scc-firewall-manager-sdk 1.13.782__py3-none-any.whl → 1.13.783__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of scc-firewall-manager-sdk might be problematic. Click here for more details.
- scc_firewall_manager_sdk/__init__.py +1 -1
- scc_firewall_manager_sdk/api_client.py +1 -1
- scc_firewall_manager_sdk/configuration.py +1 -1
- scc_firewall_manager_sdk/models/device.py +6 -1
- {scc_firewall_manager_sdk-1.13.782.dist-info → scc_firewall_manager_sdk-1.13.783.dist-info}/METADATA +1 -1
- {scc_firewall_manager_sdk-1.13.782.dist-info → scc_firewall_manager_sdk-1.13.783.dist-info}/RECORD +8 -8
- {scc_firewall_manager_sdk-1.13.782.dist-info → scc_firewall_manager_sdk-1.13.783.dist-info}/WHEEL +0 -0
- {scc_firewall_manager_sdk-1.13.782.dist-info → scc_firewall_manager_sdk-1.13.783.dist-info}/top_level.txt +0 -0
|
@@ -88,7 +88,7 @@ class ApiClient:
|
|
|
88
88
|
self.default_headers[header_name] = header_value
|
|
89
89
|
self.cookie = cookie
|
|
90
90
|
# Set default User-Agent.
|
|
91
|
-
self.user_agent = 'OpenAPI-Generator/1.13.
|
|
91
|
+
self.user_agent = 'OpenAPI-Generator/1.13.783/python'
|
|
92
92
|
self.client_side_validation = configuration.client_side_validation
|
|
93
93
|
|
|
94
94
|
def __enter__(self):
|
|
@@ -380,7 +380,7 @@ class Configuration:
|
|
|
380
380
|
"OS: {env}\n"\
|
|
381
381
|
"Python Version: {pyversion}\n"\
|
|
382
382
|
"Version of the API: 1.13.0\n"\
|
|
383
|
-
"SDK Package Version: 1.13.
|
|
383
|
+
"SDK Package Version: 1.13.783".\
|
|
384
384
|
format(env=sys.platform, pyversion=sys.version)
|
|
385
385
|
|
|
386
386
|
def get_host_settings(self):
|
|
@@ -18,6 +18,7 @@ import pprint
|
|
|
18
18
|
import re # noqa: F401
|
|
19
19
|
import json
|
|
20
20
|
|
|
21
|
+
from datetime import datetime
|
|
21
22
|
from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr, field_validator
|
|
22
23
|
from typing import Any, ClassVar, Dict, List, Optional
|
|
23
24
|
from scc_firewall_manager_sdk.models.asa_failover_mate import AsaFailoverMate
|
|
@@ -55,6 +56,7 @@ class Device(BaseModel):
|
|
|
55
56
|
asa_license_entitlements: Optional[Dict[str, StrictStr]] = Field(default=None, description="(ASAs only) Map of ASA License entitlements.", alias="asaLicenseEntitlements")
|
|
56
57
|
asdm_version: Optional[StrictStr] = Field(default=None, description="(ASAs only) Version of the ASDM device manager running on the device.", alias="asdmVersion")
|
|
57
58
|
cd_fmc_info: Optional[CdFmcInfo] = Field(default=None, alias="cdFmcInfo")
|
|
59
|
+
certificate_expiry_date: Optional[datetime] = Field(default=None, description="(ASAs and FDM-managed FTDs only) Expiration date of the certificate used on the management interface of the device.", alias="certificateExpiryDate")
|
|
58
60
|
chassis_serial: Optional[StrictStr] = Field(default=None, description="The serial number on the chassis of the device (ASA-only). This is typically used to type up to Cisco SmartNet, and is not the same as the serial number.", alias="chassisSerial")
|
|
59
61
|
config_state: Optional[ConfigState] = Field(default=None, alias="configState")
|
|
60
62
|
conflict_detection_state: Optional[ConflictDetectionState] = Field(default=None, alias="conflictDetectionState")
|
|
@@ -81,6 +83,7 @@ class Device(BaseModel):
|
|
|
81
83
|
notes: Optional[StrictStr] = Field(default=None, description="Free-form notes on the device.")
|
|
82
84
|
on_prem_fmc_info: Optional[OnPremFmcInfo] = Field(default=None, alias="onPremFmcInfo")
|
|
83
85
|
opted_in_to_asa_health_metrics: Optional[StrictBool] = Field(default=None, description="Indicates whether the device has been opted in to collect ASA health metrics (SDC-managed ASAs only).", alias="optedInToAsaHealthMetrics")
|
|
86
|
+
ra_vpn_certificate_expiry_date: Optional[datetime] = Field(default=None, description="(Remote Access VPN headends — ASA, FDM-managed FTD, and cdFMC-managed FTD — only) Expiration date of the Secure Client certificate installed on the device.", alias="raVpnCertificateExpiryDate")
|
|
84
87
|
redundancy_mode: Optional[StrictStr] = Field(default=None, description="The redundancy mode this firewall is running in. Note: for High Availability pairs and clusters, Security Cloud Control represents all of the devices as part of one record.", alias="redundancyMode")
|
|
85
88
|
serial: Optional[StrictStr] = Field(default=None, description="The serial number of the device. This is typically used for licensing, and is not the same as the chassis' serial number.")
|
|
86
89
|
snort_version: Optional[StrictStr] = Field(default=None, description="(FTDs only) List of FTD License entitlements.", alias="snortVersion")
|
|
@@ -92,7 +95,7 @@ class Device(BaseModel):
|
|
|
92
95
|
uid_on_fmc: Optional[StrictStr] = Field(default=None, description="(FMC-managed FTDs only) The unique identifier, represented as a UUID, of the device on a cdFMC. This field is deprecated. Please see `deviceRecordOnFmc`.", alias="uidOnFmc")
|
|
93
96
|
universal_ztna_settings: Optional[UniversalZtnaSettings] = Field(default=None, alias="universalZtnaSettings")
|
|
94
97
|
ztp_onboarding_job_id: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, for an internal job that orchestrates the onboarding of devices through Zero-Touch Provisioning. This applies to devices managed by both on-premises and Cloud-delivered FMC.", alias="ztpOnboardingJobId")
|
|
95
|
-
__properties: ClassVar[List[str]] = ["address", "asaFailoverMate", "asaFailoverMode", "asaFailoverState", "asaLicenseEntitlements", "asdmVersion", "cdFmcInfo", "chassisSerial", "configState", "conflictDetectionState", "connectivityState", "connectorType", "connectorUid", "deviceMetadata", "deviceRecordOnFmc", "deviceRole", "deviceRoles", "deviceType", "fmcAccessPolicy", "fmcDomainUid", "ftdClusterInfo", "ftdHaInfo", "ftdLicenses", "ftdPerformanceTier", "hardwareModel", "labels", "merakiDeploymentMode", "merakiNetwork", "modelNumber", "name", "notes", "onPremFmcInfo", "optedInToAsaHealthMetrics", "redundancyMode", "serial", "snortVersion", "softwareVersion", "sseDeviceData", "state", "stateMachineDetails", "uid", "uidOnFmc", "universalZtnaSettings", "ztpOnboardingJobId"]
|
|
98
|
+
__properties: ClassVar[List[str]] = ["address", "asaFailoverMate", "asaFailoverMode", "asaFailoverState", "asaLicenseEntitlements", "asdmVersion", "cdFmcInfo", "certificateExpiryDate", "chassisSerial", "configState", "conflictDetectionState", "connectivityState", "connectorType", "connectorUid", "deviceMetadata", "deviceRecordOnFmc", "deviceRole", "deviceRoles", "deviceType", "fmcAccessPolicy", "fmcDomainUid", "ftdClusterInfo", "ftdHaInfo", "ftdLicenses", "ftdPerformanceTier", "hardwareModel", "labels", "merakiDeploymentMode", "merakiNetwork", "modelNumber", "name", "notes", "onPremFmcInfo", "optedInToAsaHealthMetrics", "raVpnCertificateExpiryDate", "redundancyMode", "serial", "snortVersion", "softwareVersion", "sseDeviceData", "state", "stateMachineDetails", "uid", "uidOnFmc", "universalZtnaSettings", "ztpOnboardingJobId"]
|
|
96
99
|
|
|
97
100
|
@field_validator('redundancy_mode')
|
|
98
101
|
def redundancy_mode_validate_enum(cls, value):
|
|
@@ -201,6 +204,7 @@ class Device(BaseModel):
|
|
|
201
204
|
"asaLicenseEntitlements": obj.get("asaLicenseEntitlements"),
|
|
202
205
|
"asdmVersion": obj.get("asdmVersion"),
|
|
203
206
|
"cdFmcInfo": CdFmcInfo.from_dict(obj["cdFmcInfo"]) if obj.get("cdFmcInfo") is not None else None,
|
|
207
|
+
"certificateExpiryDate": obj.get("certificateExpiryDate"),
|
|
204
208
|
"chassisSerial": obj.get("chassisSerial"),
|
|
205
209
|
"configState": obj.get("configState"),
|
|
206
210
|
"conflictDetectionState": obj.get("conflictDetectionState"),
|
|
@@ -227,6 +231,7 @@ class Device(BaseModel):
|
|
|
227
231
|
"notes": obj.get("notes"),
|
|
228
232
|
"onPremFmcInfo": OnPremFmcInfo.from_dict(obj["onPremFmcInfo"]) if obj.get("onPremFmcInfo") is not None else None,
|
|
229
233
|
"optedInToAsaHealthMetrics": obj.get("optedInToAsaHealthMetrics"),
|
|
234
|
+
"raVpnCertificateExpiryDate": obj.get("raVpnCertificateExpiryDate"),
|
|
230
235
|
"redundancyMode": obj.get("redundancyMode"),
|
|
231
236
|
"serial": obj.get("serial"),
|
|
232
237
|
"snortVersion": obj.get("snortVersion"),
|
{scc_firewall_manager_sdk-1.13.782.dist-info → scc_firewall_manager_sdk-1.13.783.dist-info}/RECORD
RENAMED
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
scc_firewall_manager_sdk/__init__.py,sha256=
|
|
2
|
-
scc_firewall_manager_sdk/api_client.py,sha256=
|
|
1
|
+
scc_firewall_manager_sdk/__init__.py,sha256=uLKAgAVSdY_SDa8G5CwO00IQ6vfXMIZshuzBoDZzrK0,20952
|
|
2
|
+
scc_firewall_manager_sdk/api_client.py,sha256=CNTJvGSHhV4Iu5oBSti_PODp0-Br5VU6BdHAoQ7Y-Jo,25921
|
|
3
3
|
scc_firewall_manager_sdk/api_response.py,sha256=eMxw1mpmJcoGZ3gs9z6jM4oYoZ10Gjk333s9sKxGv7s,652
|
|
4
|
-
scc_firewall_manager_sdk/configuration.py,sha256=
|
|
4
|
+
scc_firewall_manager_sdk/configuration.py,sha256=rV_1GosMmgnALInTHqiPue4FN07O5IKC1S9cF2YZ3dQ,15993
|
|
5
5
|
scc_firewall_manager_sdk/exceptions.py,sha256=J4sPW_b1AGNUeRyPnnDlVtb1b8kOKgDO6cCzCf1wDYg,6039
|
|
6
6
|
scc_firewall_manager_sdk/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
7
7
|
scc_firewall_manager_sdk/rest.py,sha256=fAq2gQ-7Y88YdlSxyPNV1I3fctDBTEU0DrBJapzVrNY,9309
|
|
@@ -97,7 +97,7 @@ scc_firewall_manager_sdk/models/deployed.py,sha256=V9BuynY4H55E8Dq_XwsQqsaz_kWLh
|
|
|
97
97
|
scc_firewall_manager_sdk/models/destination_dynamic_object_content.py,sha256=gOseg9Y0GYithzAHNLeLvrr6SX7kXsczJ4UeqTUqU-Y,4082
|
|
98
98
|
scc_firewall_manager_sdk/models/destination_network_content.py,sha256=6KJRfheCU70zOnMjlgIEcnNWrCuFu3OQibZ7zFgTA78,4057
|
|
99
99
|
scc_firewall_manager_sdk/models/destination_port_content.py,sha256=E82DN-JVdNj6W44dbpPXg8u00u0EUIfu8ajR-nhF9-k,4045
|
|
100
|
-
scc_firewall_manager_sdk/models/device.py,sha256=
|
|
100
|
+
scc_firewall_manager_sdk/models/device.py,sha256=WZhp294wWmTklVL9JbO_D1HTBt27VjWEFvSgz2Guuvc,18623
|
|
101
101
|
scc_firewall_manager_sdk/models/device_end_of_life.py,sha256=myYNmqvtbflTopWuYUXorApsGpdw3uvnPZR3Z2gqQAc,4117
|
|
102
102
|
scc_firewall_manager_sdk/models/device_end_of_life_details.py,sha256=jnXbc_ScncGq_05a8WDwss7QbUu1-coTztPNGvQPNBw,3630
|
|
103
103
|
scc_firewall_manager_sdk/models/device_end_of_life_device_info.py,sha256=JyhFPnVDZ18xcJ6Gr2-mUKYfQ6ZXI2Cedo_QNnV_Zfw,3610
|
|
@@ -255,7 +255,7 @@ scc_firewall_manager_sdk/models/vlan_interface_create_input.py,sha256=Vi0t29qVtf
|
|
|
255
255
|
scc_firewall_manager_sdk/models/vlan_interface_patch_input.py,sha256=uQmBUgV0DEXVY_9PLvLj7JA1_oPlNYvue-MLwAnKlPY,6210
|
|
256
256
|
scc_firewall_manager_sdk/models/ztp_onboarding_input.py,sha256=o6f4KOotVYPH06y4Gm9EhnddZIPlymWT31x8gfnbVt0,5326
|
|
257
257
|
scc_firewall_manager_sdk/models/ztp_onboarding_template_configuration.py,sha256=d7_s7YPs0uQBiX201HJwMc9WR_vSmQpMfAskmRrx2bM,4808
|
|
258
|
-
scc_firewall_manager_sdk-1.13.
|
|
259
|
-
scc_firewall_manager_sdk-1.13.
|
|
260
|
-
scc_firewall_manager_sdk-1.13.
|
|
261
|
-
scc_firewall_manager_sdk-1.13.
|
|
258
|
+
scc_firewall_manager_sdk-1.13.783.dist-info/METADATA,sha256=xBB9GM9wPxjzPWizNq6nUpz8cOROrgKbdxFI-BXpgrQ,596
|
|
259
|
+
scc_firewall_manager_sdk-1.13.783.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
|
|
260
|
+
scc_firewall_manager_sdk-1.13.783.dist-info/top_level.txt,sha256=_g9WfFWGagKs6ULdfhEt8e7RXknpcp9_jA9ubIL4U3I,25
|
|
261
|
+
scc_firewall_manager_sdk-1.13.783.dist-info/RECORD,,
|
{scc_firewall_manager_sdk-1.13.782.dist-info → scc_firewall_manager_sdk-1.13.783.dist-info}/WHEEL
RENAMED
|
File without changes
|
|
File without changes
|