scc-firewall-manager-sdk 1.15.268__py3-none-any.whl → 1.15.385__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of scc-firewall-manager-sdk might be problematic. Click here for more details.

Files changed (22) hide show
  1. scc_firewall_manager_sdk/__init__.py +4 -1
  2. scc_firewall_manager_sdk/api/__init__.py +1 -0
  3. scc_firewall_manager_sdk/api/connectors_api.py +0 -301
  4. scc_firewall_manager_sdk/api/device_health_aggregations_api.py +6 -6
  5. scc_firewall_manager_sdk/api/events_api.py +358 -0
  6. scc_firewall_manager_sdk/api/interface_health_aggregations_api.py +6 -6
  7. scc_firewall_manager_sdk/api/msp_device_upgrades_api.py +247 -0
  8. scc_firewall_manager_sdk/api/msp_tenant_management_api.py +29 -0
  9. scc_firewall_manager_sdk/api_client.py +1 -1
  10. scc_firewall_manager_sdk/configuration.py +1 -1
  11. scc_firewall_manager_sdk/models/__init__.py +2 -0
  12. scc_firewall_manager_sdk/models/device_upgrade_status_dto.py +4 -30
  13. scc_firewall_manager_sdk/models/enable_cd_fmc_for_tenant_request.py +88 -0
  14. scc_firewall_manager_sdk/models/msp_managed_device.py +7 -1
  15. scc_firewall_manager_sdk/models/msp_managed_device_distinct_attribute_values.py +5 -1
  16. scc_firewall_manager_sdk/models/msp_upgrade_run_dto.py +6 -4
  17. scc_firewall_manager_sdk/models/msp_upgrade_runs_attribute_values.py +114 -0
  18. scc_firewall_manager_sdk/models/tenant_settings.py +3 -1
  19. {scc_firewall_manager_sdk-1.15.268.dist-info → scc_firewall_manager_sdk-1.15.385.dist-info}/METADATA +1 -1
  20. {scc_firewall_manager_sdk-1.15.268.dist-info → scc_firewall_manager_sdk-1.15.385.dist-info}/RECORD +22 -19
  21. {scc_firewall_manager_sdk-1.15.268.dist-info → scc_firewall_manager_sdk-1.15.385.dist-info}/WHEEL +0 -0
  22. {scc_firewall_manager_sdk-1.15.268.dist-info → scc_firewall_manager_sdk-1.15.385.dist-info}/top_level.txt +0 -0
@@ -22,6 +22,7 @@ from typing import Optional
22
22
  from typing_extensions import Annotated
23
23
  from scc_firewall_manager_sdk.models.api_token_info import ApiTokenInfo
24
24
  from scc_firewall_manager_sdk.models.cdo_transaction import CdoTransaction
25
+ from scc_firewall_manager_sdk.models.enable_cd_fmc_for_tenant_request import EnableCdFmcForTenantRequest
25
26
  from scc_firewall_manager_sdk.models.msp_add_tenant_input import MspAddTenantInput
26
27
  from scc_firewall_manager_sdk.models.msp_create_tenant_input import MspCreateTenantInput
27
28
  from scc_firewall_manager_sdk.models.msp_managed_tenant import MspManagedTenant
@@ -2020,6 +2021,7 @@ class MSPTenantManagementApi:
2020
2021
  def provision_cd_fmc_for_tenant_in_msp_portal(
2021
2022
  self,
2022
2023
  tenant_uid: Annotated[StrictStr, Field(description="Unique identifier of the tenant that cdFMC provisioning will be enabled for.")],
2024
+ enable_cd_fmc_for_tenant_request: Optional[EnableCdFmcForTenantRequest] = None,
2023
2025
  _request_timeout: Union[
2024
2026
  None,
2025
2027
  Annotated[StrictFloat, Field(gt=0)],
@@ -2039,6 +2041,8 @@ class MSPTenantManagementApi:
2039
2041
 
2040
2042
  :param tenant_uid: Unique identifier of the tenant that cdFMC provisioning will be enabled for. (required)
2041
2043
  :type tenant_uid: str
2044
+ :param enable_cd_fmc_for_tenant_request:
2045
+ :type enable_cd_fmc_for_tenant_request: EnableCdFmcForTenantRequest
2042
2046
  :param _request_timeout: timeout setting for this request. If one
2043
2047
  number provided, it will be total request
2044
2048
  timeout. It can also be a pair (tuple) of
@@ -2063,6 +2067,7 @@ class MSPTenantManagementApi:
2063
2067
 
2064
2068
  _param = self._provision_cd_fmc_for_tenant_in_msp_portal_serialize(
2065
2069
  tenant_uid=tenant_uid,
2070
+ enable_cd_fmc_for_tenant_request=enable_cd_fmc_for_tenant_request,
2066
2071
  _request_auth=_request_auth,
2067
2072
  _content_type=_content_type,
2068
2073
  _headers=_headers,
@@ -2088,6 +2093,7 @@ class MSPTenantManagementApi:
2088
2093
  def provision_cd_fmc_for_tenant_in_msp_portal_with_http_info(
2089
2094
  self,
2090
2095
  tenant_uid: Annotated[StrictStr, Field(description="Unique identifier of the tenant that cdFMC provisioning will be enabled for.")],
2096
+ enable_cd_fmc_for_tenant_request: Optional[EnableCdFmcForTenantRequest] = None,
2091
2097
  _request_timeout: Union[
2092
2098
  None,
2093
2099
  Annotated[StrictFloat, Field(gt=0)],
@@ -2107,6 +2113,8 @@ class MSPTenantManagementApi:
2107
2113
 
2108
2114
  :param tenant_uid: Unique identifier of the tenant that cdFMC provisioning will be enabled for. (required)
2109
2115
  :type tenant_uid: str
2116
+ :param enable_cd_fmc_for_tenant_request:
2117
+ :type enable_cd_fmc_for_tenant_request: EnableCdFmcForTenantRequest
2110
2118
  :param _request_timeout: timeout setting for this request. If one
2111
2119
  number provided, it will be total request
2112
2120
  timeout. It can also be a pair (tuple) of
@@ -2131,6 +2139,7 @@ class MSPTenantManagementApi:
2131
2139
 
2132
2140
  _param = self._provision_cd_fmc_for_tenant_in_msp_portal_serialize(
2133
2141
  tenant_uid=tenant_uid,
2142
+ enable_cd_fmc_for_tenant_request=enable_cd_fmc_for_tenant_request,
2134
2143
  _request_auth=_request_auth,
2135
2144
  _content_type=_content_type,
2136
2145
  _headers=_headers,
@@ -2156,6 +2165,7 @@ class MSPTenantManagementApi:
2156
2165
  def provision_cd_fmc_for_tenant_in_msp_portal_without_preload_content(
2157
2166
  self,
2158
2167
  tenant_uid: Annotated[StrictStr, Field(description="Unique identifier of the tenant that cdFMC provisioning will be enabled for.")],
2168
+ enable_cd_fmc_for_tenant_request: Optional[EnableCdFmcForTenantRequest] = None,
2159
2169
  _request_timeout: Union[
2160
2170
  None,
2161
2171
  Annotated[StrictFloat, Field(gt=0)],
@@ -2175,6 +2185,8 @@ class MSPTenantManagementApi:
2175
2185
 
2176
2186
  :param tenant_uid: Unique identifier of the tenant that cdFMC provisioning will be enabled for. (required)
2177
2187
  :type tenant_uid: str
2188
+ :param enable_cd_fmc_for_tenant_request:
2189
+ :type enable_cd_fmc_for_tenant_request: EnableCdFmcForTenantRequest
2178
2190
  :param _request_timeout: timeout setting for this request. If one
2179
2191
  number provided, it will be total request
2180
2192
  timeout. It can also be a pair (tuple) of
@@ -2199,6 +2211,7 @@ class MSPTenantManagementApi:
2199
2211
 
2200
2212
  _param = self._provision_cd_fmc_for_tenant_in_msp_portal_serialize(
2201
2213
  tenant_uid=tenant_uid,
2214
+ enable_cd_fmc_for_tenant_request=enable_cd_fmc_for_tenant_request,
2202
2215
  _request_auth=_request_auth,
2203
2216
  _content_type=_content_type,
2204
2217
  _headers=_headers,
@@ -2219,6 +2232,7 @@ class MSPTenantManagementApi:
2219
2232
  def _provision_cd_fmc_for_tenant_in_msp_portal_serialize(
2220
2233
  self,
2221
2234
  tenant_uid,
2235
+ enable_cd_fmc_for_tenant_request,
2222
2236
  _request_auth,
2223
2237
  _content_type,
2224
2238
  _headers,
@@ -2244,6 +2258,8 @@ class MSPTenantManagementApi:
2244
2258
  # process the header parameters
2245
2259
  # process the form parameters
2246
2260
  # process the body parameter
2261
+ if enable_cd_fmc_for_tenant_request is not None:
2262
+ _body_params = enable_cd_fmc_for_tenant_request
2247
2263
 
2248
2264
 
2249
2265
  # set the HTTP header `Accept`
@@ -2253,6 +2269,19 @@ class MSPTenantManagementApi:
2253
2269
  ]
2254
2270
  )
2255
2271
 
2272
+ # set the HTTP header `Content-Type`
2273
+ if _content_type:
2274
+ _header_params['Content-Type'] = _content_type
2275
+ else:
2276
+ _default_content_type = (
2277
+ self.api_client.select_header_content_type(
2278
+ [
2279
+ 'application/json'
2280
+ ]
2281
+ )
2282
+ )
2283
+ if _default_content_type is not None:
2284
+ _header_params['Content-Type'] = _default_content_type
2256
2285
 
2257
2286
  # authentication setting
2258
2287
  _auth_settings: List[str] = [
@@ -88,7 +88,7 @@ class ApiClient:
88
88
  self.default_headers[header_name] = header_value
89
89
  self.cookie = cookie
90
90
  # Set default User-Agent.
91
- self.user_agent = 'OpenAPI-Generator/1.15.268/python'
91
+ self.user_agent = 'OpenAPI-Generator/1.15.385/python'
92
92
  self.client_side_validation = configuration.client_side_validation
93
93
 
94
94
  def __enter__(self):
@@ -380,7 +380,7 @@ class Configuration:
380
380
  "OS: {env}\n"\
381
381
  "Python Version: {pyversion}\n"\
382
382
  "Version of the API: 1.15.0\n"\
383
- "SDK Package Version: 1.15.268".\
383
+ "SDK Package Version: 1.15.385".\
384
384
  format(env=sys.platform, pyversion=sys.version)
385
385
 
386
386
  def get_host_settings(self):
@@ -107,6 +107,7 @@ from scc_firewall_manager_sdk.models.domain_settings import DomainSettings
107
107
  from scc_firewall_manager_sdk.models.duo_admin_panel_create_or_update_input import DuoAdminPanelCreateOrUpdateInput
108
108
  from scc_firewall_manager_sdk.models.duplex_type import DuplexType
109
109
  from scc_firewall_manager_sdk.models.duplicate_group_dto import DuplicateGroupDto
110
+ from scc_firewall_manager_sdk.models.enable_cd_fmc_for_tenant_request import EnableCdFmcForTenantRequest
110
111
  from scc_firewall_manager_sdk.models.entity import Entity
111
112
  from scc_firewall_manager_sdk.models.entity_type import EntityType
112
113
  from scc_firewall_manager_sdk.models.ether_channel_interface_create_input import EtherChannelInterfaceCreateInput
@@ -191,6 +192,7 @@ from scc_firewall_manager_sdk.models.msp_managed_tenant import MspManagedTenant
191
192
  from scc_firewall_manager_sdk.models.msp_managed_tenant_page import MspManagedTenantPage
192
193
  from scc_firewall_manager_sdk.models.msp_upgrade_run_dto import MspUpgradeRunDto
193
194
  from scc_firewall_manager_sdk.models.msp_upgrade_run_dto_page import MspUpgradeRunDtoPage
195
+ from scc_firewall_manager_sdk.models.msp_upgrade_runs_attribute_values import MspUpgradeRunsAttributeValues
194
196
  from scc_firewall_manager_sdk.models.network import Network
195
197
  from scc_firewall_manager_sdk.models.network_object_content import NetworkObjectContent
196
198
  from scc_firewall_manager_sdk.models.os import OS
@@ -18,7 +18,7 @@ import pprint
18
18
  import re # noqa: F401
19
19
  import json
20
20
 
21
- from pydantic import BaseModel, ConfigDict, Field, StrictFloat, StrictInt, StrictStr, field_validator
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictFloat, StrictInt, StrictStr
22
22
  from typing import Any, ClassVar, Dict, List, Optional, Union
23
23
  from typing import Optional, Set
24
24
  from typing_extensions import Self
@@ -27,28 +27,10 @@ class DeviceUpgradeStatusDto(BaseModel):
27
27
  """
28
28
  DeviceUpgradeStatusDto
29
29
  """ # noqa: E501
30
- hardware_model: Optional[StrictStr] = Field(default=None, description="The hardware model of the devices being upgraded.", alias="hardwareModel")
31
- managed_tenant_display_name: Optional[StrictStr] = Field(default=None, description="The display name of the managed tenant in CDO.", alias="managedTenantDisplayName")
32
- managed_tenant_name: Optional[StrictStr] = Field(default=None, description="The name of the managed tenant in CDO.", alias="managedTenantName")
33
- managed_tenant_uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the managed tenant in Security Cloud Control that this device belongs to.", alias="managedTenantUid")
34
30
  message: Optional[StrictStr] = Field(default=None, description="A message, indicating current progress, returned from the device.")
35
- name: Optional[StrictStr] = Field(default=None, description="The name of the device being upgraded.")
36
31
  percentage_complete: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, description="The percentage completion of the current task being performed", alias="percentageComplete")
37
- software_version_before_upgrade: Optional[StrictStr] = Field(default=None, description="The software version of the device before the upgrade.", alias="softwareVersionBeforeUpgrade")
38
- transaction_uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the CDO transaction on the managed tenant that tracks this upgrade run.", alias="transactionUid")
39
- uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the device being upgraded.")
40
- upgrade_run_status: Optional[StrictStr] = Field(default=None, description="The current status of the upgrade run.", alias="upgradeRunStatus")
41
- __properties: ClassVar[List[str]] = ["hardwareModel", "managedTenantDisplayName", "managedTenantName", "managedTenantUid", "message", "name", "percentageComplete", "softwareVersionBeforeUpgrade", "transactionUid", "uid", "upgradeRunStatus"]
42
-
43
- @field_validator('upgrade_run_status')
44
- def upgrade_run_status_validate_enum(cls, value):
45
- """Validates the enum"""
46
- if value is None:
47
- return value
48
-
49
- if value not in set(['IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
50
- raise ValueError("must be one of enum values ('IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
51
- return value
32
+ uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the device in SCC Firewall Manager.")
33
+ __properties: ClassVar[List[str]] = ["message", "percentageComplete", "uid"]
52
34
 
53
35
  model_config = ConfigDict(
54
36
  populate_by_name=True,
@@ -101,17 +83,9 @@ class DeviceUpgradeStatusDto(BaseModel):
101
83
  return cls.model_validate(obj)
102
84
 
103
85
  _obj = cls.model_validate({
104
- "hardwareModel": obj.get("hardwareModel"),
105
- "managedTenantDisplayName": obj.get("managedTenantDisplayName"),
106
- "managedTenantName": obj.get("managedTenantName"),
107
- "managedTenantUid": obj.get("managedTenantUid"),
108
86
  "message": obj.get("message"),
109
- "name": obj.get("name"),
110
87
  "percentageComplete": obj.get("percentageComplete"),
111
- "softwareVersionBeforeUpgrade": obj.get("softwareVersionBeforeUpgrade"),
112
- "transactionUid": obj.get("transactionUid"),
113
- "uid": obj.get("uid"),
114
- "upgradeRunStatus": obj.get("upgradeRunStatus")
88
+ "uid": obj.get("uid")
115
89
  })
116
90
  return _obj
117
91
 
@@ -0,0 +1,88 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.15.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictBool
22
+ from typing import Any, ClassVar, Dict, List
23
+ from typing import Optional, Set
24
+ from typing_extensions import Self
25
+
26
+ class EnableCdFmcForTenantRequest(BaseModel):
27
+ """
28
+ EnableCdFmcForTenantRequest
29
+ """ # noqa: E501
30
+ dedicated_cd_fmc_instance: StrictBool = Field(alias="dedicatedCdFmcInstance")
31
+ __properties: ClassVar[List[str]] = ["dedicatedCdFmcInstance"]
32
+
33
+ model_config = ConfigDict(
34
+ populate_by_name=True,
35
+ validate_assignment=True,
36
+ protected_namespaces=(),
37
+ )
38
+
39
+
40
+ def to_str(self) -> str:
41
+ """Returns the string representation of the model using alias"""
42
+ return pprint.pformat(self.model_dump(by_alias=True))
43
+
44
+ def to_json(self) -> str:
45
+ """Returns the JSON representation of the model using alias"""
46
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
47
+ return json.dumps(self.to_dict())
48
+
49
+ @classmethod
50
+ def from_json(cls, json_str: str) -> Optional[Self]:
51
+ """Create an instance of EnableCdFmcForTenantRequest from a JSON string"""
52
+ return cls.from_dict(json.loads(json_str))
53
+
54
+ def to_dict(self) -> Dict[str, Any]:
55
+ """Return the dictionary representation of the model using alias.
56
+
57
+ This has the following differences from calling pydantic's
58
+ `self.model_dump(by_alias=True)`:
59
+
60
+ * `None` is only added to the output dict for nullable fields that
61
+ were set at model initialization. Other fields with value `None`
62
+ are ignored.
63
+ """
64
+ excluded_fields: Set[str] = set([
65
+ ])
66
+
67
+ _dict = self.model_dump(
68
+ by_alias=True,
69
+ exclude=excluded_fields,
70
+ exclude_none=True,
71
+ )
72
+ return _dict
73
+
74
+ @classmethod
75
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
76
+ """Create an instance of EnableCdFmcForTenantRequest from a dict"""
77
+ if obj is None:
78
+ return None
79
+
80
+ if not isinstance(obj, dict):
81
+ return cls.model_validate(obj)
82
+
83
+ _obj = cls.model_validate({
84
+ "dedicatedCdFmcInstance": obj.get("dedicatedCdFmcInstance")
85
+ })
86
+ return _obj
87
+
88
+
@@ -26,6 +26,7 @@ from scc_firewall_manager_sdk.models.asa_failover_mode import AsaFailoverMode
26
26
  from scc_firewall_manager_sdk.models.config_state import ConfigState
27
27
  from scc_firewall_manager_sdk.models.conflict_detection_state import ConflictDetectionState
28
28
  from scc_firewall_manager_sdk.models.connectivity_state import ConnectivityState
29
+ from scc_firewall_manager_sdk.models.device_maintenance_window import DeviceMaintenanceWindow
29
30
  from scc_firewall_manager_sdk.models.entity_type import EntityType
30
31
  from scc_firewall_manager_sdk.models.fmc_device_record import FmcDeviceRecord
31
32
  from scc_firewall_manager_sdk.models.ftd_cluster_info import FtdClusterInfo
@@ -47,6 +48,7 @@ class MspManagedDevice(BaseModel):
47
48
  config_state: Optional[ConfigState] = Field(default=None, alias="configState")
48
49
  conflict_detection_state: Optional[ConflictDetectionState] = Field(default=None, alias="conflictDetectionState")
49
50
  connectivity_state: Optional[ConnectivityState] = Field(default=None, alias="connectivityState")
51
+ device_maintenance_window: Optional[DeviceMaintenanceWindow] = Field(default=None, alias="deviceMaintenanceWindow")
50
52
  device_record_on_fmc: Optional[FmcDeviceRecord] = Field(default=None, alias="deviceRecordOnFmc")
51
53
  device_type: Optional[EntityType] = Field(default=None, alias="deviceType")
52
54
  ftd_cluster_info: Optional[FtdClusterInfo] = Field(default=None, alias="ftdClusterInfo")
@@ -65,7 +67,7 @@ class MspManagedDevice(BaseModel):
65
67
  software_version: Optional[StrictStr] = Field(default=None, description="The version of the software running on the device.", alias="softwareVersion")
66
68
  tenant_uid: Optional[StrictStr] = Field(default=None, alias="tenantUid")
67
69
  uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the device in Security Cloud Control.")
68
- __properties: ClassVar[List[str]] = ["address", "asaFailoverMate", "asaFailoverMode", "asaFailoverState", "certificateExpiryDate", "chassisSerial", "configState", "conflictDetectionState", "connectivityState", "deviceRecordOnFmc", "deviceType", "ftdClusterInfo", "ftdHaInfo", "hardwareModel", "labels", "managedTenantDisplayName", "managedTenantName", "managedTenantRegion", "managedTenantUid", "modelNumber", "name", "raVpnCertificateExpiryDate", "redundancyMode", "serial", "softwareVersion", "tenantUid", "uid"]
70
+ __properties: ClassVar[List[str]] = ["address", "asaFailoverMate", "asaFailoverMode", "asaFailoverState", "certificateExpiryDate", "chassisSerial", "configState", "conflictDetectionState", "connectivityState", "deviceMaintenanceWindow", "deviceRecordOnFmc", "deviceType", "ftdClusterInfo", "ftdHaInfo", "hardwareModel", "labels", "managedTenantDisplayName", "managedTenantName", "managedTenantRegion", "managedTenantUid", "modelNumber", "name", "raVpnCertificateExpiryDate", "redundancyMode", "serial", "softwareVersion", "tenantUid", "uid"]
69
71
 
70
72
  @field_validator('redundancy_mode')
71
73
  def redundancy_mode_validate_enum(cls, value):
@@ -119,6 +121,9 @@ class MspManagedDevice(BaseModel):
119
121
  # override the default output from pydantic by calling `to_dict()` of asa_failover_mate
120
122
  if self.asa_failover_mate:
121
123
  _dict['asaFailoverMate'] = self.asa_failover_mate.to_dict()
124
+ # override the default output from pydantic by calling `to_dict()` of device_maintenance_window
125
+ if self.device_maintenance_window:
126
+ _dict['deviceMaintenanceWindow'] = self.device_maintenance_window.to_dict()
122
127
  # override the default output from pydantic by calling `to_dict()` of device_record_on_fmc
123
128
  if self.device_record_on_fmc:
124
129
  _dict['deviceRecordOnFmc'] = self.device_record_on_fmc.to_dict()
@@ -152,6 +157,7 @@ class MspManagedDevice(BaseModel):
152
157
  "configState": obj.get("configState"),
153
158
  "conflictDetectionState": obj.get("conflictDetectionState"),
154
159
  "connectivityState": obj.get("connectivityState"),
160
+ "deviceMaintenanceWindow": DeviceMaintenanceWindow.from_dict(obj["deviceMaintenanceWindow"]) if obj.get("deviceMaintenanceWindow") is not None else None,
155
161
  "deviceRecordOnFmc": FmcDeviceRecord.from_dict(obj["deviceRecordOnFmc"]) if obj.get("deviceRecordOnFmc") is not None else None,
156
162
  "deviceType": obj.get("deviceType"),
157
163
  "ftdClusterInfo": FtdClusterInfo.from_dict(obj["ftdClusterInfo"]) if obj.get("ftdClusterInfo") is not None else None,
@@ -35,11 +35,13 @@ class MspManagedDeviceDistinctAttributeValues(BaseModel):
35
35
  conflict_detection_states: Optional[List[ConflictDetectionState]] = Field(default=None, description="The distinct conflict detection states for the devices managed by the MSP Portal.", alias="conflictDetectionStates")
36
36
  connectivity_states: Optional[List[ConnectivityState]] = Field(default=None, description="The distinct connectivity states for the devices managed by the MSP Portal.", alias="connectivityStates")
37
37
  device_types: Optional[List[EntityType]] = Field(default=None, description="The distinct device types for the devices managed by the MSP Portal.", alias="deviceTypes")
38
+ hardware_models: Optional[List[StrictStr]] = Field(default=None, description="The distinct hardware models for the devices managed by the MSP Portal.", alias="hardwareModels")
38
39
  managed_tenant_display_names: Optional[List[StrictStr]] = Field(default=None, description="The display names of the tenants that have devices onboarded and are managed by the MSP Portal.", alias="managedTenantDisplayNames")
39
40
  managed_tenant_names: Optional[List[StrictStr]] = Field(default=None, description="The names of the tenants that have devices onboarded and are managed by the MSP Portal.", alias="managedTenantNames")
41
+ model_numbers: Optional[List[StrictStr]] = Field(default=None, description="The distinct model numbers for the devices managed by the MSP Portal.", alias="modelNumbers")
40
42
  redundancy_modes: Optional[List[StrictStr]] = Field(default=None, description="The distinct redundancy modes for the devices managed by the MSP Portal.", alias="redundancyModes")
41
43
  software_versions: Optional[Dict[str, List[StrictStr]]] = Field(default=None, description="The software versions of the devices managed by the MSP Portal.", alias="softwareVersions")
42
- __properties: ClassVar[List[str]] = ["configStates", "conflictDetectionStates", "connectivityStates", "deviceTypes", "managedTenantDisplayNames", "managedTenantNames", "redundancyModes", "softwareVersions"]
44
+ __properties: ClassVar[List[str]] = ["configStates", "conflictDetectionStates", "connectivityStates", "deviceTypes", "hardwareModels", "managedTenantDisplayNames", "managedTenantNames", "modelNumbers", "redundancyModes", "softwareVersions"]
43
45
 
44
46
  @field_validator('redundancy_modes')
45
47
  def redundancy_modes_validate_enum(cls, value):
@@ -107,8 +109,10 @@ class MspManagedDeviceDistinctAttributeValues(BaseModel):
107
109
  "conflictDetectionStates": obj.get("conflictDetectionStates"),
108
110
  "connectivityStates": obj.get("connectivityStates"),
109
111
  "deviceTypes": obj.get("deviceTypes"),
112
+ "hardwareModels": obj.get("hardwareModels"),
110
113
  "managedTenantDisplayNames": obj.get("managedTenantDisplayNames"),
111
114
  "managedTenantNames": obj.get("managedTenantNames"),
115
+ "modelNumbers": obj.get("modelNumbers"),
112
116
  "redundancyModes": obj.get("redundancyModes"),
113
117
  "softwareVersions": obj.get("softwareVersions")
114
118
  })
@@ -40,7 +40,8 @@ class MspUpgradeRunDto(BaseModel):
40
40
  uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the upgrade run in SCC Firewall Manager.")
41
41
  upgrade_run_status: Optional[StrictStr] = Field(default=None, description="The current status of the upgrade run.", alias="upgradeRunStatus")
42
42
  upgrade_run_type: Optional[StrictStr] = Field(default=None, description="The type of upgrade run", alias="upgradeRunType")
43
- __properties: ClassVar[List[str]] = ["errorMsg", "lastUpdatedTime", "metadata", "name", "softwareVersion", "stageUpgradeOnly", "submissionTime", "transactionUid", "uid", "upgradeRunStatus", "upgradeRunType"]
43
+ username: Optional[StrictStr] = Field(default=None, description="The username of the user who initiated the upgrade run.")
44
+ __properties: ClassVar[List[str]] = ["errorMsg", "lastUpdatedTime", "metadata", "name", "softwareVersion", "stageUpgradeOnly", "submissionTime", "transactionUid", "uid", "upgradeRunStatus", "upgradeRunType", "username"]
44
45
 
45
46
  @field_validator('upgrade_run_status')
46
47
  def upgrade_run_status_validate_enum(cls, value):
@@ -48,8 +49,8 @@ class MspUpgradeRunDto(BaseModel):
48
49
  if value is None:
49
50
  return value
50
51
 
51
- if value not in set(['IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
52
- raise ValueError("must be one of enum values ('IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
52
+ if value not in set(['IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
53
+ raise ValueError("must be one of enum values ('IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
53
54
  return value
54
55
 
55
56
  @field_validator('upgrade_run_type')
@@ -126,7 +127,8 @@ class MspUpgradeRunDto(BaseModel):
126
127
  "transactionUid": obj.get("transactionUid"),
127
128
  "uid": obj.get("uid"),
128
129
  "upgradeRunStatus": obj.get("upgradeRunStatus"),
129
- "upgradeRunType": obj.get("upgradeRunType")
130
+ "upgradeRunType": obj.get("upgradeRunType"),
131
+ "username": obj.get("username")
130
132
  })
131
133
  return _obj
132
134
 
@@ -0,0 +1,114 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.15.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictStr, field_validator
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from typing import Optional, Set
24
+ from typing_extensions import Self
25
+
26
+ class MspUpgradeRunsAttributeValues(BaseModel):
27
+ """
28
+ MspUpgradeRunsAttributeValues
29
+ """ # noqa: E501
30
+ upgrade_run_statuses: Optional[List[StrictStr]] = Field(default=None, description="The distinct status values for the MSP upgrade runs on this MSP portal.", alias="upgradeRunStatuses")
31
+ upgrade_run_types: Optional[List[StrictStr]] = Field(default=None, alias="upgradeRunTypes")
32
+ users: Optional[List[StrictStr]] = None
33
+ __properties: ClassVar[List[str]] = ["upgradeRunStatuses", "upgradeRunTypes", "users"]
34
+
35
+ @field_validator('upgrade_run_statuses')
36
+ def upgrade_run_statuses_validate_enum(cls, value):
37
+ """Validates the enum"""
38
+ if value is None:
39
+ return value
40
+
41
+ for i in value:
42
+ if i not in set(['IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED']):
43
+ raise ValueError("each list item must be one of ('IN_PROGRESS', 'REBUILDING_UPGRADE_CACHE', 'PERFORMING_UPGRADE', 'UPLOADING_IMAGE', 'PERFORMING_READINESS_CHECK', 'UPGRADE_STAGED', 'UPGRADE_STAGING_FAILED', 'UGPRADE_STAGING_FAILED', 'UPGRADE_COMPLETED', 'UPGRADE_FAILED')")
44
+ return value
45
+
46
+ @field_validator('upgrade_run_types')
47
+ def upgrade_run_types_validate_enum(cls, value):
48
+ """Validates the enum"""
49
+ if value is None:
50
+ return value
51
+
52
+ for i in value:
53
+ if i not in set(['ASA_DEVICE_UPGRADE', 'FTD_DEVICE_UPGRADE', 'FTD_SECURE_CLIENT_UPGRADE', 'ASA_SECURE_CLIENT_UPGRADE']):
54
+ raise ValueError("each list item must be one of ('ASA_DEVICE_UPGRADE', 'FTD_DEVICE_UPGRADE', 'FTD_SECURE_CLIENT_UPGRADE', 'ASA_SECURE_CLIENT_UPGRADE')")
55
+ return value
56
+
57
+ model_config = ConfigDict(
58
+ populate_by_name=True,
59
+ validate_assignment=True,
60
+ protected_namespaces=(),
61
+ )
62
+
63
+
64
+ def to_str(self) -> str:
65
+ """Returns the string representation of the model using alias"""
66
+ return pprint.pformat(self.model_dump(by_alias=True))
67
+
68
+ def to_json(self) -> str:
69
+ """Returns the JSON representation of the model using alias"""
70
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
71
+ return json.dumps(self.to_dict())
72
+
73
+ @classmethod
74
+ def from_json(cls, json_str: str) -> Optional[Self]:
75
+ """Create an instance of MspUpgradeRunsAttributeValues from a JSON string"""
76
+ return cls.from_dict(json.loads(json_str))
77
+
78
+ def to_dict(self) -> Dict[str, Any]:
79
+ """Return the dictionary representation of the model using alias.
80
+
81
+ This has the following differences from calling pydantic's
82
+ `self.model_dump(by_alias=True)`:
83
+
84
+ * `None` is only added to the output dict for nullable fields that
85
+ were set at model initialization. Other fields with value `None`
86
+ are ignored.
87
+ """
88
+ excluded_fields: Set[str] = set([
89
+ ])
90
+
91
+ _dict = self.model_dump(
92
+ by_alias=True,
93
+ exclude=excluded_fields,
94
+ exclude_none=True,
95
+ )
96
+ return _dict
97
+
98
+ @classmethod
99
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
100
+ """Create an instance of MspUpgradeRunsAttributeValues from a dict"""
101
+ if obj is None:
102
+ return None
103
+
104
+ if not isinstance(obj, dict):
105
+ return cls.model_validate(obj)
106
+
107
+ _obj = cls.model_validate({
108
+ "upgradeRunStatuses": obj.get("upgradeRunStatuses"),
109
+ "upgradeRunTypes": obj.get("upgradeRunTypes"),
110
+ "users": obj.get("users")
111
+ })
112
+ return _obj
113
+
114
+
@@ -38,11 +38,12 @@ class TenantSettings(BaseModel):
38
38
  deny_cisco_support_access_to_tenant: Optional[StrictBool] = Field(default=None, description="Indicates if Cisco support is denied access to the tenant.", alias="denyCiscoSupportAccessToTenant")
39
39
  msp_portal_uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the MSP portal associated with the tenant.", alias="mspPortalUid")
40
40
  multicloud_defense: Optional[StrictBool] = Field(default=None, description="Indicates if the tenant has the multicloud defense enabled.", alias="multicloudDefense")
41
+ object_sharing_enabled: Optional[StrictBool] = Field(default=None, description="Indicates if the tenant has Object Sharing enabled.", alias="objectSharingEnabled")
41
42
  policy_analyzer: Optional[StrictBool] = Field(default=None, description="Indicates if the tenant has the policy analyzer enabled.", alias="policyAnalyzer")
42
43
  scheduled_deployments: Optional[StrictBool] = Field(default=None, description="Indicates if the tenant has scheduled deployments enabled.", alias="scheduledDeployments")
43
44
  uid: Optional[StrictStr] = Field(default=None, description="The unique identifier, represented as a UUID, of the tenant in Security Cloud Control.")
44
45
  web_analytics: Optional[StrictBool] = Field(default=None, description="Indicates if web analytics are enabled for the tenant.", alias="webAnalytics")
45
- __properties: ClassVar[List[str]] = ["aiAssistant", "allowCrossRegionTenantAddition", "asaHealthMetrics", "autoAcceptDeviceChanges", "autoDiscoverOnPremFmcs", "changeRequestSupport", "conflictDetectionInterval", "denyCiscoSupportAccessToTenant", "mspPortalUid", "multicloudDefense", "policyAnalyzer", "scheduledDeployments", "uid", "webAnalytics"]
46
+ __properties: ClassVar[List[str]] = ["aiAssistant", "allowCrossRegionTenantAddition", "asaHealthMetrics", "autoAcceptDeviceChanges", "autoDiscoverOnPremFmcs", "changeRequestSupport", "conflictDetectionInterval", "denyCiscoSupportAccessToTenant", "mspPortalUid", "multicloudDefense", "objectSharingEnabled", "policyAnalyzer", "scheduledDeployments", "uid", "webAnalytics"]
46
47
 
47
48
  model_config = ConfigDict(
48
49
  populate_by_name=True,
@@ -105,6 +106,7 @@ class TenantSettings(BaseModel):
105
106
  "denyCiscoSupportAccessToTenant": obj.get("denyCiscoSupportAccessToTenant"),
106
107
  "mspPortalUid": obj.get("mspPortalUid"),
107
108
  "multicloudDefense": obj.get("multicloudDefense"),
109
+ "objectSharingEnabled": obj.get("objectSharingEnabled"),
108
110
  "policyAnalyzer": obj.get("policyAnalyzer"),
109
111
  "scheduledDeployments": obj.get("scheduledDeployments"),
110
112
  "uid": obj.get("uid"),
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: scc-firewall-manager-sdk
3
- Version: 1.15.268
3
+ Version: 1.15.385
4
4
  Summary: Cisco Security Cloud Control Firewall Manager API
5
5
  Home-page:
6
6
  Author: Cisco Security Cloud Control TAC