scc-firewall-manager-sdk 1.13.676__py3-none-any.whl → 1.13.678__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of scc-firewall-manager-sdk might be problematic. Click here for more details.
- scc_firewall_manager_sdk/__init__.py +1 -1
- scc_firewall_manager_sdk/api_client.py +1 -1
- scc_firewall_manager_sdk/configuration.py +1 -1
- scc_firewall_manager_sdk/models/tenant_settings.py +3 -1
- {scc_firewall_manager_sdk-1.13.676.dist-info → scc_firewall_manager_sdk-1.13.678.dist-info}/METADATA +1 -1
- {scc_firewall_manager_sdk-1.13.676.dist-info → scc_firewall_manager_sdk-1.13.678.dist-info}/RECORD +8 -8
- {scc_firewall_manager_sdk-1.13.676.dist-info → scc_firewall_manager_sdk-1.13.678.dist-info}/WHEEL +0 -0
- {scc_firewall_manager_sdk-1.13.676.dist-info → scc_firewall_manager_sdk-1.13.678.dist-info}/top_level.txt +0 -0
|
@@ -88,7 +88,7 @@ class ApiClient:
|
|
|
88
88
|
self.default_headers[header_name] = header_value
|
|
89
89
|
self.cookie = cookie
|
|
90
90
|
# Set default User-Agent.
|
|
91
|
-
self.user_agent = 'OpenAPI-Generator/1.13.
|
|
91
|
+
self.user_agent = 'OpenAPI-Generator/1.13.678/python'
|
|
92
92
|
self.client_side_validation = configuration.client_side_validation
|
|
93
93
|
|
|
94
94
|
def __enter__(self):
|
|
@@ -380,7 +380,7 @@ class Configuration:
|
|
|
380
380
|
"OS: {env}\n"\
|
|
381
381
|
"Python Version: {pyversion}\n"\
|
|
382
382
|
"Version of the API: 1.13.0\n"\
|
|
383
|
-
"SDK Package Version: 1.13.
|
|
383
|
+
"SDK Package Version: 1.13.678".\
|
|
384
384
|
format(env=sys.platform, pyversion=sys.version)
|
|
385
385
|
|
|
386
386
|
def get_host_settings(self):
|
|
@@ -29,6 +29,7 @@ class TenantSettings(BaseModel):
|
|
|
29
29
|
TenantSettings
|
|
30
30
|
""" # noqa: E501
|
|
31
31
|
ai_assistant: Optional[StrictBool] = Field(default=None, description="Indicates if the tenant has the AI assistant enabled.", alias="aiAssistant")
|
|
32
|
+
allow_cross_region_tenant_addition: Optional[StrictBool] = Field(default=None, description="Indicates whether adding tenants from different regions to this MSP Portal is allowed.", alias="allowCrossRegionTenantAddition")
|
|
32
33
|
asa_health_metrics: Optional[StrictBool] = Field(default=None, description="Indicates if the tenant collects ASA health metrics.", alias="asaHealthMetrics")
|
|
33
34
|
auto_accept_device_changes: Optional[StrictBool] = Field(default=None, description="Indicates if changes made out-of-band on devices on the tenant are automatically accepted without manual approval.", alias="autoAcceptDeviceChanges")
|
|
34
35
|
auto_discover_on_prem_fmcs: Optional[StrictBool] = Field(default=None, description="Indicates if the system automatically discovers on-premise FMCs.", alias="autoDiscoverOnPremFmcs")
|
|
@@ -41,7 +42,7 @@ class TenantSettings(BaseModel):
|
|
|
41
42
|
scheduled_deployments: Optional[StrictBool] = Field(default=None, description="Indicates if the tenant has scheduled deployments enabled.", alias="scheduledDeployments")
|
|
42
43
|
uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the tenant in Security Cloud Control.")
|
|
43
44
|
web_analytics: Optional[StrictBool] = Field(default=None, description="Indicates if web analytics are enabled for the tenant.", alias="webAnalytics")
|
|
44
|
-
__properties: ClassVar[List[str]] = ["aiAssistant", "asaHealthMetrics", "autoAcceptDeviceChanges", "autoDiscoverOnPremFmcs", "changeRequestSupport", "conflictDetectionInterval", "denyCiscoSupportAccessToTenant", "mspPortalUid", "multicloudDefense", "policyAnalyzer", "scheduledDeployments", "uid", "webAnalytics"]
|
|
45
|
+
__properties: ClassVar[List[str]] = ["aiAssistant", "allowCrossRegionTenantAddition", "asaHealthMetrics", "autoAcceptDeviceChanges", "autoDiscoverOnPremFmcs", "changeRequestSupport", "conflictDetectionInterval", "denyCiscoSupportAccessToTenant", "mspPortalUid", "multicloudDefense", "policyAnalyzer", "scheduledDeployments", "uid", "webAnalytics"]
|
|
45
46
|
|
|
46
47
|
model_config = ConfigDict(
|
|
47
48
|
populate_by_name=True,
|
|
@@ -95,6 +96,7 @@ class TenantSettings(BaseModel):
|
|
|
95
96
|
|
|
96
97
|
_obj = cls.model_validate({
|
|
97
98
|
"aiAssistant": obj.get("aiAssistant"),
|
|
99
|
+
"allowCrossRegionTenantAddition": obj.get("allowCrossRegionTenantAddition"),
|
|
98
100
|
"asaHealthMetrics": obj.get("asaHealthMetrics"),
|
|
99
101
|
"autoAcceptDeviceChanges": obj.get("autoAcceptDeviceChanges"),
|
|
100
102
|
"autoDiscoverOnPremFmcs": obj.get("autoDiscoverOnPremFmcs"),
|
{scc_firewall_manager_sdk-1.13.676.dist-info → scc_firewall_manager_sdk-1.13.678.dist-info}/RECORD
RENAMED
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
scc_firewall_manager_sdk/__init__.py,sha256=
|
|
2
|
-
scc_firewall_manager_sdk/api_client.py,sha256=
|
|
1
|
+
scc_firewall_manager_sdk/__init__.py,sha256=mRH8VkizP7XU8qCY54NApfj37BewFiD7OX0A2hhWIrI,20478
|
|
2
|
+
scc_firewall_manager_sdk/api_client.py,sha256=RJs1isGD26ze60dohrfZ3ustv5kDtBI1mAVLO3M96zQ,25921
|
|
3
3
|
scc_firewall_manager_sdk/api_response.py,sha256=eMxw1mpmJcoGZ3gs9z6jM4oYoZ10Gjk333s9sKxGv7s,652
|
|
4
|
-
scc_firewall_manager_sdk/configuration.py,sha256=
|
|
4
|
+
scc_firewall_manager_sdk/configuration.py,sha256=7USHAYnmM0wUsecLJW9FVtIP_xCa4pIMAm9i1F7X1vE,15993
|
|
5
5
|
scc_firewall_manager_sdk/exceptions.py,sha256=J4sPW_b1AGNUeRyPnnDlVtb1b8kOKgDO6cCzCf1wDYg,6039
|
|
6
6
|
scc_firewall_manager_sdk/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
7
7
|
scc_firewall_manager_sdk/rest.py,sha256=fAq2gQ-7Y88YdlSxyPNV1I3fctDBTEU0DrBJapzVrNY,9309
|
|
@@ -232,7 +232,7 @@ scc_firewall_manager_sdk/models/target.py,sha256=_X6s7aX8fff4aVgj7lTQKVIi28rowu4
|
|
|
232
232
|
scc_firewall_manager_sdk/models/targets_request.py,sha256=WZhGqO0hbkEW4AJnR09J5ADNTSWg9IP3aJP-3sb155M,2711
|
|
233
233
|
scc_firewall_manager_sdk/models/tenant.py,sha256=R8HCsGSyg7lBXL_q1Z8XUr4yDi5xNp-yotZxLxQLanw,4167
|
|
234
234
|
scc_firewall_manager_sdk/models/tenant_page.py,sha256=tBin2TiYB2zeC-6RJSMn6ZEc5Z-yOTf6K6KmUYRIzA8,3684
|
|
235
|
-
scc_firewall_manager_sdk/models/tenant_settings.py,sha256=
|
|
235
|
+
scc_firewall_manager_sdk/models/tenant_settings.py,sha256=7l6cUwcq-4PcubH8LS0eAhhIkM4EOgvosRuJauwDQd0,6281
|
|
236
236
|
scc_firewall_manager_sdk/models/unified_object_list_view.py,sha256=KLz--4cAsGvywKiM3MxGE1GMsEkbfAYMkVxq-SiNhho,4056
|
|
237
237
|
scc_firewall_manager_sdk/models/universal_ztna_settings.py,sha256=h2mVd4Xveseas-9uCXwH8adFUfoXjJYgHztdjnXz_kI,4149
|
|
238
238
|
scc_firewall_manager_sdk/models/update_request.py,sha256=wLGMc43-MprpP9slLVoFnEqW52_ST1NozJ4yqxiQ8tM,3507
|
|
@@ -250,7 +250,7 @@ scc_firewall_manager_sdk/models/vlan_interface_create_input.py,sha256=Vi0t29qVtf
|
|
|
250
250
|
scc_firewall_manager_sdk/models/vlan_interface_patch_input.py,sha256=uQmBUgV0DEXVY_9PLvLj7JA1_oPlNYvue-MLwAnKlPY,6210
|
|
251
251
|
scc_firewall_manager_sdk/models/ztp_onboarding_input.py,sha256=o6f4KOotVYPH06y4Gm9EhnddZIPlymWT31x8gfnbVt0,5326
|
|
252
252
|
scc_firewall_manager_sdk/models/ztp_onboarding_template_configuration.py,sha256=d7_s7YPs0uQBiX201HJwMc9WR_vSmQpMfAskmRrx2bM,4808
|
|
253
|
-
scc_firewall_manager_sdk-1.13.
|
|
254
|
-
scc_firewall_manager_sdk-1.13.
|
|
255
|
-
scc_firewall_manager_sdk-1.13.
|
|
256
|
-
scc_firewall_manager_sdk-1.13.
|
|
253
|
+
scc_firewall_manager_sdk-1.13.678.dist-info/METADATA,sha256=14s2lab9IeCRLjmp-IlcSLT4CaW8kHsOhSZw0bD9oT8,596
|
|
254
|
+
scc_firewall_manager_sdk-1.13.678.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
|
|
255
|
+
scc_firewall_manager_sdk-1.13.678.dist-info/top_level.txt,sha256=_g9WfFWGagKs6ULdfhEt8e7RXknpcp9_jA9ubIL4U3I,25
|
|
256
|
+
scc_firewall_manager_sdk-1.13.678.dist-info/RECORD,,
|
{scc_firewall_manager_sdk-1.13.676.dist-info → scc_firewall_manager_sdk-1.13.678.dist-info}/WHEEL
RENAMED
|
File without changes
|
|
File without changes
|