catocli 2.0.5__py3-none-any.whl → 2.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of catocli might be problematic. Click here for more details.

Files changed (365) hide show
  1. catocli/Utils/clidriver.py +32 -4
  2. catocli/Utils/version_checker.py +1 -1
  3. catocli/__init__.py +1 -1
  4. catocli/parsers/custom/export_sites/export_sites.py +18 -1
  5. catocli/parsers/custom/import_rules_to_tf/import_rules_to_tf.py +13 -2
  6. catocli/parsers/custom/import_sites_to_tf/__init__.py +3 -1
  7. catocli/parsers/custom/import_sites_to_tf/import_sites_to_tf.py +79 -6
  8. catocli/parsers/custom_private/__init__.py +134 -0
  9. catocli/parsers/mutation_accountManagement/__init__.py +13 -0
  10. catocli/parsers/mutation_accountManagement_disableAccount/README.md +16 -0
  11. catocli/parsers/mutation_groups/README.md +7 -0
  12. catocli/parsers/mutation_groups/__init__.py +48 -0
  13. catocli/parsers/mutation_groups_createGroup/README.md +18 -0
  14. catocli/parsers/mutation_groups_deleteGroup/README.md +18 -0
  15. catocli/parsers/mutation_groups_updateGroup/README.md +18 -0
  16. catocli/parsers/mutation_site/__init__.py +104 -0
  17. catocli/parsers/mutation_site_assignSiteBwLicense/README.md +17 -0
  18. catocli/parsers/mutation_site_removeSecondaryAwsVSocket/README.md +17 -0
  19. catocli/parsers/mutation_site_removeSecondaryAzureVSocket/README.md +17 -0
  20. catocli/parsers/mutation_site_removeSiteBwLicense/README.md +17 -0
  21. catocli/parsers/mutation_site_replaceSiteBwLicense/README.md +17 -0
  22. catocli/parsers/mutation_site_updateSecondaryAwsVSocket/README.md +17 -0
  23. catocli/parsers/mutation_site_updateSecondaryAzureVSocket/README.md +17 -0
  24. catocli/parsers/mutation_site_updateSiteBwLicense/README.md +17 -0
  25. catocli/parsers/mutation_site_updateSiteGeneralDetails/README.md +1 -1
  26. catocli/parsers/mutation_sites/__init__.py +104 -0
  27. catocli/parsers/mutation_sites_assignSiteBwLicense/README.md +17 -0
  28. catocli/parsers/mutation_sites_removeSecondaryAwsVSocket/README.md +17 -0
  29. catocli/parsers/mutation_sites_removeSecondaryAzureVSocket/README.md +17 -0
  30. catocli/parsers/mutation_sites_removeSiteBwLicense/README.md +17 -0
  31. catocli/parsers/mutation_sites_replaceSiteBwLicense/README.md +17 -0
  32. catocli/parsers/mutation_sites_updateSecondaryAwsVSocket/README.md +17 -0
  33. catocli/parsers/mutation_sites_updateSecondaryAzureVSocket/README.md +17 -0
  34. catocli/parsers/mutation_sites_updateSiteBwLicense/README.md +17 -0
  35. catocli/parsers/mutation_sites_updateSiteGeneralDetails/README.md +1 -1
  36. catocli/parsers/parserApiClient.py +444 -9
  37. catocli/parsers/query_eventsFeed/README.md +1 -1
  38. catocli/parsers/query_groups/README.md +7 -0
  39. catocli/parsers/query_groups/__init__.py +54 -0
  40. catocli/parsers/query_groups_group/README.md +7 -0
  41. catocli/parsers/query_groups_groupList/README.md +18 -0
  42. catocli/parsers/query_groups_group_members/README.md +18 -0
  43. catocli/parsers/query_groups_whereUsed/README.md +17 -0
  44. catocli/parsers/query_popLocations/README.md +17 -0
  45. catocli/parsers/query_popLocations/__init__.py +16 -0
  46. catocli/parsers/query_site/__init__.py +26 -0
  47. catocli/parsers/query_site_secondaryAwsVSocket/README.md +17 -0
  48. catocli/parsers/query_site_secondaryAzureVSocket/README.md +17 -0
  49. catocli/parsers/query_socketPortMetrics/README.md +23 -0
  50. catocli/parsers/query_socketPortMetrics/__init__.py +16 -0
  51. catocli/parsers/query_socketPortMetricsTimeSeries/README.md +24 -0
  52. catocli/parsers/query_socketPortMetricsTimeSeries/__init__.py +16 -0
  53. {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/METADATA +3 -2
  54. {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/RECORD +253 -300
  55. {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/WHEEL +1 -1
  56. {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/top_level.txt +0 -2
  57. graphql_client/api/call_api.py +20 -2
  58. models/mutation.accountManagement.addAccount.json +97 -0
  59. models/mutation.accountManagement.disableAccount.json +545 -0
  60. models/mutation.accountManagement.removeAccount.json +102 -3
  61. models/mutation.accountManagement.updateAccount.json +97 -0
  62. models/mutation.admin.addAdmin.json +6 -9
  63. models/mutation.container.delete.json +2 -2
  64. models/mutation.container.fqdn.addValues.json +3 -3
  65. models/mutation.container.fqdn.createFromFile.json +3 -3
  66. models/mutation.container.fqdn.removeValues.json +3 -3
  67. models/mutation.container.fqdn.updateFromFile.json +3 -3
  68. models/mutation.container.ipAddressRange.addValues.json +3 -3
  69. models/mutation.container.ipAddressRange.createFromFile.json +3 -3
  70. models/mutation.container.ipAddressRange.removeValues.json +3 -3
  71. models/mutation.container.ipAddressRange.updateFromFile.json +3 -3
  72. models/mutation.groups.createGroup.json +3178 -0
  73. models/mutation.groups.deleteGroup.json +2758 -0
  74. models/mutation.groups.updateGroup.json +4429 -0
  75. models/mutation.hardware.updateHardwareShipping.json +30 -10
  76. models/mutation.policy.appTenantRestriction.addRule.json +33 -33
  77. models/mutation.policy.appTenantRestriction.addSection.json +4 -4
  78. models/mutation.policy.appTenantRestriction.createPolicyRevision.json +33 -33
  79. models/mutation.policy.appTenantRestriction.discardPolicyRevision.json +33 -33
  80. models/mutation.policy.appTenantRestriction.moveRule.json +27 -27
  81. models/mutation.policy.appTenantRestriction.moveSection.json +4 -4
  82. models/mutation.policy.appTenantRestriction.publishPolicyRevision.json +33 -33
  83. models/mutation.policy.appTenantRestriction.removeRule.json +27 -27
  84. models/mutation.policy.appTenantRestriction.removeSection.json +4 -4
  85. models/mutation.policy.appTenantRestriction.updatePolicy.json +33 -33
  86. models/mutation.policy.appTenantRestriction.updateRule.json +33 -33
  87. models/mutation.policy.appTenantRestriction.updateSection.json +4 -4
  88. models/mutation.policy.dynamicIpAllocation.addRule.json +12 -12
  89. models/mutation.policy.dynamicIpAllocation.addSection.json +4 -4
  90. models/mutation.policy.dynamicIpAllocation.createPolicyRevision.json +18 -18
  91. models/mutation.policy.dynamicIpAllocation.discardPolicyRevision.json +18 -18
  92. models/mutation.policy.dynamicIpAllocation.moveRule.json +12 -12
  93. models/mutation.policy.dynamicIpAllocation.moveSection.json +4 -4
  94. models/mutation.policy.dynamicIpAllocation.publishPolicyRevision.json +18 -18
  95. models/mutation.policy.dynamicIpAllocation.removeRule.json +12 -12
  96. models/mutation.policy.dynamicIpAllocation.removeSection.json +4 -4
  97. models/mutation.policy.dynamicIpAllocation.updatePolicy.json +18 -18
  98. models/mutation.policy.dynamicIpAllocation.updateRule.json +12 -12
  99. models/mutation.policy.dynamicIpAllocation.updateSection.json +4 -4
  100. models/mutation.policy.internetFirewall.addRule.json +141 -141
  101. models/mutation.policy.internetFirewall.addSection.json +4 -4
  102. models/mutation.policy.internetFirewall.createPolicyRevision.json +102 -102
  103. models/mutation.policy.internetFirewall.discardPolicyRevision.json +102 -102
  104. models/mutation.policy.internetFirewall.moveRule.json +96 -96
  105. models/mutation.policy.internetFirewall.moveSection.json +4 -4
  106. models/mutation.policy.internetFirewall.publishPolicyRevision.json +102 -102
  107. models/mutation.policy.internetFirewall.removeRule.json +96 -96
  108. models/mutation.policy.internetFirewall.removeSection.json +4 -4
  109. models/mutation.policy.internetFirewall.updatePolicy.json +102 -102
  110. models/mutation.policy.internetFirewall.updateRule.json +141 -141
  111. models/mutation.policy.internetFirewall.updateSection.json +4 -4
  112. models/mutation.policy.remotePortFwd.addRule.json +21 -21
  113. models/mutation.policy.remotePortFwd.addSection.json +4 -4
  114. models/mutation.policy.remotePortFwd.createPolicyRevision.json +24 -24
  115. models/mutation.policy.remotePortFwd.discardPolicyRevision.json +24 -24
  116. models/mutation.policy.remotePortFwd.moveRule.json +18 -18
  117. models/mutation.policy.remotePortFwd.moveSection.json +4 -4
  118. models/mutation.policy.remotePortFwd.publishPolicyRevision.json +24 -24
  119. models/mutation.policy.remotePortFwd.removeRule.json +18 -18
  120. models/mutation.policy.remotePortFwd.removeSection.json +4 -4
  121. models/mutation.policy.remotePortFwd.updatePolicy.json +24 -24
  122. models/mutation.policy.remotePortFwd.updateRule.json +21 -21
  123. models/mutation.policy.remotePortFwd.updateSection.json +4 -4
  124. models/mutation.policy.socketLan.addRule.json +97 -97
  125. models/mutation.policy.socketLan.addSection.json +4 -4
  126. models/mutation.policy.socketLan.createPolicyRevision.json +91 -91
  127. models/mutation.policy.socketLan.discardPolicyRevision.json +91 -91
  128. models/mutation.policy.socketLan.moveRule.json +85 -85
  129. models/mutation.policy.socketLan.moveSection.json +4 -4
  130. models/mutation.policy.socketLan.publishPolicyRevision.json +91 -91
  131. models/mutation.policy.socketLan.removeRule.json +85 -85
  132. models/mutation.policy.socketLan.removeSection.json +4 -4
  133. models/mutation.policy.socketLan.updatePolicy.json +91 -91
  134. models/mutation.policy.socketLan.updateRule.json +97 -97
  135. models/mutation.policy.socketLan.updateSection.json +4 -4
  136. models/mutation.policy.terminalServer.addRule.json +7 -7
  137. models/mutation.policy.terminalServer.addSection.json +4 -4
  138. models/mutation.policy.terminalServer.createPolicyRevision.json +13 -13
  139. models/mutation.policy.terminalServer.discardPolicyRevision.json +13 -13
  140. models/mutation.policy.terminalServer.moveRule.json +7 -7
  141. models/mutation.policy.terminalServer.moveSection.json +4 -4
  142. models/mutation.policy.terminalServer.publishPolicyRevision.json +13 -13
  143. models/mutation.policy.terminalServer.removeRule.json +7 -7
  144. models/mutation.policy.terminalServer.removeSection.json +4 -4
  145. models/mutation.policy.terminalServer.updatePolicy.json +13 -13
  146. models/mutation.policy.terminalServer.updateRule.json +7 -7
  147. models/mutation.policy.terminalServer.updateSection.json +4 -4
  148. models/mutation.policy.wanFirewall.addRule.json +157 -157
  149. models/mutation.policy.wanFirewall.addSection.json +4 -4
  150. models/mutation.policy.wanFirewall.createPolicyRevision.json +121 -121
  151. models/mutation.policy.wanFirewall.discardPolicyRevision.json +121 -121
  152. models/mutation.policy.wanFirewall.moveRule.json +115 -115
  153. models/mutation.policy.wanFirewall.moveSection.json +4 -4
  154. models/mutation.policy.wanFirewall.publishPolicyRevision.json +121 -121
  155. models/mutation.policy.wanFirewall.removeRule.json +115 -115
  156. models/mutation.policy.wanFirewall.removeSection.json +4 -4
  157. models/mutation.policy.wanFirewall.updatePolicy.json +121 -121
  158. models/mutation.policy.wanFirewall.updateRule.json +157 -157
  159. models/mutation.policy.wanFirewall.updateSection.json +4 -4
  160. models/mutation.policy.wanNetwork.addRule.json +103 -103
  161. models/mutation.policy.wanNetwork.addSection.json +4 -4
  162. models/mutation.policy.wanNetwork.createPolicyRevision.json +97 -97
  163. models/mutation.policy.wanNetwork.discardPolicyRevision.json +97 -97
  164. models/mutation.policy.wanNetwork.moveRule.json +91 -91
  165. models/mutation.policy.wanNetwork.moveSection.json +4 -4
  166. models/mutation.policy.wanNetwork.publishPolicyRevision.json +97 -97
  167. models/mutation.policy.wanNetwork.removeRule.json +91 -91
  168. models/mutation.policy.wanNetwork.removeSection.json +4 -4
  169. models/mutation.policy.wanNetwork.updatePolicy.json +97 -97
  170. models/mutation.policy.wanNetwork.updateRule.json +103 -103
  171. models/mutation.policy.wanNetwork.updateSection.json +4 -4
  172. models/mutation.site.addBgpPeer.json +10 -10
  173. models/mutation.site.addIpsecIkeV2SiteTunnels.json +2 -2
  174. models/mutation.site.addSocketAddOnCard.json +2 -2
  175. models/mutation.site.assignSiteBwLicense.json +12879 -0
  176. models/mutation.site.removeBgpPeer.json +10 -10
  177. models/mutation.site.removeIpsecIkeV2SiteTunnels.json +2 -2
  178. models/mutation.site.removeSecondaryAwsVSocket.json +375 -0
  179. models/mutation.site.removeSecondaryAzureVSocket.json +354 -0
  180. models/mutation.site.removeSiteBwLicense.json +12822 -0
  181. models/mutation.site.removeSocketAddOnCard.json +2 -2
  182. models/mutation.site.replaceSiteBwLicense.json +12939 -0
  183. models/mutation.site.startSiteUpgrade.json +36 -15
  184. models/mutation.site.updateBgpPeer.json +10 -10
  185. models/mutation.site.updateIpsecIkeV2SiteTunnels.json +2 -2
  186. models/mutation.site.updateSecondaryAwsVSocket.json +643 -0
  187. models/mutation.site.updateSecondaryAzureVSocket.json +565 -0
  188. models/mutation.site.updateSiteBwLicense.json +12882 -0
  189. models/mutation.site.updateSiteGeneralDetails.json +724 -1
  190. models/mutation.sites.addBgpPeer.json +10 -10
  191. models/mutation.sites.addIpsecIkeV2SiteTunnels.json +2 -2
  192. models/mutation.sites.addSocketAddOnCard.json +2 -2
  193. models/mutation.sites.assignSiteBwLicense.json +12879 -0
  194. models/mutation.sites.removeBgpPeer.json +10 -10
  195. models/mutation.sites.removeIpsecIkeV2SiteTunnels.json +2 -2
  196. models/mutation.sites.removeSecondaryAwsVSocket.json +375 -0
  197. models/mutation.sites.removeSecondaryAzureVSocket.json +354 -0
  198. models/mutation.sites.removeSiteBwLicense.json +12822 -0
  199. models/mutation.sites.removeSocketAddOnCard.json +2 -2
  200. models/mutation.sites.replaceSiteBwLicense.json +12939 -0
  201. models/mutation.sites.startSiteUpgrade.json +36 -15
  202. models/mutation.sites.updateBgpPeer.json +10 -10
  203. models/mutation.sites.updateIpsecIkeV2SiteTunnels.json +2 -2
  204. models/mutation.sites.updateSecondaryAwsVSocket.json +643 -0
  205. models/mutation.sites.updateSecondaryAzureVSocket.json +565 -0
  206. models/mutation.sites.updateSiteBwLicense.json +12882 -0
  207. models/mutation.sites.updateSiteGeneralDetails.json +724 -1
  208. models/mutation.xdr.addStoryComment.json +1 -1
  209. models/mutation.xdr.analystFeedback.json +84 -84
  210. models/mutation.xdr.deleteStoryComment.json +1 -1
  211. models/query.accountManagement.json +97 -0
  212. models/query.accountMetrics.json +45 -45
  213. models/query.accountSnapshot.json +30 -30
  214. models/query.admin.json +6 -6
  215. models/query.admins.json +13 -13
  216. models/query.appStats.json +915 -867
  217. models/query.appStatsTimeSeries.json +692 -656
  218. models/query.auditFeed.json +6 -6
  219. models/query.catalogs.json +52 -52
  220. models/query.container.json +16 -16
  221. models/query.devices.json +20 -93
  222. models/query.entityLookup.json +2 -2
  223. models/query.events.json +288 -384
  224. models/query.eventsFeed.json +73 -97
  225. models/query.eventsTimeSeries.json +219 -291
  226. models/query.groups.group.members.json +3058 -0
  227. models/query.groups.groupList.json +6474 -0
  228. models/query.groups.whereUsed.json +697 -0
  229. models/query.hardware.json +27 -7
  230. models/query.hardwareManagement.json +8 -8
  231. models/query.licensing.json +3487 -1324
  232. models/query.policy.appTenantRestriction.policy.json +32 -32
  233. models/query.policy.dynamicIpAllocation.policy.json +18 -18
  234. models/query.policy.internetFirewall.policy.json +93 -93
  235. models/query.policy.remotePortFwd.policy.json +23 -23
  236. models/query.policy.socketLan.policy.json +88 -88
  237. models/query.policy.terminalServer.policy.json +13 -13
  238. models/query.policy.wanFirewall.policy.json +111 -111
  239. models/query.policy.wanNetwork.policy.json +97 -97
  240. models/query.popLocations.json +2878 -0
  241. models/query.sandbox.json +5 -5
  242. models/query.site.bgpPeer.json +4 -4
  243. models/query.site.bgpPeerList.json +10 -10
  244. models/query.site.secondaryAwsVSocket.json +340 -0
  245. models/query.site.secondaryAzureVSocket.json +319 -0
  246. models/query.site.siteBgpStatus.json +2 -2
  247. models/query.socketPortMetrics.json +2410 -0
  248. models/query.socketPortMetricsTimeSeries.json +2361 -0
  249. models/query.xdr.stories.json +104 -104
  250. models/query.xdr.story.json +93 -93
  251. schema/catolib.py +43 -16
  252. build/lib/catocli/Utils/clidriver.py +0 -268
  253. build/lib/catocli/Utils/profile_manager.py +0 -188
  254. build/lib/catocli/Utils/version_checker.py +0 -192
  255. build/lib/catocli/__init__.py +0 -2
  256. build/lib/catocli/__main__.py +0 -12
  257. build/lib/catocli/parsers/configure/__init__.py +0 -115
  258. build/lib/catocli/parsers/configure/configure.py +0 -307
  259. build/lib/catocli/parsers/custom/__init__.py +0 -57
  260. build/lib/catocli/parsers/custom/customLib.py +0 -561
  261. build/lib/catocli/parsers/custom/export_rules/__init__.py +0 -42
  262. build/lib/catocli/parsers/custom/export_rules/export_rules.py +0 -234
  263. build/lib/catocli/parsers/custom/export_sites/__init__.py +0 -21
  264. build/lib/catocli/parsers/custom/export_sites/export_sites.py +0 -372
  265. build/lib/catocli/parsers/custom/import_rules_to_tf/__init__.py +0 -58
  266. build/lib/catocli/parsers/custom/import_rules_to_tf/import_rules_to_tf.py +0 -451
  267. build/lib/catocli/parsers/custom/import_sites_to_tf/__init__.py +0 -45
  268. build/lib/catocli/parsers/custom/import_sites_to_tf/import_sites_to_tf.py +0 -891
  269. build/lib/catocli/parsers/mutation_accountManagement/__init__.py +0 -48
  270. build/lib/catocli/parsers/mutation_admin/__init__.py +0 -48
  271. build/lib/catocli/parsers/mutation_container/__init__.py +0 -138
  272. build/lib/catocli/parsers/mutation_hardware/__init__.py +0 -22
  273. build/lib/catocli/parsers/mutation_policy/__init__.py +0 -1305
  274. build/lib/catocli/parsers/mutation_sandbox/__init__.py +0 -35
  275. build/lib/catocli/parsers/mutation_site/__init__.py +0 -373
  276. build/lib/catocli/parsers/mutation_sites/__init__.py +0 -373
  277. build/lib/catocli/parsers/mutation_xdr/__init__.py +0 -48
  278. build/lib/catocli/parsers/parserApiClient.py +0 -513
  279. build/lib/catocli/parsers/query_accountBySubdomain/__init__.py +0 -16
  280. build/lib/catocli/parsers/query_accountManagement/__init__.py +0 -16
  281. build/lib/catocli/parsers/query_accountMetrics/__init__.py +0 -16
  282. build/lib/catocli/parsers/query_accountRoles/__init__.py +0 -16
  283. build/lib/catocli/parsers/query_accountSnapshot/__init__.py +0 -16
  284. build/lib/catocli/parsers/query_admin/__init__.py +0 -16
  285. build/lib/catocli/parsers/query_admins/__init__.py +0 -16
  286. build/lib/catocli/parsers/query_appStats/__init__.py +0 -16
  287. build/lib/catocli/parsers/query_appStatsTimeSeries/__init__.py +0 -16
  288. build/lib/catocli/parsers/query_auditFeed/__init__.py +0 -16
  289. build/lib/catocli/parsers/query_catalogs/__init__.py +0 -16
  290. build/lib/catocli/parsers/query_container/__init__.py +0 -16
  291. build/lib/catocli/parsers/query_devices/__init__.py +0 -16
  292. build/lib/catocli/parsers/query_entityLookup/__init__.py +0 -16
  293. build/lib/catocli/parsers/query_events/__init__.py +0 -16
  294. build/lib/catocli/parsers/query_eventsFeed/__init__.py +0 -16
  295. build/lib/catocli/parsers/query_eventsTimeSeries/__init__.py +0 -16
  296. build/lib/catocli/parsers/query_hardware/__init__.py +0 -16
  297. build/lib/catocli/parsers/query_hardwareManagement/__init__.py +0 -16
  298. build/lib/catocli/parsers/query_licensing/__init__.py +0 -16
  299. build/lib/catocli/parsers/query_policy/__init__.py +0 -161
  300. build/lib/catocli/parsers/query_sandbox/__init__.py +0 -16
  301. build/lib/catocli/parsers/query_site/__init__.py +0 -100
  302. build/lib/catocli/parsers/query_siteLocation/__init__.py +0 -13
  303. build/lib/catocli/parsers/query_subDomains/__init__.py +0 -16
  304. build/lib/catocli/parsers/query_xdr/__init__.py +0 -35
  305. build/lib/catocli/parsers/raw/__init__.py +0 -12
  306. build/lib/graphql_client/__init__.py +0 -11
  307. build/lib/graphql_client/api/__init__.py +0 -3
  308. build/lib/graphql_client/api/call_api.py +0 -84
  309. build/lib/graphql_client/api_client.py +0 -192
  310. build/lib/graphql_client/api_client_types.py +0 -409
  311. build/lib/graphql_client/configuration.py +0 -232
  312. build/lib/graphql_client/models/__init__.py +0 -13
  313. build/lib/graphql_client/models/no_schema.py +0 -71
  314. build/lib/schema/catolib.py +0 -1141
  315. build/lib/schema/importSchema.py +0 -60
  316. build/lib/schema/remove_policyid.py +0 -89
  317. build/lib/schema/remove_policyid_mutations.py +0 -89
  318. build/lib/scripts/catolib.py +0 -62
  319. build/lib/scripts/export_if_rules_to_json.py +0 -188
  320. build/lib/scripts/export_wf_rules_to_json.py +0 -111
  321. build/lib/scripts/import_wf_rules_to_tfstate.py +0 -331
  322. build/lib/vendor/certifi/__init__.py +0 -4
  323. build/lib/vendor/certifi/__main__.py +0 -12
  324. build/lib/vendor/certifi/core.py +0 -114
  325. build/lib/vendor/certifi/py.typed +0 -0
  326. build/lib/vendor/six.py +0 -998
  327. build/lib/vendor/urllib3/__init__.py +0 -211
  328. build/lib/vendor/urllib3/_base_connection.py +0 -172
  329. build/lib/vendor/urllib3/_collections.py +0 -483
  330. build/lib/vendor/urllib3/_request_methods.py +0 -278
  331. build/lib/vendor/urllib3/_version.py +0 -16
  332. build/lib/vendor/urllib3/connection.py +0 -1033
  333. build/lib/vendor/urllib3/connectionpool.py +0 -1182
  334. build/lib/vendor/urllib3/contrib/__init__.py +0 -0
  335. build/lib/vendor/urllib3/contrib/emscripten/__init__.py +0 -18
  336. build/lib/vendor/urllib3/contrib/emscripten/connection.py +0 -254
  337. build/lib/vendor/urllib3/contrib/emscripten/fetch.py +0 -418
  338. build/lib/vendor/urllib3/contrib/emscripten/request.py +0 -22
  339. build/lib/vendor/urllib3/contrib/emscripten/response.py +0 -285
  340. build/lib/vendor/urllib3/contrib/pyopenssl.py +0 -552
  341. build/lib/vendor/urllib3/contrib/socks.py +0 -228
  342. build/lib/vendor/urllib3/exceptions.py +0 -321
  343. build/lib/vendor/urllib3/fields.py +0 -341
  344. build/lib/vendor/urllib3/filepost.py +0 -89
  345. build/lib/vendor/urllib3/http2/__init__.py +0 -53
  346. build/lib/vendor/urllib3/http2/connection.py +0 -356
  347. build/lib/vendor/urllib3/http2/probe.py +0 -87
  348. build/lib/vendor/urllib3/poolmanager.py +0 -637
  349. build/lib/vendor/urllib3/py.typed +0 -2
  350. build/lib/vendor/urllib3/response.py +0 -1265
  351. build/lib/vendor/urllib3/util/__init__.py +0 -42
  352. build/lib/vendor/urllib3/util/connection.py +0 -137
  353. build/lib/vendor/urllib3/util/proxy.py +0 -43
  354. build/lib/vendor/urllib3/util/request.py +0 -256
  355. build/lib/vendor/urllib3/util/response.py +0 -101
  356. build/lib/vendor/urllib3/util/retry.py +0 -533
  357. build/lib/vendor/urllib3/util/ssl_.py +0 -513
  358. build/lib/vendor/urllib3/util/ssl_match_hostname.py +0 -159
  359. build/lib/vendor/urllib3/util/ssltransport.py +0 -276
  360. build/lib/vendor/urllib3/util/timeout.py +0 -275
  361. build/lib/vendor/urllib3/util/url.py +0 -471
  362. build/lib/vendor/urllib3/util/util.py +0 -42
  363. build/lib/vendor/urllib3/util/wait.py +0 -124
  364. {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/entry_points.txt +0 -0
  365. {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info/licenses}/LICENSE +0 -0
@@ -369,7 +369,7 @@
369
369
  },
370
370
  "country": {
371
371
  "defaultValue": null,
372
- "description": "Source country traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
372
+ "description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
373
373
  "id_str": "updateRule___input___rule___country",
374
374
  "name": "country",
375
375
  "path": "updateRule.input.rule.country",
@@ -481,7 +481,7 @@
481
481
  },
482
482
  "destination": {
483
483
  "defaultValue": null,
484
- "description": "Destination traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
484
+ "description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
485
485
  "id_str": "updateRule___input___rule___destination",
486
486
  "name": "destination",
487
487
  "path": "updateRule.input.rule.destination",
@@ -714,7 +714,7 @@
714
714
  "inputFields": {
715
715
  "by": {
716
716
  "defaultValue": "ID",
717
- "description": "Defines the object identification method by ID (default) or by name",
717
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
718
718
  "id_str": "updateRule___input___rule___destination___containers___fqdnContainer___by",
719
719
  "name": "by",
720
720
  "path": "updateRule.input.rule.destination.containers.fqdnContainer.by",
@@ -808,7 +808,7 @@
808
808
  "inputFields": {
809
809
  "by": {
810
810
  "defaultValue": "ID",
811
- "description": "Defines the object identification method by ID (default) or by name",
811
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
812
812
  "id_str": "updateRule___input___rule___destination___containers___ipAddressRangeContainer___by",
813
813
  "name": "by",
814
814
  "path": "updateRule.input.rule.destination.containers.ipAddressRangeContainer.by",
@@ -1090,7 +1090,7 @@
1090
1090
  },
1091
1091
  "customCategory": {
1092
1092
  "defaultValue": null,
1093
- "description": "Custom Categories Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
1093
+ "description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
1094
1094
  "id_str": "updateRule___input___rule___destination___customCategory",
1095
1095
  "name": "customCategory",
1096
1096
  "path": "updateRule.input.rule.destination.customCategory",
@@ -1557,7 +1557,7 @@
1557
1557
  },
1558
1558
  "device": {
1559
1559
  "defaultValue": null,
1560
- "description": "Source Device Profile traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
1560
+ "description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
1561
1561
  "id_str": "updateRule___input___rule___device",
1562
1562
  "name": "device",
1563
1563
  "path": "updateRule.input.rule.device",
@@ -1801,7 +1801,7 @@
1801
1801
  },
1802
1802
  "deviceOS": {
1803
1803
  "defaultValue": null,
1804
- "description": "Source device Operating System traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
1804
+ "description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
1805
1805
  "id_str": "updateRule___input___rule___deviceOS",
1806
1806
  "name": "deviceOS",
1807
1807
  "path": "updateRule.input.rule.deviceOS",
@@ -2281,7 +2281,7 @@
2281
2281
  "inputFields": {
2282
2282
  "by": {
2283
2283
  "defaultValue": "ID",
2284
- "description": "Defines the object identification method by ID (default) or by name",
2284
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
2285
2285
  "id_str": "updateRule___input___rule___exceptions___destination___containers___fqdnContainer___by",
2286
2286
  "name": "by",
2287
2287
  "path": "updateRule.input.rule.exceptions.destination.containers.fqdnContainer.by",
@@ -2376,7 +2376,7 @@
2376
2376
  "inputFields": {
2377
2377
  "by": {
2378
2378
  "defaultValue": "ID",
2379
- "description": "Defines the object identification method by ID (default) or by name",
2379
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
2380
2380
  "id_str": "updateRule___input___rule___exceptions___destination___containers___ipAddressRangeContainer___by",
2381
2381
  "name": "by",
2382
2382
  "path": "updateRule.input.rule.exceptions.destination.containers.ipAddressRangeContainer.by",
@@ -2662,7 +2662,7 @@
2662
2662
  },
2663
2663
  "customCategory": {
2664
2664
  "defaultValue": "[]",
2665
- "description": "Custom Categories Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
2665
+ "description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
2666
2666
  "id_str": "updateRule___input___rule___exceptions___destination___customCategory",
2667
2667
  "name": "customCategory",
2668
2668
  "path": "updateRule.input.rule.exceptions.destination.customCategory",
@@ -3817,7 +3817,7 @@
3817
3817
  "inputFields": {
3818
3818
  "by": {
3819
3819
  "defaultValue": "ID",
3820
- "description": "Defines the object identification method by ID (default) or by name",
3820
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
3821
3821
  "id_str": "updateRule___input___rule___exceptions___source___floatingSubnet___by",
3822
3822
  "name": "by",
3823
3823
  "path": "updateRule.input.rule.exceptions.source.floatingSubnet.by",
@@ -5206,7 +5206,7 @@
5206
5206
  },
5207
5207
  "service": {
5208
5208
  "defaultValue": null,
5209
- "description": "Destination service traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
5209
+ "description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
5210
5210
  "id_str": "updateRule___input___rule___service",
5211
5211
  "name": "service",
5212
5212
  "path": "updateRule.input.rule.service",
@@ -5511,7 +5511,7 @@
5511
5511
  },
5512
5512
  "source": {
5513
5513
  "defaultValue": null,
5514
- "description": "Source traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
5514
+ "description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
5515
5515
  "id_str": "updateRule___input___rule___source",
5516
5516
  "name": "source",
5517
5517
  "path": "updateRule.input.rule.source",
@@ -5541,7 +5541,7 @@
5541
5541
  "inputFields": {
5542
5542
  "by": {
5543
5543
  "defaultValue": "ID",
5544
- "description": "Defines the object identification method by ID (default) or by name",
5544
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
5545
5545
  "id_str": "updateRule___input___rule___source___floatingSubnet___by",
5546
5546
  "name": "by",
5547
5547
  "path": "updateRule.input.rule.source.floatingSubnet.by",
@@ -6621,7 +6621,7 @@
6621
6621
  "inputFields": {
6622
6622
  "enabled": {
6623
6623
  "defaultValue": null,
6624
- "description": "TRUE send alerts when the rule is matched, FALSE don’t send alerts when the rule is matched",
6624
+ "description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
6625
6625
  "id_str": "updateRule___input___rule___tracking___alert___enabled",
6626
6626
  "name": "enabled",
6627
6627
  "path": "updateRule.input.rule.tracking.alert.enabled",
@@ -7560,7 +7560,7 @@
7560
7560
  },
7561
7561
  "country": {
7562
7562
  "defaultValue": null,
7563
- "description": "Source country traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
7563
+ "description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
7564
7564
  "id_str": "updateRule___input___rule___country",
7565
7565
  "name": "country",
7566
7566
  "path": "updateRule.input.rule.country",
@@ -7672,7 +7672,7 @@
7672
7672
  },
7673
7673
  "destination": {
7674
7674
  "defaultValue": null,
7675
- "description": "Destination traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
7675
+ "description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
7676
7676
  "id_str": "updateRule___input___rule___destination",
7677
7677
  "name": "destination",
7678
7678
  "path": "updateRule.input.rule.destination",
@@ -7905,7 +7905,7 @@
7905
7905
  "inputFields": {
7906
7906
  "by": {
7907
7907
  "defaultValue": "ID",
7908
- "description": "Defines the object identification method by ID (default) or by name",
7908
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
7909
7909
  "id_str": "updateRule___input___rule___destination___containers___fqdnContainer___by",
7910
7910
  "name": "by",
7911
7911
  "path": "updateRule.input.rule.destination.containers.fqdnContainer.by",
@@ -7999,7 +7999,7 @@
7999
7999
  "inputFields": {
8000
8000
  "by": {
8001
8001
  "defaultValue": "ID",
8002
- "description": "Defines the object identification method by ID (default) or by name",
8002
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
8003
8003
  "id_str": "updateRule___input___rule___destination___containers___ipAddressRangeContainer___by",
8004
8004
  "name": "by",
8005
8005
  "path": "updateRule.input.rule.destination.containers.ipAddressRangeContainer.by",
@@ -8281,7 +8281,7 @@
8281
8281
  },
8282
8282
  "customCategory": {
8283
8283
  "defaultValue": null,
8284
- "description": "Custom Categories Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
8284
+ "description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
8285
8285
  "id_str": "updateRule___input___rule___destination___customCategory",
8286
8286
  "name": "customCategory",
8287
8287
  "path": "updateRule.input.rule.destination.customCategory",
@@ -8748,7 +8748,7 @@
8748
8748
  },
8749
8749
  "device": {
8750
8750
  "defaultValue": null,
8751
- "description": "Source Device Profile traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
8751
+ "description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
8752
8752
  "id_str": "updateRule___input___rule___device",
8753
8753
  "name": "device",
8754
8754
  "path": "updateRule.input.rule.device",
@@ -8992,7 +8992,7 @@
8992
8992
  },
8993
8993
  "deviceOS": {
8994
8994
  "defaultValue": null,
8995
- "description": "Source device Operating System traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
8995
+ "description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
8996
8996
  "id_str": "updateRule___input___rule___deviceOS",
8997
8997
  "name": "deviceOS",
8998
8998
  "path": "updateRule.input.rule.deviceOS",
@@ -9472,7 +9472,7 @@
9472
9472
  "inputFields": {
9473
9473
  "by": {
9474
9474
  "defaultValue": "ID",
9475
- "description": "Defines the object identification method by ID (default) or by name",
9475
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
9476
9476
  "id_str": "updateRule___input___rule___exceptions___destination___containers___fqdnContainer___by",
9477
9477
  "name": "by",
9478
9478
  "path": "updateRule.input.rule.exceptions.destination.containers.fqdnContainer.by",
@@ -9567,7 +9567,7 @@
9567
9567
  "inputFields": {
9568
9568
  "by": {
9569
9569
  "defaultValue": "ID",
9570
- "description": "Defines the object identification method by ID (default) or by name",
9570
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
9571
9571
  "id_str": "updateRule___input___rule___exceptions___destination___containers___ipAddressRangeContainer___by",
9572
9572
  "name": "by",
9573
9573
  "path": "updateRule.input.rule.exceptions.destination.containers.ipAddressRangeContainer.by",
@@ -9853,7 +9853,7 @@
9853
9853
  },
9854
9854
  "customCategory": {
9855
9855
  "defaultValue": "[]",
9856
- "description": "Custom Categories Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
9856
+ "description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
9857
9857
  "id_str": "updateRule___input___rule___exceptions___destination___customCategory",
9858
9858
  "name": "customCategory",
9859
9859
  "path": "updateRule.input.rule.exceptions.destination.customCategory",
@@ -11008,7 +11008,7 @@
11008
11008
  "inputFields": {
11009
11009
  "by": {
11010
11010
  "defaultValue": "ID",
11011
- "description": "Defines the object identification method by ID (default) or by name",
11011
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
11012
11012
  "id_str": "updateRule___input___rule___exceptions___source___floatingSubnet___by",
11013
11013
  "name": "by",
11014
11014
  "path": "updateRule.input.rule.exceptions.source.floatingSubnet.by",
@@ -12397,7 +12397,7 @@
12397
12397
  },
12398
12398
  "service": {
12399
12399
  "defaultValue": null,
12400
- "description": "Destination service traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
12400
+ "description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
12401
12401
  "id_str": "updateRule___input___rule___service",
12402
12402
  "name": "service",
12403
12403
  "path": "updateRule.input.rule.service",
@@ -12702,7 +12702,7 @@
12702
12702
  },
12703
12703
  "source": {
12704
12704
  "defaultValue": null,
12705
- "description": "Source traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
12705
+ "description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
12706
12706
  "id_str": "updateRule___input___rule___source",
12707
12707
  "name": "source",
12708
12708
  "path": "updateRule.input.rule.source",
@@ -12732,7 +12732,7 @@
12732
12732
  "inputFields": {
12733
12733
  "by": {
12734
12734
  "defaultValue": "ID",
12735
- "description": "Defines the object identification method by ID (default) or by name",
12735
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
12736
12736
  "id_str": "updateRule___input___rule___source___floatingSubnet___by",
12737
12737
  "name": "by",
12738
12738
  "path": "updateRule.input.rule.source.floatingSubnet.by",
@@ -13812,7 +13812,7 @@
13812
13812
  "inputFields": {
13813
13813
  "enabled": {
13814
13814
  "defaultValue": null,
13815
- "description": "TRUE send alerts when the rule is matched, FALSE don’t send alerts when the rule is matched",
13815
+ "description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
13816
13816
  "id_str": "updateRule___input___rule___tracking___alert___enabled",
13817
13817
  "name": "enabled",
13818
13818
  "path": "updateRule.input.rule.tracking.alert.enabled",
@@ -14633,7 +14633,7 @@
14633
14633
  },
14634
14634
  "country": {
14635
14635
  "defaultValue": null,
14636
- "description": "Source country traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
14636
+ "description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
14637
14637
  "id_str": "updateRule___input___rule___country",
14638
14638
  "name": "country",
14639
14639
  "path": "updateRule.input.rule.country",
@@ -14745,7 +14745,7 @@
14745
14745
  },
14746
14746
  "destination": {
14747
14747
  "defaultValue": null,
14748
- "description": "Destination traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
14748
+ "description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
14749
14749
  "id_str": "updateRule___input___rule___destination",
14750
14750
  "name": "destination",
14751
14751
  "path": "updateRule.input.rule.destination",
@@ -14978,7 +14978,7 @@
14978
14978
  "inputFields": {
14979
14979
  "by": {
14980
14980
  "defaultValue": "ID",
14981
- "description": "Defines the object identification method by ID (default) or by name",
14981
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
14982
14982
  "id_str": "updateRule___input___rule___destination___containers___fqdnContainer___by",
14983
14983
  "name": "by",
14984
14984
  "path": "updateRule.input.rule.destination.containers.fqdnContainer.by",
@@ -15072,7 +15072,7 @@
15072
15072
  "inputFields": {
15073
15073
  "by": {
15074
15074
  "defaultValue": "ID",
15075
- "description": "Defines the object identification method by ID (default) or by name",
15075
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
15076
15076
  "id_str": "updateRule___input___rule___destination___containers___ipAddressRangeContainer___by",
15077
15077
  "name": "by",
15078
15078
  "path": "updateRule.input.rule.destination.containers.ipAddressRangeContainer.by",
@@ -15354,7 +15354,7 @@
15354
15354
  },
15355
15355
  "customCategory": {
15356
15356
  "defaultValue": null,
15357
- "description": "Custom Categories Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
15357
+ "description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
15358
15358
  "id_str": "updateRule___input___rule___destination___customCategory",
15359
15359
  "name": "customCategory",
15360
15360
  "path": "updateRule.input.rule.destination.customCategory",
@@ -15821,7 +15821,7 @@
15821
15821
  },
15822
15822
  "device": {
15823
15823
  "defaultValue": null,
15824
- "description": "Source Device Profile traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
15824
+ "description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
15825
15825
  "id_str": "updateRule___input___rule___device",
15826
15826
  "name": "device",
15827
15827
  "path": "updateRule.input.rule.device",
@@ -16065,7 +16065,7 @@
16065
16065
  },
16066
16066
  "deviceOS": {
16067
16067
  "defaultValue": null,
16068
- "description": "Source device Operating System traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
16068
+ "description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
16069
16069
  "id_str": "updateRule___input___rule___deviceOS",
16070
16070
  "name": "deviceOS",
16071
16071
  "path": "updateRule.input.rule.deviceOS",
@@ -16545,7 +16545,7 @@
16545
16545
  "inputFields": {
16546
16546
  "by": {
16547
16547
  "defaultValue": "ID",
16548
- "description": "Defines the object identification method by ID (default) or by name",
16548
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
16549
16549
  "id_str": "updateRule___input___rule___exceptions___destination___containers___fqdnContainer___by",
16550
16550
  "name": "by",
16551
16551
  "path": "updateRule.input.rule.exceptions.destination.containers.fqdnContainer.by",
@@ -16640,7 +16640,7 @@
16640
16640
  "inputFields": {
16641
16641
  "by": {
16642
16642
  "defaultValue": "ID",
16643
- "description": "Defines the object identification method by ID (default) or by name",
16643
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
16644
16644
  "id_str": "updateRule___input___rule___exceptions___destination___containers___ipAddressRangeContainer___by",
16645
16645
  "name": "by",
16646
16646
  "path": "updateRule.input.rule.exceptions.destination.containers.ipAddressRangeContainer.by",
@@ -16926,7 +16926,7 @@
16926
16926
  },
16927
16927
  "customCategory": {
16928
16928
  "defaultValue": "[]",
16929
- "description": "Custom Categories Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
16929
+ "description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
16930
16930
  "id_str": "updateRule___input___rule___exceptions___destination___customCategory",
16931
16931
  "name": "customCategory",
16932
16932
  "path": "updateRule.input.rule.exceptions.destination.customCategory",
@@ -18081,7 +18081,7 @@
18081
18081
  "inputFields": {
18082
18082
  "by": {
18083
18083
  "defaultValue": "ID",
18084
- "description": "Defines the object identification method by ID (default) or by name",
18084
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
18085
18085
  "id_str": "updateRule___input___rule___exceptions___source___floatingSubnet___by",
18086
18086
  "name": "by",
18087
18087
  "path": "updateRule.input.rule.exceptions.source.floatingSubnet.by",
@@ -19470,7 +19470,7 @@
19470
19470
  },
19471
19471
  "service": {
19472
19472
  "defaultValue": null,
19473
- "description": "Destination service traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
19473
+ "description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
19474
19474
  "id_str": "updateRule___input___rule___service",
19475
19475
  "name": "service",
19476
19476
  "path": "updateRule.input.rule.service",
@@ -19775,7 +19775,7 @@
19775
19775
  },
19776
19776
  "source": {
19777
19777
  "defaultValue": null,
19778
- "description": "Source traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
19778
+ "description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
19779
19779
  "id_str": "updateRule___input___rule___source",
19780
19780
  "name": "source",
19781
19781
  "path": "updateRule.input.rule.source",
@@ -19805,7 +19805,7 @@
19805
19805
  "inputFields": {
19806
19806
  "by": {
19807
19807
  "defaultValue": "ID",
19808
- "description": "Defines the object identification method by ID (default) or by name",
19808
+ "description": "Defines the object identification method \u2013 by ID (default) or by name",
19809
19809
  "id_str": "updateRule___input___rule___source___floatingSubnet___by",
19810
19810
  "name": "by",
19811
19811
  "path": "updateRule.input.rule.source.floatingSubnet.by",
@@ -20885,7 +20885,7 @@
20885
20885
  "inputFields": {
20886
20886
  "enabled": {
20887
20887
  "defaultValue": null,
20888
- "description": "TRUE send alerts when the rule is matched, FALSE don’t send alerts when the rule is matched",
20888
+ "description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
20889
20889
  "id_str": "updateRule___input___rule___tracking___alert___enabled",
20890
20890
  "name": "enabled",
20891
20891
  "path": "updateRule.input.rule.tracking.alert.enabled",
@@ -21363,7 +21363,7 @@
21363
21363
  "enumValues": null,
21364
21364
  "fields": {
21365
21365
  "errors": {
21366
- "alias": "policyMutationErrorErrors: errors",
21366
+ "alias": "errorsInternetFirewallRuleMutationPayload: errors",
21367
21367
  "args": {},
21368
21368
  "deprecationReason": null,
21369
21369
  "description": null,
@@ -21376,7 +21376,7 @@
21376
21376
  "responseStr": "errors:$policyMutationError ",
21377
21377
  "type": {
21378
21378
  "definition": {
21379
- "description": "The `PolicyMutationError` enum defines various error messages related to policy publishing in the policy platform service.\n\n## Policy Errors\n\n### `ConcurrentPolicyPublish`\n- **Error Message:** \"Another policy is currently publishing\"\n\n### `PolicyRevisionMismatch`\n- **Error Message:** \"Revision is not owned by the admin\"\n\n### `PolicyRevisionNotFound`\n- **Error Message:** \"Revision was not found\"\n\n### `PolicyInvalidEntity`\n- **Error Message:** \"Invalid entity\"\n\n### `DuplicateRuleName`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `DuplicateSectionName`\n- **Error Message:** \"Section with the same name already exists\"\n\n### `PolicyFailure`\n- **Error Message:** \"Can’t publish policy due to an internal error. Please try again in a few minutes\"\n\n\n## Rule Errors\n\n### `ruleIsLocked`\n- **Error Message:** \"Rule is locked by another revision\"\n\n### `ruleWasRemoved`\n- **Error Message:** \"Rule was already removed\"\n\n### `ruleNotExist`\n- **Error Message:** \"Rule does not exist\"\n\n### `ruleSectionNotExist`\n- **Error Message:** \"Section does not exist\"\n\n### `ruleSectionIsLocked`\n- **Error Message:** \"Section is locked by another revision\"\n\n### `rulePositionInvalid`\n- **Error Message:** \"Rule position is invalid\"\n\n### `ruleNameIsEmpty`\n- **Error Message:** \"Rule name can't be empty\"\n\n### `ruleNameAlreadyExists`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `ruleSystemModification`\n- **Error Message:** \"Can't modify a system rule\"\n\n### `ruleSystemMove`\n- **Error Message:** \"Can't add a rule above the system rules\"\n\n### `ruleHasInvalidEntity`\n- **Error Message:** \"Rule has an invalid entity\"\n\n### `failedValidatingRule`\n- **Error Message:** \"Something went wrong, couldn't validate rule\"\n\n\n## Section Errors\n\n### `sectionIsLocked`\n- **Error Message:** \"Section is locked by another revision\"\n\n### `sectionSystemMove`\n- **Error Message:** \"Section with system rules cannot be moved or removed\"\n\n### `sectionNotExist`\n- **Error Message:** \"Section does not exist\"\n\n### `sectionPositionInvalid`\n- **Error Message:** \"Section position is invalid\"",
21379
+ "description": "The `PolicyMutationError` enum defines various error messages related to policy publishing in the policy platform service.\n\n## Policy Errors\n\n### `ConcurrentPolicyPublish`\n- **Error Message:** \"Another policy is currently publishing\"\n\n### `PolicyRevisionMismatch`\n- **Error Message:** \"Revision is not owned by the admin\"\n\n### `PolicyRevisionNotFound`\n- **Error Message:** \"Revision was not found\"\n\n### `PolicyInvalidEntity`\n- **Error Message:** \"Invalid entity\"\n\n### `DuplicateRuleName`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `DuplicateSectionName`\n- **Error Message:** \"Section with the same name already exists\"\n\n### `PolicyFailure`\n- **Error Message:** \"Can\u2019t publish policy due to an internal error. Please try again in a few minutes\"\n\n\n## Rule Errors\n\n### `ruleIsLocked`\n- **Error Message:** \"Rule is locked by another revision\"\n\n### `ruleWasRemoved`\n- **Error Message:** \"Rule was already removed\"\n\n### `ruleNotExist`\n- **Error Message:** \"Rule does not exist\"\n\n### `ruleSectionNotExist`\n- **Error Message:** \"Section does not exist\"\n\n### `ruleSectionIsLocked`\n- **Error Message:** \"Section is locked by another revision\"\n\n### `rulePositionInvalid`\n- **Error Message:** \"Rule position is invalid\"\n\n### `ruleNameIsEmpty`\n- **Error Message:** \"Rule name can't be empty\"\n\n### `ruleNameAlreadyExists`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `ruleSystemModification`\n- **Error Message:** \"Can't modify a system rule\"\n\n### `ruleSystemMove`\n- **Error Message:** \"Can't add a rule above the system rules\"\n\n### `ruleHasInvalidEntity`\n- **Error Message:** \"Rule has an invalid entity\"\n\n### `failedValidatingRule`\n- **Error Message:** \"Something went wrong, couldn't validate rule\"\n\n\n## Section Errors\n\n### `sectionIsLocked`\n- **Error Message:** \"Section is locked by another revision\"\n\n### `sectionSystemMove`\n- **Error Message:** \"Section with system rules cannot be moved or removed\"\n\n### `sectionNotExist`\n- **Error Message:** \"Section does not exist\"\n\n### `sectionPositionInvalid`\n- **Error Message:** \"Section position is invalid\"",
21380
21380
  "enumValues": null,
21381
21381
  "fields": {
21382
21382
  "errorCode": {
@@ -21439,7 +21439,7 @@
21439
21439
  "varName": "policyMutationError"
21440
21440
  },
21441
21441
  "rule": {
21442
- "alias": "internetFirewallRulePayloadRule: rule",
21442
+ "alias": "ruleInternetFirewallRuleMutationPayload: rule",
21443
21443
  "args": {},
21444
21444
  "deprecationReason": null,
21445
21445
  "description": null,
@@ -21624,7 +21624,7 @@
21624
21624
  "enumValues": null,
21625
21625
  "fields": {
21626
21626
  "action": {
21627
- "alias": "internetFirewallActionEnumAction: action",
21627
+ "alias": "actionInternetFirewallRule: action",
21628
21628
  "args": {},
21629
21629
  "deprecationReason": null,
21630
21630
  "description": "The action applied by the Internet Firewall if the rule is matched",
@@ -21682,7 +21682,7 @@
21682
21682
  "varName": "action"
21683
21683
  },
21684
21684
  "activePeriod": {
21685
- "alias": "policyRuleActivePeriodActivePeriod: activePeriod",
21685
+ "alias": "activePeriodInternetFirewallRule: activePeriod",
21686
21686
  "args": {},
21687
21687
  "deprecationReason": null,
21688
21688
  "description": "The time period during which the rule is active, outside this period, the rule is inactive",
@@ -21798,7 +21798,7 @@
21798
21798
  "varName": "policyRuleActivePeriod"
21799
21799
  },
21800
21800
  "connectionOrigin": {
21801
- "alias": "connectionOriginEnumConnectionOrigin: connectionOrigin",
21801
+ "alias": "connectionOriginInternetFirewallRule: connectionOrigin",
21802
21802
  "args": {},
21803
21803
  "deprecationReason": null,
21804
21804
  "description": "Connection origin of the traffic",
@@ -21850,10 +21850,10 @@
21850
21850
  "varName": "connectionOrigin"
21851
21851
  },
21852
21852
  "country": {
21853
- "alias": "countryRefCountry: country",
21853
+ "alias": "countryInternetFirewallRule: country",
21854
21854
  "args": {},
21855
21855
  "deprecationReason": null,
21856
- "description": "Source country traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
21856
+ "description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
21857
21857
  "id_str": "internetFirewall___updateRule___rule___rule___country",
21858
21858
  "isDeprecated": false,
21859
21859
  "name": "country",
@@ -21949,10 +21949,10 @@
21949
21949
  "varName": "description"
21950
21950
  },
21951
21951
  "destination": {
21952
- "alias": "internetFirewallDestinationDestination: destination",
21952
+ "alias": "destinationInternetFirewallRule: destination",
21953
21953
  "args": {},
21954
21954
  "deprecationReason": null,
21955
- "description": "Destination traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
21955
+ "description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
21956
21956
  "id_str": "internetFirewall___updateRule___rule___rule___destination",
21957
21957
  "isDeprecated": false,
21958
21958
  "name": "destination",
@@ -21966,7 +21966,7 @@
21966
21966
  "enumValues": null,
21967
21967
  "fields": {
21968
21968
  "appCategory": {
21969
- "alias": "applicationCategoryRefAppCategory: appCategory",
21969
+ "alias": "appCategoryInternetFirewallDestination: appCategory",
21970
21970
  "args": {},
21971
21971
  "deprecationReason": null,
21972
21972
  "description": "Cato category of applications which are dynamically updated by Cato",
@@ -22044,7 +22044,7 @@
22044
22044
  "varName": "applicationCategoryRef"
22045
22045
  },
22046
22046
  "application": {
22047
- "alias": "applicationRefApplication: application",
22047
+ "alias": "applicationInternetFirewallDestination: application",
22048
22048
  "args": {},
22049
22049
  "deprecationReason": null,
22050
22050
  "description": "Applications for the rule (pre-defined)",
@@ -22122,7 +22122,7 @@
22122
22122
  "varName": "applicationRef"
22123
22123
  },
22124
22124
  "containers": {
22125
- "alias": "internetFirewallContainerContainers: containers",
22125
+ "alias": "containersInternetFirewallDestination: containers",
22126
22126
  "args": {},
22127
22127
  "deprecationReason": null,
22128
22128
  "description": null,
@@ -22139,7 +22139,7 @@
22139
22139
  "enumValues": null,
22140
22140
  "fields": {
22141
22141
  "fqdnContainer": {
22142
- "alias": "fqdnContainerRefFqdnContainer: fqdnContainer",
22142
+ "alias": "fqdnContainerInternetFirewallContainer: fqdnContainer",
22143
22143
  "args": {},
22144
22144
  "deprecationReason": null,
22145
22145
  "description": null,
@@ -22217,7 +22217,7 @@
22217
22217
  "varName": "fqdnContainerRef"
22218
22218
  },
22219
22219
  "ipAddressRangeContainer": {
22220
- "alias": "ipAddressRangeContainerRefIpAddressRangeContainer: ipAddressRangeContainer",
22220
+ "alias": "ipAddressRangeContainerInternetFirewallContainer: ipAddressRangeContainer",
22221
22221
  "args": {},
22222
22222
  "deprecationReason": null,
22223
22223
  "description": null,
@@ -22312,7 +22312,7 @@
22312
22312
  "varName": "internetFirewallContainer"
22313
22313
  },
22314
22314
  "country": {
22315
- "alias": "countryRefCountry: country",
22315
+ "alias": "countryInternetFirewallDestination: country",
22316
22316
  "args": {},
22317
22317
  "deprecationReason": null,
22318
22318
  "description": "Countries",
@@ -22390,7 +22390,7 @@
22390
22390
  "varName": "countryRef"
22391
22391
  },
22392
22392
  "customApp": {
22393
- "alias": "customApplicationRefCustomApp: customApp",
22393
+ "alias": "customAppInternetFirewallDestination: customApp",
22394
22394
  "args": {},
22395
22395
  "deprecationReason": null,
22396
22396
  "description": "Custom (user-defined) applications",
@@ -22468,10 +22468,10 @@
22468
22468
  "varName": "customApplicationRef"
22469
22469
  },
22470
22470
  "customCategory": {
22471
- "alias": "customCategoryRefCustomCategory: customCategory",
22471
+ "alias": "customCategoryInternetFirewallDestination: customCategory",
22472
22472
  "args": {},
22473
22473
  "deprecationReason": null,
22474
- "description": "Custom Categories Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
22474
+ "description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
22475
22475
  "id_str": "internetFirewall___updateRule___rule___rule___destination___customCategory",
22476
22476
  "isDeprecated": false,
22477
22477
  "name": "customCategory",
@@ -22592,7 +22592,7 @@
22592
22592
  "varName": "fqdn"
22593
22593
  },
22594
22594
  "globalIpRange": {
22595
- "alias": "globalIpRangeRefGlobalIpRange: globalIpRange",
22595
+ "alias": "globalIpRangeInternetFirewallDestination: globalIpRange",
22596
22596
  "args": {},
22597
22597
  "deprecationReason": null,
22598
22598
  "description": "Globally defined IP range, IP and subnet objects",
@@ -22693,7 +22693,7 @@
22693
22693
  "varName": "ip"
22694
22694
  },
22695
22695
  "ipRange": {
22696
- "alias": "ipAddressRangeIpRange: ipRange",
22696
+ "alias": "ipRangeInternetFirewallDestination: ipRange",
22697
22697
  "args": {},
22698
22698
  "deprecationReason": null,
22699
22699
  "description": "A range of IPs. Every IP within the range will be matched",
@@ -22794,7 +22794,7 @@
22794
22794
  "varName": "remoteAsn"
22795
22795
  },
22796
22796
  "sanctionedAppsCategory": {
22797
- "alias": "sanctionedAppsCategoryRefSanctionedAppsCategory: sanctionedAppsCategory",
22797
+ "alias": "sanctionedAppsCategoryInternetFirewallDestination: sanctionedAppsCategory",
22798
22798
  "args": {},
22799
22799
  "deprecationReason": null,
22800
22800
  "description": "Sanctioned Cloud Applications - apps that are approved and generally represent an understood and acceptable level of risk in your organization.",
@@ -22912,10 +22912,10 @@
22912
22912
  "varName": "internetFirewallDestination"
22913
22913
  },
22914
22914
  "device": {
22915
- "alias": "deviceProfileRefDevice: device",
22915
+ "alias": "deviceInternetFirewallRule: device",
22916
22916
  "args": {},
22917
22917
  "deprecationReason": null,
22918
- "description": "Source Device Profile traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
22918
+ "description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
22919
22919
  "id_str": "internetFirewall___updateRule___rule___rule___device",
22920
22920
  "isDeprecated": false,
22921
22921
  "name": "device",
@@ -22990,7 +22990,7 @@
22990
22990
  "varName": "deviceProfileRef"
22991
22991
  },
22992
22992
  "deviceAttributes": {
22993
- "alias": "deviceAttributesDeviceAttributes: deviceAttributes",
22993
+ "alias": "deviceAttributesInternetFirewallRule: deviceAttributes",
22994
22994
  "args": {},
22995
22995
  "deprecationReason": null,
22996
22996
  "description": "Additional device attributes such as category, type, model, and manufacturer.\nLogical 'OR' is applied within the criteria set.\nLogical 'AND' is applied between criteria sets.",
@@ -23162,10 +23162,10 @@
23162
23162
  "varName": "deviceAttributes"
23163
23163
  },
23164
23164
  "deviceOS": {
23165
- "alias": "operatingSystemDeviceOS: deviceOS",
23165
+ "alias": "deviceOSInternetFirewallRule: deviceOS",
23166
23166
  "args": {},
23167
23167
  "deprecationReason": null,
23168
- "description": "Source device Operating System traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
23168
+ "description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
23169
23169
  "id_str": "internetFirewall___updateRule___rule___rule___deviceOS",
23170
23170
  "isDeprecated": false,
23171
23171
  "name": "deviceOS",
@@ -23255,7 +23255,7 @@
23255
23255
  "varName": "enabled"
23256
23256
  },
23257
23257
  "exceptions": {
23258
- "alias": "internetFirewallRuleExceptionExceptions: exceptions",
23258
+ "alias": "exceptionsInternetFirewallRule: exceptions",
23259
23259
  "args": {},
23260
23260
  "deprecationReason": null,
23261
23261
  "description": "The set of exceptions for the rule.\nExceptions define when the rule will be ignored and the firewall evaluation will continue with the lower priority rules.",
@@ -23272,7 +23272,7 @@
23272
23272
  "enumValues": null,
23273
23273
  "fields": {
23274
23274
  "connectionOrigin": {
23275
- "alias": "connectionOriginEnumConnectionOrigin: connectionOrigin",
23275
+ "alias": "connectionOriginInternetFirewallRuleException: connectionOrigin",
23276
23276
  "args": {},
23277
23277
  "deprecationReason": null,
23278
23278
  "description": "Connection origin matching criteria for the exception.",
@@ -23324,7 +23324,7 @@
23324
23324
  "varName": "connectionOrigin"
23325
23325
  },
23326
23326
  "country": {
23327
- "alias": "countryRefCountry: country",
23327
+ "alias": "countryInternetFirewallRuleException: country",
23328
23328
  "args": {},
23329
23329
  "deprecationReason": null,
23330
23330
  "description": "Source country matching criteria for the exception.",
@@ -23402,7 +23402,7 @@
23402
23402
  "varName": "countryRef"
23403
23403
  },
23404
23404
  "destination": {
23405
- "alias": "internetFirewallDestinationDestination: destination",
23405
+ "alias": "destinationInternetFirewallRuleException: destination",
23406
23406
  "args": {},
23407
23407
  "deprecationReason": null,
23408
23408
  "description": "Destination matching criteria for the exception.",
@@ -23419,7 +23419,7 @@
23419
23419
  "enumValues": null,
23420
23420
  "fields": {
23421
23421
  "appCategory": {
23422
- "alias": "applicationCategoryRefAppCategory: appCategory",
23422
+ "alias": "appCategoryInternetFirewallDestination: appCategory",
23423
23423
  "args": {},
23424
23424
  "deprecationReason": null,
23425
23425
  "description": "Cato category of applications which are dynamically updated by Cato",
@@ -23497,7 +23497,7 @@
23497
23497
  "varName": "applicationCategoryRef"
23498
23498
  },
23499
23499
  "application": {
23500
- "alias": "applicationRefApplication: application",
23500
+ "alias": "applicationInternetFirewallDestination: application",
23501
23501
  "args": {},
23502
23502
  "deprecationReason": null,
23503
23503
  "description": "Applications for the rule (pre-defined)",
@@ -23575,7 +23575,7 @@
23575
23575
  "varName": "applicationRef"
23576
23576
  },
23577
23577
  "containers": {
23578
- "alias": "internetFirewallContainerContainers: containers",
23578
+ "alias": "containersInternetFirewallDestination: containers",
23579
23579
  "args": {},
23580
23580
  "deprecationReason": null,
23581
23581
  "description": null,
@@ -23592,7 +23592,7 @@
23592
23592
  "enumValues": null,
23593
23593
  "fields": {
23594
23594
  "fqdnContainer": {
23595
- "alias": "fqdnContainerRefFqdnContainer: fqdnContainer",
23595
+ "alias": "fqdnContainerInternetFirewallContainer: fqdnContainer",
23596
23596
  "args": {},
23597
23597
  "deprecationReason": null,
23598
23598
  "description": null,
@@ -23670,7 +23670,7 @@
23670
23670
  "varName": "fqdnContainerRef"
23671
23671
  },
23672
23672
  "ipAddressRangeContainer": {
23673
- "alias": "ipAddressRangeContainerRefIpAddressRangeContainer: ipAddressRangeContainer",
23673
+ "alias": "ipAddressRangeContainerInternetFirewallContainer: ipAddressRangeContainer",
23674
23674
  "args": {},
23675
23675
  "deprecationReason": null,
23676
23676
  "description": null,
@@ -23765,7 +23765,7 @@
23765
23765
  "varName": "internetFirewallContainer"
23766
23766
  },
23767
23767
  "country": {
23768
- "alias": "countryRefCountry: country",
23768
+ "alias": "countryInternetFirewallDestination: country",
23769
23769
  "args": {},
23770
23770
  "deprecationReason": null,
23771
23771
  "description": "Countries",
@@ -23843,7 +23843,7 @@
23843
23843
  "varName": "countryRef"
23844
23844
  },
23845
23845
  "customApp": {
23846
- "alias": "customApplicationRefCustomApp: customApp",
23846
+ "alias": "customAppInternetFirewallDestination: customApp",
23847
23847
  "args": {},
23848
23848
  "deprecationReason": null,
23849
23849
  "description": "Custom (user-defined) applications",
@@ -23921,10 +23921,10 @@
23921
23921
  "varName": "customApplicationRef"
23922
23922
  },
23923
23923
  "customCategory": {
23924
- "alias": "customCategoryRefCustomCategory: customCategory",
23924
+ "alias": "customCategoryInternetFirewallDestination: customCategory",
23925
23925
  "args": {},
23926
23926
  "deprecationReason": null,
23927
- "description": "Custom Categories Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
23927
+ "description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
23928
23928
  "id_str": "internetFirewall___updateRule___rule___rule___exceptions___destination___customCategory",
23929
23929
  "isDeprecated": false,
23930
23930
  "name": "customCategory",
@@ -24045,7 +24045,7 @@
24045
24045
  "varName": "fqdn"
24046
24046
  },
24047
24047
  "globalIpRange": {
24048
- "alias": "globalIpRangeRefGlobalIpRange: globalIpRange",
24048
+ "alias": "globalIpRangeInternetFirewallDestination: globalIpRange",
24049
24049
  "args": {},
24050
24050
  "deprecationReason": null,
24051
24051
  "description": "Globally defined IP range, IP and subnet objects",
@@ -24146,7 +24146,7 @@
24146
24146
  "varName": "ip"
24147
24147
  },
24148
24148
  "ipRange": {
24149
- "alias": "ipAddressRangeIpRange: ipRange",
24149
+ "alias": "ipRangeInternetFirewallDestination: ipRange",
24150
24150
  "args": {},
24151
24151
  "deprecationReason": null,
24152
24152
  "description": "A range of IPs. Every IP within the range will be matched",
@@ -24247,7 +24247,7 @@
24247
24247
  "varName": "remoteAsn"
24248
24248
  },
24249
24249
  "sanctionedAppsCategory": {
24250
- "alias": "sanctionedAppsCategoryRefSanctionedAppsCategory: sanctionedAppsCategory",
24250
+ "alias": "sanctionedAppsCategoryInternetFirewallDestination: sanctionedAppsCategory",
24251
24251
  "args": {},
24252
24252
  "deprecationReason": null,
24253
24253
  "description": "Sanctioned Cloud Applications - apps that are approved and generally represent an understood and acceptable level of risk in your organization.",
@@ -24365,7 +24365,7 @@
24365
24365
  "varName": "internetFirewallDestination"
24366
24366
  },
24367
24367
  "device": {
24368
- "alias": "deviceProfileRefDevice: device",
24368
+ "alias": "deviceInternetFirewallRuleException: device",
24369
24369
  "args": {},
24370
24370
  "deprecationReason": null,
24371
24371
  "description": "Source Device Profile matching criteria for the exception.",
@@ -24443,7 +24443,7 @@
24443
24443
  "varName": "deviceProfileRef"
24444
24444
  },
24445
24445
  "deviceAttributes": {
24446
- "alias": "deviceAttributesDeviceAttributes: deviceAttributes",
24446
+ "alias": "deviceAttributesInternetFirewallRuleException: deviceAttributes",
24447
24447
  "args": {},
24448
24448
  "deprecationReason": null,
24449
24449
  "description": "Source Device Attributes matching criteria for the exception.",
@@ -24615,7 +24615,7 @@
24615
24615
  "varName": "deviceAttributes"
24616
24616
  },
24617
24617
  "deviceOS": {
24618
- "alias": "operatingSystemDeviceOS: deviceOS",
24618
+ "alias": "deviceOSInternetFirewallRuleException: deviceOS",
24619
24619
  "args": {},
24620
24620
  "deprecationReason": null,
24621
24621
  "description": "Source device OS matching criteria for the exception.",
@@ -24708,7 +24708,7 @@
24708
24708
  "varName": "name"
24709
24709
  },
24710
24710
  "service": {
24711
- "alias": "internetFirewallServiceTypeService: service",
24711
+ "alias": "serviceInternetFirewallRuleException: service",
24712
24712
  "args": {},
24713
24713
  "deprecationReason": null,
24714
24714
  "description": "Destination service matching criteria for the exception.",
@@ -24725,7 +24725,7 @@
24725
24725
  "enumValues": null,
24726
24726
  "fields": {
24727
24727
  "custom": {
24728
- "alias": "customServiceCustom: custom",
24728
+ "alias": "customInternetFirewallServiceType: custom",
24729
24729
  "args": {},
24730
24730
  "deprecationReason": null,
24731
24731
  "description": null,
@@ -24764,7 +24764,7 @@
24764
24764
  "varName": "port"
24765
24765
  },
24766
24766
  "portRange": {
24767
- "alias": "portRangePortRange: portRange",
24767
+ "alias": "portRangeCustomService: portRange",
24768
24768
  "args": {},
24769
24769
  "deprecationReason": null,
24770
24770
  "description": null,
@@ -24839,7 +24839,7 @@
24839
24839
  "varName": "portRange"
24840
24840
  },
24841
24841
  "protocol": {
24842
- "alias": "ipProtocolProtocol: protocol",
24842
+ "alias": "protocolCustomService: protocol",
24843
24843
  "args": {},
24844
24844
  "deprecationReason": null,
24845
24845
  "description": null,
@@ -24922,7 +24922,7 @@
24922
24922
  "varName": "customService"
24923
24923
  },
24924
24924
  "standard": {
24925
- "alias": "serviceRefStandard: standard",
24925
+ "alias": "standardInternetFirewallServiceType: standard",
24926
24926
  "args": {},
24927
24927
  "deprecationReason": null,
24928
24928
  "description": null,
@@ -25017,7 +25017,7 @@
25017
25017
  "varName": "internetFirewallServiceType"
25018
25018
  },
25019
25019
  "source": {
25020
- "alias": "internetFirewallSourceSource: source",
25020
+ "alias": "sourceInternetFirewallRuleException: source",
25021
25021
  "args": {},
25022
25022
  "deprecationReason": null,
25023
25023
  "description": "Source traffic matching criteria for the exception.",
@@ -25034,7 +25034,7 @@
25034
25034
  "enumValues": null,
25035
25035
  "fields": {
25036
25036
  "floatingSubnet": {
25037
- "alias": "floatingSubnetRefFloatingSubnet: floatingSubnet",
25037
+ "alias": "floatingSubnetInternetFirewallSource: floatingSubnet",
25038
25038
  "args": {},
25039
25039
  "deprecationReason": null,
25040
25040
  "description": "Floating Subnets (ie. Floating Ranges) are used to identify traffic exactly matched to the route advertised by BGP. They are not associated with a specific site. This is useful in scenarios such as active-standby high availability routed via BGP.",
@@ -25112,7 +25112,7 @@
25112
25112
  "varName": "floatingSubnetRef"
25113
25113
  },
25114
25114
  "globalIpRange": {
25115
- "alias": "globalIpRangeRefGlobalIpRange: globalIpRange",
25115
+ "alias": "globalIpRangeInternetFirewallSource: globalIpRange",
25116
25116
  "args": {},
25117
25117
  "deprecationReason": null,
25118
25118
  "description": "Globally defined IP range, IP and subnet objects",
@@ -25190,7 +25190,7 @@
25190
25190
  "varName": "globalIpRangeRef"
25191
25191
  },
25192
25192
  "group": {
25193
- "alias": "groupRefGroup: group",
25193
+ "alias": "groupInternetFirewallSource: group",
25194
25194
  "args": {},
25195
25195
  "deprecationReason": null,
25196
25196
  "description": "Groups defined for your account",
@@ -25268,7 +25268,7 @@
25268
25268
  "varName": "groupRef"
25269
25269
  },
25270
25270
  "host": {
25271
- "alias": "hostRefHost: host",
25271
+ "alias": "hostInternetFirewallSource: host",
25272
25272
  "args": {},
25273
25273
  "deprecationReason": null,
25274
25274
  "description": "Hosts and servers defined for your account",
@@ -25369,7 +25369,7 @@
25369
25369
  "varName": "ip"
25370
25370
  },
25371
25371
  "ipRange": {
25372
- "alias": "ipAddressRangeIpRange: ipRange",
25372
+ "alias": "ipRangeInternetFirewallSource: ipRange",
25373
25373
  "args": {},
25374
25374
  "deprecationReason": null,
25375
25375
  "description": "Multiple separate IP addresses or an IP range",
@@ -25447,7 +25447,7 @@
25447
25447
  "varName": "ipAddressRange"
25448
25448
  },
25449
25449
  "networkInterface": {
25450
- "alias": "networkInterfaceRefNetworkInterface: networkInterface",
25450
+ "alias": "networkInterfaceInternetFirewallSource: networkInterface",
25451
25451
  "args": {},
25452
25452
  "deprecationReason": null,
25453
25453
  "description": "Network range defined for a site",
@@ -25525,7 +25525,7 @@
25525
25525
  "varName": "networkInterfaceRef"
25526
25526
  },
25527
25527
  "site": {
25528
- "alias": "siteRefSite: site",
25528
+ "alias": "siteInternetFirewallSource: site",
25529
25529
  "args": {},
25530
25530
  "deprecationReason": null,
25531
25531
  "description": "Site defined for the account",
@@ -25603,7 +25603,7 @@
25603
25603
  "varName": "siteRef"
25604
25604
  },
25605
25605
  "siteNetworkSubnet": {
25606
- "alias": "siteNetworkSubnetRefSiteNetworkSubnet: siteNetworkSubnet",
25606
+ "alias": "siteNetworkSubnetInternetFirewallSource: siteNetworkSubnet",
25607
25607
  "args": {},
25608
25608
  "deprecationReason": null,
25609
25609
  "description": "GlobalRange + InterfaceSubnet",
@@ -25704,7 +25704,7 @@
25704
25704
  "varName": "subnet"
25705
25705
  },
25706
25706
  "systemGroup": {
25707
- "alias": "systemGroupRefSystemGroup: systemGroup",
25707
+ "alias": "systemGroupInternetFirewallSource: systemGroup",
25708
25708
  "args": {},
25709
25709
  "deprecationReason": null,
25710
25710
  "description": "Predefined Cato groups",
@@ -25782,7 +25782,7 @@
25782
25782
  "varName": "systemGroupRef"
25783
25783
  },
25784
25784
  "user": {
25785
- "alias": "userRefUser: user",
25785
+ "alias": "userInternetFirewallSource: user",
25786
25786
  "args": {},
25787
25787
  "deprecationReason": null,
25788
25788
  "description": "Individual users defined for the account",
@@ -25860,7 +25860,7 @@
25860
25860
  "varName": "userRef"
25861
25861
  },
25862
25862
  "usersGroup": {
25863
- "alias": "usersGroupRefUsersGroup: usersGroup",
25863
+ "alias": "usersGroupInternetFirewallSource: usersGroup",
25864
25864
  "args": {},
25865
25865
  "deprecationReason": null,
25866
25866
  "description": "Group of users",
@@ -26037,7 +26037,7 @@
26037
26037
  "varName": "name"
26038
26038
  },
26039
26039
  "schedule": {
26040
- "alias": "policyScheduleSchedule: schedule",
26040
+ "alias": "scheduleInternetFirewallRule: schedule",
26041
26041
  "args": {},
26042
26042
  "deprecationReason": null,
26043
26043
  "description": "The time period specifying when the rule is enabled, otherwise it is disabled.",
@@ -26054,7 +26054,7 @@
26054
26054
  "enumValues": null,
26055
26055
  "fields": {
26056
26056
  "activeOn": {
26057
- "alias": "policyActiveOnEnumActiveOn: activeOn",
26057
+ "alias": "activeOnPolicySchedule: activeOn",
26058
26058
  "args": {},
26059
26059
  "deprecationReason": null,
26060
26060
  "description": null,
@@ -26112,7 +26112,7 @@
26112
26112
  "varName": "activeOn"
26113
26113
  },
26114
26114
  "customRecurring": {
26115
- "alias": "policyCustomRecurringCustomRecurring: customRecurring",
26115
+ "alias": "customRecurringPolicySchedule: customRecurring",
26116
26116
  "args": {},
26117
26117
  "deprecationReason": null,
26118
26118
  "description": null,
@@ -26264,7 +26264,7 @@
26264
26264
  "varName": "policyCustomRecurring"
26265
26265
  },
26266
26266
  "customTimeframe": {
26267
- "alias": "policyCustomTimeframeCustomTimeframe: customTimeframe",
26267
+ "alias": "customTimeframePolicySchedule: customTimeframe",
26268
26268
  "args": {},
26269
26269
  "deprecationReason": null,
26270
26270
  "description": null,
@@ -26356,7 +26356,7 @@
26356
26356
  "varName": "policySchedule"
26357
26357
  },
26358
26358
  "section": {
26359
- "alias": "policySectionInfoSection: section",
26359
+ "alias": "sectionInternetFirewallRule: section",
26360
26360
  "args": {},
26361
26361
  "deprecationReason": null,
26362
26362
  "description": "Policy section where the rule is located",
@@ -26432,10 +26432,10 @@
26432
26432
  "varName": "policySectionInfo"
26433
26433
  },
26434
26434
  "service": {
26435
- "alias": "internetFirewallServiceTypeService: service",
26435
+ "alias": "serviceInternetFirewallRule: service",
26436
26436
  "args": {},
26437
26437
  "deprecationReason": null,
26438
- "description": "Destination service traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
26438
+ "description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
26439
26439
  "id_str": "internetFirewall___updateRule___rule___rule___service",
26440
26440
  "isDeprecated": false,
26441
26441
  "name": "service",
@@ -26449,7 +26449,7 @@
26449
26449
  "enumValues": null,
26450
26450
  "fields": {
26451
26451
  "custom": {
26452
- "alias": "customServiceCustom: custom",
26452
+ "alias": "customInternetFirewallServiceType: custom",
26453
26453
  "args": {},
26454
26454
  "deprecationReason": null,
26455
26455
  "description": null,
@@ -26488,7 +26488,7 @@
26488
26488
  "varName": "port"
26489
26489
  },
26490
26490
  "portRange": {
26491
- "alias": "portRangePortRange: portRange",
26491
+ "alias": "portRangeCustomService: portRange",
26492
26492
  "args": {},
26493
26493
  "deprecationReason": null,
26494
26494
  "description": null,
@@ -26563,7 +26563,7 @@
26563
26563
  "varName": "portRange"
26564
26564
  },
26565
26565
  "protocol": {
26566
- "alias": "ipProtocolProtocol: protocol",
26566
+ "alias": "protocolCustomService: protocol",
26567
26567
  "args": {},
26568
26568
  "deprecationReason": null,
26569
26569
  "description": null,
@@ -26646,7 +26646,7 @@
26646
26646
  "varName": "customService"
26647
26647
  },
26648
26648
  "standard": {
26649
- "alias": "serviceRefStandard: standard",
26649
+ "alias": "standardInternetFirewallServiceType: standard",
26650
26650
  "args": {},
26651
26651
  "deprecationReason": null,
26652
26652
  "description": null,
@@ -26741,10 +26741,10 @@
26741
26741
  "varName": "internetFirewallServiceType"
26742
26742
  },
26743
26743
  "source": {
26744
- "alias": "internetFirewallSourceSource: source",
26744
+ "alias": "sourceInternetFirewallRule: source",
26745
26745
  "args": {},
26746
26746
  "deprecationReason": null,
26747
- "description": "Source traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
26747
+ "description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
26748
26748
  "id_str": "internetFirewall___updateRule___rule___rule___source",
26749
26749
  "isDeprecated": false,
26750
26750
  "name": "source",
@@ -26758,7 +26758,7 @@
26758
26758
  "enumValues": null,
26759
26759
  "fields": {
26760
26760
  "floatingSubnet": {
26761
- "alias": "floatingSubnetRefFloatingSubnet: floatingSubnet",
26761
+ "alias": "floatingSubnetInternetFirewallSource: floatingSubnet",
26762
26762
  "args": {},
26763
26763
  "deprecationReason": null,
26764
26764
  "description": "Floating Subnets (ie. Floating Ranges) are used to identify traffic exactly matched to the route advertised by BGP. They are not associated with a specific site. This is useful in scenarios such as active-standby high availability routed via BGP.",
@@ -26836,7 +26836,7 @@
26836
26836
  "varName": "floatingSubnetRef"
26837
26837
  },
26838
26838
  "globalIpRange": {
26839
- "alias": "globalIpRangeRefGlobalIpRange: globalIpRange",
26839
+ "alias": "globalIpRangeInternetFirewallSource: globalIpRange",
26840
26840
  "args": {},
26841
26841
  "deprecationReason": null,
26842
26842
  "description": "Globally defined IP range, IP and subnet objects",
@@ -26914,7 +26914,7 @@
26914
26914
  "varName": "globalIpRangeRef"
26915
26915
  },
26916
26916
  "group": {
26917
- "alias": "groupRefGroup: group",
26917
+ "alias": "groupInternetFirewallSource: group",
26918
26918
  "args": {},
26919
26919
  "deprecationReason": null,
26920
26920
  "description": "Groups defined for your account",
@@ -26992,7 +26992,7 @@
26992
26992
  "varName": "groupRef"
26993
26993
  },
26994
26994
  "host": {
26995
- "alias": "hostRefHost: host",
26995
+ "alias": "hostInternetFirewallSource: host",
26996
26996
  "args": {},
26997
26997
  "deprecationReason": null,
26998
26998
  "description": "Hosts and servers defined for your account",
@@ -27093,7 +27093,7 @@
27093
27093
  "varName": "ip"
27094
27094
  },
27095
27095
  "ipRange": {
27096
- "alias": "ipAddressRangeIpRange: ipRange",
27096
+ "alias": "ipRangeInternetFirewallSource: ipRange",
27097
27097
  "args": {},
27098
27098
  "deprecationReason": null,
27099
27099
  "description": "Multiple separate IP addresses or an IP range",
@@ -27171,7 +27171,7 @@
27171
27171
  "varName": "ipAddressRange"
27172
27172
  },
27173
27173
  "networkInterface": {
27174
- "alias": "networkInterfaceRefNetworkInterface: networkInterface",
27174
+ "alias": "networkInterfaceInternetFirewallSource: networkInterface",
27175
27175
  "args": {},
27176
27176
  "deprecationReason": null,
27177
27177
  "description": "Network range defined for a site",
@@ -27249,7 +27249,7 @@
27249
27249
  "varName": "networkInterfaceRef"
27250
27250
  },
27251
27251
  "site": {
27252
- "alias": "siteRefSite: site",
27252
+ "alias": "siteInternetFirewallSource: site",
27253
27253
  "args": {},
27254
27254
  "deprecationReason": null,
27255
27255
  "description": "Site defined for the account",
@@ -27327,7 +27327,7 @@
27327
27327
  "varName": "siteRef"
27328
27328
  },
27329
27329
  "siteNetworkSubnet": {
27330
- "alias": "siteNetworkSubnetRefSiteNetworkSubnet: siteNetworkSubnet",
27330
+ "alias": "siteNetworkSubnetInternetFirewallSource: siteNetworkSubnet",
27331
27331
  "args": {},
27332
27332
  "deprecationReason": null,
27333
27333
  "description": "GlobalRange + InterfaceSubnet",
@@ -27428,7 +27428,7 @@
27428
27428
  "varName": "subnet"
27429
27429
  },
27430
27430
  "systemGroup": {
27431
- "alias": "systemGroupRefSystemGroup: systemGroup",
27431
+ "alias": "systemGroupInternetFirewallSource: systemGroup",
27432
27432
  "args": {},
27433
27433
  "deprecationReason": null,
27434
27434
  "description": "Predefined Cato groups",
@@ -27506,7 +27506,7 @@
27506
27506
  "varName": "systemGroupRef"
27507
27507
  },
27508
27508
  "user": {
27509
- "alias": "userRefUser: user",
27509
+ "alias": "userInternetFirewallSource: user",
27510
27510
  "args": {},
27511
27511
  "deprecationReason": null,
27512
27512
  "description": "Individual users defined for the account",
@@ -27584,7 +27584,7 @@
27584
27584
  "varName": "userRef"
27585
27585
  },
27586
27586
  "usersGroup": {
27587
- "alias": "usersGroupRefUsersGroup: usersGroup",
27587
+ "alias": "usersGroupInternetFirewallSource: usersGroup",
27588
27588
  "args": {},
27589
27589
  "deprecationReason": null,
27590
27590
  "description": "Group of users",
@@ -27679,7 +27679,7 @@
27679
27679
  "varName": "internetFirewallSource"
27680
27680
  },
27681
27681
  "tracking": {
27682
- "alias": "policyTrackingTracking: tracking",
27682
+ "alias": "trackingInternetFirewallRule: tracking",
27683
27683
  "args": {},
27684
27684
  "deprecationReason": null,
27685
27685
  "description": "Tracking information when the rule is matched, such as events and notifications",
@@ -27696,7 +27696,7 @@
27696
27696
  "enumValues": null,
27697
27697
  "fields": {
27698
27698
  "alert": {
27699
- "alias": "policyRuleTrackingAlertAlert: alert",
27699
+ "alias": "alertPolicyTracking: alert",
27700
27700
  "args": {},
27701
27701
  "deprecationReason": null,
27702
27702
  "description": null,
@@ -27715,7 +27715,7 @@
27715
27715
  "enabled": {
27716
27716
  "args": {},
27717
27717
  "deprecationReason": null,
27718
- "description": "TRUE send alerts when the rule is matched, FALSE don’t send alerts when the rule is matched",
27718
+ "description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
27719
27719
  "id_str": "internetFirewall___updateRule___rule___rule___tracking___alert___enabled",
27720
27720
  "isDeprecated": false,
27721
27721
  "name": "enabled",
@@ -27734,7 +27734,7 @@
27734
27734
  "varName": "enabled"
27735
27735
  },
27736
27736
  "frequency": {
27737
- "alias": "policyRuleTrackingFrequencyEnumFrequency: frequency",
27737
+ "alias": "frequencyPolicyRuleTrackingAlert: frequency",
27738
27738
  "args": {},
27739
27739
  "deprecationReason": null,
27740
27740
  "description": "Returns data for the alert frequency",
@@ -27792,7 +27792,7 @@
27792
27792
  "varName": "frequency"
27793
27793
  },
27794
27794
  "mailingList": {
27795
- "alias": "subscriptionMailingListRefMailingList: mailingList",
27795
+ "alias": "mailingListPolicyRuleTrackingAlert: mailingList",
27796
27796
  "args": {},
27797
27797
  "deprecationReason": null,
27798
27798
  "description": "Returns data for the Mailing List that receives the alert",
@@ -27870,7 +27870,7 @@
27870
27870
  "varName": "subscriptionMailingListRef"
27871
27871
  },
27872
27872
  "subscriptionGroup": {
27873
- "alias": "subscriptionGroupRefSubscriptionGroup: subscriptionGroup",
27873
+ "alias": "subscriptionGroupPolicyRuleTrackingAlert: subscriptionGroup",
27874
27874
  "args": {},
27875
27875
  "deprecationReason": null,
27876
27876
  "description": "Returns data for the Subscription Group that receives the alert",
@@ -27948,7 +27948,7 @@
27948
27948
  "varName": "subscriptionGroupRef"
27949
27949
  },
27950
27950
  "webhook": {
27951
- "alias": "subscriptionWebhookRefWebhook: webhook",
27951
+ "alias": "webhookPolicyRuleTrackingAlert: webhook",
27952
27952
  "args": {},
27953
27953
  "deprecationReason": null,
27954
27954
  "description": "Returns data for the Webhook that receives the alert",
@@ -28043,7 +28043,7 @@
28043
28043
  "varName": "policyRuleTrackingAlert"
28044
28044
  },
28045
28045
  "event": {
28046
- "alias": "policyRuleTrackingEventEvent: event",
28046
+ "alias": "eventPolicyTracking: event",
28047
28047
  "args": {},
28048
28048
  "deprecationReason": null,
28049
28049
  "description": null,
@@ -28148,7 +28148,7 @@
28148
28148
  "varName": "internetFirewallRulePayload"
28149
28149
  },
28150
28150
  "status": {
28151
- "alias": "policyMutationStatusStatus: status",
28151
+ "alias": "statusInternetFirewallRuleMutationPayload: status",
28152
28152
  "args": {},
28153
28153
  "deprecationReason": null,
28154
28154
  "description": null,