scc-firewall-manager-sdk 1.15.223__py3-none-any.whl → 1.15.224__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of scc-firewall-manager-sdk might be problematic. Click here for more details.
- scc_firewall_manager_sdk/__init__.py +5 -1
- scc_firewall_manager_sdk/api/device_upgrades_api.py +281 -281
- scc_firewall_manager_sdk/api/msp_device_upgrades_api.py +1089 -0
- scc_firewall_manager_sdk/api_client.py +1 -1
- scc_firewall_manager_sdk/configuration.py +1 -1
- scc_firewall_manager_sdk/models/__init__.py +4 -0
- scc_firewall_manager_sdk/models/device_upgrade_status_dto.py +112 -0
- scc_firewall_manager_sdk/models/msp_managed_device.py +7 -1
- scc_firewall_manager_sdk/models/msp_upgrade_run_dto.py +133 -0
- scc_firewall_manager_sdk/models/msp_upgrade_run_dto_page.py +102 -0
- scc_firewall_manager_sdk/models/upgrade_run_dto.py +2 -2
- scc_firewall_manager_sdk/models/upgrade_run_metadata_dto.py +96 -0
- {scc_firewall_manager_sdk-1.15.223.dist-info → scc_firewall_manager_sdk-1.15.224.dist-info}/METADATA +1 -1
- {scc_firewall_manager_sdk-1.15.223.dist-info → scc_firewall_manager_sdk-1.15.224.dist-info}/RECORD +16 -12
- {scc_firewall_manager_sdk-1.15.223.dist-info → scc_firewall_manager_sdk-1.15.224.dist-info}/WHEEL +0 -0
- {scc_firewall_manager_sdk-1.15.223.dist-info → scc_firewall_manager_sdk-1.15.224.dist-info}/top_level.txt +0 -0
|
@@ -88,7 +88,7 @@ class ApiClient:
|
|
|
88
88
|
self.default_headers[header_name] = header_value
|
|
89
89
|
self.cookie = cookie
|
|
90
90
|
# Set default User-Agent.
|
|
91
|
-
self.user_agent = 'OpenAPI-Generator/1.15.
|
|
91
|
+
self.user_agent = 'OpenAPI-Generator/1.15.224/python'
|
|
92
92
|
self.client_side_validation = configuration.client_side_validation
|
|
93
93
|
|
|
94
94
|
def __enter__(self):
|
|
@@ -380,7 +380,7 @@ class Configuration:
|
|
|
380
380
|
"OS: {env}\n"\
|
|
381
381
|
"Python Version: {pyversion}\n"\
|
|
382
382
|
"Version of the API: 1.15.0\n"\
|
|
383
|
-
"SDK Package Version: 1.15.
|
|
383
|
+
"SDK Package Version: 1.15.224".\
|
|
384
384
|
format(env=sys.platform, pyversion=sys.version)
|
|
385
385
|
|
|
386
386
|
def get_host_settings(self):
|
|
@@ -100,6 +100,7 @@ from scc_firewall_manager_sdk.models.device_metadata import DeviceMetadata
|
|
|
100
100
|
from scc_firewall_manager_sdk.models.device_page import DevicePage
|
|
101
101
|
from scc_firewall_manager_sdk.models.device_patch_input import DevicePatchInput
|
|
102
102
|
from scc_firewall_manager_sdk.models.device_role import DeviceRole
|
|
103
|
+
from scc_firewall_manager_sdk.models.device_upgrade_status_dto import DeviceUpgradeStatusDto
|
|
103
104
|
from scc_firewall_manager_sdk.models.devices_patch_input import DevicesPatchInput
|
|
104
105
|
from scc_firewall_manager_sdk.models.disk_health_metrics import DiskHealthMetrics
|
|
105
106
|
from scc_firewall_manager_sdk.models.domain_settings import DomainSettings
|
|
@@ -188,6 +189,8 @@ from scc_firewall_manager_sdk.models.msp_managed_template_distinct_attribute_val
|
|
|
188
189
|
from scc_firewall_manager_sdk.models.msp_managed_templates_page import MspManagedTemplatesPage
|
|
189
190
|
from scc_firewall_manager_sdk.models.msp_managed_tenant import MspManagedTenant
|
|
190
191
|
from scc_firewall_manager_sdk.models.msp_managed_tenant_page import MspManagedTenantPage
|
|
192
|
+
from scc_firewall_manager_sdk.models.msp_upgrade_run_dto import MspUpgradeRunDto
|
|
193
|
+
from scc_firewall_manager_sdk.models.msp_upgrade_run_dto_page import MspUpgradeRunDtoPage
|
|
191
194
|
from scc_firewall_manager_sdk.models.network import Network
|
|
192
195
|
from scc_firewall_manager_sdk.models.network_object_content import NetworkObjectContent
|
|
193
196
|
from scc_firewall_manager_sdk.models.os import OS
|
|
@@ -246,6 +249,7 @@ from scc_firewall_manager_sdk.models.upgrade_compatibility_info_dto import Upgra
|
|
|
246
249
|
from scc_firewall_manager_sdk.models.upgrade_ftd_device_input import UpgradeFtdDeviceInput
|
|
247
250
|
from scc_firewall_manager_sdk.models.upgrade_ftd_devices_input import UpgradeFtdDevicesInput
|
|
248
251
|
from scc_firewall_manager_sdk.models.upgrade_run_dto import UpgradeRunDto
|
|
252
|
+
from scc_firewall_manager_sdk.models.upgrade_run_metadata_dto import UpgradeRunMetadataDto
|
|
249
253
|
from scc_firewall_manager_sdk.models.upgrade_run_modify_input import UpgradeRunModifyInput
|
|
250
254
|
from scc_firewall_manager_sdk.models.url_object_content import UrlObjectContent
|
|
251
255
|
from scc_firewall_manager_sdk.models.user import User
|
|
@@ -0,0 +1,112 @@
|
|
|
1
|
+
# coding: utf-8
|
|
2
|
+
|
|
3
|
+
"""
|
|
4
|
+
Cisco Security Cloud Control Firewall Manager API
|
|
5
|
+
|
|
6
|
+
Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
|
|
7
|
+
|
|
8
|
+
The version of the OpenAPI document: 1.15.0
|
|
9
|
+
Contact: cdo.tac@cisco.com
|
|
10
|
+
Generated by OpenAPI Generator (https://openapi-generator.tech)
|
|
11
|
+
|
|
12
|
+
Do not edit the class manually.
|
|
13
|
+
""" # noqa: E501
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
from __future__ import annotations
|
|
17
|
+
import pprint
|
|
18
|
+
import re # noqa: F401
|
|
19
|
+
import json
|
|
20
|
+
|
|
21
|
+
from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator
|
|
22
|
+
from typing import Any, ClassVar, Dict, List, Optional
|
|
23
|
+
from typing import Optional, Set
|
|
24
|
+
from typing_extensions import Self
|
|
25
|
+
|
|
26
|
+
class DeviceUpgradeStatusDto(BaseModel):
|
|
27
|
+
"""
|
|
28
|
+
DeviceUpgradeStatusDto
|
|
29
|
+
""" # noqa: E501
|
|
30
|
+
hardware_model: Optional[StrictStr] = Field(default=None, description="The hardware model of the devices being upgraded.", alias="hardwareModel")
|
|
31
|
+
managed_tenant_display_name: Optional[StrictStr] = Field(default=None, description="The display name of the managed tenant in CDO.", alias="managedTenantDisplayName")
|
|
32
|
+
managed_tenant_name: Optional[StrictStr] = Field(default=None, description="The name of the managed tenant in CDO.", alias="managedTenantName")
|
|
33
|
+
managed_tenant_uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the managed tenant in Security Cloud Control that this device belongs to.", alias="managedTenantUid")
|
|
34
|
+
name: Optional[StrictStr] = Field(default=None, description="The name of the device being upgraded.")
|
|
35
|
+
transaction_uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the CDO transaction on the managed tenant that tracks this upgrade run.", alias="transactionUid")
|
|
36
|
+
uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the device being upgraded.")
|
|
37
|
+
upgrade_run_status: Optional[StrictStr] = Field(default=None, description="The current status of the upgrade run.", alias="upgradeRunStatus")
|
|
38
|
+
__properties: ClassVar[List[str]] = ["hardwareModel", "managedTenantDisplayName", "managedTenantName", "managedTenantUid", "name", "transactionUid", "uid", "upgradeRunStatus"]
|
|
39
|
+
|
|
40
|
+
@field_validator('upgrade_run_status')
|
|
41
|
+
def upgrade_run_status_validate_enum(cls, value):
|
|
42
|
+
"""Validates the enum"""
|
|
43
|
+
if value is None:
|
|
44
|
+
return value
|
|
45
|
+
|
|
46
|
+
if value not in set(['IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
|
|
47
|
+
raise ValueError("must be one of enum values ('IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
|
|
48
|
+
return value
|
|
49
|
+
|
|
50
|
+
model_config = ConfigDict(
|
|
51
|
+
populate_by_name=True,
|
|
52
|
+
validate_assignment=True,
|
|
53
|
+
protected_namespaces=(),
|
|
54
|
+
)
|
|
55
|
+
|
|
56
|
+
|
|
57
|
+
def to_str(self) -> str:
|
|
58
|
+
"""Returns the string representation of the model using alias"""
|
|
59
|
+
return pprint.pformat(self.model_dump(by_alias=True))
|
|
60
|
+
|
|
61
|
+
def to_json(self) -> str:
|
|
62
|
+
"""Returns the JSON representation of the model using alias"""
|
|
63
|
+
# TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
|
|
64
|
+
return json.dumps(self.to_dict())
|
|
65
|
+
|
|
66
|
+
@classmethod
|
|
67
|
+
def from_json(cls, json_str: str) -> Optional[Self]:
|
|
68
|
+
"""Create an instance of DeviceUpgradeStatusDto from a JSON string"""
|
|
69
|
+
return cls.from_dict(json.loads(json_str))
|
|
70
|
+
|
|
71
|
+
def to_dict(self) -> Dict[str, Any]:
|
|
72
|
+
"""Return the dictionary representation of the model using alias.
|
|
73
|
+
|
|
74
|
+
This has the following differences from calling pydantic's
|
|
75
|
+
`self.model_dump(by_alias=True)`:
|
|
76
|
+
|
|
77
|
+
* `None` is only added to the output dict for nullable fields that
|
|
78
|
+
were set at model initialization. Other fields with value `None`
|
|
79
|
+
are ignored.
|
|
80
|
+
"""
|
|
81
|
+
excluded_fields: Set[str] = set([
|
|
82
|
+
])
|
|
83
|
+
|
|
84
|
+
_dict = self.model_dump(
|
|
85
|
+
by_alias=True,
|
|
86
|
+
exclude=excluded_fields,
|
|
87
|
+
exclude_none=True,
|
|
88
|
+
)
|
|
89
|
+
return _dict
|
|
90
|
+
|
|
91
|
+
@classmethod
|
|
92
|
+
def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
|
|
93
|
+
"""Create an instance of DeviceUpgradeStatusDto from a dict"""
|
|
94
|
+
if obj is None:
|
|
95
|
+
return None
|
|
96
|
+
|
|
97
|
+
if not isinstance(obj, dict):
|
|
98
|
+
return cls.model_validate(obj)
|
|
99
|
+
|
|
100
|
+
_obj = cls.model_validate({
|
|
101
|
+
"hardwareModel": obj.get("hardwareModel"),
|
|
102
|
+
"managedTenantDisplayName": obj.get("managedTenantDisplayName"),
|
|
103
|
+
"managedTenantName": obj.get("managedTenantName"),
|
|
104
|
+
"managedTenantUid": obj.get("managedTenantUid"),
|
|
105
|
+
"name": obj.get("name"),
|
|
106
|
+
"transactionUid": obj.get("transactionUid"),
|
|
107
|
+
"uid": obj.get("uid"),
|
|
108
|
+
"upgradeRunStatus": obj.get("upgradeRunStatus")
|
|
109
|
+
})
|
|
110
|
+
return _obj
|
|
111
|
+
|
|
112
|
+
|
|
@@ -27,6 +27,7 @@ from scc_firewall_manager_sdk.models.config_state import ConfigState
|
|
|
27
27
|
from scc_firewall_manager_sdk.models.conflict_detection_state import ConflictDetectionState
|
|
28
28
|
from scc_firewall_manager_sdk.models.connectivity_state import ConnectivityState
|
|
29
29
|
from scc_firewall_manager_sdk.models.entity_type import EntityType
|
|
30
|
+
from scc_firewall_manager_sdk.models.fmc_device_record import FmcDeviceRecord
|
|
30
31
|
from scc_firewall_manager_sdk.models.ftd_cluster_info import FtdClusterInfo
|
|
31
32
|
from scc_firewall_manager_sdk.models.ftd_ha_info import FtdHaInfo
|
|
32
33
|
from scc_firewall_manager_sdk.models.labels import Labels
|
|
@@ -46,6 +47,7 @@ class MspManagedDevice(BaseModel):
|
|
|
46
47
|
config_state: Optional[ConfigState] = Field(default=None, alias="configState")
|
|
47
48
|
conflict_detection_state: Optional[ConflictDetectionState] = Field(default=None, alias="conflictDetectionState")
|
|
48
49
|
connectivity_state: Optional[ConnectivityState] = Field(default=None, alias="connectivityState")
|
|
50
|
+
device_record_on_fmc: Optional[FmcDeviceRecord] = Field(default=None, alias="deviceRecordOnFmc")
|
|
49
51
|
device_type: Optional[EntityType] = Field(default=None, alias="deviceType")
|
|
50
52
|
ftd_cluster_info: Optional[FtdClusterInfo] = Field(default=None, alias="ftdClusterInfo")
|
|
51
53
|
ftd_ha_info: Optional[FtdHaInfo] = Field(default=None, alias="ftdHaInfo")
|
|
@@ -63,7 +65,7 @@ class MspManagedDevice(BaseModel):
|
|
|
63
65
|
software_version: Optional[StrictStr] = Field(default=None, description="The version of the software running on the device.", alias="softwareVersion")
|
|
64
66
|
tenant_uid: Optional[StrictStr] = Field(default=None, alias="tenantUid")
|
|
65
67
|
uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the device in Security Cloud Control.")
|
|
66
|
-
__properties: ClassVar[List[str]] = ["address", "asaFailoverMate", "asaFailoverMode", "asaFailoverState", "certificateExpiryDate", "chassisSerial", "configState", "conflictDetectionState", "connectivityState", "deviceType", "ftdClusterInfo", "ftdHaInfo", "hardwareModel", "labels", "managedTenantDisplayName", "managedTenantName", "managedTenantRegion", "managedTenantUid", "modelNumber", "name", "raVpnCertificateExpiryDate", "redundancyMode", "serial", "softwareVersion", "tenantUid", "uid"]
|
|
68
|
+
__properties: ClassVar[List[str]] = ["address", "asaFailoverMate", "asaFailoverMode", "asaFailoverState", "certificateExpiryDate", "chassisSerial", "configState", "conflictDetectionState", "connectivityState", "deviceRecordOnFmc", "deviceType", "ftdClusterInfo", "ftdHaInfo", "hardwareModel", "labels", "managedTenantDisplayName", "managedTenantName", "managedTenantRegion", "managedTenantUid", "modelNumber", "name", "raVpnCertificateExpiryDate", "redundancyMode", "serial", "softwareVersion", "tenantUid", "uid"]
|
|
67
69
|
|
|
68
70
|
@field_validator('redundancy_mode')
|
|
69
71
|
def redundancy_mode_validate_enum(cls, value):
|
|
@@ -117,6 +119,9 @@ class MspManagedDevice(BaseModel):
|
|
|
117
119
|
# override the default output from pydantic by calling `to_dict()` of asa_failover_mate
|
|
118
120
|
if self.asa_failover_mate:
|
|
119
121
|
_dict['asaFailoverMate'] = self.asa_failover_mate.to_dict()
|
|
122
|
+
# override the default output from pydantic by calling `to_dict()` of device_record_on_fmc
|
|
123
|
+
if self.device_record_on_fmc:
|
|
124
|
+
_dict['deviceRecordOnFmc'] = self.device_record_on_fmc.to_dict()
|
|
120
125
|
# override the default output from pydantic by calling `to_dict()` of ftd_cluster_info
|
|
121
126
|
if self.ftd_cluster_info:
|
|
122
127
|
_dict['ftdClusterInfo'] = self.ftd_cluster_info.to_dict()
|
|
@@ -147,6 +152,7 @@ class MspManagedDevice(BaseModel):
|
|
|
147
152
|
"configState": obj.get("configState"),
|
|
148
153
|
"conflictDetectionState": obj.get("conflictDetectionState"),
|
|
149
154
|
"connectivityState": obj.get("connectivityState"),
|
|
155
|
+
"deviceRecordOnFmc": FmcDeviceRecord.from_dict(obj["deviceRecordOnFmc"]) if obj.get("deviceRecordOnFmc") is not None else None,
|
|
150
156
|
"deviceType": obj.get("deviceType"),
|
|
151
157
|
"ftdClusterInfo": FtdClusterInfo.from_dict(obj["ftdClusterInfo"]) if obj.get("ftdClusterInfo") is not None else None,
|
|
152
158
|
"ftdHaInfo": FtdHaInfo.from_dict(obj["ftdHaInfo"]) if obj.get("ftdHaInfo") is not None else None,
|
|
@@ -0,0 +1,133 @@
|
|
|
1
|
+
# coding: utf-8
|
|
2
|
+
|
|
3
|
+
"""
|
|
4
|
+
Cisco Security Cloud Control Firewall Manager API
|
|
5
|
+
|
|
6
|
+
Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
|
|
7
|
+
|
|
8
|
+
The version of the OpenAPI document: 1.15.0
|
|
9
|
+
Contact: cdo.tac@cisco.com
|
|
10
|
+
Generated by OpenAPI Generator (https://openapi-generator.tech)
|
|
11
|
+
|
|
12
|
+
Do not edit the class manually.
|
|
13
|
+
""" # noqa: E501
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
from __future__ import annotations
|
|
17
|
+
import pprint
|
|
18
|
+
import re # noqa: F401
|
|
19
|
+
import json
|
|
20
|
+
|
|
21
|
+
from datetime import datetime
|
|
22
|
+
from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictStr, field_validator
|
|
23
|
+
from typing import Any, ClassVar, Dict, List, Optional
|
|
24
|
+
from scc_firewall_manager_sdk.models.upgrade_run_metadata_dto import UpgradeRunMetadataDto
|
|
25
|
+
from typing import Optional, Set
|
|
26
|
+
from typing_extensions import Self
|
|
27
|
+
|
|
28
|
+
class MspUpgradeRunDto(BaseModel):
|
|
29
|
+
"""
|
|
30
|
+
MspUpgradeRunDto
|
|
31
|
+
""" # noqa: E501
|
|
32
|
+
error_msg: Optional[StrictStr] = Field(default=None, description="The error message if the upgrade run failed.", alias="errorMsg")
|
|
33
|
+
last_updated_time: Optional[datetime] = Field(default=None, description="The time (UTC; represented using the RFC-3339 standard) at which the upgrade run was last updated.", alias="lastUpdatedTime")
|
|
34
|
+
metadata: Optional[UpgradeRunMetadataDto] = None
|
|
35
|
+
name: Optional[StrictStr] = Field(default=None, description="The name of the upgrade run. Upgrade runs names are unique in a tenant in SCC Firewall Manager.")
|
|
36
|
+
software_version: Optional[StrictStr] = Field(default=None, description="The target software version for the upgrade.", alias="softwareVersion")
|
|
37
|
+
stage_upgrade_only: Optional[StrictBool] = Field(default=None, description="Indicates if this upgrade run is to stage the upgrade on the device. If set to true, the upgrade is not applied on the device.", alias="stageUpgradeOnly")
|
|
38
|
+
submission_time: Optional[datetime] = Field(default=None, description="The time (UTC; represented using the RFC-3339 standard) at which the upgrade run was triggered.", alias="submissionTime")
|
|
39
|
+
transaction_uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the CDO transaction that tracks this upgrade run.", alias="transactionUid")
|
|
40
|
+
uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the upgrade run in SCC Firewall Manager.")
|
|
41
|
+
upgrade_run_status: Optional[StrictStr] = Field(default=None, description="The current status of the upgrade run.", alias="upgradeRunStatus")
|
|
42
|
+
upgrade_run_type: Optional[StrictStr] = Field(default=None, description="The type of upgrade run", alias="upgradeRunType")
|
|
43
|
+
__properties: ClassVar[List[str]] = ["errorMsg", "lastUpdatedTime", "metadata", "name", "softwareVersion", "stageUpgradeOnly", "submissionTime", "transactionUid", "uid", "upgradeRunStatus", "upgradeRunType"]
|
|
44
|
+
|
|
45
|
+
@field_validator('upgrade_run_status')
|
|
46
|
+
def upgrade_run_status_validate_enum(cls, value):
|
|
47
|
+
"""Validates the enum"""
|
|
48
|
+
if value is None:
|
|
49
|
+
return value
|
|
50
|
+
|
|
51
|
+
if value not in set(['IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
|
|
52
|
+
raise ValueError("must be one of enum values ('IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
|
|
53
|
+
return value
|
|
54
|
+
|
|
55
|
+
@field_validator('upgrade_run_type')
|
|
56
|
+
def upgrade_run_type_validate_enum(cls, value):
|
|
57
|
+
"""Validates the enum"""
|
|
58
|
+
if value is None:
|
|
59
|
+
return value
|
|
60
|
+
|
|
61
|
+
if value not in set(['ASA_DEVICE_UPGRADE', 'FTD_DEVICE_UPGRADE', 'FTD_SECURE_CLIENT_UPGRADE', 'ASA_SECURE_CLIENT_UPGRADE']):
|
|
62
|
+
raise ValueError("must be one of enum values ('ASA_DEVICE_UPGRADE', 'FTD_DEVICE_UPGRADE', 'FTD_SECURE_CLIENT_UPGRADE', 'ASA_SECURE_CLIENT_UPGRADE')")
|
|
63
|
+
return value
|
|
64
|
+
|
|
65
|
+
model_config = ConfigDict(
|
|
66
|
+
populate_by_name=True,
|
|
67
|
+
validate_assignment=True,
|
|
68
|
+
protected_namespaces=(),
|
|
69
|
+
)
|
|
70
|
+
|
|
71
|
+
|
|
72
|
+
def to_str(self) -> str:
|
|
73
|
+
"""Returns the string representation of the model using alias"""
|
|
74
|
+
return pprint.pformat(self.model_dump(by_alias=True))
|
|
75
|
+
|
|
76
|
+
def to_json(self) -> str:
|
|
77
|
+
"""Returns the JSON representation of the model using alias"""
|
|
78
|
+
# TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
|
|
79
|
+
return json.dumps(self.to_dict())
|
|
80
|
+
|
|
81
|
+
@classmethod
|
|
82
|
+
def from_json(cls, json_str: str) -> Optional[Self]:
|
|
83
|
+
"""Create an instance of MspUpgradeRunDto from a JSON string"""
|
|
84
|
+
return cls.from_dict(json.loads(json_str))
|
|
85
|
+
|
|
86
|
+
def to_dict(self) -> Dict[str, Any]:
|
|
87
|
+
"""Return the dictionary representation of the model using alias.
|
|
88
|
+
|
|
89
|
+
This has the following differences from calling pydantic's
|
|
90
|
+
`self.model_dump(by_alias=True)`:
|
|
91
|
+
|
|
92
|
+
* `None` is only added to the output dict for nullable fields that
|
|
93
|
+
were set at model initialization. Other fields with value `None`
|
|
94
|
+
are ignored.
|
|
95
|
+
"""
|
|
96
|
+
excluded_fields: Set[str] = set([
|
|
97
|
+
])
|
|
98
|
+
|
|
99
|
+
_dict = self.model_dump(
|
|
100
|
+
by_alias=True,
|
|
101
|
+
exclude=excluded_fields,
|
|
102
|
+
exclude_none=True,
|
|
103
|
+
)
|
|
104
|
+
# override the default output from pydantic by calling `to_dict()` of metadata
|
|
105
|
+
if self.metadata:
|
|
106
|
+
_dict['metadata'] = self.metadata.to_dict()
|
|
107
|
+
return _dict
|
|
108
|
+
|
|
109
|
+
@classmethod
|
|
110
|
+
def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
|
|
111
|
+
"""Create an instance of MspUpgradeRunDto from a dict"""
|
|
112
|
+
if obj is None:
|
|
113
|
+
return None
|
|
114
|
+
|
|
115
|
+
if not isinstance(obj, dict):
|
|
116
|
+
return cls.model_validate(obj)
|
|
117
|
+
|
|
118
|
+
_obj = cls.model_validate({
|
|
119
|
+
"errorMsg": obj.get("errorMsg"),
|
|
120
|
+
"lastUpdatedTime": obj.get("lastUpdatedTime"),
|
|
121
|
+
"metadata": UpgradeRunMetadataDto.from_dict(obj["metadata"]) if obj.get("metadata") is not None else None,
|
|
122
|
+
"name": obj.get("name"),
|
|
123
|
+
"softwareVersion": obj.get("softwareVersion"),
|
|
124
|
+
"stageUpgradeOnly": obj.get("stageUpgradeOnly"),
|
|
125
|
+
"submissionTime": obj.get("submissionTime"),
|
|
126
|
+
"transactionUid": obj.get("transactionUid"),
|
|
127
|
+
"uid": obj.get("uid"),
|
|
128
|
+
"upgradeRunStatus": obj.get("upgradeRunStatus"),
|
|
129
|
+
"upgradeRunType": obj.get("upgradeRunType")
|
|
130
|
+
})
|
|
131
|
+
return _obj
|
|
132
|
+
|
|
133
|
+
|
|
@@ -0,0 +1,102 @@
|
|
|
1
|
+
# coding: utf-8
|
|
2
|
+
|
|
3
|
+
"""
|
|
4
|
+
Cisco Security Cloud Control Firewall Manager API
|
|
5
|
+
|
|
6
|
+
Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
|
|
7
|
+
|
|
8
|
+
The version of the OpenAPI document: 1.15.0
|
|
9
|
+
Contact: cdo.tac@cisco.com
|
|
10
|
+
Generated by OpenAPI Generator (https://openapi-generator.tech)
|
|
11
|
+
|
|
12
|
+
Do not edit the class manually.
|
|
13
|
+
""" # noqa: E501
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
from __future__ import annotations
|
|
17
|
+
import pprint
|
|
18
|
+
import re # noqa: F401
|
|
19
|
+
import json
|
|
20
|
+
|
|
21
|
+
from pydantic import BaseModel, ConfigDict, Field, StrictInt
|
|
22
|
+
from typing import Any, ClassVar, Dict, List, Optional
|
|
23
|
+
from scc_firewall_manager_sdk.models.msp_upgrade_run_dto import MspUpgradeRunDto
|
|
24
|
+
from typing import Optional, Set
|
|
25
|
+
from typing_extensions import Self
|
|
26
|
+
|
|
27
|
+
class MspUpgradeRunDtoPage(BaseModel):
|
|
28
|
+
"""
|
|
29
|
+
MspUpgradeRunDtoPage
|
|
30
|
+
""" # noqa: E501
|
|
31
|
+
count: Optional[StrictInt] = Field(default=None, description="The total number of results available.")
|
|
32
|
+
items: Optional[List[MspUpgradeRunDto]] = Field(default=None, description="The list of items retrieved.")
|
|
33
|
+
limit: Optional[StrictInt] = Field(default=None, description="The number of results retrieved.")
|
|
34
|
+
offset: Optional[StrictInt] = Field(default=None, description="The offset of the results retrieved. The Security Cloud Control API uses the offset field to determine the index of the first result retrieved, and will retrieve `limit` results from the offset specified.")
|
|
35
|
+
__properties: ClassVar[List[str]] = ["count", "items", "limit", "offset"]
|
|
36
|
+
|
|
37
|
+
model_config = ConfigDict(
|
|
38
|
+
populate_by_name=True,
|
|
39
|
+
validate_assignment=True,
|
|
40
|
+
protected_namespaces=(),
|
|
41
|
+
)
|
|
42
|
+
|
|
43
|
+
|
|
44
|
+
def to_str(self) -> str:
|
|
45
|
+
"""Returns the string representation of the model using alias"""
|
|
46
|
+
return pprint.pformat(self.model_dump(by_alias=True))
|
|
47
|
+
|
|
48
|
+
def to_json(self) -> str:
|
|
49
|
+
"""Returns the JSON representation of the model using alias"""
|
|
50
|
+
# TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
|
|
51
|
+
return json.dumps(self.to_dict())
|
|
52
|
+
|
|
53
|
+
@classmethod
|
|
54
|
+
def from_json(cls, json_str: str) -> Optional[Self]:
|
|
55
|
+
"""Create an instance of MspUpgradeRunDtoPage from a JSON string"""
|
|
56
|
+
return cls.from_dict(json.loads(json_str))
|
|
57
|
+
|
|
58
|
+
def to_dict(self) -> Dict[str, Any]:
|
|
59
|
+
"""Return the dictionary representation of the model using alias.
|
|
60
|
+
|
|
61
|
+
This has the following differences from calling pydantic's
|
|
62
|
+
`self.model_dump(by_alias=True)`:
|
|
63
|
+
|
|
64
|
+
* `None` is only added to the output dict for nullable fields that
|
|
65
|
+
were set at model initialization. Other fields with value `None`
|
|
66
|
+
are ignored.
|
|
67
|
+
"""
|
|
68
|
+
excluded_fields: Set[str] = set([
|
|
69
|
+
])
|
|
70
|
+
|
|
71
|
+
_dict = self.model_dump(
|
|
72
|
+
by_alias=True,
|
|
73
|
+
exclude=excluded_fields,
|
|
74
|
+
exclude_none=True,
|
|
75
|
+
)
|
|
76
|
+
# override the default output from pydantic by calling `to_dict()` of each item in items (list)
|
|
77
|
+
_items = []
|
|
78
|
+
if self.items:
|
|
79
|
+
for _item in self.items:
|
|
80
|
+
if _item:
|
|
81
|
+
_items.append(_item.to_dict())
|
|
82
|
+
_dict['items'] = _items
|
|
83
|
+
return _dict
|
|
84
|
+
|
|
85
|
+
@classmethod
|
|
86
|
+
def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
|
|
87
|
+
"""Create an instance of MspUpgradeRunDtoPage from a dict"""
|
|
88
|
+
if obj is None:
|
|
89
|
+
return None
|
|
90
|
+
|
|
91
|
+
if not isinstance(obj, dict):
|
|
92
|
+
return cls.model_validate(obj)
|
|
93
|
+
|
|
94
|
+
_obj = cls.model_validate({
|
|
95
|
+
"count": obj.get("count"),
|
|
96
|
+
"items": [MspUpgradeRunDto.from_dict(_item) for _item in obj["items"]] if obj.get("items") is not None else None,
|
|
97
|
+
"limit": obj.get("limit"),
|
|
98
|
+
"offset": obj.get("offset")
|
|
99
|
+
})
|
|
100
|
+
return _obj
|
|
101
|
+
|
|
102
|
+
|
|
@@ -43,8 +43,8 @@ class UpgradeRunDto(BaseModel):
|
|
|
43
43
|
if value is None:
|
|
44
44
|
return value
|
|
45
45
|
|
|
46
|
-
if value not in set(['UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', '
|
|
47
|
-
raise ValueError("must be one of enum values ('UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', '
|
|
46
|
+
if value not in set(['UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'PERFORMING_UPGRADE', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
|
|
47
|
+
raise ValueError("must be one of enum values ('UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'PERFORMING_UPGRADE', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
|
|
48
48
|
return value
|
|
49
49
|
|
|
50
50
|
@field_validator('upgrade_run_type')
|
|
@@ -0,0 +1,96 @@
|
|
|
1
|
+
# coding: utf-8
|
|
2
|
+
|
|
3
|
+
"""
|
|
4
|
+
Cisco Security Cloud Control Firewall Manager API
|
|
5
|
+
|
|
6
|
+
Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
|
|
7
|
+
|
|
8
|
+
The version of the OpenAPI document: 1.15.0
|
|
9
|
+
Contact: cdo.tac@cisco.com
|
|
10
|
+
Generated by OpenAPI Generator (https://openapi-generator.tech)
|
|
11
|
+
|
|
12
|
+
Do not edit the class manually.
|
|
13
|
+
""" # noqa: E501
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
from __future__ import annotations
|
|
17
|
+
import pprint
|
|
18
|
+
import re # noqa: F401
|
|
19
|
+
import json
|
|
20
|
+
|
|
21
|
+
from pydantic import BaseModel, ConfigDict, Field
|
|
22
|
+
from typing import Any, ClassVar, Dict, List, Optional
|
|
23
|
+
from scc_firewall_manager_sdk.models.device_upgrade_status_dto import DeviceUpgradeStatusDto
|
|
24
|
+
from typing import Optional, Set
|
|
25
|
+
from typing_extensions import Self
|
|
26
|
+
|
|
27
|
+
class UpgradeRunMetadataDto(BaseModel):
|
|
28
|
+
"""
|
|
29
|
+
UpgradeRunMetadataDto
|
|
30
|
+
""" # noqa: E501
|
|
31
|
+
devices: Optional[List[DeviceUpgradeStatusDto]] = Field(default=None, description="The set of device UIDs that are part of this upgrade run.")
|
|
32
|
+
__properties: ClassVar[List[str]] = ["devices"]
|
|
33
|
+
|
|
34
|
+
model_config = ConfigDict(
|
|
35
|
+
populate_by_name=True,
|
|
36
|
+
validate_assignment=True,
|
|
37
|
+
protected_namespaces=(),
|
|
38
|
+
)
|
|
39
|
+
|
|
40
|
+
|
|
41
|
+
def to_str(self) -> str:
|
|
42
|
+
"""Returns the string representation of the model using alias"""
|
|
43
|
+
return pprint.pformat(self.model_dump(by_alias=True))
|
|
44
|
+
|
|
45
|
+
def to_json(self) -> str:
|
|
46
|
+
"""Returns the JSON representation of the model using alias"""
|
|
47
|
+
# TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
|
|
48
|
+
return json.dumps(self.to_dict())
|
|
49
|
+
|
|
50
|
+
@classmethod
|
|
51
|
+
def from_json(cls, json_str: str) -> Optional[Self]:
|
|
52
|
+
"""Create an instance of UpgradeRunMetadataDto from a JSON string"""
|
|
53
|
+
return cls.from_dict(json.loads(json_str))
|
|
54
|
+
|
|
55
|
+
def to_dict(self) -> Dict[str, Any]:
|
|
56
|
+
"""Return the dictionary representation of the model using alias.
|
|
57
|
+
|
|
58
|
+
This has the following differences from calling pydantic's
|
|
59
|
+
`self.model_dump(by_alias=True)`:
|
|
60
|
+
|
|
61
|
+
* `None` is only added to the output dict for nullable fields that
|
|
62
|
+
were set at model initialization. Other fields with value `None`
|
|
63
|
+
are ignored.
|
|
64
|
+
"""
|
|
65
|
+
excluded_fields: Set[str] = set([
|
|
66
|
+
])
|
|
67
|
+
|
|
68
|
+
_dict = self.model_dump(
|
|
69
|
+
by_alias=True,
|
|
70
|
+
exclude=excluded_fields,
|
|
71
|
+
exclude_none=True,
|
|
72
|
+
)
|
|
73
|
+
# override the default output from pydantic by calling `to_dict()` of each item in devices (list)
|
|
74
|
+
_items = []
|
|
75
|
+
if self.devices:
|
|
76
|
+
for _item in self.devices:
|
|
77
|
+
if _item:
|
|
78
|
+
_items.append(_item.to_dict())
|
|
79
|
+
_dict['devices'] = _items
|
|
80
|
+
return _dict
|
|
81
|
+
|
|
82
|
+
@classmethod
|
|
83
|
+
def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
|
|
84
|
+
"""Create an instance of UpgradeRunMetadataDto from a dict"""
|
|
85
|
+
if obj is None:
|
|
86
|
+
return None
|
|
87
|
+
|
|
88
|
+
if not isinstance(obj, dict):
|
|
89
|
+
return cls.model_validate(obj)
|
|
90
|
+
|
|
91
|
+
_obj = cls.model_validate({
|
|
92
|
+
"devices": [DeviceUpgradeStatusDto.from_dict(_item) for _item in obj["devices"]] if obj.get("devices") is not None else None
|
|
93
|
+
})
|
|
94
|
+
return _obj
|
|
95
|
+
|
|
96
|
+
|
{scc_firewall_manager_sdk-1.15.223.dist-info → scc_firewall_manager_sdk-1.15.224.dist-info}/RECORD
RENAMED
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
scc_firewall_manager_sdk/__init__.py,sha256=
|
|
2
|
-
scc_firewall_manager_sdk/api_client.py,sha256=
|
|
1
|
+
scc_firewall_manager_sdk/__init__.py,sha256=cdtNuUp1pW6t52a12qGxz5rbOt6jNZX_iytcUqY_aW0,23367
|
|
2
|
+
scc_firewall_manager_sdk/api_client.py,sha256=ixLMtywRXrk2k9QbFKfLoox8ov1maTKtg31TEtpkuf8,25921
|
|
3
3
|
scc_firewall_manager_sdk/api_response.py,sha256=eMxw1mpmJcoGZ3gs9z6jM4oYoZ10Gjk333s9sKxGv7s,652
|
|
4
|
-
scc_firewall_manager_sdk/configuration.py,sha256=
|
|
4
|
+
scc_firewall_manager_sdk/configuration.py,sha256=PXIx1kbJcr-WNY_hvrQFo6B-s86VvKC6CT7Ya1zKG78,15993
|
|
5
5
|
scc_firewall_manager_sdk/exceptions.py,sha256=u5-7l5MRjP-aS2pNudBzqSw9OI4xVsIvUjw4WCA8LEk,6039
|
|
6
6
|
scc_firewall_manager_sdk/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
7
7
|
scc_firewall_manager_sdk/rest.py,sha256=cSeilvAB5y-V_10IdXcZ0kOyv5dYW8jeWVhrD6kUDa0,9309
|
|
@@ -18,11 +18,11 @@ scc_firewall_manager_sdk/api/commands_api.py,sha256=U1cDPCmUAgOPnCOC8KcbcQpLGSwg
|
|
|
18
18
|
scc_firewall_manager_sdk/api/connectors_api.py,sha256=lw4asxJMtyHTm3sxM6Z7S1O2tbr4ZtbjVrZIalmYagI,59889
|
|
19
19
|
scc_firewall_manager_sdk/api/device_health_aggregations_api.py,sha256=r4YyX6_HDWriUOh9dRFmjNzY08rozUatGOjpFzhkyJ4,29025
|
|
20
20
|
scc_firewall_manager_sdk/api/device_health_api.py,sha256=UoxgUo10Am1kga8U0Kxhb6DDw6d7wpXxzGopsvUJ1JI,62283
|
|
21
|
-
scc_firewall_manager_sdk/api/device_upgrades_api.py,sha256=
|
|
21
|
+
scc_firewall_manager_sdk/api/device_upgrades_api.py,sha256=nEtjWfCJ9eDVONZ0TLUApEcanm82CwcXTuax7kUVZxs,138514
|
|
22
22
|
scc_firewall_manager_sdk/api/interface_health_aggregations_api.py,sha256=2fxsrkfFpI2zSx3WnviJnP0uuS2XBT8YE_sZ0FcXjk0,40990
|
|
23
23
|
scc_firewall_manager_sdk/api/inventory_api.py,sha256=EJqDZzqBE4w_klxuo84rSYmrmbinGSJEbSbU6Wqs4Gg,444995
|
|
24
24
|
scc_firewall_manager_sdk/api/meta_api.py,sha256=0T4mIpkOc0FyDIvEN5qhRQbKN4CzOM00_sRVY2oG59U,29963
|
|
25
|
-
scc_firewall_manager_sdk/api/msp_device_upgrades_api.py,sha256=
|
|
25
|
+
scc_firewall_manager_sdk/api/msp_device_upgrades_api.py,sha256=Tt0_OnxCJiSPhiWfYYOMJqKCJ3UvPxV-0qpvA12KHVk,73309
|
|
26
26
|
scc_firewall_manager_sdk/api/msp_inventory_api.py,sha256=eLYqsv_7YNxQGLQLqEnWfSFPIJ8nWnuJQkZfxtGapxM,185473
|
|
27
27
|
scc_firewall_manager_sdk/api/msp_tenant_management_api.py,sha256=u1Ljk5-A3JnMGyfGNVVyc1L2ll6I1m43hrLflbqvT5M,108920
|
|
28
28
|
scc_firewall_manager_sdk/api/msp_user_management_api.py,sha256=MPy-WAv52ziuUcrK_Tq_q38PN1pbpgfL5fdqzYP81S8,54797
|
|
@@ -32,7 +32,7 @@ scc_firewall_manager_sdk/api/search_api.py,sha256=PonVl7RieSVsbCCVQOdqIA7vx2NCH5
|
|
|
32
32
|
scc_firewall_manager_sdk/api/tenant_management_api.py,sha256=3PWPuirkaUck1VZex3w4Cg3qO05GF0f7xeiptaAc5zE,55069
|
|
33
33
|
scc_firewall_manager_sdk/api/transactions_api.py,sha256=fz0Ko2bAXFpz0SM8psceOlcxq0gXnrnuTEhaX1E0QzA,23402
|
|
34
34
|
scc_firewall_manager_sdk/api/users_api.py,sha256=MKuyXmxWLSqPBkfA7rUGZ1EO1Ox-Oge7QhhgzSFAVu8,191609
|
|
35
|
-
scc_firewall_manager_sdk/models/__init__.py,sha256=
|
|
35
|
+
scc_firewall_manager_sdk/models/__init__.py,sha256=07sbOLDB114txfsfIAurBXzSVP2E0g8aB3e6G41sLGs,20691
|
|
36
36
|
scc_firewall_manager_sdk/models/access_group.py,sha256=9FlXrDT5xhtk-uWuwgMmM-qAGiKZrpfnkphZuogGsHo,4583
|
|
37
37
|
scc_firewall_manager_sdk/models/access_group_create_input.py,sha256=7tgCifqvqbwS2bZvS_PQdIV_ra_jiEbupJhyaHcG8ys,3930
|
|
38
38
|
scc_firewall_manager_sdk/models/access_group_page.py,sha256=imWa0te5qmTpXfuE8W8YM3SG01MIn4ewbA-_N8kPKHk,3725
|
|
@@ -118,6 +118,7 @@ scc_firewall_manager_sdk/models/device_metadata.py,sha256=PNCBkG35enpJhcwqiku4NH
|
|
|
118
118
|
scc_firewall_manager_sdk/models/device_page.py,sha256=ha32rLEnC9v8JpDff_07t_rtFLa-pAJFelG7czmFl8g,3684
|
|
119
119
|
scc_firewall_manager_sdk/models/device_patch_input.py,sha256=1LOG---DhQRxRYP0qA8PzzopCUX5c0bbLu7ptIySYXo,4224
|
|
120
120
|
scc_firewall_manager_sdk/models/device_role.py,sha256=cqv0xYyNhsvAOoDRUpdeSwkbEE9u89hEf8gA66cAteQ,1038
|
|
121
|
+
scc_firewall_manager_sdk/models/device_upgrade_status_dto.py,sha256=W9HPNTkieM9hjcMHDIsNThXW1pGIiz6oI5an_UdWTYo,5084
|
|
121
122
|
scc_firewall_manager_sdk/models/devices_patch_input.py,sha256=lSH-tNHYdS0CjWsHcSsnzQ9kL5ZxIsaVoHMxp5_Z8n4,3836
|
|
122
123
|
scc_firewall_manager_sdk/models/disk_health_metrics.py,sha256=QU7XHLFoitOo4_ijLYromfp0stM8c7tx1T20uocXGXs,2947
|
|
123
124
|
scc_firewall_manager_sdk/models/domain_settings.py,sha256=QqPTLHlNLd-PDoVqviIrU0IIPXhqLdTqTokV6uVQ8ug,3852
|
|
@@ -195,7 +196,7 @@ scc_firewall_manager_sdk/models/msp_export_input.py,sha256=OcIWeptdOLWRGBVsj6LCc
|
|
|
195
196
|
scc_firewall_manager_sdk/models/msp_managed_cloud_service.py,sha256=_PYu5Nn-6xrJMH_3fbHHdXSESWevOtTj4pM55hIGDpQ,5482
|
|
196
197
|
scc_firewall_manager_sdk/models/msp_managed_cloud_service_distinct_attribute_values.py,sha256=p3LQ3KOJ2uR--Qvy1-5vVlk4kYEVTijTDElHqCNR_Rc,4719
|
|
197
198
|
scc_firewall_manager_sdk/models/msp_managed_cloud_service_page.py,sha256=Dd7FHEypt16shFZwXr40hdOec1abJRRLCTztdGs_fhU,3815
|
|
198
|
-
scc_firewall_manager_sdk/models/msp_managed_device.py,sha256=
|
|
199
|
+
scc_firewall_manager_sdk/models/msp_managed_device.py,sha256=cU_hIu60qEcrh6R3YCndDuWwjbBgDk75XOxs62zVNhY,11128
|
|
199
200
|
scc_firewall_manager_sdk/models/msp_managed_device_distinct_attribute_values.py,sha256=DcE0qIEueWR4_U4sEaT2GqzAToZgJfS9LA-qtddd9lg,5552
|
|
200
201
|
scc_firewall_manager_sdk/models/msp_managed_device_manager.py,sha256=EpNlNfq51KQg19ge2YLoSldcqapT8gqjmJ5ZD9gn0Lg,5379
|
|
201
202
|
scc_firewall_manager_sdk/models/msp_managed_device_manager_distinct_attribute_values.py,sha256=IdKwQdyQ12Hgup8-raO2TQQwF-D0ifpvcAKRYv2WKqc,4272
|
|
@@ -206,6 +207,8 @@ scc_firewall_manager_sdk/models/msp_managed_template_distinct_attribute_values.p
|
|
|
206
207
|
scc_firewall_manager_sdk/models/msp_managed_templates_page.py,sha256=gtzwQeg0bEFDWbMDM4uBt-L4aYpp3hotFur4mdYZX1s,3786
|
|
207
208
|
scc_firewall_manager_sdk/models/msp_managed_tenant.py,sha256=TNe2ICfaX9ZvueCjSovGdNDoTW6L9b6gIcrY4l3MlJI,3784
|
|
208
209
|
scc_firewall_manager_sdk/models/msp_managed_tenant_page.py,sha256=eMkOCp0F3rSPYEYWxOMm99QIhLkPxj26-OM77nyWOKc,3766
|
|
210
|
+
scc_firewall_manager_sdk/models/msp_upgrade_run_dto.py,sha256=VsglFNUrGYzgus51WL5uhv6lK_SV5AcbfQp_3uRxols,6539
|
|
211
|
+
scc_firewall_manager_sdk/models/msp_upgrade_run_dto_page.py,sha256=eE2zAYd6zeQ3aSP4GfYjJMFRvID6LzWAkBih_H3Gp9A,3767
|
|
209
212
|
scc_firewall_manager_sdk/models/network.py,sha256=T1MdmQRNP6gmIYo4PRVPq-aEVDw13SHrN5DvQZu-L7A,2974
|
|
210
213
|
scc_firewall_manager_sdk/models/network_object_content.py,sha256=qwtnc7RcIfWcV3WhCLaZeeZQEUIR56unMWdmHNo3vXI,2726
|
|
211
214
|
scc_firewall_manager_sdk/models/object_content.py,sha256=yhDK2KXeN9KFnSNgAaB-NdnSyLhXslpSf6hCzg-EgSw,7159
|
|
@@ -263,7 +266,8 @@ scc_firewall_manager_sdk/models/upgrade_asa_device_input.py,sha256=j_zJPdZT2o__U
|
|
|
263
266
|
scc_firewall_manager_sdk/models/upgrade_compatibility_info_dto.py,sha256=MrrStiOPXJs6odegiASDlqyWKwsWTT8h2N-N4ds_CtU,4060
|
|
264
267
|
scc_firewall_manager_sdk/models/upgrade_ftd_device_input.py,sha256=MbPKinUCTDXl39E-P7KhiHb3oJKb_Liewn7WS21Y-0k,3843
|
|
265
268
|
scc_firewall_manager_sdk/models/upgrade_ftd_devices_input.py,sha256=yEoDUzkxOm0M_4FBiLF_nNsjQxdY8SZ7YtR3YfKkf-4,4274
|
|
266
|
-
scc_firewall_manager_sdk/models/upgrade_run_dto.py,sha256=
|
|
269
|
+
scc_firewall_manager_sdk/models/upgrade_run_dto.py,sha256=Y7HKW5uOgEhYhZv7AcrVn1jABZUZmr_6mtp5D4sKLek,5544
|
|
270
|
+
scc_firewall_manager_sdk/models/upgrade_run_metadata_dto.py,sha256=y1t2kF5-KztfeSfFul5RJBcKIgNhOHeA_JAttKC6Pm0,3202
|
|
267
271
|
scc_firewall_manager_sdk/models/upgrade_run_modify_input.py,sha256=attD1huRN1nST0xkblUW50VgNYtNXtOGH_1WVF0q-jw,2708
|
|
268
272
|
scc_firewall_manager_sdk/models/url_object_content.py,sha256=OqcDbRE_HoEGf4Z_yCsTH8B08R9GdY8RMOs1wM0-ecY,2657
|
|
269
273
|
scc_firewall_manager_sdk/models/user.py,sha256=2bH858kufK8KnTsIXIul0VOH0JpJ-g4zyXE9lyMQHGE,4297
|
|
@@ -276,7 +280,7 @@ scc_firewall_manager_sdk/models/vlan_interface_create_input.py,sha256=AKUqPJw5ku
|
|
|
276
280
|
scc_firewall_manager_sdk/models/vlan_interface_patch_input.py,sha256=srEFTyQykscNrWsbp8KGEzbmHC07_AU3DXjJ-7Be4zc,6054
|
|
277
281
|
scc_firewall_manager_sdk/models/ztp_onboarding_input.py,sha256=HAgBTdocZeHGDZP_-9NyRtzP9E7BReGtiOmn4S3J-_g,5326
|
|
278
282
|
scc_firewall_manager_sdk/models/ztp_onboarding_template_configuration.py,sha256=f9Z62yGFvz4QAQ07Z4bjfHLw2bRg46ccwoLuQ8q30TE,4808
|
|
279
|
-
scc_firewall_manager_sdk-1.15.
|
|
280
|
-
scc_firewall_manager_sdk-1.15.
|
|
281
|
-
scc_firewall_manager_sdk-1.15.
|
|
282
|
-
scc_firewall_manager_sdk-1.15.
|
|
283
|
+
scc_firewall_manager_sdk-1.15.224.dist-info/METADATA,sha256=6Oem-Ueyf8KVlvlN3UHvPoPwF1Nowsd360VrpkWJeww,596
|
|
284
|
+
scc_firewall_manager_sdk-1.15.224.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
|
|
285
|
+
scc_firewall_manager_sdk-1.15.224.dist-info/top_level.txt,sha256=_g9WfFWGagKs6ULdfhEt8e7RXknpcp9_jA9ubIL4U3I,25
|
|
286
|
+
scc_firewall_manager_sdk-1.15.224.dist-info/RECORD,,
|
{scc_firewall_manager_sdk-1.15.223.dist-info → scc_firewall_manager_sdk-1.15.224.dist-info}/WHEEL
RENAMED
|
File without changes
|
|
File without changes
|