scc-firewall-manager-sdk 1.13.665__py3-none-any.whl → 1.13.667__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of scc-firewall-manager-sdk might be problematic. Click here for more details.
- scc_firewall_manager_sdk/__init__.py +23 -1
- scc_firewall_manager_sdk/api/__init__.py +1 -0
- scc_firewall_manager_sdk/api/asa_interfaces_api.py +6565 -0
- scc_firewall_manager_sdk/api_client.py +1 -1
- scc_firewall_manager_sdk/configuration.py +1 -1
- scc_firewall_manager_sdk/models/__init__.py +21 -0
- scc_firewall_manager_sdk/models/asa_interface.py +184 -0
- scc_firewall_manager_sdk/models/asa_interface_page.py +102 -0
- scc_firewall_manager_sdk/models/duplex_type.py +39 -0
- scc_firewall_manager_sdk/models/ether_channel_interface_create_input.py +132 -0
- scc_firewall_manager_sdk/models/ether_channel_interface_patch_input.py +130 -0
- scc_firewall_manager_sdk/models/interface_ip_address.py +94 -0
- scc_firewall_manager_sdk/models/interface_ipv4_address.py +95 -0
- scc_firewall_manager_sdk/models/interface_ipv6_address.py +109 -0
- scc_firewall_manager_sdk/models/interface_mode.py +39 -0
- scc_firewall_manager_sdk/models/interface_runtime_data.py +101 -0
- scc_firewall_manager_sdk/models/interface_type.py +41 -0
- scc_firewall_manager_sdk/models/ip_type.py +39 -0
- scc_firewall_manager_sdk/models/link_state.py +38 -0
- scc_firewall_manager_sdk/models/physical_interface_patch_input.py +125 -0
- scc_firewall_manager_sdk/models/speed_type.py +41 -0
- scc_firewall_manager_sdk/models/sub_interface_create_input.py +130 -0
- scc_firewall_manager_sdk/models/sub_interface_patch_input.py +116 -0
- scc_firewall_manager_sdk/models/switch_port_config.py +94 -0
- scc_firewall_manager_sdk/models/vlan_id_range.py +90 -0
- scc_firewall_manager_sdk/models/vlan_interface_create_input.py +120 -0
- scc_firewall_manager_sdk/models/vlan_interface_patch_input.py +118 -0
- {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.667.dist-info}/METADATA +1 -1
- {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.667.dist-info}/RECORD +31 -9
- {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.667.dist-info}/WHEEL +0 -0
- {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.667.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,120 @@
|
|
|
1
|
+
# coding: utf-8
|
|
2
|
+
|
|
3
|
+
"""
|
|
4
|
+
Cisco Security Cloud Control Firewall Manager API
|
|
5
|
+
|
|
6
|
+
Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
|
|
7
|
+
|
|
8
|
+
The version of the OpenAPI document: 1.13.0
|
|
9
|
+
Contact: cdo.tac@cisco.com
|
|
10
|
+
Generated by OpenAPI Generator (https://openapi-generator.tech)
|
|
11
|
+
|
|
12
|
+
Do not edit the class manually.
|
|
13
|
+
""" # noqa: E501
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
from __future__ import annotations
|
|
17
|
+
import pprint
|
|
18
|
+
import re # noqa: F401
|
|
19
|
+
import json
|
|
20
|
+
|
|
21
|
+
from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr
|
|
22
|
+
from typing import Any, ClassVar, Dict, List, Optional
|
|
23
|
+
from scc_firewall_manager_sdk.models.interface_ipv4_address import InterfaceIpv4Address
|
|
24
|
+
from scc_firewall_manager_sdk.models.interface_ipv6_address import InterfaceIpv6Address
|
|
25
|
+
from typing import Optional, Set
|
|
26
|
+
from typing_extensions import Self
|
|
27
|
+
|
|
28
|
+
class VlanInterfaceCreateInput(BaseModel):
|
|
29
|
+
"""
|
|
30
|
+
VlanInterfaceCreateInput
|
|
31
|
+
""" # noqa: E501
|
|
32
|
+
description: Optional[StrictStr] = Field(default=None, description="The description of the interface.")
|
|
33
|
+
enabled: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface is enabled.")
|
|
34
|
+
ipv4: Optional[InterfaceIpv4Address] = None
|
|
35
|
+
ipv6: Optional[InterfaceIpv6Address] = None
|
|
36
|
+
mac_address: Optional[StrictStr] = Field(default=None, description="The interface Media Access Control (MAC) address, a unique hardware identifier assigned to each physical interface. it is used for Layer 2 communication within a network segment.", alias="macAddress")
|
|
37
|
+
management_only: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface is exclusively used for management traffic and does not carry regular user or data traffic", alias="managementOnly")
|
|
38
|
+
member_interfaces: Optional[List[StrictStr]] = Field(default=None, description="The set of unique identifiers, represented as UUIDs, of the member interfaces that are part of the vlan group.", alias="memberInterfaces")
|
|
39
|
+
monitor_interface: Optional[StrictBool] = Field(default=None, description="Indicates if the interface is actively monitored for checking its operational status and health as part of an HA setup. It helps determine if the interface is functioning correctly and whether a failover to a standby device should be triggered in case of failure.", alias="monitorInterface")
|
|
40
|
+
mtu: Optional[StrictInt] = Field(default=None, description="The interface MTU (Maximum Transmission Unit), the largest size, in bytes, of a packet or frame that can be sent over a network interface without needing to be fragmented. It defines the maximum payload size that the interface can handle in a single transmission.")
|
|
41
|
+
name: Optional[StrictStr] = Field(default=None, description="The logical name of the interface. Interface names are unique in the scope of the device.")
|
|
42
|
+
security_level: Optional[StrictInt] = Field(default=None, description="Indicates the interface trust level, ranging from 0 (lowest) to 100 (highest).", alias="securityLevel")
|
|
43
|
+
standby_mac_address: Optional[StrictStr] = Field(default=None, description="The standby interface Media Access Control (MAC) address, for use in a high-availability (HA) pair.", alias="standbyMacAddress")
|
|
44
|
+
vlan_id: Optional[StrictInt] = Field(default=None, description="The unique identifier of the VLAN associated with the VLAN interface. Range is 1 - 4070.", alias="vlanId")
|
|
45
|
+
__properties: ClassVar[List[str]] = ["description", "enabled", "ipv4", "ipv6", "macAddress", "managementOnly", "memberInterfaces", "monitorInterface", "mtu", "name", "securityLevel", "standbyMacAddress", "vlanId"]
|
|
46
|
+
|
|
47
|
+
model_config = ConfigDict(
|
|
48
|
+
populate_by_name=True,
|
|
49
|
+
validate_assignment=True,
|
|
50
|
+
protected_namespaces=(),
|
|
51
|
+
)
|
|
52
|
+
|
|
53
|
+
|
|
54
|
+
def to_str(self) -> str:
|
|
55
|
+
"""Returns the string representation of the model using alias"""
|
|
56
|
+
return pprint.pformat(self.model_dump(by_alias=True))
|
|
57
|
+
|
|
58
|
+
def to_json(self) -> str:
|
|
59
|
+
"""Returns the JSON representation of the model using alias"""
|
|
60
|
+
# TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
|
|
61
|
+
return json.dumps(self.to_dict())
|
|
62
|
+
|
|
63
|
+
@classmethod
|
|
64
|
+
def from_json(cls, json_str: str) -> Optional[Self]:
|
|
65
|
+
"""Create an instance of VlanInterfaceCreateInput from a JSON string"""
|
|
66
|
+
return cls.from_dict(json.loads(json_str))
|
|
67
|
+
|
|
68
|
+
def to_dict(self) -> Dict[str, Any]:
|
|
69
|
+
"""Return the dictionary representation of the model using alias.
|
|
70
|
+
|
|
71
|
+
This has the following differences from calling pydantic's
|
|
72
|
+
`self.model_dump(by_alias=True)`:
|
|
73
|
+
|
|
74
|
+
* `None` is only added to the output dict for nullable fields that
|
|
75
|
+
were set at model initialization. Other fields with value `None`
|
|
76
|
+
are ignored.
|
|
77
|
+
"""
|
|
78
|
+
excluded_fields: Set[str] = set([
|
|
79
|
+
])
|
|
80
|
+
|
|
81
|
+
_dict = self.model_dump(
|
|
82
|
+
by_alias=True,
|
|
83
|
+
exclude=excluded_fields,
|
|
84
|
+
exclude_none=True,
|
|
85
|
+
)
|
|
86
|
+
# override the default output from pydantic by calling `to_dict()` of ipv4
|
|
87
|
+
if self.ipv4:
|
|
88
|
+
_dict['ipv4'] = self.ipv4.to_dict()
|
|
89
|
+
# override the default output from pydantic by calling `to_dict()` of ipv6
|
|
90
|
+
if self.ipv6:
|
|
91
|
+
_dict['ipv6'] = self.ipv6.to_dict()
|
|
92
|
+
return _dict
|
|
93
|
+
|
|
94
|
+
@classmethod
|
|
95
|
+
def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
|
|
96
|
+
"""Create an instance of VlanInterfaceCreateInput from a dict"""
|
|
97
|
+
if obj is None:
|
|
98
|
+
return None
|
|
99
|
+
|
|
100
|
+
if not isinstance(obj, dict):
|
|
101
|
+
return cls.model_validate(obj)
|
|
102
|
+
|
|
103
|
+
_obj = cls.model_validate({
|
|
104
|
+
"description": obj.get("description"),
|
|
105
|
+
"enabled": obj.get("enabled"),
|
|
106
|
+
"ipv4": InterfaceIpv4Address.from_dict(obj["ipv4"]) if obj.get("ipv4") is not None else None,
|
|
107
|
+
"ipv6": InterfaceIpv6Address.from_dict(obj["ipv6"]) if obj.get("ipv6") is not None else None,
|
|
108
|
+
"macAddress": obj.get("macAddress"),
|
|
109
|
+
"managementOnly": obj.get("managementOnly"),
|
|
110
|
+
"memberInterfaces": obj.get("memberInterfaces"),
|
|
111
|
+
"monitorInterface": obj.get("monitorInterface"),
|
|
112
|
+
"mtu": obj.get("mtu"),
|
|
113
|
+
"name": obj.get("name"),
|
|
114
|
+
"securityLevel": obj.get("securityLevel"),
|
|
115
|
+
"standbyMacAddress": obj.get("standbyMacAddress"),
|
|
116
|
+
"vlanId": obj.get("vlanId")
|
|
117
|
+
})
|
|
118
|
+
return _obj
|
|
119
|
+
|
|
120
|
+
|
|
@@ -0,0 +1,118 @@
|
|
|
1
|
+
# coding: utf-8
|
|
2
|
+
|
|
3
|
+
"""
|
|
4
|
+
Cisco Security Cloud Control Firewall Manager API
|
|
5
|
+
|
|
6
|
+
Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
|
|
7
|
+
|
|
8
|
+
The version of the OpenAPI document: 1.13.0
|
|
9
|
+
Contact: cdo.tac@cisco.com
|
|
10
|
+
Generated by OpenAPI Generator (https://openapi-generator.tech)
|
|
11
|
+
|
|
12
|
+
Do not edit the class manually.
|
|
13
|
+
""" # noqa: E501
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
from __future__ import annotations
|
|
17
|
+
import pprint
|
|
18
|
+
import re # noqa: F401
|
|
19
|
+
import json
|
|
20
|
+
|
|
21
|
+
from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr
|
|
22
|
+
from typing import Any, ClassVar, Dict, List, Optional
|
|
23
|
+
from scc_firewall_manager_sdk.models.interface_ipv4_address import InterfaceIpv4Address
|
|
24
|
+
from scc_firewall_manager_sdk.models.interface_ipv6_address import InterfaceIpv6Address
|
|
25
|
+
from typing import Optional, Set
|
|
26
|
+
from typing_extensions import Self
|
|
27
|
+
|
|
28
|
+
class VlanInterfacePatchInput(BaseModel):
|
|
29
|
+
"""
|
|
30
|
+
VlanInterfacePatchInput
|
|
31
|
+
""" # noqa: E501
|
|
32
|
+
description: Optional[StrictStr] = Field(default=None, description="The description of the interface.")
|
|
33
|
+
enabled: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface is enabled.")
|
|
34
|
+
ipv4: Optional[InterfaceIpv4Address] = None
|
|
35
|
+
ipv6: Optional[InterfaceIpv6Address] = None
|
|
36
|
+
mac_address: Optional[StrictStr] = Field(default=None, description="The interface Media Access Control (MAC) address, a unique hardware identifier assigned to each physical interface. it is used for Layer 2 communication within a network segment.", alias="macAddress")
|
|
37
|
+
management_only: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface is exclusively used for management traffic and does not carry regular user or data traffic", alias="managementOnly")
|
|
38
|
+
member_interfaces: Optional[List[StrictStr]] = Field(default=None, description="The set of unique identifiers, represented as UUIDs, of the member interfaces that are part of the vlan group.", alias="memberInterfaces")
|
|
39
|
+
monitor_interface: Optional[StrictBool] = Field(default=None, description="Indicates if the interface is actively monitored for checking its operational status and health as part of an HA setup. It helps determine if the interface is functioning correctly and whether a failover to a standby device should be triggered in case of failure.", alias="monitorInterface")
|
|
40
|
+
mtu: Optional[StrictInt] = Field(default=None, description="The interface MTU (Maximum Transmission Unit), the largest size, in bytes, of a packet or frame that can be sent over a network interface without needing to be fragmented. It defines the maximum payload size that the interface can handle in a single transmission.")
|
|
41
|
+
name: Optional[StrictStr] = Field(default=None, description="The logical name of the interface. Interface names are unique in the scope of the device.")
|
|
42
|
+
security_level: Optional[StrictInt] = Field(default=None, description="Indicates the interface trust level, ranging from 0 (lowest) to 100 (highest).", alias="securityLevel")
|
|
43
|
+
standby_mac_address: Optional[StrictStr] = Field(default=None, description="The standby interface Media Access Control (MAC) address, for use in a high-availability (HA) pair.", alias="standbyMacAddress")
|
|
44
|
+
__properties: ClassVar[List[str]] = ["description", "enabled", "ipv4", "ipv6", "macAddress", "managementOnly", "memberInterfaces", "monitorInterface", "mtu", "name", "securityLevel", "standbyMacAddress"]
|
|
45
|
+
|
|
46
|
+
model_config = ConfigDict(
|
|
47
|
+
populate_by_name=True,
|
|
48
|
+
validate_assignment=True,
|
|
49
|
+
protected_namespaces=(),
|
|
50
|
+
)
|
|
51
|
+
|
|
52
|
+
|
|
53
|
+
def to_str(self) -> str:
|
|
54
|
+
"""Returns the string representation of the model using alias"""
|
|
55
|
+
return pprint.pformat(self.model_dump(by_alias=True))
|
|
56
|
+
|
|
57
|
+
def to_json(self) -> str:
|
|
58
|
+
"""Returns the JSON representation of the model using alias"""
|
|
59
|
+
# TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
|
|
60
|
+
return json.dumps(self.to_dict())
|
|
61
|
+
|
|
62
|
+
@classmethod
|
|
63
|
+
def from_json(cls, json_str: str) -> Optional[Self]:
|
|
64
|
+
"""Create an instance of VlanInterfacePatchInput from a JSON string"""
|
|
65
|
+
return cls.from_dict(json.loads(json_str))
|
|
66
|
+
|
|
67
|
+
def to_dict(self) -> Dict[str, Any]:
|
|
68
|
+
"""Return the dictionary representation of the model using alias.
|
|
69
|
+
|
|
70
|
+
This has the following differences from calling pydantic's
|
|
71
|
+
`self.model_dump(by_alias=True)`:
|
|
72
|
+
|
|
73
|
+
* `None` is only added to the output dict for nullable fields that
|
|
74
|
+
were set at model initialization. Other fields with value `None`
|
|
75
|
+
are ignored.
|
|
76
|
+
"""
|
|
77
|
+
excluded_fields: Set[str] = set([
|
|
78
|
+
])
|
|
79
|
+
|
|
80
|
+
_dict = self.model_dump(
|
|
81
|
+
by_alias=True,
|
|
82
|
+
exclude=excluded_fields,
|
|
83
|
+
exclude_none=True,
|
|
84
|
+
)
|
|
85
|
+
# override the default output from pydantic by calling `to_dict()` of ipv4
|
|
86
|
+
if self.ipv4:
|
|
87
|
+
_dict['ipv4'] = self.ipv4.to_dict()
|
|
88
|
+
# override the default output from pydantic by calling `to_dict()` of ipv6
|
|
89
|
+
if self.ipv6:
|
|
90
|
+
_dict['ipv6'] = self.ipv6.to_dict()
|
|
91
|
+
return _dict
|
|
92
|
+
|
|
93
|
+
@classmethod
|
|
94
|
+
def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
|
|
95
|
+
"""Create an instance of VlanInterfacePatchInput from a dict"""
|
|
96
|
+
if obj is None:
|
|
97
|
+
return None
|
|
98
|
+
|
|
99
|
+
if not isinstance(obj, dict):
|
|
100
|
+
return cls.model_validate(obj)
|
|
101
|
+
|
|
102
|
+
_obj = cls.model_validate({
|
|
103
|
+
"description": obj.get("description"),
|
|
104
|
+
"enabled": obj.get("enabled"),
|
|
105
|
+
"ipv4": InterfaceIpv4Address.from_dict(obj["ipv4"]) if obj.get("ipv4") is not None else None,
|
|
106
|
+
"ipv6": InterfaceIpv6Address.from_dict(obj["ipv6"]) if obj.get("ipv6") is not None else None,
|
|
107
|
+
"macAddress": obj.get("macAddress"),
|
|
108
|
+
"managementOnly": obj.get("managementOnly"),
|
|
109
|
+
"memberInterfaces": obj.get("memberInterfaces"),
|
|
110
|
+
"monitorInterface": obj.get("monitorInterface"),
|
|
111
|
+
"mtu": obj.get("mtu"),
|
|
112
|
+
"name": obj.get("name"),
|
|
113
|
+
"securityLevel": obj.get("securityLevel"),
|
|
114
|
+
"standbyMacAddress": obj.get("standbyMacAddress")
|
|
115
|
+
})
|
|
116
|
+
return _obj
|
|
117
|
+
|
|
118
|
+
|
{scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.667.dist-info}/RECORD
RENAMED
|
@@ -1,14 +1,15 @@
|
|
|
1
|
-
scc_firewall_manager_sdk/__init__.py,sha256=
|
|
2
|
-
scc_firewall_manager_sdk/api_client.py,sha256=
|
|
1
|
+
scc_firewall_manager_sdk/__init__.py,sha256=Er9bwl9yR1XiS9ivAs0-MT3LIhmcoywKcpCCRBuf-O4,20478
|
|
2
|
+
scc_firewall_manager_sdk/api_client.py,sha256=Wp1rJk-KMSNkSwt3ZGlhTEAKyBxXFPy_oeeimFp23Y0,25921
|
|
3
3
|
scc_firewall_manager_sdk/api_response.py,sha256=eMxw1mpmJcoGZ3gs9z6jM4oYoZ10Gjk333s9sKxGv7s,652
|
|
4
|
-
scc_firewall_manager_sdk/configuration.py,sha256=
|
|
4
|
+
scc_firewall_manager_sdk/configuration.py,sha256=i7v_5AJrV_46JP3ZLkvWQD9dfERZjhbubGmGnJPlgd4,15993
|
|
5
5
|
scc_firewall_manager_sdk/exceptions.py,sha256=J4sPW_b1AGNUeRyPnnDlVtb1b8kOKgDO6cCzCf1wDYg,6039
|
|
6
6
|
scc_firewall_manager_sdk/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
7
7
|
scc_firewall_manager_sdk/rest.py,sha256=fAq2gQ-7Y88YdlSxyPNV1I3fctDBTEU0DrBJapzVrNY,9309
|
|
8
|
-
scc_firewall_manager_sdk/api/__init__.py,sha256=
|
|
8
|
+
scc_firewall_manager_sdk/api/__init__.py,sha256=3ZQM438scTcj5--NONtwx5OkFtG8MQN2jZObh890hmI,1593
|
|
9
9
|
scc_firewall_manager_sdk/api/access_groups_api.py,sha256=CEykKYEoxyrknH-tyUBH6dtDrJCYl-3TLDeHS-TekVA,60379
|
|
10
10
|
scc_firewall_manager_sdk/api/ai_assistant_api.py,sha256=jspBnwvd6jkHoBhElAQjt7CQtD2ld0KCYM012Jb0ul8,60316
|
|
11
11
|
scc_firewall_manager_sdk/api/asa_access_rules_api.py,sha256=lAeLVkfooP5OMbImORu4kaRjjC-2_6XdoXp7kpfA7nQ,60329
|
|
12
|
+
scc_firewall_manager_sdk/api/asa_interfaces_api.py,sha256=8bSpl0GdCNeNT6WgdVRfV0O7VCT5W_yqoQBULzfTlXg,296112
|
|
12
13
|
scc_firewall_manager_sdk/api/audit_logs_api.py,sha256=37jQklNeuI06XtILKhYx7sBYTfehW0xEvJi5x9GZ30Q,20506
|
|
13
14
|
scc_firewall_manager_sdk/api/change_requests_api.py,sha256=CdfJmFTYUoCJiTucRyze5xIBopTD4CSB2Cyea2V_UB4,48560
|
|
14
15
|
scc_firewall_manager_sdk/api/changelogs_api.py,sha256=uPlM1uCK_WcqQiixpiHaEMoiEnf_MInb_10tuA6Kx8U,30875
|
|
@@ -26,7 +27,7 @@ scc_firewall_manager_sdk/api/search_api.py,sha256=V7waQrZ2Jz_xylLONUL_s3JF8Hj63C
|
|
|
26
27
|
scc_firewall_manager_sdk/api/tenant_management_api.py,sha256=dHMPKC1JBw1nLbGtHTsEpJRMHXAWmxbmGLDDOwANC0s,55069
|
|
27
28
|
scc_firewall_manager_sdk/api/transactions_api.py,sha256=5fVQMXzyMghn9Z3yiXgXbaE3eTwSC6ZC9vVJvESIb-A,12287
|
|
28
29
|
scc_firewall_manager_sdk/api/users_api.py,sha256=CO7rDpDlmwgh7dWNjYPDXghhhJZP3EhsC2nKe-JMbdo,191609
|
|
29
|
-
scc_firewall_manager_sdk/models/__init__.py,sha256=
|
|
30
|
+
scc_firewall_manager_sdk/models/__init__.py,sha256=0KP1SPzF2MQrImjVQ7sRukMjz1CGhDjOWWzcnsYNlIo,18296
|
|
30
31
|
scc_firewall_manager_sdk/models/access_group.py,sha256=eJVEMhIO65w2BNCcdIptHC6GtplLMGhpqgeci3MINc8,4583
|
|
31
32
|
scc_firewall_manager_sdk/models/access_group_create_input.py,sha256=mJdIwaxeDnqlvG5fyLo95BzoER97sF2inU99r2VoIbo,3930
|
|
32
33
|
scc_firewall_manager_sdk/models/access_group_page.py,sha256=5x8WJxs6-oGuqdp3weEw4Y2dET5v5h46gQ8umryJOZg,3725
|
|
@@ -51,6 +52,8 @@ scc_firewall_manager_sdk/models/asa_config.py,sha256=WLpmmsAEm6yqEmcFq7fiZWx_mED
|
|
|
51
52
|
scc_firewall_manager_sdk/models/asa_create_or_update_input.py,sha256=9nFsQQ1FmuU_pRr773UtQ0Puui7NBW1-tABtF2OoEgQ,4680
|
|
52
53
|
scc_firewall_manager_sdk/models/asa_failover_mate.py,sha256=uGxGY0QgQG8mPX4PvI7WU17cfuTqkYS3DlOYcn-g9sI,3499
|
|
53
54
|
scc_firewall_manager_sdk/models/asa_failover_mode.py,sha256=r5SXdE-y6iGqWECbQbsmLCtkBVW-CYr6QBVDgOT3boA,871
|
|
55
|
+
scc_firewall_manager_sdk/models/asa_interface.py,sha256=NwJd4EprHGJfloi3S6ixJjmNEsYiANDmso-59KKNqmc,12239
|
|
56
|
+
scc_firewall_manager_sdk/models/asa_interface_page.py,sha256=ZaHYH96amB_Wc8u2ellbeN6yeHZcOhACS5Al5qp5TKc,3733
|
|
54
57
|
scc_firewall_manager_sdk/models/audit_log.py,sha256=hei8LZg5sH3Oe2i8o9sYRvU2U-tHJt4J5zfW3C2tvds,4307
|
|
55
58
|
scc_firewall_manager_sdk/models/audit_log_page.py,sha256=JGhUfYq2eXn3cu-Ts4IwJadJiywcYvt9QCUYnwyWHnk,3701
|
|
56
59
|
scc_firewall_manager_sdk/models/authentication_error.py,sha256=LmWl8MoVS9OBbYaMnSGjIxdN8HOFjijGJusp4YxAGLw,2908
|
|
@@ -105,9 +108,12 @@ scc_firewall_manager_sdk/models/devices_patch_input.py,sha256=M2CPF1oUKTF_HLzEz4
|
|
|
105
108
|
scc_firewall_manager_sdk/models/disk_health_metrics.py,sha256=8I-zKX9YZR5yo_1T_S_lEsOzjRLeJDVjQ3HlfJvvhKc,2947
|
|
106
109
|
scc_firewall_manager_sdk/models/domain_settings.py,sha256=E1ZzpTa3EkS02wnsEAEjhvMz_QaNLekcZzgpXnin2ic,3852
|
|
107
110
|
scc_firewall_manager_sdk/models/duo_admin_panel_create_or_update_input.py,sha256=lGhpdfRiYljP8bZsYPuOefVn1fRGw8sJ0uOd4ncf6iQ,3828
|
|
111
|
+
scc_firewall_manager_sdk/models/duplex_type.py,sha256=ohYS8Sf7kZdZY1Wr2_G9WlRUOAYX1pYHnf74nVHIoRo,820
|
|
108
112
|
scc_firewall_manager_sdk/models/duplicate_group_dto.py,sha256=80hfmSnUoQJ4C6z_uw51ck6tuMZ6eD1Kr5Y76RjerAc,2960
|
|
109
113
|
scc_firewall_manager_sdk/models/entity.py,sha256=UuPWIWQeHDn2za0TeT456WG904jYOeG9oRMgDt-DkhI,3443
|
|
110
114
|
scc_firewall_manager_sdk/models/entity_type.py,sha256=jRoUXRD4Kkix9JngA3Y2dI0zB5yKgiAPQT64cAvqm0I,1450
|
|
115
|
+
scc_firewall_manager_sdk/models/ether_channel_interface_create_input.py,sha256=6HOlCRuYptg8Rd6UIxHQ2dpRXBLekYYAX3NreGSYVk8,7081
|
|
116
|
+
scc_firewall_manager_sdk/models/ether_channel_interface_patch_input.py,sha256=UGcnQtnRmE681tFyicd5kbZfNGBids97SxKzZfhkDMc,6826
|
|
111
117
|
scc_firewall_manager_sdk/models/event.py,sha256=Du3SPVn7n28Duo_UFztsezhc4Uui8QfvgmSrqAHdOUs,4548
|
|
112
118
|
scc_firewall_manager_sdk/models/fmc_access_policy_reference.py,sha256=xbcerPurdS-l2PtWlY51EdVSi5Eg3VQqddW0ZMhUoYY,2892
|
|
113
119
|
scc_firewall_manager_sdk/models/fmc_device_record.py,sha256=a_DRTZ1U1YHI16tj_tf5qWLH5dSf7UE_lb0QT4CugKc,2841
|
|
@@ -132,13 +138,21 @@ scc_firewall_manager_sdk/models/ha_node.py,sha256=artlA1Nhe0Sa5ohCVWYo8glywrqmi5
|
|
|
132
138
|
scc_firewall_manager_sdk/models/icmp4_value.py,sha256=I2L3G43XWn7In8lq3Cslgtbh6-2Sa2XMK9gP8S9vK90,6134
|
|
133
139
|
scc_firewall_manager_sdk/models/icmp6_value.py,sha256=HEhnouEGXSdplk5wyJZ0Z9bWMdO5H63BMsxxGbVFzfc,6452
|
|
134
140
|
scc_firewall_manager_sdk/models/interface_health_metrics.py,sha256=1_41-Kb6hOoAgqdJ19bUKpN1NRpDKPJQ7UMey_favuY,7435
|
|
141
|
+
scc_firewall_manager_sdk/models/interface_ip_address.py,sha256=LkbLcZP8unX7SOC5OqISNMmBbl4vGZYWwN4KwpTt6Do,4117
|
|
142
|
+
scc_firewall_manager_sdk/models/interface_ipv4_address.py,sha256=6Nn9zGQRMQp_LOrzOtWVChzjx9s1o2Gqv6NnGufgkSE,3160
|
|
143
|
+
scc_firewall_manager_sdk/models/interface_ipv6_address.py,sha256=JARd5ITTytp81ZkLwsF5XqITI-SrkCL7_JI0YbOPqIk,4661
|
|
144
|
+
scc_firewall_manager_sdk/models/interface_mode.py,sha256=STmII8flFtuWChs1ZeTqUgR6zh_5Yg-7T2_AvTqmSRA,851
|
|
145
|
+
scc_firewall_manager_sdk/models/interface_runtime_data.py,sha256=FVMQq66FucWZgs4oIukW41QtoLa7YvH8XUcTZab5RU4,3937
|
|
146
|
+
scc_firewall_manager_sdk/models/interface_type.py,sha256=sRNC2-DnIsDV8oefdYdI6GYyowfj6Hi2yl6DA70ttGM,1009
|
|
135
147
|
scc_firewall_manager_sdk/models/inventory.py,sha256=Jy9W-R0CM1VHrD21umzWpaDHHeF_iRBNt54c25Vmi7Q,4192
|
|
136
148
|
scc_firewall_manager_sdk/models/ios_create_or_update_input.py,sha256=zJd24vD4ZaPXrNa2iT_T6OnhJapGhvI2FlTdDwE4sAg,4401
|
|
149
|
+
scc_firewall_manager_sdk/models/ip_type.py,sha256=8INrkyNPHpQBGGA_Q1gsRc0eVcp_2UoeB1YohzzTrt0,814
|
|
137
150
|
scc_firewall_manager_sdk/models/issues_count.py,sha256=sD25x0f6QdbiERsirU2dbO-9yDklWx-hH5jTgUFLor4,3218
|
|
138
151
|
scc_firewall_manager_sdk/models/issues_dto.py,sha256=YwKSTVxuLdKNYJghreHQrB-115myum_M_GZM1AM-JSI,2834
|
|
139
152
|
scc_firewall_manager_sdk/models/json_web_key.py,sha256=CQzr0PqKBYNs9_A358woBfwW_ZMy8uIveKaFPSQC2W8,3363
|
|
140
153
|
scc_firewall_manager_sdk/models/jwk_set.py,sha256=ztEevTe_puqJUPQRUQS4Cy1Zz-ZQxGm6TPL1R3Qr16I,3030
|
|
141
154
|
scc_firewall_manager_sdk/models/labels.py,sha256=AbNrj-z_-i8aMC1eE0fEZxQqXIgsyrtFm6IFVNos06A,3034
|
|
155
|
+
scc_firewall_manager_sdk/models/link_state.py,sha256=NTXe50fPXlYuKf6qgsAvNrHqcO2hn2k9bOXf8JxgqsI,795
|
|
142
156
|
scc_firewall_manager_sdk/models/list_object_response.py,sha256=sOckFVlkvZnYpvBCN1z-7SEcT3to_JImPWHgJn29N5I,3835
|
|
143
157
|
scc_firewall_manager_sdk/models/location.py,sha256=mng5mOwCNcPWaNDzXoAK2UWrpcll_q33EOlZTIV0C7s,3014
|
|
144
158
|
scc_firewall_manager_sdk/models/log_settings.py,sha256=2wCe8rt2PC8alo3DeFKutiwnCtgxk1hgv0FYfazCfkI,2733
|
|
@@ -176,6 +190,7 @@ scc_firewall_manager_sdk/models/object_response.py,sha256=VlU4WupB1TSDMRh0H-YGS5
|
|
|
176
190
|
scc_firewall_manager_sdk/models/on_prem_fmc_info.py,sha256=-aYflAgZJ7dy1NP532lkfxxcc1YDvrhup-uscXkUejE,3056
|
|
177
191
|
scc_firewall_manager_sdk/models/os.py,sha256=P2xaPqB1OTdOTSB_XqYDx5q7TmNVaXryo-Dmhjqa9Ps,2804
|
|
178
192
|
scc_firewall_manager_sdk/models/override.py,sha256=tKerFYSXu9LTO-2xXsENN5Au5errzMhUVnaFAldst8s,3099
|
|
193
|
+
scc_firewall_manager_sdk/models/physical_interface_patch_input.py,sha256=FoJiGDejuHAvcHRKmEc1-KF3le8D95njaBaYtoiu7_0,6493
|
|
179
194
|
scc_firewall_manager_sdk/models/policy.py,sha256=-rE2oBcMsq2Hm16fUzg0IeLf3kQv7MhlQdcmW6au60w,2816
|
|
180
195
|
scc_firewall_manager_sdk/models/ports_value.py,sha256=n3jWZ-u5UIj-xuWOe3TYyc06hE-NnhmiVpahbGFd4NE,2640
|
|
181
196
|
scc_firewall_manager_sdk/models/protocol_content.py,sha256=7jrMsz0DEeFyv4Cw033ACvuoOxNSJurAgJnXN3X3eBo,4032
|
|
@@ -202,13 +217,17 @@ scc_firewall_manager_sdk/models/source_destination_ports_value.py,sha256=pmw54Q_
|
|
|
202
217
|
scc_firewall_manager_sdk/models/source_dynamic_object_content.py,sha256=w_uZDJaZQicPeCD1xSnLB19AWiZw5aIaJpUqwhnBigA,4062
|
|
203
218
|
scc_firewall_manager_sdk/models/source_network_content.py,sha256=6cgdUYc5ayek5fMp9qOnnBwzbOCb8NOntOu66jAV7Ik,4037
|
|
204
219
|
scc_firewall_manager_sdk/models/source_port_content.py,sha256=_XSd3pX7ZUDuwlnnCXH9CUXh4gMbnqp86piO-pf9z4E,4025
|
|
220
|
+
scc_firewall_manager_sdk/models/speed_type.py,sha256=VU8nGCrrWjLmuZWSeiN9kMegx54035vvMmESX8LaaLg,881
|
|
205
221
|
scc_firewall_manager_sdk/models/sse_device_data.py,sha256=pA6SQj9nA09dGDNGZDb5kTzcPDLlUwErXB2wLQuOmhA,3162
|
|
206
222
|
scc_firewall_manager_sdk/models/staged.py,sha256=3J3hcI7Y8OKShyyI3bPHRW3cSYjJ4dj-mdLmjeGfBNI,3617
|
|
207
223
|
scc_firewall_manager_sdk/models/state_machine_details.py,sha256=hqrhtRRBL6H814FXI3SRqgX784j5qVM3qlrrasV8tH8,3091
|
|
208
224
|
scc_firewall_manager_sdk/models/state_machine_error.py,sha256=xHa84YH6CjRGJIxG2SXRfBYCiPDPf5bBAkDZv-zNtBc,2964
|
|
209
225
|
scc_firewall_manager_sdk/models/status.py,sha256=DO7Cf3pc7KwZQ2lKKnUnHu7n4xpYIPqeM2egeabadvM,898
|
|
210
226
|
scc_firewall_manager_sdk/models/status_info.py,sha256=7eakXxMmEsKYtDnYeSForYTXP0AKOHFocpnnyPlSLLo,2622
|
|
227
|
+
scc_firewall_manager_sdk/models/sub_interface_create_input.py,sha256=EbqxLNGfPchRaYp7chtXCUOKWxCqH0UYon9AMdhY99g,7467
|
|
228
|
+
scc_firewall_manager_sdk/models/sub_interface_patch_input.py,sha256=yisT9FOUAEx9EJv5HYIIl60RkWVPIGYbKq-8heYqBWs,5902
|
|
211
229
|
scc_firewall_manager_sdk/models/summary.py,sha256=c0-DsJ63f8XF3CDamgz0rIRTY0-0kOJq_n1JgQ4aYgg,2798
|
|
230
|
+
scc_firewall_manager_sdk/models/switch_port_config.py,sha256=OWy094P6c0ze6Tp25wuO0vPXYIfioyX4nn5X3YS0bhw,3825
|
|
212
231
|
scc_firewall_manager_sdk/models/target.py,sha256=_X6s7aX8fff4aVgj7lTQKVIi28rowu49LLU5jKRc1OU,3657
|
|
213
232
|
scc_firewall_manager_sdk/models/targets_request.py,sha256=WZhGqO0hbkEW4AJnR09J5ADNTSWg9IP3aJP-3sb155M,2711
|
|
214
233
|
scc_firewall_manager_sdk/models/tenant.py,sha256=R8HCsGSyg7lBXL_q1Z8XUr4yDi5xNp-yotZxLxQLanw,4167
|
|
@@ -226,9 +245,12 @@ scc_firewall_manager_sdk/models/user_create_or_update_input.py,sha256=Qi97TYCikg
|
|
|
226
245
|
scc_firewall_manager_sdk/models/user_input.py,sha256=ipY5vjEUdUUqCYdiB7tR1og4jKPnbBpGchbR9jBhXhU,3756
|
|
227
246
|
scc_firewall_manager_sdk/models/user_page.py,sha256=zagv0LVHfNn_VR0EMHB_ZiQ6oWA9keAq-pFBuLQVoqA,3668
|
|
228
247
|
scc_firewall_manager_sdk/models/user_role.py,sha256=WVus0z7L_INfk_jkrQpm41fFh8coK1rfQhxrS2IcUsQ,1104
|
|
248
|
+
scc_firewall_manager_sdk/models/vlan_id_range.py,sha256=WUipEewFzcugw8eYgmhFN9VrjgEfyQ_MPKVrVul9Xew,2636
|
|
249
|
+
scc_firewall_manager_sdk/models/vlan_interface_create_input.py,sha256=Vi0t29qVtftW_bk6ku8ach3VLT_6R9KXPQ3YF56vy8U,6440
|
|
250
|
+
scc_firewall_manager_sdk/models/vlan_interface_patch_input.py,sha256=uQmBUgV0DEXVY_9PLvLj7JA1_oPlNYvue-MLwAnKlPY,6210
|
|
229
251
|
scc_firewall_manager_sdk/models/ztp_onboarding_input.py,sha256=o6f4KOotVYPH06y4Gm9EhnddZIPlymWT31x8gfnbVt0,5326
|
|
230
252
|
scc_firewall_manager_sdk/models/ztp_onboarding_template_configuration.py,sha256=d7_s7YPs0uQBiX201HJwMc9WR_vSmQpMfAskmRrx2bM,4808
|
|
231
|
-
scc_firewall_manager_sdk-1.13.
|
|
232
|
-
scc_firewall_manager_sdk-1.13.
|
|
233
|
-
scc_firewall_manager_sdk-1.13.
|
|
234
|
-
scc_firewall_manager_sdk-1.13.
|
|
253
|
+
scc_firewall_manager_sdk-1.13.667.dist-info/METADATA,sha256=iCv6wiCzgW33FLgxxxvGoFc9OD0kH0NT-a_4UDQ2xYE,596
|
|
254
|
+
scc_firewall_manager_sdk-1.13.667.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
|
|
255
|
+
scc_firewall_manager_sdk-1.13.667.dist-info/top_level.txt,sha256=_g9WfFWGagKs6ULdfhEt8e7RXknpcp9_jA9ubIL4U3I,25
|
|
256
|
+
scc_firewall_manager_sdk-1.13.667.dist-info/RECORD,,
|
{scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.667.dist-info}/WHEEL
RENAMED
|
File without changes
|
|
File without changes
|