scc-firewall-manager-sdk 1.15.222__py3-none-any.whl → 1.15.224__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of scc-firewall-manager-sdk might be problematic. Click here for more details.

@@ -88,7 +88,7 @@ class ApiClient:
88
88
  self.default_headers[header_name] = header_value
89
89
  self.cookie = cookie
90
90
  # Set default User-Agent.
91
- self.user_agent = 'OpenAPI-Generator/1.15.222/python'
91
+ self.user_agent = 'OpenAPI-Generator/1.15.224/python'
92
92
  self.client_side_validation = configuration.client_side_validation
93
93
 
94
94
  def __enter__(self):
@@ -380,7 +380,7 @@ class Configuration:
380
380
  "OS: {env}\n"\
381
381
  "Python Version: {pyversion}\n"\
382
382
  "Version of the API: 1.15.0\n"\
383
- "SDK Package Version: 1.15.222".\
383
+ "SDK Package Version: 1.15.224".\
384
384
  format(env=sys.platform, pyversion=sys.version)
385
385
 
386
386
  def get_host_settings(self):
@@ -100,6 +100,7 @@ from scc_firewall_manager_sdk.models.device_metadata import DeviceMetadata
100
100
  from scc_firewall_manager_sdk.models.device_page import DevicePage
101
101
  from scc_firewall_manager_sdk.models.device_patch_input import DevicePatchInput
102
102
  from scc_firewall_manager_sdk.models.device_role import DeviceRole
103
+ from scc_firewall_manager_sdk.models.device_upgrade_status_dto import DeviceUpgradeStatusDto
103
104
  from scc_firewall_manager_sdk.models.devices_patch_input import DevicesPatchInput
104
105
  from scc_firewall_manager_sdk.models.disk_health_metrics import DiskHealthMetrics
105
106
  from scc_firewall_manager_sdk.models.domain_settings import DomainSettings
@@ -188,6 +189,8 @@ from scc_firewall_manager_sdk.models.msp_managed_template_distinct_attribute_val
188
189
  from scc_firewall_manager_sdk.models.msp_managed_templates_page import MspManagedTemplatesPage
189
190
  from scc_firewall_manager_sdk.models.msp_managed_tenant import MspManagedTenant
190
191
  from scc_firewall_manager_sdk.models.msp_managed_tenant_page import MspManagedTenantPage
192
+ from scc_firewall_manager_sdk.models.msp_upgrade_run_dto import MspUpgradeRunDto
193
+ from scc_firewall_manager_sdk.models.msp_upgrade_run_dto_page import MspUpgradeRunDtoPage
191
194
  from scc_firewall_manager_sdk.models.network import Network
192
195
  from scc_firewall_manager_sdk.models.network_object_content import NetworkObjectContent
193
196
  from scc_firewall_manager_sdk.models.os import OS
@@ -246,6 +249,7 @@ from scc_firewall_manager_sdk.models.upgrade_compatibility_info_dto import Upgra
246
249
  from scc_firewall_manager_sdk.models.upgrade_ftd_device_input import UpgradeFtdDeviceInput
247
250
  from scc_firewall_manager_sdk.models.upgrade_ftd_devices_input import UpgradeFtdDevicesInput
248
251
  from scc_firewall_manager_sdk.models.upgrade_run_dto import UpgradeRunDto
252
+ from scc_firewall_manager_sdk.models.upgrade_run_metadata_dto import UpgradeRunMetadataDto
249
253
  from scc_firewall_manager_sdk.models.upgrade_run_modify_input import UpgradeRunModifyInput
250
254
  from scc_firewall_manager_sdk.models.url_object_content import UrlObjectContent
251
255
  from scc_firewall_manager_sdk.models.user import User
@@ -0,0 +1,112 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.15.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from typing import Optional, Set
24
+ from typing_extensions import Self
25
+
26
+ class DeviceUpgradeStatusDto(BaseModel):
27
+ """
28
+ DeviceUpgradeStatusDto
29
+ """ # noqa: E501
30
+ hardware_model: Optional[StrictStr] = Field(default=None, description="The hardware model of the devices being upgraded.", alias="hardwareModel")
31
+ managed_tenant_display_name: Optional[StrictStr] = Field(default=None, description="The display name of the managed tenant in CDO.", alias="managedTenantDisplayName")
32
+ managed_tenant_name: Optional[StrictStr] = Field(default=None, description="The name of the managed tenant in CDO.", alias="managedTenantName")
33
+ managed_tenant_uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the managed tenant in Security Cloud Control that this device belongs to.", alias="managedTenantUid")
34
+ name: Optional[StrictStr] = Field(default=None, description="The name of the device being upgraded.")
35
+ transaction_uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the CDO transaction on the managed tenant that tracks this upgrade run.", alias="transactionUid")
36
+ uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the device being upgraded.")
37
+ upgrade_run_status: Optional[StrictStr] = Field(default=None, description="The current status of the upgrade run.", alias="upgradeRunStatus")
38
+ __properties: ClassVar[List[str]] = ["hardwareModel", "managedTenantDisplayName", "managedTenantName", "managedTenantUid", "name", "transactionUid", "uid", "upgradeRunStatus"]
39
+
40
+ @field_validator('upgrade_run_status')
41
+ def upgrade_run_status_validate_enum(cls, value):
42
+ """Validates the enum"""
43
+ if value is None:
44
+ return value
45
+
46
+ if value not in set(['IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
47
+ raise ValueError("must be one of enum values ('IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
48
+ return value
49
+
50
+ model_config = ConfigDict(
51
+ populate_by_name=True,
52
+ validate_assignment=True,
53
+ protected_namespaces=(),
54
+ )
55
+
56
+
57
+ def to_str(self) -> str:
58
+ """Returns the string representation of the model using alias"""
59
+ return pprint.pformat(self.model_dump(by_alias=True))
60
+
61
+ def to_json(self) -> str:
62
+ """Returns the JSON representation of the model using alias"""
63
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
64
+ return json.dumps(self.to_dict())
65
+
66
+ @classmethod
67
+ def from_json(cls, json_str: str) -> Optional[Self]:
68
+ """Create an instance of DeviceUpgradeStatusDto from a JSON string"""
69
+ return cls.from_dict(json.loads(json_str))
70
+
71
+ def to_dict(self) -> Dict[str, Any]:
72
+ """Return the dictionary representation of the model using alias.
73
+
74
+ This has the following differences from calling pydantic's
75
+ `self.model_dump(by_alias=True)`:
76
+
77
+ * `None` is only added to the output dict for nullable fields that
78
+ were set at model initialization. Other fields with value `None`
79
+ are ignored.
80
+ """
81
+ excluded_fields: Set[str] = set([
82
+ ])
83
+
84
+ _dict = self.model_dump(
85
+ by_alias=True,
86
+ exclude=excluded_fields,
87
+ exclude_none=True,
88
+ )
89
+ return _dict
90
+
91
+ @classmethod
92
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
93
+ """Create an instance of DeviceUpgradeStatusDto from a dict"""
94
+ if obj is None:
95
+ return None
96
+
97
+ if not isinstance(obj, dict):
98
+ return cls.model_validate(obj)
99
+
100
+ _obj = cls.model_validate({
101
+ "hardwareModel": obj.get("hardwareModel"),
102
+ "managedTenantDisplayName": obj.get("managedTenantDisplayName"),
103
+ "managedTenantName": obj.get("managedTenantName"),
104
+ "managedTenantUid": obj.get("managedTenantUid"),
105
+ "name": obj.get("name"),
106
+ "transactionUid": obj.get("transactionUid"),
107
+ "uid": obj.get("uid"),
108
+ "upgradeRunStatus": obj.get("upgradeRunStatus")
109
+ })
110
+ return _obj
111
+
112
+
@@ -27,6 +27,7 @@ from scc_firewall_manager_sdk.models.config_state import ConfigState
27
27
  from scc_firewall_manager_sdk.models.conflict_detection_state import ConflictDetectionState
28
28
  from scc_firewall_manager_sdk.models.connectivity_state import ConnectivityState
29
29
  from scc_firewall_manager_sdk.models.entity_type import EntityType
30
+ from scc_firewall_manager_sdk.models.fmc_device_record import FmcDeviceRecord
30
31
  from scc_firewall_manager_sdk.models.ftd_cluster_info import FtdClusterInfo
31
32
  from scc_firewall_manager_sdk.models.ftd_ha_info import FtdHaInfo
32
33
  from scc_firewall_manager_sdk.models.labels import Labels
@@ -46,6 +47,7 @@ class MspManagedDevice(BaseModel):
46
47
  config_state: Optional[ConfigState] = Field(default=None, alias="configState")
47
48
  conflict_detection_state: Optional[ConflictDetectionState] = Field(default=None, alias="conflictDetectionState")
48
49
  connectivity_state: Optional[ConnectivityState] = Field(default=None, alias="connectivityState")
50
+ device_record_on_fmc: Optional[FmcDeviceRecord] = Field(default=None, alias="deviceRecordOnFmc")
49
51
  device_type: Optional[EntityType] = Field(default=None, alias="deviceType")
50
52
  ftd_cluster_info: Optional[FtdClusterInfo] = Field(default=None, alias="ftdClusterInfo")
51
53
  ftd_ha_info: Optional[FtdHaInfo] = Field(default=None, alias="ftdHaInfo")
@@ -63,7 +65,7 @@ class MspManagedDevice(BaseModel):
63
65
  software_version: Optional[StrictStr] = Field(default=None, description="The version of the software running on the device.", alias="softwareVersion")
64
66
  tenant_uid: Optional[StrictStr] = Field(default=None, alias="tenantUid")
65
67
  uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the device in Security Cloud Control.")
66
- __properties: ClassVar[List[str]] = ["address", "asaFailoverMate", "asaFailoverMode", "asaFailoverState", "certificateExpiryDate", "chassisSerial", "configState", "conflictDetectionState", "connectivityState", "deviceType", "ftdClusterInfo", "ftdHaInfo", "hardwareModel", "labels", "managedTenantDisplayName", "managedTenantName", "managedTenantRegion", "managedTenantUid", "modelNumber", "name", "raVpnCertificateExpiryDate", "redundancyMode", "serial", "softwareVersion", "tenantUid", "uid"]
68
+ __properties: ClassVar[List[str]] = ["address", "asaFailoverMate", "asaFailoverMode", "asaFailoverState", "certificateExpiryDate", "chassisSerial", "configState", "conflictDetectionState", "connectivityState", "deviceRecordOnFmc", "deviceType", "ftdClusterInfo", "ftdHaInfo", "hardwareModel", "labels", "managedTenantDisplayName", "managedTenantName", "managedTenantRegion", "managedTenantUid", "modelNumber", "name", "raVpnCertificateExpiryDate", "redundancyMode", "serial", "softwareVersion", "tenantUid", "uid"]
67
69
 
68
70
  @field_validator('redundancy_mode')
69
71
  def redundancy_mode_validate_enum(cls, value):
@@ -117,6 +119,9 @@ class MspManagedDevice(BaseModel):
117
119
  # override the default output from pydantic by calling `to_dict()` of asa_failover_mate
118
120
  if self.asa_failover_mate:
119
121
  _dict['asaFailoverMate'] = self.asa_failover_mate.to_dict()
122
+ # override the default output from pydantic by calling `to_dict()` of device_record_on_fmc
123
+ if self.device_record_on_fmc:
124
+ _dict['deviceRecordOnFmc'] = self.device_record_on_fmc.to_dict()
120
125
  # override the default output from pydantic by calling `to_dict()` of ftd_cluster_info
121
126
  if self.ftd_cluster_info:
122
127
  _dict['ftdClusterInfo'] = self.ftd_cluster_info.to_dict()
@@ -147,6 +152,7 @@ class MspManagedDevice(BaseModel):
147
152
  "configState": obj.get("configState"),
148
153
  "conflictDetectionState": obj.get("conflictDetectionState"),
149
154
  "connectivityState": obj.get("connectivityState"),
155
+ "deviceRecordOnFmc": FmcDeviceRecord.from_dict(obj["deviceRecordOnFmc"]) if obj.get("deviceRecordOnFmc") is not None else None,
150
156
  "deviceType": obj.get("deviceType"),
151
157
  "ftdClusterInfo": FtdClusterInfo.from_dict(obj["ftdClusterInfo"]) if obj.get("ftdClusterInfo") is not None else None,
152
158
  "ftdHaInfo": FtdHaInfo.from_dict(obj["ftdHaInfo"]) if obj.get("ftdHaInfo") is not None else None,
@@ -0,0 +1,133 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.15.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from datetime import datetime
22
+ from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr, field_validator
23
+ from typing import Any, ClassVar, Dict, List, Optional
24
+ from scc_firewall_manager_sdk.models.upgrade_run_metadata_dto import UpgradeRunMetadataDto
25
+ from typing import Optional, Set
26
+ from typing_extensions import Self
27
+
28
+ class MspUpgradeRunDto(BaseModel):
29
+ """
30
+ MspUpgradeRunDto
31
+ """ # noqa: E501
32
+ error_msg: Optional[StrictStr] = Field(default=None, description="The error message if the upgrade run failed.", alias="errorMsg")
33
+ last_updated_time: Optional[datetime] = Field(default=None, description="The time (UTC; represented using the RFC-3339 standard) at which the upgrade run was last updated.", alias="lastUpdatedTime")
34
+ metadata: Optional[UpgradeRunMetadataDto] = None
35
+ name: Optional[StrictStr] = Field(default=None, description="The name of the upgrade run. Upgrade runs names are unique in a tenant in SCC Firewall Manager.")
36
+ software_version: Optional[StrictStr] = Field(default=None, description="The target software version for the upgrade.", alias="softwareVersion")
37
+ stage_upgrade_only: Optional[StrictBool] = Field(default=None, description="Indicates if this upgrade run is to stage the upgrade on the device. If set to true, the upgrade is not applied on the device.", alias="stageUpgradeOnly")
38
+ submission_time: Optional[datetime] = Field(default=None, description="The time (UTC; represented using the RFC-3339 standard) at which the upgrade run was triggered.", alias="submissionTime")
39
+ transaction_uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the CDO transaction that tracks this upgrade run.", alias="transactionUid")
40
+ uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the upgrade run in SCC Firewall Manager.")
41
+ upgrade_run_status: Optional[StrictStr] = Field(default=None, description="The current status of the upgrade run.", alias="upgradeRunStatus")
42
+ upgrade_run_type: Optional[StrictStr] = Field(default=None, description="The type of upgrade run", alias="upgradeRunType")
43
+ __properties: ClassVar[List[str]] = ["errorMsg", "lastUpdatedTime", "metadata", "name", "softwareVersion", "stageUpgradeOnly", "submissionTime", "transactionUid", "uid", "upgradeRunStatus", "upgradeRunType"]
44
+
45
+ @field_validator('upgrade_run_status')
46
+ def upgrade_run_status_validate_enum(cls, value):
47
+ """Validates the enum"""
48
+ if value is None:
49
+ return value
50
+
51
+ if value not in set(['IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
52
+ raise ValueError("must be one of enum values ('IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
53
+ return value
54
+
55
+ @field_validator('upgrade_run_type')
56
+ def upgrade_run_type_validate_enum(cls, value):
57
+ """Validates the enum"""
58
+ if value is None:
59
+ return value
60
+
61
+ if value not in set(['ASA_DEVICE_UPGRADE', 'FTD_DEVICE_UPGRADE', 'FTD_SECURE_CLIENT_UPGRADE', 'ASA_SECURE_CLIENT_UPGRADE']):
62
+ raise ValueError("must be one of enum values ('ASA_DEVICE_UPGRADE', 'FTD_DEVICE_UPGRADE', 'FTD_SECURE_CLIENT_UPGRADE', 'ASA_SECURE_CLIENT_UPGRADE')")
63
+ return value
64
+
65
+ model_config = ConfigDict(
66
+ populate_by_name=True,
67
+ validate_assignment=True,
68
+ protected_namespaces=(),
69
+ )
70
+
71
+
72
+ def to_str(self) -> str:
73
+ """Returns the string representation of the model using alias"""
74
+ return pprint.pformat(self.model_dump(by_alias=True))
75
+
76
+ def to_json(self) -> str:
77
+ """Returns the JSON representation of the model using alias"""
78
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
79
+ return json.dumps(self.to_dict())
80
+
81
+ @classmethod
82
+ def from_json(cls, json_str: str) -> Optional[Self]:
83
+ """Create an instance of MspUpgradeRunDto from a JSON string"""
84
+ return cls.from_dict(json.loads(json_str))
85
+
86
+ def to_dict(self) -> Dict[str, Any]:
87
+ """Return the dictionary representation of the model using alias.
88
+
89
+ This has the following differences from calling pydantic's
90
+ `self.model_dump(by_alias=True)`:
91
+
92
+ * `None` is only added to the output dict for nullable fields that
93
+ were set at model initialization. Other fields with value `None`
94
+ are ignored.
95
+ """
96
+ excluded_fields: Set[str] = set([
97
+ ])
98
+
99
+ _dict = self.model_dump(
100
+ by_alias=True,
101
+ exclude=excluded_fields,
102
+ exclude_none=True,
103
+ )
104
+ # override the default output from pydantic by calling `to_dict()` of metadata
105
+ if self.metadata:
106
+ _dict['metadata'] = self.metadata.to_dict()
107
+ return _dict
108
+
109
+ @classmethod
110
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
111
+ """Create an instance of MspUpgradeRunDto from a dict"""
112
+ if obj is None:
113
+ return None
114
+
115
+ if not isinstance(obj, dict):
116
+ return cls.model_validate(obj)
117
+
118
+ _obj = cls.model_validate({
119
+ "errorMsg": obj.get("errorMsg"),
120
+ "lastUpdatedTime": obj.get("lastUpdatedTime"),
121
+ "metadata": UpgradeRunMetadataDto.from_dict(obj["metadata"]) if obj.get("metadata") is not None else None,
122
+ "name": obj.get("name"),
123
+ "softwareVersion": obj.get("softwareVersion"),
124
+ "stageUpgradeOnly": obj.get("stageUpgradeOnly"),
125
+ "submissionTime": obj.get("submissionTime"),
126
+ "transactionUid": obj.get("transactionUid"),
127
+ "uid": obj.get("uid"),
128
+ "upgradeRunStatus": obj.get("upgradeRunStatus"),
129
+ "upgradeRunType": obj.get("upgradeRunType")
130
+ })
131
+ return _obj
132
+
133
+
@@ -0,0 +1,102 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.15.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictInt
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from scc_firewall_manager_sdk.models.msp_upgrade_run_dto import MspUpgradeRunDto
24
+ from typing import Optional, Set
25
+ from typing_extensions import Self
26
+
27
+ class MspUpgradeRunDtoPage(BaseModel):
28
+ """
29
+ MspUpgradeRunDtoPage
30
+ """ # noqa: E501
31
+ count: Optional[StrictInt] = Field(default=None, description="The total number of results available.")
32
+ items: Optional[List[MspUpgradeRunDto]] = Field(default=None, description="The list of items retrieved.")
33
+ limit: Optional[StrictInt] = Field(default=None, description="The number of results retrieved.")
34
+ offset: Optional[StrictInt] = Field(default=None, description="The offset of the results retrieved. The Security Cloud Control API uses the offset field to determine the index of the first result retrieved, and will retrieve `limit` results from the offset specified.")
35
+ __properties: ClassVar[List[str]] = ["count", "items", "limit", "offset"]
36
+
37
+ model_config = ConfigDict(
38
+ populate_by_name=True,
39
+ validate_assignment=True,
40
+ protected_namespaces=(),
41
+ )
42
+
43
+
44
+ def to_str(self) -> str:
45
+ """Returns the string representation of the model using alias"""
46
+ return pprint.pformat(self.model_dump(by_alias=True))
47
+
48
+ def to_json(self) -> str:
49
+ """Returns the JSON representation of the model using alias"""
50
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
51
+ return json.dumps(self.to_dict())
52
+
53
+ @classmethod
54
+ def from_json(cls, json_str: str) -> Optional[Self]:
55
+ """Create an instance of MspUpgradeRunDtoPage from a JSON string"""
56
+ return cls.from_dict(json.loads(json_str))
57
+
58
+ def to_dict(self) -> Dict[str, Any]:
59
+ """Return the dictionary representation of the model using alias.
60
+
61
+ This has the following differences from calling pydantic's
62
+ `self.model_dump(by_alias=True)`:
63
+
64
+ * `None` is only added to the output dict for nullable fields that
65
+ were set at model initialization. Other fields with value `None`
66
+ are ignored.
67
+ """
68
+ excluded_fields: Set[str] = set([
69
+ ])
70
+
71
+ _dict = self.model_dump(
72
+ by_alias=True,
73
+ exclude=excluded_fields,
74
+ exclude_none=True,
75
+ )
76
+ # override the default output from pydantic by calling `to_dict()` of each item in items (list)
77
+ _items = []
78
+ if self.items:
79
+ for _item in self.items:
80
+ if _item:
81
+ _items.append(_item.to_dict())
82
+ _dict['items'] = _items
83
+ return _dict
84
+
85
+ @classmethod
86
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
87
+ """Create an instance of MspUpgradeRunDtoPage from a dict"""
88
+ if obj is None:
89
+ return None
90
+
91
+ if not isinstance(obj, dict):
92
+ return cls.model_validate(obj)
93
+
94
+ _obj = cls.model_validate({
95
+ "count": obj.get("count"),
96
+ "items": [MspUpgradeRunDto.from_dict(_item) for _item in obj["items"]] if obj.get("items") is not None else None,
97
+ "limit": obj.get("limit"),
98
+ "offset": obj.get("offset")
99
+ })
100
+ return _obj
101
+
102
+
@@ -43,8 +43,8 @@ class UpgradeRunDto(BaseModel):
43
43
  if value is None:
44
44
  return value
45
45
 
46
- if value not in set(['UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', 'UGPRADE_STAGING_FAILED', 'PERFORMING_UPGRADE', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
47
- raise ValueError("must be one of enum values ('UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', 'UGPRADE_STAGING_FAILED', 'PERFORMING_UPGRADE', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
46
+ if value not in set(['UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'PERFORMING_UPGRADE', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
47
+ raise ValueError("must be one of enum values ('UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'PERFORMING_UPGRADE', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
48
48
  return value
49
49
 
50
50
  @field_validator('upgrade_run_type')
@@ -0,0 +1,96 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.15.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from scc_firewall_manager_sdk.models.device_upgrade_status_dto import DeviceUpgradeStatusDto
24
+ from typing import Optional, Set
25
+ from typing_extensions import Self
26
+
27
+ class UpgradeRunMetadataDto(BaseModel):
28
+ """
29
+ UpgradeRunMetadataDto
30
+ """ # noqa: E501
31
+ devices: Optional[List[DeviceUpgradeStatusDto]] = Field(default=None, description="The set of device UIDs that are part of this upgrade run.")
32
+ __properties: ClassVar[List[str]] = ["devices"]
33
+
34
+ model_config = ConfigDict(
35
+ populate_by_name=True,
36
+ validate_assignment=True,
37
+ protected_namespaces=(),
38
+ )
39
+
40
+
41
+ def to_str(self) -> str:
42
+ """Returns the string representation of the model using alias"""
43
+ return pprint.pformat(self.model_dump(by_alias=True))
44
+
45
+ def to_json(self) -> str:
46
+ """Returns the JSON representation of the model using alias"""
47
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
48
+ return json.dumps(self.to_dict())
49
+
50
+ @classmethod
51
+ def from_json(cls, json_str: str) -> Optional[Self]:
52
+ """Create an instance of UpgradeRunMetadataDto from a JSON string"""
53
+ return cls.from_dict(json.loads(json_str))
54
+
55
+ def to_dict(self) -> Dict[str, Any]:
56
+ """Return the dictionary representation of the model using alias.
57
+
58
+ This has the following differences from calling pydantic's
59
+ `self.model_dump(by_alias=True)`:
60
+
61
+ * `None` is only added to the output dict for nullable fields that
62
+ were set at model initialization. Other fields with value `None`
63
+ are ignored.
64
+ """
65
+ excluded_fields: Set[str] = set([
66
+ ])
67
+
68
+ _dict = self.model_dump(
69
+ by_alias=True,
70
+ exclude=excluded_fields,
71
+ exclude_none=True,
72
+ )
73
+ # override the default output from pydantic by calling `to_dict()` of each item in devices (list)
74
+ _items = []
75
+ if self.devices:
76
+ for _item in self.devices:
77
+ if _item:
78
+ _items.append(_item.to_dict())
79
+ _dict['devices'] = _items
80
+ return _dict
81
+
82
+ @classmethod
83
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
84
+ """Create an instance of UpgradeRunMetadataDto from a dict"""
85
+ if obj is None:
86
+ return None
87
+
88
+ if not isinstance(obj, dict):
89
+ return cls.model_validate(obj)
90
+
91
+ _obj = cls.model_validate({
92
+ "devices": [DeviceUpgradeStatusDto.from_dict(_item) for _item in obj["devices"]] if obj.get("devices") is not None else None
93
+ })
94
+ return _obj
95
+
96
+
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: scc-firewall-manager-sdk
3
- Version: 1.15.222
3
+ Version: 1.15.224
4
4
  Summary: Cisco Security Cloud Control Firewall Manager API
5
5
  Home-page:
6
6
  Author: Cisco Security Cloud Control TAC
@@ -1,7 +1,7 @@
1
- scc_firewall_manager_sdk/__init__.py,sha256=ib7uQOw3UJ2EQslayaBFW8xenkKblNxQz9LmEZuWSds,23012
2
- scc_firewall_manager_sdk/api_client.py,sha256=ZqOs-9VR6JKyzc_z5rJiIF5QcTihKvuyMSGNorF4cw4,25921
1
+ scc_firewall_manager_sdk/__init__.py,sha256=cdtNuUp1pW6t52a12qGxz5rbOt6jNZX_iytcUqY_aW0,23367
2
+ scc_firewall_manager_sdk/api_client.py,sha256=ixLMtywRXrk2k9QbFKfLoox8ov1maTKtg31TEtpkuf8,25921
3
3
  scc_firewall_manager_sdk/api_response.py,sha256=eMxw1mpmJcoGZ3gs9z6jM4oYoZ10Gjk333s9sKxGv7s,652
4
- scc_firewall_manager_sdk/configuration.py,sha256=LkBN_k0DOg9T1B5-0zFbargPoq4e1A5tEfvz8XFSCec,15993
4
+ scc_firewall_manager_sdk/configuration.py,sha256=PXIx1kbJcr-WNY_hvrQFo6B-s86VvKC6CT7Ya1zKG78,15993
5
5
  scc_firewall_manager_sdk/exceptions.py,sha256=u5-7l5MRjP-aS2pNudBzqSw9OI4xVsIvUjw4WCA8LEk,6039
6
6
  scc_firewall_manager_sdk/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
7
7
  scc_firewall_manager_sdk/rest.py,sha256=cSeilvAB5y-V_10IdXcZ0kOyv5dYW8jeWVhrD6kUDa0,9309
@@ -18,11 +18,11 @@ scc_firewall_manager_sdk/api/commands_api.py,sha256=U1cDPCmUAgOPnCOC8KcbcQpLGSwg
18
18
  scc_firewall_manager_sdk/api/connectors_api.py,sha256=lw4asxJMtyHTm3sxM6Z7S1O2tbr4ZtbjVrZIalmYagI,59889
19
19
  scc_firewall_manager_sdk/api/device_health_aggregations_api.py,sha256=r4YyX6_HDWriUOh9dRFmjNzY08rozUatGOjpFzhkyJ4,29025
20
20
  scc_firewall_manager_sdk/api/device_health_api.py,sha256=UoxgUo10Am1kga8U0Kxhb6DDw6d7wpXxzGopsvUJ1JI,62283
21
- scc_firewall_manager_sdk/api/device_upgrades_api.py,sha256=iWb4v4tteX7uoEOncmF34V0n1So7oTPa_tV9AscL9Ck,138718
21
+ scc_firewall_manager_sdk/api/device_upgrades_api.py,sha256=nEtjWfCJ9eDVONZ0TLUApEcanm82CwcXTuax7kUVZxs,138514
22
22
  scc_firewall_manager_sdk/api/interface_health_aggregations_api.py,sha256=2fxsrkfFpI2zSx3WnviJnP0uuS2XBT8YE_sZ0FcXjk0,40990
23
23
  scc_firewall_manager_sdk/api/inventory_api.py,sha256=EJqDZzqBE4w_klxuo84rSYmrmbinGSJEbSbU6Wqs4Gg,444995
24
24
  scc_firewall_manager_sdk/api/meta_api.py,sha256=0T4mIpkOc0FyDIvEN5qhRQbKN4CzOM00_sRVY2oG59U,29963
25
- scc_firewall_manager_sdk/api/msp_device_upgrades_api.py,sha256=4Uhe5jC0acw-Jt0Vej-r9NxFo_K7Z2fPdn9xJUpKtgs,25728
25
+ scc_firewall_manager_sdk/api/msp_device_upgrades_api.py,sha256=Tt0_OnxCJiSPhiWfYYOMJqKCJ3UvPxV-0qpvA12KHVk,73309
26
26
  scc_firewall_manager_sdk/api/msp_inventory_api.py,sha256=eLYqsv_7YNxQGLQLqEnWfSFPIJ8nWnuJQkZfxtGapxM,185473
27
27
  scc_firewall_manager_sdk/api/msp_tenant_management_api.py,sha256=u1Ljk5-A3JnMGyfGNVVyc1L2ll6I1m43hrLflbqvT5M,108920
28
28
  scc_firewall_manager_sdk/api/msp_user_management_api.py,sha256=MPy-WAv52ziuUcrK_Tq_q38PN1pbpgfL5fdqzYP81S8,54797
@@ -32,7 +32,7 @@ scc_firewall_manager_sdk/api/search_api.py,sha256=PonVl7RieSVsbCCVQOdqIA7vx2NCH5
32
32
  scc_firewall_manager_sdk/api/tenant_management_api.py,sha256=3PWPuirkaUck1VZex3w4Cg3qO05GF0f7xeiptaAc5zE,55069
33
33
  scc_firewall_manager_sdk/api/transactions_api.py,sha256=fz0Ko2bAXFpz0SM8psceOlcxq0gXnrnuTEhaX1E0QzA,23402
34
34
  scc_firewall_manager_sdk/api/users_api.py,sha256=MKuyXmxWLSqPBkfA7rUGZ1EO1Ox-Oge7QhhgzSFAVu8,191609
35
- scc_firewall_manager_sdk/models/__init__.py,sha256=tUSTeNLw5Mj1v9GgHa9e5Cln-lJH4kvPsVzQksP-8pg,20336
35
+ scc_firewall_manager_sdk/models/__init__.py,sha256=07sbOLDB114txfsfIAurBXzSVP2E0g8aB3e6G41sLGs,20691
36
36
  scc_firewall_manager_sdk/models/access_group.py,sha256=9FlXrDT5xhtk-uWuwgMmM-qAGiKZrpfnkphZuogGsHo,4583
37
37
  scc_firewall_manager_sdk/models/access_group_create_input.py,sha256=7tgCifqvqbwS2bZvS_PQdIV_ra_jiEbupJhyaHcG8ys,3930
38
38
  scc_firewall_manager_sdk/models/access_group_page.py,sha256=imWa0te5qmTpXfuE8W8YM3SG01MIn4ewbA-_N8kPKHk,3725
@@ -118,6 +118,7 @@ scc_firewall_manager_sdk/models/device_metadata.py,sha256=PNCBkG35enpJhcwqiku4NH
118
118
  scc_firewall_manager_sdk/models/device_page.py,sha256=ha32rLEnC9v8JpDff_07t_rtFLa-pAJFelG7czmFl8g,3684
119
119
  scc_firewall_manager_sdk/models/device_patch_input.py,sha256=1LOG---DhQRxRYP0qA8PzzopCUX5c0bbLu7ptIySYXo,4224
120
120
  scc_firewall_manager_sdk/models/device_role.py,sha256=cqv0xYyNhsvAOoDRUpdeSwkbEE9u89hEf8gA66cAteQ,1038
121
+ scc_firewall_manager_sdk/models/device_upgrade_status_dto.py,sha256=W9HPNTkieM9hjcMHDIsNThXW1pGIiz6oI5an_UdWTYo,5084
121
122
  scc_firewall_manager_sdk/models/devices_patch_input.py,sha256=lSH-tNHYdS0CjWsHcSsnzQ9kL5ZxIsaVoHMxp5_Z8n4,3836
122
123
  scc_firewall_manager_sdk/models/disk_health_metrics.py,sha256=QU7XHLFoitOo4_ijLYromfp0stM8c7tx1T20uocXGXs,2947
123
124
  scc_firewall_manager_sdk/models/domain_settings.py,sha256=QqPTLHlNLd-PDoVqviIrU0IIPXhqLdTqTokV6uVQ8ug,3852
@@ -195,7 +196,7 @@ scc_firewall_manager_sdk/models/msp_export_input.py,sha256=OcIWeptdOLWRGBVsj6LCc
195
196
  scc_firewall_manager_sdk/models/msp_managed_cloud_service.py,sha256=_PYu5Nn-6xrJMH_3fbHHdXSESWevOtTj4pM55hIGDpQ,5482
196
197
  scc_firewall_manager_sdk/models/msp_managed_cloud_service_distinct_attribute_values.py,sha256=p3LQ3KOJ2uR--Qvy1-5vVlk4kYEVTijTDElHqCNR_Rc,4719
197
198
  scc_firewall_manager_sdk/models/msp_managed_cloud_service_page.py,sha256=Dd7FHEypt16shFZwXr40hdOec1abJRRLCTztdGs_fhU,3815
198
- scc_firewall_manager_sdk/models/msp_managed_device.py,sha256=1jlNxbuAXMgfR5vDlHRz4ZNXuio35Duz-Z2G95kBBH0,10574
199
+ scc_firewall_manager_sdk/models/msp_managed_device.py,sha256=cU_hIu60qEcrh6R3YCndDuWwjbBgDk75XOxs62zVNhY,11128
199
200
  scc_firewall_manager_sdk/models/msp_managed_device_distinct_attribute_values.py,sha256=DcE0qIEueWR4_U4sEaT2GqzAToZgJfS9LA-qtddd9lg,5552
200
201
  scc_firewall_manager_sdk/models/msp_managed_device_manager.py,sha256=EpNlNfq51KQg19ge2YLoSldcqapT8gqjmJ5ZD9gn0Lg,5379
201
202
  scc_firewall_manager_sdk/models/msp_managed_device_manager_distinct_attribute_values.py,sha256=IdKwQdyQ12Hgup8-raO2TQQwF-D0ifpvcAKRYv2WKqc,4272
@@ -206,6 +207,8 @@ scc_firewall_manager_sdk/models/msp_managed_template_distinct_attribute_values.p
206
207
  scc_firewall_manager_sdk/models/msp_managed_templates_page.py,sha256=gtzwQeg0bEFDWbMDM4uBt-L4aYpp3hotFur4mdYZX1s,3786
207
208
  scc_firewall_manager_sdk/models/msp_managed_tenant.py,sha256=TNe2ICfaX9ZvueCjSovGdNDoTW6L9b6gIcrY4l3MlJI,3784
208
209
  scc_firewall_manager_sdk/models/msp_managed_tenant_page.py,sha256=eMkOCp0F3rSPYEYWxOMm99QIhLkPxj26-OM77nyWOKc,3766
210
+ scc_firewall_manager_sdk/models/msp_upgrade_run_dto.py,sha256=VsglFNUrGYzgus51WL5uhv6lK_SV5AcbfQp_3uRxols,6539
211
+ scc_firewall_manager_sdk/models/msp_upgrade_run_dto_page.py,sha256=eE2zAYd6zeQ3aSP4GfYjJMFRvID6LzWAkBih_H3Gp9A,3767
209
212
  scc_firewall_manager_sdk/models/network.py,sha256=T1MdmQRNP6gmIYo4PRVPq-aEVDw13SHrN5DvQZu-L7A,2974
210
213
  scc_firewall_manager_sdk/models/network_object_content.py,sha256=qwtnc7RcIfWcV3WhCLaZeeZQEUIR56unMWdmHNo3vXI,2726
211
214
  scc_firewall_manager_sdk/models/object_content.py,sha256=yhDK2KXeN9KFnSNgAaB-NdnSyLhXslpSf6hCzg-EgSw,7159
@@ -263,7 +266,8 @@ scc_firewall_manager_sdk/models/upgrade_asa_device_input.py,sha256=j_zJPdZT2o__U
263
266
  scc_firewall_manager_sdk/models/upgrade_compatibility_info_dto.py,sha256=MrrStiOPXJs6odegiASDlqyWKwsWTT8h2N-N4ds_CtU,4060
264
267
  scc_firewall_manager_sdk/models/upgrade_ftd_device_input.py,sha256=MbPKinUCTDXl39E-P7KhiHb3oJKb_Liewn7WS21Y-0k,3843
265
268
  scc_firewall_manager_sdk/models/upgrade_ftd_devices_input.py,sha256=yEoDUzkxOm0M_4FBiLF_nNsjQxdY8SZ7YtR3YfKkf-4,4274
266
- scc_firewall_manager_sdk/models/upgrade_run_dto.py,sha256=Aw4R31JM_NfUrPerNZEPpCq9zntmw5UvCt-xh104piU,5544
269
+ scc_firewall_manager_sdk/models/upgrade_run_dto.py,sha256=Y7HKW5uOgEhYhZv7AcrVn1jABZUZmr_6mtp5D4sKLek,5544
270
+ scc_firewall_manager_sdk/models/upgrade_run_metadata_dto.py,sha256=y1t2kF5-KztfeSfFul5RJBcKIgNhOHeA_JAttKC6Pm0,3202
267
271
  scc_firewall_manager_sdk/models/upgrade_run_modify_input.py,sha256=attD1huRN1nST0xkblUW50VgNYtNXtOGH_1WVF0q-jw,2708
268
272
  scc_firewall_manager_sdk/models/url_object_content.py,sha256=OqcDbRE_HoEGf4Z_yCsTH8B08R9GdY8RMOs1wM0-ecY,2657
269
273
  scc_firewall_manager_sdk/models/user.py,sha256=2bH858kufK8KnTsIXIul0VOH0JpJ-g4zyXE9lyMQHGE,4297
@@ -276,7 +280,7 @@ scc_firewall_manager_sdk/models/vlan_interface_create_input.py,sha256=AKUqPJw5ku
276
280
  scc_firewall_manager_sdk/models/vlan_interface_patch_input.py,sha256=srEFTyQykscNrWsbp8KGEzbmHC07_AU3DXjJ-7Be4zc,6054
277
281
  scc_firewall_manager_sdk/models/ztp_onboarding_input.py,sha256=HAgBTdocZeHGDZP_-9NyRtzP9E7BReGtiOmn4S3J-_g,5326
278
282
  scc_firewall_manager_sdk/models/ztp_onboarding_template_configuration.py,sha256=f9Z62yGFvz4QAQ07Z4bjfHLw2bRg46ccwoLuQ8q30TE,4808
279
- scc_firewall_manager_sdk-1.15.222.dist-info/METADATA,sha256=I0fq0vZUwF5igF_tYGaCDIrSFB6hQpXdJuO_hVQL7p0,596
280
- scc_firewall_manager_sdk-1.15.222.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
281
- scc_firewall_manager_sdk-1.15.222.dist-info/top_level.txt,sha256=_g9WfFWGagKs6ULdfhEt8e7RXknpcp9_jA9ubIL4U3I,25
282
- scc_firewall_manager_sdk-1.15.222.dist-info/RECORD,,
283
+ scc_firewall_manager_sdk-1.15.224.dist-info/METADATA,sha256=6Oem-Ueyf8KVlvlN3UHvPoPwF1Nowsd360VrpkWJeww,596
284
+ scc_firewall_manager_sdk-1.15.224.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
285
+ scc_firewall_manager_sdk-1.15.224.dist-info/top_level.txt,sha256=_g9WfFWGagKs6ULdfhEt8e7RXknpcp9_jA9ubIL4U3I,25
286
+ scc_firewall_manager_sdk-1.15.224.dist-info/RECORD,,