scc-firewall-manager-sdk 1.13.665__py3-none-any.whl → 1.13.666__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of scc-firewall-manager-sdk might be problematic. Click here for more details.

Files changed (31) hide show
  1. scc_firewall_manager_sdk/__init__.py +23 -1
  2. scc_firewall_manager_sdk/api/__init__.py +1 -0
  3. scc_firewall_manager_sdk/api/asa_interfaces_api.py +6565 -0
  4. scc_firewall_manager_sdk/api_client.py +1 -1
  5. scc_firewall_manager_sdk/configuration.py +1 -1
  6. scc_firewall_manager_sdk/models/__init__.py +21 -0
  7. scc_firewall_manager_sdk/models/asa_interface.py +184 -0
  8. scc_firewall_manager_sdk/models/asa_interface_page.py +102 -0
  9. scc_firewall_manager_sdk/models/duplex_type.py +39 -0
  10. scc_firewall_manager_sdk/models/ether_channel_interface_create_input.py +132 -0
  11. scc_firewall_manager_sdk/models/ether_channel_interface_patch_input.py +130 -0
  12. scc_firewall_manager_sdk/models/interface_ip_address.py +94 -0
  13. scc_firewall_manager_sdk/models/interface_ipv4_address.py +95 -0
  14. scc_firewall_manager_sdk/models/interface_ipv6_address.py +109 -0
  15. scc_firewall_manager_sdk/models/interface_mode.py +39 -0
  16. scc_firewall_manager_sdk/models/interface_runtime_data.py +101 -0
  17. scc_firewall_manager_sdk/models/interface_type.py +41 -0
  18. scc_firewall_manager_sdk/models/ip_type.py +39 -0
  19. scc_firewall_manager_sdk/models/link_state.py +38 -0
  20. scc_firewall_manager_sdk/models/physical_interface_patch_input.py +125 -0
  21. scc_firewall_manager_sdk/models/speed_type.py +41 -0
  22. scc_firewall_manager_sdk/models/sub_interface_create_input.py +130 -0
  23. scc_firewall_manager_sdk/models/sub_interface_patch_input.py +116 -0
  24. scc_firewall_manager_sdk/models/switch_port_config.py +94 -0
  25. scc_firewall_manager_sdk/models/vlan_id_range.py +90 -0
  26. scc_firewall_manager_sdk/models/vlan_interface_create_input.py +120 -0
  27. scc_firewall_manager_sdk/models/vlan_interface_patch_input.py +118 -0
  28. {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.666.dist-info}/METADATA +1 -1
  29. {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.666.dist-info}/RECORD +31 -9
  30. {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.666.dist-info}/WHEEL +0 -0
  31. {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.666.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,130 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.13.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr, field_validator
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from scc_firewall_manager_sdk.models.interface_ipv4_address import InterfaceIpv4Address
24
+ from scc_firewall_manager_sdk.models.interface_ipv6_address import InterfaceIpv6Address
25
+ from typing import Optional, Set
26
+ from typing_extensions import Self
27
+
28
+ class EtherChannelInterfacePatchInput(BaseModel):
29
+ """
30
+ EtherChannelInterfacePatchInput
31
+ """ # noqa: E501
32
+ description: Optional[StrictStr] = Field(default=None, description="The description of the interface.")
33
+ enabled: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface is enabled.")
34
+ ipv4: Optional[InterfaceIpv4Address] = None
35
+ ipv6: Optional[InterfaceIpv6Address] = None
36
+ lacp_mode: Optional[StrictStr] = Field(default=None, description="The Link Aggregation Control Protocol (LACP) mode of the EtherChannel interface.", alias="lacpMode")
37
+ mac_address: Optional[StrictStr] = Field(default=None, description="The interface Media Access Control (MAC) address, a unique hardware identifier assigned to each physical interface. it is used for Layer 2 communication within a network segment.", alias="macAddress")
38
+ management_only: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface is exclusively used for management traffic and does not carry regular user or data traffic", alias="managementOnly")
39
+ member_interfaces: Optional[List[StrictStr]] = Field(default=None, description="The set of unique identifiers, represented as UUIDs, of the member interfaces that are part of the EtherChannel group.", alias="memberInterfaces")
40
+ monitor_interface: Optional[StrictBool] = Field(default=None, description="Indicates if the interface is actively monitored for checking its operational status and health as part of an HA setup. It helps determine if the interface is functioning correctly and whether a failover to a standby device should be triggered in case of failure.", alias="monitorInterface")
41
+ mtu: Optional[StrictInt] = Field(default=None, description="The interface MTU (Maximum Transmission Unit), the largest size, in bytes, of a packet or frame that can be sent over a network interface without needing to be fragmented. It defines the maximum payload size that the interface can handle in a single transmission.")
42
+ name: Optional[StrictStr] = Field(default=None, description="The logical name of the interface. Interface names are unique in the scope of the device.")
43
+ security_level: Optional[StrictInt] = Field(default=None, description="Indicates the interface trust level, ranging from 0 (lowest) to 100 (highest).", alias="securityLevel")
44
+ standby_mac_address: Optional[StrictStr] = Field(default=None, description="The standby interface Media Access Control (MAC) address, for use in a high-availability (HA) pair.", alias="standbyMacAddress")
45
+ __properties: ClassVar[List[str]] = ["description", "enabled", "ipv4", "ipv6", "lacpMode", "macAddress", "managementOnly", "memberInterfaces", "monitorInterface", "mtu", "name", "securityLevel", "standbyMacAddress"]
46
+
47
+ @field_validator('lacp_mode')
48
+ def lacp_mode_validate_enum(cls, value):
49
+ """Validates the enum"""
50
+ if value is None:
51
+ return value
52
+
53
+ if value not in set(['ACTIVE', 'PASSIVE', 'ON']):
54
+ raise ValueError("must be one of enum values ('ACTIVE', 'PASSIVE', 'ON')")
55
+ return value
56
+
57
+ model_config = ConfigDict(
58
+ populate_by_name=True,
59
+ validate_assignment=True,
60
+ protected_namespaces=(),
61
+ )
62
+
63
+
64
+ def to_str(self) -> str:
65
+ """Returns the string representation of the model using alias"""
66
+ return pprint.pformat(self.model_dump(by_alias=True))
67
+
68
+ def to_json(self) -> str:
69
+ """Returns the JSON representation of the model using alias"""
70
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
71
+ return json.dumps(self.to_dict())
72
+
73
+ @classmethod
74
+ def from_json(cls, json_str: str) -> Optional[Self]:
75
+ """Create an instance of EtherChannelInterfacePatchInput from a JSON string"""
76
+ return cls.from_dict(json.loads(json_str))
77
+
78
+ def to_dict(self) -> Dict[str, Any]:
79
+ """Return the dictionary representation of the model using alias.
80
+
81
+ This has the following differences from calling pydantic's
82
+ `self.model_dump(by_alias=True)`:
83
+
84
+ * `None` is only added to the output dict for nullable fields that
85
+ were set at model initialization. Other fields with value `None`
86
+ are ignored.
87
+ """
88
+ excluded_fields: Set[str] = set([
89
+ ])
90
+
91
+ _dict = self.model_dump(
92
+ by_alias=True,
93
+ exclude=excluded_fields,
94
+ exclude_none=True,
95
+ )
96
+ # override the default output from pydantic by calling `to_dict()` of ipv4
97
+ if self.ipv4:
98
+ _dict['ipv4'] = self.ipv4.to_dict()
99
+ # override the default output from pydantic by calling `to_dict()` of ipv6
100
+ if self.ipv6:
101
+ _dict['ipv6'] = self.ipv6.to_dict()
102
+ return _dict
103
+
104
+ @classmethod
105
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
106
+ """Create an instance of EtherChannelInterfacePatchInput from a dict"""
107
+ if obj is None:
108
+ return None
109
+
110
+ if not isinstance(obj, dict):
111
+ return cls.model_validate(obj)
112
+
113
+ _obj = cls.model_validate({
114
+ "description": obj.get("description"),
115
+ "enabled": obj.get("enabled"),
116
+ "ipv4": InterfaceIpv4Address.from_dict(obj["ipv4"]) if obj.get("ipv4") is not None else None,
117
+ "ipv6": InterfaceIpv6Address.from_dict(obj["ipv6"]) if obj.get("ipv6") is not None else None,
118
+ "lacpMode": obj.get("lacpMode"),
119
+ "macAddress": obj.get("macAddress"),
120
+ "managementOnly": obj.get("managementOnly"),
121
+ "memberInterfaces": obj.get("memberInterfaces"),
122
+ "monitorInterface": obj.get("monitorInterface"),
123
+ "mtu": obj.get("mtu"),
124
+ "name": obj.get("name"),
125
+ "securityLevel": obj.get("securityLevel"),
126
+ "standbyMacAddress": obj.get("standbyMacAddress")
127
+ })
128
+ return _obj
129
+
130
+
@@ -0,0 +1,94 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.13.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from typing import Optional, Set
24
+ from typing_extensions import Self
25
+
26
+ class InterfaceIpAddress(BaseModel):
27
+ """
28
+ InterfaceIpAddress
29
+ """ # noqa: E501
30
+ ip_address: Optional[StrictStr] = Field(default=None, description="A unique network address assigned to a physical or logical port, enabling it to communicate on a specific network segment and enforce security policies for traffic traversing that interface.", alias="ipAddress")
31
+ netmask: Optional[StrictStr] = Field(default=None, description="A 32-bit number that defines the network portion of the IP address, differentiating it from the host portion. It determines the size of the local network segment directly connected to that interface, allowing to identify which traffic belongs to its local network and which needs to be routed.")
32
+ setroute: Optional[StrictBool] = Field(default=None, description="Indicates whether a default route using the gateway information provided by the DHCP server is created automatically. Essentially, the DHCP-assigned gateway is used as the next-hop for routing traffic")
33
+ standby_ip_address: Optional[StrictStr] = Field(default=None, description="A secondary IP address configured on an interface, specifically for use in a high-availability (HA) pair. This address remains inactive on the standby unit until a failover occurs, at which point the standby assumes ownership of this IP address (along with the primary IP) to maintain network connectivity for devices.", alias="standbyIpAddress")
34
+ __properties: ClassVar[List[str]] = ["ipAddress", "netmask", "setroute", "standbyIpAddress"]
35
+
36
+ model_config = ConfigDict(
37
+ populate_by_name=True,
38
+ validate_assignment=True,
39
+ protected_namespaces=(),
40
+ )
41
+
42
+
43
+ def to_str(self) -> str:
44
+ """Returns the string representation of the model using alias"""
45
+ return pprint.pformat(self.model_dump(by_alias=True))
46
+
47
+ def to_json(self) -> str:
48
+ """Returns the JSON representation of the model using alias"""
49
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
50
+ return json.dumps(self.to_dict())
51
+
52
+ @classmethod
53
+ def from_json(cls, json_str: str) -> Optional[Self]:
54
+ """Create an instance of InterfaceIpAddress from a JSON string"""
55
+ return cls.from_dict(json.loads(json_str))
56
+
57
+ def to_dict(self) -> Dict[str, Any]:
58
+ """Return the dictionary representation of the model using alias.
59
+
60
+ This has the following differences from calling pydantic's
61
+ `self.model_dump(by_alias=True)`:
62
+
63
+ * `None` is only added to the output dict for nullable fields that
64
+ were set at model initialization. Other fields with value `None`
65
+ are ignored.
66
+ """
67
+ excluded_fields: Set[str] = set([
68
+ ])
69
+
70
+ _dict = self.model_dump(
71
+ by_alias=True,
72
+ exclude=excluded_fields,
73
+ exclude_none=True,
74
+ )
75
+ return _dict
76
+
77
+ @classmethod
78
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
79
+ """Create an instance of InterfaceIpAddress from a dict"""
80
+ if obj is None:
81
+ return None
82
+
83
+ if not isinstance(obj, dict):
84
+ return cls.model_validate(obj)
85
+
86
+ _obj = cls.model_validate({
87
+ "ipAddress": obj.get("ipAddress"),
88
+ "netmask": obj.get("netmask"),
89
+ "setroute": obj.get("setroute"),
90
+ "standbyIpAddress": obj.get("standbyIpAddress")
91
+ })
92
+ return _obj
93
+
94
+
@@ -0,0 +1,95 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.13.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from scc_firewall_manager_sdk.models.interface_ip_address import InterfaceIpAddress
24
+ from scc_firewall_manager_sdk.models.ip_type import IpType
25
+ from typing import Optional, Set
26
+ from typing_extensions import Self
27
+
28
+ class InterfaceIpv4Address(BaseModel):
29
+ """
30
+ InterfaceIpv4Address
31
+ """ # noqa: E501
32
+ ip_address: Optional[InterfaceIpAddress] = Field(default=None, alias="ipAddress")
33
+ ip_type: Optional[IpType] = Field(default=None, alias="ipType")
34
+ __properties: ClassVar[List[str]] = ["ipAddress", "ipType"]
35
+
36
+ model_config = ConfigDict(
37
+ populate_by_name=True,
38
+ validate_assignment=True,
39
+ protected_namespaces=(),
40
+ )
41
+
42
+
43
+ def to_str(self) -> str:
44
+ """Returns the string representation of the model using alias"""
45
+ return pprint.pformat(self.model_dump(by_alias=True))
46
+
47
+ def to_json(self) -> str:
48
+ """Returns the JSON representation of the model using alias"""
49
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
50
+ return json.dumps(self.to_dict())
51
+
52
+ @classmethod
53
+ def from_json(cls, json_str: str) -> Optional[Self]:
54
+ """Create an instance of InterfaceIpv4Address from a JSON string"""
55
+ return cls.from_dict(json.loads(json_str))
56
+
57
+ def to_dict(self) -> Dict[str, Any]:
58
+ """Return the dictionary representation of the model using alias.
59
+
60
+ This has the following differences from calling pydantic's
61
+ `self.model_dump(by_alias=True)`:
62
+
63
+ * `None` is only added to the output dict for nullable fields that
64
+ were set at model initialization. Other fields with value `None`
65
+ are ignored.
66
+ """
67
+ excluded_fields: Set[str] = set([
68
+ ])
69
+
70
+ _dict = self.model_dump(
71
+ by_alias=True,
72
+ exclude=excluded_fields,
73
+ exclude_none=True,
74
+ )
75
+ # override the default output from pydantic by calling `to_dict()` of ip_address
76
+ if self.ip_address:
77
+ _dict['ipAddress'] = self.ip_address.to_dict()
78
+ return _dict
79
+
80
+ @classmethod
81
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
82
+ """Create an instance of InterfaceIpv4Address from a dict"""
83
+ if obj is None:
84
+ return None
85
+
86
+ if not isinstance(obj, dict):
87
+ return cls.model_validate(obj)
88
+
89
+ _obj = cls.model_validate({
90
+ "ipAddress": InterfaceIpAddress.from_dict(obj["ipAddress"]) if obj.get("ipAddress") is not None else None,
91
+ "ipType": obj.get("ipType")
92
+ })
93
+ return _obj
94
+
95
+
@@ -0,0 +1,109 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.13.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from scc_firewall_manager_sdk.models.interface_ip_address import InterfaceIpAddress
24
+ from typing import Optional, Set
25
+ from typing_extensions import Self
26
+
27
+ class InterfaceIpv6Address(BaseModel):
28
+ """
29
+ InterfaceIpv6Address
30
+ """ # noqa: E501
31
+ auto_config: Optional[StrictBool] = Field(default=None, description="Indicates whether the address is automatically configured.", alias="autoConfig")
32
+ dad_attempts: Optional[StrictInt] = Field(default=None, description="Indicates how many times the device performs Duplicate Address Detection (DAD) to verify the uniqueness of an address before assigning the IPv6 address. Range is 0-600.", alias="dadAttempts")
33
+ enabled: Optional[StrictBool] = Field(default=None, description="Indicates whether IPV6 is enabled on the interface.")
34
+ ip_addresses: Optional[List[InterfaceIpAddress]] = Field(default=None, description="List of IPV6 addresses assigned to the interface.", alias="ipAddresses")
35
+ link_local_address: Optional[InterfaceIpAddress] = Field(default=None, alias="linkLocalAddress")
36
+ suppress_ra: Optional[StrictBool] = Field(default=None, description="Indicates whether to suppress router advertisements.", alias="suppressRA")
37
+ __properties: ClassVar[List[str]] = ["autoConfig", "dadAttempts", "enabled", "ipAddresses", "linkLocalAddress", "suppressRA"]
38
+
39
+ model_config = ConfigDict(
40
+ populate_by_name=True,
41
+ validate_assignment=True,
42
+ protected_namespaces=(),
43
+ )
44
+
45
+
46
+ def to_str(self) -> str:
47
+ """Returns the string representation of the model using alias"""
48
+ return pprint.pformat(self.model_dump(by_alias=True))
49
+
50
+ def to_json(self) -> str:
51
+ """Returns the JSON representation of the model using alias"""
52
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
53
+ return json.dumps(self.to_dict())
54
+
55
+ @classmethod
56
+ def from_json(cls, json_str: str) -> Optional[Self]:
57
+ """Create an instance of InterfaceIpv6Address from a JSON string"""
58
+ return cls.from_dict(json.loads(json_str))
59
+
60
+ def to_dict(self) -> Dict[str, Any]:
61
+ """Return the dictionary representation of the model using alias.
62
+
63
+ This has the following differences from calling pydantic's
64
+ `self.model_dump(by_alias=True)`:
65
+
66
+ * `None` is only added to the output dict for nullable fields that
67
+ were set at model initialization. Other fields with value `None`
68
+ are ignored.
69
+ """
70
+ excluded_fields: Set[str] = set([
71
+ ])
72
+
73
+ _dict = self.model_dump(
74
+ by_alias=True,
75
+ exclude=excluded_fields,
76
+ exclude_none=True,
77
+ )
78
+ # override the default output from pydantic by calling `to_dict()` of each item in ip_addresses (list)
79
+ _items = []
80
+ if self.ip_addresses:
81
+ for _item in self.ip_addresses:
82
+ if _item:
83
+ _items.append(_item.to_dict())
84
+ _dict['ipAddresses'] = _items
85
+ # override the default output from pydantic by calling `to_dict()` of link_local_address
86
+ if self.link_local_address:
87
+ _dict['linkLocalAddress'] = self.link_local_address.to_dict()
88
+ return _dict
89
+
90
+ @classmethod
91
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
92
+ """Create an instance of InterfaceIpv6Address from a dict"""
93
+ if obj is None:
94
+ return None
95
+
96
+ if not isinstance(obj, dict):
97
+ return cls.model_validate(obj)
98
+
99
+ _obj = cls.model_validate({
100
+ "autoConfig": obj.get("autoConfig"),
101
+ "dadAttempts": obj.get("dadAttempts"),
102
+ "enabled": obj.get("enabled"),
103
+ "ipAddresses": [InterfaceIpAddress.from_dict(_item) for _item in obj["ipAddresses"]] if obj.get("ipAddresses") is not None else None,
104
+ "linkLocalAddress": InterfaceIpAddress.from_dict(obj["linkLocalAddress"]) if obj.get("linkLocalAddress") is not None else None,
105
+ "suppressRA": obj.get("suppressRA")
106
+ })
107
+ return _obj
108
+
109
+
@@ -0,0 +1,39 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.13.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import json
18
+ from enum import Enum
19
+ from typing_extensions import Self
20
+
21
+
22
+ class InterfaceMode(str, Enum):
23
+ """
24
+ InterfaceMode
25
+ """
26
+
27
+ """
28
+ allowed enum values
29
+ """
30
+ ROUTED = 'ROUTED'
31
+ PASSIVE = 'PASSIVE'
32
+ SWITCHPORT = 'SWITCHPORT'
33
+
34
+ @classmethod
35
+ def from_json(cls, json_str: str) -> Self:
36
+ """Create an instance of InterfaceMode from a JSON string"""
37
+ return cls(json.loads(json_str))
38
+
39
+
@@ -0,0 +1,101 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.13.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from scc_firewall_manager_sdk.models.link_state import LinkState
24
+ from typing import Optional, Set
25
+ from typing_extensions import Self
26
+
27
+ class InterfaceRuntimeData(BaseModel):
28
+ """
29
+ InterfaceRuntimeData
30
+ """ # noqa: E501
31
+ duplex_type: Optional[StrictStr] = Field(default=None, description="The actual duplex mode of the physical interface.", alias="duplexType")
32
+ ip_address: Optional[StrictStr] = Field(default=None, description="The actual IP address of the interface.", alias="ipAddress")
33
+ link_enabled: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface link is enabled.", alias="linkEnabled")
34
+ link_state: Optional[LinkState] = Field(default=None, alias="linkState")
35
+ mac_address: Optional[StrictStr] = Field(default=None, description="The actual Media Access Control (MAC) address of the interface.", alias="macAddress")
36
+ mtu: Optional[StrictInt] = Field(default=None, description="The actual MTU (Maximum Transmission Unit) of the interface.")
37
+ speed_type: Optional[StrictStr] = Field(default=None, description="The actual speed of the physical interface.", alias="speedType")
38
+ __properties: ClassVar[List[str]] = ["duplexType", "ipAddress", "linkEnabled", "linkState", "macAddress", "mtu", "speedType"]
39
+
40
+ model_config = ConfigDict(
41
+ populate_by_name=True,
42
+ validate_assignment=True,
43
+ protected_namespaces=(),
44
+ )
45
+
46
+
47
+ def to_str(self) -> str:
48
+ """Returns the string representation of the model using alias"""
49
+ return pprint.pformat(self.model_dump(by_alias=True))
50
+
51
+ def to_json(self) -> str:
52
+ """Returns the JSON representation of the model using alias"""
53
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
54
+ return json.dumps(self.to_dict())
55
+
56
+ @classmethod
57
+ def from_json(cls, json_str: str) -> Optional[Self]:
58
+ """Create an instance of InterfaceRuntimeData from a JSON string"""
59
+ return cls.from_dict(json.loads(json_str))
60
+
61
+ def to_dict(self) -> Dict[str, Any]:
62
+ """Return the dictionary representation of the model using alias.
63
+
64
+ This has the following differences from calling pydantic's
65
+ `self.model_dump(by_alias=True)`:
66
+
67
+ * `None` is only added to the output dict for nullable fields that
68
+ were set at model initialization. Other fields with value `None`
69
+ are ignored.
70
+ """
71
+ excluded_fields: Set[str] = set([
72
+ ])
73
+
74
+ _dict = self.model_dump(
75
+ by_alias=True,
76
+ exclude=excluded_fields,
77
+ exclude_none=True,
78
+ )
79
+ return _dict
80
+
81
+ @classmethod
82
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
83
+ """Create an instance of InterfaceRuntimeData from a dict"""
84
+ if obj is None:
85
+ return None
86
+
87
+ if not isinstance(obj, dict):
88
+ return cls.model_validate(obj)
89
+
90
+ _obj = cls.model_validate({
91
+ "duplexType": obj.get("duplexType"),
92
+ "ipAddress": obj.get("ipAddress"),
93
+ "linkEnabled": obj.get("linkEnabled"),
94
+ "linkState": obj.get("linkState"),
95
+ "macAddress": obj.get("macAddress"),
96
+ "mtu": obj.get("mtu"),
97
+ "speedType": obj.get("speedType")
98
+ })
99
+ return _obj
100
+
101
+
@@ -0,0 +1,41 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.13.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import json
18
+ from enum import Enum
19
+ from typing_extensions import Self
20
+
21
+
22
+ class InterfaceType(str, Enum):
23
+ """
24
+ InterfaceType
25
+ """
26
+
27
+ """
28
+ allowed enum values
29
+ """
30
+ PHYSICAL_INTERFACE = 'PHYSICAL_INTERFACE'
31
+ SUB_INTERFACE = 'SUB_INTERFACE'
32
+ VIRTUAL_TUNNEL_INTERFACE = 'VIRTUAL_TUNNEL_INTERFACE'
33
+ VLAN_INTERFACE = 'VLAN_INTERFACE'
34
+ ETHER_CHANNEL_INTERFACE = 'ETHER_CHANNEL_INTERFACE'
35
+
36
+ @classmethod
37
+ def from_json(cls, json_str: str) -> Self:
38
+ """Create an instance of InterfaceType from a JSON string"""
39
+ return cls(json.loads(json_str))
40
+
41
+
@@ -0,0 +1,39 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.13.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import json
18
+ from enum import Enum
19
+ from typing_extensions import Self
20
+
21
+
22
+ class IpType(str, Enum):
23
+ """
24
+ IpType
25
+ """
26
+
27
+ """
28
+ allowed enum values
29
+ """
30
+ STATIC = 'STATIC'
31
+ DHCP = 'DHCP'
32
+ PPPOE = 'PPPOE'
33
+
34
+ @classmethod
35
+ def from_json(cls, json_str: str) -> Self:
36
+ """Create an instance of IpType from a JSON string"""
37
+ return cls(json.loads(json_str))
38
+
39
+