConfigurationActionSetSigned', - 'PrivateCertificateConfigurationActionRotateCRL']) + ", ".join(['PrivateCertificateConfigurationActionRevoke', 'PrivateCertificateConfigurationActionSignCSR', 'PrivateCertificateConfigurationActionSignIntermediate', 'PrivateCertificateConfigurationActionSetSigned', 'PrivateCertificateConfigurationActionRotateCRL']) ) raise Exception(msg) @@ -2896,11 +2878,9 @@ def _from_dict(cls, _dict: Dict): @classmethod def _get_class_by_discriminator(cls, _dict: Dict) -> object: mapping = {} - mapping[ - 'private_cert_configuration_action_revoke_ca_certificate'] = 'PrivateCertificateConfigurationActionRevoke' + mapping['private_cert_configuration_action_revoke_ca_certificate'] = 'PrivateCertificateConfigurationActionRevoke' mapping['private_cert_configuration_action_sign_csr'] = 'PrivateCertificateConfigurationActionSignCSR' - mapping[ - 'private_cert_configuration_action_sign_intermediate'] = 'PrivateCertificateConfigurationActionSignIntermediate' + mapping['private_cert_configuration_action_sign_intermediate'] = 'PrivateCertificateConfigurationActionSignIntermediate' mapping['private_cert_configuration_action_set_signed'] = 'PrivateCertificateConfigurationActionSetSigned' mapping['private_cert_configuration_action_rotate_crl'] = 'PrivateCertificateConfigurationActionRotateCRL' disc_value = _dict.get('action_type') @@ -2923,18 +2903,14 @@ class ConfigurationActionPrototype: """ def __init__( - self, + self, ) -> None: """ Initialize a ConfigurationActionPrototype object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['PrivateCertificateConfigurationActionRotateCRLPrototype', - 'PrivateCertificateConfigurationActionRevokePrototype', - 'PrivateCertificateConfigurationActionSignCSRPrototype', - 'PrivateCertificateConfigurationActionSignIntermediatePrototype', - 'PrivateCertificateConfigurationActionSetSignedPrototype']) + ", ".join(['PrivateCertificateConfigurationActionRotateCRLPrototype', 'PrivateCertificateConfigurationActionRevokePrototype', 'PrivateCertificateConfigurationActionSignCSRPrototype', 'PrivateCertificateConfigurationActionSignIntermediatePrototype', 'PrivateCertificateConfigurationActionSetSignedPrototype']) ) raise Exception(msg) @@ -2945,11 +2921,7 @@ def from_dict(cls, _dict: Dict) -> 'ConfigurationActionPrototype': if disc_class != cls: return disc_class.from_dict(_dict) msg = "Cannot convert dictionary into an instance of base class 'ConfigurationActionPrototype'. The discriminator value should map to a valid subclass: {1}".format( - ", ".join(['PrivateCertificateConfigurationActionRotateCRLPrototype', - 'PrivateCertificateConfigurationActionRevokePrototype', - 'PrivateCertificateConfigurationActionSignCSRPrototype', - 'PrivateCertificateConfigurationActionSignIntermediatePrototype', - 'PrivateCertificateConfigurationActionSetSignedPrototype']) + ", ".join(['PrivateCertificateConfigurationActionRotateCRLPrototype', 'PrivateCertificateConfigurationActionRevokePrototype', 'PrivateCertificateConfigurationActionSignCSRPrototype', 'PrivateCertificateConfigurationActionSignIntermediatePrototype', 'PrivateCertificateConfigurationActionSetSignedPrototype']) ) raise Exception(msg) @@ -2961,15 +2933,11 @@ def _from_dict(cls, _dict: Dict): @classmethod def _get_class_by_discriminator(cls, _dict: Dict) -> object: mapping = {} - mapping[ - 'private_cert_configuration_action_rotate_crl'] = 'PrivateCertificateConfigurationActionRotateCRLPrototype' - mapping[ - 'private_cert_configuration_action_revoke_ca_certificate'] = 'PrivateCertificateConfigurationActionRevokePrototype' + mapping['private_cert_configuration_action_rotate_crl'] = 'PrivateCertificateConfigurationActionRotateCRLPrototype' + mapping['private_cert_configuration_action_revoke_ca_certificate'] = 'PrivateCertificateConfigurationActionRevokePrototype' mapping['private_cert_configuration_action_sign_csr'] = 'PrivateCertificateConfigurationActionSignCSRPrototype' - mapping[ - 'private_cert_configuration_action_sign_intermediate'] = 'PrivateCertificateConfigurationActionSignIntermediatePrototype' - mapping[ - 'private_cert_configuration_action_set_signed'] = 'PrivateCertificateConfigurationActionSetSignedPrototype' + mapping['private_cert_configuration_action_sign_intermediate'] = 'PrivateCertificateConfigurationActionSignIntermediatePrototype' + mapping['private_cert_configuration_action_set_signed'] = 'PrivateCertificateConfigurationActionSetSignedPrototype' disc_value = _dict.get('action_type') if disc_value is None: raise ValueError('Discriminator property \'action_type\' not found in ConfigurationActionPrototype JSON') @@ -2990,19 +2958,14 @@ class ConfigurationMetadata: """ def __init__( - self, + self, ) -> None: """ Initialize a ConfigurationMetadata object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['IAMCredentialsConfigurationMetadata', 'PublicCertificateConfigurationCALetsEncryptMetadata', - 'PublicCertificateConfigurationDNSCloudInternetServicesMetadata', - 'PublicCertificateConfigurationDNSClassicInfrastructureMetadata', - 'PrivateCertificateConfigurationRootCAMetadata', - 'PrivateCertificateConfigurationIntermediateCAMetadata', - 'PrivateCertificateConfigurationTemplateMetadata']) + ", ".join(['IAMCredentialsConfigurationMetadata', 'PublicCertificateConfigurationCALetsEncryptMetadata', 'PublicCertificateConfigurationDNSCloudInternetServicesMetadata', 'PublicCertificateConfigurationDNSClassicInfrastructureMetadata', 'PrivateCertificateConfigurationRootCAMetadata', 'PrivateCertificateConfigurationIntermediateCAMetadata', 'PrivateCertificateConfigurationTemplateMetadata']) ) raise Exception(msg) @@ -3013,12 +2976,7 @@ def from_dict(cls, _dict: Dict) -> 'ConfigurationMetadata': if disc_class != cls: return disc_class.from_dict(_dict) msg = "Cannot convert dictionary into an instance of base class 'ConfigurationMetadata'. The discriminator value should map to a valid subclass: {1}".format( - ", ".join(['IAMCredentialsConfigurationMetadata', 'PublicCertificateConfigurationCALetsEncryptMetadata', - 'PublicCertificateConfigurationDNSCloudInternetServicesMetadata', - 'PublicCertificateConfigurationDNSClassicInfrastructureMetadata', - 'PrivateCertificateConfigurationRootCAMetadata', - 'PrivateCertificateConfigurationIntermediateCAMetadata', - 'PrivateCertificateConfigurationTemplateMetadata']) + ", ".join(['IAMCredentialsConfigurationMetadata', 'PublicCertificateConfigurationCALetsEncryptMetadata', 'PublicCertificateConfigurationDNSCloudInternetServicesMetadata', 'PublicCertificateConfigurationDNSClassicInfrastructureMetadata', 'PrivateCertificateConfigurationRootCAMetadata', 'PrivateCertificateConfigurationIntermediateCAMetadata', 'PrivateCertificateConfigurationTemplateMetadata']) ) raise Exception(msg) @@ -3030,10 +2988,8 @@ def _from_dict(cls, _dict: Dict): @classmethod def _get_class_by_discriminator(cls, _dict: Dict) -> object: mapping = {} - mapping[ - 'public_cert_configuration_dns_cloud_internet_services'] = 'PublicCertificateConfigurationDNSCloudInternetServicesMetadata' - mapping[ - 'public_cert_configuration_dns_classic_infrastructure'] = 'PublicCertificateConfigurationDNSClassicInfrastructureMetadata' + mapping['public_cert_configuration_dns_cloud_internet_services'] = 'PublicCertificateConfigurationDNSCloudInternetServicesMetadata' + mapping['public_cert_configuration_dns_classic_infrastructure'] = 'PublicCertificateConfigurationDNSClassicInfrastructureMetadata' mapping['public_cert_configuration_ca_lets_encrypt'] = 'PublicCertificateConfigurationCALetsEncryptMetadata' mapping['private_cert_configuration_root_ca'] = 'PrivateCertificateConfigurationRootCAMetadata' mapping['private_cert_configuration_intermediate_ca'] = 'PrivateCertificateConfigurationIntermediateCAMetadata' @@ -3072,16 +3028,16 @@ class ConfigurationMetadataPaginatedCollection: """ def __init__( - self, - total_count: int, - limit: int, - offset: int, - first: 'PaginatedCollectionFirst', - last: 'PaginatedCollectionLast', - configurations: List['ConfigurationMetadata'], - *, - next: Optional['PaginatedCollectionNext'] = None, - previous: Optional['PaginatedCollectionPrevious'] = None, + self, + total_count: int, + limit: int, + offset: int, + first: 'PaginatedCollectionFirst', + last: 'PaginatedCollectionLast', + configurations: List['ConfigurationMetadata'], + *, + next: Optional['PaginatedCollectionNext'] = None, + previous: Optional['PaginatedCollectionPrevious'] = None, ) -> None: """ Initialize a ConfigurationMetadataPaginatedCollection object. @@ -3116,8 +3072,7 @@ def from_dict(cls, _dict: Dict) -> 'ConfigurationMetadataPaginatedCollection': if (total_count := _dict.get('total_count')) is not None: args['total_count'] = total_count else: - raise ValueError( - 'Required property \'total_count\' not present in ConfigurationMetadataPaginatedCollection JSON') + raise ValueError('Required property \'total_count\' not present in ConfigurationMetadataPaginatedCollection JSON') if (limit := _dict.get('limit')) is not None: args['limit'] = limit else: @@ -3125,8 +3080,7 @@ def from_dict(cls, _dict: Dict) -> 'ConfigurationMetadataPaginatedCollection': if (offset := _dict.get('offset')) is not None: args['offset'] = offset else: - raise ValueError( - 'Required property \'offset\' not present in ConfigurationMetadataPaginatedCollection JSON') + raise ValueError('Required property \'offset\' not present in ConfigurationMetadataPaginatedCollection JSON') if (first := _dict.get('first')) is not None: args['first'] = PaginatedCollectionFirst.from_dict(first) else: @@ -3142,8 +3096,7 @@ def from_dict(cls, _dict: Dict) -> 'ConfigurationMetadataPaginatedCollection': if (configurations := _dict.get('configurations')) is not None: args['configurations'] = [ConfigurationMetadata.from_dict(v) for v in configurations] else: - raise ValueError( - 'Required property \'configurations\' not present in ConfigurationMetadataPaginatedCollection JSON') + raise ValueError('Required property \'configurations\' not present in ConfigurationMetadataPaginatedCollection JSON') return cls(**args) @classmethod @@ -3216,19 +3169,14 @@ class ConfigurationPatch: """ def __init__( - self, + self, ) -> None: """ Initialize a ConfigurationPatch object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['IAMCredentialsConfigurationPatch', 'PrivateCertificateConfigurationRootCAPatch', - 'PrivateCertificateConfigurationIntermediateCAPatch', - 'PrivateCertificateConfigurationTemplatePatch', - 'PublicCertificateConfigurationCALetsEncryptPatch', - 'PublicCertificateConfigurationDNSCloudInternetServicesPatch', - 'PublicCertificateConfigurationDNSClassicInfrastructurePatch']) + ", ".join(['IAMCredentialsConfigurationPatch', 'PrivateCertificateConfigurationRootCAPatch', 'PrivateCertificateConfigurationIntermediateCAPatch', 'PrivateCertificateConfigurationTemplatePatch', 'PublicCertificateConfigurationCALetsEncryptPatch', 'PublicCertificateConfigurationDNSCloudInternetServicesPatch', 'PublicCertificateConfigurationDNSClassicInfrastructurePatch']) ) raise Exception(msg) @@ -3240,19 +3188,14 @@ class ConfigurationPrototype: """ def __init__( - self, + self, ) -> None: """ Initialize a ConfigurationPrototype object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['PublicCertificateConfigurationDNSCloudInternetServicesPrototype', - 'PublicCertificateConfigurationDNSClassicInfrastructurePrototype', - 'PublicCertificateConfigurationCALetsEncryptPrototype', - 'PrivateCertificateConfigurationRootCAPrototype', - 'PrivateCertificateConfigurationIntermediateCAPrototype', - 'PrivateCertificateConfigurationTemplatePrototype', 'IAMCredentialsConfigurationPrototype']) + ", ".join(['PublicCertificateConfigurationDNSCloudInternetServicesPrototype', 'PublicCertificateConfigurationDNSClassicInfrastructurePrototype', 'PublicCertificateConfigurationCALetsEncryptPrototype', 'PrivateCertificateConfigurationRootCAPrototype', 'PrivateCertificateConfigurationIntermediateCAPrototype', 'PrivateCertificateConfigurationTemplatePrototype', 'IAMCredentialsConfigurationPrototype']) ) raise Exception(msg) @@ -3263,12 +3206,7 @@ def from_dict(cls, _dict: Dict) -> 'ConfigurationPrototype': if disc_class != cls: return disc_class.from_dict(_dict) msg = "Cannot convert dictionary into an instance of base class 'ConfigurationPrototype'. The discriminator value should map to a valid subclass: {1}".format( - ", ".join(['PublicCertificateConfigurationDNSCloudInternetServicesPrototype', - 'PublicCertificateConfigurationDNSClassicInfrastructurePrototype', - 'PublicCertificateConfigurationCALetsEncryptPrototype', - 'PrivateCertificateConfigurationRootCAPrototype', - 'PrivateCertificateConfigurationIntermediateCAPrototype', - 'PrivateCertificateConfigurationTemplatePrototype', 'IAMCredentialsConfigurationPrototype']) + ", ".join(['PublicCertificateConfigurationDNSCloudInternetServicesPrototype', 'PublicCertificateConfigurationDNSClassicInfrastructurePrototype', 'PublicCertificateConfigurationCALetsEncryptPrototype', 'PrivateCertificateConfigurationRootCAPrototype', 'PrivateCertificateConfigurationIntermediateCAPrototype', 'PrivateCertificateConfigurationTemplatePrototype', 'IAMCredentialsConfigurationPrototype']) ) raise Exception(msg) @@ -3280,10 +3218,8 @@ def _from_dict(cls, _dict: Dict): @classmethod def _get_class_by_discriminator(cls, _dict: Dict) -> object: mapping = {} - mapping[ - 'public_cert_configuration_dns_cloud_internet_services'] = 'PublicCertificateConfigurationDNSCloudInternetServicesPrototype' - mapping[ - 'public_cert_configuration_dns_classic_infrastructure'] = 'PublicCertificateConfigurationDNSClassicInfrastructurePrototype' + mapping['public_cert_configuration_dns_cloud_internet_services'] = 'PublicCertificateConfigurationDNSCloudInternetServicesPrototype' + mapping['public_cert_configuration_dns_classic_infrastructure'] = 'PublicCertificateConfigurationDNSClassicInfrastructurePrototype' mapping['public_cert_configuration_ca_lets_encrypt'] = 'PublicCertificateConfigurationCALetsEncryptPrototype' mapping['private_cert_configuration_root_ca'] = 'PrivateCertificateConfigurationRootCAPrototype' mapping['private_cert_configuration_intermediate_ca'] = 'PrivateCertificateConfigurationIntermediateCAPrototype' @@ -3311,8 +3247,8 @@ class NotificationsRegistration: """ def __init__( - self, - event_notifications_instance_crn: str, + self, + event_notifications_instance_crn: str, ) -> None: """ Initialize a NotificationsRegistration object. @@ -3329,8 +3265,7 @@ def from_dict(cls, _dict: Dict) -> 'NotificationsRegistration': if (event_notifications_instance_crn := _dict.get('event_notifications_instance_crn')) is not None: args['event_notifications_instance_crn'] = event_notifications_instance_crn else: - raise ValueError( - 'Required property \'event_notifications_instance_crn\' not present in NotificationsRegistration JSON') + raise ValueError('Required property \'event_notifications_instance_crn\' not present in NotificationsRegistration JSON') return cls(**args) @classmethod @@ -3372,8 +3307,8 @@ class PaginatedCollectionFirst: """ def __init__( - self, - href: str, + self, + href: str, ) -> None: """ Initialize a PaginatedCollectionFirst object. @@ -3431,8 +3366,8 @@ class PaginatedCollectionLast: """ def __init__( - self, - href: str, + self, + href: str, ) -> None: """ Initialize a PaginatedCollectionLast object. @@ -3490,8 +3425,8 @@ class PaginatedCollectionNext: """ def __init__( - self, - href: str, + self, + href: str, ) -> None: """ Initialize a PaginatedCollectionNext object. @@ -3549,8 +3484,8 @@ class PaginatedCollectionPrevious: """ def __init__( - self, - href: str, + self, + href: str, ) -> None: """ Initialize a PaginatedCollectionPrevious object. @@ -3614,12 +3549,12 @@ class PasswordGenerationPolicy: """ def __init__( - self, - *, - length: Optional[int] = None, - include_digits: Optional[bool] = None, - include_symbols: Optional[bool] = None, - include_uppercase: Optional[bool] = None, + self, + *, + length: Optional[int] = None, + include_digits: Optional[bool] = None, + include_symbols: Optional[bool] = None, + include_uppercase: Optional[bool] = None, ) -> None: """ Initialize a PasswordGenerationPolicy object. @@ -3703,12 +3638,12 @@ class PasswordGenerationPolicyPatch: """ def __init__( - self, - *, - length: Optional[int] = None, - include_digits: Optional[bool] = None, - include_symbols: Optional[bool] = None, - include_uppercase: Optional[bool] = None, + self, + *, + length: Optional[int] = None, + include_digits: Optional[bool] = None, + include_symbols: Optional[bool] = None, + include_uppercase: Optional[bool] = None, ) -> None: """ Initialize a PasswordGenerationPolicyPatch object. @@ -3791,12 +3726,12 @@ class PasswordGenerationPolicyRO: """ def __init__( - self, - *, - length: Optional[int] = None, - include_digits: Optional[bool] = None, - include_symbols: Optional[bool] = None, - include_uppercase: Optional[bool] = None, + self, + *, + length: Optional[int] = None, + include_digits: Optional[bool] = None, + include_symbols: Optional[bool] = None, + include_uppercase: Optional[bool] = None, ) -> None: """ Initialize a PasswordGenerationPolicyRO object. @@ -3872,15 +3807,14 @@ class PrivateCertificateCAData: """ def __init__( - self, + self, ) -> None: """ Initialize a PrivateCertificateCAData object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join( - ['PrivateCertificateConfigurationIntermediateCACSR', 'PrivateCertificateConfigurationCACertificate']) + ", ".join(['PrivateCertificateConfigurationIntermediateCACSR', 'PrivateCertificateConfigurationCACertificate']) ) raise Exception(msg) @@ -3904,12 +3838,12 @@ class PrivateCertificateCryptoKey: """ def __init__( - self, - provider: 'PrivateCertificateCryptoProvider', - *, - id: Optional[str] = None, - label: Optional[str] = None, - allow_generate_key: Optional[bool] = None, + self, + provider: 'PrivateCertificateCryptoProvider', + *, + id: Optional[str] = None, + label: Optional[str] = None, + allow_generate_key: Optional[bool] = None, ) -> None: """ Initialize a PrivateCertificateCryptoKey object. @@ -3997,7 +3931,7 @@ class PrivateCertificateCryptoProvider: """ def __init__( - self, + self, ) -> None: """ Initialize a PrivateCertificateCryptoProvider object. @@ -4052,9 +3986,9 @@ class PublicCertificateRotationObject: """ def __init__( - self, - *, - rotate_keys: Optional[bool] = None, + self, + *, + rotate_keys: Optional[bool] = None, ) -> None: """ Initialize a PublicCertificateRotationObject object. @@ -4113,7 +4047,7 @@ class RotationPolicy: """ def __init__( - self, + self, ) -> None: """ Initialize a RotationPolicy object. @@ -4132,16 +4066,14 @@ class Secret: """ def __init__( - self, + self, ) -> None: """ Initialize a Secret object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join( - ['ArbitrarySecret', 'IAMCredentialsSecret', 'ImportedCertificate', 'KVSecret', 'PrivateCertificate', - 'PublicCertificate', 'ServiceCredentialsSecret', 'UsernamePasswordSecret']) + ", ".join(['ArbitrarySecret', 'IAMCredentialsSecret', 'ImportedCertificate', 'KVSecret', 'PrivateCertificate', 'PublicCertificate', 'ServiceCredentialsSecret', 'UsernamePasswordSecret']) ) raise Exception(msg) @@ -4152,9 +4084,7 @@ def from_dict(cls, _dict: Dict) -> 'Secret': if disc_class != cls: return disc_class.from_dict(_dict) msg = "Cannot convert dictionary into an instance of base class 'Secret'. The discriminator value should map to a valid subclass: {1}".format( - ", ".join( - ['ArbitrarySecret', 'IAMCredentialsSecret', 'ImportedCertificate', 'KVSecret', 'PrivateCertificate', - 'PublicCertificate', 'ServiceCredentialsSecret', 'UsernamePasswordSecret']) + ", ".join(['ArbitrarySecret', 'IAMCredentialsSecret', 'ImportedCertificate', 'KVSecret', 'PrivateCertificate', 'PublicCertificate', 'ServiceCredentialsSecret', 'UsernamePasswordSecret']) ) raise Exception(msg) @@ -4194,7 +4124,7 @@ class SecretAction: """ def __init__( - self, + self, ) -> None: """ Initialize a SecretAction object. @@ -4246,7 +4176,7 @@ class SecretActionPrototype: """ def __init__( - self, + self, ) -> None: """ Initialize a SecretActionPrototype object. @@ -4309,14 +4239,14 @@ class SecretGroup: """ def __init__( - self, - id: str, - description: str, - created_at: datetime, - created_by: str, - updated_at: datetime, - *, - name: Optional[str] = None, + self, + id: str, + description: str, + created_at: datetime, + created_by: str, + updated_at: datetime, + *, + name: Optional[str] = None, ) -> None: """ Initialize a SecretGroup object. @@ -4417,9 +4347,9 @@ class SecretGroupCollection: """ def __init__( - self, - secret_groups: List['SecretGroup'], - total_count: int, + self, + secret_groups: List['SecretGroup'], + total_count: int, ) -> None: """ Initialize a SecretGroupCollection object. @@ -4494,10 +4424,10 @@ class SecretGroupPatch: """ def __init__( - self, - *, - name: Optional[str] = None, - description: Optional[str] = None, + self, + *, + name: Optional[str] = None, + description: Optional[str] = None, ) -> None: """ Initialize a SecretGroupPatch object. @@ -4582,18 +4512,18 @@ class SecretLock: """ def __init__( - self, - name: str, - created_at: datetime, - updated_at: datetime, - created_by: str, - secret_group_id: str, - secret_id: str, - secret_version_id: str, - secret_version_alias: str, - *, - description: Optional[str] = None, - attributes: Optional[dict] = None, + self, + name: str, + created_at: datetime, + updated_at: datetime, + created_by: str, + secret_group_id: str, + secret_id: str, + secret_version_id: str, + secret_version_alias: str, + *, + description: Optional[str] = None, + attributes: Optional[dict] = None, ) -> None: """ Initialize a SecretLock object. @@ -4732,6 +4662,7 @@ class SecretVersionAliasEnum(str, Enum): PREVIOUS = 'previous' + class SecretLockPrototype: """ SecretLockPrototype. @@ -4748,11 +4679,11 @@ class SecretLockPrototype: """ def __init__( - self, - name: str, - *, - description: Optional[str] = None, - attributes: Optional[dict] = None, + self, + name: str, + *, + description: Optional[str] = None, + attributes: Optional[dict] = None, ) -> None: """ Initialize a SecretLockPrototype object. @@ -4836,13 +4767,13 @@ class SecretLocks: """ def __init__( - self, - secret_id: str, - secret_group_id: str, - versions: List['SecretVersionLocks'], - *, - secret_type: Optional[str] = None, - secret_name: Optional[str] = None, + self, + secret_id: str, + secret_group_id: str, + versions: List['SecretVersionLocks'], + *, + secret_type: Optional[str] = None, + secret_name: Optional[str] = None, ) -> None: """ Initialize a SecretLocks object. @@ -4944,6 +4875,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class SecretLocksPaginatedCollection: """ Properties that describe a paginated collection of your secret locks. @@ -4963,16 +4895,16 @@ class SecretLocksPaginatedCollection: """ def __init__( - self, - total_count: int, - limit: int, - offset: int, - first: 'PaginatedCollectionFirst', - last: 'PaginatedCollectionLast', - locks: List['SecretLock'], - *, - next: Optional['PaginatedCollectionNext'] = None, - previous: Optional['PaginatedCollectionPrevious'] = None, + self, + total_count: int, + limit: int, + offset: int, + first: 'PaginatedCollectionFirst', + last: 'PaginatedCollectionLast', + locks: List['SecretLock'], + *, + next: Optional['PaginatedCollectionNext'] = None, + previous: Optional['PaginatedCollectionPrevious'] = None, ) -> None: """ Initialize a SecretLocksPaginatedCollection object. @@ -5103,16 +5035,14 @@ class SecretMetadata: """ def __init__( - self, + self, ) -> None: """ Initialize a SecretMetadata object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['ArbitrarySecretMetadata', 'IAMCredentialsSecretMetadata', 'ImportedCertificateMetadata', - 'KVSecretMetadata', 'PrivateCertificateMetadata', 'PublicCertificateMetadata', - 'ServiceCredentialsSecretMetadata', 'UsernamePasswordSecretMetadata']) + ", ".join(['ArbitrarySecretMetadata', 'IAMCredentialsSecretMetadata', 'ImportedCertificateMetadata', 'KVSecretMetadata', 'PrivateCertificateMetadata', 'PublicCertificateMetadata', 'ServiceCredentialsSecretMetadata', 'UsernamePasswordSecretMetadata']) ) raise Exception(msg) @@ -5123,9 +5053,7 @@ def from_dict(cls, _dict: Dict) -> 'SecretMetadata': if disc_class != cls: return disc_class.from_dict(_dict) msg = "Cannot convert dictionary into an instance of base class 'SecretMetadata'. The discriminator value should map to a valid subclass: {1}".format( - ", ".join(['ArbitrarySecretMetadata', 'IAMCredentialsSecretMetadata', 'ImportedCertificateMetadata', - 'KVSecretMetadata', 'PrivateCertificateMetadata', 'PublicCertificateMetadata', - 'ServiceCredentialsSecretMetadata', 'UsernamePasswordSecretMetadata']) + ", ".join(['ArbitrarySecretMetadata', 'IAMCredentialsSecretMetadata', 'ImportedCertificateMetadata', 'KVSecretMetadata', 'PrivateCertificateMetadata', 'PublicCertificateMetadata', 'ServiceCredentialsSecretMetadata', 'UsernamePasswordSecretMetadata']) ) raise Exception(msg) @@ -5177,16 +5105,16 @@ class SecretMetadataPaginatedCollection: """ def __init__( - self, - total_count: int, - limit: int, - offset: int, - first: 'PaginatedCollectionFirst', - last: 'PaginatedCollectionLast', - secrets: List['SecretMetadata'], - *, - next: Optional['PaginatedCollectionNext'] = None, - previous: Optional['PaginatedCollectionPrevious'] = None, + self, + total_count: int, + limit: int, + offset: int, + first: 'PaginatedCollectionFirst', + last: 'PaginatedCollectionLast', + secrets: List['SecretMetadata'], + *, + next: Optional['PaginatedCollectionNext'] = None, + previous: Optional['PaginatedCollectionPrevious'] = None, ) -> None: """ Initialize a SecretMetadataPaginatedCollection object. @@ -5317,17 +5245,14 @@ class SecretMetadataPatch: """ def __init__( - self, + self, ) -> None: """ Initialize a SecretMetadataPatch object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['ArbitrarySecretMetadataPatch', 'IAMCredentialsSecretMetadataPatch', - 'ImportedCertificateMetadataPatch', 'KVSecretMetadataPatch', 'PrivateCertificateMetadataPatch', - 'PublicCertificateMetadataPatch', 'ServiceCredentialsSecretMetadataPatch', - 'UsernamePasswordSecretMetadataPatch']) + ", ".join(['ArbitrarySecretMetadataPatch', 'IAMCredentialsSecretMetadataPatch', 'ImportedCertificateMetadataPatch', 'KVSecretMetadataPatch', 'PrivateCertificateMetadataPatch', 'PublicCertificateMetadataPatch', 'ServiceCredentialsSecretMetadataPatch', 'UsernamePasswordSecretMetadataPatch']) ) raise Exception(msg) @@ -5339,16 +5264,14 @@ class SecretPrototype: """ def __init__( - self, + self, ) -> None: """ Initialize a SecretPrototype object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['ArbitrarySecretPrototype', 'IAMCredentialsSecretPrototype', 'ImportedCertificatePrototype', - 'KVSecretPrototype', 'PrivateCertificatePrototype', 'PublicCertificatePrototype', - 'ServiceCredentialsSecretPrototype', 'UsernamePasswordSecretPrototype']) + ", ".join(['ArbitrarySecretPrototype', 'IAMCredentialsSecretPrototype', 'ImportedCertificatePrototype', 'KVSecretPrototype', 'PrivateCertificatePrototype', 'PublicCertificatePrototype', 'ServiceCredentialsSecretPrototype', 'UsernamePasswordSecretPrototype']) ) raise Exception(msg) @@ -5359,9 +5282,7 @@ def from_dict(cls, _dict: Dict) -> 'SecretPrototype': if disc_class != cls: return disc_class.from_dict(_dict) msg = "Cannot convert dictionary into an instance of base class 'SecretPrototype'. The discriminator value should map to a valid subclass: {1}".format( - ", ".join(['ArbitrarySecretPrototype', 'IAMCredentialsSecretPrototype', 'ImportedCertificatePrototype', - 'KVSecretPrototype', 'PrivateCertificatePrototype', 'PublicCertificatePrototype', - 'ServiceCredentialsSecretPrototype', 'UsernamePasswordSecretPrototype']) + ", ".join(['ArbitrarySecretPrototype', 'IAMCredentialsSecretPrototype', 'ImportedCertificatePrototype', 'KVSecretPrototype', 'PrivateCertificatePrototype', 'PublicCertificatePrototype', 'ServiceCredentialsSecretPrototype', 'UsernamePasswordSecretPrototype']) ) raise Exception(msg) @@ -5401,16 +5322,14 @@ class SecretVersion: """ def __init__( - self, + self, ) -> None: """ Initialize a SecretVersion object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['ArbitrarySecretVersion', 'IAMCredentialsSecretVersion', 'ImportedCertificateVersion', - 'KVSecretVersion', 'PrivateCertificateVersion', 'PublicCertificateVersion', - 'ServiceCredentialsSecretVersion', 'UsernamePasswordSecretVersion']) + ", ".join(['ArbitrarySecretVersion', 'IAMCredentialsSecretVersion', 'ImportedCertificateVersion', 'KVSecretVersion', 'PrivateCertificateVersion', 'PublicCertificateVersion', 'ServiceCredentialsSecretVersion', 'UsernamePasswordSecretVersion']) ) raise Exception(msg) @@ -5421,9 +5340,7 @@ def from_dict(cls, _dict: Dict) -> 'SecretVersion': if disc_class != cls: return disc_class.from_dict(_dict) msg = "Cannot convert dictionary into an instance of base class 'SecretVersion'. The discriminator value should map to a valid subclass: {1}".format( - ", ".join(['ArbitrarySecretVersion', 'IAMCredentialsSecretVersion', 'ImportedCertificateVersion', - 'KVSecretVersion', 'PrivateCertificateVersion', 'PublicCertificateVersion', - 'ServiceCredentialsSecretVersion', 'UsernamePasswordSecretVersion']) + ", ".join(['ArbitrarySecretVersion', 'IAMCredentialsSecretVersion', 'ImportedCertificateVersion', 'KVSecretVersion', 'PrivateCertificateVersion', 'PublicCertificateVersion', 'ServiceCredentialsSecretVersion', 'UsernamePasswordSecretVersion']) ) raise Exception(msg) @@ -5463,7 +5380,7 @@ class SecretVersionActionPrototype: """ def __init__( - self, + self, ) -> None: """ Initialize a SecretVersionActionPrototype object. @@ -5522,12 +5439,12 @@ class SecretVersionLocks: """ def __init__( - self, - version_id: str, - version_alias: str, - locks: List[str], - *, - payload_available: Optional[bool] = None, + self, + version_id: str, + version_alias: str, + locks: List[str], + *, + payload_available: Optional[bool] = None, ) -> None: """ Initialize a SecretVersionLocks object. @@ -5612,6 +5529,7 @@ class VersionAliasEnum(str, Enum): PREVIOUS = 'previous' + class SecretVersionLocksPaginatedCollection: """ Properties that describe a paginated collection of your secret version locks. @@ -5631,16 +5549,16 @@ class SecretVersionLocksPaginatedCollection: """ def __init__( - self, - total_count: int, - limit: int, - offset: int, - first: 'PaginatedCollectionFirst', - last: 'PaginatedCollectionLast', - locks: List['SecretLock'], - *, - next: Optional['PaginatedCollectionNext'] = None, - previous: Optional['PaginatedCollectionPrevious'] = None, + self, + total_count: int, + limit: int, + offset: int, + first: 'PaginatedCollectionFirst', + last: 'PaginatedCollectionLast', + locks: List['SecretLock'], + *, + next: Optional['PaginatedCollectionNext'] = None, + previous: Optional['PaginatedCollectionPrevious'] = None, ) -> None: """ Initialize a SecretVersionLocksPaginatedCollection object. @@ -5674,8 +5592,7 @@ def from_dict(cls, _dict: Dict) -> 'SecretVersionLocksPaginatedCollection': if (total_count := _dict.get('total_count')) is not None: args['total_count'] = total_count else: - raise ValueError( - 'Required property \'total_count\' not present in SecretVersionLocksPaginatedCollection JSON') + raise ValueError('Required property \'total_count\' not present in SecretVersionLocksPaginatedCollection JSON') if (limit := _dict.get('limit')) is not None: args['limit'] = limit else: @@ -5772,17 +5689,14 @@ class SecretVersionMetadata: """ def __init__( - self, + self, ) -> None: """ Initialize a SecretVersionMetadata object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['ArbitrarySecretVersionMetadata', 'IAMCredentialsSecretVersionMetadata', - 'ImportedCertificateVersionMetadata', 'KVSecretVersionMetadata', - 'PrivateCertificateVersionMetadata', 'PublicCertificateVersionMetadata', - 'ServiceCredentialsSecretVersionMetadata', 'UsernamePasswordSecretVersionMetadata']) + ", ".join(['ArbitrarySecretVersionMetadata', 'IAMCredentialsSecretVersionMetadata', 'ImportedCertificateVersionMetadata', 'KVSecretVersionMetadata', 'PrivateCertificateVersionMetadata', 'PublicCertificateVersionMetadata', 'ServiceCredentialsSecretVersionMetadata', 'UsernamePasswordSecretVersionMetadata']) ) raise Exception(msg) @@ -5793,10 +5707,7 @@ def from_dict(cls, _dict: Dict) -> 'SecretVersionMetadata': if disc_class != cls: return disc_class.from_dict(_dict) msg = "Cannot convert dictionary into an instance of base class 'SecretVersionMetadata'. The discriminator value should map to a valid subclass: {1}".format( - ", ".join(['ArbitrarySecretVersionMetadata', 'IAMCredentialsSecretVersionMetadata', - 'ImportedCertificateVersionMetadata', 'KVSecretVersionMetadata', - 'PrivateCertificateVersionMetadata', 'PublicCertificateVersionMetadata', - 'ServiceCredentialsSecretVersionMetadata', 'UsernamePasswordSecretVersionMetadata']) + ", ".join(['ArbitrarySecretVersionMetadata', 'IAMCredentialsSecretVersionMetadata', 'ImportedCertificateVersionMetadata', 'KVSecretVersionMetadata', 'PrivateCertificateVersionMetadata', 'PublicCertificateVersionMetadata', 'ServiceCredentialsSecretVersionMetadata', 'UsernamePasswordSecretVersionMetadata']) ) raise Exception(msg) @@ -5839,9 +5750,9 @@ class SecretVersionMetadataCollection: """ def __init__( - self, - versions: List['SecretVersionMetadata'], - total_count: int, + self, + versions: List['SecretVersionMetadata'], + total_count: int, ) -> None: """ Initialize a SecretVersionMetadataCollection object. @@ -5915,9 +5826,9 @@ class SecretVersionMetadataPatch: """ def __init__( - self, - *, - version_custom_metadata: Optional[dict] = None, + self, + *, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a SecretVersionMetadataPatch object. @@ -5973,18 +5884,14 @@ class SecretVersionPrototype: """ def __init__( - self, + self, ) -> None: """ Initialize a SecretVersionPrototype object. """ msg = "Cannot instantiate base class. Instead, instantiate one of the defined subclasses: {0}".format( - ", ".join(['ArbitrarySecretVersionPrototype', 'IAMCredentialsSecretRestoreFromVersionPrototype', - 'IAMCredentialsSecretVersionPrototype', 'ImportedCertificateVersionPrototype', - 'KVSecretVersionPrototype', 'PrivateCertificateVersionPrototype', - 'PublicCertificateVersionPrototype', 'ServiceCredentialsSecretVersionPrototype', - 'UsernamePasswordSecretVersionPrototype']) + ", ".join(['ArbitrarySecretVersionPrototype', 'IAMCredentialsSecretRestoreFromVersionPrototype', 'IAMCredentialsSecretVersionPrototype', 'ImportedCertificateVersionPrototype', 'KVSecretVersionPrototype', 'PrivateCertificateVersionPrototype', 'PublicCertificateVersionPrototype', 'ServiceCredentialsSecretVersionPrototype', 'UsernamePasswordSecretVersionPrototype']) ) raise Exception(msg) @@ -6008,16 +5915,16 @@ class SecretsLocksPaginatedCollection: """ def __init__( - self, - total_count: int, - limit: int, - offset: int, - first: 'PaginatedCollectionFirst', - last: 'PaginatedCollectionLast', - secrets_locks: List['SecretLocks'], - *, - next: Optional['PaginatedCollectionNext'] = None, - previous: Optional['PaginatedCollectionPrevious'] = None, + self, + total_count: int, + limit: int, + offset: int, + first: 'PaginatedCollectionFirst', + last: 'PaginatedCollectionLast', + secrets_locks: List['SecretLocks'], + *, + next: Optional['PaginatedCollectionNext'] = None, + previous: Optional['PaginatedCollectionPrevious'] = None, ) -> None: """ Initialize a SecretsLocksPaginatedCollection object. @@ -6153,10 +6060,10 @@ class ServiceCredentialsResourceKey: """ def __init__( - self, - *, - crn: Optional[str] = None, - name: Optional[str] = None, + self, + *, + crn: Optional[str] = None, + name: Optional[str] = None, ) -> None: """ Initialize a ServiceCredentialsResourceKey object. @@ -6230,19 +6137,18 @@ class ServiceCredentialsSecretCredentials: """ # The set of defined properties for the class - _properties = frozenset( - ['apikey', 'iam_apikey_description', 'iam_apikey_id', 'iam_apikey_name', 'iam_role_crn', 'iam_serviceid_crn']) + _properties = frozenset(['apikey', 'iam_apikey_description', 'iam_apikey_id', 'iam_apikey_name', 'iam_role_crn', 'iam_serviceid_crn']) def __init__( - self, - *, - apikey: Optional[str] = None, - iam_apikey_description: Optional[str] = None, - iam_apikey_id: Optional[str] = None, - iam_apikey_name: Optional[str] = None, - iam_role_crn: Optional[str] = None, - iam_serviceid_crn: Optional[str] = None, - **kwargs: Optional[object], + self, + *, + apikey: Optional[str] = None, + iam_apikey_description: Optional[str] = None, + iam_apikey_id: Optional[str] = None, + iam_apikey_name: Optional[str] = None, + iam_role_crn: Optional[str] = None, + iam_serviceid_crn: Optional[str] = None, + **kwargs: Optional[object], ) -> None: """ Initialize a ServiceCredentialsSecretCredentials object. @@ -6281,9 +6187,9 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretCredentials': args['iam_serviceid_crn'] = iam_serviceid_crn for k, v in _dict.items(): if k not in cls._properties: - if not isinstance(v, object): - raise ValueError('Value for additional property {} must be of type object'.format(k)) - args[k] = v + if not isinstance(v, object): + raise ValueError('Value for additional property {} must be of type object'.format(k)) + args[k] = v return cls(**args) @classmethod @@ -6370,11 +6276,11 @@ class ServiceCredentialsSecretSourceService: """ def __init__( - self, - instance: 'ServiceCredentialsSourceServiceInstance', - *, - parameters: Optional['ServiceCredentialsSourceServiceParameters'] = None, - role: Optional['ServiceCredentialsSourceServiceRole'] = None, + self, + instance: 'ServiceCredentialsSourceServiceInstance', + *, + parameters: Optional['ServiceCredentialsSourceServiceParameters'] = None, + role: Optional['ServiceCredentialsSourceServiceRole'] = None, ) -> None: """ Initialize a ServiceCredentialsSecretSourceService object. @@ -6481,13 +6387,13 @@ class ServiceCredentialsSecretSourceServiceRO: """ def __init__( - self, - instance: 'ServiceCredentialsSourceServiceInstance', - *, - parameters: Optional['ServiceCredentialsSourceServiceParameters'] = None, - role: Optional['ServiceCredentialsSourceServiceRole'] = None, - iam: Optional['ServiceCredentialsSourceServiceIam'] = None, - resource_key: Optional['ServiceCredentialsResourceKey'] = None, + self, + instance: 'ServiceCredentialsSourceServiceInstance', + *, + parameters: Optional['ServiceCredentialsSourceServiceParameters'] = None, + role: Optional['ServiceCredentialsSourceServiceRole'] = None, + iam: Optional['ServiceCredentialsSourceServiceIam'] = None, + resource_key: Optional['ServiceCredentialsResourceKey'] = None, ) -> None: """ Initialize a ServiceCredentialsSecretSourceServiceRO object. @@ -6525,8 +6431,7 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretSourceServiceRO': if (instance := _dict.get('instance')) is not None: args['instance'] = ServiceCredentialsSourceServiceInstance.from_dict(instance) else: - raise ValueError( - 'Required property \'instance\' not present in ServiceCredentialsSecretSourceServiceRO JSON') + raise ValueError('Required property \'instance\' not present in ServiceCredentialsSecretSourceServiceRO JSON') if (parameters := _dict.get('parameters')) is not None: args['parameters'] = ServiceCredentialsSourceServiceParameters.from_dict(parameters) if (role := _dict.get('role')) is not None: @@ -6605,11 +6510,11 @@ class ServiceCredentialsSourceServiceIam: """ def __init__( - self, - *, - apikey: Optional['ServiceCredentialsSourceServiceIamApikey'] = None, - role: Optional['ServiceCredentialsSourceServiceIamRole'] = None, - serviceid: Optional['ServiceCredentialsSourceServiceIamServiceid'] = None, + self, + *, + apikey: Optional['ServiceCredentialsSourceServiceIamApikey'] = None, + role: Optional['ServiceCredentialsSourceServiceIamRole'] = None, + serviceid: Optional['ServiceCredentialsSourceServiceIamServiceid'] = None, ) -> None: """ Initialize a ServiceCredentialsSourceServiceIam object. @@ -6694,11 +6599,11 @@ class ServiceCredentialsSourceServiceIamApikey: """ def __init__( - self, - *, - description: Optional[str] = None, - id: Optional[str] = None, - name: Optional[str] = None, + self, + *, + description: Optional[str] = None, + id: Optional[str] = None, + name: Optional[str] = None, ) -> None: """ Initialize a ServiceCredentialsSourceServiceIamApikey object. @@ -6764,9 +6669,9 @@ class ServiceCredentialsSourceServiceIamRole: """ def __init__( - self, - *, - crn: Optional[str] = None, + self, + *, + crn: Optional[str] = None, ) -> None: """ Initialize a ServiceCredentialsSourceServiceIamRole object. @@ -6821,9 +6726,9 @@ class ServiceCredentialsSourceServiceIamServiceid: """ def __init__( - self, - *, - crn: Optional[str] = None, + self, + *, + crn: Optional[str] = None, ) -> None: """ Initialize a ServiceCredentialsSourceServiceIamServiceid object. @@ -6879,9 +6784,9 @@ class ServiceCredentialsSourceServiceInstance: """ def __init__( - self, - *, - crn: Optional[str] = None, + self, + *, + crn: Optional[str] = None, ) -> None: """ Initialize a ServiceCredentialsSourceServiceInstance object. @@ -6946,10 +6851,10 @@ class ServiceCredentialsSourceServiceParameters: _properties = frozenset(['serviceid_crn']) def __init__( - self, - *, - serviceid_crn: Optional[str] = None, - **kwargs: Optional[object], + self, + *, + serviceid_crn: Optional[str] = None, + **kwargs: Optional[object], ) -> None: """ Initialize a ServiceCredentialsSourceServiceParameters object. @@ -6975,9 +6880,9 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSourceServiceParameters': args['serviceid_crn'] = serviceid_crn for k, v in _dict.items(): if k not in cls._properties: - if not isinstance(v, object): - raise ValueError('Value for additional property {} must be of type object'.format(k)) - args[k] = v + if not isinstance(v, object): + raise ValueError('Value for additional property {} must be of type object'.format(k)) + args[k] = v return cls(**args) @classmethod @@ -7045,8 +6950,8 @@ class ServiceCredentialsSourceServiceRole: """ def __init__( - self, - crn: str, + self, + crn: str, ) -> None: """ Initialize a ServiceCredentialsSourceServiceRole object. @@ -7103,7 +7008,7 @@ class VersionAction: """ def __init__( - self, + self, ) -> None: """ Initialize a VersionAction object. @@ -7194,27 +7099,27 @@ class ArbitrarySecret(Secret): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - expiration_date: Optional[datetime] = None, - payload: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + expiration_date: Optional[datetime] = None, + payload: Optional[str] = None, ) -> None: """ Initialize a ArbitrarySecret object. @@ -7411,6 +7316,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -7423,6 +7329,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class ArbitrarySecretMetadata(SecretMetadata): """ Properties of the metadata of your arbitrary secret.. @@ -7468,26 +7375,26 @@ class ArbitrarySecretMetadata(SecretMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a ArbitrarySecretMetadata object. @@ -7677,6 +7584,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -7689,6 +7597,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class ArbitrarySecretMetadataPatch(SecretMetadataPatch): """ ArbitrarySecretMetadataPatch. @@ -7712,13 +7621,13 @@ class ArbitrarySecretMetadataPatch(SecretMetadataPatch): """ def __init__( - self, - *, - name: Optional[str] = None, - description: Optional[str] = None, - labels: Optional[List[str]] = None, - custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, + self, + *, + name: Optional[str] = None, + description: Optional[str] = None, + labels: Optional[List[str]] = None, + custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a ArbitrarySecretMetadataPatch object. @@ -7833,17 +7742,17 @@ class ArbitrarySecretPrototype(SecretPrototype): """ def __init__( - self, - name: str, - secret_type: str, - payload: str, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - expiration_date: Optional[datetime] = None, - labels: Optional[List[str]] = None, - secret_group_id: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, + self, + name: str, + secret_type: str, + payload: str, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + expiration_date: Optional[datetime] = None, + labels: Optional[List[str]] = None, + secret_group_id: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a ArbitrarySecretPrototype object. @@ -7977,6 +7886,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class ArbitrarySecretVersion(SecretVersion): """ Your arbitrary secret version. @@ -8012,22 +7922,22 @@ class ArbitrarySecretVersion(SecretVersion): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, - payload: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, + payload: Optional[str] = None, ) -> None: """ Initialize a ArbitrarySecretVersion object. @@ -8193,6 +8103,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -8203,6 +8114,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class ArbitrarySecretVersionMetadata(SecretVersionMetadata): """ Properties of the version metadata of your arbitrary secret. @@ -8236,21 +8148,21 @@ class ArbitrarySecretVersionMetadata(SecretVersionMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a ArbitrarySecretVersionMetadata object. @@ -8327,8 +8239,7 @@ def from_dict(cls, _dict: Dict) -> 'ArbitrarySecretVersionMetadata': if (payload_available := _dict.get('payload_available')) is not None: args['payload_available'] = payload_available else: - raise ValueError( - 'Required property \'payload_available\' not present in ArbitrarySecretVersionMetadata JSON') + raise ValueError('Required property \'payload_available\' not present in ArbitrarySecretVersionMetadata JSON') if (alias := _dict.get('alias')) is not None: args['alias'] = alias if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -8410,6 +8321,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -8420,6 +8332,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class ArbitrarySecretVersionPrototype(SecretVersionPrototype): """ ArbitrarySecretVersionPrototype. @@ -8432,11 +8345,11 @@ class ArbitrarySecretVersionPrototype(SecretVersionPrototype): """ def __init__( - self, - payload: str, - *, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + payload: str, + *, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a ArbitrarySecretVersionPrototype object. @@ -8515,11 +8428,11 @@ class CommonRotationPolicy(RotationPolicy): """ def __init__( - self, - auto_rotate: bool, - *, - interval: Optional[int] = None, - unit: Optional[str] = None, + self, + auto_rotate: bool, + *, + interval: Optional[int] = None, + unit: Optional[str] = None, ) -> None: """ Initialize a CommonRotationPolicy object. @@ -8595,6 +8508,7 @@ class UnitEnum(str, Enum): MONTH = 'month' + class IAMCredentialsConfiguration(Configuration): """ Properties that describe a Classic Infrastructure DNS configuration. @@ -8615,6 +8529,8 @@ class IAMCredentialsConfiguration(Configuration): format follows `RFC 3339`. :param datetime updated_at: The date when a resource was modified. The date format follows `RFC 3339`. + :param bool disabled: (optional) This parameter indicates whether the API key + configuration is disabled. :param str api_key: (optional) An IBM Cloud API key that can create and manage service IDs. The API key must be assigned the Editor platform role on the Access Groups Service and the Operator platform role on the IAM Identity Service. For @@ -8623,15 +8539,16 @@ class IAMCredentialsConfiguration(Configuration): """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - *, - api_key: Optional[str] = None, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + *, + disabled: Optional[bool] = None, + api_key: Optional[str] = None, ) -> None: """ Initialize a IAMCredentialsConfiguration object. @@ -8653,6 +8570,8 @@ def __init__( date format follows `RFC 3339`. :param datetime updated_at: The date when a resource was modified. The date format follows `RFC 3339`. + :param bool disabled: (optional) This parameter indicates whether the API + key configuration is disabled. """ # pylint: disable=super-init-not-called self.config_type = config_type @@ -8661,6 +8580,7 @@ def __init__( self.created_by = created_by self.created_at = created_at self.updated_at = updated_at + self.disabled = disabled self.api_key = api_key @classmethod @@ -8691,6 +8611,8 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsConfiguration': args['updated_at'] = string_to_datetime(updated_at) else: raise ValueError('Required property \'updated_at\' not present in IAMCredentialsConfiguration JSON') + if (disabled := _dict.get('disabled')) is not None: + args['disabled'] = disabled if (api_key := _dict.get('api_key')) is not None: args['api_key'] = api_key return cls(**args) @@ -8715,6 +8637,8 @@ def to_dict(self) -> Dict: _dict['created_at'] = datetime_to_string(self.created_at) if hasattr(self, 'updated_at') and self.updated_at is not None: _dict['updated_at'] = datetime_to_string(self.updated_at) + if hasattr(self, 'disabled') and self.disabled is not None: + _dict['disabled'] = self.disabled if hasattr(self, 'api_key') and getattr(self, 'api_key') is not None: _dict['api_key'] = getattr(self, 'api_key') return _dict @@ -8755,6 +8679,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -8771,6 +8696,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class IAMCredentialsConfigurationMetadata(ConfigurationMetadata): """ Your IAMCredentials Configuration metadata properties. @@ -8791,16 +8717,20 @@ class IAMCredentialsConfigurationMetadata(ConfigurationMetadata): format follows `RFC 3339`. :param datetime updated_at: The date when a resource was modified. The date format follows `RFC 3339`. + :param bool disabled: (optional) This parameter indicates whether the API key + configuration is disabled. """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + *, + disabled: Optional[bool] = None, ) -> None: """ Initialize a IAMCredentialsConfigurationMetadata object. @@ -8822,6 +8752,8 @@ def __init__( date format follows `RFC 3339`. :param datetime updated_at: The date when a resource was modified. The date format follows `RFC 3339`. + :param bool disabled: (optional) This parameter indicates whether the API + key configuration is disabled. """ # pylint: disable=super-init-not-called self.config_type = config_type @@ -8830,6 +8762,7 @@ def __init__( self.created_by = created_by self.created_at = created_at self.updated_at = updated_at + self.disabled = disabled @classmethod def from_dict(cls, _dict: Dict) -> 'IAMCredentialsConfigurationMetadata': @@ -8838,8 +8771,7 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsConfigurationMetadata': if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in IAMCredentialsConfigurationMetadata JSON') + raise ValueError('Required property \'config_type\' not present in IAMCredentialsConfigurationMetadata JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: @@ -8847,8 +8779,7 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsConfigurationMetadata': if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in IAMCredentialsConfigurationMetadata JSON') + raise ValueError('Required property \'secret_type\' not present in IAMCredentialsConfigurationMetadata JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: @@ -8861,6 +8792,8 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsConfigurationMetadata': args['updated_at'] = string_to_datetime(updated_at) else: raise ValueError('Required property \'updated_at\' not present in IAMCredentialsConfigurationMetadata JSON') + if (disabled := _dict.get('disabled')) is not None: + args['disabled'] = disabled return cls(**args) @classmethod @@ -8883,6 +8816,8 @@ def to_dict(self) -> Dict: _dict['created_at'] = datetime_to_string(self.created_at) if hasattr(self, 'updated_at') and self.updated_at is not None: _dict['updated_at'] = datetime_to_string(self.updated_at) + if hasattr(self, 'disabled') and self.disabled is not None: + _dict['disabled'] = self.disabled return _dict def _to_dict(self): @@ -8921,6 +8856,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -8937,32 +8873,44 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class IAMCredentialsConfigurationPatch(ConfigurationPatch): """ The configuration update of the IAM Credentials engine. - :param str api_key: An IBM Cloud API key that can create and manage service IDs. - The API key must be assigned the Editor platform role on the Access Groups - Service and the Operator platform role on the IAM Identity Service. For more - information, see the + :param str api_key: (optional) An IBM Cloud API key that can create and manage + service IDs. The API key must be assigned the Editor platform role on the Access + Groups Service and the Operator platform role on the IAM Identity Service. For + more information, see the [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-configure-iam-engine). + :param bool disabled: (optional) This parameter indicates whether the API key + configuration is disabled. + If it is set to `disabled`, the IAM credentials engine doesn't use the + configured API key for credentials management. """ def __init__( - self, - api_key: str, + self, + *, + api_key: Optional[str] = None, + disabled: Optional[bool] = None, ) -> None: """ Initialize a IAMCredentialsConfigurationPatch object. - :param str api_key: An IBM Cloud API key that can create and manage service - IDs. The API key must be assigned the Editor platform role on the Access - Groups Service and the Operator platform role on the IAM Identity Service. - For more information, see the + :param str api_key: (optional) An IBM Cloud API key that can create and + manage service IDs. The API key must be assigned the Editor platform role + on the Access Groups Service and the Operator platform role on the IAM + Identity Service. For more information, see the [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-configure-iam-engine). + :param bool disabled: (optional) This parameter indicates whether the API + key configuration is disabled. + If it is set to `disabled`, the IAM credentials engine doesn't use the + configured API key for credentials management. """ # pylint: disable=super-init-not-called self.api_key = api_key + self.disabled = disabled @classmethod def from_dict(cls, _dict: Dict) -> 'IAMCredentialsConfigurationPatch': @@ -8970,8 +8918,8 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsConfigurationPatch': args = {} if (api_key := _dict.get('api_key')) is not None: args['api_key'] = api_key - else: - raise ValueError('Required property \'api_key\' not present in IAMCredentialsConfigurationPatch JSON') + if (disabled := _dict.get('disabled')) is not None: + args['disabled'] = disabled return cls(**args) @classmethod @@ -8984,6 +8932,8 @@ def to_dict(self) -> Dict: _dict = {} if hasattr(self, 'api_key') and self.api_key is not None: _dict['api_key'] = self.api_key + if hasattr(self, 'disabled') and self.disabled is not None: + _dict['disabled'] = self.disabled return _dict def _to_dict(self): @@ -9019,13 +8969,19 @@ class IAMCredentialsConfigurationPrototype(ConfigurationPrototype): private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. :param str api_key: The API key that is used to set the iam_credentials engine. + :param bool disabled: (optional) This parameter indicates whether the API key + configuration is disabled. + If it is set to `true`, the IAM credentials engine doesn't use the configured + API key for credentials management. """ def __init__( - self, - name: str, - config_type: str, - api_key: str, + self, + name: str, + config_type: str, + api_key: str, + *, + disabled: Optional[bool] = None, ) -> None: """ Initialize a IAMCredentialsConfigurationPrototype object. @@ -9043,11 +8999,16 @@ def __init__( private_cert_configuration_template. :param str api_key: The API key that is used to set the iam_credentials engine. + :param bool disabled: (optional) This parameter indicates whether the API + key configuration is disabled. + If it is set to `true`, the IAM credentials engine doesn't use the + configured API key for credentials management. """ # pylint: disable=super-init-not-called self.name = name self.config_type = config_type self.api_key = api_key + self.disabled = disabled @classmethod def from_dict(cls, _dict: Dict) -> 'IAMCredentialsConfigurationPrototype': @@ -9060,12 +9021,13 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsConfigurationPrototype': if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in IAMCredentialsConfigurationPrototype JSON') + raise ValueError('Required property \'config_type\' not present in IAMCredentialsConfigurationPrototype JSON') if (api_key := _dict.get('api_key')) is not None: args['api_key'] = api_key else: raise ValueError('Required property \'api_key\' not present in IAMCredentialsConfigurationPrototype JSON') + if (disabled := _dict.get('disabled')) is not None: + args['disabled'] = disabled return cls(**args) @classmethod @@ -9082,6 +9044,8 @@ def to_dict(self) -> Dict: _dict['config_type'] = self.config_type if hasattr(self, 'api_key') and self.api_key is not None: _dict['api_key'] = self.api_key + if hasattr(self, 'disabled') and self.disabled is not None: + _dict['disabled'] = self.disabled return _dict def _to_dict(self): @@ -9121,6 +9085,7 @@ class ConfigTypeEnum(str, Enum): IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class IAMCredentialsSecret(Secret): """ Your IAM credentials secret. @@ -9183,6 +9148,10 @@ class IAMCredentialsSecret(Secret): to manage its access directly or retain the service ID after your secret expires, is rotated, or deleted. If you provide a service ID, do not include the `access_groups` parameter. + :param str account_id: (optional) The ID of the account in which the IAM + credentials are created. Use this field only if the target account is not the + same as the account of the Secrets Manager instance. Otherwise, the field can be + omitted. :param bool service_id_is_static: (optional) Indicates whether an `iam_credentials` secret was created with a static service ID. If it is set to `true`, the service ID for the secret was provided by the user @@ -9212,35 +9181,36 @@ class IAMCredentialsSecret(Secret): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - ttl: str, - reuse_api_key: bool, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - access_groups: Optional[List[str]] = None, - api_key_id: Optional[str] = None, - service_id: Optional[str] = None, - service_id_is_static: Optional[bool] = None, - rotation: Optional['RotationPolicy'] = None, - next_rotation_date: Optional[datetime] = None, - expiration_date: Optional[datetime] = None, - api_key: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + ttl: str, + reuse_api_key: bool, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + access_groups: Optional[List[str]] = None, + api_key_id: Optional[str] = None, + service_id: Optional[str] = None, + account_id: Optional[str] = None, + service_id_is_static: Optional[bool] = None, + rotation: Optional['RotationPolicy'] = None, + next_rotation_date: Optional[datetime] = None, + expiration_date: Optional[datetime] = None, + api_key: Optional[str] = None, ) -> None: """ Initialize a IAMCredentialsSecret object. @@ -9297,6 +9267,10 @@ def __init__( prefer to manage its access directly or retain the service ID after your secret expires, is rotated, or deleted. If you provide a service ID, do not include the `access_groups` parameter. + :param str account_id: (optional) The ID of the account in which the IAM + credentials are created. Use this field only if the target account is not + the same as the account of the Secrets Manager instance. Otherwise, the + field can be omitted. :param RotationPolicy rotation: (optional) This field indicates whether Secrets Manager rotates your secrets automatically. Supported secret types: username_password, private_cert, public_cert, iam_credentials. @@ -9326,6 +9300,7 @@ def __init__( self.access_groups = access_groups self.api_key_id = api_key_id self.service_id = service_id + self.account_id = account_id self.service_id_is_static = service_id_is_static self.reuse_api_key = reuse_api_key self.rotation = rotation @@ -9397,6 +9372,8 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsSecret': args['api_key_id'] = api_key_id if (service_id := _dict.get('service_id')) is not None: args['service_id'] = service_id + if (account_id := _dict.get('account_id')) is not None: + args['account_id'] = account_id if (service_id_is_static := _dict.get('service_id_is_static')) is not None: args['service_id_is_static'] = service_id_is_static if (reuse_api_key := _dict.get('reuse_api_key')) is not None: @@ -9463,6 +9440,8 @@ def to_dict(self) -> Dict: _dict['api_key_id'] = getattr(self, 'api_key_id') if hasattr(self, 'service_id') and self.service_id is not None: _dict['service_id'] = self.service_id + if hasattr(self, 'account_id') and self.account_id is not None: + _dict['account_id'] = self.account_id if hasattr(self, 'service_id_is_static') and getattr(self, 'service_id_is_static') is not None: _dict['service_id_is_static'] = getattr(self, 'service_id_is_static') if hasattr(self, 'reuse_api_key') and self.reuse_api_key is not None: @@ -9513,6 +9492,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -9525,6 +9505,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class IAMCredentialsSecretMetadata(SecretMetadata): """ Properties of the metadata of your IAM credentials secret. @@ -9587,6 +9568,10 @@ class IAMCredentialsSecretMetadata(SecretMetadata): to manage its access directly or retain the service ID after your secret expires, is rotated, or deleted. If you provide a service ID, do not include the `access_groups` parameter. + :param str account_id: (optional) The ID of the account in which the IAM + credentials are created. Use this field only if the target account is not the + same as the account of the Secrets Manager instance. Otherwise, the field can be + omitted. :param bool service_id_is_static: (optional) Indicates whether an `iam_credentials` secret was created with a static service ID. If it is set to `true`, the service ID for the secret was provided by the user @@ -9611,34 +9596,35 @@ class IAMCredentialsSecretMetadata(SecretMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - ttl: str, - reuse_api_key: bool, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - access_groups: Optional[List[str]] = None, - api_key_id: Optional[str] = None, - service_id: Optional[str] = None, - service_id_is_static: Optional[bool] = None, - rotation: Optional['RotationPolicy'] = None, - next_rotation_date: Optional[datetime] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + ttl: str, + reuse_api_key: bool, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + access_groups: Optional[List[str]] = None, + api_key_id: Optional[str] = None, + service_id: Optional[str] = None, + account_id: Optional[str] = None, + service_id_is_static: Optional[bool] = None, + rotation: Optional['RotationPolicy'] = None, + next_rotation_date: Optional[datetime] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a IAMCredentialsSecretMetadata object. @@ -9695,6 +9681,10 @@ def __init__( prefer to manage its access directly or retain the service ID after your secret expires, is rotated, or deleted. If you provide a service ID, do not include the `access_groups` parameter. + :param str account_id: (optional) The ID of the account in which the IAM + credentials are created. Use this field only if the target account is not + the same as the account of the Secrets Manager instance. Otherwise, the + field can be omitted. :param RotationPolicy rotation: (optional) This field indicates whether Secrets Manager rotates your secrets automatically. Supported secret types: username_password, private_cert, public_cert, iam_credentials. @@ -9724,6 +9714,7 @@ def __init__( self.access_groups = access_groups self.api_key_id = api_key_id self.service_id = service_id + self.account_id = account_id self.service_id_is_static = service_id_is_static self.reuse_api_key = reuse_api_key self.rotation = rotation @@ -9794,6 +9785,8 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsSecretMetadata': args['api_key_id'] = api_key_id if (service_id := _dict.get('service_id')) is not None: args['service_id'] = service_id + if (account_id := _dict.get('account_id')) is not None: + args['account_id'] = account_id if (service_id_is_static := _dict.get('service_id_is_static')) is not None: args['service_id_is_static'] = service_id_is_static if (reuse_api_key := _dict.get('reuse_api_key')) is not None: @@ -9858,6 +9851,8 @@ def to_dict(self) -> Dict: _dict['api_key_id'] = getattr(self, 'api_key_id') if hasattr(self, 'service_id') and self.service_id is not None: _dict['service_id'] = self.service_id + if hasattr(self, 'account_id') and self.account_id is not None: + _dict['account_id'] = self.account_id if hasattr(self, 'service_id_is_static') and getattr(self, 'service_id_is_static') is not None: _dict['service_id_is_static'] = getattr(self, 'service_id_is_static') if hasattr(self, 'reuse_api_key') and self.reuse_api_key is not None: @@ -9906,6 +9901,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -9918,6 +9914,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class IAMCredentialsSecretMetadataPatch(SecretMetadataPatch): """ IAMCredentialsSecretMetadataPatch. @@ -9951,14 +9948,14 @@ class IAMCredentialsSecretMetadataPatch(SecretMetadataPatch): """ def __init__( - self, - *, - name: Optional[str] = None, - description: Optional[str] = None, - labels: Optional[List[str]] = None, - custom_metadata: Optional[dict] = None, - ttl: Optional[str] = None, - rotation: Optional['RotationPolicy'] = None, + self, + *, + name: Optional[str] = None, + description: Optional[str] = None, + labels: Optional[List[str]] = None, + custom_metadata: Optional[dict] = None, + ttl: Optional[str] = None, + rotation: Optional['RotationPolicy'] = None, ) -> None: """ Initialize a IAMCredentialsSecretMetadataPatch object. @@ -10102,6 +10099,10 @@ class IAMCredentialsSecretPrototype(SecretPrototype): to manage its access directly or retain the service ID after your secret expires, is rotated, or deleted. If you provide a service ID, do not include the `access_groups` parameter. + :param str account_id: (optional) The ID of the account in which the IAM + credentials are created. Use this field only if the target account is not the + same as the account of the Secrets Manager instance. Otherwise, the field can be + omitted. :param bool reuse_api_key: (IAM credentials) This parameter indicates whether to reuse the service ID and API key for future read operations. If it is set to `true`, the service reuses the current credentials. If it is set @@ -10117,20 +10118,21 @@ class IAMCredentialsSecretPrototype(SecretPrototype): """ def __init__( - self, - secret_type: str, - name: str, - ttl: str, - reuse_api_key: bool, - *, - description: Optional[str] = None, - secret_group_id: Optional[str] = None, - labels: Optional[List[str]] = None, - access_groups: Optional[List[str]] = None, - service_id: Optional[str] = None, - rotation: Optional['RotationPolicy'] = None, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + secret_type: str, + name: str, + ttl: str, + reuse_api_key: bool, + *, + description: Optional[str] = None, + secret_group_id: Optional[str] = None, + labels: Optional[List[str]] = None, + access_groups: Optional[List[str]] = None, + service_id: Optional[str] = None, + account_id: Optional[str] = None, + rotation: Optional['RotationPolicy'] = None, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a IAMCredentialsSecretPrototype object. @@ -10179,6 +10181,10 @@ def __init__( prefer to manage its access directly or retain the service ID after your secret expires, is rotated, or deleted. If you provide a service ID, do not include the `access_groups` parameter. + :param str account_id: (optional) The ID of the account in which the IAM + credentials are created. Use this field only if the target account is not + the same as the account of the Secrets Manager instance. Otherwise, the + field can be omitted. :param RotationPolicy rotation: (optional) This field indicates whether Secrets Manager rotates your secrets automatically. Supported secret types: username_password, private_cert, public_cert, iam_credentials. @@ -10196,6 +10202,7 @@ def __init__( self.ttl = ttl self.access_groups = access_groups self.service_id = service_id + self.account_id = account_id self.reuse_api_key = reuse_api_key self.rotation = rotation self.custom_metadata = custom_metadata @@ -10227,6 +10234,8 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsSecretPrototype': args['access_groups'] = access_groups if (service_id := _dict.get('service_id')) is not None: args['service_id'] = service_id + if (account_id := _dict.get('account_id')) is not None: + args['account_id'] = account_id if (reuse_api_key := _dict.get('reuse_api_key')) is not None: args['reuse_api_key'] = reuse_api_key else: @@ -10263,6 +10272,8 @@ def to_dict(self) -> Dict: _dict['access_groups'] = self.access_groups if hasattr(self, 'service_id') and self.service_id is not None: _dict['service_id'] = self.service_id + if hasattr(self, 'account_id') and self.account_id is not None: + _dict['account_id'] = self.account_id if hasattr(self, 'reuse_api_key') and self.reuse_api_key is not None: _dict['reuse_api_key'] = self.reuse_api_key if hasattr(self, 'rotation') and self.rotation is not None: @@ -10310,6 +10321,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class IAMCredentialsSecretRestoreFromVersionPrototype(SecretVersionPrototype): """ IAMCredentialsSecretRestoreFromVersionPrototype. @@ -10323,11 +10335,11 @@ class IAMCredentialsSecretRestoreFromVersionPrototype(SecretVersionPrototype): """ def __init__( - self, - restore_from_version: str, - *, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + restore_from_version: str, + *, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a IAMCredentialsSecretRestoreFromVersionPrototype object. @@ -10351,8 +10363,7 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsSecretRestoreFromVersionProtot if (restore_from_version := _dict.get('restore_from_version')) is not None: args['restore_from_version'] = restore_from_version else: - raise ValueError( - 'Required property \'restore_from_version\' not present in IAMCredentialsSecretRestoreFromVersionPrototype JSON') + raise ValueError('Required property \'restore_from_version\' not present in IAMCredentialsSecretRestoreFromVersionPrototype JSON') if (custom_metadata := _dict.get('custom_metadata')) is not None: args['custom_metadata'] = custom_metadata if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -10442,24 +10453,24 @@ class IAMCredentialsSecretVersion(SecretVersion): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, - api_key_id: Optional[str] = None, - service_id: Optional[str] = None, - api_key: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, + api_key_id: Optional[str] = None, + service_id: Optional[str] = None, + api_key: Optional[str] = None, ) -> None: """ Initialize a IAMCredentialsSecretVersion object. @@ -10642,6 +10653,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -10652,6 +10664,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class IAMCredentialsSecretVersionMetadata(SecretVersionMetadata): """ Properties of the version metadata of your IAM credentials secret. @@ -10695,23 +10708,23 @@ class IAMCredentialsSecretVersionMetadata(SecretVersionMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, - api_key_id: Optional[str] = None, - service_id: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, + api_key_id: Optional[str] = None, + service_id: Optional[str] = None, ) -> None: """ Initialize a IAMCredentialsSecretVersionMetadata object. @@ -10791,18 +10804,15 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsSecretVersionMetadata': if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in IAMCredentialsSecretVersionMetadata JSON') + raise ValueError('Required property \'secret_type\' not present in IAMCredentialsSecretVersionMetadata JSON') if (secret_group_id := _dict.get('secret_group_id')) is not None: args['secret_group_id'] = secret_group_id else: - raise ValueError( - 'Required property \'secret_group_id\' not present in IAMCredentialsSecretVersionMetadata JSON') + raise ValueError('Required property \'secret_group_id\' not present in IAMCredentialsSecretVersionMetadata JSON') if (payload_available := _dict.get('payload_available')) is not None: args['payload_available'] = payload_available else: - raise ValueError( - 'Required property \'payload_available\' not present in IAMCredentialsSecretVersionMetadata JSON') + raise ValueError('Required property \'payload_available\' not present in IAMCredentialsSecretVersionMetadata JSON') if (alias := _dict.get('alias')) is not None: args['alias'] = alias if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -10892,6 +10902,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -10902,6 +10913,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class IAMCredentialsSecretVersionPrototype(SecretVersionPrototype): """ IAMCredentialsSecretVersionPrototype. @@ -10913,10 +10925,10 @@ class IAMCredentialsSecretVersionPrototype(SecretVersionPrototype): """ def __init__( - self, - *, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + *, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a IAMCredentialsSecretVersionPrototype object. @@ -11046,38 +11058,38 @@ class ImportedCertificate(Secret): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - signing_algorithm: str, - expiration_date: datetime, - intermediate_included: bool, - issuer: str, - private_key_included: bool, - serial_number: str, - validity: 'CertificateValidity', - certificate: str, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - alt_names: Optional[List[str]] = None, - common_name: Optional[str] = None, - key_algorithm: Optional[str] = None, - intermediate: Optional[str] = None, - private_key: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + signing_algorithm: str, + expiration_date: datetime, + intermediate_included: bool, + issuer: str, + private_key_included: bool, + serial_number: str, + validity: 'CertificateValidity', + certificate: str, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + alt_names: Optional[List[str]] = None, + common_name: Optional[str] = None, + key_algorithm: Optional[str] = None, + intermediate: Optional[str] = None, + private_key: Optional[str] = None, ) -> None: """ Initialize a ImportedCertificate object. @@ -11372,6 +11384,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -11384,6 +11397,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class ImportedCertificateMetadata(SecretMetadata): """ Properties of the secret metadata of your imported certificate. @@ -11449,35 +11463,35 @@ class ImportedCertificateMetadata(SecretMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - signing_algorithm: str, - expiration_date: datetime, - intermediate_included: bool, - issuer: str, - private_key_included: bool, - serial_number: str, - validity: 'CertificateValidity', - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - alt_names: Optional[List[str]] = None, - common_name: Optional[str] = None, - key_algorithm: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + signing_algorithm: str, + expiration_date: datetime, + intermediate_included: bool, + issuer: str, + private_key_included: bool, + serial_number: str, + validity: 'CertificateValidity', + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + alt_names: Optional[List[str]] = None, + common_name: Optional[str] = None, + key_algorithm: Optional[str] = None, ) -> None: """ Initialize a ImportedCertificateMetadata object. @@ -11626,8 +11640,7 @@ def from_dict(cls, _dict: Dict) -> 'ImportedCertificateMetadata': if (intermediate_included := _dict.get('intermediate_included')) is not None: args['intermediate_included'] = intermediate_included else: - raise ValueError( - 'Required property \'intermediate_included\' not present in ImportedCertificateMetadata JSON') + raise ValueError('Required property \'intermediate_included\' not present in ImportedCertificateMetadata JSON') if (issuer := _dict.get('issuer')) is not None: args['issuer'] = issuer else: @@ -11637,8 +11650,7 @@ def from_dict(cls, _dict: Dict) -> 'ImportedCertificateMetadata': if (private_key_included := _dict.get('private_key_included')) is not None: args['private_key_included'] = private_key_included else: - raise ValueError( - 'Required property \'private_key_included\' not present in ImportedCertificateMetadata JSON') + raise ValueError('Required property \'private_key_included\' not present in ImportedCertificateMetadata JSON') if (serial_number := _dict.get('serial_number')) is not None: args['serial_number'] = serial_number else: @@ -11749,6 +11761,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -11761,6 +11774,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class ImportedCertificateMetadataPatch(SecretMetadataPatch): """ ImportedCertificateMetadataPatch. @@ -11781,12 +11795,12 @@ class ImportedCertificateMetadataPatch(SecretMetadataPatch): """ def __init__( - self, - *, - name: Optional[str] = None, - description: Optional[str] = None, - labels: Optional[List[str]] = None, - custom_metadata: Optional[dict] = None, + self, + *, + name: Optional[str] = None, + description: Optional[str] = None, + labels: Optional[List[str]] = None, + custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a ImportedCertificateMetadataPatch object. @@ -11897,18 +11911,18 @@ class ImportedCertificatePrototype(SecretPrototype): """ def __init__( - self, - secret_type: str, - name: str, - certificate: str, - *, - description: Optional[str] = None, - secret_group_id: Optional[str] = None, - labels: Optional[List[str]] = None, - intermediate: Optional[str] = None, - private_key: Optional[str] = None, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + secret_type: str, + name: str, + certificate: str, + *, + description: Optional[str] = None, + secret_group_id: Optional[str] = None, + labels: Optional[List[str]] = None, + intermediate: Optional[str] = None, + private_key: Optional[str] = None, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a ImportedCertificatePrototype object. @@ -12050,6 +12064,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class ImportedCertificateVersion(SecretVersion): """ Versions of your imported certificate. @@ -12095,26 +12110,26 @@ class ImportedCertificateVersion(SecretVersion): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - serial_number: str, - validity: 'CertificateValidity', - certificate: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, - intermediate: Optional[str] = None, - private_key: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + serial_number: str, + validity: 'CertificateValidity', + certificate: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, + intermediate: Optional[str] = None, + private_key: Optional[str] = None, ) -> None: """ Initialize a ImportedCertificateVersion object. @@ -12319,6 +12334,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -12329,6 +12345,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class ImportedCertificateVersionMetadata(SecretVersionMetadata): """ Properties of the version metadata of your imported certificate. @@ -12366,23 +12383,23 @@ class ImportedCertificateVersionMetadata(SecretVersionMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - serial_number: str, - validity: 'CertificateValidity', - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + serial_number: str, + validity: 'CertificateValidity', + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a ImportedCertificateVersionMetadata object. @@ -12461,13 +12478,11 @@ def from_dict(cls, _dict: Dict) -> 'ImportedCertificateVersionMetadata': if (secret_group_id := _dict.get('secret_group_id')) is not None: args['secret_group_id'] = secret_group_id else: - raise ValueError( - 'Required property \'secret_group_id\' not present in ImportedCertificateVersionMetadata JSON') + raise ValueError('Required property \'secret_group_id\' not present in ImportedCertificateVersionMetadata JSON') if (payload_available := _dict.get('payload_available')) is not None: args['payload_available'] = payload_available else: - raise ValueError( - 'Required property \'payload_available\' not present in ImportedCertificateVersionMetadata JSON') + raise ValueError('Required property \'payload_available\' not present in ImportedCertificateVersionMetadata JSON') if (alias := _dict.get('alias')) is not None: args['alias'] = alias if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -12481,8 +12496,7 @@ def from_dict(cls, _dict: Dict) -> 'ImportedCertificateVersionMetadata': if (serial_number := _dict.get('serial_number')) is not None: args['serial_number'] = serial_number else: - raise ValueError( - 'Required property \'serial_number\' not present in ImportedCertificateVersionMetadata JSON') + raise ValueError('Required property \'serial_number\' not present in ImportedCertificateVersionMetadata JSON') if (validity := _dict.get('validity')) is not None: args['validity'] = CertificateValidity.from_dict(validity) else: @@ -12565,6 +12579,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -12575,6 +12590,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class ImportedCertificateVersionPrototype(SecretVersionPrototype): """ ImportedCertificateVersionPrototype. @@ -12594,13 +12610,13 @@ class ImportedCertificateVersionPrototype(SecretVersionPrototype): """ def __init__( - self, - certificate: str, - *, - intermediate: Optional[str] = None, - private_key: Optional[str] = None, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + certificate: str, + *, + intermediate: Optional[str] = None, + private_key: Optional[str] = None, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a ImportedCertificateVersionPrototype object. @@ -12632,8 +12648,7 @@ def from_dict(cls, _dict: Dict) -> 'ImportedCertificateVersionPrototype': if (certificate := _dict.get('certificate')) is not None: args['certificate'] = certificate else: - raise ValueError( - 'Required property \'certificate\' not present in ImportedCertificateVersionPrototype JSON') + raise ValueError('Required property \'certificate\' not present in ImportedCertificateVersionPrototype JSON') if (intermediate := _dict.get('intermediate')) is not None: args['intermediate'] = intermediate if (private_key := _dict.get('private_key')) is not None: @@ -12726,26 +12741,26 @@ class KVSecret(Secret): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - data: dict, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + data: dict, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, ) -> None: """ Initialize a KVSecret object. @@ -12935,6 +12950,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -12947,6 +12963,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class KVSecretMetadata(SecretMetadata): """ Properties of the metadata of your key-value secret metadata. @@ -12989,25 +13006,25 @@ class KVSecretMetadata(SecretMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, ) -> None: """ Initialize a KVSecretMetadata object. @@ -13189,6 +13206,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -13201,6 +13219,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class KVSecretMetadataPatch(SecretMetadataPatch): """ KVSecretMetadataPatch. @@ -13221,12 +13240,12 @@ class KVSecretMetadataPatch(SecretMetadataPatch): """ def __init__( - self, - *, - name: Optional[str] = None, - description: Optional[str] = None, - labels: Optional[List[str]] = None, - custom_metadata: Optional[dict] = None, + self, + *, + name: Optional[str] = None, + description: Optional[str] = None, + labels: Optional[List[str]] = None, + custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a KVSecretMetadataPatch object. @@ -13330,16 +13349,16 @@ class KVSecretPrototype(SecretPrototype): """ def __init__( - self, - secret_type: str, - name: str, - data: dict, - *, - description: Optional[str] = None, - secret_group_id: Optional[str] = None, - labels: Optional[List[str]] = None, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + secret_type: str, + name: str, + data: dict, + *, + description: Optional[str] = None, + secret_group_id: Optional[str] = None, + labels: Optional[List[str]] = None, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a KVSecretPrototype object. @@ -13464,6 +13483,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class KVSecretVersion(SecretVersion): """ Your key-value secret version. @@ -13498,22 +13518,22 @@ class KVSecretVersion(SecretVersion): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - data: dict, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + data: dict, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a KVSecretVersion object. @@ -13680,6 +13700,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -13690,6 +13711,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class KVSecretVersionMetadata(SecretVersionMetadata): """ Properties of the version metadata of your key-value secret. @@ -13723,21 +13745,21 @@ class KVSecretVersionMetadata(SecretVersionMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a KVSecretVersionMetadata object. @@ -13896,6 +13918,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -13906,6 +13929,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class KVSecretVersionPrototype(SecretVersionPrototype): """ KVSecretVersionPrototype. @@ -13918,11 +13942,11 @@ class KVSecretVersionPrototype(SecretVersionPrototype): """ def __init__( - self, - data: dict, - *, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + data: dict, + *, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a KVSecretVersionPrototype object. @@ -14072,43 +14096,43 @@ class PrivateCertificate(Secret): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - signing_algorithm: str, - certificate_template: str, - common_name: str, - expiration_date: datetime, - issuer: str, - serial_number: str, - validity: 'CertificateValidity', - certificate: str, - private_key: str, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - alt_names: Optional[List[str]] = None, - certificate_authority: Optional[str] = None, - key_algorithm: Optional[str] = None, - next_rotation_date: Optional[datetime] = None, - rotation: Optional['RotationPolicy'] = None, - revocation_time_seconds: Optional[int] = None, - revocation_time_rfc3339: Optional[datetime] = None, - issuing_ca: Optional[str] = None, - ca_chain: Optional[List[str]] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + signing_algorithm: str, + certificate_template: str, + common_name: str, + expiration_date: datetime, + issuer: str, + serial_number: str, + validity: 'CertificateValidity', + certificate: str, + private_key: str, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + alt_names: Optional[List[str]] = None, + certificate_authority: Optional[str] = None, + key_algorithm: Optional[str] = None, + next_rotation_date: Optional[datetime] = None, + rotation: Optional['RotationPolicy'] = None, + revocation_time_seconds: Optional[int] = None, + revocation_time_rfc3339: Optional[datetime] = None, + issuing_ca: Optional[str] = None, + ca_chain: Optional[List[str]] = None, ) -> None: """ Initialize a PrivateCertificate object. @@ -14430,6 +14454,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -14442,6 +14467,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class PrivateCertificateActionRevoke(SecretAction): """ The response body of the action to revoke the private certificate. @@ -14452,10 +14478,10 @@ class PrivateCertificateActionRevoke(SecretAction): """ def __init__( - self, - action_type: str, - *, - revocation_time_seconds: Optional[int] = None, + self, + action_type: str, + *, + revocation_time_seconds: Optional[int] = None, ) -> None: """ Initialize a PrivateCertificateActionRevoke object. @@ -14519,6 +14545,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_ACTION_REVOKE_CERTIFICATE = 'private_cert_action_revoke_certificate' + class PrivateCertificateActionRevokePrototype(SecretActionPrototype): """ The request body to specify the properties of the action to revoke the private @@ -14528,8 +14555,8 @@ class PrivateCertificateActionRevokePrototype(SecretActionPrototype): """ def __init__( - self, - action_type: str, + self, + action_type: str, ) -> None: """ Initialize a PrivateCertificateActionRevokePrototype object. @@ -14546,8 +14573,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateActionRevokePrototype': if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateActionRevokePrototype JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateActionRevokePrototype JSON') return cls(**args) @classmethod @@ -14589,6 +14615,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_ACTION_REVOKE_CERTIFICATE = 'private_cert_action_revoke_certificate' + class PrivateCertificateConfigurationActionRevoke(ConfigurationAction): """ The response body to specify the properties of the action to revoke the private @@ -14600,10 +14627,10 @@ class PrivateCertificateConfigurationActionRevoke(ConfigurationAction): """ def __init__( - self, - action_type: str, - *, - revocation_time_seconds: Optional[int] = None, + self, + action_type: str, + *, + revocation_time_seconds: Optional[int] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationActionRevoke object. @@ -14621,8 +14648,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationActionRevoke' if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateConfigurationActionRevoke JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateConfigurationActionRevoke JSON') if (revocation_time_seconds := _dict.get('revocation_time_seconds')) is not None: args['revocation_time_seconds'] = revocation_time_seconds return cls(**args) @@ -14671,6 +14697,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = 'private_cert_configuration_action_revoke_ca_certificate' + class PrivateCertificateConfigurationActionRevokePrototype(ConfigurationActionPrototype): """ The request body to specify the properties of the action to revoke the private @@ -14680,8 +14707,8 @@ class PrivateCertificateConfigurationActionRevokePrototype(ConfigurationActionPr """ def __init__( - self, - action_type: str, + self, + action_type: str, ) -> None: """ Initialize a PrivateCertificateConfigurationActionRevokePrototype object. @@ -14698,8 +14725,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationActionRevokeP if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateConfigurationActionRevokePrototype JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateConfigurationActionRevokePrototype JSON') return cls(**args) @classmethod @@ -14744,6 +14770,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = 'private_cert_configuration_action_revoke_ca_certificate' + class PrivateCertificateConfigurationActionRotateCRL(ConfigurationAction): """ The response body of the action to rotate the CRL of an intermediate certificate @@ -14755,9 +14782,9 @@ class PrivateCertificateConfigurationActionRotateCRL(ConfigurationAction): """ def __init__( - self, - action_type: str, - success: bool, + self, + action_type: str, + success: bool, ) -> None: """ Initialize a PrivateCertificateConfigurationActionRotateCRL object. @@ -14777,13 +14804,11 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationActionRotateC if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateConfigurationActionRotateCRL JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateConfigurationActionRotateCRL JSON') if (success := _dict.get('success')) is not None: args['success'] = success else: - raise ValueError( - 'Required property \'success\' not present in PrivateCertificateConfigurationActionRotateCRL JSON') + raise ValueError('Required property \'success\' not present in PrivateCertificateConfigurationActionRotateCRL JSON') return cls(**args) @classmethod @@ -14830,6 +14855,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = 'private_cert_configuration_action_revoke_ca_certificate' + class PrivateCertificateConfigurationActionRotateCRLPrototype(ConfigurationActionPrototype): """ The request body of the action to rotate the CRL of an intermediate certificate @@ -14839,8 +14865,8 @@ class PrivateCertificateConfigurationActionRotateCRLPrototype(ConfigurationActio """ def __init__( - self, - action_type: str, + self, + action_type: str, ) -> None: """ Initialize a PrivateCertificateConfigurationActionRotateCRLPrototype object. @@ -14857,8 +14883,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationActionRotateC if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateConfigurationActionRotateCRLPrototype JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateConfigurationActionRotateCRLPrototype JSON') return cls(**args) @classmethod @@ -14903,6 +14928,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = 'private_cert_configuration_action_revoke_ca_certificate' + class PrivateCertificateConfigurationActionSetSigned(ConfigurationAction): """ The response body of the action to set a signed intermediate certificate authority for @@ -14914,9 +14940,9 @@ class PrivateCertificateConfigurationActionSetSigned(ConfigurationAction): """ def __init__( - self, - action_type: str, - certificate: str, + self, + action_type: str, + certificate: str, ) -> None: """ Initialize a PrivateCertificateConfigurationActionSetSigned object. @@ -14936,13 +14962,11 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationActionSetSign if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateConfigurationActionSetSigned JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateConfigurationActionSetSigned JSON') if (certificate := _dict.get('certificate')) is not None: args['certificate'] = certificate else: - raise ValueError( - 'Required property \'certificate\' not present in PrivateCertificateConfigurationActionSetSigned JSON') + raise ValueError('Required property \'certificate\' not present in PrivateCertificateConfigurationActionSetSigned JSON') return cls(**args) @classmethod @@ -14989,6 +15013,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = 'private_cert_configuration_action_revoke_ca_certificate' + class PrivateCertificateConfigurationActionSetSignedPrototype(ConfigurationActionPrototype): """ The request body of the action to set a signed intermediate certificate authority for @@ -15000,9 +15025,9 @@ class PrivateCertificateConfigurationActionSetSignedPrototype(ConfigurationActio """ def __init__( - self, - action_type: str, - certificate: str, + self, + action_type: str, + certificate: str, ) -> None: """ Initialize a PrivateCertificateConfigurationActionSetSignedPrototype object. @@ -15022,13 +15047,11 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationActionSetSign if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateConfigurationActionSetSignedPrototype JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateConfigurationActionSetSignedPrototype JSON') if (certificate := _dict.get('certificate')) is not None: args['certificate'] = certificate else: - raise ValueError( - 'Required property \'certificate\' not present in PrivateCertificateConfigurationActionSetSignedPrototype JSON') + raise ValueError('Required property \'certificate\' not present in PrivateCertificateConfigurationActionSetSignedPrototype JSON') return cls(**args) @classmethod @@ -15075,6 +15098,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = 'private_cert_configuration_action_revoke_ca_certificate' + class PrivateCertificateConfigurationActionSignCSR(ConfigurationAction): """ The response body of the action to sign the CSR for the private certificate @@ -15153,30 +15177,30 @@ class PrivateCertificateConfigurationActionSignCSR(ConfigurationAction): """ def __init__( - self, - action_type: str, - csr: str, - *, - common_name: Optional[str] = None, - alt_names: Optional[List[str]] = None, - ip_sans: Optional[str] = None, - uri_sans: Optional[str] = None, - other_sans: Optional[List[str]] = None, - ttl: Optional[str] = None, - format: Optional[str] = None, - max_path_length: Optional[int] = None, - exclude_cn_from_sans: Optional[bool] = None, - permitted_dns_domains: Optional[List[str]] = None, - use_csr_values: Optional[bool] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, - data: Optional['PrivateCertificateConfigurationCACertificate'] = None, + self, + action_type: str, + csr: str, + *, + common_name: Optional[str] = None, + alt_names: Optional[List[str]] = None, + ip_sans: Optional[str] = None, + uri_sans: Optional[str] = None, + other_sans: Optional[List[str]] = None, + ttl: Optional[str] = None, + format: Optional[str] = None, + max_path_length: Optional[int] = None, + exclude_cn_from_sans: Optional[bool] = None, + permitted_dns_domains: Optional[List[str]] = None, + use_csr_values: Optional[bool] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, + data: Optional['PrivateCertificateConfigurationCACertificate'] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationActionSignCSR object. @@ -15319,13 +15343,11 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationActionSignCSR if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateConfigurationActionSignCSR JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateConfigurationActionSignCSR JSON') if (csr := _dict.get('csr')) is not None: args['csr'] = csr else: - raise ValueError( - 'Required property \'csr\' not present in PrivateCertificateConfigurationActionSignCSR JSON') + raise ValueError('Required property \'csr\' not present in PrivateCertificateConfigurationActionSignCSR JSON') if (data := _dict.get('data')) is not None: args['data'] = PrivateCertificateConfigurationCACertificate.from_dict(data) return cls(**args) @@ -15413,6 +15435,7 @@ class FormatEnum(str, Enum): PEM = 'pem' PEM_BUNDLE = 'pem_bundle' + class ActionTypeEnum(str, Enum): """ The type of configuration action. @@ -15425,6 +15448,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = 'private_cert_configuration_action_revoke_ca_certificate' + class PrivateCertificateConfigurationActionSignCSRPrototype(ConfigurationActionPrototype): """ The request body to specify the properties of the action to sign a CSR for the private @@ -15501,29 +15525,29 @@ class PrivateCertificateConfigurationActionSignCSRPrototype(ConfigurationActionP """ def __init__( - self, - action_type: str, - csr: str, - *, - common_name: Optional[str] = None, - alt_names: Optional[List[str]] = None, - ip_sans: Optional[str] = None, - uri_sans: Optional[str] = None, - other_sans: Optional[List[str]] = None, - ttl: Optional[str] = None, - format: Optional[str] = None, - max_path_length: Optional[int] = None, - exclude_cn_from_sans: Optional[bool] = None, - permitted_dns_domains: Optional[List[str]] = None, - use_csr_values: Optional[bool] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, + self, + action_type: str, + csr: str, + *, + common_name: Optional[str] = None, + alt_names: Optional[List[str]] = None, + ip_sans: Optional[str] = None, + uri_sans: Optional[str] = None, + other_sans: Optional[List[str]] = None, + ttl: Optional[str] = None, + format: Optional[str] = None, + max_path_length: Optional[int] = None, + exclude_cn_from_sans: Optional[bool] = None, + permitted_dns_domains: Optional[List[str]] = None, + use_csr_values: Optional[bool] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationActionSignCSRPrototype object. @@ -15665,13 +15689,11 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationActionSignCSR if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateConfigurationActionSignCSRPrototype JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateConfigurationActionSignCSRPrototype JSON') if (csr := _dict.get('csr')) is not None: args['csr'] = csr else: - raise ValueError( - 'Required property \'csr\' not present in PrivateCertificateConfigurationActionSignCSRPrototype JSON') + raise ValueError('Required property \'csr\' not present in PrivateCertificateConfigurationActionSignCSRPrototype JSON') return cls(**args) @classmethod @@ -15752,6 +15774,7 @@ class FormatEnum(str, Enum): PEM = 'pem' PEM_BUNDLE = 'pem_bundle' + class ActionTypeEnum(str, Enum): """ The type of configuration action. @@ -15764,6 +15787,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = 'private_cert_configuration_action_revoke_ca_certificate' + class PrivateCertificateConfigurationActionSignIntermediate(ConfigurationAction): """ The response body of the action to sign the intermediate certificate authority for the @@ -15841,29 +15865,29 @@ class PrivateCertificateConfigurationActionSignIntermediate(ConfigurationAction) """ def __init__( - self, - action_type: str, - intermediate_certificate_authority: str, - *, - common_name: Optional[str] = None, - alt_names: Optional[List[str]] = None, - ip_sans: Optional[str] = None, - uri_sans: Optional[str] = None, - other_sans: Optional[List[str]] = None, - ttl: Optional[str] = None, - format: Optional[str] = None, - max_path_length: Optional[int] = None, - exclude_cn_from_sans: Optional[bool] = None, - permitted_dns_domains: Optional[List[str]] = None, - use_csr_values: Optional[bool] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, + self, + action_type: str, + intermediate_certificate_authority: str, + *, + common_name: Optional[str] = None, + alt_names: Optional[List[str]] = None, + ip_sans: Optional[str] = None, + uri_sans: Optional[str] = None, + other_sans: Optional[List[str]] = None, + ttl: Optional[str] = None, + format: Optional[str] = None, + max_path_length: Optional[int] = None, + exclude_cn_from_sans: Optional[bool] = None, + permitted_dns_domains: Optional[List[str]] = None, + use_csr_values: Optional[bool] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationActionSignIntermediate object. @@ -16006,13 +16030,11 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationActionSignInt if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateConfigurationActionSignIntermediate JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateConfigurationActionSignIntermediate JSON') if (intermediate_certificate_authority := _dict.get('intermediate_certificate_authority')) is not None: args['intermediate_certificate_authority'] = intermediate_certificate_authority else: - raise ValueError( - 'Required property \'intermediate_certificate_authority\' not present in PrivateCertificateConfigurationActionSignIntermediate JSON') + raise ValueError('Required property \'intermediate_certificate_authority\' not present in PrivateCertificateConfigurationActionSignIntermediate JSON') return cls(**args) @classmethod @@ -16093,6 +16115,7 @@ class FormatEnum(str, Enum): PEM = 'pem' PEM_BUNDLE = 'pem_bundle' + class ActionTypeEnum(str, Enum): """ The type of configuration action. @@ -16105,6 +16128,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = 'private_cert_configuration_action_revoke_ca_certificate' + class PrivateCertificateConfigurationActionSignIntermediatePrototype(ConfigurationActionPrototype): """ The request body to specify the properties of the action to sign an intermediate @@ -16182,29 +16206,29 @@ class PrivateCertificateConfigurationActionSignIntermediatePrototype(Configurati """ def __init__( - self, - action_type: str, - intermediate_certificate_authority: str, - *, - common_name: Optional[str] = None, - alt_names: Optional[List[str]] = None, - ip_sans: Optional[str] = None, - uri_sans: Optional[str] = None, - other_sans: Optional[List[str]] = None, - ttl: Optional[str] = None, - format: Optional[str] = None, - max_path_length: Optional[int] = None, - exclude_cn_from_sans: Optional[bool] = None, - permitted_dns_domains: Optional[List[str]] = None, - use_csr_values: Optional[bool] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, + self, + action_type: str, + intermediate_certificate_authority: str, + *, + common_name: Optional[str] = None, + alt_names: Optional[List[str]] = None, + ip_sans: Optional[str] = None, + uri_sans: Optional[str] = None, + other_sans: Optional[List[str]] = None, + ttl: Optional[str] = None, + format: Optional[str] = None, + max_path_length: Optional[int] = None, + exclude_cn_from_sans: Optional[bool] = None, + permitted_dns_domains: Optional[List[str]] = None, + use_csr_values: Optional[bool] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationActionSignIntermediatePrototype object. @@ -16347,13 +16371,11 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationActionSignInt if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateConfigurationActionSignIntermediatePrototype JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateConfigurationActionSignIntermediatePrototype JSON') if (intermediate_certificate_authority := _dict.get('intermediate_certificate_authority')) is not None: args['intermediate_certificate_authority'] = intermediate_certificate_authority else: - raise ValueError( - 'Required property \'intermediate_certificate_authority\' not present in PrivateCertificateConfigurationActionSignIntermediatePrototype JSON') + raise ValueError('Required property \'intermediate_certificate_authority\' not present in PrivateCertificateConfigurationActionSignIntermediatePrototype JSON') return cls(**args) @classmethod @@ -16434,6 +16456,7 @@ class FormatEnum(str, Enum): PEM = 'pem' PEM_BUNDLE = 'pem_bundle' + class ActionTypeEnum(str, Enum): """ The type of configuration action. @@ -16446,6 +16469,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = 'private_cert_configuration_action_revoke_ca_certificate' + class PrivateCertificateConfigurationCACertificate(PrivateCertificateCAData): """ The data that is associated with the root certificate authority. @@ -16460,12 +16484,12 @@ class PrivateCertificateConfigurationCACertificate(PrivateCertificateCAData): """ def __init__( - self, - certificate: str, - *, - issuing_ca: Optional[str] = None, - ca_chain: Optional[List[str]] = None, - expiration: Optional[int] = None, + self, + certificate: str, + *, + issuing_ca: Optional[str] = None, + ca_chain: Optional[List[str]] = None, + expiration: Optional[int] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationCACertificate object. @@ -16486,8 +16510,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationCACertificate if (certificate := _dict.get('certificate')) is not None: args['certificate'] = certificate else: - raise ValueError( - 'Required property \'certificate\' not present in PrivateCertificateConfigurationCACertificate JSON') + raise ValueError('Required property \'certificate\' not present in PrivateCertificateConfigurationCACertificate JSON') if (issuing_ca := _dict.get('issuing_ca')) is not None: args['issuing_ca'] = issuing_ca if (ca_chain := _dict.get('ca_chain')) is not None: @@ -16635,43 +16658,43 @@ class PrivateCertificateConfigurationIntermediateCA(Configuration): """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - common_name: str, - signing_method: str, - *, - crl_distribution_points_encoded: Optional[bool] = None, - expiration_date: Optional[datetime] = None, - issuer: Optional[str] = None, - key_type: Optional[str] = None, - key_bits: Optional[int] = None, - status: Optional[str] = None, - crypto_key: Optional['PrivateCertificateCryptoKey'] = None, - max_ttl_seconds: Optional[int] = None, - crl_expiry_seconds: Optional[int] = None, - crl_disable: Optional[bool] = None, - issuing_certificates_urls_encoded: Optional[bool] = None, - alt_names: Optional[List[str]] = None, - ip_sans: Optional[str] = None, - uri_sans: Optional[str] = None, - other_sans: Optional[List[str]] = None, - format: Optional[str] = None, - private_key_format: Optional[str] = None, - exclude_cn_from_sans: Optional[bool] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, - data: Optional['PrivateCertificateCAData'] = None, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + common_name: str, + signing_method: str, + *, + crl_distribution_points_encoded: Optional[bool] = None, + expiration_date: Optional[datetime] = None, + issuer: Optional[str] = None, + key_type: Optional[str] = None, + key_bits: Optional[int] = None, + status: Optional[str] = None, + crypto_key: Optional['PrivateCertificateCryptoKey'] = None, + max_ttl_seconds: Optional[int] = None, + crl_expiry_seconds: Optional[int] = None, + crl_disable: Optional[bool] = None, + issuing_certificates_urls_encoded: Optional[bool] = None, + alt_names: Optional[List[str]] = None, + ip_sans: Optional[str] = None, + uri_sans: Optional[str] = None, + other_sans: Optional[List[str]] = None, + format: Optional[str] = None, + private_key_format: Optional[str] = None, + exclude_cn_from_sans: Optional[bool] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, + data: Optional['PrivateCertificateCAData'] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationIntermediateCA object. @@ -16809,38 +16832,31 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationIntermediateC if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PrivateCertificateConfigurationIntermediateCA JSON') + raise ValueError('Required property \'config_type\' not present in PrivateCertificateConfigurationIntermediateCA JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PrivateCertificateConfigurationIntermediateCA JSON') + raise ValueError('Required property \'name\' not present in PrivateCertificateConfigurationIntermediateCA JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PrivateCertificateConfigurationIntermediateCA JSON') + raise ValueError('Required property \'secret_type\' not present in PrivateCertificateConfigurationIntermediateCA JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PrivateCertificateConfigurationIntermediateCA JSON') + raise ValueError('Required property \'created_by\' not present in PrivateCertificateConfigurationIntermediateCA JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PrivateCertificateConfigurationIntermediateCA JSON') + raise ValueError('Required property \'created_at\' not present in PrivateCertificateConfigurationIntermediateCA JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PrivateCertificateConfigurationIntermediateCA JSON') + raise ValueError('Required property \'updated_at\' not present in PrivateCertificateConfigurationIntermediateCA JSON') if (common_name := _dict.get('common_name')) is not None: args['common_name'] = common_name else: - raise ValueError( - 'Required property \'common_name\' not present in PrivateCertificateConfigurationIntermediateCA JSON') + raise ValueError('Required property \'common_name\' not present in PrivateCertificateConfigurationIntermediateCA JSON') if (crl_distribution_points_encoded := _dict.get('crl_distribution_points_encoded')) is not None: args['crl_distribution_points_encoded'] = crl_distribution_points_encoded if (expiration_date := _dict.get('expiration_date')) is not None: @@ -16854,8 +16870,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationIntermediateC if (signing_method := _dict.get('signing_method')) is not None: args['signing_method'] = signing_method else: - raise ValueError( - 'Required property \'signing_method\' not present in PrivateCertificateConfigurationIntermediateCA JSON') + raise ValueError('Required property \'signing_method\' not present in PrivateCertificateConfigurationIntermediateCA JSON') if (status := _dict.get('status')) is not None: args['status'] = status if (crypto_key := _dict.get('crypto_key')) is not None: @@ -17024,6 +17039,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -17039,6 +17055,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class KeyTypeEnum(str, Enum): """ The type of private key to generate. @@ -17047,6 +17064,7 @@ class KeyTypeEnum(str, Enum): RSA = 'rsa' EC = 'ec' + class SigningMethodEnum(str, Enum): """ The signing method to use with this certificate authority to generate private @@ -17059,6 +17077,7 @@ class SigningMethodEnum(str, Enum): INTERNAL = 'internal' EXTERNAL = 'external' + class StatusEnum(str, Enum): """ The status of the certificate authority. The status of a root certificate @@ -17075,6 +17094,7 @@ class StatusEnum(str, Enum): EXPIRED = 'expired' REVOKED = 'revoked' + class FormatEnum(str, Enum): """ The format of the returned data. @@ -17083,6 +17103,7 @@ class FormatEnum(str, Enum): PEM = 'pem' PEM_BUNDLE = 'pem_bundle' + class PrivateKeyFormatEnum(str, Enum): """ The format of the generated private key. @@ -17092,6 +17113,7 @@ class PrivateKeyFormatEnum(str, Enum): PKCS8 = 'pkcs8' + class PrivateCertificateConfigurationIntermediateCACSR(PrivateCertificateCAData): """ The data that is associated with the intermediate certificate authority. @@ -17105,12 +17127,12 @@ class PrivateCertificateConfigurationIntermediateCACSR(PrivateCertificateCAData) """ def __init__( - self, - *, - csr: Optional[str] = None, - private_key: Optional[str] = None, - private_key_type: Optional[str] = None, - expiration: Optional[int] = None, + self, + *, + csr: Optional[str] = None, + private_key: Optional[str] = None, + private_key_type: Optional[str] = None, + expiration: Optional[int] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationIntermediateCACSR object. @@ -17187,6 +17209,7 @@ class PrivateKeyTypeEnum(str, Enum): EC = 'ec' + class PrivateCertificateConfigurationIntermediateCAMetadata(ConfigurationMetadata): """ The configuration of the metadata properties of the intermediate certificate @@ -17240,23 +17263,23 @@ class PrivateCertificateConfigurationIntermediateCAMetadata(ConfigurationMetadat """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - common_name: str, - signing_method: str, - *, - crl_distribution_points_encoded: Optional[bool] = None, - expiration_date: Optional[datetime] = None, - issuer: Optional[str] = None, - key_type: Optional[str] = None, - key_bits: Optional[int] = None, - status: Optional[str] = None, - crypto_key: Optional['PrivateCertificateCryptoKey'] = None, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + common_name: str, + signing_method: str, + *, + crl_distribution_points_encoded: Optional[bool] = None, + expiration_date: Optional[datetime] = None, + issuer: Optional[str] = None, + key_type: Optional[str] = None, + key_bits: Optional[int] = None, + status: Optional[str] = None, + crypto_key: Optional['PrivateCertificateCryptoKey'] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationIntermediateCAMetadata object. @@ -17327,38 +17350,31 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationIntermediateC if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') + raise ValueError('Required property \'config_type\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') + raise ValueError('Required property \'name\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') + raise ValueError('Required property \'secret_type\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') + raise ValueError('Required property \'created_by\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') + raise ValueError('Required property \'created_at\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') + raise ValueError('Required property \'updated_at\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') if (common_name := _dict.get('common_name')) is not None: args['common_name'] = common_name else: - raise ValueError( - 'Required property \'common_name\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') + raise ValueError('Required property \'common_name\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') if (crl_distribution_points_encoded := _dict.get('crl_distribution_points_encoded')) is not None: args['crl_distribution_points_encoded'] = crl_distribution_points_encoded if (expiration_date := _dict.get('expiration_date')) is not None: @@ -17372,8 +17388,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationIntermediateC if (signing_method := _dict.get('signing_method')) is not None: args['signing_method'] = signing_method else: - raise ValueError( - 'Required property \'signing_method\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') + raise ValueError('Required property \'signing_method\' not present in PrivateCertificateConfigurationIntermediateCAMetadata JSON') if (status := _dict.get('status')) is not None: args['status'] = status if (crypto_key := _dict.get('crypto_key')) is not None: @@ -17459,6 +17474,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -17474,6 +17490,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class KeyTypeEnum(str, Enum): """ The type of private key to generate. @@ -17482,6 +17499,7 @@ class KeyTypeEnum(str, Enum): RSA = 'rsa' EC = 'ec' + class SigningMethodEnum(str, Enum): """ The signing method to use with this certificate authority to generate private @@ -17494,6 +17512,7 @@ class SigningMethodEnum(str, Enum): INTERNAL = 'internal' EXTERNAL = 'external' + class StatusEnum(str, Enum): """ The status of the certificate authority. The status of a root certificate @@ -17511,6 +17530,7 @@ class StatusEnum(str, Enum): REVOKED = 'revoked' + class PrivateCertificateConfigurationIntermediateCAPatch(ConfigurationPatch): """ The configuration patch of the intermediate certificate authority. @@ -17540,13 +17560,13 @@ class PrivateCertificateConfigurationIntermediateCAPatch(ConfigurationPatch): """ def __init__( - self, - *, - max_ttl: Optional[str] = None, - crl_expiry: Optional[str] = None, - crl_disable: Optional[bool] = None, - crl_distribution_points_encoded: Optional[bool] = None, - issuing_certificates_urls_encoded: Optional[bool] = None, + self, + *, + max_ttl: Optional[str] = None, + crl_expiry: Optional[str] = None, + crl_disable: Optional[bool] = None, + crl_distribution_points_encoded: Optional[bool] = None, + issuing_certificates_urls_encoded: Optional[bool] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationIntermediateCAPatch object. @@ -17734,36 +17754,36 @@ class PrivateCertificateConfigurationIntermediateCAPrototype(ConfigurationProtot """ def __init__( - self, - config_type: str, - name: str, - max_ttl: str, - signing_method: str, - common_name: str, - *, - crypto_key: Optional['PrivateCertificateCryptoKey'] = None, - issuer: Optional[str] = None, - crl_expiry: Optional[str] = None, - crl_disable: Optional[bool] = None, - crl_distribution_points_encoded: Optional[bool] = None, - issuing_certificates_urls_encoded: Optional[bool] = None, - alt_names: Optional[List[str]] = None, - ip_sans: Optional[str] = None, - uri_sans: Optional[str] = None, - other_sans: Optional[List[str]] = None, - format: Optional[str] = None, - private_key_format: Optional[str] = None, - key_type: Optional[str] = None, - key_bits: Optional[int] = None, - exclude_cn_from_sans: Optional[bool] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, + self, + config_type: str, + name: str, + max_ttl: str, + signing_method: str, + common_name: str, + *, + crypto_key: Optional['PrivateCertificateCryptoKey'] = None, + issuer: Optional[str] = None, + crl_expiry: Optional[str] = None, + crl_disable: Optional[bool] = None, + crl_distribution_points_encoded: Optional[bool] = None, + issuing_certificates_urls_encoded: Optional[bool] = None, + alt_names: Optional[List[str]] = None, + ip_sans: Optional[str] = None, + uri_sans: Optional[str] = None, + other_sans: Optional[List[str]] = None, + format: Optional[str] = None, + private_key_format: Optional[str] = None, + key_type: Optional[str] = None, + key_bits: Optional[int] = None, + exclude_cn_from_sans: Optional[bool] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationIntermediateCAPrototype object. @@ -17899,25 +17919,21 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationIntermediateC if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PrivateCertificateConfigurationIntermediateCAPrototype JSON') + raise ValueError('Required property \'config_type\' not present in PrivateCertificateConfigurationIntermediateCAPrototype JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PrivateCertificateConfigurationIntermediateCAPrototype JSON') + raise ValueError('Required property \'name\' not present in PrivateCertificateConfigurationIntermediateCAPrototype JSON') if (crypto_key := _dict.get('crypto_key')) is not None: args['crypto_key'] = PrivateCertificateCryptoKey.from_dict(crypto_key) if (max_ttl := _dict.get('max_ttl')) is not None: args['max_ttl'] = max_ttl else: - raise ValueError( - 'Required property \'max_ttl\' not present in PrivateCertificateConfigurationIntermediateCAPrototype JSON') + raise ValueError('Required property \'max_ttl\' not present in PrivateCertificateConfigurationIntermediateCAPrototype JSON') if (signing_method := _dict.get('signing_method')) is not None: args['signing_method'] = signing_method else: - raise ValueError( - 'Required property \'signing_method\' not present in PrivateCertificateConfigurationIntermediateCAPrototype JSON') + raise ValueError('Required property \'signing_method\' not present in PrivateCertificateConfigurationIntermediateCAPrototype JSON') if (issuer := _dict.get('issuer')) is not None: args['issuer'] = issuer if (crl_expiry := _dict.get('crl_expiry')) is not None: @@ -17931,8 +17947,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationIntermediateC if (common_name := _dict.get('common_name')) is not None: args['common_name'] = common_name else: - raise ValueError( - 'Required property \'common_name\' not present in PrivateCertificateConfigurationIntermediateCAPrototype JSON') + raise ValueError('Required property \'common_name\' not present in PrivateCertificateConfigurationIntermediateCAPrototype JSON') if (alt_names := _dict.get('alt_names')) is not None: args['alt_names'] = alt_names if (ip_sans := _dict.get('ip_sans')) is not None: @@ -18074,6 +18089,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SigningMethodEnum(str, Enum): """ The signing method to use with this certificate authority to generate private @@ -18086,6 +18102,7 @@ class SigningMethodEnum(str, Enum): INTERNAL = 'internal' EXTERNAL = 'external' + class FormatEnum(str, Enum): """ The format of the returned data. @@ -18094,6 +18111,7 @@ class FormatEnum(str, Enum): PEM = 'pem' PEM_BUNDLE = 'pem_bundle' + class PrivateKeyFormatEnum(str, Enum): """ The format of the generated private key. @@ -18102,6 +18120,7 @@ class PrivateKeyFormatEnum(str, Enum): DER = 'der' PKCS8 = 'pkcs8' + class KeyTypeEnum(str, Enum): """ The type of private key to generate. @@ -18111,6 +18130,7 @@ class KeyTypeEnum(str, Enum): EC = 'ec' + class PrivateCertificateConfigurationRootCA(Configuration): """ The root certificate authority . @@ -18216,44 +18236,44 @@ class PrivateCertificateConfigurationRootCA(Configuration): """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - common_name: str, - *, - crl_distribution_points_encoded: Optional[bool] = None, - expiration_date: Optional[datetime] = None, - key_type: Optional[str] = None, - key_bits: Optional[int] = None, - status: Optional[str] = None, - crypto_key: Optional['PrivateCertificateCryptoKey'] = None, - max_ttl_seconds: Optional[int] = None, - crl_expiry_seconds: Optional[int] = None, - crl_disable: Optional[bool] = None, - issuing_certificates_urls_encoded: Optional[bool] = None, - alt_names: Optional[List[str]] = None, - ip_sans: Optional[str] = None, - uri_sans: Optional[str] = None, - other_sans: Optional[List[str]] = None, - ttl_seconds: Optional[int] = None, - format: Optional[str] = None, - private_key_format: Optional[str] = None, - max_path_length: Optional[int] = None, - exclude_cn_from_sans: Optional[bool] = None, - permitted_dns_domains: Optional[List[str]] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, - data: Optional['PrivateCertificateCAData'] = None, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + common_name: str, + *, + crl_distribution_points_encoded: Optional[bool] = None, + expiration_date: Optional[datetime] = None, + key_type: Optional[str] = None, + key_bits: Optional[int] = None, + status: Optional[str] = None, + crypto_key: Optional['PrivateCertificateCryptoKey'] = None, + max_ttl_seconds: Optional[int] = None, + crl_expiry_seconds: Optional[int] = None, + crl_disable: Optional[bool] = None, + issuing_certificates_urls_encoded: Optional[bool] = None, + alt_names: Optional[List[str]] = None, + ip_sans: Optional[str] = None, + uri_sans: Optional[str] = None, + other_sans: Optional[List[str]] = None, + ttl_seconds: Optional[int] = None, + format: Optional[str] = None, + private_key_format: Optional[str] = None, + max_path_length: Optional[int] = None, + exclude_cn_from_sans: Optional[bool] = None, + permitted_dns_domains: Optional[List[str]] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, + data: Optional['PrivateCertificateCAData'] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationRootCA object. @@ -18393,8 +18413,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationRootCA': if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PrivateCertificateConfigurationRootCA JSON') + raise ValueError('Required property \'config_type\' not present in PrivateCertificateConfigurationRootCA JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: @@ -18402,28 +18421,23 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationRootCA': if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PrivateCertificateConfigurationRootCA JSON') + raise ValueError('Required property \'secret_type\' not present in PrivateCertificateConfigurationRootCA JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PrivateCertificateConfigurationRootCA JSON') + raise ValueError('Required property \'created_by\' not present in PrivateCertificateConfigurationRootCA JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PrivateCertificateConfigurationRootCA JSON') + raise ValueError('Required property \'created_at\' not present in PrivateCertificateConfigurationRootCA JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PrivateCertificateConfigurationRootCA JSON') + raise ValueError('Required property \'updated_at\' not present in PrivateCertificateConfigurationRootCA JSON') if (common_name := _dict.get('common_name')) is not None: args['common_name'] = common_name else: - raise ValueError( - 'Required property \'common_name\' not present in PrivateCertificateConfigurationRootCA JSON') + raise ValueError('Required property \'common_name\' not present in PrivateCertificateConfigurationRootCA JSON') if (crl_distribution_points_encoded := _dict.get('crl_distribution_points_encoded')) is not None: args['crl_distribution_points_encoded'] = crl_distribution_points_encoded if (expiration_date := _dict.get('expiration_date')) is not None: @@ -18608,6 +18622,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -18623,6 +18638,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class KeyTypeEnum(str, Enum): """ The type of private key to generate. @@ -18631,6 +18647,7 @@ class KeyTypeEnum(str, Enum): RSA = 'rsa' EC = 'ec' + class StatusEnum(str, Enum): """ The status of the certificate authority. The status of a root certificate @@ -18647,6 +18664,7 @@ class StatusEnum(str, Enum): EXPIRED = 'expired' REVOKED = 'revoked' + class FormatEnum(str, Enum): """ The format of the returned data. @@ -18655,6 +18673,7 @@ class FormatEnum(str, Enum): PEM = 'pem' PEM_BUNDLE = 'pem_bundle' + class PrivateKeyFormatEnum(str, Enum): """ The format of the generated private key. @@ -18664,6 +18683,7 @@ class PrivateKeyFormatEnum(str, Enum): PKCS8 = 'pkcs8' + class PrivateCertificateConfigurationRootCAMetadata(ConfigurationMetadata): """ The configuration of the metadata properties of the root certificate authority. @@ -18709,21 +18729,21 @@ class PrivateCertificateConfigurationRootCAMetadata(ConfigurationMetadata): """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - common_name: str, - *, - crl_distribution_points_encoded: Optional[bool] = None, - expiration_date: Optional[datetime] = None, - key_type: Optional[str] = None, - key_bits: Optional[int] = None, - status: Optional[str] = None, - crypto_key: Optional['PrivateCertificateCryptoKey'] = None, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + common_name: str, + *, + crl_distribution_points_encoded: Optional[bool] = None, + expiration_date: Optional[datetime] = None, + key_type: Optional[str] = None, + key_bits: Optional[int] = None, + status: Optional[str] = None, + crypto_key: Optional['PrivateCertificateCryptoKey'] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationRootCAMetadata object. @@ -18785,38 +18805,31 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationRootCAMetadat if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') + raise ValueError('Required property \'config_type\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') + raise ValueError('Required property \'name\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') + raise ValueError('Required property \'secret_type\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') + raise ValueError('Required property \'created_by\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') + raise ValueError('Required property \'created_at\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') + raise ValueError('Required property \'updated_at\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') if (common_name := _dict.get('common_name')) is not None: args['common_name'] = common_name else: - raise ValueError( - 'Required property \'common_name\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') + raise ValueError('Required property \'common_name\' not present in PrivateCertificateConfigurationRootCAMetadata JSON') if (crl_distribution_points_encoded := _dict.get('crl_distribution_points_encoded')) is not None: args['crl_distribution_points_encoded'] = crl_distribution_points_encoded if (expiration_date := _dict.get('expiration_date')) is not None: @@ -18906,6 +18919,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -18921,6 +18935,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class KeyTypeEnum(str, Enum): """ The type of private key to generate. @@ -18929,6 +18944,7 @@ class KeyTypeEnum(str, Enum): RSA = 'rsa' EC = 'ec' + class StatusEnum(str, Enum): """ The status of the certificate authority. The status of a root certificate @@ -18946,6 +18962,7 @@ class StatusEnum(str, Enum): REVOKED = 'revoked' + class PrivateCertificateConfigurationRootCAPatch(ConfigurationPatch): """ The configuration of the metadata patch for the root certificate authority. @@ -18975,13 +18992,13 @@ class PrivateCertificateConfigurationRootCAPatch(ConfigurationPatch): """ def __init__( - self, - *, - max_ttl: Optional[str] = None, - crl_expiry: Optional[str] = None, - crl_disable: Optional[bool] = None, - crl_distribution_points_encoded: Optional[bool] = None, - issuing_certificates_urls_encoded: Optional[bool] = None, + self, + *, + max_ttl: Optional[str] = None, + crl_expiry: Optional[str] = None, + crl_disable: Optional[bool] = None, + crl_distribution_points_encoded: Optional[bool] = None, + issuing_certificates_urls_encoded: Optional[bool] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationRootCAPatch object. @@ -19176,37 +19193,37 @@ class PrivateCertificateConfigurationRootCAPrototype(ConfigurationPrototype): """ def __init__( - self, - config_type: str, - name: str, - max_ttl: str, - common_name: str, - *, - crypto_key: Optional['PrivateCertificateCryptoKey'] = None, - crl_expiry: Optional[str] = None, - crl_disable: Optional[bool] = None, - crl_distribution_points_encoded: Optional[bool] = None, - issuing_certificates_urls_encoded: Optional[bool] = None, - alt_names: Optional[List[str]] = None, - ip_sans: Optional[str] = None, - uri_sans: Optional[str] = None, - other_sans: Optional[List[str]] = None, - ttl: Optional[str] = None, - format: Optional[str] = None, - private_key_format: Optional[str] = None, - key_type: Optional[str] = None, - key_bits: Optional[int] = None, - max_path_length: Optional[int] = None, - exclude_cn_from_sans: Optional[bool] = None, - permitted_dns_domains: Optional[List[str]] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, + self, + config_type: str, + name: str, + max_ttl: str, + common_name: str, + *, + crypto_key: Optional['PrivateCertificateCryptoKey'] = None, + crl_expiry: Optional[str] = None, + crl_disable: Optional[bool] = None, + crl_distribution_points_encoded: Optional[bool] = None, + issuing_certificates_urls_encoded: Optional[bool] = None, + alt_names: Optional[List[str]] = None, + ip_sans: Optional[str] = None, + uri_sans: Optional[str] = None, + other_sans: Optional[List[str]] = None, + ttl: Optional[str] = None, + format: Optional[str] = None, + private_key_format: Optional[str] = None, + key_type: Optional[str] = None, + key_bits: Optional[int] = None, + max_path_length: Optional[int] = None, + exclude_cn_from_sans: Optional[bool] = None, + permitted_dns_domains: Optional[List[str]] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationRootCAPrototype object. @@ -19350,20 +19367,17 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationRootCAPrototy if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PrivateCertificateConfigurationRootCAPrototype JSON') + raise ValueError('Required property \'config_type\' not present in PrivateCertificateConfigurationRootCAPrototype JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PrivateCertificateConfigurationRootCAPrototype JSON') + raise ValueError('Required property \'name\' not present in PrivateCertificateConfigurationRootCAPrototype JSON') if (crypto_key := _dict.get('crypto_key')) is not None: args['crypto_key'] = PrivateCertificateCryptoKey.from_dict(crypto_key) if (max_ttl := _dict.get('max_ttl')) is not None: args['max_ttl'] = max_ttl else: - raise ValueError( - 'Required property \'max_ttl\' not present in PrivateCertificateConfigurationRootCAPrototype JSON') + raise ValueError('Required property \'max_ttl\' not present in PrivateCertificateConfigurationRootCAPrototype JSON') if (crl_expiry := _dict.get('crl_expiry')) is not None: args['crl_expiry'] = crl_expiry if (crl_disable := _dict.get('crl_disable')) is not None: @@ -19375,8 +19389,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationRootCAPrototy if (common_name := _dict.get('common_name')) is not None: args['common_name'] = common_name else: - raise ValueError( - 'Required property \'common_name\' not present in PrivateCertificateConfigurationRootCAPrototype JSON') + raise ValueError('Required property \'common_name\' not present in PrivateCertificateConfigurationRootCAPrototype JSON') if (alt_names := _dict.get('alt_names')) is not None: args['alt_names'] = alt_names if (ip_sans := _dict.get('ip_sans')) is not None: @@ -19526,6 +19539,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class FormatEnum(str, Enum): """ The format of the returned data. @@ -19534,6 +19548,7 @@ class FormatEnum(str, Enum): PEM = 'pem' PEM_BUNDLE = 'pem_bundle' + class PrivateKeyFormatEnum(str, Enum): """ The format of the generated private key. @@ -19542,6 +19557,7 @@ class PrivateKeyFormatEnum(str, Enum): DER = 'der' PKCS8 = 'pkcs8' + class KeyTypeEnum(str, Enum): """ The type of private key to generate. @@ -19551,6 +19567,7 @@ class KeyTypeEnum(str, Enum): EC = 'ec' + class PrivateCertificateConfigurationTemplate(Configuration): """ The configuration of the private certificate template. @@ -19697,52 +19714,52 @@ class PrivateCertificateConfigurationTemplate(Configuration): """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - certificate_authority: str, - *, - allowed_secret_groups: Optional[str] = None, - max_ttl_seconds: Optional[int] = None, - ttl_seconds: Optional[int] = None, - allow_localhost: Optional[bool] = None, - allowed_domains: Optional[List[str]] = None, - allowed_domains_template: Optional[bool] = None, - allow_bare_domains: Optional[bool] = None, - allow_subdomains: Optional[bool] = None, - allow_glob_domains: Optional[bool] = None, - allow_any_name: Optional[bool] = None, - enforce_hostnames: Optional[bool] = None, - allow_ip_sans: Optional[bool] = None, - allowed_uri_sans: Optional[List[str]] = None, - allowed_other_sans: Optional[List[str]] = None, - server_flag: Optional[bool] = None, - client_flag: Optional[bool] = None, - code_signing_flag: Optional[bool] = None, - email_protection_flag: Optional[bool] = None, - key_type: Optional[str] = None, - key_bits: Optional[int] = None, - key_usage: Optional[List[str]] = None, - ext_key_usage: Optional[List[str]] = None, - ext_key_usage_oids: Optional[List[str]] = None, - use_csr_common_name: Optional[bool] = None, - use_csr_sans: Optional[bool] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, - require_cn: Optional[bool] = None, - policy_identifiers: Optional[List[str]] = None, - basic_constraints_valid_for_non_ca: Optional[bool] = None, - not_before_duration_seconds: Optional[int] = None, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + certificate_authority: str, + *, + allowed_secret_groups: Optional[str] = None, + max_ttl_seconds: Optional[int] = None, + ttl_seconds: Optional[int] = None, + allow_localhost: Optional[bool] = None, + allowed_domains: Optional[List[str]] = None, + allowed_domains_template: Optional[bool] = None, + allow_bare_domains: Optional[bool] = None, + allow_subdomains: Optional[bool] = None, + allow_glob_domains: Optional[bool] = None, + allow_any_name: Optional[bool] = None, + enforce_hostnames: Optional[bool] = None, + allow_ip_sans: Optional[bool] = None, + allowed_uri_sans: Optional[List[str]] = None, + allowed_other_sans: Optional[List[str]] = None, + server_flag: Optional[bool] = None, + client_flag: Optional[bool] = None, + code_signing_flag: Optional[bool] = None, + email_protection_flag: Optional[bool] = None, + key_type: Optional[str] = None, + key_bits: Optional[int] = None, + key_usage: Optional[List[str]] = None, + ext_key_usage: Optional[List[str]] = None, + ext_key_usage_oids: Optional[List[str]] = None, + use_csr_common_name: Optional[bool] = None, + use_csr_sans: Optional[bool] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, + require_cn: Optional[bool] = None, + policy_identifiers: Optional[List[str]] = None, + basic_constraints_valid_for_non_ca: Optional[bool] = None, + not_before_duration_seconds: Optional[int] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationTemplate object. @@ -19936,8 +19953,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationTemplate': if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PrivateCertificateConfigurationTemplate JSON') + raise ValueError('Required property \'config_type\' not present in PrivateCertificateConfigurationTemplate JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: @@ -19945,28 +19961,23 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationTemplate': if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PrivateCertificateConfigurationTemplate JSON') + raise ValueError('Required property \'secret_type\' not present in PrivateCertificateConfigurationTemplate JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PrivateCertificateConfigurationTemplate JSON') + raise ValueError('Required property \'created_by\' not present in PrivateCertificateConfigurationTemplate JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PrivateCertificateConfigurationTemplate JSON') + raise ValueError('Required property \'created_at\' not present in PrivateCertificateConfigurationTemplate JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PrivateCertificateConfigurationTemplate JSON') + raise ValueError('Required property \'updated_at\' not present in PrivateCertificateConfigurationTemplate JSON') if (certificate_authority := _dict.get('certificate_authority')) is not None: args['certificate_authority'] = certificate_authority else: - raise ValueError( - 'Required property \'certificate_authority\' not present in PrivateCertificateConfigurationTemplate JSON') + raise ValueError('Required property \'certificate_authority\' not present in PrivateCertificateConfigurationTemplate JSON') if (allowed_secret_groups := _dict.get('allowed_secret_groups')) is not None: args['allowed_secret_groups'] = allowed_secret_groups if (max_ttl_seconds := _dict.get('max_ttl_seconds')) is not None: @@ -20177,6 +20188,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -20192,6 +20204,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class KeyTypeEnum(str, Enum): """ The type of private key to generate. @@ -20201,6 +20214,7 @@ class KeyTypeEnum(str, Enum): EC = 'ec' + class PrivateCertificateConfigurationTemplateMetadata(ConfigurationMetadata): """ The metadata properties of the configuration of the private certificate template. @@ -20226,14 +20240,14 @@ class PrivateCertificateConfigurationTemplateMetadata(ConfigurationMetadata): """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - certificate_authority: str, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + certificate_authority: str, ) -> None: """ Initialize a PrivateCertificateConfigurationTemplateMetadata object. @@ -20274,38 +20288,31 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationTemplateMetad if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') + raise ValueError('Required property \'config_type\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') + raise ValueError('Required property \'name\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') + raise ValueError('Required property \'secret_type\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') + raise ValueError('Required property \'created_by\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') + raise ValueError('Required property \'created_at\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') + raise ValueError('Required property \'updated_at\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') if (certificate_authority := _dict.get('certificate_authority')) is not None: args['certificate_authority'] = certificate_authority else: - raise ValueError( - 'Required property \'certificate_authority\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') + raise ValueError('Required property \'certificate_authority\' not present in PrivateCertificateConfigurationTemplateMetadata JSON') return cls(**args) @classmethod @@ -20368,6 +20375,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -20384,6 +20392,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class PrivateCertificateConfigurationTemplatePatch(ConfigurationPatch): """ Properties that describe a certificate template. You can use a certificate template to @@ -20525,45 +20534,45 @@ class PrivateCertificateConfigurationTemplatePatch(ConfigurationPatch): """ def __init__( - self, - *, - allowed_secret_groups: Optional[str] = None, - max_ttl: Optional[str] = None, - ttl: Optional[str] = None, - allow_localhost: Optional[bool] = None, - allowed_domains: Optional[List[str]] = None, - allowed_domains_template: Optional[bool] = None, - allow_bare_domains: Optional[bool] = None, - allow_subdomains: Optional[bool] = None, - allow_glob_domains: Optional[bool] = None, - allow_any_name: Optional[bool] = None, - enforce_hostnames: Optional[bool] = None, - allow_ip_sans: Optional[bool] = None, - allowed_uri_sans: Optional[List[str]] = None, - allowed_other_sans: Optional[List[str]] = None, - server_flag: Optional[bool] = None, - client_flag: Optional[bool] = None, - code_signing_flag: Optional[bool] = None, - email_protection_flag: Optional[bool] = None, - key_type: Optional[str] = None, - key_bits: Optional[int] = None, - key_usage: Optional[List[str]] = None, - ext_key_usage: Optional[List[str]] = None, - ext_key_usage_oids: Optional[List[str]] = None, - use_csr_common_name: Optional[bool] = None, - use_csr_sans: Optional[bool] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, - require_cn: Optional[bool] = None, - policy_identifiers: Optional[List[str]] = None, - basic_constraints_valid_for_non_ca: Optional[bool] = None, - not_before_duration: Optional[str] = None, + self, + *, + allowed_secret_groups: Optional[str] = None, + max_ttl: Optional[str] = None, + ttl: Optional[str] = None, + allow_localhost: Optional[bool] = None, + allowed_domains: Optional[List[str]] = None, + allowed_domains_template: Optional[bool] = None, + allow_bare_domains: Optional[bool] = None, + allow_subdomains: Optional[bool] = None, + allow_glob_domains: Optional[bool] = None, + allow_any_name: Optional[bool] = None, + enforce_hostnames: Optional[bool] = None, + allow_ip_sans: Optional[bool] = None, + allowed_uri_sans: Optional[List[str]] = None, + allowed_other_sans: Optional[List[str]] = None, + server_flag: Optional[bool] = None, + client_flag: Optional[bool] = None, + code_signing_flag: Optional[bool] = None, + email_protection_flag: Optional[bool] = None, + key_type: Optional[str] = None, + key_bits: Optional[int] = None, + key_usage: Optional[List[str]] = None, + ext_key_usage: Optional[List[str]] = None, + ext_key_usage_oids: Optional[List[str]] = None, + use_csr_common_name: Optional[bool] = None, + use_csr_sans: Optional[bool] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, + require_cn: Optional[bool] = None, + policy_identifiers: Optional[List[str]] = None, + basic_constraints_valid_for_non_ca: Optional[bool] = None, + not_before_duration: Optional[str] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationTemplatePatch object. @@ -20931,6 +20940,7 @@ class KeyTypeEnum(str, Enum): EC = 'ec' + class PrivateCertificateConfigurationTemplatePrototype(ConfigurationPrototype): """ Properties that describe a certificate template. You can use a certificate template to @@ -21087,49 +21097,49 @@ class PrivateCertificateConfigurationTemplatePrototype(ConfigurationPrototype): """ def __init__( - self, - config_type: str, - name: str, - certificate_authority: str, - *, - allowed_secret_groups: Optional[str] = None, - max_ttl: Optional[str] = None, - ttl: Optional[str] = None, - allow_localhost: Optional[bool] = None, - allowed_domains: Optional[List[str]] = None, - allowed_domains_template: Optional[bool] = None, - allow_bare_domains: Optional[bool] = None, - allow_subdomains: Optional[bool] = None, - allow_glob_domains: Optional[bool] = None, - allow_wildcard_certificates: Optional[bool] = None, - allow_any_name: Optional[bool] = None, - enforce_hostnames: Optional[bool] = None, - allow_ip_sans: Optional[bool] = None, - allowed_uri_sans: Optional[List[str]] = None, - allowed_other_sans: Optional[List[str]] = None, - server_flag: Optional[bool] = None, - client_flag: Optional[bool] = None, - code_signing_flag: Optional[bool] = None, - email_protection_flag: Optional[bool] = None, - key_type: Optional[str] = None, - key_bits: Optional[int] = None, - key_usage: Optional[List[str]] = None, - ext_key_usage: Optional[List[str]] = None, - ext_key_usage_oids: Optional[List[str]] = None, - use_csr_common_name: Optional[bool] = None, - use_csr_sans: Optional[bool] = None, - ou: Optional[List[str]] = None, - organization: Optional[List[str]] = None, - country: Optional[List[str]] = None, - locality: Optional[List[str]] = None, - province: Optional[List[str]] = None, - street_address: Optional[List[str]] = None, - postal_code: Optional[List[str]] = None, - serial_number: Optional[str] = None, - require_cn: Optional[bool] = None, - policy_identifiers: Optional[List[str]] = None, - basic_constraints_valid_for_non_ca: Optional[bool] = None, - not_before_duration: Optional[str] = None, + self, + config_type: str, + name: str, + certificate_authority: str, + *, + allowed_secret_groups: Optional[str] = None, + max_ttl: Optional[str] = None, + ttl: Optional[str] = None, + allow_localhost: Optional[bool] = None, + allowed_domains: Optional[List[str]] = None, + allowed_domains_template: Optional[bool] = None, + allow_bare_domains: Optional[bool] = None, + allow_subdomains: Optional[bool] = None, + allow_glob_domains: Optional[bool] = None, + allow_wildcard_certificates: Optional[bool] = None, + allow_any_name: Optional[bool] = None, + enforce_hostnames: Optional[bool] = None, + allow_ip_sans: Optional[bool] = None, + allowed_uri_sans: Optional[List[str]] = None, + allowed_other_sans: Optional[List[str]] = None, + server_flag: Optional[bool] = None, + client_flag: Optional[bool] = None, + code_signing_flag: Optional[bool] = None, + email_protection_flag: Optional[bool] = None, + key_type: Optional[str] = None, + key_bits: Optional[int] = None, + key_usage: Optional[List[str]] = None, + ext_key_usage: Optional[List[str]] = None, + ext_key_usage_oids: Optional[List[str]] = None, + use_csr_common_name: Optional[bool] = None, + use_csr_sans: Optional[bool] = None, + ou: Optional[List[str]] = None, + organization: Optional[List[str]] = None, + country: Optional[List[str]] = None, + locality: Optional[List[str]] = None, + province: Optional[List[str]] = None, + street_address: Optional[List[str]] = None, + postal_code: Optional[List[str]] = None, + serial_number: Optional[str] = None, + require_cn: Optional[bool] = None, + policy_identifiers: Optional[List[str]] = None, + basic_constraints_valid_for_non_ca: Optional[bool] = None, + not_before_duration: Optional[str] = None, ) -> None: """ Initialize a PrivateCertificateConfigurationTemplatePrototype object. @@ -21335,18 +21345,15 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateConfigurationTemplateProto if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PrivateCertificateConfigurationTemplatePrototype JSON') + raise ValueError('Required property \'config_type\' not present in PrivateCertificateConfigurationTemplatePrototype JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PrivateCertificateConfigurationTemplatePrototype JSON') + raise ValueError('Required property \'name\' not present in PrivateCertificateConfigurationTemplatePrototype JSON') if (certificate_authority := _dict.get('certificate_authority')) is not None: args['certificate_authority'] = certificate_authority else: - raise ValueError( - 'Required property \'certificate_authority\' not present in PrivateCertificateConfigurationTemplatePrototype JSON') + raise ValueError('Required property \'certificate_authority\' not present in PrivateCertificateConfigurationTemplatePrototype JSON') if (allowed_secret_groups := _dict.get('allowed_secret_groups')) is not None: args['allowed_secret_groups'] = allowed_secret_groups if (max_ttl := _dict.get('max_ttl')) is not None: @@ -21553,6 +21560,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class KeyTypeEnum(str, Enum): """ The type of private key to generate. @@ -21562,6 +21570,7 @@ class KeyTypeEnum(str, Enum): EC = 'ec' + class PrivateCertificateCryptoProviderHPCS(PrivateCertificateCryptoProvider): """ The data that is associated with Hyper Protect Crypto Services as the cryptographic @@ -21575,11 +21584,11 @@ class PrivateCertificateCryptoProviderHPCS(PrivateCertificateCryptoProvider): """ def __init__( - self, - type: str, - instance_crn: str, - pin_iam_credentials_secret_id: str, - private_keystore_id: str, + self, + type: str, + instance_crn: str, + pin_iam_credentials_secret_id: str, + private_keystore_id: str, ) -> None: """ Initialize a PrivateCertificateCryptoProviderHPCS object. @@ -21607,18 +21616,15 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateCryptoProviderHPCS': if (instance_crn := _dict.get('instance_crn')) is not None: args['instance_crn'] = instance_crn else: - raise ValueError( - 'Required property \'instance_crn\' not present in PrivateCertificateCryptoProviderHPCS JSON') + raise ValueError('Required property \'instance_crn\' not present in PrivateCertificateCryptoProviderHPCS JSON') if (pin_iam_credentials_secret_id := _dict.get('pin_iam_credentials_secret_id')) is not None: args['pin_iam_credentials_secret_id'] = pin_iam_credentials_secret_id else: - raise ValueError( - 'Required property \'pin_iam_credentials_secret_id\' not present in PrivateCertificateCryptoProviderHPCS JSON') + raise ValueError('Required property \'pin_iam_credentials_secret_id\' not present in PrivateCertificateCryptoProviderHPCS JSON') if (private_keystore_id := _dict.get('private_keystore_id')) is not None: args['private_keystore_id'] = private_keystore_id else: - raise ValueError( - 'Required property \'private_keystore_id\' not present in PrivateCertificateCryptoProviderHPCS JSON') + raise ValueError('Required property \'private_keystore_id\' not present in PrivateCertificateCryptoProviderHPCS JSON') return cls(**args) @classmethod @@ -21665,6 +21671,7 @@ class TypeEnum(str, Enum): HYPER_PROTECT_CRYPTO_SERVICES = 'hyper_protect_crypto_services' + class PrivateCertificateMetadata(SecretMetadata): """ Properties of the metadata of your private certificate. @@ -21741,39 +21748,39 @@ class PrivateCertificateMetadata(SecretMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - signing_algorithm: str, - certificate_template: str, - common_name: str, - expiration_date: datetime, - issuer: str, - serial_number: str, - validity: 'CertificateValidity', - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - alt_names: Optional[List[str]] = None, - certificate_authority: Optional[str] = None, - key_algorithm: Optional[str] = None, - next_rotation_date: Optional[datetime] = None, - rotation: Optional['RotationPolicy'] = None, - revocation_time_seconds: Optional[int] = None, - revocation_time_rfc3339: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + signing_algorithm: str, + certificate_template: str, + common_name: str, + expiration_date: datetime, + issuer: str, + serial_number: str, + validity: 'CertificateValidity', + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + alt_names: Optional[List[str]] = None, + certificate_authority: Optional[str] = None, + key_algorithm: Optional[str] = None, + next_rotation_date: Optional[datetime] = None, + rotation: Optional['RotationPolicy'] = None, + revocation_time_seconds: Optional[int] = None, + revocation_time_rfc3339: Optional[datetime] = None, ) -> None: """ Initialize a PrivateCertificateMetadata object. @@ -21922,8 +21929,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateMetadata': if (certificate_template := _dict.get('certificate_template')) is not None: args['certificate_template'] = certificate_template else: - raise ValueError( - 'Required property \'certificate_template\' not present in PrivateCertificateMetadata JSON') + raise ValueError('Required property \'certificate_template\' not present in PrivateCertificateMetadata JSON') if (common_name := _dict.get('common_name')) is not None: args['common_name'] = common_name else: @@ -22067,6 +22073,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -22079,6 +22086,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class PrivateCertificateMetadataPatch(SecretMetadataPatch): """ PrivateCertificateMetadataPatch. @@ -22102,13 +22110,13 @@ class PrivateCertificateMetadataPatch(SecretMetadataPatch): """ def __init__( - self, - *, - name: Optional[str] = None, - description: Optional[str] = None, - labels: Optional[List[str]] = None, - custom_metadata: Optional[dict] = None, - rotation: Optional['RotationPolicy'] = None, + self, + *, + name: Optional[str] = None, + description: Optional[str] = None, + labels: Optional[List[str]] = None, + custom_metadata: Optional[dict] = None, + rotation: Optional['RotationPolicy'] = None, ) -> None: """ Initialize a PrivateCertificateMetadataPatch object. @@ -22255,27 +22263,27 @@ class PrivateCertificatePrototype(SecretPrototype): """ def __init__( - self, - secret_type: str, - name: str, - certificate_template: str, - common_name: str, - *, - description: Optional[str] = None, - secret_group_id: Optional[str] = None, - labels: Optional[List[str]] = None, - alt_names: Optional[List[str]] = None, - ip_sans: Optional[str] = None, - uri_sans: Optional[str] = None, - other_sans: Optional[List[str]] = None, - csr: Optional[str] = None, - format: Optional[str] = None, - private_key_format: Optional[str] = None, - exclude_cn_from_sans: Optional[bool] = None, - ttl: Optional[str] = None, - rotation: Optional['RotationPolicy'] = None, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + secret_type: str, + name: str, + certificate_template: str, + common_name: str, + *, + description: Optional[str] = None, + secret_group_id: Optional[str] = None, + labels: Optional[List[str]] = None, + alt_names: Optional[List[str]] = None, + ip_sans: Optional[str] = None, + uri_sans: Optional[str] = None, + other_sans: Optional[List[str]] = None, + csr: Optional[str] = None, + format: Optional[str] = None, + private_key_format: Optional[str] = None, + exclude_cn_from_sans: Optional[bool] = None, + ttl: Optional[str] = None, + rotation: Optional['RotationPolicy'] = None, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a PrivateCertificatePrototype object. @@ -22376,8 +22384,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificatePrototype': if (certificate_template := _dict.get('certificate_template')) is not None: args['certificate_template'] = certificate_template else: - raise ValueError( - 'Required property \'certificate_template\' not present in PrivateCertificatePrototype JSON') + raise ValueError('Required property \'certificate_template\' not present in PrivateCertificatePrototype JSON') if (common_name := _dict.get('common_name')) is not None: args['common_name'] = common_name else: @@ -22492,6 +22499,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class FormatEnum(str, Enum): """ The format of the returned data. @@ -22500,6 +22508,7 @@ class FormatEnum(str, Enum): PEM = 'pem' PEM_BUNDLE = 'pem_bundle' + class PrivateKeyFormatEnum(str, Enum): """ The format of the generated private key. @@ -22509,6 +22518,7 @@ class PrivateKeyFormatEnum(str, Enum): PKCS8 = 'pkcs8' + class PrivateCertificateVersion(SecretVersion): """ Your private certificate version. @@ -22555,27 +22565,27 @@ class PrivateCertificateVersion(SecretVersion): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - serial_number: str, - validity: 'CertificateValidity', - certificate: str, - private_key: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, - issuing_ca: Optional[str] = None, - ca_chain: Optional[List[str]] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + serial_number: str, + validity: 'CertificateValidity', + certificate: str, + private_key: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, + issuing_ca: Optional[str] = None, + ca_chain: Optional[List[str]] = None, ) -> None: """ Initialize a PrivateCertificateVersion object. @@ -22784,6 +22794,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -22794,6 +22805,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class PrivateCertificateVersionActionRevoke(VersionAction): """ The response body to specify the properties of the action to revoke the private @@ -22805,10 +22817,10 @@ class PrivateCertificateVersionActionRevoke(VersionAction): """ def __init__( - self, - action_type: str, - *, - revocation_time_seconds: Optional[int] = None, + self, + action_type: str, + *, + revocation_time_seconds: Optional[int] = None, ) -> None: """ Initialize a PrivateCertificateVersionActionRevoke object. @@ -22826,8 +22838,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateVersionActionRevoke': if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateVersionActionRevoke JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateVersionActionRevoke JSON') if (revocation_time_seconds := _dict.get('revocation_time_seconds')) is not None: args['revocation_time_seconds'] = revocation_time_seconds return cls(**args) @@ -22872,6 +22883,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_ACTION_REVOKE_CERTIFICATE = 'private_cert_action_revoke_certificate' + class PrivateCertificateVersionActionRevokePrototype(SecretVersionActionPrototype): """ The request body to specify the properties of the action to revoke the private @@ -22881,8 +22893,8 @@ class PrivateCertificateVersionActionRevokePrototype(SecretVersionActionPrototyp """ def __init__( - self, - action_type: str, + self, + action_type: str, ) -> None: """ Initialize a PrivateCertificateVersionActionRevokePrototype object. @@ -22899,8 +22911,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateVersionActionRevokePrototy if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PrivateCertificateVersionActionRevokePrototype JSON') + raise ValueError('Required property \'action_type\' not present in PrivateCertificateVersionActionRevokePrototype JSON') return cls(**args) @classmethod @@ -22941,6 +22952,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_ACTION_REVOKE_CERTIFICATE = 'private_cert_action_revoke_certificate' + class PrivateCertificateVersionMetadata(SecretVersionMetadata): """ Properties of the version metadata of your private certificate. @@ -22978,23 +22990,23 @@ class PrivateCertificateVersionMetadata(SecretVersionMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - serial_number: str, - validity: 'CertificateValidity', - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + serial_number: str, + validity: 'CertificateValidity', + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a PrivateCertificateVersionMetadata object. @@ -23073,13 +23085,11 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateVersionMetadata': if (secret_group_id := _dict.get('secret_group_id')) is not None: args['secret_group_id'] = secret_group_id else: - raise ValueError( - 'Required property \'secret_group_id\' not present in PrivateCertificateVersionMetadata JSON') + raise ValueError('Required property \'secret_group_id\' not present in PrivateCertificateVersionMetadata JSON') if (payload_available := _dict.get('payload_available')) is not None: args['payload_available'] = payload_available else: - raise ValueError( - 'Required property \'payload_available\' not present in PrivateCertificateVersionMetadata JSON') + raise ValueError('Required property \'payload_available\' not present in PrivateCertificateVersionMetadata JSON') if (alias := _dict.get('alias')) is not None: args['alias'] = alias if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -23093,8 +23103,7 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateVersionMetadata': if (serial_number := _dict.get('serial_number')) is not None: args['serial_number'] = serial_number else: - raise ValueError( - 'Required property \'serial_number\' not present in PrivateCertificateVersionMetadata JSON') + raise ValueError('Required property \'serial_number\' not present in PrivateCertificateVersionMetadata JSON') if (validity := _dict.get('validity')) is not None: args['validity'] = CertificateValidity.from_dict(validity) else: @@ -23177,6 +23186,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -23187,6 +23197,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class PrivateCertificateVersionPrototype(SecretVersionPrototype): """ PrivateCertificateVersionPrototype. @@ -23199,11 +23210,11 @@ class PrivateCertificateVersionPrototype(SecretVersionPrototype): """ def __init__( - self, - *, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, - csr: Optional[str] = None, + self, + *, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, + csr: Optional[str] = None, ) -> None: """ Initialize a PrivateCertificateVersionPrototype object. @@ -23349,41 +23360,41 @@ class PublicCertificate(Secret): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - common_name: str, - key_algorithm: str, - rotation: 'RotationPolicy', - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - signing_algorithm: Optional[str] = None, - alt_names: Optional[List[str]] = None, - expiration_date: Optional[datetime] = None, - issuance_info: Optional['CertificateIssuanceInfo'] = None, - issuer: Optional[str] = None, - serial_number: Optional[str] = None, - validity: Optional['CertificateValidity'] = None, - bundle_certs: Optional[bool] = None, - ca: Optional[str] = None, - dns: Optional[str] = None, - certificate: Optional[str] = None, - intermediate: Optional[str] = None, - private_key: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + common_name: str, + key_algorithm: str, + rotation: 'RotationPolicy', + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + signing_algorithm: Optional[str] = None, + alt_names: Optional[List[str]] = None, + expiration_date: Optional[datetime] = None, + issuance_info: Optional['CertificateIssuanceInfo'] = None, + issuer: Optional[str] = None, + serial_number: Optional[str] = None, + validity: Optional['CertificateValidity'] = None, + bundle_certs: Optional[bool] = None, + ca: Optional[str] = None, + dns: Optional[str] = None, + certificate: Optional[str] = None, + intermediate: Optional[str] = None, + private_key: Optional[str] = None, ) -> None: """ Initialize a PublicCertificate object. @@ -23696,6 +23707,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -23708,6 +23720,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class PublicCertificateActionValidateManualDNS(SecretAction): """ The response body of the action to validate manual DNS challenges for the public @@ -23717,8 +23730,8 @@ class PublicCertificateActionValidateManualDNS(SecretAction): """ def __init__( - self, - action_type: str, + self, + action_type: str, ) -> None: """ Initialize a PublicCertificateActionValidateManualDNS object. @@ -23735,8 +23748,7 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateActionValidateManualDNS': if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PublicCertificateActionValidateManualDNS JSON') + raise ValueError('Required property \'action_type\' not present in PublicCertificateActionValidateManualDNS JSON') return cls(**args) @classmethod @@ -23778,6 +23790,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_ACTION_REVOKE_CERTIFICATE = 'private_cert_action_revoke_certificate' + class PublicCertificateActionValidateManualDNSPrototype(SecretActionPrototype): """ The request body to specify the properties of the action to validate manual DNS @@ -23787,8 +23800,8 @@ class PublicCertificateActionValidateManualDNSPrototype(SecretActionPrototype): """ def __init__( - self, - action_type: str, + self, + action_type: str, ) -> None: """ Initialize a PublicCertificateActionValidateManualDNSPrototype object. @@ -23805,8 +23818,7 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateActionValidateManualDNSProt if (action_type := _dict.get('action_type')) is not None: args['action_type'] = action_type else: - raise ValueError( - 'Required property \'action_type\' not present in PublicCertificateActionValidateManualDNSPrototype JSON') + raise ValueError('Required property \'action_type\' not present in PublicCertificateActionValidateManualDNSPrototype JSON') return cls(**args) @classmethod @@ -23848,6 +23860,7 @@ class ActionTypeEnum(str, Enum): PRIVATE_CERT_ACTION_REVOKE_CERTIFICATE = 'private_cert_action_revoke_certificate' + class PublicCertificateConfigurationCALetsEncrypt(Configuration): """ Properties that describe a Let's Encrypt CA configuration. @@ -23880,17 +23893,17 @@ class PublicCertificateConfigurationCALetsEncrypt(Configuration): """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - lets_encrypt_environment: str, - lets_encrypt_private_key: str, - *, - lets_encrypt_preferred_chain: Optional[str] = None, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + lets_encrypt_environment: str, + lets_encrypt_private_key: str, + *, + lets_encrypt_preferred_chain: Optional[str] = None, ) -> None: """ Initialize a PublicCertificateConfigurationCALetsEncrypt object. @@ -23940,45 +23953,37 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationCALetsEncrypt' if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') + raise ValueError('Required property \'config_type\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') + raise ValueError('Required property \'name\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') + raise ValueError('Required property \'secret_type\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') + raise ValueError('Required property \'created_by\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') + raise ValueError('Required property \'created_at\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') + raise ValueError('Required property \'updated_at\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') if (lets_encrypt_environment := _dict.get('lets_encrypt_environment')) is not None: args['lets_encrypt_environment'] = lets_encrypt_environment else: - raise ValueError( - 'Required property \'lets_encrypt_environment\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') + raise ValueError('Required property \'lets_encrypt_environment\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') if (lets_encrypt_preferred_chain := _dict.get('lets_encrypt_preferred_chain')) is not None: args['lets_encrypt_preferred_chain'] = lets_encrypt_preferred_chain if (lets_encrypt_private_key := _dict.get('lets_encrypt_private_key')) is not None: args['lets_encrypt_private_key'] = lets_encrypt_private_key else: - raise ValueError( - 'Required property \'lets_encrypt_private_key\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') + raise ValueError('Required property \'lets_encrypt_private_key\' not present in PublicCertificateConfigurationCALetsEncrypt JSON') return cls(**args) @classmethod @@ -24045,6 +24050,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -24060,6 +24066,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class LetsEncryptEnvironmentEnum(str, Enum): """ The configuration of the Let's Encrypt CA environment. @@ -24069,6 +24076,7 @@ class LetsEncryptEnvironmentEnum(str, Enum): STAGING = 'staging' + class PublicCertificateConfigurationCALetsEncryptMetadata(ConfigurationMetadata): """ Your Let's Encrypt CA metadata properties. @@ -24098,16 +24106,16 @@ class PublicCertificateConfigurationCALetsEncryptMetadata(ConfigurationMetadata) """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - lets_encrypt_environment: str, - *, - lets_encrypt_preferred_chain: Optional[str] = None, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + lets_encrypt_environment: str, + *, + lets_encrypt_preferred_chain: Optional[str] = None, ) -> None: """ Initialize a PublicCertificateConfigurationCALetsEncryptMetadata object. @@ -24153,38 +24161,31 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationCALetsEncryptM if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') + raise ValueError('Required property \'config_type\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') + raise ValueError('Required property \'name\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') + raise ValueError('Required property \'secret_type\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') + raise ValueError('Required property \'created_by\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') + raise ValueError('Required property \'created_at\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') + raise ValueError('Required property \'updated_at\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') if (lets_encrypt_environment := _dict.get('lets_encrypt_environment')) is not None: args['lets_encrypt_environment'] = lets_encrypt_environment else: - raise ValueError( - 'Required property \'lets_encrypt_environment\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') + raise ValueError('Required property \'lets_encrypt_environment\' not present in PublicCertificateConfigurationCALetsEncryptMetadata JSON') if (lets_encrypt_preferred_chain := _dict.get('lets_encrypt_preferred_chain')) is not None: args['lets_encrypt_preferred_chain'] = lets_encrypt_preferred_chain return cls(**args) @@ -24251,6 +24252,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -24266,6 +24268,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class LetsEncryptEnvironmentEnum(str, Enum): """ The configuration of the Let's Encrypt CA environment. @@ -24275,6 +24278,7 @@ class LetsEncryptEnvironmentEnum(str, Enum): STAGING = 'staging' + class PublicCertificateConfigurationCALetsEncryptPatch(ConfigurationPatch): """ The configuration update of the Let's Encrypt Certificate Authority. @@ -24291,11 +24295,11 @@ class PublicCertificateConfigurationCALetsEncryptPatch(ConfigurationPatch): """ def __init__( - self, - lets_encrypt_environment: str, - *, - lets_encrypt_private_key: Optional[str] = None, - lets_encrypt_preferred_chain: Optional[str] = None, + self, + lets_encrypt_environment: str, + *, + lets_encrypt_private_key: Optional[str] = None, + lets_encrypt_preferred_chain: Optional[str] = None, ) -> None: """ Initialize a PublicCertificateConfigurationCALetsEncryptPatch object. @@ -24322,8 +24326,7 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationCALetsEncryptP if (lets_encrypt_environment := _dict.get('lets_encrypt_environment')) is not None: args['lets_encrypt_environment'] = lets_encrypt_environment else: - raise ValueError( - 'Required property \'lets_encrypt_environment\' not present in PublicCertificateConfigurationCALetsEncryptPatch JSON') + raise ValueError('Required property \'lets_encrypt_environment\' not present in PublicCertificateConfigurationCALetsEncryptPatch JSON') if (lets_encrypt_private_key := _dict.get('lets_encrypt_private_key')) is not None: args['lets_encrypt_private_key'] = lets_encrypt_private_key if (lets_encrypt_preferred_chain := _dict.get('lets_encrypt_preferred_chain')) is not None: @@ -24373,6 +24376,7 @@ class LetsEncryptEnvironmentEnum(str, Enum): STAGING = 'staging' + class PublicCertificateConfigurationCALetsEncryptPrototype(ConfigurationPrototype): """ The properties of the Let's Encrypt CA configuration. @@ -24398,13 +24402,13 @@ class PublicCertificateConfigurationCALetsEncryptPrototype(ConfigurationPrototyp """ def __init__( - self, - config_type: str, - name: str, - lets_encrypt_environment: str, - lets_encrypt_private_key: str, - *, - lets_encrypt_preferred_chain: Optional[str] = None, + self, + config_type: str, + name: str, + lets_encrypt_environment: str, + lets_encrypt_private_key: str, + *, + lets_encrypt_preferred_chain: Optional[str] = None, ) -> None: """ Initialize a PublicCertificateConfigurationCALetsEncryptPrototype object. @@ -24444,23 +24448,19 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationCALetsEncryptP if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PublicCertificateConfigurationCALetsEncryptPrototype JSON') + raise ValueError('Required property \'config_type\' not present in PublicCertificateConfigurationCALetsEncryptPrototype JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PublicCertificateConfigurationCALetsEncryptPrototype JSON') + raise ValueError('Required property \'name\' not present in PublicCertificateConfigurationCALetsEncryptPrototype JSON') if (lets_encrypt_environment := _dict.get('lets_encrypt_environment')) is not None: args['lets_encrypt_environment'] = lets_encrypt_environment else: - raise ValueError( - 'Required property \'lets_encrypt_environment\' not present in PublicCertificateConfigurationCALetsEncryptPrototype JSON') + raise ValueError('Required property \'lets_encrypt_environment\' not present in PublicCertificateConfigurationCALetsEncryptPrototype JSON') if (lets_encrypt_private_key := _dict.get('lets_encrypt_private_key')) is not None: args['lets_encrypt_private_key'] = lets_encrypt_private_key else: - raise ValueError( - 'Required property \'lets_encrypt_private_key\' not present in PublicCertificateConfigurationCALetsEncryptPrototype JSON') + raise ValueError('Required property \'lets_encrypt_private_key\' not present in PublicCertificateConfigurationCALetsEncryptPrototype JSON') if (lets_encrypt_preferred_chain := _dict.get('lets_encrypt_preferred_chain')) is not None: args['lets_encrypt_preferred_chain'] = lets_encrypt_preferred_chain return cls(**args) @@ -24521,6 +24521,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class LetsEncryptEnvironmentEnum(str, Enum): """ The configuration of the Let's Encrypt CA environment. @@ -24530,6 +24531,7 @@ class LetsEncryptEnvironmentEnum(str, Enum): STAGING = 'staging' + class PublicCertificateConfigurationDNSClassicInfrastructure(Configuration): """ Properties that describe a Classic Infrastructure DNS configuration. @@ -24561,15 +24563,15 @@ class PublicCertificateConfigurationDNSClassicInfrastructure(Configuration): """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - classic_infrastructure_username: str, - classic_infrastructure_password: str, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + classic_infrastructure_username: str, + classic_infrastructure_password: str, ) -> None: """ Initialize a PublicCertificateConfigurationDNSClassicInfrastructure object. @@ -24619,43 +24621,35 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationDNSClassicInfr if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') + raise ValueError('Required property \'config_type\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') + raise ValueError('Required property \'name\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') + raise ValueError('Required property \'secret_type\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') + raise ValueError('Required property \'created_by\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') + raise ValueError('Required property \'created_at\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') + raise ValueError('Required property \'updated_at\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') if (classic_infrastructure_username := _dict.get('classic_infrastructure_username')) is not None: args['classic_infrastructure_username'] = classic_infrastructure_username else: - raise ValueError( - 'Required property \'classic_infrastructure_username\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') + raise ValueError('Required property \'classic_infrastructure_username\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') if (classic_infrastructure_password := _dict.get('classic_infrastructure_password')) is not None: args['classic_infrastructure_password'] = classic_infrastructure_password else: - raise ValueError( - 'Required property \'classic_infrastructure_password\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') + raise ValueError('Required property \'classic_infrastructure_password\' not present in PublicCertificateConfigurationDNSClassicInfrastructure JSON') return cls(**args) @classmethod @@ -24720,6 +24714,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -24736,6 +24731,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class PublicCertificateConfigurationDNSClassicInfrastructureMetadata(ConfigurationMetadata): """ Your Classic Infrastructure DNS metadata properties. @@ -24759,13 +24755,13 @@ class PublicCertificateConfigurationDNSClassicInfrastructureMetadata(Configurati """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, ) -> None: """ Initialize a PublicCertificateConfigurationDNSClassicInfrastructureMetadata object. @@ -24803,33 +24799,27 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationDNSClassicInfr if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') + raise ValueError('Required property \'config_type\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') + raise ValueError('Required property \'name\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') + raise ValueError('Required property \'secret_type\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') + raise ValueError('Required property \'created_by\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') + raise ValueError('Required property \'created_at\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') + raise ValueError('Required property \'updated_at\' not present in PublicCertificateConfigurationDNSClassicInfrastructureMetadata JSON') return cls(**args) @classmethod @@ -24890,6 +24880,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -24906,6 +24897,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class PublicCertificateConfigurationDNSClassicInfrastructurePatch(ConfigurationPatch): """ Properties that describe the configuration update of an IBM Cloud classic @@ -24923,10 +24915,10 @@ class PublicCertificateConfigurationDNSClassicInfrastructurePatch(ConfigurationP """ def __init__( - self, - *, - classic_infrastructure_username: Optional[str] = None, - classic_infrastructure_password: Optional[str] = None, + self, + *, + classic_infrastructure_username: Optional[str] = None, + classic_infrastructure_password: Optional[str] = None, ) -> None: """ Initialize a PublicCertificateConfigurationDNSClassicInfrastructurePatch object. @@ -25013,11 +25005,11 @@ class PublicCertificateConfigurationDNSClassicInfrastructurePrototype(Configurat """ def __init__( - self, - config_type: str, - name: str, - classic_infrastructure_username: str, - classic_infrastructure_password: str, + self, + config_type: str, + name: str, + classic_infrastructure_username: str, + classic_infrastructure_password: str, ) -> None: """ Initialize a PublicCertificateConfigurationDNSClassicInfrastructurePrototype object. @@ -25057,23 +25049,19 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationDNSClassicInfr if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PublicCertificateConfigurationDNSClassicInfrastructurePrototype JSON') + raise ValueError('Required property \'config_type\' not present in PublicCertificateConfigurationDNSClassicInfrastructurePrototype JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PublicCertificateConfigurationDNSClassicInfrastructurePrototype JSON') + raise ValueError('Required property \'name\' not present in PublicCertificateConfigurationDNSClassicInfrastructurePrototype JSON') if (classic_infrastructure_username := _dict.get('classic_infrastructure_username')) is not None: args['classic_infrastructure_username'] = classic_infrastructure_username else: - raise ValueError( - 'Required property \'classic_infrastructure_username\' not present in PublicCertificateConfigurationDNSClassicInfrastructurePrototype JSON') + raise ValueError('Required property \'classic_infrastructure_username\' not present in PublicCertificateConfigurationDNSClassicInfrastructurePrototype JSON') if (classic_infrastructure_password := _dict.get('classic_infrastructure_password')) is not None: args['classic_infrastructure_password'] = classic_infrastructure_password else: - raise ValueError( - 'Required property \'classic_infrastructure_password\' not present in PublicCertificateConfigurationDNSClassicInfrastructurePrototype JSON') + raise ValueError('Required property \'classic_infrastructure_password\' not present in PublicCertificateConfigurationDNSClassicInfrastructurePrototype JSON') return cls(**args) @classmethod @@ -25131,6 +25119,7 @@ class ConfigTypeEnum(str, Enum): IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class PublicCertificateConfigurationDNSCloudInternetServices(Configuration): """ Properties that describe a Cloud Internet Services DNS configuration. @@ -25172,16 +25161,16 @@ class PublicCertificateConfigurationDNSCloudInternetServices(Configuration): """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, - cloud_internet_services_crn: str, - *, - cloud_internet_services_apikey: Optional[str] = None, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, + cloud_internet_services_crn: str, + *, + cloud_internet_services_apikey: Optional[str] = None, ) -> None: """ Initialize a PublicCertificateConfigurationDNSCloudInternetServices object. @@ -25240,40 +25229,33 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationDNSCloudIntern if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') + raise ValueError('Required property \'config_type\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') + raise ValueError('Required property \'name\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') + raise ValueError('Required property \'secret_type\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') + raise ValueError('Required property \'created_by\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') + raise ValueError('Required property \'created_at\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') + raise ValueError('Required property \'updated_at\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') if (cloud_internet_services_apikey := _dict.get('cloud_internet_services_apikey')) is not None: args['cloud_internet_services_apikey'] = cloud_internet_services_apikey if (cloud_internet_services_crn := _dict.get('cloud_internet_services_crn')) is not None: args['cloud_internet_services_crn'] = cloud_internet_services_crn else: - raise ValueError( - 'Required property \'cloud_internet_services_crn\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') + raise ValueError('Required property \'cloud_internet_services_crn\' not present in PublicCertificateConfigurationDNSCloudInternetServices JSON') return cls(**args) @classmethod @@ -25338,6 +25320,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -25354,6 +25337,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class PublicCertificateConfigurationDNSCloudInternetServicesMetadata(ConfigurationMetadata): """ Your Cloud Internet Services DNS metadata properties. @@ -25377,13 +25361,13 @@ class PublicCertificateConfigurationDNSCloudInternetServicesMetadata(Configurati """ def __init__( - self, - config_type: str, - name: str, - secret_type: str, - created_by: str, - created_at: datetime, - updated_at: datetime, + self, + config_type: str, + name: str, + secret_type: str, + created_by: str, + created_at: datetime, + updated_at: datetime, ) -> None: """ Initialize a PublicCertificateConfigurationDNSCloudInternetServicesMetadata object. @@ -25421,33 +25405,27 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationDNSCloudIntern if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') + raise ValueError('Required property \'config_type\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') + raise ValueError('Required property \'name\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') + raise ValueError('Required property \'secret_type\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') + raise ValueError('Required property \'created_by\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') + raise ValueError('Required property \'created_at\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') if (updated_at := _dict.get('updated_at')) is not None: args['updated_at'] = string_to_datetime(updated_at) else: - raise ValueError( - 'Required property \'updated_at\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') + raise ValueError('Required property \'updated_at\' not present in PublicCertificateConfigurationDNSCloudInternetServicesMetadata JSON') return cls(**args) @classmethod @@ -25508,6 +25486,7 @@ class ConfigTypeEnum(str, Enum): PRIVATE_CERT_CONFIGURATION_TEMPLATE = 'private_cert_configuration_template' IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class SecretTypeEnum(str, Enum): """ The secret type. Supported types are arbitrary, imported_cert, public_cert, @@ -25524,6 +25503,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class PublicCertificateConfigurationDNSCloudInternetServicesPatch(ConfigurationPatch): """ The configuration update of the Cloud Internet Services DNS. @@ -25549,10 +25529,10 @@ class PublicCertificateConfigurationDNSCloudInternetServicesPatch(ConfigurationP """ def __init__( - self, - cloud_internet_services_apikey: str, - *, - cloud_internet_services_crn: Optional[str] = None, + self, + cloud_internet_services_apikey: str, + *, + cloud_internet_services_crn: Optional[str] = None, ) -> None: """ Initialize a PublicCertificateConfigurationDNSCloudInternetServicesPatch object. @@ -25587,8 +25567,7 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationDNSCloudIntern if (cloud_internet_services_apikey := _dict.get('cloud_internet_services_apikey')) is not None: args['cloud_internet_services_apikey'] = cloud_internet_services_apikey else: - raise ValueError( - 'Required property \'cloud_internet_services_apikey\' not present in PublicCertificateConfigurationDNSCloudInternetServicesPatch JSON') + raise ValueError('Required property \'cloud_internet_services_apikey\' not present in PublicCertificateConfigurationDNSCloudInternetServicesPatch JSON') if (cloud_internet_services_crn := _dict.get('cloud_internet_services_crn')) is not None: args['cloud_internet_services_crn'] = cloud_internet_services_crn return cls(**args) @@ -25660,12 +25639,12 @@ class PublicCertificateConfigurationDNSCloudInternetServicesPrototype(Configurat """ def __init__( - self, - config_type: str, - name: str, - cloud_internet_services_crn: str, - *, - cloud_internet_services_apikey: Optional[str] = None, + self, + config_type: str, + name: str, + cloud_internet_services_crn: str, + *, + cloud_internet_services_apikey: Optional[str] = None, ) -> None: """ Initialize a PublicCertificateConfigurationDNSCloudInternetServicesPrototype object. @@ -25714,20 +25693,17 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateConfigurationDNSCloudIntern if (config_type := _dict.get('config_type')) is not None: args['config_type'] = config_type else: - raise ValueError( - 'Required property \'config_type\' not present in PublicCertificateConfigurationDNSCloudInternetServicesPrototype JSON') + raise ValueError('Required property \'config_type\' not present in PublicCertificateConfigurationDNSCloudInternetServicesPrototype JSON') if (name := _dict.get('name')) is not None: args['name'] = name else: - raise ValueError( - 'Required property \'name\' not present in PublicCertificateConfigurationDNSCloudInternetServicesPrototype JSON') + raise ValueError('Required property \'name\' not present in PublicCertificateConfigurationDNSCloudInternetServicesPrototype JSON') if (cloud_internet_services_apikey := _dict.get('cloud_internet_services_apikey')) is not None: args['cloud_internet_services_apikey'] = cloud_internet_services_apikey if (cloud_internet_services_crn := _dict.get('cloud_internet_services_crn')) is not None: args['cloud_internet_services_crn'] = cloud_internet_services_crn else: - raise ValueError( - 'Required property \'cloud_internet_services_crn\' not present in PublicCertificateConfigurationDNSCloudInternetServicesPrototype JSON') + raise ValueError('Required property \'cloud_internet_services_crn\' not present in PublicCertificateConfigurationDNSCloudInternetServicesPrototype JSON') return cls(**args) @classmethod @@ -25785,6 +25761,7 @@ class ConfigTypeEnum(str, Enum): IAM_CREDENTIALS_CONFIGURATION = 'iam_credentials_configuration' + class PublicCertificateMetadata(SecretMetadata): """ Properties of the metadata of your public certificate. @@ -25860,38 +25837,38 @@ class PublicCertificateMetadata(SecretMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - common_name: str, - key_algorithm: str, - rotation: 'RotationPolicy', - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - signing_algorithm: Optional[str] = None, - alt_names: Optional[List[str]] = None, - expiration_date: Optional[datetime] = None, - issuance_info: Optional['CertificateIssuanceInfo'] = None, - issuer: Optional[str] = None, - serial_number: Optional[str] = None, - validity: Optional['CertificateValidity'] = None, - bundle_certs: Optional[bool] = None, - ca: Optional[str] = None, - dns: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + common_name: str, + key_algorithm: str, + rotation: 'RotationPolicy', + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + signing_algorithm: Optional[str] = None, + alt_names: Optional[List[str]] = None, + expiration_date: Optional[datetime] = None, + issuance_info: Optional['CertificateIssuanceInfo'] = None, + issuer: Optional[str] = None, + serial_number: Optional[str] = None, + validity: Optional['CertificateValidity'] = None, + bundle_certs: Optional[bool] = None, + ca: Optional[str] = None, + dns: Optional[str] = None, ) -> None: """ Initialize a PublicCertificateMetadata object. @@ -26181,6 +26158,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -26193,6 +26171,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class PublicCertificateMetadataPatch(SecretMetadataPatch): """ PublicCertificateMetadataPatch. @@ -26216,13 +26195,13 @@ class PublicCertificateMetadataPatch(SecretMetadataPatch): """ def __init__( - self, - *, - name: Optional[str] = None, - description: Optional[str] = None, - labels: Optional[List[str]] = None, - custom_metadata: Optional[dict] = None, - rotation: Optional['RotationPolicy'] = None, + self, + *, + name: Optional[str] = None, + description: Optional[str] = None, + labels: Optional[List[str]] = None, + custom_metadata: Optional[dict] = None, + rotation: Optional['RotationPolicy'] = None, ) -> None: """ Initialize a PublicCertificateMetadataPatch object. @@ -26357,22 +26336,22 @@ class PublicCertificatePrototype(SecretPrototype): """ def __init__( - self, - secret_type: str, - name: str, - common_name: str, - ca: str, - dns: str, - *, - description: Optional[str] = None, - secret_group_id: Optional[str] = None, - labels: Optional[List[str]] = None, - alt_names: Optional[List[str]] = None, - key_algorithm: Optional[str] = None, - bundle_certs: Optional[bool] = None, - rotation: Optional['RotationPolicy'] = None, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + secret_type: str, + name: str, + common_name: str, + ca: str, + dns: str, + *, + description: Optional[str] = None, + secret_group_id: Optional[str] = None, + labels: Optional[List[str]] = None, + alt_names: Optional[List[str]] = None, + key_algorithm: Optional[str] = None, + bundle_certs: Optional[bool] = None, + rotation: Optional['RotationPolicy'] = None, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a PublicCertificatePrototype object. @@ -26554,6 +26533,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class PublicCertificateRotationPolicy(RotationPolicy): """ This field indicates whether Secrets Manager rotates your secrets automatically. @@ -26571,9 +26551,9 @@ class PublicCertificateRotationPolicy(RotationPolicy): """ def __init__( - self, - auto_rotate: bool, - rotate_keys: bool, + self, + auto_rotate: bool, + rotate_keys: bool, ) -> None: """ Initialize a PublicCertificateRotationPolicy object. @@ -26683,26 +26663,26 @@ class PublicCertificateVersion(SecretVersion): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, - serial_number: Optional[str] = None, - validity: Optional['CertificateValidity'] = None, - certificate: Optional[str] = None, - intermediate: Optional[str] = None, - private_key: Optional[str] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, + serial_number: Optional[str] = None, + validity: Optional['CertificateValidity'] = None, + certificate: Optional[str] = None, + intermediate: Optional[str] = None, + private_key: Optional[str] = None, ) -> None: """ Initialize a PublicCertificateVersion object. @@ -26901,6 +26881,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -26911,6 +26892,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class PublicCertificateVersionMetadata(SecretVersionMetadata): """ Properties of the version metadata of your public certificate. @@ -26948,23 +26930,23 @@ class PublicCertificateVersionMetadata(SecretVersionMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, - serial_number: Optional[str] = None, - validity: Optional['CertificateValidity'] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, + serial_number: Optional[str] = None, + validity: Optional['CertificateValidity'] = None, ) -> None: """ Initialize a PublicCertificateVersionMetadata object. @@ -27043,13 +27025,11 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateVersionMetadata': if (secret_group_id := _dict.get('secret_group_id')) is not None: args['secret_group_id'] = secret_group_id else: - raise ValueError( - 'Required property \'secret_group_id\' not present in PublicCertificateVersionMetadata JSON') + raise ValueError('Required property \'secret_group_id\' not present in PublicCertificateVersionMetadata JSON') if (payload_available := _dict.get('payload_available')) is not None: args['payload_available'] = payload_available else: - raise ValueError( - 'Required property \'payload_available\' not present in PublicCertificateVersionMetadata JSON') + raise ValueError('Required property \'payload_available\' not present in PublicCertificateVersionMetadata JSON') if (alias := _dict.get('alias')) is not None: args['alias'] = alias if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -27142,6 +27122,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -27152,6 +27133,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class PublicCertificateVersionPrototype(SecretVersionPrototype): """ PublicCertificateVersionPrototype. @@ -27165,11 +27147,11 @@ class PublicCertificateVersionPrototype(SecretVersionPrototype): """ def __init__( - self, - rotation: 'PublicCertificateRotationObject', - *, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + rotation: 'PublicCertificateRotationObject', + *, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a PublicCertificateVersionPrototype object. @@ -27305,31 +27287,31 @@ class ServiceCredentialsSecret(Secret): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - source_service: 'ServiceCredentialsSecretSourceServiceRO', - credentials: 'ServiceCredentialsSecretCredentials', - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - next_rotation_date: Optional[datetime] = None, - rotation: Optional['RotationPolicy'] = None, - ttl: Optional[str] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + source_service: 'ServiceCredentialsSecretSourceServiceRO', + credentials: 'ServiceCredentialsSecretCredentials', + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + next_rotation_date: Optional[datetime] = None, + rotation: Optional['RotationPolicy'] = None, + ttl: Optional[str] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a ServiceCredentialsSecret object. @@ -27576,6 +27558,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -27588,6 +27571,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class ServiceCredentialsSecretMetadata(SecretMetadata): """ The metadata properties for your service credentials secret. @@ -27653,30 +27637,30 @@ class ServiceCredentialsSecretMetadata(SecretMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - source_service: 'ServiceCredentialsSecretSourceServiceRO', - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - next_rotation_date: Optional[datetime] = None, - rotation: Optional['RotationPolicy'] = None, - ttl: Optional[str] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + source_service: 'ServiceCredentialsSecretSourceServiceRO', + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + next_rotation_date: Optional[datetime] = None, + rotation: Optional['RotationPolicy'] = None, + ttl: Optional[str] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a ServiceCredentialsSecretMetadata object. @@ -27785,8 +27769,7 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretMetadata': if (secret_group_id := _dict.get('secret_group_id')) is not None: args['secret_group_id'] = secret_group_id else: - raise ValueError( - 'Required property \'secret_group_id\' not present in ServiceCredentialsSecretMetadata JSON') + raise ValueError('Required property \'secret_group_id\' not present in ServiceCredentialsSecretMetadata JSON') if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: @@ -27802,8 +27785,7 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretMetadata': if (versions_total := _dict.get('versions_total')) is not None: args['versions_total'] = versions_total else: - raise ValueError( - 'Required property \'versions_total\' not present in ServiceCredentialsSecretMetadata JSON') + raise ValueError('Required property \'versions_total\' not present in ServiceCredentialsSecretMetadata JSON') if (referenced_by := _dict.get('referenced_by')) is not None: args['referenced_by'] = referenced_by if (next_rotation_date := _dict.get('next_rotation_date')) is not None: @@ -27817,8 +27799,7 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretMetadata': if (source_service := _dict.get('source_service')) is not None: args['source_service'] = ServiceCredentialsSecretSourceServiceRO.from_dict(source_service) else: - raise ValueError( - 'Required property \'source_service\' not present in ServiceCredentialsSecretMetadata JSON') + raise ValueError('Required property \'source_service\' not present in ServiceCredentialsSecretMetadata JSON') return cls(**args) @classmethod @@ -27914,6 +27895,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -27926,6 +27908,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class ServiceCredentialsSecretMetadataPatch(SecretMetadataPatch): """ ServiceCredentialsSecretMetadataPatch. @@ -27959,14 +27942,14 @@ class ServiceCredentialsSecretMetadataPatch(SecretMetadataPatch): """ def __init__( - self, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - labels: Optional[List[str]] = None, - name: Optional[str] = None, - rotation: Optional['RotationPolicy'] = None, - ttl: Optional[str] = None, + self, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + labels: Optional[List[str]] = None, + name: Optional[str] = None, + rotation: Optional['RotationPolicy'] = None, + ttl: Optional[str] = None, ) -> None: """ Initialize a ServiceCredentialsSecretMetadataPatch object. @@ -28112,18 +28095,18 @@ class ServiceCredentialsSecretPrototype(SecretPrototype): """ def __init__( - self, - name: str, - secret_type: str, - source_service: 'ServiceCredentialsSecretSourceService', - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - labels: Optional[List[str]] = None, - rotation: Optional['RotationPolicy'] = None, - secret_group_id: Optional[str] = None, - ttl: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, + self, + name: str, + secret_type: str, + source_service: 'ServiceCredentialsSecretSourceService', + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + labels: Optional[List[str]] = None, + rotation: Optional['RotationPolicy'] = None, + secret_group_id: Optional[str] = None, + ttl: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a ServiceCredentialsSecretPrototype object. @@ -28203,8 +28186,7 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretPrototype': if (source_service := _dict.get('source_service')) is not None: args['source_service'] = ServiceCredentialsSecretSourceService.from_dict(source_service) else: - raise ValueError( - 'Required property \'source_service\' not present in ServiceCredentialsSecretPrototype JSON') + raise ValueError('Required property \'source_service\' not present in ServiceCredentialsSecretPrototype JSON') if (ttl := _dict.get('ttl')) is not None: args['ttl'] = ttl if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -28281,6 +28263,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class ServiceCredentialsSecretVersion(SecretVersion): """ Your service credentials secret version. @@ -28318,23 +28301,23 @@ class ServiceCredentialsSecretVersion(SecretVersion): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - credentials: 'ServiceCredentialsSecretCredentials', - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, - resource_key: Optional['ServiceCredentialsResourceKey'] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + credentials: 'ServiceCredentialsSecretCredentials', + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, + resource_key: Optional['ServiceCredentialsResourceKey'] = None, ) -> None: """ Initialize a ServiceCredentialsSecretVersion object. @@ -28413,13 +28396,11 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretVersion': if (secret_group_id := _dict.get('secret_group_id')) is not None: args['secret_group_id'] = secret_group_id else: - raise ValueError( - 'Required property \'secret_group_id\' not present in ServiceCredentialsSecretVersion JSON') + raise ValueError('Required property \'secret_group_id\' not present in ServiceCredentialsSecretVersion JSON') if (payload_available := _dict.get('payload_available')) is not None: args['payload_available'] = payload_available else: - raise ValueError( - 'Required property \'payload_available\' not present in ServiceCredentialsSecretVersion JSON') + raise ValueError('Required property \'payload_available\' not present in ServiceCredentialsSecretVersion JSON') if (alias := _dict.get('alias')) is not None: args['alias'] = alias if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -28517,6 +28498,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -28527,6 +28509,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class ServiceCredentialsSecretVersionMetadata(SecretVersionMetadata): """ The version metadata properties for your service credentials secret. @@ -28562,22 +28545,22 @@ class ServiceCredentialsSecretVersionMetadata(SecretVersionMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, - resource_key: Optional['ServiceCredentialsResourceKey'] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, + resource_key: Optional['ServiceCredentialsResourceKey'] = None, ) -> None: """ Initialize a ServiceCredentialsSecretVersionMetadata object. @@ -28633,13 +28616,11 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretVersionMetadata': if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in ServiceCredentialsSecretVersionMetadata JSON') + raise ValueError('Required property \'created_by\' not present in ServiceCredentialsSecretVersionMetadata JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in ServiceCredentialsSecretVersionMetadata JSON') + raise ValueError('Required property \'created_at\' not present in ServiceCredentialsSecretVersionMetadata JSON') if (downloaded := _dict.get('downloaded')) is not None: args['downloaded'] = downloaded if (id := _dict.get('id')) is not None: @@ -28651,18 +28632,15 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretVersionMetadata': if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in ServiceCredentialsSecretVersionMetadata JSON') + raise ValueError('Required property \'secret_type\' not present in ServiceCredentialsSecretVersionMetadata JSON') if (secret_group_id := _dict.get('secret_group_id')) is not None: args['secret_group_id'] = secret_group_id else: - raise ValueError( - 'Required property \'secret_group_id\' not present in ServiceCredentialsSecretVersionMetadata JSON') + raise ValueError('Required property \'secret_group_id\' not present in ServiceCredentialsSecretVersionMetadata JSON') if (payload_available := _dict.get('payload_available')) is not None: args['payload_available'] = payload_available else: - raise ValueError( - 'Required property \'payload_available\' not present in ServiceCredentialsSecretVersionMetadata JSON') + raise ValueError('Required property \'payload_available\' not present in ServiceCredentialsSecretVersionMetadata JSON') if (alias := _dict.get('alias')) is not None: args['alias'] = alias if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -28670,8 +28648,7 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretVersionMetadata': if (secret_id := _dict.get('secret_id')) is not None: args['secret_id'] = secret_id else: - raise ValueError( - 'Required property \'secret_id\' not present in ServiceCredentialsSecretVersionMetadata JSON') + raise ValueError('Required property \'secret_id\' not present in ServiceCredentialsSecretVersionMetadata JSON') if (expiration_date := _dict.get('expiration_date')) is not None: args['expiration_date'] = string_to_datetime(expiration_date) if (resource_key := _dict.get('resource_key')) is not None: @@ -28752,6 +28729,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -28762,6 +28740,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class ServiceCredentialsSecretVersionPrototype(SecretVersionPrototype): """ ServiceCredentialsSecretVersionPrototype. @@ -28773,10 +28752,10 @@ class ServiceCredentialsSecretVersionPrototype(SecretVersionPrototype): """ def __init__( - self, - *, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + *, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a ServiceCredentialsSecretVersionPrototype object. @@ -28892,31 +28871,31 @@ class UsernamePasswordSecret(Secret): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - rotation: 'RotationPolicy', - username: str, - password: str, - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - expiration_date: Optional[datetime] = None, - next_rotation_date: Optional[datetime] = None, - password_generation_policy: Optional['PasswordGenerationPolicyRO'] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + rotation: 'RotationPolicy', + username: str, + password: str, + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + expiration_date: Optional[datetime] = None, + next_rotation_date: Optional[datetime] = None, + password_generation_policy: Optional['PasswordGenerationPolicyRO'] = None, ) -> None: """ Initialize a UsernamePasswordSecret object. @@ -29152,6 +29131,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -29164,6 +29144,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class UsernamePasswordSecretMetadata(SecretMetadata): """ Properties of the metadata of your user credentials secret. @@ -29219,29 +29200,29 @@ class UsernamePasswordSecretMetadata(SecretMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - crn: str, - id: str, - secret_group_id: str, - secret_type: str, - updated_at: datetime, - versions_total: int, - rotation: 'RotationPolicy', - *, - custom_metadata: Optional[dict] = None, - description: Optional[str] = None, - downloaded: Optional[bool] = None, - labels: Optional[List[str]] = None, - locks_total: Optional[int] = None, - name: Optional[str] = None, - state: Optional[int] = None, - state_description: Optional[str] = None, - referenced_by: Optional[List[str]] = None, - expiration_date: Optional[datetime] = None, - next_rotation_date: Optional[datetime] = None, - password_generation_policy: Optional['PasswordGenerationPolicyRO'] = None, + self, + created_by: str, + created_at: datetime, + crn: str, + id: str, + secret_group_id: str, + secret_type: str, + updated_at: datetime, + versions_total: int, + rotation: 'RotationPolicy', + *, + custom_metadata: Optional[dict] = None, + description: Optional[str] = None, + downloaded: Optional[bool] = None, + labels: Optional[List[str]] = None, + locks_total: Optional[int] = None, + name: Optional[str] = None, + state: Optional[int] = None, + state_description: Optional[str] = None, + referenced_by: Optional[List[str]] = None, + expiration_date: Optional[datetime] = None, + next_rotation_date: Optional[datetime] = None, + password_generation_policy: Optional['PasswordGenerationPolicyRO'] = None, ) -> None: """ Initialize a UsernamePasswordSecretMetadata object. @@ -29459,6 +29440,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class StateDescriptionEnum(str, Enum): """ A text representation of the secret state. @@ -29471,6 +29453,7 @@ class StateDescriptionEnum(str, Enum): DESTROYED = 'destroyed' + class UsernamePasswordSecretMetadataPatch(SecretMetadataPatch): """ UsernamePasswordSecretMetadataPatch. @@ -29501,15 +29484,15 @@ class UsernamePasswordSecretMetadataPatch(SecretMetadataPatch): """ def __init__( - self, - *, - name: Optional[str] = None, - description: Optional[str] = None, - labels: Optional[List[str]] = None, - custom_metadata: Optional[dict] = None, - rotation: Optional['RotationPolicy'] = None, - expiration_date: Optional[datetime] = None, - password_generation_policy: Optional['PasswordGenerationPolicyPatch'] = None, + self, + *, + name: Optional[str] = None, + description: Optional[str] = None, + labels: Optional[List[str]] = None, + custom_metadata: Optional[dict] = None, + rotation: Optional['RotationPolicy'] = None, + expiration_date: Optional[datetime] = None, + password_generation_policy: Optional['PasswordGenerationPolicyPatch'] = None, ) -> None: """ Initialize a UsernamePasswordSecretMetadataPatch object. @@ -29656,20 +29639,20 @@ class UsernamePasswordSecretPrototype(SecretPrototype): """ def __init__( - self, - secret_type: str, - name: str, - username: str, - *, - description: Optional[str] = None, - secret_group_id: Optional[str] = None, - labels: Optional[List[str]] = None, - password: Optional[str] = None, - expiration_date: Optional[datetime] = None, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, - rotation: Optional['RotationPolicy'] = None, - password_generation_policy: Optional['PasswordGenerationPolicy'] = None, + self, + secret_type: str, + name: str, + username: str, + *, + description: Optional[str] = None, + secret_group_id: Optional[str] = None, + labels: Optional[List[str]] = None, + password: Optional[str] = None, + expiration_date: Optional[datetime] = None, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, + rotation: Optional['RotationPolicy'] = None, + password_generation_policy: Optional['PasswordGenerationPolicy'] = None, ) -> None: """ Initialize a UsernamePasswordSecretPrototype object. @@ -29832,6 +29815,7 @@ class SecretTypeEnum(str, Enum): USERNAME_PASSWORD = 'username_password' + class UsernamePasswordSecretVersion(SecretVersion): """ Your user credentials secret version. @@ -29869,23 +29853,23 @@ class UsernamePasswordSecretVersion(SecretVersion): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - username: str, - password: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + username: str, + password: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a UsernamePasswordSecretVersion object. @@ -29968,8 +29952,7 @@ def from_dict(cls, _dict: Dict) -> 'UsernamePasswordSecretVersion': if (payload_available := _dict.get('payload_available')) is not None: args['payload_available'] = payload_available else: - raise ValueError( - 'Required property \'payload_available\' not present in UsernamePasswordSecretVersion JSON') + raise ValueError('Required property \'payload_available\' not present in UsernamePasswordSecretVersion JSON') if (alias := _dict.get('alias')) is not None: args['alias'] = alias if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -30063,6 +30046,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -30073,6 +30057,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class UsernamePasswordSecretVersionMetadata(SecretVersionMetadata): """ Properties of the version metadata of your user credentials secret. @@ -30106,21 +30091,21 @@ class UsernamePasswordSecretVersionMetadata(SecretVersionMetadata): """ def __init__( - self, - created_by: str, - created_at: datetime, - id: str, - secret_type: str, - secret_group_id: str, - payload_available: bool, - secret_id: str, - *, - auto_rotated: Optional[bool] = None, - downloaded: Optional[bool] = None, - secret_name: Optional[str] = None, - alias: Optional[str] = None, - version_custom_metadata: Optional[dict] = None, - expiration_date: Optional[datetime] = None, + self, + created_by: str, + created_at: datetime, + id: str, + secret_type: str, + secret_group_id: str, + payload_available: bool, + secret_id: str, + *, + auto_rotated: Optional[bool] = None, + downloaded: Optional[bool] = None, + secret_name: Optional[str] = None, + alias: Optional[str] = None, + version_custom_metadata: Optional[dict] = None, + expiration_date: Optional[datetime] = None, ) -> None: """ Initialize a UsernamePasswordSecretVersionMetadata object. @@ -30173,13 +30158,11 @@ def from_dict(cls, _dict: Dict) -> 'UsernamePasswordSecretVersionMetadata': if (created_by := _dict.get('created_by')) is not None: args['created_by'] = created_by else: - raise ValueError( - 'Required property \'created_by\' not present in UsernamePasswordSecretVersionMetadata JSON') + raise ValueError('Required property \'created_by\' not present in UsernamePasswordSecretVersionMetadata JSON') if (created_at := _dict.get('created_at')) is not None: args['created_at'] = string_to_datetime(created_at) else: - raise ValueError( - 'Required property \'created_at\' not present in UsernamePasswordSecretVersionMetadata JSON') + raise ValueError('Required property \'created_at\' not present in UsernamePasswordSecretVersionMetadata JSON') if (downloaded := _dict.get('downloaded')) is not None: args['downloaded'] = downloaded if (id := _dict.get('id')) is not None: @@ -30191,18 +30174,15 @@ def from_dict(cls, _dict: Dict) -> 'UsernamePasswordSecretVersionMetadata': if (secret_type := _dict.get('secret_type')) is not None: args['secret_type'] = secret_type else: - raise ValueError( - 'Required property \'secret_type\' not present in UsernamePasswordSecretVersionMetadata JSON') + raise ValueError('Required property \'secret_type\' not present in UsernamePasswordSecretVersionMetadata JSON') if (secret_group_id := _dict.get('secret_group_id')) is not None: args['secret_group_id'] = secret_group_id else: - raise ValueError( - 'Required property \'secret_group_id\' not present in UsernamePasswordSecretVersionMetadata JSON') + raise ValueError('Required property \'secret_group_id\' not present in UsernamePasswordSecretVersionMetadata JSON') if (payload_available := _dict.get('payload_available')) is not None: args['payload_available'] = payload_available else: - raise ValueError( - 'Required property \'payload_available\' not present in UsernamePasswordSecretVersionMetadata JSON') + raise ValueError('Required property \'payload_available\' not present in UsernamePasswordSecretVersionMetadata JSON') if (alias := _dict.get('alias')) is not None: args['alias'] = alias if (version_custom_metadata := _dict.get('version_custom_metadata')) is not None: @@ -30210,8 +30190,7 @@ def from_dict(cls, _dict: Dict) -> 'UsernamePasswordSecretVersionMetadata': if (secret_id := _dict.get('secret_id')) is not None: args['secret_id'] = secret_id else: - raise ValueError( - 'Required property \'secret_id\' not present in UsernamePasswordSecretVersionMetadata JSON') + raise ValueError('Required property \'secret_id\' not present in UsernamePasswordSecretVersionMetadata JSON') if (expiration_date := _dict.get('expiration_date')) is not None: args['expiration_date'] = string_to_datetime(expiration_date) return cls(**args) @@ -30285,6 +30264,7 @@ class SecretTypeEnum(str, Enum): SERVICE_CREDENTIALS = 'service_credentials' USERNAME_PASSWORD = 'username_password' + class AliasEnum(str, Enum): """ A human-readable alias that describes the secret version. 'Current' is used for @@ -30295,6 +30275,7 @@ class AliasEnum(str, Enum): PREVIOUS = 'previous' + class UsernamePasswordSecretVersionPrototype(SecretVersionPrototype): """ UsernamePasswordSecretVersionPrototype. @@ -30309,11 +30290,11 @@ class UsernamePasswordSecretVersionPrototype(SecretVersionPrototype): """ def __init__( - self, - *, - password: Optional[str] = None, - custom_metadata: Optional[dict] = None, - version_custom_metadata: Optional[dict] = None, + self, + *, + password: Optional[str] = None, + custom_metadata: Optional[dict] = None, + version_custom_metadata: Optional[dict] = None, ) -> None: """ Initialize a UsernamePasswordSecretVersionPrototype object. @@ -30377,7 +30358,6 @@ def __ne__(self, other: 'UsernamePasswordSecretVersionPrototype') -> bool: """Return `true` when self and other are not equal, false otherwise.""" return not self == other - ############################################################################## # Pagers ############################################################################## @@ -30389,15 +30369,15 @@ class SecretsPager: """ def __init__( - self, - *, - client: SecretsManagerV2, - limit: int = None, - sort: str = None, - search: str = None, - groups: List[str] = None, - secret_types: List[str] = None, - match_all_labels: List[str] = None, + self, + *, + client: SecretsManagerV2, + limit: int = None, + sort: str = None, + search: str = None, + groups: List[str] = None, + secret_types: List[str] = None, + match_all_labels: List[str] = None, ) -> None: """ Initialize a SecretsPager object. @@ -30505,12 +30485,12 @@ class SecretsLocksPager: """ def __init__( - self, - *, - client: SecretsManagerV2, - limit: int = None, - search: str = None, - groups: List[str] = None, + self, + *, + client: SecretsManagerV2, + limit: int = None, + search: str = None, + groups: List[str] = None, ) -> None: """ Initialize a SecretsLocksPager object. @@ -30593,13 +30573,13 @@ class SecretLocksPager: """ def __init__( - self, - *, - client: SecretsManagerV2, - id: str, - limit: int = None, - sort: str = None, - search: str = None, + self, + *, + client: SecretsManagerV2, + id: str, + limit: int = None, + sort: str = None, + search: str = None, ) -> None: """ Initialize a SecretLocksPager object. @@ -30683,14 +30663,14 @@ class SecretVersionLocksPager: """ def __init__( - self, - *, - client: SecretsManagerV2, - secret_id: str, - id: str, - limit: int = None, - sort: str = None, - search: str = None, + self, + *, + client: SecretsManagerV2, + secret_id: str, + id: str, + limit: int = None, + sort: str = None, + search: str = None, ) -> None: """ Initialize a SecretVersionLocksPager object. @@ -30779,13 +30759,13 @@ class ConfigurationsPager: """ def __init__( - self, - *, - client: SecretsManagerV2, - limit: int = None, - sort: str = None, - search: str = None, - secret_types: List[str] = None, + self, + *, + client: SecretsManagerV2, + limit: int = None, + sort: str = None, + search: str = None, + secret_types: List[str] = None, ) -> None: """ Initialize a ConfigurationsPager object. diff --git a/requirements.txt b/requirements.txt index 8e338b7..f8bc25c 100644 --- a/requirements.txt +++ b/requirements.txt @@ -1,4 +1,4 @@ requests>=2.28.2,<3.0.0 urllib3>=2.1.0,<3.0.0 python_dateutil>=2.5.3,<3.0.0 -ibm_cloud_sdk_core>=3.20.6,<4.0.0 +ibm_cloud_sdk_core>=3.21.0,<4.0.0 diff --git a/test/unit/test_secrets_manager_v2.py b/test/unit/test_secrets_manager_v2.py index 071f333..1bc7c14 100644 --- a/test/unit/test_secrets_manager_v2.py +++ b/test/unit/test_secrets_manager_v2.py @@ -17,16 +17,20 @@ Unit Tests for SecretsManagerV2 """ +from datetime import datetime, timezone +from ibm_cloud_sdk_core.authenticators.no_auth_authenticator import NoAuthAuthenticator +from ibm_cloud_sdk_core.utils import datetime_to_string, string_to_datetime +import inspect +import json import os -import re -import urllib - import pytest +import re +import requests import responses -from ibm_cloud_sdk_core.authenticators.no_auth_authenticator import NoAuthAuthenticator - +import urllib from ibm_secrets_manager_sdk.secrets_manager_v2 import * + _service = SecretsManagerV2( authenticator=NoAuthAuthenticator() ) @@ -1556,8 +1560,7 @@ def test_get_secret_version_all_params(self): get_secret_version() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535') mock_response = '{"auto_rotated": true, "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_name": "my-secret", "secret_type": "arbitrary", "secret_group_id": "default", "payload_available": false, "alias": "current", "version_custom_metadata": {"anyKey": "anyValue"}, "secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' responses.add( responses.GET, @@ -1597,8 +1600,7 @@ def test_get_secret_version_value_error(self): test_get_secret_version_value_error() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535') mock_response = '{"auto_rotated": true, "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_name": "my-secret", "secret_type": "arbitrary", "secret_group_id": "default", "payload_available": false, "alias": "current", "version_custom_metadata": {"anyKey": "anyValue"}, "secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' responses.add( responses.GET, @@ -1643,8 +1645,7 @@ def test_delete_secret_version_data_all_params(self): delete_secret_version_data() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/secret_data') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/secret_data') responses.add( responses.DELETE, url, @@ -1681,8 +1682,7 @@ def test_delete_secret_version_data_value_error(self): test_delete_secret_version_data_value_error() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/secret_data') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/secret_data') responses.add( responses.DELETE, url, @@ -1724,8 +1724,7 @@ def test_get_secret_version_metadata_all_params(self): get_secret_version_metadata() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/metadata') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/metadata') mock_response = '{"auto_rotated": true, "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_name": "my-secret", "secret_type": "arbitrary", "secret_group_id": "default", "payload_available": false, "alias": "current", "version_custom_metadata": {"anyKey": "anyValue"}, "secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "expiration_date": "2033-04-12T23:20:50.520Z"}' responses.add( responses.GET, @@ -1765,8 +1764,7 @@ def test_get_secret_version_metadata_value_error(self): test_get_secret_version_metadata_value_error() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/metadata') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/metadata') mock_response = '{"auto_rotated": true, "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_name": "my-secret", "secret_type": "arbitrary", "secret_group_id": "default", "payload_available": false, "alias": "current", "version_custom_metadata": {"anyKey": "anyValue"}, "secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "expiration_date": "2033-04-12T23:20:50.520Z"}' responses.add( responses.GET, @@ -1811,8 +1809,7 @@ def test_update_secret_version_metadata_all_params(self): update_secret_version_metadata() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/metadata') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/metadata') mock_response = '{"auto_rotated": true, "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_name": "my-secret", "secret_type": "arbitrary", "secret_group_id": "default", "payload_available": false, "alias": "current", "version_custom_metadata": {"anyKey": "anyValue"}, "secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "expiration_date": "2033-04-12T23:20:50.520Z"}' responses.add( responses.PATCH, @@ -1861,8 +1858,7 @@ def test_update_secret_version_metadata_value_error(self): test_update_secret_version_metadata_value_error() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/metadata') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/metadata') mock_response = '{"auto_rotated": true, "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_name": "my-secret", "secret_type": "arbitrary", "secret_group_id": "default", "payload_available": false, "alias": "current", "version_custom_metadata": {"anyKey": "anyValue"}, "secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "expiration_date": "2033-04-12T23:20:50.520Z"}' responses.add( responses.PATCH, @@ -1913,8 +1909,7 @@ def test_create_secret_version_action_all_params(self): create_secret_version_action() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/actions') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/actions') mock_response = '{"action_type": "private_cert_action_revoke_certificate", "revocation_time_seconds": 23}' responses.add( responses.POST, @@ -1963,8 +1958,7 @@ def test_create_secret_version_action_value_error(self): test_create_secret_version_action_value_error() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/actions') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/actions') mock_response = '{"action_type": "private_cert_action_revoke_certificate", "revocation_time_seconds": 23}' responses.add( responses.POST, @@ -2705,8 +2699,7 @@ def test_list_secret_version_locks_all_params(self): list_secret_version_locks() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks') mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "locks": [{"name": "lock-example", "description": "description", "attributes": {"anyKey": "anyValue"}, "created_at": "2022-04-12T23:20:50.520Z", "updated_at": "2022-04-12T23:20:50.520Z", "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "secret_group_id": "default", "secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_version_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_version_alias": "current"}]}' responses.add( responses.GET, @@ -2761,8 +2754,7 @@ def test_list_secret_version_locks_required_params(self): test_list_secret_version_locks_required_params() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks') mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "locks": [{"name": "lock-example", "description": "description", "attributes": {"anyKey": "anyValue"}, "created_at": "2022-04-12T23:20:50.520Z", "updated_at": "2022-04-12T23:20:50.520Z", "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "secret_group_id": "default", "secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_version_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_version_alias": "current"}]}' responses.add( responses.GET, @@ -2802,8 +2794,7 @@ def test_list_secret_version_locks_value_error(self): test_list_secret_version_locks_value_error() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks') mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "locks": [{"name": "lock-example", "description": "description", "attributes": {"anyKey": "anyValue"}, "created_at": "2022-04-12T23:20:50.520Z", "updated_at": "2022-04-12T23:20:50.520Z", "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "secret_group_id": "default", "secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_version_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_version_alias": "current"}]}' responses.add( responses.GET, @@ -2842,8 +2833,7 @@ def test_list_secret_version_locks_with_pager_get_next(self): test_list_secret_version_locks_with_pager_get_next() """ # Set up a two-page mock response - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks') mock_response1 = '{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"limit":1,"locks":[{"name":"lock-example","description":"description","attributes":{"anyKey":"anyValue"},"created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","secret_group_id":"default","secret_id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","secret_version_id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","secret_version_alias":"current"}]}' mock_response2 = '{"total_count":2,"limit":1,"locks":[{"name":"lock-example","description":"description","attributes":{"anyKey":"anyValue"},"created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","secret_group_id":"default","secret_id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","secret_version_id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","secret_version_alias":"current"}]}' responses.add( @@ -2883,8 +2873,7 @@ def test_list_secret_version_locks_with_pager_get_all(self): test_list_secret_version_locks_with_pager_get_all() """ # Set up a two-page mock response - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks') mock_response1 = '{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"limit":1,"locks":[{"name":"lock-example","description":"description","attributes":{"anyKey":"anyValue"},"created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","secret_group_id":"default","secret_id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","secret_version_id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","secret_version_alias":"current"}]}' mock_response2 = '{"total_count":2,"limit":1,"locks":[{"name":"lock-example","description":"description","attributes":{"anyKey":"anyValue"},"created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","secret_group_id":"default","secret_id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","secret_version_id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","secret_version_alias":"current"}]}' responses.add( @@ -2927,8 +2916,7 @@ def test_create_secret_version_locks_bulk_all_params(self): create_secret_version_locks_bulk() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') mock_response = '{"secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_group_id": "default", "secret_type": "arbitrary", "secret_name": "my-secret", "versions": [{"version_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "version_alias": "current", "locks": ["lock-example"], "payload_available": false}]}' responses.add( responses.POST, @@ -2985,8 +2973,7 @@ def test_create_secret_version_locks_bulk_required_params(self): test_create_secret_version_locks_bulk_required_params() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') mock_response = '{"secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_group_id": "default", "secret_type": "arbitrary", "secret_name": "my-secret", "versions": [{"version_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "version_alias": "current", "locks": ["lock-example"], "payload_available": false}]}' responses.add( responses.POST, @@ -3037,8 +3024,7 @@ def test_create_secret_version_locks_bulk_value_error(self): test_create_secret_version_locks_bulk_value_error() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') mock_response = '{"secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_group_id": "default", "secret_type": "arbitrary", "secret_name": "my-secret", "versions": [{"version_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "version_alias": "current", "locks": ["lock-example"], "payload_available": false}]}' responses.add( responses.POST, @@ -3091,8 +3077,7 @@ def test_delete_secret_version_locks_bulk_all_params(self): delete_secret_version_locks_bulk() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') mock_response = '{"secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_group_id": "default", "secret_type": "arbitrary", "secret_name": "my-secret", "versions": [{"version_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "version_alias": "current", "locks": ["lock-example"], "payload_available": false}]}' responses.add( responses.DELETE, @@ -3138,8 +3123,7 @@ def test_delete_secret_version_locks_bulk_required_params(self): test_delete_secret_version_locks_bulk_required_params() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') mock_response = '{"secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_group_id": "default", "secret_type": "arbitrary", "secret_name": "my-secret", "versions": [{"version_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "version_alias": "current", "locks": ["lock-example"], "payload_available": false}]}' responses.add( responses.DELETE, @@ -3179,8 +3163,7 @@ def test_delete_secret_version_locks_bulk_value_error(self): test_delete_secret_version_locks_bulk_value_error() """ # Set up mock - url = preprocess_url( - '/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') + url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/versions/eb4cf24d-9cae-424b-945e-159788a5f535/locks_bulk') mock_response = '{"secret_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "secret_group_id": "default", "secret_type": "arbitrary", "secret_name": "my-secret", "versions": [{"version_id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "version_alias": "current", "locks": ["lock-example"], "payload_available": false}]}' responses.add( responses.DELETE, @@ -3279,8 +3262,7 @@ def test_create_configuration_all_params(self): configuration_prototype_model['config_type'] = 'public_cert_configuration_dns_cloud_internet_services' configuration_prototype_model['name'] = 'example-cloud-internet-services-config' configuration_prototype_model['cloud_internet_services_apikey'] = '5ipu_ykv0PMp2MhxQnDMn7VzrkSlBwi3BOI8uthi_EXZ' - configuration_prototype_model[ - 'cloud_internet_services_crn'] = 'crn:v1:bluemix:public:internet-svcs:global:a/128e84fcca45c1224aae525d31ef2b52:009a0357-1460-42b4-b903-10580aba7dd8::' + configuration_prototype_model['cloud_internet_services_crn'] = 'crn:v1:bluemix:public:internet-svcs:global:a/128e84fcca45c1224aae525d31ef2b52:009a0357-1460-42b4-b903-10580aba7dd8::' # Set up parameter values configuration_prototype = configuration_prototype_model @@ -3328,8 +3310,7 @@ def test_create_configuration_value_error(self): configuration_prototype_model['config_type'] = 'public_cert_configuration_dns_cloud_internet_services' configuration_prototype_model['name'] = 'example-cloud-internet-services-config' configuration_prototype_model['cloud_internet_services_apikey'] = '5ipu_ykv0PMp2MhxQnDMn7VzrkSlBwi3BOI8uthi_EXZ' - configuration_prototype_model[ - 'cloud_internet_services_crn'] = 'crn:v1:bluemix:public:internet-svcs:global:a/128e84fcca45c1224aae525d31ef2b52:009a0357-1460-42b4-b903-10580aba7dd8::' + configuration_prototype_model['cloud_internet_services_crn'] = 'crn:v1:bluemix:public:internet-svcs:global:a/128e84fcca45c1224aae525d31ef2b52:009a0357-1460-42b4-b903-10580aba7dd8::' # Set up parameter values configuration_prototype = configuration_prototype_model @@ -3365,7 +3346,7 @@ def test_list_configurations_all_params(self): """ # Set up mock url = preprocess_url('/api/v2/configurations') - mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "configurations": [{"config_type": "iam_credentials_configuration", "name": "my-secret-engine-config", "secret_type": "arbitrary", "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "updated_at": "2022-04-12T23:20:50.520Z"}]}' + mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "configurations": [{"config_type": "iam_credentials_configuration", "name": "my-secret-engine-config", "secret_type": "arbitrary", "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "updated_at": "2022-04-12T23:20:50.520Z", "disabled": true}]}' responses.add( responses.GET, url, @@ -3419,7 +3400,7 @@ def test_list_configurations_required_params(self): """ # Set up mock url = preprocess_url('/api/v2/configurations') - mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "configurations": [{"config_type": "iam_credentials_configuration", "name": "my-secret-engine-config", "secret_type": "arbitrary", "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "updated_at": "2022-04-12T23:20:50.520Z"}]}' + mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "configurations": [{"config_type": "iam_credentials_configuration", "name": "my-secret-engine-config", "secret_type": "arbitrary", "created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "updated_at": "2022-04-12T23:20:50.520Z", "disabled": true}]}' responses.add( responses.GET, url, @@ -3451,8 +3432,8 @@ def test_list_configurations_with_pager_get_next(self): """ # Set up a two-page mock response url = preprocess_url('/api/v2/configurations') - mock_response1 = '{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z"}],"limit":1}' - mock_response2 = '{"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z"}],"limit":1}' + mock_response1 = '{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z","disabled":true}],"limit":1}' + mock_response2 = '{"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z","disabled":true}],"limit":1}' responses.add( responses.GET, url, @@ -3490,8 +3471,8 @@ def test_list_configurations_with_pager_get_all(self): """ # Set up a two-page mock response url = preprocess_url('/api/v2/configurations') - mock_response1 = '{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z"}],"limit":1}' - mock_response2 = '{"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z"}],"limit":1}' + mock_response1 = '{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z","disabled":true}],"limit":1}' + mock_response2 = '{"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z","disabled":true}],"limit":1}' responses.add( responses.GET, url, @@ -3665,8 +3646,7 @@ def test_update_configuration_all_params(self): # Construct a dict representation of a PublicCertificateConfigurationDNSCloudInternetServicesPatch model configuration_patch_model = {} configuration_patch_model['cloud_internet_services_apikey'] = '5ipu_ykv0PMp2MhxQnDMn7VzrkSlBwi3BOI8uthi_EXZ' - configuration_patch_model[ - 'cloud_internet_services_crn'] = 'crn:v1:bluemix:public:internet-svcs:global:a/128e84fcca45c1224aae525d31ef2b52:009a0357-1460-42b4-b903-10580aba7dd8::' + configuration_patch_model['cloud_internet_services_crn'] = 'crn:v1:bluemix:public:internet-svcs:global:a/128e84fcca45c1224aae525d31ef2b52:009a0357-1460-42b4-b903-10580aba7dd8::' # Set up parameter values name = 'configuration-name' @@ -3716,8 +3696,7 @@ def test_update_configuration_required_params(self): # Construct a dict representation of a PublicCertificateConfigurationDNSCloudInternetServicesPatch model configuration_patch_model = {} configuration_patch_model['cloud_internet_services_apikey'] = '5ipu_ykv0PMp2MhxQnDMn7VzrkSlBwi3BOI8uthi_EXZ' - configuration_patch_model[ - 'cloud_internet_services_crn'] = 'crn:v1:bluemix:public:internet-svcs:global:a/128e84fcca45c1224aae525d31ef2b52:009a0357-1460-42b4-b903-10580aba7dd8::' + configuration_patch_model['cloud_internet_services_crn'] = 'crn:v1:bluemix:public:internet-svcs:global:a/128e84fcca45c1224aae525d31ef2b52:009a0357-1460-42b4-b903-10580aba7dd8::' # Set up parameter values name = 'configuration-name' @@ -3765,8 +3744,7 @@ def test_update_configuration_value_error(self): # Construct a dict representation of a PublicCertificateConfigurationDNSCloudInternetServicesPatch model configuration_patch_model = {} configuration_patch_model['cloud_internet_services_apikey'] = '5ipu_ykv0PMp2MhxQnDMn7VzrkSlBwi3BOI8uthi_EXZ' - configuration_patch_model[ - 'cloud_internet_services_crn'] = 'crn:v1:bluemix:public:internet-svcs:global:a/128e84fcca45c1224aae525d31ef2b52:009a0357-1460-42b4-b903-10580aba7dd8::' + configuration_patch_model['cloud_internet_services_crn'] = 'crn:v1:bluemix:public:internet-svcs:global:a/128e84fcca45c1224aae525d31ef2b52:009a0357-1460-42b4-b903-10580aba7dd8::' # Set up parameter values name = 'configuration-name' @@ -4127,11 +4105,9 @@ def test_create_notifications_registration_all_params(self): assert response.status_code == 201 # Validate body params req_body = json.loads(str(responses.calls[0].request.body, 'utf-8')) - assert req_body[ - 'event_notifications_instance_crn'] == 'crn:v1:bluemix:public:event-notifications:us-south:a/22018f3c34ff4ff193698d15ca316946:578ad1a4-2fd8-4e66-95d5-79a842ba91f8::' + assert req_body['event_notifications_instance_crn'] == 'crn:v1:bluemix:public:event-notifications:us-south:a/22018f3c34ff4ff193698d15ca316946:578ad1a4-2fd8-4e66-95d5-79a842ba91f8::' assert req_body['event_notifications_source_name'] == 'My Secrets Manager' - assert req_body[ - 'event_notifications_source_description'] == 'Optional description of this source in an Event Notifications instance.' + assert req_body['event_notifications_source_description'] == 'Optional description of this source in an Event Notifications instance.' def test_create_notifications_registration_all_params_with_retries(self): # Enable retries and run test_create_notifications_registration_all_params. @@ -4321,8 +4297,7 @@ def test_certificate_issuance_info_serialization(self): assert certificate_issuance_info_model != False # Construct a model instance of CertificateIssuanceInfo by calling from_dict on the json representation - certificate_issuance_info_model_dict = CertificateIssuanceInfo.from_dict( - certificate_issuance_info_model_json).__dict__ + certificate_issuance_info_model_dict = CertificateIssuanceInfo.from_dict(certificate_issuance_info_model_json).__dict__ certificate_issuance_info_model2 = CertificateIssuanceInfo(**certificate_issuance_info_model_dict) # Verify the model instances are equivalent @@ -4424,6 +4399,7 @@ def test_configuration_metadata_paginated_collection_serialization(self): configuration_metadata_model['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' configuration_metadata_model['created_at'] = '2022-04-12T23:20:50.520000Z' configuration_metadata_model['updated_at'] = '2022-04-12T23:20:50.520000Z' + configuration_metadata_model['disabled'] = True # Construct a json representation of a ConfigurationMetadataPaginatedCollection model configuration_metadata_paginated_collection_model_json = {} @@ -4437,15 +4413,12 @@ def test_configuration_metadata_paginated_collection_serialization(self): configuration_metadata_paginated_collection_model_json['configurations'] = [configuration_metadata_model] # Construct a model instance of ConfigurationMetadataPaginatedCollection by calling from_dict on the json representation - configuration_metadata_paginated_collection_model = ConfigurationMetadataPaginatedCollection.from_dict( - configuration_metadata_paginated_collection_model_json) + configuration_metadata_paginated_collection_model = ConfigurationMetadataPaginatedCollection.from_dict(configuration_metadata_paginated_collection_model_json) assert configuration_metadata_paginated_collection_model != False # Construct a model instance of ConfigurationMetadataPaginatedCollection by calling from_dict on the json representation - configuration_metadata_paginated_collection_model_dict = ConfigurationMetadataPaginatedCollection.from_dict( - configuration_metadata_paginated_collection_model_json).__dict__ - configuration_metadata_paginated_collection_model2 = ConfigurationMetadataPaginatedCollection( - **configuration_metadata_paginated_collection_model_dict) + configuration_metadata_paginated_collection_model_dict = ConfigurationMetadataPaginatedCollection.from_dict(configuration_metadata_paginated_collection_model_json).__dict__ + configuration_metadata_paginated_collection_model2 = ConfigurationMetadataPaginatedCollection(**configuration_metadata_paginated_collection_model_dict) # Verify the model instances are equivalent assert configuration_metadata_paginated_collection_model == configuration_metadata_paginated_collection_model2 @@ -4474,8 +4447,7 @@ def test_notifications_registration_serialization(self): assert notifications_registration_model != False # Construct a model instance of NotificationsRegistration by calling from_dict on the json representation - notifications_registration_model_dict = NotificationsRegistration.from_dict( - notifications_registration_model_json).__dict__ + notifications_registration_model_dict = NotificationsRegistration.from_dict(notifications_registration_model_json).__dict__ notifications_registration_model2 = NotificationsRegistration(**notifications_registration_model_dict) # Verify the model instances are equivalent @@ -4505,8 +4477,7 @@ def test_paginated_collection_first_serialization(self): assert paginated_collection_first_model != False # Construct a model instance of PaginatedCollectionFirst by calling from_dict on the json representation - paginated_collection_first_model_dict = PaginatedCollectionFirst.from_dict( - paginated_collection_first_model_json).__dict__ + paginated_collection_first_model_dict = PaginatedCollectionFirst.from_dict(paginated_collection_first_model_json).__dict__ paginated_collection_first_model2 = PaginatedCollectionFirst(**paginated_collection_first_model_dict) # Verify the model instances are equivalent @@ -4536,8 +4507,7 @@ def test_paginated_collection_last_serialization(self): assert paginated_collection_last_model != False # Construct a model instance of PaginatedCollectionLast by calling from_dict on the json representation - paginated_collection_last_model_dict = PaginatedCollectionLast.from_dict( - paginated_collection_last_model_json).__dict__ + paginated_collection_last_model_dict = PaginatedCollectionLast.from_dict(paginated_collection_last_model_json).__dict__ paginated_collection_last_model2 = PaginatedCollectionLast(**paginated_collection_last_model_dict) # Verify the model instances are equivalent @@ -4567,8 +4537,7 @@ def test_paginated_collection_next_serialization(self): assert paginated_collection_next_model != False # Construct a model instance of PaginatedCollectionNext by calling from_dict on the json representation - paginated_collection_next_model_dict = PaginatedCollectionNext.from_dict( - paginated_collection_next_model_json).__dict__ + paginated_collection_next_model_dict = PaginatedCollectionNext.from_dict(paginated_collection_next_model_json).__dict__ paginated_collection_next_model2 = PaginatedCollectionNext(**paginated_collection_next_model_dict) # Verify the model instances are equivalent @@ -4594,13 +4563,11 @@ def test_paginated_collection_previous_serialization(self): paginated_collection_previous_model_json['href'] = 'testString' # Construct a model instance of PaginatedCollectionPrevious by calling from_dict on the json representation - paginated_collection_previous_model = PaginatedCollectionPrevious.from_dict( - paginated_collection_previous_model_json) + paginated_collection_previous_model = PaginatedCollectionPrevious.from_dict(paginated_collection_previous_model_json) assert paginated_collection_previous_model != False # Construct a model instance of PaginatedCollectionPrevious by calling from_dict on the json representation - paginated_collection_previous_model_dict = PaginatedCollectionPrevious.from_dict( - paginated_collection_previous_model_json).__dict__ + paginated_collection_previous_model_dict = PaginatedCollectionPrevious.from_dict(paginated_collection_previous_model_json).__dict__ paginated_collection_previous_model2 = PaginatedCollectionPrevious(**paginated_collection_previous_model_dict) # Verify the model instances are equivalent @@ -4633,8 +4600,7 @@ def test_password_generation_policy_serialization(self): assert password_generation_policy_model != False # Construct a model instance of PasswordGenerationPolicy by calling from_dict on the json representation - password_generation_policy_model_dict = PasswordGenerationPolicy.from_dict( - password_generation_policy_model_json).__dict__ + password_generation_policy_model_dict = PasswordGenerationPolicy.from_dict(password_generation_policy_model_json).__dict__ password_generation_policy_model2 = PasswordGenerationPolicy(**password_generation_policy_model_dict) # Verify the model instances are equivalent @@ -4663,15 +4629,12 @@ def test_password_generation_policy_patch_serialization(self): password_generation_policy_patch_model_json['include_uppercase'] = True # Construct a model instance of PasswordGenerationPolicyPatch by calling from_dict on the json representation - password_generation_policy_patch_model = PasswordGenerationPolicyPatch.from_dict( - password_generation_policy_patch_model_json) + password_generation_policy_patch_model = PasswordGenerationPolicyPatch.from_dict(password_generation_policy_patch_model_json) assert password_generation_policy_patch_model != False # Construct a model instance of PasswordGenerationPolicyPatch by calling from_dict on the json representation - password_generation_policy_patch_model_dict = PasswordGenerationPolicyPatch.from_dict( - password_generation_policy_patch_model_json).__dict__ - password_generation_policy_patch_model2 = PasswordGenerationPolicyPatch( - **password_generation_policy_patch_model_dict) + password_generation_policy_patch_model_dict = PasswordGenerationPolicyPatch.from_dict(password_generation_policy_patch_model_json).__dict__ + password_generation_policy_patch_model2 = PasswordGenerationPolicyPatch(**password_generation_policy_patch_model_dict) # Verify the model instances are equivalent assert password_generation_policy_patch_model == password_generation_policy_patch_model2 @@ -4699,13 +4662,11 @@ def test_password_generation_policy_ro_serialization(self): password_generation_policy_ro_model_json['include_uppercase'] = True # Construct a model instance of PasswordGenerationPolicyRO by calling from_dict on the json representation - password_generation_policy_ro_model = PasswordGenerationPolicyRO.from_dict( - password_generation_policy_ro_model_json) + password_generation_policy_ro_model = PasswordGenerationPolicyRO.from_dict(password_generation_policy_ro_model_json) assert password_generation_policy_ro_model != False # Construct a model instance of PasswordGenerationPolicyRO by calling from_dict on the json representation - password_generation_policy_ro_model_dict = PasswordGenerationPolicyRO.from_dict( - password_generation_policy_ro_model_json).__dict__ + password_generation_policy_ro_model_dict = PasswordGenerationPolicyRO.from_dict(password_generation_policy_ro_model_json).__dict__ password_generation_policy_ro_model2 = PasswordGenerationPolicyRO(**password_generation_policy_ro_model_dict) # Verify the model instances are equivalent @@ -4730,10 +4691,8 @@ def test_private_certificate_crypto_key_serialization(self): private_certificate_crypto_provider_model = {} # PrivateCertificateCryptoProviderHPCS private_certificate_crypto_provider_model['type'] = 'hyper_protect_crypto_services' - private_certificate_crypto_provider_model[ - 'instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' - private_certificate_crypto_provider_model[ - 'pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' + private_certificate_crypto_provider_model['instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' + private_certificate_crypto_provider_model['pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' private_certificate_crypto_provider_model['private_keystore_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' # Construct a json representation of a PrivateCertificateCryptoKey model @@ -4744,13 +4703,11 @@ def test_private_certificate_crypto_key_serialization(self): private_certificate_crypto_key_model_json['provider'] = private_certificate_crypto_provider_model # Construct a model instance of PrivateCertificateCryptoKey by calling from_dict on the json representation - private_certificate_crypto_key_model = PrivateCertificateCryptoKey.from_dict( - private_certificate_crypto_key_model_json) + private_certificate_crypto_key_model = PrivateCertificateCryptoKey.from_dict(private_certificate_crypto_key_model_json) assert private_certificate_crypto_key_model != False # Construct a model instance of PrivateCertificateCryptoKey by calling from_dict on the json representation - private_certificate_crypto_key_model_dict = PrivateCertificateCryptoKey.from_dict( - private_certificate_crypto_key_model_json).__dict__ + private_certificate_crypto_key_model_dict = PrivateCertificateCryptoKey.from_dict(private_certificate_crypto_key_model_json).__dict__ private_certificate_crypto_key_model2 = PrivateCertificateCryptoKey(**private_certificate_crypto_key_model_dict) # Verify the model instances are equivalent @@ -4776,15 +4733,12 @@ def test_public_certificate_rotation_object_serialization(self): public_certificate_rotation_object_model_json['rotate_keys'] = True # Construct a model instance of PublicCertificateRotationObject by calling from_dict on the json representation - public_certificate_rotation_object_model = PublicCertificateRotationObject.from_dict( - public_certificate_rotation_object_model_json) + public_certificate_rotation_object_model = PublicCertificateRotationObject.from_dict(public_certificate_rotation_object_model_json) assert public_certificate_rotation_object_model != False # Construct a model instance of PublicCertificateRotationObject by calling from_dict on the json representation - public_certificate_rotation_object_model_dict = PublicCertificateRotationObject.from_dict( - public_certificate_rotation_object_model_json).__dict__ - public_certificate_rotation_object_model2 = PublicCertificateRotationObject( - **public_certificate_rotation_object_model_dict) + public_certificate_rotation_object_model_dict = PublicCertificateRotationObject.from_dict(public_certificate_rotation_object_model_json).__dict__ + public_certificate_rotation_object_model2 = PublicCertificateRotationObject(**public_certificate_rotation_object_model_dict) # Verify the model instances are equivalent assert public_certificate_rotation_object_model == public_certificate_rotation_object_model2 @@ -4857,8 +4811,7 @@ def test_secret_group_collection_serialization(self): assert secret_group_collection_model != False # Construct a model instance of SecretGroupCollection by calling from_dict on the json representation - secret_group_collection_model_dict = SecretGroupCollection.from_dict( - secret_group_collection_model_json).__dict__ + secret_group_collection_model_dict = SecretGroupCollection.from_dict(secret_group_collection_model_json).__dict__ secret_group_collection_model2 = SecretGroupCollection(**secret_group_collection_model_dict) # Verify the model instances are equivalent @@ -5060,15 +5013,12 @@ def test_secret_locks_paginated_collection_serialization(self): secret_locks_paginated_collection_model_json['locks'] = [secret_lock_model] # Construct a model instance of SecretLocksPaginatedCollection by calling from_dict on the json representation - secret_locks_paginated_collection_model = SecretLocksPaginatedCollection.from_dict( - secret_locks_paginated_collection_model_json) + secret_locks_paginated_collection_model = SecretLocksPaginatedCollection.from_dict(secret_locks_paginated_collection_model_json) assert secret_locks_paginated_collection_model != False # Construct a model instance of SecretLocksPaginatedCollection by calling from_dict on the json representation - secret_locks_paginated_collection_model_dict = SecretLocksPaginatedCollection.from_dict( - secret_locks_paginated_collection_model_json).__dict__ - secret_locks_paginated_collection_model2 = SecretLocksPaginatedCollection( - **secret_locks_paginated_collection_model_dict) + secret_locks_paginated_collection_model_dict = SecretLocksPaginatedCollection.from_dict(secret_locks_paginated_collection_model_json).__dict__ + secret_locks_paginated_collection_model2 = SecretLocksPaginatedCollection(**secret_locks_paginated_collection_model_dict) # Verify the model instances are equivalent assert secret_locks_paginated_collection_model == secret_locks_paginated_collection_model2 @@ -5128,15 +5078,12 @@ def test_secret_metadata_paginated_collection_serialization(self): secret_metadata_paginated_collection_model_json['secrets'] = [secret_metadata_model] # Construct a model instance of SecretMetadataPaginatedCollection by calling from_dict on the json representation - secret_metadata_paginated_collection_model = SecretMetadataPaginatedCollection.from_dict( - secret_metadata_paginated_collection_model_json) + secret_metadata_paginated_collection_model = SecretMetadataPaginatedCollection.from_dict(secret_metadata_paginated_collection_model_json) assert secret_metadata_paginated_collection_model != False # Construct a model instance of SecretMetadataPaginatedCollection by calling from_dict on the json representation - secret_metadata_paginated_collection_model_dict = SecretMetadataPaginatedCollection.from_dict( - secret_metadata_paginated_collection_model_json).__dict__ - secret_metadata_paginated_collection_model2 = SecretMetadataPaginatedCollection( - **secret_metadata_paginated_collection_model_dict) + secret_metadata_paginated_collection_model_dict = SecretMetadataPaginatedCollection.from_dict(secret_metadata_paginated_collection_model_json).__dict__ + secret_metadata_paginated_collection_model2 = SecretMetadataPaginatedCollection(**secret_metadata_paginated_collection_model_dict) # Verify the model instances are equivalent assert secret_metadata_paginated_collection_model == secret_metadata_paginated_collection_model2 @@ -5227,15 +5174,12 @@ def test_secret_version_locks_paginated_collection_serialization(self): secret_version_locks_paginated_collection_model_json['locks'] = [secret_lock_model] # Construct a model instance of SecretVersionLocksPaginatedCollection by calling from_dict on the json representation - secret_version_locks_paginated_collection_model = SecretVersionLocksPaginatedCollection.from_dict( - secret_version_locks_paginated_collection_model_json) + secret_version_locks_paginated_collection_model = SecretVersionLocksPaginatedCollection.from_dict(secret_version_locks_paginated_collection_model_json) assert secret_version_locks_paginated_collection_model != False # Construct a model instance of SecretVersionLocksPaginatedCollection by calling from_dict on the json representation - secret_version_locks_paginated_collection_model_dict = SecretVersionLocksPaginatedCollection.from_dict( - secret_version_locks_paginated_collection_model_json).__dict__ - secret_version_locks_paginated_collection_model2 = SecretVersionLocksPaginatedCollection( - **secret_version_locks_paginated_collection_model_dict) + secret_version_locks_paginated_collection_model_dict = SecretVersionLocksPaginatedCollection.from_dict(secret_version_locks_paginated_collection_model_json).__dict__ + secret_version_locks_paginated_collection_model2 = SecretVersionLocksPaginatedCollection(**secret_version_locks_paginated_collection_model_dict) # Verify the model instances are equivalent assert secret_version_locks_paginated_collection_model == secret_version_locks_paginated_collection_model2 @@ -5276,15 +5220,12 @@ def test_secret_version_metadata_collection_serialization(self): secret_version_metadata_collection_model_json['total_count'] = 0 # Construct a model instance of SecretVersionMetadataCollection by calling from_dict on the json representation - secret_version_metadata_collection_model = SecretVersionMetadataCollection.from_dict( - secret_version_metadata_collection_model_json) + secret_version_metadata_collection_model = SecretVersionMetadataCollection.from_dict(secret_version_metadata_collection_model_json) assert secret_version_metadata_collection_model != False # Construct a model instance of SecretVersionMetadataCollection by calling from_dict on the json representation - secret_version_metadata_collection_model_dict = SecretVersionMetadataCollection.from_dict( - secret_version_metadata_collection_model_json).__dict__ - secret_version_metadata_collection_model2 = SecretVersionMetadataCollection( - **secret_version_metadata_collection_model_dict) + secret_version_metadata_collection_model_dict = SecretVersionMetadataCollection.from_dict(secret_version_metadata_collection_model_json).__dict__ + secret_version_metadata_collection_model2 = SecretVersionMetadataCollection(**secret_version_metadata_collection_model_dict) # Verify the model instances are equivalent assert secret_version_metadata_collection_model == secret_version_metadata_collection_model2 @@ -5309,13 +5250,11 @@ def test_secret_version_metadata_patch_serialization(self): secret_version_metadata_patch_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of SecretVersionMetadataPatch by calling from_dict on the json representation - secret_version_metadata_patch_model = SecretVersionMetadataPatch.from_dict( - secret_version_metadata_patch_model_json) + secret_version_metadata_patch_model = SecretVersionMetadataPatch.from_dict(secret_version_metadata_patch_model_json) assert secret_version_metadata_patch_model != False # Construct a model instance of SecretVersionMetadataPatch by calling from_dict on the json representation - secret_version_metadata_patch_model_dict = SecretVersionMetadataPatch.from_dict( - secret_version_metadata_patch_model_json).__dict__ + secret_version_metadata_patch_model_dict = SecretVersionMetadataPatch.from_dict(secret_version_metadata_patch_model_json).__dict__ secret_version_metadata_patch_model2 = SecretVersionMetadataPatch(**secret_version_metadata_patch_model_dict) # Verify the model instances are equivalent @@ -5374,15 +5313,12 @@ def test_secrets_locks_paginated_collection_serialization(self): secrets_locks_paginated_collection_model_json['secrets_locks'] = [secret_locks_model] # Construct a model instance of SecretsLocksPaginatedCollection by calling from_dict on the json representation - secrets_locks_paginated_collection_model = SecretsLocksPaginatedCollection.from_dict( - secrets_locks_paginated_collection_model_json) + secrets_locks_paginated_collection_model = SecretsLocksPaginatedCollection.from_dict(secrets_locks_paginated_collection_model_json) assert secrets_locks_paginated_collection_model != False # Construct a model instance of SecretsLocksPaginatedCollection by calling from_dict on the json representation - secrets_locks_paginated_collection_model_dict = SecretsLocksPaginatedCollection.from_dict( - secrets_locks_paginated_collection_model_json).__dict__ - secrets_locks_paginated_collection_model2 = SecretsLocksPaginatedCollection( - **secrets_locks_paginated_collection_model_dict) + secrets_locks_paginated_collection_model_dict = SecretsLocksPaginatedCollection.from_dict(secrets_locks_paginated_collection_model_json).__dict__ + secrets_locks_paginated_collection_model2 = SecretsLocksPaginatedCollection(**secrets_locks_paginated_collection_model_dict) # Verify the model instances are equivalent assert secrets_locks_paginated_collection_model == secrets_locks_paginated_collection_model2 @@ -5406,15 +5342,12 @@ def test_service_credentials_resource_key_serialization(self): service_credentials_resource_key_model_json = {} # Construct a model instance of ServiceCredentialsResourceKey by calling from_dict on the json representation - service_credentials_resource_key_model = ServiceCredentialsResourceKey.from_dict( - service_credentials_resource_key_model_json) + service_credentials_resource_key_model = ServiceCredentialsResourceKey.from_dict(service_credentials_resource_key_model_json) assert service_credentials_resource_key_model != False # Construct a model instance of ServiceCredentialsResourceKey by calling from_dict on the json representation - service_credentials_resource_key_model_dict = ServiceCredentialsResourceKey.from_dict( - service_credentials_resource_key_model_json).__dict__ - service_credentials_resource_key_model2 = ServiceCredentialsResourceKey( - **service_credentials_resource_key_model_dict) + service_credentials_resource_key_model_dict = ServiceCredentialsResourceKey.from_dict(service_credentials_resource_key_model_json).__dict__ + service_credentials_resource_key_model2 = ServiceCredentialsResourceKey(**service_credentials_resource_key_model_dict) # Verify the model instances are equivalent assert service_credentials_resource_key_model == service_credentials_resource_key_model2 @@ -5439,15 +5372,12 @@ def test_service_credentials_secret_credentials_serialization(self): service_credentials_secret_credentials_model_json['foo'] = 'testString' # Construct a model instance of ServiceCredentialsSecretCredentials by calling from_dict on the json representation - service_credentials_secret_credentials_model = ServiceCredentialsSecretCredentials.from_dict( - service_credentials_secret_credentials_model_json) + service_credentials_secret_credentials_model = ServiceCredentialsSecretCredentials.from_dict(service_credentials_secret_credentials_model_json) assert service_credentials_secret_credentials_model != False # Construct a model instance of ServiceCredentialsSecretCredentials by calling from_dict on the json representation - service_credentials_secret_credentials_model_dict = ServiceCredentialsSecretCredentials.from_dict( - service_credentials_secret_credentials_model_json).__dict__ - service_credentials_secret_credentials_model2 = ServiceCredentialsSecretCredentials( - **service_credentials_secret_credentials_model_dict) + service_credentials_secret_credentials_model_dict = ServiceCredentialsSecretCredentials.from_dict(service_credentials_secret_credentials_model_json).__dict__ + service_credentials_secret_credentials_model2 = ServiceCredentialsSecretCredentials(**service_credentials_secret_credentials_model_dict) # Verify the model instances are equivalent assert service_credentials_secret_credentials_model == service_credentials_secret_credentials_model2 @@ -5491,22 +5421,17 @@ def test_service_credentials_secret_source_service_serialization(self): # Construct a json representation of a ServiceCredentialsSecretSourceService model service_credentials_secret_source_service_model_json = {} - service_credentials_secret_source_service_model_json[ - 'instance'] = service_credentials_source_service_instance_model - service_credentials_secret_source_service_model_json[ - 'parameters'] = service_credentials_source_service_parameters_model + service_credentials_secret_source_service_model_json['instance'] = service_credentials_source_service_instance_model + service_credentials_secret_source_service_model_json['parameters'] = service_credentials_source_service_parameters_model service_credentials_secret_source_service_model_json['role'] = service_credentials_source_service_role_model # Construct a model instance of ServiceCredentialsSecretSourceService by calling from_dict on the json representation - service_credentials_secret_source_service_model = ServiceCredentialsSecretSourceService.from_dict( - service_credentials_secret_source_service_model_json) + service_credentials_secret_source_service_model = ServiceCredentialsSecretSourceService.from_dict(service_credentials_secret_source_service_model_json) assert service_credentials_secret_source_service_model != False # Construct a model instance of ServiceCredentialsSecretSourceService by calling from_dict on the json representation - service_credentials_secret_source_service_model_dict = ServiceCredentialsSecretSourceService.from_dict( - service_credentials_secret_source_service_model_json).__dict__ - service_credentials_secret_source_service_model2 = ServiceCredentialsSecretSourceService( - **service_credentials_secret_source_service_model_dict) + service_credentials_secret_source_service_model_dict = ServiceCredentialsSecretSourceService.from_dict(service_credentials_secret_source_service_model_json).__dict__ + service_credentials_secret_source_service_model2 = ServiceCredentialsSecretSourceService(**service_credentials_secret_source_service_model_dict) # Verify the model instances are equivalent assert service_credentials_secret_source_service_model == service_credentials_secret_source_service_model2 @@ -5547,31 +5472,25 @@ def test_service_credentials_secret_source_service_ro_serialization(self): service_credentials_source_service_iam_model = {} # ServiceCredentialsSourceServiceIam service_credentials_source_service_iam_model['apikey'] = service_credentials_source_service_iam_apikey_model service_credentials_source_service_iam_model['role'] = service_credentials_source_service_iam_role_model - service_credentials_source_service_iam_model[ - 'serviceid'] = service_credentials_source_service_iam_serviceid_model + service_credentials_source_service_iam_model['serviceid'] = service_credentials_source_service_iam_serviceid_model service_credentials_resource_key_model = {} # ServiceCredentialsResourceKey # Construct a json representation of a ServiceCredentialsSecretSourceServiceRO model service_credentials_secret_source_service_ro_model_json = {} - service_credentials_secret_source_service_ro_model_json[ - 'instance'] = service_credentials_source_service_instance_model - service_credentials_secret_source_service_ro_model_json[ - 'parameters'] = service_credentials_source_service_parameters_model + service_credentials_secret_source_service_ro_model_json['instance'] = service_credentials_source_service_instance_model + service_credentials_secret_source_service_ro_model_json['parameters'] = service_credentials_source_service_parameters_model service_credentials_secret_source_service_ro_model_json['role'] = service_credentials_source_service_role_model service_credentials_secret_source_service_ro_model_json['iam'] = service_credentials_source_service_iam_model service_credentials_secret_source_service_ro_model_json['resource_key'] = service_credentials_resource_key_model # Construct a model instance of ServiceCredentialsSecretSourceServiceRO by calling from_dict on the json representation - service_credentials_secret_source_service_ro_model = ServiceCredentialsSecretSourceServiceRO.from_dict( - service_credentials_secret_source_service_ro_model_json) + service_credentials_secret_source_service_ro_model = ServiceCredentialsSecretSourceServiceRO.from_dict(service_credentials_secret_source_service_ro_model_json) assert service_credentials_secret_source_service_ro_model != False # Construct a model instance of ServiceCredentialsSecretSourceServiceRO by calling from_dict on the json representation - service_credentials_secret_source_service_ro_model_dict = ServiceCredentialsSecretSourceServiceRO.from_dict( - service_credentials_secret_source_service_ro_model_json).__dict__ - service_credentials_secret_source_service_ro_model2 = ServiceCredentialsSecretSourceServiceRO( - **service_credentials_secret_source_service_ro_model_dict) + service_credentials_secret_source_service_ro_model_dict = ServiceCredentialsSecretSourceServiceRO.from_dict(service_credentials_secret_source_service_ro_model_json).__dict__ + service_credentials_secret_source_service_ro_model2 = ServiceCredentialsSecretSourceServiceRO(**service_credentials_secret_source_service_ro_model_dict) # Verify the model instances are equivalent assert service_credentials_secret_source_service_ro_model == service_credentials_secret_source_service_ro_model2 @@ -5601,22 +5520,17 @@ def test_service_credentials_source_service_iam_serialization(self): # Construct a json representation of a ServiceCredentialsSourceServiceIam model service_credentials_source_service_iam_model_json = {} - service_credentials_source_service_iam_model_json[ - 'apikey'] = service_credentials_source_service_iam_apikey_model + service_credentials_source_service_iam_model_json['apikey'] = service_credentials_source_service_iam_apikey_model service_credentials_source_service_iam_model_json['role'] = service_credentials_source_service_iam_role_model - service_credentials_source_service_iam_model_json[ - 'serviceid'] = service_credentials_source_service_iam_serviceid_model + service_credentials_source_service_iam_model_json['serviceid'] = service_credentials_source_service_iam_serviceid_model # Construct a model instance of ServiceCredentialsSourceServiceIam by calling from_dict on the json representation - service_credentials_source_service_iam_model = ServiceCredentialsSourceServiceIam.from_dict( - service_credentials_source_service_iam_model_json) + service_credentials_source_service_iam_model = ServiceCredentialsSourceServiceIam.from_dict(service_credentials_source_service_iam_model_json) assert service_credentials_source_service_iam_model != False # Construct a model instance of ServiceCredentialsSourceServiceIam by calling from_dict on the json representation - service_credentials_source_service_iam_model_dict = ServiceCredentialsSourceServiceIam.from_dict( - service_credentials_source_service_iam_model_json).__dict__ - service_credentials_source_service_iam_model2 = ServiceCredentialsSourceServiceIam( - **service_credentials_source_service_iam_model_dict) + service_credentials_source_service_iam_model_dict = ServiceCredentialsSourceServiceIam.from_dict(service_credentials_source_service_iam_model_json).__dict__ + service_credentials_source_service_iam_model2 = ServiceCredentialsSourceServiceIam(**service_credentials_source_service_iam_model_dict) # Verify the model instances are equivalent assert service_credentials_source_service_iam_model == service_credentials_source_service_iam_model2 @@ -5640,15 +5554,12 @@ def test_service_credentials_source_service_iam_apikey_serialization(self): service_credentials_source_service_iam_apikey_model_json = {} # Construct a model instance of ServiceCredentialsSourceServiceIamApikey by calling from_dict on the json representation - service_credentials_source_service_iam_apikey_model = ServiceCredentialsSourceServiceIamApikey.from_dict( - service_credentials_source_service_iam_apikey_model_json) + service_credentials_source_service_iam_apikey_model = ServiceCredentialsSourceServiceIamApikey.from_dict(service_credentials_source_service_iam_apikey_model_json) assert service_credentials_source_service_iam_apikey_model != False # Construct a model instance of ServiceCredentialsSourceServiceIamApikey by calling from_dict on the json representation - service_credentials_source_service_iam_apikey_model_dict = ServiceCredentialsSourceServiceIamApikey.from_dict( - service_credentials_source_service_iam_apikey_model_json).__dict__ - service_credentials_source_service_iam_apikey_model2 = ServiceCredentialsSourceServiceIamApikey( - **service_credentials_source_service_iam_apikey_model_dict) + service_credentials_source_service_iam_apikey_model_dict = ServiceCredentialsSourceServiceIamApikey.from_dict(service_credentials_source_service_iam_apikey_model_json).__dict__ + service_credentials_source_service_iam_apikey_model2 = ServiceCredentialsSourceServiceIamApikey(**service_credentials_source_service_iam_apikey_model_dict) # Verify the model instances are equivalent assert service_credentials_source_service_iam_apikey_model == service_credentials_source_service_iam_apikey_model2 @@ -5672,15 +5583,12 @@ def test_service_credentials_source_service_iam_role_serialization(self): service_credentials_source_service_iam_role_model_json = {} # Construct a model instance of ServiceCredentialsSourceServiceIamRole by calling from_dict on the json representation - service_credentials_source_service_iam_role_model = ServiceCredentialsSourceServiceIamRole.from_dict( - service_credentials_source_service_iam_role_model_json) + service_credentials_source_service_iam_role_model = ServiceCredentialsSourceServiceIamRole.from_dict(service_credentials_source_service_iam_role_model_json) assert service_credentials_source_service_iam_role_model != False # Construct a model instance of ServiceCredentialsSourceServiceIamRole by calling from_dict on the json representation - service_credentials_source_service_iam_role_model_dict = ServiceCredentialsSourceServiceIamRole.from_dict( - service_credentials_source_service_iam_role_model_json).__dict__ - service_credentials_source_service_iam_role_model2 = ServiceCredentialsSourceServiceIamRole( - **service_credentials_source_service_iam_role_model_dict) + service_credentials_source_service_iam_role_model_dict = ServiceCredentialsSourceServiceIamRole.from_dict(service_credentials_source_service_iam_role_model_json).__dict__ + service_credentials_source_service_iam_role_model2 = ServiceCredentialsSourceServiceIamRole(**service_credentials_source_service_iam_role_model_dict) # Verify the model instances are equivalent assert service_credentials_source_service_iam_role_model == service_credentials_source_service_iam_role_model2 @@ -5704,15 +5612,12 @@ def test_service_credentials_source_service_iam_serviceid_serialization(self): service_credentials_source_service_iam_serviceid_model_json = {} # Construct a model instance of ServiceCredentialsSourceServiceIamServiceid by calling from_dict on the json representation - service_credentials_source_service_iam_serviceid_model = ServiceCredentialsSourceServiceIamServiceid.from_dict( - service_credentials_source_service_iam_serviceid_model_json) + service_credentials_source_service_iam_serviceid_model = ServiceCredentialsSourceServiceIamServiceid.from_dict(service_credentials_source_service_iam_serviceid_model_json) assert service_credentials_source_service_iam_serviceid_model != False # Construct a model instance of ServiceCredentialsSourceServiceIamServiceid by calling from_dict on the json representation - service_credentials_source_service_iam_serviceid_model_dict = ServiceCredentialsSourceServiceIamServiceid.from_dict( - service_credentials_source_service_iam_serviceid_model_json).__dict__ - service_credentials_source_service_iam_serviceid_model2 = ServiceCredentialsSourceServiceIamServiceid( - **service_credentials_source_service_iam_serviceid_model_dict) + service_credentials_source_service_iam_serviceid_model_dict = ServiceCredentialsSourceServiceIamServiceid.from_dict(service_credentials_source_service_iam_serviceid_model_json).__dict__ + service_credentials_source_service_iam_serviceid_model2 = ServiceCredentialsSourceServiceIamServiceid(**service_credentials_source_service_iam_serviceid_model_dict) # Verify the model instances are equivalent assert service_credentials_source_service_iam_serviceid_model == service_credentials_source_service_iam_serviceid_model2 @@ -5737,15 +5642,12 @@ def test_service_credentials_source_service_instance_serialization(self): service_credentials_source_service_instance_model_json['crn'] = 'testString' # Construct a model instance of ServiceCredentialsSourceServiceInstance by calling from_dict on the json representation - service_credentials_source_service_instance_model = ServiceCredentialsSourceServiceInstance.from_dict( - service_credentials_source_service_instance_model_json) + service_credentials_source_service_instance_model = ServiceCredentialsSourceServiceInstance.from_dict(service_credentials_source_service_instance_model_json) assert service_credentials_source_service_instance_model != False # Construct a model instance of ServiceCredentialsSourceServiceInstance by calling from_dict on the json representation - service_credentials_source_service_instance_model_dict = ServiceCredentialsSourceServiceInstance.from_dict( - service_credentials_source_service_instance_model_json).__dict__ - service_credentials_source_service_instance_model2 = ServiceCredentialsSourceServiceInstance( - **service_credentials_source_service_instance_model_dict) + service_credentials_source_service_instance_model_dict = ServiceCredentialsSourceServiceInstance.from_dict(service_credentials_source_service_instance_model_json).__dict__ + service_credentials_source_service_instance_model2 = ServiceCredentialsSourceServiceInstance(**service_credentials_source_service_instance_model_dict) # Verify the model instances are equivalent assert service_credentials_source_service_instance_model == service_credentials_source_service_instance_model2 @@ -5771,15 +5673,12 @@ def test_service_credentials_source_service_parameters_serialization(self): service_credentials_source_service_parameters_model_json['foo'] = 'testString' # Construct a model instance of ServiceCredentialsSourceServiceParameters by calling from_dict on the json representation - service_credentials_source_service_parameters_model = ServiceCredentialsSourceServiceParameters.from_dict( - service_credentials_source_service_parameters_model_json) + service_credentials_source_service_parameters_model = ServiceCredentialsSourceServiceParameters.from_dict(service_credentials_source_service_parameters_model_json) assert service_credentials_source_service_parameters_model != False # Construct a model instance of ServiceCredentialsSourceServiceParameters by calling from_dict on the json representation - service_credentials_source_service_parameters_model_dict = ServiceCredentialsSourceServiceParameters.from_dict( - service_credentials_source_service_parameters_model_json).__dict__ - service_credentials_source_service_parameters_model2 = ServiceCredentialsSourceServiceParameters( - **service_credentials_source_service_parameters_model_dict) + service_credentials_source_service_parameters_model_dict = ServiceCredentialsSourceServiceParameters.from_dict(service_credentials_source_service_parameters_model_json).__dict__ + service_credentials_source_service_parameters_model2 = ServiceCredentialsSourceServiceParameters(**service_credentials_source_service_parameters_model_dict) # Verify the model instances are equivalent assert service_credentials_source_service_parameters_model == service_credentials_source_service_parameters_model2 @@ -5814,15 +5713,12 @@ def test_service_credentials_source_service_role_serialization(self): service_credentials_source_service_role_model_json['crn'] = 'testString' # Construct a model instance of ServiceCredentialsSourceServiceRole by calling from_dict on the json representation - service_credentials_source_service_role_model = ServiceCredentialsSourceServiceRole.from_dict( - service_credentials_source_service_role_model_json) + service_credentials_source_service_role_model = ServiceCredentialsSourceServiceRole.from_dict(service_credentials_source_service_role_model_json) assert service_credentials_source_service_role_model != False # Construct a model instance of ServiceCredentialsSourceServiceRole by calling from_dict on the json representation - service_credentials_source_service_role_model_dict = ServiceCredentialsSourceServiceRole.from_dict( - service_credentials_source_service_role_model_json).__dict__ - service_credentials_source_service_role_model2 = ServiceCredentialsSourceServiceRole( - **service_credentials_source_service_role_model_dict) + service_credentials_source_service_role_model_dict = ServiceCredentialsSourceServiceRole.from_dict(service_credentials_source_service_role_model_json).__dict__ + service_credentials_source_service_role_model2 = ServiceCredentialsSourceServiceRole(**service_credentials_source_service_role_model_dict) # Verify the model instances are equivalent assert service_credentials_source_service_role_model == service_credentials_source_service_role_model2 @@ -5904,8 +5800,7 @@ def test_arbitrary_secret_metadata_serialization(self): assert arbitrary_secret_metadata_model != False # Construct a model instance of ArbitrarySecretMetadata by calling from_dict on the json representation - arbitrary_secret_metadata_model_dict = ArbitrarySecretMetadata.from_dict( - arbitrary_secret_metadata_model_json).__dict__ + arbitrary_secret_metadata_model_dict = ArbitrarySecretMetadata.from_dict(arbitrary_secret_metadata_model_json).__dict__ arbitrary_secret_metadata_model2 = ArbitrarySecretMetadata(**arbitrary_secret_metadata_model_dict) # Verify the model instances are equivalent @@ -5935,15 +5830,12 @@ def test_arbitrary_secret_metadata_patch_serialization(self): arbitrary_secret_metadata_patch_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' # Construct a model instance of ArbitrarySecretMetadataPatch by calling from_dict on the json representation - arbitrary_secret_metadata_patch_model = ArbitrarySecretMetadataPatch.from_dict( - arbitrary_secret_metadata_patch_model_json) + arbitrary_secret_metadata_patch_model = ArbitrarySecretMetadataPatch.from_dict(arbitrary_secret_metadata_patch_model_json) assert arbitrary_secret_metadata_patch_model != False # Construct a model instance of ArbitrarySecretMetadataPatch by calling from_dict on the json representation - arbitrary_secret_metadata_patch_model_dict = ArbitrarySecretMetadataPatch.from_dict( - arbitrary_secret_metadata_patch_model_json).__dict__ - arbitrary_secret_metadata_patch_model2 = ArbitrarySecretMetadataPatch( - **arbitrary_secret_metadata_patch_model_dict) + arbitrary_secret_metadata_patch_model_dict = ArbitrarySecretMetadataPatch.from_dict(arbitrary_secret_metadata_patch_model_json).__dict__ + arbitrary_secret_metadata_patch_model2 = ArbitrarySecretMetadataPatch(**arbitrary_secret_metadata_patch_model_dict) # Verify the model instances are equivalent assert arbitrary_secret_metadata_patch_model == arbitrary_secret_metadata_patch_model2 @@ -5980,8 +5872,7 @@ def test_arbitrary_secret_prototype_serialization(self): assert arbitrary_secret_prototype_model != False # Construct a model instance of ArbitrarySecretPrototype by calling from_dict on the json representation - arbitrary_secret_prototype_model_dict = ArbitrarySecretPrototype.from_dict( - arbitrary_secret_prototype_model_json).__dict__ + arbitrary_secret_prototype_model_dict = ArbitrarySecretPrototype.from_dict(arbitrary_secret_prototype_model_json).__dict__ arbitrary_secret_prototype_model2 = ArbitrarySecretPrototype(**arbitrary_secret_prototype_model_dict) # Verify the model instances are equivalent @@ -6022,8 +5913,7 @@ def test_arbitrary_secret_version_serialization(self): assert arbitrary_secret_version_model != False # Construct a model instance of ArbitrarySecretVersion by calling from_dict on the json representation - arbitrary_secret_version_model_dict = ArbitrarySecretVersion.from_dict( - arbitrary_secret_version_model_json).__dict__ + arbitrary_secret_version_model_dict = ArbitrarySecretVersion.from_dict(arbitrary_secret_version_model_json).__dict__ arbitrary_secret_version_model2 = ArbitrarySecretVersion(**arbitrary_secret_version_model_dict) # Verify the model instances are equivalent @@ -6047,8 +5937,7 @@ def test_arbitrary_secret_version_metadata_serialization(self): # Construct a json representation of a ArbitrarySecretVersionMetadata model arbitrary_secret_version_metadata_model_json = {} arbitrary_secret_version_metadata_model_json['auto_rotated'] = True - arbitrary_secret_version_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + arbitrary_secret_version_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' arbitrary_secret_version_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' arbitrary_secret_version_metadata_model_json['id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' arbitrary_secret_version_metadata_model_json['secret_type'] = 'arbitrary' @@ -6060,15 +5949,12 @@ def test_arbitrary_secret_version_metadata_serialization(self): arbitrary_secret_version_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' # Construct a model instance of ArbitrarySecretVersionMetadata by calling from_dict on the json representation - arbitrary_secret_version_metadata_model = ArbitrarySecretVersionMetadata.from_dict( - arbitrary_secret_version_metadata_model_json) + arbitrary_secret_version_metadata_model = ArbitrarySecretVersionMetadata.from_dict(arbitrary_secret_version_metadata_model_json) assert arbitrary_secret_version_metadata_model != False # Construct a model instance of ArbitrarySecretVersionMetadata by calling from_dict on the json representation - arbitrary_secret_version_metadata_model_dict = ArbitrarySecretVersionMetadata.from_dict( - arbitrary_secret_version_metadata_model_json).__dict__ - arbitrary_secret_version_metadata_model2 = ArbitrarySecretVersionMetadata( - **arbitrary_secret_version_metadata_model_dict) + arbitrary_secret_version_metadata_model_dict = ArbitrarySecretVersionMetadata.from_dict(arbitrary_secret_version_metadata_model_json).__dict__ + arbitrary_secret_version_metadata_model2 = ArbitrarySecretVersionMetadata(**arbitrary_secret_version_metadata_model_dict) # Verify the model instances are equivalent assert arbitrary_secret_version_metadata_model == arbitrary_secret_version_metadata_model2 @@ -6095,15 +5981,12 @@ def test_arbitrary_secret_version_prototype_serialization(self): arbitrary_secret_version_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of ArbitrarySecretVersionPrototype by calling from_dict on the json representation - arbitrary_secret_version_prototype_model = ArbitrarySecretVersionPrototype.from_dict( - arbitrary_secret_version_prototype_model_json) + arbitrary_secret_version_prototype_model = ArbitrarySecretVersionPrototype.from_dict(arbitrary_secret_version_prototype_model_json) assert arbitrary_secret_version_prototype_model != False # Construct a model instance of ArbitrarySecretVersionPrototype by calling from_dict on the json representation - arbitrary_secret_version_prototype_model_dict = ArbitrarySecretVersionPrototype.from_dict( - arbitrary_secret_version_prototype_model_json).__dict__ - arbitrary_secret_version_prototype_model2 = ArbitrarySecretVersionPrototype( - **arbitrary_secret_version_prototype_model_dict) + arbitrary_secret_version_prototype_model_dict = ArbitrarySecretVersionPrototype.from_dict(arbitrary_secret_version_prototype_model_json).__dict__ + arbitrary_secret_version_prototype_model2 = ArbitrarySecretVersionPrototype(**arbitrary_secret_version_prototype_model_dict) # Verify the model instances are equivalent assert arbitrary_secret_version_prototype_model == arbitrary_secret_version_prototype_model2 @@ -6163,15 +6046,14 @@ def test_iam_credentials_configuration_serialization(self): iam_credentials_configuration_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' iam_credentials_configuration_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' iam_credentials_configuration_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' + iam_credentials_configuration_model_json['disabled'] = True # Construct a model instance of IAMCredentialsConfiguration by calling from_dict on the json representation - iam_credentials_configuration_model = IAMCredentialsConfiguration.from_dict( - iam_credentials_configuration_model_json) + iam_credentials_configuration_model = IAMCredentialsConfiguration.from_dict(iam_credentials_configuration_model_json) assert iam_credentials_configuration_model != False # Construct a model instance of IAMCredentialsConfiguration by calling from_dict on the json representation - iam_credentials_configuration_model_dict = IAMCredentialsConfiguration.from_dict( - iam_credentials_configuration_model_json).__dict__ + iam_credentials_configuration_model_dict = IAMCredentialsConfiguration.from_dict(iam_credentials_configuration_model_json).__dict__ iam_credentials_configuration_model2 = IAMCredentialsConfiguration(**iam_credentials_configuration_model_dict) # Verify the model instances are equivalent @@ -6197,21 +6079,18 @@ def test_iam_credentials_configuration_metadata_serialization(self): iam_credentials_configuration_metadata_model_json['config_type'] = 'iam_credentials_configuration' iam_credentials_configuration_metadata_model_json['name'] = 'my-secret-engine-config' iam_credentials_configuration_metadata_model_json['secret_type'] = 'arbitrary' - iam_credentials_configuration_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + iam_credentials_configuration_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' iam_credentials_configuration_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' iam_credentials_configuration_metadata_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' + iam_credentials_configuration_metadata_model_json['disabled'] = True # Construct a model instance of IAMCredentialsConfigurationMetadata by calling from_dict on the json representation - iam_credentials_configuration_metadata_model = IAMCredentialsConfigurationMetadata.from_dict( - iam_credentials_configuration_metadata_model_json) + iam_credentials_configuration_metadata_model = IAMCredentialsConfigurationMetadata.from_dict(iam_credentials_configuration_metadata_model_json) assert iam_credentials_configuration_metadata_model != False # Construct a model instance of IAMCredentialsConfigurationMetadata by calling from_dict on the json representation - iam_credentials_configuration_metadata_model_dict = IAMCredentialsConfigurationMetadata.from_dict( - iam_credentials_configuration_metadata_model_json).__dict__ - iam_credentials_configuration_metadata_model2 = IAMCredentialsConfigurationMetadata( - **iam_credentials_configuration_metadata_model_dict) + iam_credentials_configuration_metadata_model_dict = IAMCredentialsConfigurationMetadata.from_dict(iam_credentials_configuration_metadata_model_json).__dict__ + iam_credentials_configuration_metadata_model2 = IAMCredentialsConfigurationMetadata(**iam_credentials_configuration_metadata_model_dict) # Verify the model instances are equivalent assert iam_credentials_configuration_metadata_model == iam_credentials_configuration_metadata_model2 @@ -6234,17 +6113,15 @@ def test_iam_credentials_configuration_patch_serialization(self): # Construct a json representation of a IAMCredentialsConfigurationPatch model iam_credentials_configuration_patch_model_json = {} iam_credentials_configuration_patch_model_json['api_key'] = 'testString' + iam_credentials_configuration_patch_model_json['disabled'] = True # Construct a model instance of IAMCredentialsConfigurationPatch by calling from_dict on the json representation - iam_credentials_configuration_patch_model = IAMCredentialsConfigurationPatch.from_dict( - iam_credentials_configuration_patch_model_json) + iam_credentials_configuration_patch_model = IAMCredentialsConfigurationPatch.from_dict(iam_credentials_configuration_patch_model_json) assert iam_credentials_configuration_patch_model != False # Construct a model instance of IAMCredentialsConfigurationPatch by calling from_dict on the json representation - iam_credentials_configuration_patch_model_dict = IAMCredentialsConfigurationPatch.from_dict( - iam_credentials_configuration_patch_model_json).__dict__ - iam_credentials_configuration_patch_model2 = IAMCredentialsConfigurationPatch( - **iam_credentials_configuration_patch_model_dict) + iam_credentials_configuration_patch_model_dict = IAMCredentialsConfigurationPatch.from_dict(iam_credentials_configuration_patch_model_json).__dict__ + iam_credentials_configuration_patch_model2 = IAMCredentialsConfigurationPatch(**iam_credentials_configuration_patch_model_dict) # Verify the model instances are equivalent assert iam_credentials_configuration_patch_model == iam_credentials_configuration_patch_model2 @@ -6269,17 +6146,15 @@ def test_iam_credentials_configuration_prototype_serialization(self): iam_credentials_configuration_prototype_model_json['name'] = 'my-example-engine-config' iam_credentials_configuration_prototype_model_json['config_type'] = 'iam_credentials_configuration' iam_credentials_configuration_prototype_model_json['api_key'] = 'testString' + iam_credentials_configuration_prototype_model_json['disabled'] = False # Construct a model instance of IAMCredentialsConfigurationPrototype by calling from_dict on the json representation - iam_credentials_configuration_prototype_model = IAMCredentialsConfigurationPrototype.from_dict( - iam_credentials_configuration_prototype_model_json) + iam_credentials_configuration_prototype_model = IAMCredentialsConfigurationPrototype.from_dict(iam_credentials_configuration_prototype_model_json) assert iam_credentials_configuration_prototype_model != False # Construct a model instance of IAMCredentialsConfigurationPrototype by calling from_dict on the json representation - iam_credentials_configuration_prototype_model_dict = IAMCredentialsConfigurationPrototype.from_dict( - iam_credentials_configuration_prototype_model_json).__dict__ - iam_credentials_configuration_prototype_model2 = IAMCredentialsConfigurationPrototype( - **iam_credentials_configuration_prototype_model_dict) + iam_credentials_configuration_prototype_model_dict = IAMCredentialsConfigurationPrototype.from_dict(iam_credentials_configuration_prototype_model_json).__dict__ + iam_credentials_configuration_prototype_model2 = IAMCredentialsConfigurationPrototype(**iam_credentials_configuration_prototype_model_dict) # Verify the model instances are equivalent assert iam_credentials_configuration_prototype_model == iam_credentials_configuration_prototype_model2 @@ -6322,6 +6197,7 @@ def test_iam_credentials_secret_serialization(self): iam_credentials_secret_model_json['ttl'] = '1d' iam_credentials_secret_model_json['access_groups'] = ['AccessGroupId-45884031-54be-4dd7-86ff-112511e92699'] iam_credentials_secret_model_json['service_id'] = 'ServiceId-bb4ccc31-bd31-493a-bb58-52ec399800be' + iam_credentials_secret_model_json['account_id'] = '708d4dc20986423e79bb8512f81b7f92' iam_credentials_secret_model_json['reuse_api_key'] = True iam_credentials_secret_model_json['rotation'] = rotation_policy_model iam_credentials_secret_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' @@ -6373,23 +6249,20 @@ def test_iam_credentials_secret_metadata_serialization(self): iam_credentials_secret_metadata_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' iam_credentials_secret_metadata_model_json['versions_total'] = 0 iam_credentials_secret_metadata_model_json['ttl'] = '1d' - iam_credentials_secret_metadata_model_json['access_groups'] = [ - 'AccessGroupId-45884031-54be-4dd7-86ff-112511e92699'] + iam_credentials_secret_metadata_model_json['access_groups'] = ['AccessGroupId-45884031-54be-4dd7-86ff-112511e92699'] iam_credentials_secret_metadata_model_json['service_id'] = 'ServiceId-bb4ccc31-bd31-493a-bb58-52ec399800be' + iam_credentials_secret_metadata_model_json['account_id'] = '708d4dc20986423e79bb8512f81b7f92' iam_credentials_secret_metadata_model_json['reuse_api_key'] = True iam_credentials_secret_metadata_model_json['rotation'] = rotation_policy_model iam_credentials_secret_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' # Construct a model instance of IAMCredentialsSecretMetadata by calling from_dict on the json representation - iam_credentials_secret_metadata_model = IAMCredentialsSecretMetadata.from_dict( - iam_credentials_secret_metadata_model_json) + iam_credentials_secret_metadata_model = IAMCredentialsSecretMetadata.from_dict(iam_credentials_secret_metadata_model_json) assert iam_credentials_secret_metadata_model != False # Construct a model instance of IAMCredentialsSecretMetadata by calling from_dict on the json representation - iam_credentials_secret_metadata_model_dict = IAMCredentialsSecretMetadata.from_dict( - iam_credentials_secret_metadata_model_json).__dict__ - iam_credentials_secret_metadata_model2 = IAMCredentialsSecretMetadata( - **iam_credentials_secret_metadata_model_dict) + iam_credentials_secret_metadata_model_dict = IAMCredentialsSecretMetadata.from_dict(iam_credentials_secret_metadata_model_json).__dict__ + iam_credentials_secret_metadata_model2 = IAMCredentialsSecretMetadata(**iam_credentials_secret_metadata_model_dict) # Verify the model instances are equivalent assert iam_credentials_secret_metadata_model == iam_credentials_secret_metadata_model2 @@ -6426,15 +6299,12 @@ def test_iam_credentials_secret_metadata_patch_serialization(self): iam_credentials_secret_metadata_patch_model_json['rotation'] = rotation_policy_model # Construct a model instance of IAMCredentialsSecretMetadataPatch by calling from_dict on the json representation - iam_credentials_secret_metadata_patch_model = IAMCredentialsSecretMetadataPatch.from_dict( - iam_credentials_secret_metadata_patch_model_json) + iam_credentials_secret_metadata_patch_model = IAMCredentialsSecretMetadataPatch.from_dict(iam_credentials_secret_metadata_patch_model_json) assert iam_credentials_secret_metadata_patch_model != False # Construct a model instance of IAMCredentialsSecretMetadataPatch by calling from_dict on the json representation - iam_credentials_secret_metadata_patch_model_dict = IAMCredentialsSecretMetadataPatch.from_dict( - iam_credentials_secret_metadata_patch_model_json).__dict__ - iam_credentials_secret_metadata_patch_model2 = IAMCredentialsSecretMetadataPatch( - **iam_credentials_secret_metadata_patch_model_dict) + iam_credentials_secret_metadata_patch_model_dict = IAMCredentialsSecretMetadataPatch.from_dict(iam_credentials_secret_metadata_patch_model_json).__dict__ + iam_credentials_secret_metadata_patch_model2 = IAMCredentialsSecretMetadataPatch(**iam_credentials_secret_metadata_patch_model_dict) # Verify the model instances are equivalent assert iam_credentials_secret_metadata_patch_model == iam_credentials_secret_metadata_patch_model2 @@ -6469,24 +6339,21 @@ def test_iam_credentials_secret_prototype_serialization(self): iam_credentials_secret_prototype_model_json['secret_group_id'] = 'default' iam_credentials_secret_prototype_model_json['labels'] = ['my-label'] iam_credentials_secret_prototype_model_json['ttl'] = '1d' - iam_credentials_secret_prototype_model_json['access_groups'] = [ - 'AccessGroupId-45884031-54be-4dd7-86ff-112511e92699'] + iam_credentials_secret_prototype_model_json['access_groups'] = ['AccessGroupId-45884031-54be-4dd7-86ff-112511e92699'] iam_credentials_secret_prototype_model_json['service_id'] = 'ServiceId-bb4ccc31-bd31-493a-bb58-52ec399800be' + iam_credentials_secret_prototype_model_json['account_id'] = '708d4dc20986423e79bb8512f81b7f92' iam_credentials_secret_prototype_model_json['reuse_api_key'] = True iam_credentials_secret_prototype_model_json['rotation'] = rotation_policy_model iam_credentials_secret_prototype_model_json['custom_metadata'] = {'key': 'value'} iam_credentials_secret_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of IAMCredentialsSecretPrototype by calling from_dict on the json representation - iam_credentials_secret_prototype_model = IAMCredentialsSecretPrototype.from_dict( - iam_credentials_secret_prototype_model_json) + iam_credentials_secret_prototype_model = IAMCredentialsSecretPrototype.from_dict(iam_credentials_secret_prototype_model_json) assert iam_credentials_secret_prototype_model != False # Construct a model instance of IAMCredentialsSecretPrototype by calling from_dict on the json representation - iam_credentials_secret_prototype_model_dict = IAMCredentialsSecretPrototype.from_dict( - iam_credentials_secret_prototype_model_json).__dict__ - iam_credentials_secret_prototype_model2 = IAMCredentialsSecretPrototype( - **iam_credentials_secret_prototype_model_dict) + iam_credentials_secret_prototype_model_dict = IAMCredentialsSecretPrototype.from_dict(iam_credentials_secret_prototype_model_json).__dict__ + iam_credentials_secret_prototype_model2 = IAMCredentialsSecretPrototype(**iam_credentials_secret_prototype_model_dict) # Verify the model instances are equivalent assert iam_credentials_secret_prototype_model == iam_credentials_secret_prototype_model2 @@ -6513,15 +6380,12 @@ def test_iam_credentials_secret_restore_from_version_prototype_serialization(sel iam_credentials_secret_restore_from_version_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of IAMCredentialsSecretRestoreFromVersionPrototype by calling from_dict on the json representation - iam_credentials_secret_restore_from_version_prototype_model = IAMCredentialsSecretRestoreFromVersionPrototype.from_dict( - iam_credentials_secret_restore_from_version_prototype_model_json) + iam_credentials_secret_restore_from_version_prototype_model = IAMCredentialsSecretRestoreFromVersionPrototype.from_dict(iam_credentials_secret_restore_from_version_prototype_model_json) assert iam_credentials_secret_restore_from_version_prototype_model != False # Construct a model instance of IAMCredentialsSecretRestoreFromVersionPrototype by calling from_dict on the json representation - iam_credentials_secret_restore_from_version_prototype_model_dict = IAMCredentialsSecretRestoreFromVersionPrototype.from_dict( - iam_credentials_secret_restore_from_version_prototype_model_json).__dict__ - iam_credentials_secret_restore_from_version_prototype_model2 = IAMCredentialsSecretRestoreFromVersionPrototype( - **iam_credentials_secret_restore_from_version_prototype_model_dict) + iam_credentials_secret_restore_from_version_prototype_model_dict = IAMCredentialsSecretRestoreFromVersionPrototype.from_dict(iam_credentials_secret_restore_from_version_prototype_model_json).__dict__ + iam_credentials_secret_restore_from_version_prototype_model2 = IAMCredentialsSecretRestoreFromVersionPrototype(**iam_credentials_secret_restore_from_version_prototype_model_dict) # Verify the model instances are equivalent assert iam_credentials_secret_restore_from_version_prototype_model == iam_credentials_secret_restore_from_version_prototype_model2 @@ -6557,13 +6421,11 @@ def test_iam_credentials_secret_version_serialization(self): iam_credentials_secret_version_model_json['service_id'] = 'ServiceId-bb4ccc31-bd31-493a-bb58-52ec399800be' # Construct a model instance of IAMCredentialsSecretVersion by calling from_dict on the json representation - iam_credentials_secret_version_model = IAMCredentialsSecretVersion.from_dict( - iam_credentials_secret_version_model_json) + iam_credentials_secret_version_model = IAMCredentialsSecretVersion.from_dict(iam_credentials_secret_version_model_json) assert iam_credentials_secret_version_model != False # Construct a model instance of IAMCredentialsSecretVersion by calling from_dict on the json representation - iam_credentials_secret_version_model_dict = IAMCredentialsSecretVersion.from_dict( - iam_credentials_secret_version_model_json).__dict__ + iam_credentials_secret_version_model_dict = IAMCredentialsSecretVersion.from_dict(iam_credentials_secret_version_model_json).__dict__ iam_credentials_secret_version_model2 = IAMCredentialsSecretVersion(**iam_credentials_secret_version_model_dict) # Verify the model instances are equivalent @@ -6587,8 +6449,7 @@ def test_iam_credentials_secret_version_metadata_serialization(self): # Construct a json representation of a IAMCredentialsSecretVersionMetadata model iam_credentials_secret_version_metadata_model_json = {} iam_credentials_secret_version_metadata_model_json['auto_rotated'] = True - iam_credentials_secret_version_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + iam_credentials_secret_version_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' iam_credentials_secret_version_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' iam_credentials_secret_version_metadata_model_json['id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' iam_credentials_secret_version_metadata_model_json['secret_type'] = 'iam_credentials' @@ -6598,19 +6459,15 @@ def test_iam_credentials_secret_version_metadata_serialization(self): iam_credentials_secret_version_metadata_model_json['version_custom_metadata'] = {'key': 'value'} iam_credentials_secret_version_metadata_model_json['secret_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' iam_credentials_secret_version_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' - iam_credentials_secret_version_metadata_model_json[ - 'service_id'] = 'ServiceId-bb4ccc31-bd31-493a-bb58-52ec399800be' + iam_credentials_secret_version_metadata_model_json['service_id'] = 'ServiceId-bb4ccc31-bd31-493a-bb58-52ec399800be' # Construct a model instance of IAMCredentialsSecretVersionMetadata by calling from_dict on the json representation - iam_credentials_secret_version_metadata_model = IAMCredentialsSecretVersionMetadata.from_dict( - iam_credentials_secret_version_metadata_model_json) + iam_credentials_secret_version_metadata_model = IAMCredentialsSecretVersionMetadata.from_dict(iam_credentials_secret_version_metadata_model_json) assert iam_credentials_secret_version_metadata_model != False # Construct a model instance of IAMCredentialsSecretVersionMetadata by calling from_dict on the json representation - iam_credentials_secret_version_metadata_model_dict = IAMCredentialsSecretVersionMetadata.from_dict( - iam_credentials_secret_version_metadata_model_json).__dict__ - iam_credentials_secret_version_metadata_model2 = IAMCredentialsSecretVersionMetadata( - **iam_credentials_secret_version_metadata_model_dict) + iam_credentials_secret_version_metadata_model_dict = IAMCredentialsSecretVersionMetadata.from_dict(iam_credentials_secret_version_metadata_model_json).__dict__ + iam_credentials_secret_version_metadata_model2 = IAMCredentialsSecretVersionMetadata(**iam_credentials_secret_version_metadata_model_dict) # Verify the model instances are equivalent assert iam_credentials_secret_version_metadata_model == iam_credentials_secret_version_metadata_model2 @@ -6636,15 +6493,12 @@ def test_iam_credentials_secret_version_prototype_serialization(self): iam_credentials_secret_version_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of IAMCredentialsSecretVersionPrototype by calling from_dict on the json representation - iam_credentials_secret_version_prototype_model = IAMCredentialsSecretVersionPrototype.from_dict( - iam_credentials_secret_version_prototype_model_json) + iam_credentials_secret_version_prototype_model = IAMCredentialsSecretVersionPrototype.from_dict(iam_credentials_secret_version_prototype_model_json) assert iam_credentials_secret_version_prototype_model != False # Construct a model instance of IAMCredentialsSecretVersionPrototype by calling from_dict on the json representation - iam_credentials_secret_version_prototype_model_dict = IAMCredentialsSecretVersionPrototype.from_dict( - iam_credentials_secret_version_prototype_model_json).__dict__ - iam_credentials_secret_version_prototype_model2 = IAMCredentialsSecretVersionPrototype( - **iam_credentials_secret_version_prototype_model_dict) + iam_credentials_secret_version_prototype_model_dict = IAMCredentialsSecretVersionPrototype.from_dict(iam_credentials_secret_version_prototype_model_json).__dict__ + iam_credentials_secret_version_prototype_model2 = IAMCredentialsSecretVersionPrototype(**iam_credentials_secret_version_prototype_model_dict) # Verify the model instances are equivalent assert iam_credentials_secret_version_prototype_model == iam_credentials_secret_version_prototype_model2 @@ -6748,18 +6602,15 @@ def test_imported_certificate_metadata_serialization(self): imported_certificate_metadata_model_json['intermediate_included'] = True imported_certificate_metadata_model_json['issuer'] = 'Lets Encrypt' imported_certificate_metadata_model_json['private_key_included'] = True - imported_certificate_metadata_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + imported_certificate_metadata_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' imported_certificate_metadata_model_json['validity'] = certificate_validity_model # Construct a model instance of ImportedCertificateMetadata by calling from_dict on the json representation - imported_certificate_metadata_model = ImportedCertificateMetadata.from_dict( - imported_certificate_metadata_model_json) + imported_certificate_metadata_model = ImportedCertificateMetadata.from_dict(imported_certificate_metadata_model_json) assert imported_certificate_metadata_model != False # Construct a model instance of ImportedCertificateMetadata by calling from_dict on the json representation - imported_certificate_metadata_model_dict = ImportedCertificateMetadata.from_dict( - imported_certificate_metadata_model_json).__dict__ + imported_certificate_metadata_model_dict = ImportedCertificateMetadata.from_dict(imported_certificate_metadata_model_json).__dict__ imported_certificate_metadata_model2 = ImportedCertificateMetadata(**imported_certificate_metadata_model_dict) # Verify the model instances are equivalent @@ -6788,15 +6639,12 @@ def test_imported_certificate_metadata_patch_serialization(self): imported_certificate_metadata_patch_model_json['custom_metadata'] = {'key': 'value'} # Construct a model instance of ImportedCertificateMetadataPatch by calling from_dict on the json representation - imported_certificate_metadata_patch_model = ImportedCertificateMetadataPatch.from_dict( - imported_certificate_metadata_patch_model_json) + imported_certificate_metadata_patch_model = ImportedCertificateMetadataPatch.from_dict(imported_certificate_metadata_patch_model_json) assert imported_certificate_metadata_patch_model != False # Construct a model instance of ImportedCertificateMetadataPatch by calling from_dict on the json representation - imported_certificate_metadata_patch_model_dict = ImportedCertificateMetadataPatch.from_dict( - imported_certificate_metadata_patch_model_json).__dict__ - imported_certificate_metadata_patch_model2 = ImportedCertificateMetadataPatch( - **imported_certificate_metadata_patch_model_dict) + imported_certificate_metadata_patch_model_dict = ImportedCertificateMetadataPatch.from_dict(imported_certificate_metadata_patch_model_json).__dict__ + imported_certificate_metadata_patch_model2 = ImportedCertificateMetadataPatch(**imported_certificate_metadata_patch_model_dict) # Verify the model instances are equivalent assert imported_certificate_metadata_patch_model == imported_certificate_metadata_patch_model2 @@ -6830,15 +6678,12 @@ def test_imported_certificate_prototype_serialization(self): imported_certificate_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of ImportedCertificatePrototype by calling from_dict on the json representation - imported_certificate_prototype_model = ImportedCertificatePrototype.from_dict( - imported_certificate_prototype_model_json) + imported_certificate_prototype_model = ImportedCertificatePrototype.from_dict(imported_certificate_prototype_model_json) assert imported_certificate_prototype_model != False # Construct a model instance of ImportedCertificatePrototype by calling from_dict on the json representation - imported_certificate_prototype_model_dict = ImportedCertificatePrototype.from_dict( - imported_certificate_prototype_model_json).__dict__ - imported_certificate_prototype_model2 = ImportedCertificatePrototype( - **imported_certificate_prototype_model_dict) + imported_certificate_prototype_model_dict = ImportedCertificatePrototype.from_dict(imported_certificate_prototype_model_json).__dict__ + imported_certificate_prototype_model2 = ImportedCertificatePrototype(**imported_certificate_prototype_model_dict) # Verify the model instances are equivalent assert imported_certificate_prototype_model == imported_certificate_prototype_model2 @@ -6877,21 +6722,18 @@ def test_imported_certificate_version_serialization(self): imported_certificate_version_model_json['version_custom_metadata'] = {'key': 'value'} imported_certificate_version_model_json['secret_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' imported_certificate_version_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' - imported_certificate_version_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + imported_certificate_version_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' imported_certificate_version_model_json['validity'] = certificate_validity_model imported_certificate_version_model_json['certificate'] = 'testString' imported_certificate_version_model_json['intermediate'] = 'testString' imported_certificate_version_model_json['private_key'] = 'testString' # Construct a model instance of ImportedCertificateVersion by calling from_dict on the json representation - imported_certificate_version_model = ImportedCertificateVersion.from_dict( - imported_certificate_version_model_json) + imported_certificate_version_model = ImportedCertificateVersion.from_dict(imported_certificate_version_model_json) assert imported_certificate_version_model != False # Construct a model instance of ImportedCertificateVersion by calling from_dict on the json representation - imported_certificate_version_model_dict = ImportedCertificateVersion.from_dict( - imported_certificate_version_model_json).__dict__ + imported_certificate_version_model_dict = ImportedCertificateVersion.from_dict(imported_certificate_version_model_json).__dict__ imported_certificate_version_model2 = ImportedCertificateVersion(**imported_certificate_version_model_dict) # Verify the model instances are equivalent @@ -6921,8 +6763,7 @@ def test_imported_certificate_version_metadata_serialization(self): # Construct a json representation of a ImportedCertificateVersionMetadata model imported_certificate_version_metadata_model_json = {} imported_certificate_version_metadata_model_json['auto_rotated'] = True - imported_certificate_version_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + imported_certificate_version_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' imported_certificate_version_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' imported_certificate_version_metadata_model_json['id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' imported_certificate_version_metadata_model_json['secret_type'] = 'imported_cert' @@ -6932,20 +6773,16 @@ def test_imported_certificate_version_metadata_serialization(self): imported_certificate_version_metadata_model_json['version_custom_metadata'] = {'key': 'value'} imported_certificate_version_metadata_model_json['secret_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' imported_certificate_version_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' - imported_certificate_version_metadata_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + imported_certificate_version_metadata_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' imported_certificate_version_metadata_model_json['validity'] = certificate_validity_model # Construct a model instance of ImportedCertificateVersionMetadata by calling from_dict on the json representation - imported_certificate_version_metadata_model = ImportedCertificateVersionMetadata.from_dict( - imported_certificate_version_metadata_model_json) + imported_certificate_version_metadata_model = ImportedCertificateVersionMetadata.from_dict(imported_certificate_version_metadata_model_json) assert imported_certificate_version_metadata_model != False # Construct a model instance of ImportedCertificateVersionMetadata by calling from_dict on the json representation - imported_certificate_version_metadata_model_dict = ImportedCertificateVersionMetadata.from_dict( - imported_certificate_version_metadata_model_json).__dict__ - imported_certificate_version_metadata_model2 = ImportedCertificateVersionMetadata( - **imported_certificate_version_metadata_model_dict) + imported_certificate_version_metadata_model_dict = ImportedCertificateVersionMetadata.from_dict(imported_certificate_version_metadata_model_json).__dict__ + imported_certificate_version_metadata_model2 = ImportedCertificateVersionMetadata(**imported_certificate_version_metadata_model_dict) # Verify the model instances are equivalent assert imported_certificate_version_metadata_model == imported_certificate_version_metadata_model2 @@ -6974,15 +6811,12 @@ def test_imported_certificate_version_prototype_serialization(self): imported_certificate_version_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of ImportedCertificateVersionPrototype by calling from_dict on the json representation - imported_certificate_version_prototype_model = ImportedCertificateVersionPrototype.from_dict( - imported_certificate_version_prototype_model_json) + imported_certificate_version_prototype_model = ImportedCertificateVersionPrototype.from_dict(imported_certificate_version_prototype_model_json) assert imported_certificate_version_prototype_model != False # Construct a model instance of ImportedCertificateVersionPrototype by calling from_dict on the json representation - imported_certificate_version_prototype_model_dict = ImportedCertificateVersionPrototype.from_dict( - imported_certificate_version_prototype_model_json).__dict__ - imported_certificate_version_prototype_model2 = ImportedCertificateVersionPrototype( - **imported_certificate_version_prototype_model_dict) + imported_certificate_version_prototype_model_dict = ImportedCertificateVersionPrototype.from_dict(imported_certificate_version_prototype_model_json).__dict__ + imported_certificate_version_prototype_model2 = ImportedCertificateVersionPrototype(**imported_certificate_version_prototype_model_dict) # Verify the model instances are equivalent assert imported_certificate_version_prototype_model == imported_certificate_version_prototype_model2 @@ -7095,8 +6929,7 @@ def test_kv_secret_metadata_patch_serialization(self): assert kv_secret_metadata_patch_model != False # Construct a model instance of KVSecretMetadataPatch by calling from_dict on the json representation - kv_secret_metadata_patch_model_dict = KVSecretMetadataPatch.from_dict( - kv_secret_metadata_patch_model_json).__dict__ + kv_secret_metadata_patch_model_dict = KVSecretMetadataPatch.from_dict(kv_secret_metadata_patch_model_json).__dict__ kv_secret_metadata_patch_model2 = KVSecretMetadataPatch(**kv_secret_metadata_patch_model_dict) # Verify the model instances are equivalent @@ -7214,8 +7047,7 @@ def test_kv_secret_version_metadata_serialization(self): assert kv_secret_version_metadata_model != False # Construct a model instance of KVSecretVersionMetadata by calling from_dict on the json representation - kv_secret_version_metadata_model_dict = KVSecretVersionMetadata.from_dict( - kv_secret_version_metadata_model_json).__dict__ + kv_secret_version_metadata_model_dict = KVSecretVersionMetadata.from_dict(kv_secret_version_metadata_model_json).__dict__ kv_secret_version_metadata_model2 = KVSecretVersionMetadata(**kv_secret_version_metadata_model_dict) # Verify the model instances are equivalent @@ -7247,8 +7079,7 @@ def test_kv_secret_version_prototype_serialization(self): assert kv_secret_version_prototype_model != False # Construct a model instance of KVSecretVersionPrototype by calling from_dict on the json representation - kv_secret_version_prototype_model_dict = KVSecretVersionPrototype.from_dict( - kv_secret_version_prototype_model_json).__dict__ + kv_secret_version_prototype_model_dict = KVSecretVersionPrototype.from_dict(kv_secret_version_prototype_model_json).__dict__ kv_secret_version_prototype_model2 = KVSecretVersionPrototype(**kv_secret_version_prototype_model_dict) # Verify the model instances are equivalent @@ -7336,15 +7167,12 @@ def test_private_certificate_action_revoke_serialization(self): private_certificate_action_revoke_model_json['action_type'] = 'private_cert_action_revoke_certificate' # Construct a model instance of PrivateCertificateActionRevoke by calling from_dict on the json representation - private_certificate_action_revoke_model = PrivateCertificateActionRevoke.from_dict( - private_certificate_action_revoke_model_json) + private_certificate_action_revoke_model = PrivateCertificateActionRevoke.from_dict(private_certificate_action_revoke_model_json) assert private_certificate_action_revoke_model != False # Construct a model instance of PrivateCertificateActionRevoke by calling from_dict on the json representation - private_certificate_action_revoke_model_dict = PrivateCertificateActionRevoke.from_dict( - private_certificate_action_revoke_model_json).__dict__ - private_certificate_action_revoke_model2 = PrivateCertificateActionRevoke( - **private_certificate_action_revoke_model_dict) + private_certificate_action_revoke_model_dict = PrivateCertificateActionRevoke.from_dict(private_certificate_action_revoke_model_json).__dict__ + private_certificate_action_revoke_model2 = PrivateCertificateActionRevoke(**private_certificate_action_revoke_model_dict) # Verify the model instances are equivalent assert private_certificate_action_revoke_model == private_certificate_action_revoke_model2 @@ -7369,15 +7197,12 @@ def test_private_certificate_action_revoke_prototype_serialization(self): private_certificate_action_revoke_prototype_model_json['action_type'] = 'private_cert_action_revoke_certificate' # Construct a model instance of PrivateCertificateActionRevokePrototype by calling from_dict on the json representation - private_certificate_action_revoke_prototype_model = PrivateCertificateActionRevokePrototype.from_dict( - private_certificate_action_revoke_prototype_model_json) + private_certificate_action_revoke_prototype_model = PrivateCertificateActionRevokePrototype.from_dict(private_certificate_action_revoke_prototype_model_json) assert private_certificate_action_revoke_prototype_model != False # Construct a model instance of PrivateCertificateActionRevokePrototype by calling from_dict on the json representation - private_certificate_action_revoke_prototype_model_dict = PrivateCertificateActionRevokePrototype.from_dict( - private_certificate_action_revoke_prototype_model_json).__dict__ - private_certificate_action_revoke_prototype_model2 = PrivateCertificateActionRevokePrototype( - **private_certificate_action_revoke_prototype_model_dict) + private_certificate_action_revoke_prototype_model_dict = PrivateCertificateActionRevokePrototype.from_dict(private_certificate_action_revoke_prototype_model_json).__dict__ + private_certificate_action_revoke_prototype_model2 = PrivateCertificateActionRevokePrototype(**private_certificate_action_revoke_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_action_revoke_prototype_model == private_certificate_action_revoke_prototype_model2 @@ -7399,19 +7224,15 @@ def test_private_certificate_configuration_action_revoke_serialization(self): # Construct a json representation of a PrivateCertificateConfigurationActionRevoke model private_certificate_configuration_action_revoke_model_json = {} - private_certificate_configuration_action_revoke_model_json[ - 'action_type'] = 'private_cert_configuration_action_revoke_ca_certificate' + private_certificate_configuration_action_revoke_model_json['action_type'] = 'private_cert_configuration_action_revoke_ca_certificate' # Construct a model instance of PrivateCertificateConfigurationActionRevoke by calling from_dict on the json representation - private_certificate_configuration_action_revoke_model = PrivateCertificateConfigurationActionRevoke.from_dict( - private_certificate_configuration_action_revoke_model_json) + private_certificate_configuration_action_revoke_model = PrivateCertificateConfigurationActionRevoke.from_dict(private_certificate_configuration_action_revoke_model_json) assert private_certificate_configuration_action_revoke_model != False # Construct a model instance of PrivateCertificateConfigurationActionRevoke by calling from_dict on the json representation - private_certificate_configuration_action_revoke_model_dict = PrivateCertificateConfigurationActionRevoke.from_dict( - private_certificate_configuration_action_revoke_model_json).__dict__ - private_certificate_configuration_action_revoke_model2 = PrivateCertificateConfigurationActionRevoke( - **private_certificate_configuration_action_revoke_model_dict) + private_certificate_configuration_action_revoke_model_dict = PrivateCertificateConfigurationActionRevoke.from_dict(private_certificate_configuration_action_revoke_model_json).__dict__ + private_certificate_configuration_action_revoke_model2 = PrivateCertificateConfigurationActionRevoke(**private_certificate_configuration_action_revoke_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_action_revoke_model == private_certificate_configuration_action_revoke_model2 @@ -7433,19 +7254,15 @@ def test_private_certificate_configuration_action_revoke_prototype_serialization # Construct a json representation of a PrivateCertificateConfigurationActionRevokePrototype model private_certificate_configuration_action_revoke_prototype_model_json = {} - private_certificate_configuration_action_revoke_prototype_model_json[ - 'action_type'] = 'private_cert_configuration_action_revoke_ca_certificate' + private_certificate_configuration_action_revoke_prototype_model_json['action_type'] = 'private_cert_configuration_action_revoke_ca_certificate' # Construct a model instance of PrivateCertificateConfigurationActionRevokePrototype by calling from_dict on the json representation - private_certificate_configuration_action_revoke_prototype_model = PrivateCertificateConfigurationActionRevokePrototype.from_dict( - private_certificate_configuration_action_revoke_prototype_model_json) + private_certificate_configuration_action_revoke_prototype_model = PrivateCertificateConfigurationActionRevokePrototype.from_dict(private_certificate_configuration_action_revoke_prototype_model_json) assert private_certificate_configuration_action_revoke_prototype_model != False # Construct a model instance of PrivateCertificateConfigurationActionRevokePrototype by calling from_dict on the json representation - private_certificate_configuration_action_revoke_prototype_model_dict = PrivateCertificateConfigurationActionRevokePrototype.from_dict( - private_certificate_configuration_action_revoke_prototype_model_json).__dict__ - private_certificate_configuration_action_revoke_prototype_model2 = PrivateCertificateConfigurationActionRevokePrototype( - **private_certificate_configuration_action_revoke_prototype_model_dict) + private_certificate_configuration_action_revoke_prototype_model_dict = PrivateCertificateConfigurationActionRevokePrototype.from_dict(private_certificate_configuration_action_revoke_prototype_model_json).__dict__ + private_certificate_configuration_action_revoke_prototype_model2 = PrivateCertificateConfigurationActionRevokePrototype(**private_certificate_configuration_action_revoke_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_action_revoke_prototype_model == private_certificate_configuration_action_revoke_prototype_model2 @@ -7467,20 +7284,16 @@ def test_private_certificate_configuration_action_rotate_crl_serialization(self) # Construct a json representation of a PrivateCertificateConfigurationActionRotateCRL model private_certificate_configuration_action_rotate_crl_model_json = {} - private_certificate_configuration_action_rotate_crl_model_json[ - 'action_type'] = 'private_cert_configuration_action_rotate_crl' + private_certificate_configuration_action_rotate_crl_model_json['action_type'] = 'private_cert_configuration_action_rotate_crl' private_certificate_configuration_action_rotate_crl_model_json['success'] = True # Construct a model instance of PrivateCertificateConfigurationActionRotateCRL by calling from_dict on the json representation - private_certificate_configuration_action_rotate_crl_model = PrivateCertificateConfigurationActionRotateCRL.from_dict( - private_certificate_configuration_action_rotate_crl_model_json) + private_certificate_configuration_action_rotate_crl_model = PrivateCertificateConfigurationActionRotateCRL.from_dict(private_certificate_configuration_action_rotate_crl_model_json) assert private_certificate_configuration_action_rotate_crl_model != False # Construct a model instance of PrivateCertificateConfigurationActionRotateCRL by calling from_dict on the json representation - private_certificate_configuration_action_rotate_crl_model_dict = PrivateCertificateConfigurationActionRotateCRL.from_dict( - private_certificate_configuration_action_rotate_crl_model_json).__dict__ - private_certificate_configuration_action_rotate_crl_model2 = PrivateCertificateConfigurationActionRotateCRL( - **private_certificate_configuration_action_rotate_crl_model_dict) + private_certificate_configuration_action_rotate_crl_model_dict = PrivateCertificateConfigurationActionRotateCRL.from_dict(private_certificate_configuration_action_rotate_crl_model_json).__dict__ + private_certificate_configuration_action_rotate_crl_model2 = PrivateCertificateConfigurationActionRotateCRL(**private_certificate_configuration_action_rotate_crl_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_action_rotate_crl_model == private_certificate_configuration_action_rotate_crl_model2 @@ -7502,19 +7315,15 @@ def test_private_certificate_configuration_action_rotate_crl_prototype_serializa # Construct a json representation of a PrivateCertificateConfigurationActionRotateCRLPrototype model private_certificate_configuration_action_rotate_crl_prototype_model_json = {} - private_certificate_configuration_action_rotate_crl_prototype_model_json[ - 'action_type'] = 'private_cert_configuration_action_rotate_crl' + private_certificate_configuration_action_rotate_crl_prototype_model_json['action_type'] = 'private_cert_configuration_action_rotate_crl' # Construct a model instance of PrivateCertificateConfigurationActionRotateCRLPrototype by calling from_dict on the json representation - private_certificate_configuration_action_rotate_crl_prototype_model = PrivateCertificateConfigurationActionRotateCRLPrototype.from_dict( - private_certificate_configuration_action_rotate_crl_prototype_model_json) + private_certificate_configuration_action_rotate_crl_prototype_model = PrivateCertificateConfigurationActionRotateCRLPrototype.from_dict(private_certificate_configuration_action_rotate_crl_prototype_model_json) assert private_certificate_configuration_action_rotate_crl_prototype_model != False # Construct a model instance of PrivateCertificateConfigurationActionRotateCRLPrototype by calling from_dict on the json representation - private_certificate_configuration_action_rotate_crl_prototype_model_dict = PrivateCertificateConfigurationActionRotateCRLPrototype.from_dict( - private_certificate_configuration_action_rotate_crl_prototype_model_json).__dict__ - private_certificate_configuration_action_rotate_crl_prototype_model2 = PrivateCertificateConfigurationActionRotateCRLPrototype( - **private_certificate_configuration_action_rotate_crl_prototype_model_dict) + private_certificate_configuration_action_rotate_crl_prototype_model_dict = PrivateCertificateConfigurationActionRotateCRLPrototype.from_dict(private_certificate_configuration_action_rotate_crl_prototype_model_json).__dict__ + private_certificate_configuration_action_rotate_crl_prototype_model2 = PrivateCertificateConfigurationActionRotateCRLPrototype(**private_certificate_configuration_action_rotate_crl_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_action_rotate_crl_prototype_model == private_certificate_configuration_action_rotate_crl_prototype_model2 @@ -7536,20 +7345,16 @@ def test_private_certificate_configuration_action_set_signed_serialization(self) # Construct a json representation of a PrivateCertificateConfigurationActionSetSigned model private_certificate_configuration_action_set_signed_model_json = {} - private_certificate_configuration_action_set_signed_model_json[ - 'action_type'] = 'private_cert_configuration_action_set_signed' + private_certificate_configuration_action_set_signed_model_json['action_type'] = 'private_cert_configuration_action_set_signed' private_certificate_configuration_action_set_signed_model_json['certificate'] = 'testString' # Construct a model instance of PrivateCertificateConfigurationActionSetSigned by calling from_dict on the json representation - private_certificate_configuration_action_set_signed_model = PrivateCertificateConfigurationActionSetSigned.from_dict( - private_certificate_configuration_action_set_signed_model_json) + private_certificate_configuration_action_set_signed_model = PrivateCertificateConfigurationActionSetSigned.from_dict(private_certificate_configuration_action_set_signed_model_json) assert private_certificate_configuration_action_set_signed_model != False # Construct a model instance of PrivateCertificateConfigurationActionSetSigned by calling from_dict on the json representation - private_certificate_configuration_action_set_signed_model_dict = PrivateCertificateConfigurationActionSetSigned.from_dict( - private_certificate_configuration_action_set_signed_model_json).__dict__ - private_certificate_configuration_action_set_signed_model2 = PrivateCertificateConfigurationActionSetSigned( - **private_certificate_configuration_action_set_signed_model_dict) + private_certificate_configuration_action_set_signed_model_dict = PrivateCertificateConfigurationActionSetSigned.from_dict(private_certificate_configuration_action_set_signed_model_json).__dict__ + private_certificate_configuration_action_set_signed_model2 = PrivateCertificateConfigurationActionSetSigned(**private_certificate_configuration_action_set_signed_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_action_set_signed_model == private_certificate_configuration_action_set_signed_model2 @@ -7571,20 +7376,16 @@ def test_private_certificate_configuration_action_set_signed_prototype_serializa # Construct a json representation of a PrivateCertificateConfigurationActionSetSignedPrototype model private_certificate_configuration_action_set_signed_prototype_model_json = {} - private_certificate_configuration_action_set_signed_prototype_model_json[ - 'action_type'] = 'private_cert_configuration_action_set_signed' + private_certificate_configuration_action_set_signed_prototype_model_json['action_type'] = 'private_cert_configuration_action_set_signed' private_certificate_configuration_action_set_signed_prototype_model_json['certificate'] = 'testString' # Construct a model instance of PrivateCertificateConfigurationActionSetSignedPrototype by calling from_dict on the json representation - private_certificate_configuration_action_set_signed_prototype_model = PrivateCertificateConfigurationActionSetSignedPrototype.from_dict( - private_certificate_configuration_action_set_signed_prototype_model_json) + private_certificate_configuration_action_set_signed_prototype_model = PrivateCertificateConfigurationActionSetSignedPrototype.from_dict(private_certificate_configuration_action_set_signed_prototype_model_json) assert private_certificate_configuration_action_set_signed_prototype_model != False # Construct a model instance of PrivateCertificateConfigurationActionSetSignedPrototype by calling from_dict on the json representation - private_certificate_configuration_action_set_signed_prototype_model_dict = PrivateCertificateConfigurationActionSetSignedPrototype.from_dict( - private_certificate_configuration_action_set_signed_prototype_model_json).__dict__ - private_certificate_configuration_action_set_signed_prototype_model2 = PrivateCertificateConfigurationActionSetSignedPrototype( - **private_certificate_configuration_action_set_signed_prototype_model_dict) + private_certificate_configuration_action_set_signed_prototype_model_dict = PrivateCertificateConfigurationActionSetSignedPrototype.from_dict(private_certificate_configuration_action_set_signed_prototype_model_json).__dict__ + private_certificate_configuration_action_set_signed_prototype_model2 = PrivateCertificateConfigurationActionSetSignedPrototype(**private_certificate_configuration_action_set_signed_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_action_set_signed_prototype_model == private_certificate_configuration_action_set_signed_prototype_model2 @@ -7607,8 +7408,7 @@ def test_private_certificate_configuration_action_sign_csr_serialization(self): # Construct a json representation of a PrivateCertificateConfigurationActionSignCSR model private_certificate_configuration_action_sign_csr_model_json = {} private_certificate_configuration_action_sign_csr_model_json['common_name'] = 'localhost' - private_certificate_configuration_action_sign_csr_model_json['alt_names'] = ['s1.example.com', - '*.s2.example.com'] + private_certificate_configuration_action_sign_csr_model_json['alt_names'] = ['s1.example.com', '*.s2.example.com'] private_certificate_configuration_action_sign_csr_model_json['ip_sans'] = '1.1.1.1, 2.2.2.2' private_certificate_configuration_action_sign_csr_model_json['uri_sans'] = 'testString' private_certificate_configuration_action_sign_csr_model_json['other_sans'] = ['2.5.4.5;UTF8:*.example.com'] @@ -7625,22 +7425,17 @@ def test_private_certificate_configuration_action_sign_csr_serialization(self): private_certificate_configuration_action_sign_csr_model_json['province'] = ['testString'] private_certificate_configuration_action_sign_csr_model_json['street_address'] = ['testString'] private_certificate_configuration_action_sign_csr_model_json['postal_code'] = ['testString'] - private_certificate_configuration_action_sign_csr_model_json[ - 'serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' - private_certificate_configuration_action_sign_csr_model_json[ - 'action_type'] = 'private_cert_configuration_action_sign_csr' + private_certificate_configuration_action_sign_csr_model_json['serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' + private_certificate_configuration_action_sign_csr_model_json['action_type'] = 'private_cert_configuration_action_sign_csr' private_certificate_configuration_action_sign_csr_model_json['csr'] = 'testString' # Construct a model instance of PrivateCertificateConfigurationActionSignCSR by calling from_dict on the json representation - private_certificate_configuration_action_sign_csr_model = PrivateCertificateConfigurationActionSignCSR.from_dict( - private_certificate_configuration_action_sign_csr_model_json) + private_certificate_configuration_action_sign_csr_model = PrivateCertificateConfigurationActionSignCSR.from_dict(private_certificate_configuration_action_sign_csr_model_json) assert private_certificate_configuration_action_sign_csr_model != False # Construct a model instance of PrivateCertificateConfigurationActionSignCSR by calling from_dict on the json representation - private_certificate_configuration_action_sign_csr_model_dict = PrivateCertificateConfigurationActionSignCSR.from_dict( - private_certificate_configuration_action_sign_csr_model_json).__dict__ - private_certificate_configuration_action_sign_csr_model2 = PrivateCertificateConfigurationActionSignCSR( - **private_certificate_configuration_action_sign_csr_model_dict) + private_certificate_configuration_action_sign_csr_model_dict = PrivateCertificateConfigurationActionSignCSR.from_dict(private_certificate_configuration_action_sign_csr_model_json).__dict__ + private_certificate_configuration_action_sign_csr_model2 = PrivateCertificateConfigurationActionSignCSR(**private_certificate_configuration_action_sign_csr_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_action_sign_csr_model == private_certificate_configuration_action_sign_csr_model2 @@ -7663,12 +7458,10 @@ def test_private_certificate_configuration_action_sign_csr_prototype_serializati # Construct a json representation of a PrivateCertificateConfigurationActionSignCSRPrototype model private_certificate_configuration_action_sign_csr_prototype_model_json = {} private_certificate_configuration_action_sign_csr_prototype_model_json['common_name'] = 'localhost' - private_certificate_configuration_action_sign_csr_prototype_model_json['alt_names'] = ['s1.example.com', - '*.s2.example.com'] + private_certificate_configuration_action_sign_csr_prototype_model_json['alt_names'] = ['s1.example.com', '*.s2.example.com'] private_certificate_configuration_action_sign_csr_prototype_model_json['ip_sans'] = '1.1.1.1, 2.2.2.2' private_certificate_configuration_action_sign_csr_prototype_model_json['uri_sans'] = 'testString' - private_certificate_configuration_action_sign_csr_prototype_model_json['other_sans'] = [ - '2.5.4.5;UTF8:*.example.com'] + private_certificate_configuration_action_sign_csr_prototype_model_json['other_sans'] = ['2.5.4.5;UTF8:*.example.com'] private_certificate_configuration_action_sign_csr_prototype_model_json['ttl'] = '12h' private_certificate_configuration_action_sign_csr_prototype_model_json['format'] = 'pem' private_certificate_configuration_action_sign_csr_prototype_model_json['max_path_length'] = 38 @@ -7682,22 +7475,17 @@ def test_private_certificate_configuration_action_sign_csr_prototype_serializati private_certificate_configuration_action_sign_csr_prototype_model_json['province'] = ['testString'] private_certificate_configuration_action_sign_csr_prototype_model_json['street_address'] = ['testString'] private_certificate_configuration_action_sign_csr_prototype_model_json['postal_code'] = ['testString'] - private_certificate_configuration_action_sign_csr_prototype_model_json[ - 'serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' - private_certificate_configuration_action_sign_csr_prototype_model_json[ - 'action_type'] = 'private_cert_configuration_action_sign_csr' + private_certificate_configuration_action_sign_csr_prototype_model_json['serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' + private_certificate_configuration_action_sign_csr_prototype_model_json['action_type'] = 'private_cert_configuration_action_sign_csr' private_certificate_configuration_action_sign_csr_prototype_model_json['csr'] = 'testString' # Construct a model instance of PrivateCertificateConfigurationActionSignCSRPrototype by calling from_dict on the json representation - private_certificate_configuration_action_sign_csr_prototype_model = PrivateCertificateConfigurationActionSignCSRPrototype.from_dict( - private_certificate_configuration_action_sign_csr_prototype_model_json) + private_certificate_configuration_action_sign_csr_prototype_model = PrivateCertificateConfigurationActionSignCSRPrototype.from_dict(private_certificate_configuration_action_sign_csr_prototype_model_json) assert private_certificate_configuration_action_sign_csr_prototype_model != False # Construct a model instance of PrivateCertificateConfigurationActionSignCSRPrototype by calling from_dict on the json representation - private_certificate_configuration_action_sign_csr_prototype_model_dict = PrivateCertificateConfigurationActionSignCSRPrototype.from_dict( - private_certificate_configuration_action_sign_csr_prototype_model_json).__dict__ - private_certificate_configuration_action_sign_csr_prototype_model2 = PrivateCertificateConfigurationActionSignCSRPrototype( - **private_certificate_configuration_action_sign_csr_prototype_model_dict) + private_certificate_configuration_action_sign_csr_prototype_model_dict = PrivateCertificateConfigurationActionSignCSRPrototype.from_dict(private_certificate_configuration_action_sign_csr_prototype_model_json).__dict__ + private_certificate_configuration_action_sign_csr_prototype_model2 = PrivateCertificateConfigurationActionSignCSRPrototype(**private_certificate_configuration_action_sign_csr_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_action_sign_csr_prototype_model == private_certificate_configuration_action_sign_csr_prototype_model2 @@ -7720,12 +7508,10 @@ def test_private_certificate_configuration_action_sign_intermediate_serializatio # Construct a json representation of a PrivateCertificateConfigurationActionSignIntermediate model private_certificate_configuration_action_sign_intermediate_model_json = {} private_certificate_configuration_action_sign_intermediate_model_json['common_name'] = 'localhost' - private_certificate_configuration_action_sign_intermediate_model_json['alt_names'] = ['s1.example.com', - '*.s2.example.com'] + private_certificate_configuration_action_sign_intermediate_model_json['alt_names'] = ['s1.example.com', '*.s2.example.com'] private_certificate_configuration_action_sign_intermediate_model_json['ip_sans'] = '1.1.1.1, 2.2.2.2' private_certificate_configuration_action_sign_intermediate_model_json['uri_sans'] = 'testString' - private_certificate_configuration_action_sign_intermediate_model_json['other_sans'] = [ - '2.5.4.5;UTF8:*.example.com'] + private_certificate_configuration_action_sign_intermediate_model_json['other_sans'] = ['2.5.4.5;UTF8:*.example.com'] private_certificate_configuration_action_sign_intermediate_model_json['ttl'] = '12h' private_certificate_configuration_action_sign_intermediate_model_json['format'] = 'pem' private_certificate_configuration_action_sign_intermediate_model_json['max_path_length'] = 38 @@ -7739,23 +7525,17 @@ def test_private_certificate_configuration_action_sign_intermediate_serializatio private_certificate_configuration_action_sign_intermediate_model_json['province'] = ['testString'] private_certificate_configuration_action_sign_intermediate_model_json['street_address'] = ['testString'] private_certificate_configuration_action_sign_intermediate_model_json['postal_code'] = ['testString'] - private_certificate_configuration_action_sign_intermediate_model_json[ - 'serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' - private_certificate_configuration_action_sign_intermediate_model_json[ - 'action_type'] = 'private_cert_configuration_action_sign_intermediate' - private_certificate_configuration_action_sign_intermediate_model_json[ - 'intermediate_certificate_authority'] = 'example-intermediate-CA' + private_certificate_configuration_action_sign_intermediate_model_json['serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' + private_certificate_configuration_action_sign_intermediate_model_json['action_type'] = 'private_cert_configuration_action_sign_intermediate' + private_certificate_configuration_action_sign_intermediate_model_json['intermediate_certificate_authority'] = 'example-intermediate-CA' # Construct a model instance of PrivateCertificateConfigurationActionSignIntermediate by calling from_dict on the json representation - private_certificate_configuration_action_sign_intermediate_model = PrivateCertificateConfigurationActionSignIntermediate.from_dict( - private_certificate_configuration_action_sign_intermediate_model_json) + private_certificate_configuration_action_sign_intermediate_model = PrivateCertificateConfigurationActionSignIntermediate.from_dict(private_certificate_configuration_action_sign_intermediate_model_json) assert private_certificate_configuration_action_sign_intermediate_model != False # Construct a model instance of PrivateCertificateConfigurationActionSignIntermediate by calling from_dict on the json representation - private_certificate_configuration_action_sign_intermediate_model_dict = PrivateCertificateConfigurationActionSignIntermediate.from_dict( - private_certificate_configuration_action_sign_intermediate_model_json).__dict__ - private_certificate_configuration_action_sign_intermediate_model2 = PrivateCertificateConfigurationActionSignIntermediate( - **private_certificate_configuration_action_sign_intermediate_model_dict) + private_certificate_configuration_action_sign_intermediate_model_dict = PrivateCertificateConfigurationActionSignIntermediate.from_dict(private_certificate_configuration_action_sign_intermediate_model_json).__dict__ + private_certificate_configuration_action_sign_intermediate_model2 = PrivateCertificateConfigurationActionSignIntermediate(**private_certificate_configuration_action_sign_intermediate_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_action_sign_intermediate_model == private_certificate_configuration_action_sign_intermediate_model2 @@ -7778,44 +7558,34 @@ def test_private_certificate_configuration_action_sign_intermediate_prototype_se # Construct a json representation of a PrivateCertificateConfigurationActionSignIntermediatePrototype model private_certificate_configuration_action_sign_intermediate_prototype_model_json = {} private_certificate_configuration_action_sign_intermediate_prototype_model_json['common_name'] = 'localhost' - private_certificate_configuration_action_sign_intermediate_prototype_model_json['alt_names'] = [ - 's1.example.com', '*.s2.example.com'] + private_certificate_configuration_action_sign_intermediate_prototype_model_json['alt_names'] = ['s1.example.com', '*.s2.example.com'] private_certificate_configuration_action_sign_intermediate_prototype_model_json['ip_sans'] = '1.1.1.1, 2.2.2.2' private_certificate_configuration_action_sign_intermediate_prototype_model_json['uri_sans'] = 'testString' - private_certificate_configuration_action_sign_intermediate_prototype_model_json['other_sans'] = [ - '2.5.4.5;UTF8:*.example.com'] + private_certificate_configuration_action_sign_intermediate_prototype_model_json['other_sans'] = ['2.5.4.5;UTF8:*.example.com'] private_certificate_configuration_action_sign_intermediate_prototype_model_json['ttl'] = '12h' private_certificate_configuration_action_sign_intermediate_prototype_model_json['format'] = 'pem' private_certificate_configuration_action_sign_intermediate_prototype_model_json['max_path_length'] = 38 private_certificate_configuration_action_sign_intermediate_prototype_model_json['exclude_cn_from_sans'] = True - private_certificate_configuration_action_sign_intermediate_prototype_model_json['permitted_dns_domains'] = [ - 'testString'] + private_certificate_configuration_action_sign_intermediate_prototype_model_json['permitted_dns_domains'] = ['testString'] private_certificate_configuration_action_sign_intermediate_prototype_model_json['use_csr_values'] = True private_certificate_configuration_action_sign_intermediate_prototype_model_json['ou'] = ['testString'] private_certificate_configuration_action_sign_intermediate_prototype_model_json['organization'] = ['testString'] private_certificate_configuration_action_sign_intermediate_prototype_model_json['country'] = ['testString'] private_certificate_configuration_action_sign_intermediate_prototype_model_json['locality'] = ['testString'] private_certificate_configuration_action_sign_intermediate_prototype_model_json['province'] = ['testString'] - private_certificate_configuration_action_sign_intermediate_prototype_model_json['street_address'] = [ - 'testString'] + private_certificate_configuration_action_sign_intermediate_prototype_model_json['street_address'] = ['testString'] private_certificate_configuration_action_sign_intermediate_prototype_model_json['postal_code'] = ['testString'] - private_certificate_configuration_action_sign_intermediate_prototype_model_json[ - 'serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' - private_certificate_configuration_action_sign_intermediate_prototype_model_json[ - 'action_type'] = 'private_cert_configuration_action_sign_intermediate' - private_certificate_configuration_action_sign_intermediate_prototype_model_json[ - 'intermediate_certificate_authority'] = 'example-intermediate-CA' + private_certificate_configuration_action_sign_intermediate_prototype_model_json['serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' + private_certificate_configuration_action_sign_intermediate_prototype_model_json['action_type'] = 'private_cert_configuration_action_sign_intermediate' + private_certificate_configuration_action_sign_intermediate_prototype_model_json['intermediate_certificate_authority'] = 'example-intermediate-CA' # Construct a model instance of PrivateCertificateConfigurationActionSignIntermediatePrototype by calling from_dict on the json representation - private_certificate_configuration_action_sign_intermediate_prototype_model = PrivateCertificateConfigurationActionSignIntermediatePrototype.from_dict( - private_certificate_configuration_action_sign_intermediate_prototype_model_json) + private_certificate_configuration_action_sign_intermediate_prototype_model = PrivateCertificateConfigurationActionSignIntermediatePrototype.from_dict(private_certificate_configuration_action_sign_intermediate_prototype_model_json) assert private_certificate_configuration_action_sign_intermediate_prototype_model != False # Construct a model instance of PrivateCertificateConfigurationActionSignIntermediatePrototype by calling from_dict on the json representation - private_certificate_configuration_action_sign_intermediate_prototype_model_dict = PrivateCertificateConfigurationActionSignIntermediatePrototype.from_dict( - private_certificate_configuration_action_sign_intermediate_prototype_model_json).__dict__ - private_certificate_configuration_action_sign_intermediate_prototype_model2 = PrivateCertificateConfigurationActionSignIntermediatePrototype( - **private_certificate_configuration_action_sign_intermediate_prototype_model_dict) + private_certificate_configuration_action_sign_intermediate_prototype_model_dict = PrivateCertificateConfigurationActionSignIntermediatePrototype.from_dict(private_certificate_configuration_action_sign_intermediate_prototype_model_json).__dict__ + private_certificate_configuration_action_sign_intermediate_prototype_model2 = PrivateCertificateConfigurationActionSignIntermediatePrototype(**private_certificate_configuration_action_sign_intermediate_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_action_sign_intermediate_prototype_model == private_certificate_configuration_action_sign_intermediate_prototype_model2 @@ -7840,15 +7610,12 @@ def test_private_certificate_configuration_ca_certificate_serialization(self): private_certificate_configuration_ca_certificate_model_json['certificate'] = 'testString' # Construct a model instance of PrivateCertificateConfigurationCACertificate by calling from_dict on the json representation - private_certificate_configuration_ca_certificate_model = PrivateCertificateConfigurationCACertificate.from_dict( - private_certificate_configuration_ca_certificate_model_json) + private_certificate_configuration_ca_certificate_model = PrivateCertificateConfigurationCACertificate.from_dict(private_certificate_configuration_ca_certificate_model_json) assert private_certificate_configuration_ca_certificate_model != False # Construct a model instance of PrivateCertificateConfigurationCACertificate by calling from_dict on the json representation - private_certificate_configuration_ca_certificate_model_dict = PrivateCertificateConfigurationCACertificate.from_dict( - private_certificate_configuration_ca_certificate_model_json).__dict__ - private_certificate_configuration_ca_certificate_model2 = PrivateCertificateConfigurationCACertificate( - **private_certificate_configuration_ca_certificate_model_dict) + private_certificate_configuration_ca_certificate_model_dict = PrivateCertificateConfigurationCACertificate.from_dict(private_certificate_configuration_ca_certificate_model_json).__dict__ + private_certificate_configuration_ca_certificate_model2 = PrivateCertificateConfigurationCACertificate(**private_certificate_configuration_ca_certificate_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_ca_certificate_model == private_certificate_configuration_ca_certificate_model2 @@ -7872,10 +7639,8 @@ def test_private_certificate_configuration_intermediate_ca_serialization(self): private_certificate_crypto_provider_model = {} # PrivateCertificateCryptoProviderHPCS private_certificate_crypto_provider_model['type'] = 'hyper_protect_crypto_services' - private_certificate_crypto_provider_model[ - 'instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' - private_certificate_crypto_provider_model[ - 'pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' + private_certificate_crypto_provider_model['instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' + private_certificate_crypto_provider_model['pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' private_certificate_crypto_provider_model['private_keystore_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' private_certificate_crypto_key_model = {} # PrivateCertificateCryptoKey @@ -7891,12 +7656,10 @@ def test_private_certificate_configuration_intermediate_ca_serialization(self): # Construct a json representation of a PrivateCertificateConfigurationIntermediateCA model private_certificate_configuration_intermediate_ca_model_json = {} - private_certificate_configuration_intermediate_ca_model_json[ - 'config_type'] = 'private_cert_configuration_intermediate_ca' + private_certificate_configuration_intermediate_ca_model_json['config_type'] = 'private_cert_configuration_intermediate_ca' private_certificate_configuration_intermediate_ca_model_json['name'] = 'my-secret-engine-config' private_certificate_configuration_intermediate_ca_model_json['secret_type'] = 'arbitrary' - private_certificate_configuration_intermediate_ca_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + private_certificate_configuration_intermediate_ca_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' private_certificate_configuration_intermediate_ca_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_intermediate_ca_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_intermediate_ca_model_json['common_name'] = 'localhost' @@ -7906,12 +7669,10 @@ def test_private_certificate_configuration_intermediate_ca_serialization(self): private_certificate_configuration_intermediate_ca_model_json['key_type'] = 'rsa' private_certificate_configuration_intermediate_ca_model_json['key_bits'] = 4096 private_certificate_configuration_intermediate_ca_model_json['signing_method'] = 'internal' - private_certificate_configuration_intermediate_ca_model_json[ - 'crypto_key'] = private_certificate_crypto_key_model + private_certificate_configuration_intermediate_ca_model_json['crypto_key'] = private_certificate_crypto_key_model private_certificate_configuration_intermediate_ca_model_json['crl_disable'] = True private_certificate_configuration_intermediate_ca_model_json['issuing_certificates_urls_encoded'] = True - private_certificate_configuration_intermediate_ca_model_json['alt_names'] = ['s1.example.com', - '*.s2.example.com'] + private_certificate_configuration_intermediate_ca_model_json['alt_names'] = ['s1.example.com', '*.s2.example.com'] private_certificate_configuration_intermediate_ca_model_json['ip_sans'] = '1.1.1.1, 2.2.2.2' private_certificate_configuration_intermediate_ca_model_json['uri_sans'] = 'testString' private_certificate_configuration_intermediate_ca_model_json['other_sans'] = ['2.5.4.5;UTF8:*.example.com'] @@ -7925,20 +7686,16 @@ def test_private_certificate_configuration_intermediate_ca_serialization(self): private_certificate_configuration_intermediate_ca_model_json['province'] = ['testString'] private_certificate_configuration_intermediate_ca_model_json['street_address'] = ['testString'] private_certificate_configuration_intermediate_ca_model_json['postal_code'] = ['testString'] - private_certificate_configuration_intermediate_ca_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + private_certificate_configuration_intermediate_ca_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' private_certificate_configuration_intermediate_ca_model_json['data'] = private_certificate_ca_data_model # Construct a model instance of PrivateCertificateConfigurationIntermediateCA by calling from_dict on the json representation - private_certificate_configuration_intermediate_ca_model = PrivateCertificateConfigurationIntermediateCA.from_dict( - private_certificate_configuration_intermediate_ca_model_json) + private_certificate_configuration_intermediate_ca_model = PrivateCertificateConfigurationIntermediateCA.from_dict(private_certificate_configuration_intermediate_ca_model_json) assert private_certificate_configuration_intermediate_ca_model != False # Construct a model instance of PrivateCertificateConfigurationIntermediateCA by calling from_dict on the json representation - private_certificate_configuration_intermediate_ca_model_dict = PrivateCertificateConfigurationIntermediateCA.from_dict( - private_certificate_configuration_intermediate_ca_model_json).__dict__ - private_certificate_configuration_intermediate_ca_model2 = PrivateCertificateConfigurationIntermediateCA( - **private_certificate_configuration_intermediate_ca_model_dict) + private_certificate_configuration_intermediate_ca_model_dict = PrivateCertificateConfigurationIntermediateCA.from_dict(private_certificate_configuration_intermediate_ca_model_json).__dict__ + private_certificate_configuration_intermediate_ca_model2 = PrivateCertificateConfigurationIntermediateCA(**private_certificate_configuration_intermediate_ca_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_intermediate_ca_model == private_certificate_configuration_intermediate_ca_model2 @@ -7965,15 +7722,12 @@ def test_private_certificate_configuration_intermediate_cacsr_serialization(self private_certificate_configuration_intermediate_cacsr_model_json['private_key_type'] = 'rsa' # Construct a model instance of PrivateCertificateConfigurationIntermediateCACSR by calling from_dict on the json representation - private_certificate_configuration_intermediate_cacsr_model = PrivateCertificateConfigurationIntermediateCACSR.from_dict( - private_certificate_configuration_intermediate_cacsr_model_json) + private_certificate_configuration_intermediate_cacsr_model = PrivateCertificateConfigurationIntermediateCACSR.from_dict(private_certificate_configuration_intermediate_cacsr_model_json) assert private_certificate_configuration_intermediate_cacsr_model != False # Construct a model instance of PrivateCertificateConfigurationIntermediateCACSR by calling from_dict on the json representation - private_certificate_configuration_intermediate_cacsr_model_dict = PrivateCertificateConfigurationIntermediateCACSR.from_dict( - private_certificate_configuration_intermediate_cacsr_model_json).__dict__ - private_certificate_configuration_intermediate_cacsr_model2 = PrivateCertificateConfigurationIntermediateCACSR( - **private_certificate_configuration_intermediate_cacsr_model_dict) + private_certificate_configuration_intermediate_cacsr_model_dict = PrivateCertificateConfigurationIntermediateCACSR.from_dict(private_certificate_configuration_intermediate_cacsr_model_json).__dict__ + private_certificate_configuration_intermediate_cacsr_model2 = PrivateCertificateConfigurationIntermediateCACSR(**private_certificate_configuration_intermediate_cacsr_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_intermediate_cacsr_model == private_certificate_configuration_intermediate_cacsr_model2 @@ -7997,10 +7751,8 @@ def test_private_certificate_configuration_intermediate_ca_metadata_serializatio private_certificate_crypto_provider_model = {} # PrivateCertificateCryptoProviderHPCS private_certificate_crypto_provider_model['type'] = 'hyper_protect_crypto_services' - private_certificate_crypto_provider_model[ - 'instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' - private_certificate_crypto_provider_model[ - 'pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' + private_certificate_crypto_provider_model['instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' + private_certificate_crypto_provider_model['pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' private_certificate_crypto_provider_model['private_keystore_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' private_certificate_crypto_key_model = {} # PrivateCertificateCryptoKey @@ -8011,37 +7763,28 @@ def test_private_certificate_configuration_intermediate_ca_metadata_serializatio # Construct a json representation of a PrivateCertificateConfigurationIntermediateCAMetadata model private_certificate_configuration_intermediate_ca_metadata_model_json = {} - private_certificate_configuration_intermediate_ca_metadata_model_json[ - 'config_type'] = 'private_cert_configuration_intermediate_ca' + private_certificate_configuration_intermediate_ca_metadata_model_json['config_type'] = 'private_cert_configuration_intermediate_ca' private_certificate_configuration_intermediate_ca_metadata_model_json['name'] = 'my-secret-engine-config' private_certificate_configuration_intermediate_ca_metadata_model_json['secret_type'] = 'arbitrary' - private_certificate_configuration_intermediate_ca_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' - private_certificate_configuration_intermediate_ca_metadata_model_json[ - 'created_at'] = '2022-04-12T23:20:50.520000Z' - private_certificate_configuration_intermediate_ca_metadata_model_json[ - 'updated_at'] = '2022-04-12T23:20:50.520000Z' + private_certificate_configuration_intermediate_ca_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + private_certificate_configuration_intermediate_ca_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' + private_certificate_configuration_intermediate_ca_metadata_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_intermediate_ca_metadata_model_json['common_name'] = 'localhost' private_certificate_configuration_intermediate_ca_metadata_model_json['crl_distribution_points_encoded'] = True - private_certificate_configuration_intermediate_ca_metadata_model_json[ - 'expiration_date'] = '2033-04-12T23:20:50.520000Z' + private_certificate_configuration_intermediate_ca_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' private_certificate_configuration_intermediate_ca_metadata_model_json['issuer'] = 'Lets Encrypt' private_certificate_configuration_intermediate_ca_metadata_model_json['key_type'] = 'rsa' private_certificate_configuration_intermediate_ca_metadata_model_json['key_bits'] = 4096 private_certificate_configuration_intermediate_ca_metadata_model_json['signing_method'] = 'internal' - private_certificate_configuration_intermediate_ca_metadata_model_json[ - 'crypto_key'] = private_certificate_crypto_key_model + private_certificate_configuration_intermediate_ca_metadata_model_json['crypto_key'] = private_certificate_crypto_key_model # Construct a model instance of PrivateCertificateConfigurationIntermediateCAMetadata by calling from_dict on the json representation - private_certificate_configuration_intermediate_ca_metadata_model = PrivateCertificateConfigurationIntermediateCAMetadata.from_dict( - private_certificate_configuration_intermediate_ca_metadata_model_json) + private_certificate_configuration_intermediate_ca_metadata_model = PrivateCertificateConfigurationIntermediateCAMetadata.from_dict(private_certificate_configuration_intermediate_ca_metadata_model_json) assert private_certificate_configuration_intermediate_ca_metadata_model != False # Construct a model instance of PrivateCertificateConfigurationIntermediateCAMetadata by calling from_dict on the json representation - private_certificate_configuration_intermediate_ca_metadata_model_dict = PrivateCertificateConfigurationIntermediateCAMetadata.from_dict( - private_certificate_configuration_intermediate_ca_metadata_model_json).__dict__ - private_certificate_configuration_intermediate_ca_metadata_model2 = PrivateCertificateConfigurationIntermediateCAMetadata( - **private_certificate_configuration_intermediate_ca_metadata_model_dict) + private_certificate_configuration_intermediate_ca_metadata_model_dict = PrivateCertificateConfigurationIntermediateCAMetadata.from_dict(private_certificate_configuration_intermediate_ca_metadata_model_json).__dict__ + private_certificate_configuration_intermediate_ca_metadata_model2 = PrivateCertificateConfigurationIntermediateCAMetadata(**private_certificate_configuration_intermediate_ca_metadata_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_intermediate_ca_metadata_model == private_certificate_configuration_intermediate_ca_metadata_model2 @@ -8070,15 +7813,12 @@ def test_private_certificate_configuration_intermediate_ca_patch_serialization(s private_certificate_configuration_intermediate_ca_patch_model_json['issuing_certificates_urls_encoded'] = True # Construct a model instance of PrivateCertificateConfigurationIntermediateCAPatch by calling from_dict on the json representation - private_certificate_configuration_intermediate_ca_patch_model = PrivateCertificateConfigurationIntermediateCAPatch.from_dict( - private_certificate_configuration_intermediate_ca_patch_model_json) + private_certificate_configuration_intermediate_ca_patch_model = PrivateCertificateConfigurationIntermediateCAPatch.from_dict(private_certificate_configuration_intermediate_ca_patch_model_json) assert private_certificate_configuration_intermediate_ca_patch_model != False # Construct a model instance of PrivateCertificateConfigurationIntermediateCAPatch by calling from_dict on the json representation - private_certificate_configuration_intermediate_ca_patch_model_dict = PrivateCertificateConfigurationIntermediateCAPatch.from_dict( - private_certificate_configuration_intermediate_ca_patch_model_json).__dict__ - private_certificate_configuration_intermediate_ca_patch_model2 = PrivateCertificateConfigurationIntermediateCAPatch( - **private_certificate_configuration_intermediate_ca_patch_model_dict) + private_certificate_configuration_intermediate_ca_patch_model_dict = PrivateCertificateConfigurationIntermediateCAPatch.from_dict(private_certificate_configuration_intermediate_ca_patch_model_json).__dict__ + private_certificate_configuration_intermediate_ca_patch_model2 = PrivateCertificateConfigurationIntermediateCAPatch(**private_certificate_configuration_intermediate_ca_patch_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_intermediate_ca_patch_model == private_certificate_configuration_intermediate_ca_patch_model2 @@ -8102,10 +7842,8 @@ def test_private_certificate_configuration_intermediate_ca_prototype_serializati private_certificate_crypto_provider_model = {} # PrivateCertificateCryptoProviderHPCS private_certificate_crypto_provider_model['type'] = 'hyper_protect_crypto_services' - private_certificate_crypto_provider_model[ - 'instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' - private_certificate_crypto_provider_model[ - 'pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' + private_certificate_crypto_provider_model['instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' + private_certificate_crypto_provider_model['pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' private_certificate_crypto_provider_model['private_keystore_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' private_certificate_crypto_key_model = {} # PrivateCertificateCryptoKey @@ -8116,26 +7854,21 @@ def test_private_certificate_configuration_intermediate_ca_prototype_serializati # Construct a json representation of a PrivateCertificateConfigurationIntermediateCAPrototype model private_certificate_configuration_intermediate_ca_prototype_model_json = {} - private_certificate_configuration_intermediate_ca_prototype_model_json[ - 'config_type'] = 'private_cert_configuration_intermediate_ca' + private_certificate_configuration_intermediate_ca_prototype_model_json['config_type'] = 'private_cert_configuration_intermediate_ca' private_certificate_configuration_intermediate_ca_prototype_model_json['name'] = 'my-example-engine-config' - private_certificate_configuration_intermediate_ca_prototype_model_json[ - 'crypto_key'] = private_certificate_crypto_key_model + private_certificate_configuration_intermediate_ca_prototype_model_json['crypto_key'] = private_certificate_crypto_key_model private_certificate_configuration_intermediate_ca_prototype_model_json['max_ttl'] = '8760h' private_certificate_configuration_intermediate_ca_prototype_model_json['signing_method'] = 'internal' private_certificate_configuration_intermediate_ca_prototype_model_json['issuer'] = 'Lets Encrypt' private_certificate_configuration_intermediate_ca_prototype_model_json['crl_expiry'] = '72h' private_certificate_configuration_intermediate_ca_prototype_model_json['crl_disable'] = True private_certificate_configuration_intermediate_ca_prototype_model_json['crl_distribution_points_encoded'] = True - private_certificate_configuration_intermediate_ca_prototype_model_json[ - 'issuing_certificates_urls_encoded'] = True + private_certificate_configuration_intermediate_ca_prototype_model_json['issuing_certificates_urls_encoded'] = True private_certificate_configuration_intermediate_ca_prototype_model_json['common_name'] = 'localhost' - private_certificate_configuration_intermediate_ca_prototype_model_json['alt_names'] = ['s1.example.com', - '*.s2.example.com'] + private_certificate_configuration_intermediate_ca_prototype_model_json['alt_names'] = ['s1.example.com', '*.s2.example.com'] private_certificate_configuration_intermediate_ca_prototype_model_json['ip_sans'] = '1.1.1.1, 2.2.2.2' private_certificate_configuration_intermediate_ca_prototype_model_json['uri_sans'] = 'testString' - private_certificate_configuration_intermediate_ca_prototype_model_json['other_sans'] = [ - '2.5.4.5;UTF8:*.example.com'] + private_certificate_configuration_intermediate_ca_prototype_model_json['other_sans'] = ['2.5.4.5;UTF8:*.example.com'] private_certificate_configuration_intermediate_ca_prototype_model_json['format'] = 'pem' private_certificate_configuration_intermediate_ca_prototype_model_json['private_key_format'] = 'der' private_certificate_configuration_intermediate_ca_prototype_model_json['key_type'] = 'rsa' @@ -8148,19 +7881,15 @@ def test_private_certificate_configuration_intermediate_ca_prototype_serializati private_certificate_configuration_intermediate_ca_prototype_model_json['province'] = ['testString'] private_certificate_configuration_intermediate_ca_prototype_model_json['street_address'] = ['testString'] private_certificate_configuration_intermediate_ca_prototype_model_json['postal_code'] = ['testString'] - private_certificate_configuration_intermediate_ca_prototype_model_json[ - 'serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' + private_certificate_configuration_intermediate_ca_prototype_model_json['serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' # Construct a model instance of PrivateCertificateConfigurationIntermediateCAPrototype by calling from_dict on the json representation - private_certificate_configuration_intermediate_ca_prototype_model = PrivateCertificateConfigurationIntermediateCAPrototype.from_dict( - private_certificate_configuration_intermediate_ca_prototype_model_json) + private_certificate_configuration_intermediate_ca_prototype_model = PrivateCertificateConfigurationIntermediateCAPrototype.from_dict(private_certificate_configuration_intermediate_ca_prototype_model_json) assert private_certificate_configuration_intermediate_ca_prototype_model != False # Construct a model instance of PrivateCertificateConfigurationIntermediateCAPrototype by calling from_dict on the json representation - private_certificate_configuration_intermediate_ca_prototype_model_dict = PrivateCertificateConfigurationIntermediateCAPrototype.from_dict( - private_certificate_configuration_intermediate_ca_prototype_model_json).__dict__ - private_certificate_configuration_intermediate_ca_prototype_model2 = PrivateCertificateConfigurationIntermediateCAPrototype( - **private_certificate_configuration_intermediate_ca_prototype_model_dict) + private_certificate_configuration_intermediate_ca_prototype_model_dict = PrivateCertificateConfigurationIntermediateCAPrototype.from_dict(private_certificate_configuration_intermediate_ca_prototype_model_json).__dict__ + private_certificate_configuration_intermediate_ca_prototype_model2 = PrivateCertificateConfigurationIntermediateCAPrototype(**private_certificate_configuration_intermediate_ca_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_intermediate_ca_prototype_model == private_certificate_configuration_intermediate_ca_prototype_model2 @@ -8184,10 +7913,8 @@ def test_private_certificate_configuration_root_ca_serialization(self): private_certificate_crypto_provider_model = {} # PrivateCertificateCryptoProviderHPCS private_certificate_crypto_provider_model['type'] = 'hyper_protect_crypto_services' - private_certificate_crypto_provider_model[ - 'instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' - private_certificate_crypto_provider_model[ - 'pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' + private_certificate_crypto_provider_model['instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' + private_certificate_crypto_provider_model['pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' private_certificate_crypto_provider_model['private_keystore_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' private_certificate_crypto_key_model = {} # PrivateCertificateCryptoKey @@ -8206,8 +7933,7 @@ def test_private_certificate_configuration_root_ca_serialization(self): private_certificate_configuration_root_ca_model_json['config_type'] = 'private_cert_configuration_root_ca' private_certificate_configuration_root_ca_model_json['name'] = 'my-secret-engine-config' private_certificate_configuration_root_ca_model_json['secret_type'] = 'arbitrary' - private_certificate_configuration_root_ca_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + private_certificate_configuration_root_ca_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' private_certificate_configuration_root_ca_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_root_ca_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_root_ca_model_json['common_name'] = 'localhost' @@ -8234,20 +7960,16 @@ def test_private_certificate_configuration_root_ca_serialization(self): private_certificate_configuration_root_ca_model_json['province'] = ['testString'] private_certificate_configuration_root_ca_model_json['street_address'] = ['testString'] private_certificate_configuration_root_ca_model_json['postal_code'] = ['testString'] - private_certificate_configuration_root_ca_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + private_certificate_configuration_root_ca_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' private_certificate_configuration_root_ca_model_json['data'] = private_certificate_ca_data_model # Construct a model instance of PrivateCertificateConfigurationRootCA by calling from_dict on the json representation - private_certificate_configuration_root_ca_model = PrivateCertificateConfigurationRootCA.from_dict( - private_certificate_configuration_root_ca_model_json) + private_certificate_configuration_root_ca_model = PrivateCertificateConfigurationRootCA.from_dict(private_certificate_configuration_root_ca_model_json) assert private_certificate_configuration_root_ca_model != False # Construct a model instance of PrivateCertificateConfigurationRootCA by calling from_dict on the json representation - private_certificate_configuration_root_ca_model_dict = PrivateCertificateConfigurationRootCA.from_dict( - private_certificate_configuration_root_ca_model_json).__dict__ - private_certificate_configuration_root_ca_model2 = PrivateCertificateConfigurationRootCA( - **private_certificate_configuration_root_ca_model_dict) + private_certificate_configuration_root_ca_model_dict = PrivateCertificateConfigurationRootCA.from_dict(private_certificate_configuration_root_ca_model_json).__dict__ + private_certificate_configuration_root_ca_model2 = PrivateCertificateConfigurationRootCA(**private_certificate_configuration_root_ca_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_root_ca_model == private_certificate_configuration_root_ca_model2 @@ -8271,10 +7993,8 @@ def test_private_certificate_configuration_root_ca_metadata_serialization(self): private_certificate_crypto_provider_model = {} # PrivateCertificateCryptoProviderHPCS private_certificate_crypto_provider_model['type'] = 'hyper_protect_crypto_services' - private_certificate_crypto_provider_model[ - 'instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' - private_certificate_crypto_provider_model[ - 'pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' + private_certificate_crypto_provider_model['instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' + private_certificate_crypto_provider_model['pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' private_certificate_crypto_provider_model['private_keystore_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' private_certificate_crypto_key_model = {} # PrivateCertificateCryptoKey @@ -8285,12 +8005,10 @@ def test_private_certificate_configuration_root_ca_metadata_serialization(self): # Construct a json representation of a PrivateCertificateConfigurationRootCAMetadata model private_certificate_configuration_root_ca_metadata_model_json = {} - private_certificate_configuration_root_ca_metadata_model_json[ - 'config_type'] = 'private_cert_configuration_root_ca' + private_certificate_configuration_root_ca_metadata_model_json['config_type'] = 'private_cert_configuration_root_ca' private_certificate_configuration_root_ca_metadata_model_json['name'] = 'my-secret-engine-config' private_certificate_configuration_root_ca_metadata_model_json['secret_type'] = 'arbitrary' - private_certificate_configuration_root_ca_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + private_certificate_configuration_root_ca_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' private_certificate_configuration_root_ca_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_root_ca_metadata_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_root_ca_metadata_model_json['common_name'] = 'localhost' @@ -8298,19 +8016,15 @@ def test_private_certificate_configuration_root_ca_metadata_serialization(self): private_certificate_configuration_root_ca_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' private_certificate_configuration_root_ca_metadata_model_json['key_type'] = 'rsa' private_certificate_configuration_root_ca_metadata_model_json['key_bits'] = 4096 - private_certificate_configuration_root_ca_metadata_model_json[ - 'crypto_key'] = private_certificate_crypto_key_model + private_certificate_configuration_root_ca_metadata_model_json['crypto_key'] = private_certificate_crypto_key_model # Construct a model instance of PrivateCertificateConfigurationRootCAMetadata by calling from_dict on the json representation - private_certificate_configuration_root_ca_metadata_model = PrivateCertificateConfigurationRootCAMetadata.from_dict( - private_certificate_configuration_root_ca_metadata_model_json) + private_certificate_configuration_root_ca_metadata_model = PrivateCertificateConfigurationRootCAMetadata.from_dict(private_certificate_configuration_root_ca_metadata_model_json) assert private_certificate_configuration_root_ca_metadata_model != False # Construct a model instance of PrivateCertificateConfigurationRootCAMetadata by calling from_dict on the json representation - private_certificate_configuration_root_ca_metadata_model_dict = PrivateCertificateConfigurationRootCAMetadata.from_dict( - private_certificate_configuration_root_ca_metadata_model_json).__dict__ - private_certificate_configuration_root_ca_metadata_model2 = PrivateCertificateConfigurationRootCAMetadata( - **private_certificate_configuration_root_ca_metadata_model_dict) + private_certificate_configuration_root_ca_metadata_model_dict = PrivateCertificateConfigurationRootCAMetadata.from_dict(private_certificate_configuration_root_ca_metadata_model_json).__dict__ + private_certificate_configuration_root_ca_metadata_model2 = PrivateCertificateConfigurationRootCAMetadata(**private_certificate_configuration_root_ca_metadata_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_root_ca_metadata_model == private_certificate_configuration_root_ca_metadata_model2 @@ -8339,15 +8053,12 @@ def test_private_certificate_configuration_root_ca_patch_serialization(self): private_certificate_configuration_root_ca_patch_model_json['issuing_certificates_urls_encoded'] = True # Construct a model instance of PrivateCertificateConfigurationRootCAPatch by calling from_dict on the json representation - private_certificate_configuration_root_ca_patch_model = PrivateCertificateConfigurationRootCAPatch.from_dict( - private_certificate_configuration_root_ca_patch_model_json) + private_certificate_configuration_root_ca_patch_model = PrivateCertificateConfigurationRootCAPatch.from_dict(private_certificate_configuration_root_ca_patch_model_json) assert private_certificate_configuration_root_ca_patch_model != False # Construct a model instance of PrivateCertificateConfigurationRootCAPatch by calling from_dict on the json representation - private_certificate_configuration_root_ca_patch_model_dict = PrivateCertificateConfigurationRootCAPatch.from_dict( - private_certificate_configuration_root_ca_patch_model_json).__dict__ - private_certificate_configuration_root_ca_patch_model2 = PrivateCertificateConfigurationRootCAPatch( - **private_certificate_configuration_root_ca_patch_model_dict) + private_certificate_configuration_root_ca_patch_model_dict = PrivateCertificateConfigurationRootCAPatch.from_dict(private_certificate_configuration_root_ca_patch_model_json).__dict__ + private_certificate_configuration_root_ca_patch_model2 = PrivateCertificateConfigurationRootCAPatch(**private_certificate_configuration_root_ca_patch_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_root_ca_patch_model == private_certificate_configuration_root_ca_patch_model2 @@ -8371,10 +8082,8 @@ def test_private_certificate_configuration_root_ca_prototype_serialization(self) private_certificate_crypto_provider_model = {} # PrivateCertificateCryptoProviderHPCS private_certificate_crypto_provider_model['type'] = 'hyper_protect_crypto_services' - private_certificate_crypto_provider_model[ - 'instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' - private_certificate_crypto_provider_model[ - 'pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' + private_certificate_crypto_provider_model['instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' + private_certificate_crypto_provider_model['pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' private_certificate_crypto_provider_model['private_keystore_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' private_certificate_crypto_key_model = {} # PrivateCertificateCryptoKey @@ -8385,19 +8094,16 @@ def test_private_certificate_configuration_root_ca_prototype_serialization(self) # Construct a json representation of a PrivateCertificateConfigurationRootCAPrototype model private_certificate_configuration_root_ca_prototype_model_json = {} - private_certificate_configuration_root_ca_prototype_model_json[ - 'config_type'] = 'private_cert_configuration_root_ca' + private_certificate_configuration_root_ca_prototype_model_json['config_type'] = 'private_cert_configuration_root_ca' private_certificate_configuration_root_ca_prototype_model_json['name'] = 'my-example-engine-config' - private_certificate_configuration_root_ca_prototype_model_json[ - 'crypto_key'] = private_certificate_crypto_key_model + private_certificate_configuration_root_ca_prototype_model_json['crypto_key'] = private_certificate_crypto_key_model private_certificate_configuration_root_ca_prototype_model_json['max_ttl'] = '8760h' private_certificate_configuration_root_ca_prototype_model_json['crl_expiry'] = '72h' private_certificate_configuration_root_ca_prototype_model_json['crl_disable'] = True private_certificate_configuration_root_ca_prototype_model_json['crl_distribution_points_encoded'] = True private_certificate_configuration_root_ca_prototype_model_json['issuing_certificates_urls_encoded'] = True private_certificate_configuration_root_ca_prototype_model_json['common_name'] = 'localhost' - private_certificate_configuration_root_ca_prototype_model_json['alt_names'] = ['s1.example.com', - '*.s2.example.com'] + private_certificate_configuration_root_ca_prototype_model_json['alt_names'] = ['s1.example.com', '*.s2.example.com'] private_certificate_configuration_root_ca_prototype_model_json['ip_sans'] = '1.1.1.1, 2.2.2.2' private_certificate_configuration_root_ca_prototype_model_json['uri_sans'] = 'testString' private_certificate_configuration_root_ca_prototype_model_json['other_sans'] = ['2.5.4.5;UTF8:*.example.com'] @@ -8416,19 +8122,15 @@ def test_private_certificate_configuration_root_ca_prototype_serialization(self) private_certificate_configuration_root_ca_prototype_model_json['province'] = ['testString'] private_certificate_configuration_root_ca_prototype_model_json['street_address'] = ['testString'] private_certificate_configuration_root_ca_prototype_model_json['postal_code'] = ['testString'] - private_certificate_configuration_root_ca_prototype_model_json[ - 'serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' + private_certificate_configuration_root_ca_prototype_model_json['serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' # Construct a model instance of PrivateCertificateConfigurationRootCAPrototype by calling from_dict on the json representation - private_certificate_configuration_root_ca_prototype_model = PrivateCertificateConfigurationRootCAPrototype.from_dict( - private_certificate_configuration_root_ca_prototype_model_json) + private_certificate_configuration_root_ca_prototype_model = PrivateCertificateConfigurationRootCAPrototype.from_dict(private_certificate_configuration_root_ca_prototype_model_json) assert private_certificate_configuration_root_ca_prototype_model != False # Construct a model instance of PrivateCertificateConfigurationRootCAPrototype by calling from_dict on the json representation - private_certificate_configuration_root_ca_prototype_model_dict = PrivateCertificateConfigurationRootCAPrototype.from_dict( - private_certificate_configuration_root_ca_prototype_model_json).__dict__ - private_certificate_configuration_root_ca_prototype_model2 = PrivateCertificateConfigurationRootCAPrototype( - **private_certificate_configuration_root_ca_prototype_model_dict) + private_certificate_configuration_root_ca_prototype_model_dict = PrivateCertificateConfigurationRootCAPrototype.from_dict(private_certificate_configuration_root_ca_prototype_model_json).__dict__ + private_certificate_configuration_root_ca_prototype_model2 = PrivateCertificateConfigurationRootCAPrototype(**private_certificate_configuration_root_ca_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_root_ca_prototype_model == private_certificate_configuration_root_ca_prototype_model2 @@ -8453,8 +8155,7 @@ def test_private_certificate_configuration_template_serialization(self): private_certificate_configuration_template_model_json['config_type'] = 'private_cert_configuration_template' private_certificate_configuration_template_model_json['name'] = 'my-secret-engine-config' private_certificate_configuration_template_model_json['secret_type'] = 'arbitrary' - private_certificate_configuration_template_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + private_certificate_configuration_template_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' private_certificate_configuration_template_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_template_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_template_model_json['certificate_authority'] = 'testString' @@ -8476,8 +8177,7 @@ def test_private_certificate_configuration_template_serialization(self): private_certificate_configuration_template_model_json['email_protection_flag'] = True private_certificate_configuration_template_model_json['key_type'] = 'rsa' private_certificate_configuration_template_model_json['key_bits'] = 4096 - private_certificate_configuration_template_model_json['key_usage'] = ['DigitalSignature', 'KeyAgreement', - 'KeyEncipherment'] + private_certificate_configuration_template_model_json['key_usage'] = ['DigitalSignature', 'KeyAgreement', 'KeyEncipherment'] private_certificate_configuration_template_model_json['ext_key_usage'] = ['testString'] private_certificate_configuration_template_model_json['ext_key_usage_oids'] = ['testString'] private_certificate_configuration_template_model_json['use_csr_common_name'] = True @@ -8489,22 +8189,18 @@ def test_private_certificate_configuration_template_serialization(self): private_certificate_configuration_template_model_json['province'] = ['testString'] private_certificate_configuration_template_model_json['street_address'] = ['testString'] private_certificate_configuration_template_model_json['postal_code'] = ['testString'] - private_certificate_configuration_template_model_json[ - 'serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' + private_certificate_configuration_template_model_json['serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' private_certificate_configuration_template_model_json['require_cn'] = True private_certificate_configuration_template_model_json['policy_identifiers'] = ['testString'] private_certificate_configuration_template_model_json['basic_constraints_valid_for_non_ca'] = True # Construct a model instance of PrivateCertificateConfigurationTemplate by calling from_dict on the json representation - private_certificate_configuration_template_model = PrivateCertificateConfigurationTemplate.from_dict( - private_certificate_configuration_template_model_json) + private_certificate_configuration_template_model = PrivateCertificateConfigurationTemplate.from_dict(private_certificate_configuration_template_model_json) assert private_certificate_configuration_template_model != False # Construct a model instance of PrivateCertificateConfigurationTemplate by calling from_dict on the json representation - private_certificate_configuration_template_model_dict = PrivateCertificateConfigurationTemplate.from_dict( - private_certificate_configuration_template_model_json).__dict__ - private_certificate_configuration_template_model2 = PrivateCertificateConfigurationTemplate( - **private_certificate_configuration_template_model_dict) + private_certificate_configuration_template_model_dict = PrivateCertificateConfigurationTemplate.from_dict(private_certificate_configuration_template_model_json).__dict__ + private_certificate_configuration_template_model2 = PrivateCertificateConfigurationTemplate(**private_certificate_configuration_template_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_template_model == private_certificate_configuration_template_model2 @@ -8526,26 +8222,21 @@ def test_private_certificate_configuration_template_metadata_serialization(self) # Construct a json representation of a PrivateCertificateConfigurationTemplateMetadata model private_certificate_configuration_template_metadata_model_json = {} - private_certificate_configuration_template_metadata_model_json[ - 'config_type'] = 'private_cert_configuration_template' + private_certificate_configuration_template_metadata_model_json['config_type'] = 'private_cert_configuration_template' private_certificate_configuration_template_metadata_model_json['name'] = 'my-secret-engine-config' private_certificate_configuration_template_metadata_model_json['secret_type'] = 'arbitrary' - private_certificate_configuration_template_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + private_certificate_configuration_template_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' private_certificate_configuration_template_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_template_metadata_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_configuration_template_metadata_model_json['certificate_authority'] = 'testString' # Construct a model instance of PrivateCertificateConfigurationTemplateMetadata by calling from_dict on the json representation - private_certificate_configuration_template_metadata_model = PrivateCertificateConfigurationTemplateMetadata.from_dict( - private_certificate_configuration_template_metadata_model_json) + private_certificate_configuration_template_metadata_model = PrivateCertificateConfigurationTemplateMetadata.from_dict(private_certificate_configuration_template_metadata_model_json) assert private_certificate_configuration_template_metadata_model != False # Construct a model instance of PrivateCertificateConfigurationTemplateMetadata by calling from_dict on the json representation - private_certificate_configuration_template_metadata_model_dict = PrivateCertificateConfigurationTemplateMetadata.from_dict( - private_certificate_configuration_template_metadata_model_json).__dict__ - private_certificate_configuration_template_metadata_model2 = PrivateCertificateConfigurationTemplateMetadata( - **private_certificate_configuration_template_metadata_model_dict) + private_certificate_configuration_template_metadata_model_dict = PrivateCertificateConfigurationTemplateMetadata.from_dict(private_certificate_configuration_template_metadata_model_json).__dict__ + private_certificate_configuration_template_metadata_model2 = PrivateCertificateConfigurationTemplateMetadata(**private_certificate_configuration_template_metadata_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_template_metadata_model == private_certificate_configuration_template_metadata_model2 @@ -8587,8 +8278,7 @@ def test_private_certificate_configuration_template_patch_serialization(self): private_certificate_configuration_template_patch_model_json['email_protection_flag'] = True private_certificate_configuration_template_patch_model_json['key_type'] = 'rsa' private_certificate_configuration_template_patch_model_json['key_bits'] = 4096 - private_certificate_configuration_template_patch_model_json['key_usage'] = ['DigitalSignature', 'KeyAgreement', - 'KeyEncipherment'] + private_certificate_configuration_template_patch_model_json['key_usage'] = ['DigitalSignature', 'KeyAgreement', 'KeyEncipherment'] private_certificate_configuration_template_patch_model_json['ext_key_usage'] = ['testString'] private_certificate_configuration_template_patch_model_json['ext_key_usage_oids'] = ['testString'] private_certificate_configuration_template_patch_model_json['use_csr_common_name'] = True @@ -8600,23 +8290,19 @@ def test_private_certificate_configuration_template_patch_serialization(self): private_certificate_configuration_template_patch_model_json['province'] = ['testString'] private_certificate_configuration_template_patch_model_json['street_address'] = ['testString'] private_certificate_configuration_template_patch_model_json['postal_code'] = ['testString'] - private_certificate_configuration_template_patch_model_json[ - 'serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' + private_certificate_configuration_template_patch_model_json['serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' private_certificate_configuration_template_patch_model_json['require_cn'] = True private_certificate_configuration_template_patch_model_json['policy_identifiers'] = ['testString'] private_certificate_configuration_template_patch_model_json['basic_constraints_valid_for_non_ca'] = True private_certificate_configuration_template_patch_model_json['not_before_duration'] = '30s' # Construct a model instance of PrivateCertificateConfigurationTemplatePatch by calling from_dict on the json representation - private_certificate_configuration_template_patch_model = PrivateCertificateConfigurationTemplatePatch.from_dict( - private_certificate_configuration_template_patch_model_json) + private_certificate_configuration_template_patch_model = PrivateCertificateConfigurationTemplatePatch.from_dict(private_certificate_configuration_template_patch_model_json) assert private_certificate_configuration_template_patch_model != False # Construct a model instance of PrivateCertificateConfigurationTemplatePatch by calling from_dict on the json representation - private_certificate_configuration_template_patch_model_dict = PrivateCertificateConfigurationTemplatePatch.from_dict( - private_certificate_configuration_template_patch_model_json).__dict__ - private_certificate_configuration_template_patch_model2 = PrivateCertificateConfigurationTemplatePatch( - **private_certificate_configuration_template_patch_model_dict) + private_certificate_configuration_template_patch_model_dict = PrivateCertificateConfigurationTemplatePatch.from_dict(private_certificate_configuration_template_patch_model_json).__dict__ + private_certificate_configuration_template_patch_model2 = PrivateCertificateConfigurationTemplatePatch(**private_certificate_configuration_template_patch_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_template_patch_model == private_certificate_configuration_template_patch_model2 @@ -8638,8 +8324,7 @@ def test_private_certificate_configuration_template_prototype_serialization(self # Construct a json representation of a PrivateCertificateConfigurationTemplatePrototype model private_certificate_configuration_template_prototype_model_json = {} - private_certificate_configuration_template_prototype_model_json[ - 'config_type'] = 'private_cert_configuration_template' + private_certificate_configuration_template_prototype_model_json['config_type'] = 'private_cert_configuration_template' private_certificate_configuration_template_prototype_model_json['name'] = 'my-example-engine-config' private_certificate_configuration_template_prototype_model_json['certificate_authority'] = 'testString' private_certificate_configuration_template_prototype_model_json['allowed_secret_groups'] = 'testString' @@ -8663,9 +8348,7 @@ def test_private_certificate_configuration_template_prototype_serialization(self private_certificate_configuration_template_prototype_model_json['email_protection_flag'] = True private_certificate_configuration_template_prototype_model_json['key_type'] = 'rsa' private_certificate_configuration_template_prototype_model_json['key_bits'] = 4096 - private_certificate_configuration_template_prototype_model_json['key_usage'] = ['DigitalSignature', - 'KeyAgreement', - 'KeyEncipherment'] + private_certificate_configuration_template_prototype_model_json['key_usage'] = ['DigitalSignature', 'KeyAgreement', 'KeyEncipherment'] private_certificate_configuration_template_prototype_model_json['ext_key_usage'] = ['testString'] private_certificate_configuration_template_prototype_model_json['ext_key_usage_oids'] = ['testString'] private_certificate_configuration_template_prototype_model_json['use_csr_common_name'] = True @@ -8677,23 +8360,19 @@ def test_private_certificate_configuration_template_prototype_serialization(self private_certificate_configuration_template_prototype_model_json['province'] = ['testString'] private_certificate_configuration_template_prototype_model_json['street_address'] = ['testString'] private_certificate_configuration_template_prototype_model_json['postal_code'] = ['testString'] - private_certificate_configuration_template_prototype_model_json[ - 'serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' + private_certificate_configuration_template_prototype_model_json['serial_number'] = 'd9:be:fe:35:ba:09:42:b5:35:ba:09:42:b5' private_certificate_configuration_template_prototype_model_json['require_cn'] = True private_certificate_configuration_template_prototype_model_json['policy_identifiers'] = ['testString'] private_certificate_configuration_template_prototype_model_json['basic_constraints_valid_for_non_ca'] = True private_certificate_configuration_template_prototype_model_json['not_before_duration'] = '30s' # Construct a model instance of PrivateCertificateConfigurationTemplatePrototype by calling from_dict on the json representation - private_certificate_configuration_template_prototype_model = PrivateCertificateConfigurationTemplatePrototype.from_dict( - private_certificate_configuration_template_prototype_model_json) + private_certificate_configuration_template_prototype_model = PrivateCertificateConfigurationTemplatePrototype.from_dict(private_certificate_configuration_template_prototype_model_json) assert private_certificate_configuration_template_prototype_model != False # Construct a model instance of PrivateCertificateConfigurationTemplatePrototype by calling from_dict on the json representation - private_certificate_configuration_template_prototype_model_dict = PrivateCertificateConfigurationTemplatePrototype.from_dict( - private_certificate_configuration_template_prototype_model_json).__dict__ - private_certificate_configuration_template_prototype_model2 = PrivateCertificateConfigurationTemplatePrototype( - **private_certificate_configuration_template_prototype_model_dict) + private_certificate_configuration_template_prototype_model_dict = PrivateCertificateConfigurationTemplatePrototype.from_dict(private_certificate_configuration_template_prototype_model_json).__dict__ + private_certificate_configuration_template_prototype_model2 = PrivateCertificateConfigurationTemplatePrototype(**private_certificate_configuration_template_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_configuration_template_prototype_model == private_certificate_configuration_template_prototype_model2 @@ -8716,23 +8395,17 @@ def test_private_certificate_crypto_provider_hpcs_serialization(self): # Construct a json representation of a PrivateCertificateCryptoProviderHPCS model private_certificate_crypto_provider_hpcs_model_json = {} private_certificate_crypto_provider_hpcs_model_json['type'] = 'hyper_protect_crypto_services' - private_certificate_crypto_provider_hpcs_model_json[ - 'instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' - private_certificate_crypto_provider_hpcs_model_json[ - 'pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' - private_certificate_crypto_provider_hpcs_model_json[ - 'private_keystore_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' + private_certificate_crypto_provider_hpcs_model_json['instance_crn'] = 'crn:v1:bluemix:public:hs-crypto:us-south:a/791f3fb10486421e97aa8512f18b7e65:b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5::' + private_certificate_crypto_provider_hpcs_model_json['pin_iam_credentials_secret_id'] = '6ebb80d3-26d1-4e24-81d6-afb0d8e22f54' + private_certificate_crypto_provider_hpcs_model_json['private_keystore_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' # Construct a model instance of PrivateCertificateCryptoProviderHPCS by calling from_dict on the json representation - private_certificate_crypto_provider_hpcs_model = PrivateCertificateCryptoProviderHPCS.from_dict( - private_certificate_crypto_provider_hpcs_model_json) + private_certificate_crypto_provider_hpcs_model = PrivateCertificateCryptoProviderHPCS.from_dict(private_certificate_crypto_provider_hpcs_model_json) assert private_certificate_crypto_provider_hpcs_model != False # Construct a model instance of PrivateCertificateCryptoProviderHPCS by calling from_dict on the json representation - private_certificate_crypto_provider_hpcs_model_dict = PrivateCertificateCryptoProviderHPCS.from_dict( - private_certificate_crypto_provider_hpcs_model_json).__dict__ - private_certificate_crypto_provider_hpcs_model2 = PrivateCertificateCryptoProviderHPCS( - **private_certificate_crypto_provider_hpcs_model_dict) + private_certificate_crypto_provider_hpcs_model_dict = PrivateCertificateCryptoProviderHPCS.from_dict(private_certificate_crypto_provider_hpcs_model_json).__dict__ + private_certificate_crypto_provider_hpcs_model2 = PrivateCertificateCryptoProviderHPCS(**private_certificate_crypto_provider_hpcs_model_dict) # Verify the model instances are equivalent assert private_certificate_crypto_provider_hpcs_model == private_certificate_crypto_provider_hpcs_model2 @@ -8783,18 +8456,15 @@ def test_private_certificate_metadata_serialization(self): private_certificate_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' private_certificate_metadata_model_json['issuer'] = 'Lets Encrypt' private_certificate_metadata_model_json['rotation'] = rotation_policy_model - private_certificate_metadata_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + private_certificate_metadata_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' private_certificate_metadata_model_json['validity'] = certificate_validity_model # Construct a model instance of PrivateCertificateMetadata by calling from_dict on the json representation - private_certificate_metadata_model = PrivateCertificateMetadata.from_dict( - private_certificate_metadata_model_json) + private_certificate_metadata_model = PrivateCertificateMetadata.from_dict(private_certificate_metadata_model_json) assert private_certificate_metadata_model != False # Construct a model instance of PrivateCertificateMetadata by calling from_dict on the json representation - private_certificate_metadata_model_dict = PrivateCertificateMetadata.from_dict( - private_certificate_metadata_model_json).__dict__ + private_certificate_metadata_model_dict = PrivateCertificateMetadata.from_dict(private_certificate_metadata_model_json).__dict__ private_certificate_metadata_model2 = PrivateCertificateMetadata(**private_certificate_metadata_model_dict) # Verify the model instances are equivalent @@ -8831,15 +8501,12 @@ def test_private_certificate_metadata_patch_serialization(self): private_certificate_metadata_patch_model_json['rotation'] = rotation_policy_model # Construct a model instance of PrivateCertificateMetadataPatch by calling from_dict on the json representation - private_certificate_metadata_patch_model = PrivateCertificateMetadataPatch.from_dict( - private_certificate_metadata_patch_model_json) + private_certificate_metadata_patch_model = PrivateCertificateMetadataPatch.from_dict(private_certificate_metadata_patch_model_json) assert private_certificate_metadata_patch_model != False # Construct a model instance of PrivateCertificateMetadataPatch by calling from_dict on the json representation - private_certificate_metadata_patch_model_dict = PrivateCertificateMetadataPatch.from_dict( - private_certificate_metadata_patch_model_json).__dict__ - private_certificate_metadata_patch_model2 = PrivateCertificateMetadataPatch( - **private_certificate_metadata_patch_model_dict) + private_certificate_metadata_patch_model_dict = PrivateCertificateMetadataPatch.from_dict(private_certificate_metadata_patch_model_json).__dict__ + private_certificate_metadata_patch_model2 = PrivateCertificateMetadataPatch(**private_certificate_metadata_patch_model_dict) # Verify the model instances are equivalent assert private_certificate_metadata_patch_model == private_certificate_metadata_patch_model2 @@ -8889,13 +8556,11 @@ def test_private_certificate_prototype_serialization(self): private_certificate_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of PrivateCertificatePrototype by calling from_dict on the json representation - private_certificate_prototype_model = PrivateCertificatePrototype.from_dict( - private_certificate_prototype_model_json) + private_certificate_prototype_model = PrivateCertificatePrototype.from_dict(private_certificate_prototype_model_json) assert private_certificate_prototype_model != False # Construct a model instance of PrivateCertificatePrototype by calling from_dict on the json representation - private_certificate_prototype_model_dict = PrivateCertificatePrototype.from_dict( - private_certificate_prototype_model_json).__dict__ + private_certificate_prototype_model_dict = PrivateCertificatePrototype.from_dict(private_certificate_prototype_model_json).__dict__ private_certificate_prototype_model2 = PrivateCertificatePrototype(**private_certificate_prototype_model_dict) # Verify the model instances are equivalent @@ -8935,8 +8600,7 @@ def test_private_certificate_version_serialization(self): private_certificate_version_model_json['version_custom_metadata'] = {'key': 'value'} private_certificate_version_model_json['secret_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' private_certificate_version_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' - private_certificate_version_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + private_certificate_version_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' private_certificate_version_model_json['validity'] = certificate_validity_model private_certificate_version_model_json['certificate'] = 'testString' private_certificate_version_model_json['private_key'] = 'testString' @@ -8946,8 +8610,7 @@ def test_private_certificate_version_serialization(self): assert private_certificate_version_model != False # Construct a model instance of PrivateCertificateVersion by calling from_dict on the json representation - private_certificate_version_model_dict = PrivateCertificateVersion.from_dict( - private_certificate_version_model_json).__dict__ + private_certificate_version_model_dict = PrivateCertificateVersion.from_dict(private_certificate_version_model_json).__dict__ private_certificate_version_model2 = PrivateCertificateVersion(**private_certificate_version_model_dict) # Verify the model instances are equivalent @@ -8973,15 +8636,12 @@ def test_private_certificate_version_action_revoke_serialization(self): private_certificate_version_action_revoke_model_json['action_type'] = 'private_cert_action_revoke_certificate' # Construct a model instance of PrivateCertificateVersionActionRevoke by calling from_dict on the json representation - private_certificate_version_action_revoke_model = PrivateCertificateVersionActionRevoke.from_dict( - private_certificate_version_action_revoke_model_json) + private_certificate_version_action_revoke_model = PrivateCertificateVersionActionRevoke.from_dict(private_certificate_version_action_revoke_model_json) assert private_certificate_version_action_revoke_model != False # Construct a model instance of PrivateCertificateVersionActionRevoke by calling from_dict on the json representation - private_certificate_version_action_revoke_model_dict = PrivateCertificateVersionActionRevoke.from_dict( - private_certificate_version_action_revoke_model_json).__dict__ - private_certificate_version_action_revoke_model2 = PrivateCertificateVersionActionRevoke( - **private_certificate_version_action_revoke_model_dict) + private_certificate_version_action_revoke_model_dict = PrivateCertificateVersionActionRevoke.from_dict(private_certificate_version_action_revoke_model_json).__dict__ + private_certificate_version_action_revoke_model2 = PrivateCertificateVersionActionRevoke(**private_certificate_version_action_revoke_model_dict) # Verify the model instances are equivalent assert private_certificate_version_action_revoke_model == private_certificate_version_action_revoke_model2 @@ -9003,19 +8663,15 @@ def test_private_certificate_version_action_revoke_prototype_serialization(self) # Construct a json representation of a PrivateCertificateVersionActionRevokePrototype model private_certificate_version_action_revoke_prototype_model_json = {} - private_certificate_version_action_revoke_prototype_model_json[ - 'action_type'] = 'private_cert_action_revoke_certificate' + private_certificate_version_action_revoke_prototype_model_json['action_type'] = 'private_cert_action_revoke_certificate' # Construct a model instance of PrivateCertificateVersionActionRevokePrototype by calling from_dict on the json representation - private_certificate_version_action_revoke_prototype_model = PrivateCertificateVersionActionRevokePrototype.from_dict( - private_certificate_version_action_revoke_prototype_model_json) + private_certificate_version_action_revoke_prototype_model = PrivateCertificateVersionActionRevokePrototype.from_dict(private_certificate_version_action_revoke_prototype_model_json) assert private_certificate_version_action_revoke_prototype_model != False # Construct a model instance of PrivateCertificateVersionActionRevokePrototype by calling from_dict on the json representation - private_certificate_version_action_revoke_prototype_model_dict = PrivateCertificateVersionActionRevokePrototype.from_dict( - private_certificate_version_action_revoke_prototype_model_json).__dict__ - private_certificate_version_action_revoke_prototype_model2 = PrivateCertificateVersionActionRevokePrototype( - **private_certificate_version_action_revoke_prototype_model_dict) + private_certificate_version_action_revoke_prototype_model_dict = PrivateCertificateVersionActionRevokePrototype.from_dict(private_certificate_version_action_revoke_prototype_model_json).__dict__ + private_certificate_version_action_revoke_prototype_model2 = PrivateCertificateVersionActionRevokePrototype(**private_certificate_version_action_revoke_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_version_action_revoke_prototype_model == private_certificate_version_action_revoke_prototype_model2 @@ -9044,8 +8700,7 @@ def test_private_certificate_version_metadata_serialization(self): # Construct a json representation of a PrivateCertificateVersionMetadata model private_certificate_version_metadata_model_json = {} private_certificate_version_metadata_model_json['auto_rotated'] = True - private_certificate_version_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + private_certificate_version_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' private_certificate_version_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' private_certificate_version_metadata_model_json['id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' private_certificate_version_metadata_model_json['secret_type'] = 'private_cert' @@ -9055,20 +8710,16 @@ def test_private_certificate_version_metadata_serialization(self): private_certificate_version_metadata_model_json['version_custom_metadata'] = {'key': 'value'} private_certificate_version_metadata_model_json['secret_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' private_certificate_version_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' - private_certificate_version_metadata_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + private_certificate_version_metadata_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' private_certificate_version_metadata_model_json['validity'] = certificate_validity_model # Construct a model instance of PrivateCertificateVersionMetadata by calling from_dict on the json representation - private_certificate_version_metadata_model = PrivateCertificateVersionMetadata.from_dict( - private_certificate_version_metadata_model_json) + private_certificate_version_metadata_model = PrivateCertificateVersionMetadata.from_dict(private_certificate_version_metadata_model_json) assert private_certificate_version_metadata_model != False # Construct a model instance of PrivateCertificateVersionMetadata by calling from_dict on the json representation - private_certificate_version_metadata_model_dict = PrivateCertificateVersionMetadata.from_dict( - private_certificate_version_metadata_model_json).__dict__ - private_certificate_version_metadata_model2 = PrivateCertificateVersionMetadata( - **private_certificate_version_metadata_model_dict) + private_certificate_version_metadata_model_dict = PrivateCertificateVersionMetadata.from_dict(private_certificate_version_metadata_model_json).__dict__ + private_certificate_version_metadata_model2 = PrivateCertificateVersionMetadata(**private_certificate_version_metadata_model_dict) # Verify the model instances are equivalent assert private_certificate_version_metadata_model == private_certificate_version_metadata_model2 @@ -9095,15 +8746,12 @@ def test_private_certificate_version_prototype_serialization(self): private_certificate_version_prototype_model_json['csr'] = 'testString' # Construct a model instance of PrivateCertificateVersionPrototype by calling from_dict on the json representation - private_certificate_version_prototype_model = PrivateCertificateVersionPrototype.from_dict( - private_certificate_version_prototype_model_json) + private_certificate_version_prototype_model = PrivateCertificateVersionPrototype.from_dict(private_certificate_version_prototype_model_json) assert private_certificate_version_prototype_model != False # Construct a model instance of PrivateCertificateVersionPrototype by calling from_dict on the json representation - private_certificate_version_prototype_model_dict = PrivateCertificateVersionPrototype.from_dict( - private_certificate_version_prototype_model_json).__dict__ - private_certificate_version_prototype_model2 = PrivateCertificateVersionPrototype( - **private_certificate_version_prototype_model_dict) + private_certificate_version_prototype_model_dict = PrivateCertificateVersionPrototype.from_dict(private_certificate_version_prototype_model_json).__dict__ + private_certificate_version_prototype_model2 = PrivateCertificateVersionPrototype(**private_certificate_version_prototype_model_dict) # Verify the model instances are equivalent assert private_certificate_version_prototype_model == private_certificate_version_prototype_model2 @@ -9188,19 +8836,15 @@ def test_public_certificate_action_validate_manual_dns_serialization(self): # Construct a json representation of a PublicCertificateActionValidateManualDNS model public_certificate_action_validate_manual_dns_model_json = {} - public_certificate_action_validate_manual_dns_model_json[ - 'action_type'] = 'public_cert_action_validate_dns_challenge' + public_certificate_action_validate_manual_dns_model_json['action_type'] = 'public_cert_action_validate_dns_challenge' # Construct a model instance of PublicCertificateActionValidateManualDNS by calling from_dict on the json representation - public_certificate_action_validate_manual_dns_model = PublicCertificateActionValidateManualDNS.from_dict( - public_certificate_action_validate_manual_dns_model_json) + public_certificate_action_validate_manual_dns_model = PublicCertificateActionValidateManualDNS.from_dict(public_certificate_action_validate_manual_dns_model_json) assert public_certificate_action_validate_manual_dns_model != False # Construct a model instance of PublicCertificateActionValidateManualDNS by calling from_dict on the json representation - public_certificate_action_validate_manual_dns_model_dict = PublicCertificateActionValidateManualDNS.from_dict( - public_certificate_action_validate_manual_dns_model_json).__dict__ - public_certificate_action_validate_manual_dns_model2 = PublicCertificateActionValidateManualDNS( - **public_certificate_action_validate_manual_dns_model_dict) + public_certificate_action_validate_manual_dns_model_dict = PublicCertificateActionValidateManualDNS.from_dict(public_certificate_action_validate_manual_dns_model_json).__dict__ + public_certificate_action_validate_manual_dns_model2 = PublicCertificateActionValidateManualDNS(**public_certificate_action_validate_manual_dns_model_dict) # Verify the model instances are equivalent assert public_certificate_action_validate_manual_dns_model == public_certificate_action_validate_manual_dns_model2 @@ -9222,19 +8866,15 @@ def test_public_certificate_action_validate_manual_dns_prototype_serialization(s # Construct a json representation of a PublicCertificateActionValidateManualDNSPrototype model public_certificate_action_validate_manual_dns_prototype_model_json = {} - public_certificate_action_validate_manual_dns_prototype_model_json[ - 'action_type'] = 'public_cert_action_validate_dns_challenge' + public_certificate_action_validate_manual_dns_prototype_model_json['action_type'] = 'public_cert_action_validate_dns_challenge' # Construct a model instance of PublicCertificateActionValidateManualDNSPrototype by calling from_dict on the json representation - public_certificate_action_validate_manual_dns_prototype_model = PublicCertificateActionValidateManualDNSPrototype.from_dict( - public_certificate_action_validate_manual_dns_prototype_model_json) + public_certificate_action_validate_manual_dns_prototype_model = PublicCertificateActionValidateManualDNSPrototype.from_dict(public_certificate_action_validate_manual_dns_prototype_model_json) assert public_certificate_action_validate_manual_dns_prototype_model != False # Construct a model instance of PublicCertificateActionValidateManualDNSPrototype by calling from_dict on the json representation - public_certificate_action_validate_manual_dns_prototype_model_dict = PublicCertificateActionValidateManualDNSPrototype.from_dict( - public_certificate_action_validate_manual_dns_prototype_model_json).__dict__ - public_certificate_action_validate_manual_dns_prototype_model2 = PublicCertificateActionValidateManualDNSPrototype( - **public_certificate_action_validate_manual_dns_prototype_model_dict) + public_certificate_action_validate_manual_dns_prototype_model_dict = PublicCertificateActionValidateManualDNSPrototype.from_dict(public_certificate_action_validate_manual_dns_prototype_model_json).__dict__ + public_certificate_action_validate_manual_dns_prototype_model2 = PublicCertificateActionValidateManualDNSPrototype(**public_certificate_action_validate_manual_dns_prototype_model_dict) # Verify the model instances are equivalent assert public_certificate_action_validate_manual_dns_prototype_model == public_certificate_action_validate_manual_dns_prototype_model2 @@ -9256,12 +8896,10 @@ def test_public_certificate_configuration_ca_lets_encrypt_serialization(self): # Construct a json representation of a PublicCertificateConfigurationCALetsEncrypt model public_certificate_configuration_ca_lets_encrypt_model_json = {} - public_certificate_configuration_ca_lets_encrypt_model_json[ - 'config_type'] = 'public_cert_configuration_ca_lets_encrypt' + public_certificate_configuration_ca_lets_encrypt_model_json['config_type'] = 'public_cert_configuration_ca_lets_encrypt' public_certificate_configuration_ca_lets_encrypt_model_json['name'] = 'my-secret-engine-config' public_certificate_configuration_ca_lets_encrypt_model_json['secret_type'] = 'arbitrary' - public_certificate_configuration_ca_lets_encrypt_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + public_certificate_configuration_ca_lets_encrypt_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' public_certificate_configuration_ca_lets_encrypt_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' public_certificate_configuration_ca_lets_encrypt_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' public_certificate_configuration_ca_lets_encrypt_model_json['lets_encrypt_environment'] = 'production' @@ -9269,15 +8907,12 @@ def test_public_certificate_configuration_ca_lets_encrypt_serialization(self): public_certificate_configuration_ca_lets_encrypt_model_json['lets_encrypt_private_key'] = 'testString' # Construct a model instance of PublicCertificateConfigurationCALetsEncrypt by calling from_dict on the json representation - public_certificate_configuration_ca_lets_encrypt_model = PublicCertificateConfigurationCALetsEncrypt.from_dict( - public_certificate_configuration_ca_lets_encrypt_model_json) + public_certificate_configuration_ca_lets_encrypt_model = PublicCertificateConfigurationCALetsEncrypt.from_dict(public_certificate_configuration_ca_lets_encrypt_model_json) assert public_certificate_configuration_ca_lets_encrypt_model != False # Construct a model instance of PublicCertificateConfigurationCALetsEncrypt by calling from_dict on the json representation - public_certificate_configuration_ca_lets_encrypt_model_dict = PublicCertificateConfigurationCALetsEncrypt.from_dict( - public_certificate_configuration_ca_lets_encrypt_model_json).__dict__ - public_certificate_configuration_ca_lets_encrypt_model2 = PublicCertificateConfigurationCALetsEncrypt( - **public_certificate_configuration_ca_lets_encrypt_model_dict) + public_certificate_configuration_ca_lets_encrypt_model_dict = PublicCertificateConfigurationCALetsEncrypt.from_dict(public_certificate_configuration_ca_lets_encrypt_model_json).__dict__ + public_certificate_configuration_ca_lets_encrypt_model2 = PublicCertificateConfigurationCALetsEncrypt(**public_certificate_configuration_ca_lets_encrypt_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_ca_lets_encrypt_model == public_certificate_configuration_ca_lets_encrypt_model2 @@ -9299,30 +8934,22 @@ def test_public_certificate_configuration_ca_lets_encrypt_metadata_serialization # Construct a json representation of a PublicCertificateConfigurationCALetsEncryptMetadata model public_certificate_configuration_ca_lets_encrypt_metadata_model_json = {} - public_certificate_configuration_ca_lets_encrypt_metadata_model_json[ - 'config_type'] = 'public_cert_configuration_ca_lets_encrypt' + public_certificate_configuration_ca_lets_encrypt_metadata_model_json['config_type'] = 'public_cert_configuration_ca_lets_encrypt' public_certificate_configuration_ca_lets_encrypt_metadata_model_json['name'] = 'my-secret-engine-config' public_certificate_configuration_ca_lets_encrypt_metadata_model_json['secret_type'] = 'arbitrary' - public_certificate_configuration_ca_lets_encrypt_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' - public_certificate_configuration_ca_lets_encrypt_metadata_model_json[ - 'created_at'] = '2022-04-12T23:20:50.520000Z' - public_certificate_configuration_ca_lets_encrypt_metadata_model_json[ - 'updated_at'] = '2022-04-12T23:20:50.520000Z' + public_certificate_configuration_ca_lets_encrypt_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + public_certificate_configuration_ca_lets_encrypt_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' + public_certificate_configuration_ca_lets_encrypt_metadata_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' public_certificate_configuration_ca_lets_encrypt_metadata_model_json['lets_encrypt_environment'] = 'production' - public_certificate_configuration_ca_lets_encrypt_metadata_model_json[ - 'lets_encrypt_preferred_chain'] = 'testString' + public_certificate_configuration_ca_lets_encrypt_metadata_model_json['lets_encrypt_preferred_chain'] = 'testString' # Construct a model instance of PublicCertificateConfigurationCALetsEncryptMetadata by calling from_dict on the json representation - public_certificate_configuration_ca_lets_encrypt_metadata_model = PublicCertificateConfigurationCALetsEncryptMetadata.from_dict( - public_certificate_configuration_ca_lets_encrypt_metadata_model_json) + public_certificate_configuration_ca_lets_encrypt_metadata_model = PublicCertificateConfigurationCALetsEncryptMetadata.from_dict(public_certificate_configuration_ca_lets_encrypt_metadata_model_json) assert public_certificate_configuration_ca_lets_encrypt_metadata_model != False # Construct a model instance of PublicCertificateConfigurationCALetsEncryptMetadata by calling from_dict on the json representation - public_certificate_configuration_ca_lets_encrypt_metadata_model_dict = PublicCertificateConfigurationCALetsEncryptMetadata.from_dict( - public_certificate_configuration_ca_lets_encrypt_metadata_model_json).__dict__ - public_certificate_configuration_ca_lets_encrypt_metadata_model2 = PublicCertificateConfigurationCALetsEncryptMetadata( - **public_certificate_configuration_ca_lets_encrypt_metadata_model_dict) + public_certificate_configuration_ca_lets_encrypt_metadata_model_dict = PublicCertificateConfigurationCALetsEncryptMetadata.from_dict(public_certificate_configuration_ca_lets_encrypt_metadata_model_json).__dict__ + public_certificate_configuration_ca_lets_encrypt_metadata_model2 = PublicCertificateConfigurationCALetsEncryptMetadata(**public_certificate_configuration_ca_lets_encrypt_metadata_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_ca_lets_encrypt_metadata_model == public_certificate_configuration_ca_lets_encrypt_metadata_model2 @@ -9349,15 +8976,12 @@ def test_public_certificate_configuration_ca_lets_encrypt_patch_serialization(se public_certificate_configuration_ca_lets_encrypt_patch_model_json['lets_encrypt_preferred_chain'] = 'testString' # Construct a model instance of PublicCertificateConfigurationCALetsEncryptPatch by calling from_dict on the json representation - public_certificate_configuration_ca_lets_encrypt_patch_model = PublicCertificateConfigurationCALetsEncryptPatch.from_dict( - public_certificate_configuration_ca_lets_encrypt_patch_model_json) + public_certificate_configuration_ca_lets_encrypt_patch_model = PublicCertificateConfigurationCALetsEncryptPatch.from_dict(public_certificate_configuration_ca_lets_encrypt_patch_model_json) assert public_certificate_configuration_ca_lets_encrypt_patch_model != False # Construct a model instance of PublicCertificateConfigurationCALetsEncryptPatch by calling from_dict on the json representation - public_certificate_configuration_ca_lets_encrypt_patch_model_dict = PublicCertificateConfigurationCALetsEncryptPatch.from_dict( - public_certificate_configuration_ca_lets_encrypt_patch_model_json).__dict__ - public_certificate_configuration_ca_lets_encrypt_patch_model2 = PublicCertificateConfigurationCALetsEncryptPatch( - **public_certificate_configuration_ca_lets_encrypt_patch_model_dict) + public_certificate_configuration_ca_lets_encrypt_patch_model_dict = PublicCertificateConfigurationCALetsEncryptPatch.from_dict(public_certificate_configuration_ca_lets_encrypt_patch_model_json).__dict__ + public_certificate_configuration_ca_lets_encrypt_patch_model2 = PublicCertificateConfigurationCALetsEncryptPatch(**public_certificate_configuration_ca_lets_encrypt_patch_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_ca_lets_encrypt_patch_model == public_certificate_configuration_ca_lets_encrypt_patch_model2 @@ -9379,24 +9003,19 @@ def test_public_certificate_configuration_ca_lets_encrypt_prototype_serializatio # Construct a json representation of a PublicCertificateConfigurationCALetsEncryptPrototype model public_certificate_configuration_ca_lets_encrypt_prototype_model_json = {} - public_certificate_configuration_ca_lets_encrypt_prototype_model_json[ - 'config_type'] = 'public_cert_configuration_ca_lets_encrypt' + public_certificate_configuration_ca_lets_encrypt_prototype_model_json['config_type'] = 'public_cert_configuration_ca_lets_encrypt' public_certificate_configuration_ca_lets_encrypt_prototype_model_json['name'] = 'my-example-engine-config' public_certificate_configuration_ca_lets_encrypt_prototype_model_json['lets_encrypt_environment'] = 'production' public_certificate_configuration_ca_lets_encrypt_prototype_model_json['lets_encrypt_private_key'] = 'testString' - public_certificate_configuration_ca_lets_encrypt_prototype_model_json[ - 'lets_encrypt_preferred_chain'] = 'testString' + public_certificate_configuration_ca_lets_encrypt_prototype_model_json['lets_encrypt_preferred_chain'] = 'testString' # Construct a model instance of PublicCertificateConfigurationCALetsEncryptPrototype by calling from_dict on the json representation - public_certificate_configuration_ca_lets_encrypt_prototype_model = PublicCertificateConfigurationCALetsEncryptPrototype.from_dict( - public_certificate_configuration_ca_lets_encrypt_prototype_model_json) + public_certificate_configuration_ca_lets_encrypt_prototype_model = PublicCertificateConfigurationCALetsEncryptPrototype.from_dict(public_certificate_configuration_ca_lets_encrypt_prototype_model_json) assert public_certificate_configuration_ca_lets_encrypt_prototype_model != False # Construct a model instance of PublicCertificateConfigurationCALetsEncryptPrototype by calling from_dict on the json representation - public_certificate_configuration_ca_lets_encrypt_prototype_model_dict = PublicCertificateConfigurationCALetsEncryptPrototype.from_dict( - public_certificate_configuration_ca_lets_encrypt_prototype_model_json).__dict__ - public_certificate_configuration_ca_lets_encrypt_prototype_model2 = PublicCertificateConfigurationCALetsEncryptPrototype( - **public_certificate_configuration_ca_lets_encrypt_prototype_model_dict) + public_certificate_configuration_ca_lets_encrypt_prototype_model_dict = PublicCertificateConfigurationCALetsEncryptPrototype.from_dict(public_certificate_configuration_ca_lets_encrypt_prototype_model_json).__dict__ + public_certificate_configuration_ca_lets_encrypt_prototype_model2 = PublicCertificateConfigurationCALetsEncryptPrototype(**public_certificate_configuration_ca_lets_encrypt_prototype_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_ca_lets_encrypt_prototype_model == public_certificate_configuration_ca_lets_encrypt_prototype_model2 @@ -9418,31 +9037,22 @@ def test_public_certificate_configuration_dns_classic_infrastructure_serializati # Construct a json representation of a PublicCertificateConfigurationDNSClassicInfrastructure model public_certificate_configuration_dns_classic_infrastructure_model_json = {} - public_certificate_configuration_dns_classic_infrastructure_model_json[ - 'config_type'] = 'public_cert_configuration_dns_classic_infrastructure' + public_certificate_configuration_dns_classic_infrastructure_model_json['config_type'] = 'public_cert_configuration_dns_classic_infrastructure' public_certificate_configuration_dns_classic_infrastructure_model_json['name'] = 'my-secret-engine-config' public_certificate_configuration_dns_classic_infrastructure_model_json['secret_type'] = 'arbitrary' - public_certificate_configuration_dns_classic_infrastructure_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' - public_certificate_configuration_dns_classic_infrastructure_model_json[ - 'created_at'] = '2022-04-12T23:20:50.520000Z' - public_certificate_configuration_dns_classic_infrastructure_model_json[ - 'updated_at'] = '2022-04-12T23:20:50.520000Z' - public_certificate_configuration_dns_classic_infrastructure_model_json[ - 'classic_infrastructure_username'] = 'testString' - public_certificate_configuration_dns_classic_infrastructure_model_json[ - 'classic_infrastructure_password'] = 'testString' + public_certificate_configuration_dns_classic_infrastructure_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + public_certificate_configuration_dns_classic_infrastructure_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' + public_certificate_configuration_dns_classic_infrastructure_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' + public_certificate_configuration_dns_classic_infrastructure_model_json['classic_infrastructure_username'] = 'testString' + public_certificate_configuration_dns_classic_infrastructure_model_json['classic_infrastructure_password'] = 'testString' # Construct a model instance of PublicCertificateConfigurationDNSClassicInfrastructure by calling from_dict on the json representation - public_certificate_configuration_dns_classic_infrastructure_model = PublicCertificateConfigurationDNSClassicInfrastructure.from_dict( - public_certificate_configuration_dns_classic_infrastructure_model_json) + public_certificate_configuration_dns_classic_infrastructure_model = PublicCertificateConfigurationDNSClassicInfrastructure.from_dict(public_certificate_configuration_dns_classic_infrastructure_model_json) assert public_certificate_configuration_dns_classic_infrastructure_model != False # Construct a model instance of PublicCertificateConfigurationDNSClassicInfrastructure by calling from_dict on the json representation - public_certificate_configuration_dns_classic_infrastructure_model_dict = PublicCertificateConfigurationDNSClassicInfrastructure.from_dict( - public_certificate_configuration_dns_classic_infrastructure_model_json).__dict__ - public_certificate_configuration_dns_classic_infrastructure_model2 = PublicCertificateConfigurationDNSClassicInfrastructure( - **public_certificate_configuration_dns_classic_infrastructure_model_dict) + public_certificate_configuration_dns_classic_infrastructure_model_dict = PublicCertificateConfigurationDNSClassicInfrastructure.from_dict(public_certificate_configuration_dns_classic_infrastructure_model_json).__dict__ + public_certificate_configuration_dns_classic_infrastructure_model2 = PublicCertificateConfigurationDNSClassicInfrastructure(**public_certificate_configuration_dns_classic_infrastructure_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_dns_classic_infrastructure_model == public_certificate_configuration_dns_classic_infrastructure_model2 @@ -9464,28 +9074,20 @@ def test_public_certificate_configuration_dns_classic_infrastructure_metadata_se # Construct a json representation of a PublicCertificateConfigurationDNSClassicInfrastructureMetadata model public_certificate_configuration_dns_classic_infrastructure_metadata_model_json = {} - public_certificate_configuration_dns_classic_infrastructure_metadata_model_json[ - 'config_type'] = 'public_cert_configuration_dns_classic_infrastructure' - public_certificate_configuration_dns_classic_infrastructure_metadata_model_json[ - 'name'] = 'my-secret-engine-config' + public_certificate_configuration_dns_classic_infrastructure_metadata_model_json['config_type'] = 'public_cert_configuration_dns_classic_infrastructure' + public_certificate_configuration_dns_classic_infrastructure_metadata_model_json['name'] = 'my-secret-engine-config' public_certificate_configuration_dns_classic_infrastructure_metadata_model_json['secret_type'] = 'arbitrary' - public_certificate_configuration_dns_classic_infrastructure_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' - public_certificate_configuration_dns_classic_infrastructure_metadata_model_json[ - 'created_at'] = '2022-04-12T23:20:50.520000Z' - public_certificate_configuration_dns_classic_infrastructure_metadata_model_json[ - 'updated_at'] = '2022-04-12T23:20:50.520000Z' + public_certificate_configuration_dns_classic_infrastructure_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + public_certificate_configuration_dns_classic_infrastructure_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' + public_certificate_configuration_dns_classic_infrastructure_metadata_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' # Construct a model instance of PublicCertificateConfigurationDNSClassicInfrastructureMetadata by calling from_dict on the json representation - public_certificate_configuration_dns_classic_infrastructure_metadata_model = PublicCertificateConfigurationDNSClassicInfrastructureMetadata.from_dict( - public_certificate_configuration_dns_classic_infrastructure_metadata_model_json) + public_certificate_configuration_dns_classic_infrastructure_metadata_model = PublicCertificateConfigurationDNSClassicInfrastructureMetadata.from_dict(public_certificate_configuration_dns_classic_infrastructure_metadata_model_json) assert public_certificate_configuration_dns_classic_infrastructure_metadata_model != False # Construct a model instance of PublicCertificateConfigurationDNSClassicInfrastructureMetadata by calling from_dict on the json representation - public_certificate_configuration_dns_classic_infrastructure_metadata_model_dict = PublicCertificateConfigurationDNSClassicInfrastructureMetadata.from_dict( - public_certificate_configuration_dns_classic_infrastructure_metadata_model_json).__dict__ - public_certificate_configuration_dns_classic_infrastructure_metadata_model2 = PublicCertificateConfigurationDNSClassicInfrastructureMetadata( - **public_certificate_configuration_dns_classic_infrastructure_metadata_model_dict) + public_certificate_configuration_dns_classic_infrastructure_metadata_model_dict = PublicCertificateConfigurationDNSClassicInfrastructureMetadata.from_dict(public_certificate_configuration_dns_classic_infrastructure_metadata_model_json).__dict__ + public_certificate_configuration_dns_classic_infrastructure_metadata_model2 = PublicCertificateConfigurationDNSClassicInfrastructureMetadata(**public_certificate_configuration_dns_classic_infrastructure_metadata_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_dns_classic_infrastructure_metadata_model == public_certificate_configuration_dns_classic_infrastructure_metadata_model2 @@ -9507,21 +9109,16 @@ def test_public_certificate_configuration_dns_classic_infrastructure_patch_seria # Construct a json representation of a PublicCertificateConfigurationDNSClassicInfrastructurePatch model public_certificate_configuration_dns_classic_infrastructure_patch_model_json = {} - public_certificate_configuration_dns_classic_infrastructure_patch_model_json[ - 'classic_infrastructure_username'] = 'testString' - public_certificate_configuration_dns_classic_infrastructure_patch_model_json[ - 'classic_infrastructure_password'] = 'testString' + public_certificate_configuration_dns_classic_infrastructure_patch_model_json['classic_infrastructure_username'] = 'testString' + public_certificate_configuration_dns_classic_infrastructure_patch_model_json['classic_infrastructure_password'] = 'testString' # Construct a model instance of PublicCertificateConfigurationDNSClassicInfrastructurePatch by calling from_dict on the json representation - public_certificate_configuration_dns_classic_infrastructure_patch_model = PublicCertificateConfigurationDNSClassicInfrastructurePatch.from_dict( - public_certificate_configuration_dns_classic_infrastructure_patch_model_json) + public_certificate_configuration_dns_classic_infrastructure_patch_model = PublicCertificateConfigurationDNSClassicInfrastructurePatch.from_dict(public_certificate_configuration_dns_classic_infrastructure_patch_model_json) assert public_certificate_configuration_dns_classic_infrastructure_patch_model != False # Construct a model instance of PublicCertificateConfigurationDNSClassicInfrastructurePatch by calling from_dict on the json representation - public_certificate_configuration_dns_classic_infrastructure_patch_model_dict = PublicCertificateConfigurationDNSClassicInfrastructurePatch.from_dict( - public_certificate_configuration_dns_classic_infrastructure_patch_model_json).__dict__ - public_certificate_configuration_dns_classic_infrastructure_patch_model2 = PublicCertificateConfigurationDNSClassicInfrastructurePatch( - **public_certificate_configuration_dns_classic_infrastructure_patch_model_dict) + public_certificate_configuration_dns_classic_infrastructure_patch_model_dict = PublicCertificateConfigurationDNSClassicInfrastructurePatch.from_dict(public_certificate_configuration_dns_classic_infrastructure_patch_model_json).__dict__ + public_certificate_configuration_dns_classic_infrastructure_patch_model2 = PublicCertificateConfigurationDNSClassicInfrastructurePatch(**public_certificate_configuration_dns_classic_infrastructure_patch_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_dns_classic_infrastructure_patch_model == public_certificate_configuration_dns_classic_infrastructure_patch_model2 @@ -9543,25 +9140,18 @@ def test_public_certificate_configuration_dns_classic_infrastructure_prototype_s # Construct a json representation of a PublicCertificateConfigurationDNSClassicInfrastructurePrototype model public_certificate_configuration_dns_classic_infrastructure_prototype_model_json = {} - public_certificate_configuration_dns_classic_infrastructure_prototype_model_json[ - 'config_type'] = 'public_cert_configuration_dns_classic_infrastructure' - public_certificate_configuration_dns_classic_infrastructure_prototype_model_json[ - 'name'] = 'my-example-engine-config' - public_certificate_configuration_dns_classic_infrastructure_prototype_model_json[ - 'classic_infrastructure_username'] = 'testString' - public_certificate_configuration_dns_classic_infrastructure_prototype_model_json[ - 'classic_infrastructure_password'] = 'testString' + public_certificate_configuration_dns_classic_infrastructure_prototype_model_json['config_type'] = 'public_cert_configuration_dns_classic_infrastructure' + public_certificate_configuration_dns_classic_infrastructure_prototype_model_json['name'] = 'my-example-engine-config' + public_certificate_configuration_dns_classic_infrastructure_prototype_model_json['classic_infrastructure_username'] = 'testString' + public_certificate_configuration_dns_classic_infrastructure_prototype_model_json['classic_infrastructure_password'] = 'testString' # Construct a model instance of PublicCertificateConfigurationDNSClassicInfrastructurePrototype by calling from_dict on the json representation - public_certificate_configuration_dns_classic_infrastructure_prototype_model = PublicCertificateConfigurationDNSClassicInfrastructurePrototype.from_dict( - public_certificate_configuration_dns_classic_infrastructure_prototype_model_json) + public_certificate_configuration_dns_classic_infrastructure_prototype_model = PublicCertificateConfigurationDNSClassicInfrastructurePrototype.from_dict(public_certificate_configuration_dns_classic_infrastructure_prototype_model_json) assert public_certificate_configuration_dns_classic_infrastructure_prototype_model != False # Construct a model instance of PublicCertificateConfigurationDNSClassicInfrastructurePrototype by calling from_dict on the json representation - public_certificate_configuration_dns_classic_infrastructure_prototype_model_dict = PublicCertificateConfigurationDNSClassicInfrastructurePrototype.from_dict( - public_certificate_configuration_dns_classic_infrastructure_prototype_model_json).__dict__ - public_certificate_configuration_dns_classic_infrastructure_prototype_model2 = PublicCertificateConfigurationDNSClassicInfrastructurePrototype( - **public_certificate_configuration_dns_classic_infrastructure_prototype_model_dict) + public_certificate_configuration_dns_classic_infrastructure_prototype_model_dict = PublicCertificateConfigurationDNSClassicInfrastructurePrototype.from_dict(public_certificate_configuration_dns_classic_infrastructure_prototype_model_json).__dict__ + public_certificate_configuration_dns_classic_infrastructure_prototype_model2 = PublicCertificateConfigurationDNSClassicInfrastructurePrototype(**public_certificate_configuration_dns_classic_infrastructure_prototype_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_dns_classic_infrastructure_prototype_model == public_certificate_configuration_dns_classic_infrastructure_prototype_model2 @@ -9583,31 +9173,22 @@ def test_public_certificate_configuration_dns_cloud_internet_services_serializat # Construct a json representation of a PublicCertificateConfigurationDNSCloudInternetServices model public_certificate_configuration_dns_cloud_internet_services_model_json = {} - public_certificate_configuration_dns_cloud_internet_services_model_json[ - 'config_type'] = 'public_cert_configuration_dns_cloud_internet_services' + public_certificate_configuration_dns_cloud_internet_services_model_json['config_type'] = 'public_cert_configuration_dns_cloud_internet_services' public_certificate_configuration_dns_cloud_internet_services_model_json['name'] = 'my-secret-engine-config' public_certificate_configuration_dns_cloud_internet_services_model_json['secret_type'] = 'arbitrary' - public_certificate_configuration_dns_cloud_internet_services_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' - public_certificate_configuration_dns_cloud_internet_services_model_json[ - 'created_at'] = '2022-04-12T23:20:50.520000Z' - public_certificate_configuration_dns_cloud_internet_services_model_json[ - 'updated_at'] = '2022-04-12T23:20:50.520000Z' - public_certificate_configuration_dns_cloud_internet_services_model_json[ - 'cloud_internet_services_apikey'] = 'testString' - public_certificate_configuration_dns_cloud_internet_services_model_json[ - 'cloud_internet_services_crn'] = 'testString' + public_certificate_configuration_dns_cloud_internet_services_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + public_certificate_configuration_dns_cloud_internet_services_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' + public_certificate_configuration_dns_cloud_internet_services_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' + public_certificate_configuration_dns_cloud_internet_services_model_json['cloud_internet_services_apikey'] = 'testString' + public_certificate_configuration_dns_cloud_internet_services_model_json['cloud_internet_services_crn'] = 'testString' # Construct a model instance of PublicCertificateConfigurationDNSCloudInternetServices by calling from_dict on the json representation - public_certificate_configuration_dns_cloud_internet_services_model = PublicCertificateConfigurationDNSCloudInternetServices.from_dict( - public_certificate_configuration_dns_cloud_internet_services_model_json) + public_certificate_configuration_dns_cloud_internet_services_model = PublicCertificateConfigurationDNSCloudInternetServices.from_dict(public_certificate_configuration_dns_cloud_internet_services_model_json) assert public_certificate_configuration_dns_cloud_internet_services_model != False # Construct a model instance of PublicCertificateConfigurationDNSCloudInternetServices by calling from_dict on the json representation - public_certificate_configuration_dns_cloud_internet_services_model_dict = PublicCertificateConfigurationDNSCloudInternetServices.from_dict( - public_certificate_configuration_dns_cloud_internet_services_model_json).__dict__ - public_certificate_configuration_dns_cloud_internet_services_model2 = PublicCertificateConfigurationDNSCloudInternetServices( - **public_certificate_configuration_dns_cloud_internet_services_model_dict) + public_certificate_configuration_dns_cloud_internet_services_model_dict = PublicCertificateConfigurationDNSCloudInternetServices.from_dict(public_certificate_configuration_dns_cloud_internet_services_model_json).__dict__ + public_certificate_configuration_dns_cloud_internet_services_model2 = PublicCertificateConfigurationDNSCloudInternetServices(**public_certificate_configuration_dns_cloud_internet_services_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_dns_cloud_internet_services_model == public_certificate_configuration_dns_cloud_internet_services_model2 @@ -9629,28 +9210,20 @@ def test_public_certificate_configuration_dns_cloud_internet_services_metadata_s # Construct a json representation of a PublicCertificateConfigurationDNSCloudInternetServicesMetadata model public_certificate_configuration_dns_cloud_internet_services_metadata_model_json = {} - public_certificate_configuration_dns_cloud_internet_services_metadata_model_json[ - 'config_type'] = 'public_cert_configuration_dns_cloud_internet_services' - public_certificate_configuration_dns_cloud_internet_services_metadata_model_json[ - 'name'] = 'my-secret-engine-config' + public_certificate_configuration_dns_cloud_internet_services_metadata_model_json['config_type'] = 'public_cert_configuration_dns_cloud_internet_services' + public_certificate_configuration_dns_cloud_internet_services_metadata_model_json['name'] = 'my-secret-engine-config' public_certificate_configuration_dns_cloud_internet_services_metadata_model_json['secret_type'] = 'arbitrary' - public_certificate_configuration_dns_cloud_internet_services_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' - public_certificate_configuration_dns_cloud_internet_services_metadata_model_json[ - 'created_at'] = '2022-04-12T23:20:50.520000Z' - public_certificate_configuration_dns_cloud_internet_services_metadata_model_json[ - 'updated_at'] = '2022-04-12T23:20:50.520000Z' + public_certificate_configuration_dns_cloud_internet_services_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + public_certificate_configuration_dns_cloud_internet_services_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' + public_certificate_configuration_dns_cloud_internet_services_metadata_model_json['updated_at'] = '2022-04-12T23:20:50.520000Z' # Construct a model instance of PublicCertificateConfigurationDNSCloudInternetServicesMetadata by calling from_dict on the json representation - public_certificate_configuration_dns_cloud_internet_services_metadata_model = PublicCertificateConfigurationDNSCloudInternetServicesMetadata.from_dict( - public_certificate_configuration_dns_cloud_internet_services_metadata_model_json) + public_certificate_configuration_dns_cloud_internet_services_metadata_model = PublicCertificateConfigurationDNSCloudInternetServicesMetadata.from_dict(public_certificate_configuration_dns_cloud_internet_services_metadata_model_json) assert public_certificate_configuration_dns_cloud_internet_services_metadata_model != False # Construct a model instance of PublicCertificateConfigurationDNSCloudInternetServicesMetadata by calling from_dict on the json representation - public_certificate_configuration_dns_cloud_internet_services_metadata_model_dict = PublicCertificateConfigurationDNSCloudInternetServicesMetadata.from_dict( - public_certificate_configuration_dns_cloud_internet_services_metadata_model_json).__dict__ - public_certificate_configuration_dns_cloud_internet_services_metadata_model2 = PublicCertificateConfigurationDNSCloudInternetServicesMetadata( - **public_certificate_configuration_dns_cloud_internet_services_metadata_model_dict) + public_certificate_configuration_dns_cloud_internet_services_metadata_model_dict = PublicCertificateConfigurationDNSCloudInternetServicesMetadata.from_dict(public_certificate_configuration_dns_cloud_internet_services_metadata_model_json).__dict__ + public_certificate_configuration_dns_cloud_internet_services_metadata_model2 = PublicCertificateConfigurationDNSCloudInternetServicesMetadata(**public_certificate_configuration_dns_cloud_internet_services_metadata_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_dns_cloud_internet_services_metadata_model == public_certificate_configuration_dns_cloud_internet_services_metadata_model2 @@ -9672,21 +9245,16 @@ def test_public_certificate_configuration_dns_cloud_internet_services_patch_seri # Construct a json representation of a PublicCertificateConfigurationDNSCloudInternetServicesPatch model public_certificate_configuration_dns_cloud_internet_services_patch_model_json = {} - public_certificate_configuration_dns_cloud_internet_services_patch_model_json[ - 'cloud_internet_services_apikey'] = 'testString' - public_certificate_configuration_dns_cloud_internet_services_patch_model_json[ - 'cloud_internet_services_crn'] = 'testString' + public_certificate_configuration_dns_cloud_internet_services_patch_model_json['cloud_internet_services_apikey'] = 'testString' + public_certificate_configuration_dns_cloud_internet_services_patch_model_json['cloud_internet_services_crn'] = 'testString' # Construct a model instance of PublicCertificateConfigurationDNSCloudInternetServicesPatch by calling from_dict on the json representation - public_certificate_configuration_dns_cloud_internet_services_patch_model = PublicCertificateConfigurationDNSCloudInternetServicesPatch.from_dict( - public_certificate_configuration_dns_cloud_internet_services_patch_model_json) + public_certificate_configuration_dns_cloud_internet_services_patch_model = PublicCertificateConfigurationDNSCloudInternetServicesPatch.from_dict(public_certificate_configuration_dns_cloud_internet_services_patch_model_json) assert public_certificate_configuration_dns_cloud_internet_services_patch_model != False # Construct a model instance of PublicCertificateConfigurationDNSCloudInternetServicesPatch by calling from_dict on the json representation - public_certificate_configuration_dns_cloud_internet_services_patch_model_dict = PublicCertificateConfigurationDNSCloudInternetServicesPatch.from_dict( - public_certificate_configuration_dns_cloud_internet_services_patch_model_json).__dict__ - public_certificate_configuration_dns_cloud_internet_services_patch_model2 = PublicCertificateConfigurationDNSCloudInternetServicesPatch( - **public_certificate_configuration_dns_cloud_internet_services_patch_model_dict) + public_certificate_configuration_dns_cloud_internet_services_patch_model_dict = PublicCertificateConfigurationDNSCloudInternetServicesPatch.from_dict(public_certificate_configuration_dns_cloud_internet_services_patch_model_json).__dict__ + public_certificate_configuration_dns_cloud_internet_services_patch_model2 = PublicCertificateConfigurationDNSCloudInternetServicesPatch(**public_certificate_configuration_dns_cloud_internet_services_patch_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_dns_cloud_internet_services_patch_model == public_certificate_configuration_dns_cloud_internet_services_patch_model2 @@ -9708,25 +9276,18 @@ def test_public_certificate_configuration_dns_cloud_internet_services_prototype_ # Construct a json representation of a PublicCertificateConfigurationDNSCloudInternetServicesPrototype model public_certificate_configuration_dns_cloud_internet_services_prototype_model_json = {} - public_certificate_configuration_dns_cloud_internet_services_prototype_model_json[ - 'config_type'] = 'public_cert_configuration_dns_cloud_internet_services' - public_certificate_configuration_dns_cloud_internet_services_prototype_model_json[ - 'name'] = 'my-example-engine-config' - public_certificate_configuration_dns_cloud_internet_services_prototype_model_json[ - 'cloud_internet_services_apikey'] = 'testString' - public_certificate_configuration_dns_cloud_internet_services_prototype_model_json[ - 'cloud_internet_services_crn'] = 'testString' + public_certificate_configuration_dns_cloud_internet_services_prototype_model_json['config_type'] = 'public_cert_configuration_dns_cloud_internet_services' + public_certificate_configuration_dns_cloud_internet_services_prototype_model_json['name'] = 'my-example-engine-config' + public_certificate_configuration_dns_cloud_internet_services_prototype_model_json['cloud_internet_services_apikey'] = 'testString' + public_certificate_configuration_dns_cloud_internet_services_prototype_model_json['cloud_internet_services_crn'] = 'testString' # Construct a model instance of PublicCertificateConfigurationDNSCloudInternetServicesPrototype by calling from_dict on the json representation - public_certificate_configuration_dns_cloud_internet_services_prototype_model = PublicCertificateConfigurationDNSCloudInternetServicesPrototype.from_dict( - public_certificate_configuration_dns_cloud_internet_services_prototype_model_json) + public_certificate_configuration_dns_cloud_internet_services_prototype_model = PublicCertificateConfigurationDNSCloudInternetServicesPrototype.from_dict(public_certificate_configuration_dns_cloud_internet_services_prototype_model_json) assert public_certificate_configuration_dns_cloud_internet_services_prototype_model != False # Construct a model instance of PublicCertificateConfigurationDNSCloudInternetServicesPrototype by calling from_dict on the json representation - public_certificate_configuration_dns_cloud_internet_services_prototype_model_dict = PublicCertificateConfigurationDNSCloudInternetServicesPrototype.from_dict( - public_certificate_configuration_dns_cloud_internet_services_prototype_model_json).__dict__ - public_certificate_configuration_dns_cloud_internet_services_prototype_model2 = PublicCertificateConfigurationDNSCloudInternetServicesPrototype( - **public_certificate_configuration_dns_cloud_internet_services_prototype_model_dict) + public_certificate_configuration_dns_cloud_internet_services_prototype_model_dict = PublicCertificateConfigurationDNSCloudInternetServicesPrototype.from_dict(public_certificate_configuration_dns_cloud_internet_services_prototype_model_json).__dict__ + public_certificate_configuration_dns_cloud_internet_services_prototype_model2 = PublicCertificateConfigurationDNSCloudInternetServicesPrototype(**public_certificate_configuration_dns_cloud_internet_services_prototype_model_dict) # Verify the model instances are equivalent assert public_certificate_configuration_dns_cloud_internet_services_prototype_model == public_certificate_configuration_dns_cloud_internet_services_prototype_model2 @@ -9776,8 +9337,7 @@ def test_public_certificate_metadata_serialization(self): public_certificate_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' public_certificate_metadata_model_json['issuer'] = 'Lets Encrypt' public_certificate_metadata_model_json['key_algorithm'] = 'RSA2048' - public_certificate_metadata_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + public_certificate_metadata_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' public_certificate_metadata_model_json['validity'] = certificate_validity_model public_certificate_metadata_model_json['rotation'] = rotation_policy_model @@ -9786,8 +9346,7 @@ def test_public_certificate_metadata_serialization(self): assert public_certificate_metadata_model != False # Construct a model instance of PublicCertificateMetadata by calling from_dict on the json representation - public_certificate_metadata_model_dict = PublicCertificateMetadata.from_dict( - public_certificate_metadata_model_json).__dict__ + public_certificate_metadata_model_dict = PublicCertificateMetadata.from_dict(public_certificate_metadata_model_json).__dict__ public_certificate_metadata_model2 = PublicCertificateMetadata(**public_certificate_metadata_model_dict) # Verify the model instances are equivalent @@ -9824,15 +9383,12 @@ def test_public_certificate_metadata_patch_serialization(self): public_certificate_metadata_patch_model_json['rotation'] = rotation_policy_model # Construct a model instance of PublicCertificateMetadataPatch by calling from_dict on the json representation - public_certificate_metadata_patch_model = PublicCertificateMetadataPatch.from_dict( - public_certificate_metadata_patch_model_json) + public_certificate_metadata_patch_model = PublicCertificateMetadataPatch.from_dict(public_certificate_metadata_patch_model_json) assert public_certificate_metadata_patch_model != False # Construct a model instance of PublicCertificateMetadataPatch by calling from_dict on the json representation - public_certificate_metadata_patch_model_dict = PublicCertificateMetadataPatch.from_dict( - public_certificate_metadata_patch_model_json).__dict__ - public_certificate_metadata_patch_model2 = PublicCertificateMetadataPatch( - **public_certificate_metadata_patch_model_dict) + public_certificate_metadata_patch_model_dict = PublicCertificateMetadataPatch.from_dict(public_certificate_metadata_patch_model_json).__dict__ + public_certificate_metadata_patch_model2 = PublicCertificateMetadataPatch(**public_certificate_metadata_patch_model_dict) # Verify the model instances are equivalent assert public_certificate_metadata_patch_model == public_certificate_metadata_patch_model2 @@ -9877,13 +9433,11 @@ def test_public_certificate_prototype_serialization(self): public_certificate_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of PublicCertificatePrototype by calling from_dict on the json representation - public_certificate_prototype_model = PublicCertificatePrototype.from_dict( - public_certificate_prototype_model_json) + public_certificate_prototype_model = PublicCertificatePrototype.from_dict(public_certificate_prototype_model_json) assert public_certificate_prototype_model != False # Construct a model instance of PublicCertificatePrototype by calling from_dict on the json representation - public_certificate_prototype_model_dict = PublicCertificatePrototype.from_dict( - public_certificate_prototype_model_json).__dict__ + public_certificate_prototype_model_dict = PublicCertificatePrototype.from_dict(public_certificate_prototype_model_json).__dict__ public_certificate_prototype_model2 = PublicCertificatePrototype(**public_certificate_prototype_model_dict) # Verify the model instances are equivalent @@ -9910,15 +9464,12 @@ def test_public_certificate_rotation_policy_serialization(self): public_certificate_rotation_policy_model_json['rotate_keys'] = True # Construct a model instance of PublicCertificateRotationPolicy by calling from_dict on the json representation - public_certificate_rotation_policy_model = PublicCertificateRotationPolicy.from_dict( - public_certificate_rotation_policy_model_json) + public_certificate_rotation_policy_model = PublicCertificateRotationPolicy.from_dict(public_certificate_rotation_policy_model_json) assert public_certificate_rotation_policy_model != False # Construct a model instance of PublicCertificateRotationPolicy by calling from_dict on the json representation - public_certificate_rotation_policy_model_dict = PublicCertificateRotationPolicy.from_dict( - public_certificate_rotation_policy_model_json).__dict__ - public_certificate_rotation_policy_model2 = PublicCertificateRotationPolicy( - **public_certificate_rotation_policy_model_dict) + public_certificate_rotation_policy_model_dict = PublicCertificateRotationPolicy.from_dict(public_certificate_rotation_policy_model_json).__dict__ + public_certificate_rotation_policy_model2 = PublicCertificateRotationPolicy(**public_certificate_rotation_policy_model_dict) # Verify the model instances are equivalent assert public_certificate_rotation_policy_model == public_certificate_rotation_policy_model2 @@ -9957,8 +9508,7 @@ def test_public_certificate_version_serialization(self): public_certificate_version_model_json['version_custom_metadata'] = {'key': 'value'} public_certificate_version_model_json['secret_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' public_certificate_version_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' - public_certificate_version_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + public_certificate_version_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' public_certificate_version_model_json['validity'] = certificate_validity_model public_certificate_version_model_json['certificate'] = 'testString' public_certificate_version_model_json['intermediate'] = 'testString' @@ -9969,8 +9519,7 @@ def test_public_certificate_version_serialization(self): assert public_certificate_version_model != False # Construct a model instance of PublicCertificateVersion by calling from_dict on the json representation - public_certificate_version_model_dict = PublicCertificateVersion.from_dict( - public_certificate_version_model_json).__dict__ + public_certificate_version_model_dict = PublicCertificateVersion.from_dict(public_certificate_version_model_json).__dict__ public_certificate_version_model2 = PublicCertificateVersion(**public_certificate_version_model_dict) # Verify the model instances are equivalent @@ -10000,8 +9549,7 @@ def test_public_certificate_version_metadata_serialization(self): # Construct a json representation of a PublicCertificateVersionMetadata model public_certificate_version_metadata_model_json = {} public_certificate_version_metadata_model_json['auto_rotated'] = True - public_certificate_version_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + public_certificate_version_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' public_certificate_version_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' public_certificate_version_metadata_model_json['id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' public_certificate_version_metadata_model_json['secret_type'] = 'public_cert' @@ -10011,20 +9559,16 @@ def test_public_certificate_version_metadata_serialization(self): public_certificate_version_metadata_model_json['version_custom_metadata'] = {'key': 'value'} public_certificate_version_metadata_model_json['secret_id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' public_certificate_version_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' - public_certificate_version_metadata_model_json[ - 'serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' + public_certificate_version_metadata_model_json['serial_number'] = '38:eb:01:a3:22:e9:de:55:24:56:9b:14:cb:e2:f3:e3:e2:fb:f5:18' public_certificate_version_metadata_model_json['validity'] = certificate_validity_model # Construct a model instance of PublicCertificateVersionMetadata by calling from_dict on the json representation - public_certificate_version_metadata_model = PublicCertificateVersionMetadata.from_dict( - public_certificate_version_metadata_model_json) + public_certificate_version_metadata_model = PublicCertificateVersionMetadata.from_dict(public_certificate_version_metadata_model_json) assert public_certificate_version_metadata_model != False # Construct a model instance of PublicCertificateVersionMetadata by calling from_dict on the json representation - public_certificate_version_metadata_model_dict = PublicCertificateVersionMetadata.from_dict( - public_certificate_version_metadata_model_json).__dict__ - public_certificate_version_metadata_model2 = PublicCertificateVersionMetadata( - **public_certificate_version_metadata_model_dict) + public_certificate_version_metadata_model_dict = PublicCertificateVersionMetadata.from_dict(public_certificate_version_metadata_model_json).__dict__ + public_certificate_version_metadata_model2 = PublicCertificateVersionMetadata(**public_certificate_version_metadata_model_dict) # Verify the model instances are equivalent assert public_certificate_version_metadata_model == public_certificate_version_metadata_model2 @@ -10056,15 +9600,12 @@ def test_public_certificate_version_prototype_serialization(self): public_certificate_version_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of PublicCertificateVersionPrototype by calling from_dict on the json representation - public_certificate_version_prototype_model = PublicCertificateVersionPrototype.from_dict( - public_certificate_version_prototype_model_json) + public_certificate_version_prototype_model = PublicCertificateVersionPrototype.from_dict(public_certificate_version_prototype_model_json) assert public_certificate_version_prototype_model != False # Construct a model instance of PublicCertificateVersionPrototype by calling from_dict on the json representation - public_certificate_version_prototype_model_dict = PublicCertificateVersionPrototype.from_dict( - public_certificate_version_prototype_model_json).__dict__ - public_certificate_version_prototype_model2 = PublicCertificateVersionPrototype( - **public_certificate_version_prototype_model_dict) + public_certificate_version_prototype_model_dict = PublicCertificateVersionPrototype.from_dict(public_certificate_version_prototype_model_json).__dict__ + public_certificate_version_prototype_model2 = PublicCertificateVersionPrototype(**public_certificate_version_prototype_model_dict) # Verify the model instances are equivalent assert public_certificate_version_prototype_model == public_certificate_version_prototype_model2 @@ -10110,16 +9651,13 @@ def test_service_credentials_secret_serialization(self): service_credentials_source_service_iam_model = {} # ServiceCredentialsSourceServiceIam service_credentials_source_service_iam_model['apikey'] = service_credentials_source_service_iam_apikey_model service_credentials_source_service_iam_model['role'] = service_credentials_source_service_iam_role_model - service_credentials_source_service_iam_model[ - 'serviceid'] = service_credentials_source_service_iam_serviceid_model + service_credentials_source_service_iam_model['serviceid'] = service_credentials_source_service_iam_serviceid_model service_credentials_resource_key_model = {} # ServiceCredentialsResourceKey service_credentials_secret_source_service_ro_model = {} # ServiceCredentialsSecretSourceServiceRO - service_credentials_secret_source_service_ro_model[ - 'instance'] = service_credentials_source_service_instance_model - service_credentials_secret_source_service_ro_model[ - 'parameters'] = service_credentials_source_service_parameters_model + service_credentials_secret_source_service_ro_model['instance'] = service_credentials_source_service_instance_model + service_credentials_secret_source_service_ro_model['parameters'] = service_credentials_source_service_parameters_model service_credentials_secret_source_service_ro_model['role'] = service_credentials_source_service_role_model service_credentials_secret_source_service_ro_model['iam'] = service_credentials_source_service_iam_model service_credentials_secret_source_service_ro_model['resource_key'] = service_credentials_resource_key_model @@ -10151,8 +9689,7 @@ def test_service_credentials_secret_serialization(self): assert service_credentials_secret_model != False # Construct a model instance of ServiceCredentialsSecret by calling from_dict on the json representation - service_credentials_secret_model_dict = ServiceCredentialsSecret.from_dict( - service_credentials_secret_model_json).__dict__ + service_credentials_secret_model_dict = ServiceCredentialsSecret.from_dict(service_credentials_secret_model_json).__dict__ service_credentials_secret_model2 = ServiceCredentialsSecret(**service_credentials_secret_model_dict) # Verify the model instances are equivalent @@ -10199,24 +9736,20 @@ def test_service_credentials_secret_metadata_serialization(self): service_credentials_source_service_iam_model = {} # ServiceCredentialsSourceServiceIam service_credentials_source_service_iam_model['apikey'] = service_credentials_source_service_iam_apikey_model service_credentials_source_service_iam_model['role'] = service_credentials_source_service_iam_role_model - service_credentials_source_service_iam_model[ - 'serviceid'] = service_credentials_source_service_iam_serviceid_model + service_credentials_source_service_iam_model['serviceid'] = service_credentials_source_service_iam_serviceid_model service_credentials_resource_key_model = {} # ServiceCredentialsResourceKey service_credentials_secret_source_service_ro_model = {} # ServiceCredentialsSecretSourceServiceRO - service_credentials_secret_source_service_ro_model[ - 'instance'] = service_credentials_source_service_instance_model - service_credentials_secret_source_service_ro_model[ - 'parameters'] = service_credentials_source_service_parameters_model + service_credentials_secret_source_service_ro_model['instance'] = service_credentials_source_service_instance_model + service_credentials_secret_source_service_ro_model['parameters'] = service_credentials_source_service_parameters_model service_credentials_secret_source_service_ro_model['role'] = service_credentials_source_service_role_model service_credentials_secret_source_service_ro_model['iam'] = service_credentials_source_service_iam_model service_credentials_secret_source_service_ro_model['resource_key'] = service_credentials_resource_key_model # Construct a json representation of a ServiceCredentialsSecretMetadata model service_credentials_secret_metadata_model_json = {} - service_credentials_secret_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + service_credentials_secret_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' service_credentials_secret_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' service_credentials_secret_metadata_model_json['crn'] = 'testString' service_credentials_secret_metadata_model_json['custom_metadata'] = {'key': 'value'} @@ -10230,19 +9763,15 @@ def test_service_credentials_secret_metadata_serialization(self): service_credentials_secret_metadata_model_json['rotation'] = rotation_policy_model service_credentials_secret_metadata_model_json['ttl'] = '1d' service_credentials_secret_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' - service_credentials_secret_metadata_model_json[ - 'source_service'] = service_credentials_secret_source_service_ro_model + service_credentials_secret_metadata_model_json['source_service'] = service_credentials_secret_source_service_ro_model # Construct a model instance of ServiceCredentialsSecretMetadata by calling from_dict on the json representation - service_credentials_secret_metadata_model = ServiceCredentialsSecretMetadata.from_dict( - service_credentials_secret_metadata_model_json) + service_credentials_secret_metadata_model = ServiceCredentialsSecretMetadata.from_dict(service_credentials_secret_metadata_model_json) assert service_credentials_secret_metadata_model != False # Construct a model instance of ServiceCredentialsSecretMetadata by calling from_dict on the json representation - service_credentials_secret_metadata_model_dict = ServiceCredentialsSecretMetadata.from_dict( - service_credentials_secret_metadata_model_json).__dict__ - service_credentials_secret_metadata_model2 = ServiceCredentialsSecretMetadata( - **service_credentials_secret_metadata_model_dict) + service_credentials_secret_metadata_model_dict = ServiceCredentialsSecretMetadata.from_dict(service_credentials_secret_metadata_model_json).__dict__ + service_credentials_secret_metadata_model2 = ServiceCredentialsSecretMetadata(**service_credentials_secret_metadata_model_dict) # Verify the model instances are equivalent assert service_credentials_secret_metadata_model == service_credentials_secret_metadata_model2 @@ -10279,15 +9808,12 @@ def test_service_credentials_secret_metadata_patch_serialization(self): service_credentials_secret_metadata_patch_model_json['ttl'] = '1d' # Construct a model instance of ServiceCredentialsSecretMetadataPatch by calling from_dict on the json representation - service_credentials_secret_metadata_patch_model = ServiceCredentialsSecretMetadataPatch.from_dict( - service_credentials_secret_metadata_patch_model_json) + service_credentials_secret_metadata_patch_model = ServiceCredentialsSecretMetadataPatch.from_dict(service_credentials_secret_metadata_patch_model_json) assert service_credentials_secret_metadata_patch_model != False # Construct a model instance of ServiceCredentialsSecretMetadataPatch by calling from_dict on the json representation - service_credentials_secret_metadata_patch_model_dict = ServiceCredentialsSecretMetadataPatch.from_dict( - service_credentials_secret_metadata_patch_model_json).__dict__ - service_credentials_secret_metadata_patch_model2 = ServiceCredentialsSecretMetadataPatch( - **service_credentials_secret_metadata_patch_model_dict) + service_credentials_secret_metadata_patch_model_dict = ServiceCredentialsSecretMetadataPatch.from_dict(service_credentials_secret_metadata_patch_model_json).__dict__ + service_credentials_secret_metadata_patch_model2 = ServiceCredentialsSecretMetadataPatch(**service_credentials_secret_metadata_patch_model_dict) # Verify the model instances are equivalent assert service_credentials_secret_metadata_patch_model == service_credentials_secret_metadata_patch_model2 @@ -10326,8 +9852,7 @@ def test_service_credentials_secret_prototype_serialization(self): service_credentials_secret_source_service_model = {} # ServiceCredentialsSecretSourceService service_credentials_secret_source_service_model['instance'] = service_credentials_source_service_instance_model - service_credentials_secret_source_service_model[ - 'parameters'] = service_credentials_source_service_parameters_model + service_credentials_secret_source_service_model['parameters'] = service_credentials_source_service_parameters_model service_credentials_secret_source_service_model['role'] = service_credentials_source_service_role_model # Construct a json representation of a ServiceCredentialsSecretPrototype model @@ -10339,21 +9864,17 @@ def test_service_credentials_secret_prototype_serialization(self): service_credentials_secret_prototype_model_json['rotation'] = rotation_policy_model service_credentials_secret_prototype_model_json['secret_group_id'] = 'default' service_credentials_secret_prototype_model_json['secret_type'] = 'service_credentials' - service_credentials_secret_prototype_model_json[ - 'source_service'] = service_credentials_secret_source_service_model + service_credentials_secret_prototype_model_json['source_service'] = service_credentials_secret_source_service_model service_credentials_secret_prototype_model_json['ttl'] = '1d' service_credentials_secret_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of ServiceCredentialsSecretPrototype by calling from_dict on the json representation - service_credentials_secret_prototype_model = ServiceCredentialsSecretPrototype.from_dict( - service_credentials_secret_prototype_model_json) + service_credentials_secret_prototype_model = ServiceCredentialsSecretPrototype.from_dict(service_credentials_secret_prototype_model_json) assert service_credentials_secret_prototype_model != False # Construct a model instance of ServiceCredentialsSecretPrototype by calling from_dict on the json representation - service_credentials_secret_prototype_model_dict = ServiceCredentialsSecretPrototype.from_dict( - service_credentials_secret_prototype_model_json).__dict__ - service_credentials_secret_prototype_model2 = ServiceCredentialsSecretPrototype( - **service_credentials_secret_prototype_model_dict) + service_credentials_secret_prototype_model_dict = ServiceCredentialsSecretPrototype.from_dict(service_credentials_secret_prototype_model_json).__dict__ + service_credentials_secret_prototype_model2 = ServiceCredentialsSecretPrototype(**service_credentials_secret_prototype_model_dict) # Verify the model instances are equivalent assert service_credentials_secret_prototype_model == service_credentials_secret_prototype_model2 @@ -10383,8 +9904,7 @@ def test_service_credentials_secret_version_serialization(self): # Construct a json representation of a ServiceCredentialsSecretVersion model service_credentials_secret_version_model_json = {} service_credentials_secret_version_model_json['auto_rotated'] = True - service_credentials_secret_version_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + service_credentials_secret_version_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' service_credentials_secret_version_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' service_credentials_secret_version_model_json['id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' service_credentials_secret_version_model_json['secret_type'] = 'service_credentials' @@ -10398,15 +9918,12 @@ def test_service_credentials_secret_version_serialization(self): service_credentials_secret_version_model_json['credentials'] = service_credentials_secret_credentials_model # Construct a model instance of ServiceCredentialsSecretVersion by calling from_dict on the json representation - service_credentials_secret_version_model = ServiceCredentialsSecretVersion.from_dict( - service_credentials_secret_version_model_json) + service_credentials_secret_version_model = ServiceCredentialsSecretVersion.from_dict(service_credentials_secret_version_model_json) assert service_credentials_secret_version_model != False # Construct a model instance of ServiceCredentialsSecretVersion by calling from_dict on the json representation - service_credentials_secret_version_model_dict = ServiceCredentialsSecretVersion.from_dict( - service_credentials_secret_version_model_json).__dict__ - service_credentials_secret_version_model2 = ServiceCredentialsSecretVersion( - **service_credentials_secret_version_model_dict) + service_credentials_secret_version_model_dict = ServiceCredentialsSecretVersion.from_dict(service_credentials_secret_version_model_json).__dict__ + service_credentials_secret_version_model2 = ServiceCredentialsSecretVersion(**service_credentials_secret_version_model_dict) # Verify the model instances are equivalent assert service_credentials_secret_version_model == service_credentials_secret_version_model2 @@ -10433,8 +9950,7 @@ def test_service_credentials_secret_version_metadata_serialization(self): # Construct a json representation of a ServiceCredentialsSecretVersionMetadata model service_credentials_secret_version_metadata_model_json = {} service_credentials_secret_version_metadata_model_json['auto_rotated'] = True - service_credentials_secret_version_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + service_credentials_secret_version_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' service_credentials_secret_version_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' service_credentials_secret_version_metadata_model_json['id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' service_credentials_secret_version_metadata_model_json['secret_type'] = 'service_credentials' @@ -10447,15 +9963,12 @@ def test_service_credentials_secret_version_metadata_serialization(self): service_credentials_secret_version_metadata_model_json['resource_key'] = service_credentials_resource_key_model # Construct a model instance of ServiceCredentialsSecretVersionMetadata by calling from_dict on the json representation - service_credentials_secret_version_metadata_model = ServiceCredentialsSecretVersionMetadata.from_dict( - service_credentials_secret_version_metadata_model_json) + service_credentials_secret_version_metadata_model = ServiceCredentialsSecretVersionMetadata.from_dict(service_credentials_secret_version_metadata_model_json) assert service_credentials_secret_version_metadata_model != False # Construct a model instance of ServiceCredentialsSecretVersionMetadata by calling from_dict on the json representation - service_credentials_secret_version_metadata_model_dict = ServiceCredentialsSecretVersionMetadata.from_dict( - service_credentials_secret_version_metadata_model_json).__dict__ - service_credentials_secret_version_metadata_model2 = ServiceCredentialsSecretVersionMetadata( - **service_credentials_secret_version_metadata_model_dict) + service_credentials_secret_version_metadata_model_dict = ServiceCredentialsSecretVersionMetadata.from_dict(service_credentials_secret_version_metadata_model_json).__dict__ + service_credentials_secret_version_metadata_model2 = ServiceCredentialsSecretVersionMetadata(**service_credentials_secret_version_metadata_model_dict) # Verify the model instances are equivalent assert service_credentials_secret_version_metadata_model == service_credentials_secret_version_metadata_model2 @@ -10481,15 +9994,12 @@ def test_service_credentials_secret_version_prototype_serialization(self): service_credentials_secret_version_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of ServiceCredentialsSecretVersionPrototype by calling from_dict on the json representation - service_credentials_secret_version_prototype_model = ServiceCredentialsSecretVersionPrototype.from_dict( - service_credentials_secret_version_prototype_model_json) + service_credentials_secret_version_prototype_model = ServiceCredentialsSecretVersionPrototype.from_dict(service_credentials_secret_version_prototype_model_json) assert service_credentials_secret_version_prototype_model != False # Construct a model instance of ServiceCredentialsSecretVersionPrototype by calling from_dict on the json representation - service_credentials_secret_version_prototype_model_dict = ServiceCredentialsSecretVersionPrototype.from_dict( - service_credentials_secret_version_prototype_model_json).__dict__ - service_credentials_secret_version_prototype_model2 = ServiceCredentialsSecretVersionPrototype( - **service_credentials_secret_version_prototype_model_dict) + service_credentials_secret_version_prototype_model_dict = ServiceCredentialsSecretVersionPrototype.from_dict(service_credentials_secret_version_prototype_model_json).__dict__ + service_credentials_secret_version_prototype_model2 = ServiceCredentialsSecretVersionPrototype(**service_credentials_secret_version_prototype_model_dict) # Verify the model instances are equivalent assert service_credentials_secret_version_prototype_model == service_credentials_secret_version_prototype_model2 @@ -10546,8 +10056,7 @@ def test_username_password_secret_serialization(self): assert username_password_secret_model != False # Construct a model instance of UsernamePasswordSecret by calling from_dict on the json representation - username_password_secret_model_dict = UsernamePasswordSecret.from_dict( - username_password_secret_model_json).__dict__ + username_password_secret_model_dict = UsernamePasswordSecret.from_dict(username_password_secret_model_json).__dict__ username_password_secret_model2 = UsernamePasswordSecret(**username_password_secret_model_dict) # Verify the model instances are equivalent @@ -10583,8 +10092,7 @@ def test_username_password_secret_metadata_serialization(self): # Construct a json representation of a UsernamePasswordSecretMetadata model username_password_secret_metadata_model_json = {} - username_password_secret_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + username_password_secret_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' username_password_secret_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' username_password_secret_metadata_model_json['crn'] = 'testString' username_password_secret_metadata_model_json['custom_metadata'] = {'key': 'value'} @@ -10600,15 +10108,12 @@ def test_username_password_secret_metadata_serialization(self): username_password_secret_metadata_model_json['password_generation_policy'] = password_generation_policy_ro_model # Construct a model instance of UsernamePasswordSecretMetadata by calling from_dict on the json representation - username_password_secret_metadata_model = UsernamePasswordSecretMetadata.from_dict( - username_password_secret_metadata_model_json) + username_password_secret_metadata_model = UsernamePasswordSecretMetadata.from_dict(username_password_secret_metadata_model_json) assert username_password_secret_metadata_model != False # Construct a model instance of UsernamePasswordSecretMetadata by calling from_dict on the json representation - username_password_secret_metadata_model_dict = UsernamePasswordSecretMetadata.from_dict( - username_password_secret_metadata_model_json).__dict__ - username_password_secret_metadata_model2 = UsernamePasswordSecretMetadata( - **username_password_secret_metadata_model_dict) + username_password_secret_metadata_model_dict = UsernamePasswordSecretMetadata.from_dict(username_password_secret_metadata_model_json).__dict__ + username_password_secret_metadata_model2 = UsernamePasswordSecretMetadata(**username_password_secret_metadata_model_dict) # Verify the model instances are equivalent assert username_password_secret_metadata_model == username_password_secret_metadata_model2 @@ -10649,19 +10154,15 @@ def test_username_password_secret_metadata_patch_serialization(self): username_password_secret_metadata_patch_model_json['custom_metadata'] = {'key': 'value'} username_password_secret_metadata_patch_model_json['rotation'] = rotation_policy_model username_password_secret_metadata_patch_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' - username_password_secret_metadata_patch_model_json[ - 'password_generation_policy'] = password_generation_policy_patch_model + username_password_secret_metadata_patch_model_json['password_generation_policy'] = password_generation_policy_patch_model # Construct a model instance of UsernamePasswordSecretMetadataPatch by calling from_dict on the json representation - username_password_secret_metadata_patch_model = UsernamePasswordSecretMetadataPatch.from_dict( - username_password_secret_metadata_patch_model_json) + username_password_secret_metadata_patch_model = UsernamePasswordSecretMetadataPatch.from_dict(username_password_secret_metadata_patch_model_json) assert username_password_secret_metadata_patch_model != False # Construct a model instance of UsernamePasswordSecretMetadataPatch by calling from_dict on the json representation - username_password_secret_metadata_patch_model_dict = UsernamePasswordSecretMetadataPatch.from_dict( - username_password_secret_metadata_patch_model_json).__dict__ - username_password_secret_metadata_patch_model2 = UsernamePasswordSecretMetadataPatch( - **username_password_secret_metadata_patch_model_dict) + username_password_secret_metadata_patch_model_dict = UsernamePasswordSecretMetadataPatch.from_dict(username_password_secret_metadata_patch_model_json).__dict__ + username_password_secret_metadata_patch_model2 = UsernamePasswordSecretMetadataPatch(**username_password_secret_metadata_patch_model_dict) # Verify the model instances are equivalent assert username_password_secret_metadata_patch_model == username_password_secret_metadata_patch_model2 @@ -10710,15 +10211,12 @@ def test_username_password_secret_prototype_serialization(self): username_password_secret_prototype_model_json['password_generation_policy'] = password_generation_policy_model # Construct a model instance of UsernamePasswordSecretPrototype by calling from_dict on the json representation - username_password_secret_prototype_model = UsernamePasswordSecretPrototype.from_dict( - username_password_secret_prototype_model_json) + username_password_secret_prototype_model = UsernamePasswordSecretPrototype.from_dict(username_password_secret_prototype_model_json) assert username_password_secret_prototype_model != False # Construct a model instance of UsernamePasswordSecretPrototype by calling from_dict on the json representation - username_password_secret_prototype_model_dict = UsernamePasswordSecretPrototype.from_dict( - username_password_secret_prototype_model_json).__dict__ - username_password_secret_prototype_model2 = UsernamePasswordSecretPrototype( - **username_password_secret_prototype_model_dict) + username_password_secret_prototype_model_dict = UsernamePasswordSecretPrototype.from_dict(username_password_secret_prototype_model_json).__dict__ + username_password_secret_prototype_model2 = UsernamePasswordSecretPrototype(**username_password_secret_prototype_model_dict) # Verify the model instances are equivalent assert username_password_secret_prototype_model == username_password_secret_prototype_model2 @@ -10755,15 +10253,12 @@ def test_username_password_secret_version_serialization(self): username_password_secret_version_model_json['password'] = 'testString' # Construct a model instance of UsernamePasswordSecretVersion by calling from_dict on the json representation - username_password_secret_version_model = UsernamePasswordSecretVersion.from_dict( - username_password_secret_version_model_json) + username_password_secret_version_model = UsernamePasswordSecretVersion.from_dict(username_password_secret_version_model_json) assert username_password_secret_version_model != False # Construct a model instance of UsernamePasswordSecretVersion by calling from_dict on the json representation - username_password_secret_version_model_dict = UsernamePasswordSecretVersion.from_dict( - username_password_secret_version_model_json).__dict__ - username_password_secret_version_model2 = UsernamePasswordSecretVersion( - **username_password_secret_version_model_dict) + username_password_secret_version_model_dict = UsernamePasswordSecretVersion.from_dict(username_password_secret_version_model_json).__dict__ + username_password_secret_version_model2 = UsernamePasswordSecretVersion(**username_password_secret_version_model_dict) # Verify the model instances are equivalent assert username_password_secret_version_model == username_password_secret_version_model2 @@ -10786,8 +10281,7 @@ def test_username_password_secret_version_metadata_serialization(self): # Construct a json representation of a UsernamePasswordSecretVersionMetadata model username_password_secret_version_metadata_model_json = {} username_password_secret_version_metadata_model_json['auto_rotated'] = True - username_password_secret_version_metadata_model_json[ - 'created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' + username_password_secret_version_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' username_password_secret_version_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' username_password_secret_version_metadata_model_json['id'] = 'b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5' username_password_secret_version_metadata_model_json['secret_type'] = 'username_password' @@ -10799,15 +10293,12 @@ def test_username_password_secret_version_metadata_serialization(self): username_password_secret_version_metadata_model_json['expiration_date'] = '2033-04-12T23:20:50.520000Z' # Construct a model instance of UsernamePasswordSecretVersionMetadata by calling from_dict on the json representation - username_password_secret_version_metadata_model = UsernamePasswordSecretVersionMetadata.from_dict( - username_password_secret_version_metadata_model_json) + username_password_secret_version_metadata_model = UsernamePasswordSecretVersionMetadata.from_dict(username_password_secret_version_metadata_model_json) assert username_password_secret_version_metadata_model != False # Construct a model instance of UsernamePasswordSecretVersionMetadata by calling from_dict on the json representation - username_password_secret_version_metadata_model_dict = UsernamePasswordSecretVersionMetadata.from_dict( - username_password_secret_version_metadata_model_json).__dict__ - username_password_secret_version_metadata_model2 = UsernamePasswordSecretVersionMetadata( - **username_password_secret_version_metadata_model_dict) + username_password_secret_version_metadata_model_dict = UsernamePasswordSecretVersionMetadata.from_dict(username_password_secret_version_metadata_model_json).__dict__ + username_password_secret_version_metadata_model2 = UsernamePasswordSecretVersionMetadata(**username_password_secret_version_metadata_model_dict) # Verify the model instances are equivalent assert username_password_secret_version_metadata_model == username_password_secret_version_metadata_model2 @@ -10834,15 +10325,12 @@ def test_username_password_secret_version_prototype_serialization(self): username_password_secret_version_prototype_model_json['version_custom_metadata'] = {'key': 'value'} # Construct a model instance of UsernamePasswordSecretVersionPrototype by calling from_dict on the json representation - username_password_secret_version_prototype_model = UsernamePasswordSecretVersionPrototype.from_dict( - username_password_secret_version_prototype_model_json) + username_password_secret_version_prototype_model = UsernamePasswordSecretVersionPrototype.from_dict(username_password_secret_version_prototype_model_json) assert username_password_secret_version_prototype_model != False # Construct a model instance of UsernamePasswordSecretVersionPrototype by calling from_dict on the json representation - username_password_secret_version_prototype_model_dict = UsernamePasswordSecretVersionPrototype.from_dict( - username_password_secret_version_prototype_model_json).__dict__ - username_password_secret_version_prototype_model2 = UsernamePasswordSecretVersionPrototype( - **username_password_secret_version_prototype_model_dict) + username_password_secret_version_prototype_model_dict = UsernamePasswordSecretVersionPrototype.from_dict(username_password_secret_version_prototype_model_json).__dict__ + username_password_secret_version_prototype_model2 = UsernamePasswordSecretVersionPrototype(**username_password_secret_version_prototype_model_dict) # Verify the model instances are equivalent assert username_password_secret_version_prototype_model == username_password_secret_version_prototype_model2 @@ -10851,6 +10339,7 @@ def test_username_password_secret_version_prototype_serialization(self): username_password_secret_version_prototype_model_json2 = username_password_secret_version_prototype_model.to_dict() assert username_password_secret_version_prototype_model_json2 == username_password_secret_version_prototype_model_json + # endregion ############################################################################## # End of Model Tests