diff --git a/CHANGELOG.md b/CHANGELOG.md
index 7e9d699d..9073d369 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -5,10 +5,31 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
## [Unreleased]
+
+## [2.7.2] - 2024-08-09
+- Update User-Agent header in RestSession
- Update requirements:
+ python = "^3.8"
+ requests = "^2.32.0"
+ readthedocs-sphinx-search = "^0.3.2"
+### Fixed
+- Fix function names in 2.3.7.6 `user_and_roles`
+ + From add_role_ap_i to add_role_api
+ + From get_a_a_a_attribute_ap_i to get_aaa_attribute_api
+ + From get_permissions_ap_i to get_permissions_api
+ + From delete_role_ap_i to delete_role_api
+ + From get_roles_ap_i to get_roles_api
+ + From get_users_ap_i to get_users_api
+ + From add_user_ap_i to add_user_api
+ + From update_user_ap_i to update_user_api
+ + From delete_user_ap_i to delete_user_api
+ + From get_external_authentication_setting_ap_i to get_external_authentication_setting_api
+ + From manage_external_authentication_setting_ap_i to manage_external_authentication_setting_api
+ + From get_external_authentication_servers_ap_i to get_external_authentication_servers_api
+ + From add_and_update_a_a_a_attribute_ap_i to add_and_update_aaa_attribute_api
+ + From delete_a_a_a_attribute_ap_i to delete_aaa_attribute_api
+ + From get_a_a_a_attribute_ap_i to get_aaa_attribute_api
+
## [2.7.1] - 2024-05-31
### Fixed
@@ -493,4 +514,5 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
[2.6.11]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.6.10...v2.6.11
[2.7.0]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.6.11...v2.7.0
[2.7.1]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.7.0...v2.7.1
-[Unreleased]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.7.1...develop
+[2.7.2]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.7.1...v2.7.2
+[Unreleased]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.7.2...develop
diff --git a/README.rst b/README.rst
index 771c3441..c88cf567 100755
--- a/README.rst
+++ b/README.rst
@@ -158,7 +158,7 @@ The following table shows the supported versions.
* - 2.3.5.3
- 2.6.11
* - 2.3.7.6
- - 2.7.1
+ - 2.7.2
diff --git a/dnacentersdk/api/v2_3_7_6/user_and_roles.py b/dnacentersdk/api/v2_3_7_6/user_and_roles.py
index 43b09972..3a571170 100644
--- a/dnacentersdk/api/v2_3_7_6/user_and_roles.py
+++ b/dnacentersdk/api/v2_3_7_6/user_and_roles.py
@@ -64,7 +64,7 @@ def __init__(self, session, object_factory, request_validator):
self._object_factory = object_factory
self._request_validator = request_validator
- def add_role_ap_i(self,
+ def add_role_api(self,
description=None,
resourceTypes=None,
role=None,
@@ -145,7 +145,7 @@ def add_role_ap_i(self,
return self._object_factory('bpm_a88c7510a15578b8eb2df183a92d5d_v2_3_7_6', json_data)
- def update_role_ap_i(self,
+ def update_role_api(self,
description=None,
resourceTypes=None,
roleId=None,
@@ -223,7 +223,7 @@ def update_role_ap_i(self,
return self._object_factory('bpm_ff5bf5a67c6c5c0aa9e7ba84c088e1a6_v2_3_7_6', json_data)
- def get_permissions_ap_i(self,
+ def get_permissions_api(self,
headers=None,
**request_parameters):
"""Get permissions for a role from Cisco DNA Center System. .
@@ -273,7 +273,7 @@ def get_permissions_ap_i(self,
return self._object_factory('bpm_ec0b30eca9d540a845848cffd7c602a_v2_3_7_6', json_data)
- def delete_role_ap_i(self,
+ def delete_role_api(self,
role_id,
headers=None,
**request_parameters):
@@ -328,7 +328,7 @@ def delete_role_ap_i(self,
return self._object_factory('bpm_da9e850c44d353f78ab002a640e5604f_v2_3_7_6', json_data)
- def get_roles_ap_i(self,
+ def get_roles_api(self,
headers=None,
**request_parameters):
"""Get all roles for the Cisco DNA Center System. .
@@ -381,7 +381,7 @@ def get_roles_ap_i(self,
return self._object_factory('bpm_bef02e8f6f8354dc99e375826a87c88c_v2_3_7_6', json_data)
- def get_users_ap_i(self,
+ def get_users_api(self,
invoke_source,
auth_source=None,
headers=None,
@@ -445,7 +445,7 @@ def get_users_ap_i(self,
return self._object_factory('bpm_fa405b6d1be56739f2dfeea63212015_v2_3_7_6', json_data)
- def add_user_ap_i(self,
+ def add_user_api(self,
email=None,
firstName=None,
lastName=None,
@@ -535,7 +535,7 @@ def add_user_ap_i(self,
return self._object_factory('bpm_d82755e5e03510daf0951c1f42c2702_v2_3_7_6', json_data)
- def update_user_ap_i(self,
+ def update_user_api(self,
email=None,
firstName=None,
lastName=None,
@@ -625,7 +625,7 @@ def update_user_ap_i(self,
return self._object_factory('bpm_d2bd5f05bd535a89ebadb30e2ede9e_v2_3_7_6', json_data)
- def delete_user_ap_i(self,
+ def delete_user_api(self,
user_id,
headers=None,
**request_parameters):
@@ -680,7 +680,7 @@ def delete_user_ap_i(self,
return self._object_factory('bpm_c65c6cc65f068766cbb8a42ad387_v2_3_7_6', json_data)
- def get_external_authentication_setting_ap_i(self,
+ def get_external_authentication_setting_api(self,
headers=None,
**request_parameters):
"""Get the External Authentication setting. .
@@ -730,7 +730,7 @@ def get_external_authentication_setting_ap_i(self,
return self._object_factory('bpm_ac03ba045f60925fd7843bf9e279_v2_3_7_6', json_data)
- def manage_external_authentication_setting_ap_i(self,
+ def manage_external_authentication_setting_api(self,
enable=None,
headers=None,
payload=None,
@@ -803,7 +803,7 @@ def manage_external_authentication_setting_ap_i(self,
return self._object_factory('bpm_e4f57e8f06856ee9a7e490d01f7f692_v2_3_7_6', json_data)
- def get_external_authentication_servers_ap_i(self,
+ def get_external_authentication_servers_api(self,
invoke_source,
headers=None,
**request_parameters):
@@ -860,7 +860,7 @@ def get_external_authentication_servers_ap_i(self,
return self._object_factory('bpm_def9045d4d9c96bcd42172a79c_v2_3_7_6', json_data)
- def add_and_update_a_a_a_attribute_ap_i(self,
+ def add_and_update_aaa_attribute_api(self,
attributeName=None,
headers=None,
payload=None,
@@ -936,7 +936,7 @@ def add_and_update_a_a_a_attribute_ap_i(self,
return self._object_factory('bpm_f5bfccc7e30550baa7046f74daa1ef2_v2_3_7_6', json_data)
- def delete_a_a_a_attribute_ap_i(self,
+ def delete_aaa_attribute_api(self,
headers=None,
**request_parameters):
"""Delete the custom AAA attribute that was added. Note that by deleting the AAA attribute, a default AAA attribute
@@ -988,7 +988,7 @@ def delete_a_a_a_attribute_ap_i(self,
return self._object_factory('bpm_f20c99b436bd5be8bdb9094db3a47f01_v2_3_7_6', json_data)
- def get_a_a_a_attribute_ap_i(self,
+ def get_aaa_attribute_api(self,
headers=None,
**request_parameters):
"""Get the current value of the custom AAA attribute. .
diff --git a/dnacentersdk/restsession.py b/dnacentersdk/restsession.py
index 532b7132..8a6326d5 100644
--- a/dnacentersdk/restsession.py
+++ b/dnacentersdk/restsession.py
@@ -199,7 +199,8 @@ def __init__(self, get_access_token, access_token, base_url,
# Update the headers of the `requests` session
self.update_headers({'X-Auth-Token': access_token,
- 'Content-type': 'application/json;charset=utf-8'})
+ 'Content-type': 'application/json;charset=utf-8',
+ 'User-Agent': f'python-cisco-dnacsdk/{version}'})
@property
def version(self):
diff --git a/docs/CHANGELOG.rst b/docs/CHANGELOG.rst
index 228bd74e..e1fd3979 100644
--- a/docs/CHANGELOG.rst
+++ b/docs/CHANGELOG.rst
@@ -8,14 +8,42 @@ Changelog `__, and this project
adheres to `Semantic
Versioning `__.
-`Unreleased `__
+`Unreleased `__
--------------------------------------------------------------------------------------------------
+`2.7.2 `__ - 2024-08-09
+---------------------------------------------------------------------------------------------------------
+
+- Update User-Agent header in RestSession
- Update requirements:
- python = “^3.8”
- requests = “^2.32.0”
- - readthedocs-sphinx-search = “^0.3.2”
+ - readthedocs-sphinx-search = “^0.3.2” ### Fixed
+
+- Fix function names in 2.3.7.6 ``user_and_roles``
+
+ - From add_role_ap_i to add_role_api
+ - From get_a_a_a_attribute_ap_i to get_aaa_attribute_api
+ - From get_permissions_ap_i to get_permissions_api
+ - From delete_role_ap_i to delete_role_api
+ - From get_roles_ap_i to get_roles_api
+ - From get_users_ap_i to get_users_api
+ - From add_user_ap_i to add_user_api
+ - From update_user_ap_i to update_user_api
+ - From delete_user_ap_i to delete_user_api
+ - From get_external_authentication_setting_ap_i to
+ get_external_authentication_setting_api
+ - From manage_external_authentication_setting_ap_i to
+ manage_external_authentication_setting_api
+ - From get_external_authentication_servers_ap_i to
+ get_external_authentication_servers_api
+ - From add_and_update_a_a_a_attribute_ap_i to
+ add_and_update_aaa_attribute_api
+ - From delete_a_a_a_attribute_ap_i to delete_aaa_attribute_api
+ - From get_a_a_a_attribute_ap_i to get_aaa_attribute_api
+
+.. _section-1:
`2.7.1 `__ - 2024-05-31
---------------------------------------------------------------------------------------------------------
@@ -26,7 +54,7 @@ Fixed
- Updated package version retrieval method from pkg_resources to
importlib.metadata.
-.. _section-1:
+.. _section-2:
`2.7.0 `__ - 2024-05-31
----------------------------------------------------------------------------------------------------------
@@ -43,7 +71,7 @@ Added
- Fix headers in ``create_webhook_destination`` and
``update_webhook_destination``
-.. _section-2:
+.. _section-3:
`2.6.11 `__ - 2023-01-10
------------------------------------------------------------------------------------------------------------
@@ -57,7 +85,7 @@ Fixed
Fixing required schema.
- Updating request version. Issue #132
-.. _section-3:
+.. _section-4:
`2.6.10 `__ - 2023-11-10
-----------------------------------------------------------------------------------------------------------
@@ -72,7 +100,7 @@ Fixed
- Fixed params in 2.3.5.3 claim_a_device_to_a_site from vlanID to
vlanId
-.. _section-4:
+.. _section-5:
`2.6.9 `__ - 2023-09-20
---------------------------------------------------------------------------------------------------------
@@ -83,7 +111,7 @@ Changed
- AP port assignment API not working with DNAC APIs of 2.3.3.0 #126,
Documetion bug, extra-space in enum.
-.. _section-5:
+.. _section-6:
`2.6.8 `__ - 2023-09-12
---------------------------------------------------------------------------------------------------------
@@ -95,7 +123,7 @@ Changed
- 2_3_3_0 sda sevice ``add_vn`` method update.
-.. _section-6:
+.. _section-7:
`2.6.7 `__ - 2023-08-25
---------------------------------------------------------------------------------------------------------
@@ -107,7 +135,7 @@ Changed
- Update readthedocs settings
-.. _section-7:
+.. _section-8:
`2.6.6 `__ - 2023-07-10
---------------------------------------------------------------------------------------------------------
@@ -119,7 +147,7 @@ Changed
- Change requests-toolbelt minimum version #101
-.. _section-8:
+.. _section-9:
`2.6.5 `__ - 2023-05-29
---------------------------------------------------------------------------------------------------------
@@ -131,7 +159,7 @@ Changed
- user_and_roles::Unable to use user and roles module. #112
-.. _section-9:
+.. _section-10:
`2.6.4 `__ - 2023-05-25
---------------------------------------------------------------------------------------------------------
@@ -160,7 +188,7 @@ Changed
- Poor naming of function: v2_3_5_3/authentication_management.py :
``authentication_ap_i( #102``
-.. _section-10:
+.. _section-11:
`2.6.3 `__ - 2023-04-28
---------------------------------------------------------------------------------------------------------
@@ -188,14 +216,14 @@ Changed
.. rubric:: `2.6.2 `__
- 2023-04-25
- :name: section-11
+ :name: section-12
.. rubric:: Changed
:name: changed-7
- Add ``issue`` family on 2.3.3.0
-.. _section-12:
+.. _section-13:
`2.6.1 `__ - 2023-04-12
---------------------------------------------------------------------------------------------------------
@@ -209,7 +237,7 @@ Changed
- Correct families names in 2.3.5.3
- Removing duplicate params
-.. _section-13:
+.. _section-14:
`2.6.0 `__ - 2023-04-12
---------------------------------------------------------------------------------------------------------
@@ -222,7 +250,7 @@ Added
- Add support of DNA Center versions (‘2.3.5.3’)
- Adds modules for v2_3_5_3
-.. _section-14:
+.. _section-15:
`2.5.6 `__ - 2023-01-10
---------------------------------------------------------------------------------------------------------
@@ -261,7 +289,7 @@ Fixed
- dnacentersdk.api.v2_3_3_0.tag
- dnacentersdk.api.v2_3_3_0.task
-.. _section-15:
+.. _section-16:
`2.5.5 `__ - 2022-11-17
---------------------------------------------------------------------------------------------------------
@@ -278,7 +306,7 @@ Fixed
- Added Dict_of_str function call in custom_caller headers
-.. _section-16:
+.. _section-17:
`2.5.4 `__ - 2022-08-11
---------------------------------------------------------------------------------------------------------
@@ -292,7 +320,7 @@ Added
- ``add_ssid_to_ip_pool_mapping``
-.. _section-17:
+.. _section-18:
`2.5.3 `__ - 2022-08-09
---------------------------------------------------------------------------------------------------------
@@ -308,7 +336,7 @@ Fixed
``connectedToInternet`` on ``sda.adds_border_device`` comes from
``boolean`` to ``string``.
-.. _section-18:
+.. _section-19:
`2.5.2 `__ - 2022-07-29
---------------------------------------------------------------------------------------------------------
@@ -345,7 +373,7 @@ Fixed
- network
- servers
-.. _section-19:
+.. _section-20:
`2.5.1 `__ - 2022-07-12
---------------------------------------------------------------------------------------------------------
@@ -359,7 +387,7 @@ Fixed
- IpAddressSpace
-.. _section-20:
+.. _section-21:
`2.5.0 `__ - 2022-06-20
----------------------------------------------------------------------------------------------------------
@@ -372,7 +400,7 @@ Added
- Add support of DNA Center versions (‘2.3.3.0’)
- Adds modules for v2_3_3_0
-.. _section-21:
+.. _section-22:
`2.4.11 `__ - 2022-06-15
------------------------------------------------------------------------------------------------------------
@@ -388,7 +416,7 @@ Fixed
- verify
- debug
-.. _section-22:
+.. _section-23:
`2.4.10 `__ - 2022-05-12
-----------------------------------------------------------------------------------------------------------
@@ -404,7 +432,7 @@ Added
- site_name_hierarchy
-.. _section-23:
+.. _section-24:
`2.4.9 `__ - 2022-04-20
---------------------------------------------------------------------------------------------------------
@@ -424,7 +452,7 @@ Added
- subnetMask
- vlanId
-.. _section-24:
+.. _section-25:
`2.4.8 `__ - 2022-03-23
---------------------------------------------------------------------------------------------------------
@@ -470,7 +498,7 @@ Changed
- dnacentersdk.api.v2_2_3_3.file.File.download_a_file_by_fileid
- dnacentersdk.api.v2_2_3_3.reports.Reports.download_report_content
-.. _section-25:
+.. _section-26:
`2.4.7 `__ - 2022-03-22
---------------------------------------------------------------------------------------------------------
@@ -483,7 +511,7 @@ Added
- Add ``rfProfile`` parameter for request body struct of
``claim_a_device_to_a_site``.
-.. _section-26:
+.. _section-27:
`2.4.6 `__ - 2022-03-14
---------------------------------------------------------------------------------------------------------
@@ -514,7 +542,7 @@ Changed
- sda.adds_border_device
-.. _section-27:
+.. _section-28:
`2.4.5 `__ - 2022-02-01
---------------------------------------------------------------------------------------------------------
@@ -540,7 +568,7 @@ Changed
- devices.sync_devices
-.. _section-28:
+.. _section-29:
`2.4.4 `__ - 2022-01-31
---------------------------------------------------------------------------------------------------------
@@ -584,7 +612,7 @@ Added
- Adds parameters ``hostname``, ``imageInfo`` and ``configInfo`` to
device_onboarding_pnp.pnp_device_claim_to_site
-.. _section-29:
+.. _section-30:
`2.4.3 `__ - 2022-01-19
---------------------------------------------------------------------------------------------------------
@@ -607,7 +635,7 @@ Changed
DNACenterAPI
- Adds tests for env variables before/after DNACenterAPI import
-.. _section-30:
+.. _section-31:
`2.4.2 `__ - 2021-12-14
---------------------------------------------------------------------------------------------------------
@@ -622,7 +650,7 @@ Fixed
- Update json schemas for models/validators and
tests/models/models/validators
-.. _section-31:
+.. _section-32:
`2.4.1 `__ - 2021-12-01
---------------------------------------------------------------------------------------------------------
@@ -634,7 +662,7 @@ Changed
- Update to match checksum
-.. _section-32:
+.. _section-33:
`2.4.0 `__ - 2021-12-01
---------------------------------------------------------------------------------------------------------
@@ -665,7 +693,7 @@ Changed
- Update missing dnac 2.2.3.3 files
-.. _section-33:
+.. _section-34:
`2.3.3 `__ - 2021-11-24
---------------------------------------------------------------------------------------------------------
@@ -697,7 +725,7 @@ Changed
- Add ``isGuestVirtualNetwork`` parameter to
``update_virtual_network_with_scalable_groups`` function
-.. _section-34:
+.. _section-35:
`2.3.2 `__ - 2021-09-14
---------------------------------------------------------------------------------------------------------
@@ -709,7 +737,7 @@ Changed
- Disable verify=False warnings of urllib3
-.. _section-35:
+.. _section-36:
`2.3.1 `__ - 2021-08-10
---------------------------------------------------------------------------------------------------------
@@ -722,7 +750,7 @@ Fixed
- Fix devices param definition & schemas [``aba32f3``]
- Remove unnecesary path_params [``25c4e99``]
-.. _section-36:
+.. _section-37:
`2.3.0 `__ - 2021-08-09
---------------------------------------------------------------------------------------------------------
@@ -747,7 +775,7 @@ Changed
- Updates restsession.py to handle downloads using Content-Disposition
header rather than custom fileName header
-.. _section-37:
+.. _section-38:
`2.2.5 `__ - 2021-08-05
---------------------------------------------------------------------------------------------------------
@@ -766,7 +794,7 @@ Changed
- Removes minus char from docstrings.
- Adds check_type conditions for ‘X-Auth-Token’ for v2_2_1 operations.
-.. _section-38:
+.. _section-39:
`2.2.4 `__ - 2021-06-08
---------------------------------------------------------------------------------------------------------
@@ -779,7 +807,7 @@ Fixed
- Fixes download_a_file_by_fileid and import_local_software_image for
v2_2_1
-.. _section-39:
+.. _section-40:
`2.2.3 `__ - 2021-06-08
---------------------------------------------------------------------------------------------------------
@@ -802,7 +830,7 @@ Changed
- Patch adds one function that was missing from previous release
- Patch adds models/validators for v2_2_1 with new ids
-.. _section-40:
+.. _section-41:
`2.2.2 `__ - 2021-05-10
---------------------------------------------------------------------------------------------------------
@@ -821,7 +849,7 @@ Changed
- Updates requirements files
-.. _section-41:
+.. _section-42:
`2.0.2 `__ - 2020-11-01
---------------------------------------------------------------------------------------------------------
@@ -850,7 +878,7 @@ Removed
- Removed requirements.lock
-.. _section-42:
+.. _section-43:
`2.0.0 `__ - 2020-07-17
---------------------------------------------------------------------------------------------------------
@@ -890,7 +918,7 @@ Removed
- Removed Webex Teams Space Community reference from README
- Removed Token refresh when changing base_url
-.. _section-43:
+.. _section-44:
`1.3.0 `__ - 2019-08-19
----------------------------------------------------------------------------------------------------------
@@ -911,7 +939,7 @@ Fixed
- Fix error in setter in ``api/__init__.py``
- Fix errors for readthedocs
-.. _section-44:
+.. _section-45:
`1.2.10 `__ - 2019-07-18
---------------------------------------------------------------------------------------------------
diff --git a/docs/api/api_structure_table_v2_3_5_3.rst b/docs/api/api_structure_table_v2_3_5_3.rst
index 0c6bc799..fe74bc5c 100644
--- a/docs/api/api_structure_table_v2_3_5_3.rst
+++ b/docs/api/api_structure_table_v2_3_5_3.rst
@@ -24,7 +24,7 @@
+----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| | :ref:`applications ` | :meth:`applications() ` |
+----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
-| | :ref:`authentication_management ` | :meth:`authentication_ap_i() ` |
+| | :ref:`authentication_management ` | :meth:`authentication_api() ` |
| | | :meth:`import_certificate() ` |
| | | :meth:`import_certificate_p12() ` |
+----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
@@ -475,12 +475,12 @@
| | | :meth:`get_topology_details() ` |
| | | :meth:`get_vlan_details() ` |
+----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
-| | :ref:`user_and_roles ` | :meth:`add_user_ap_i() ` |
-| | | :meth:`get_external_authentication_servers_ap_i() ` |
-| | | :meth:`get_permissions_ap_i() ` |
-| | | :meth:`get_roles_ap_i() ` |
-| | | :meth:`get_users_ap_i() ` |
-| | | :meth:`update_user_ap_i() ` |
+| | :ref:`user_and_roles ` | :meth:`add_user_api() ` |
+| | | :meth:`get_external_authentication_servers_api() ` |
+| | | :meth:`get_permissions_api() ` |
+| | | :meth:`get_roles_api() ` |
+| | | :meth:`get_users_api() ` |
+| | | :meth:`update_user_api() ` |
+----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| | :ref:`users ` | :meth:`get_user_enrichment_details() ` |
+----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
diff --git a/docs/api/api_structure_table_v2_3_7_6.rst b/docs/api/api_structure_table_v2_3_7_6.rst
index 5372c576..ccd430e5 100644
--- a/docs/api/api_structure_table_v2_3_7_6.rst
+++ b/docs/api/api_structure_table_v2_3_7_6.rst
@@ -562,21 +562,21 @@
| | | :meth:`get_topology_details() ` |
| | | :meth:`get_vlan_details() ` |
+----------------------+--------------------------------------------------------------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
-| | :ref:`userand_roles ` | :meth:`add_and_update_a_a_a_attribute_ap_i() ` |
-| | | :meth:`add_role_ap_i() ` |
-| | | :meth:`add_user_ap_i() ` |
-| | | :meth:`delete_a_a_a_attribute_ap_i() ` |
-| | | :meth:`delete_role_ap_i() ` |
-| | | :meth:`delete_user_ap_i() ` |
-| | | :meth:`get_a_a_a_attribute_ap_i() ` |
-| | | :meth:`get_external_authentication_servers_ap_i() ` |
-| | | :meth:`get_external_authentication_setting_ap_i() ` |
-| | | :meth:`get_permissions_ap_i() ` |
-| | | :meth:`get_roles_ap_i() ` |
-| | | :meth:`get_users_ap_i() ` |
-| | | :meth:`manage_external_authentication_setting_ap_i() ` |
-| | | :meth:`update_role_ap_i() ` |
-| | | :meth:`update_user_ap_i() ` |
+| | :ref:`userand_roles ` | :meth:`add_and_update_aaa_attribute_api() ` |
+| | | :meth:`add_role_api() ` |
+| | | :meth:`add_user_api() ` |
+| | | :meth:`delete_aaa_attribute_api() ` |
+| | | :meth:`delete_role_api() ` |
+| | | :meth:`delete_user_api() ` |
+| | | :meth:`get_aaa_attribute_api() ` |
+| | | :meth:`get_external_authentication_servers_api() ` |
+| | | :meth:`get_external_authentication_setting_api() ` |
+| | | :meth:`get_permissions_api() ` |
+| | | :meth:`get_roles_api() ` |
+| | | :meth:`get_users_api() ` |
+| | | :meth:`manage_external_authentication_setting_api() ` |
+| | | :meth:`update_role_api() ` |
+| | | :meth:`update_user_api() ` |
+----------------------+--------------------------------------------------------------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| | :ref:`users ` | :meth:`get_user_enrichment_details() ` |
+----------------------+--------------------------------------------------------------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
diff --git a/pyproject.toml b/pyproject.toml
index 0a59b498..770b94be 100644
--- a/pyproject.toml
+++ b/pyproject.toml
@@ -1,6 +1,6 @@
[tool.poetry]
name = "dnacentersdk"
-version = "2.7.1"
+version = "2.7.2"
description = "Cisco DNA Center Platform SDK"
authors = ["Jose Bogarin Solano ", "William Astorga ", "Francisco Muñoz ", "Francisco Muñoz ", "Bryan Vargas "]
license = "MIT"
diff --git a/tests/api/v2_3_5_3/test_authentication_management.py b/tests/api/v2_3_5_3/test_authentication_management.py
index 4bdfebf6..7b23ed62 100644
--- a/tests/api/v2_3_5_3/test_authentication_management.py
+++ b/tests/api/v2_3_5_3/test_authentication_management.py
@@ -139,13 +139,13 @@ def test_import_certificate_p12_default_val(api, validator):
raise original_e
-def is_valid_authentication_ap_i(json_schema_validate, obj):
+def is_valid_authentication_api(json_schema_validate, obj):
json_schema_validate('jsd_a6bfcd88e22c5c138657b340870b4ebb_v2_3_5_3').validate(obj)
return True
-def authentication_ap_i(api):
- endpoint_result = api.authentication_management.authentication_ap_i(
+def authentication_api(api):
+ endpoint_result = api.authentication_management.authentication_api(
active_validation=True,
payload=None
)
@@ -153,11 +153,11 @@ def authentication_ap_i(api):
@pytest.mark.authentication_management
-def test_authentication_ap_i(api, validator):
+def test_authentication_api(api, validator):
try:
- assert is_valid_authentication_ap_i(
+ assert is_valid_authentication_api(
validator,
- authentication_ap_i(api)
+ authentication_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -165,8 +165,8 @@ def test_authentication_ap_i(api, validator):
raise original_e
-def authentication_ap_i_default_val(api):
- endpoint_result = api.authentication_management.authentication_ap_i(
+def authentication_api_default_val(api):
+ endpoint_result = api.authentication_management.authentication_api(
active_validation=True,
payload=None
)
@@ -174,11 +174,11 @@ def authentication_ap_i_default_val(api):
@pytest.mark.authentication_management
-def test_authentication_ap_i_default_val(api, validator):
+def test_authentication_api_default_val(api, validator):
try:
- assert is_valid_authentication_ap_i(
+ assert is_valid_authentication_api(
validator,
- authentication_ap_i_default_val(api)
+ authentication_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
diff --git a/tests/api/v2_3_5_3/test_user_and_roles.py b/tests/api/v2_3_5_3/test_user_and_roles.py
index 4c2eaffd..43fb2f68 100644
--- a/tests/api/v2_3_5_3/test_user_and_roles.py
+++ b/tests/api/v2_3_5_3/test_user_and_roles.py
@@ -29,24 +29,24 @@
pytestmark = pytest.mark.skipif(DNA_CENTER_VERSION != '2.3.5.3', reason='version does not match')
-def is_valid_get_permissions_ap_i(json_schema_validate, obj):
+def is_valid_get_permissions_api(json_schema_validate, obj):
json_schema_validate('jsd_9ec0b30eca9d540a845848cffd7c602a_v2_3_5_3').validate(obj)
return True
-def get_permissions_ap_i(api):
- endpoint_result = api.userand_roles.get_permissions_ap_i(
+def get_permissions_api(api):
+ endpoint_result = api.userand_roles.get_permissions_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_permissions_ap_i(api, validator):
+def test_get_permissions_api(api, validator):
try:
- assert is_valid_get_permissions_ap_i(
+ assert is_valid_get_permissions_api(
validator,
- get_permissions_ap_i(api)
+ get_permissions_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -54,43 +54,43 @@ def test_get_permissions_ap_i(api, validator):
raise original_e
-def get_permissions_ap_i_default_val(api):
- endpoint_result = api.userand_roles.get_permissions_ap_i(
+def get_permissions_api_default_val(api):
+ endpoint_result = api.userand_roles.get_permissions_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_permissions_ap_i_default_val(api, validator):
+def test_get_permissions_api_default_val(api, validator):
try:
- assert is_valid_get_permissions_ap_i(
+ assert is_valid_get_permissions_api(
validator,
- get_permissions_ap_i_default_val(api)
+ get_permissions_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_get_roles_ap_i(json_schema_validate, obj):
+def is_valid_get_roles_api(json_schema_validate, obj):
json_schema_validate('jsd_bef02e8f6f8354dc99e375826a87c88c_v2_3_5_3').validate(obj)
return True
-def get_roles_ap_i(api):
- endpoint_result = api.userand_roles.get_roles_ap_i(
+def get_roles_api(api):
+ endpoint_result = api.userand_roles.get_roles_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_roles_ap_i(api, validator):
+def test_get_roles_api(api, validator):
try:
- assert is_valid_get_roles_ap_i(
+ assert is_valid_get_roles_api(
validator,
- get_roles_ap_i(api)
+ get_roles_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -98,43 +98,43 @@ def test_get_roles_ap_i(api, validator):
raise original_e
-def get_roles_ap_i_default_val(api):
- endpoint_result = api.userand_roles.get_roles_ap_i(
+def get_roles_api_default_val(api):
+ endpoint_result = api.userand_roles.get_roles_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_roles_ap_i_default_val(api, validator):
+def test_get_roles_api_default_val(api, validator):
try:
- assert is_valid_get_roles_ap_i(
+ assert is_valid_get_roles_api(
validator,
- get_roles_ap_i_default_val(api)
+ get_roles_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_get_users_ap_i(json_schema_validate, obj):
+def is_valid_get_users_api(json_schema_validate, obj):
json_schema_validate('jsd_7fa405b6d1be56739f2dfeea63212015_v2_3_5_3').validate(obj)
return True
-def get_users_ap_i(api):
- endpoint_result = api.userand_roles.get_users_ap_i(
+def get_users_api(api):
+ endpoint_result = api.userand_roles.get_users_api(
invoke_source='string'
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_users_ap_i(api, validator):
+def test_get_users_api(api, validator):
try:
- assert is_valid_get_users_ap_i(
+ assert is_valid_get_users_api(
validator,
- get_users_ap_i(api)
+ get_users_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -142,32 +142,32 @@ def test_get_users_ap_i(api, validator):
raise original_e
-def get_users_ap_i_default_val(api):
- endpoint_result = api.userand_roles.get_users_ap_i(
+def get_users_api_default_val(api):
+ endpoint_result = api.userand_roles.get_users_api(
invoke_source=None
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_users_ap_i_default_val(api, validator):
+def test_get_users_api_default_val(api, validator):
try:
- assert is_valid_get_users_ap_i(
+ assert is_valid_get_users_api(
validator,
- get_users_ap_i_default_val(api)
+ get_users_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_add_user_ap_i(json_schema_validate, obj):
+def is_valid_add_user_api(json_schema_validate, obj):
json_schema_validate('jsd_6d82755e5e03510daf0951c1f42c2702_v2_3_5_3').validate(obj)
return True
-def add_user_ap_i(api):
- endpoint_result = api.userand_roles.add_user_ap_i(
+def add_user_api(api):
+ endpoint_result = api.userand_roles.add_user_api(
active_validation=True,
email='string',
firstName='string',
@@ -181,11 +181,11 @@ def add_user_ap_i(api):
@pytest.mark.userand_roles
-def test_add_user_ap_i(api, validator):
+def test_add_user_api(api, validator):
try:
- assert is_valid_add_user_ap_i(
+ assert is_valid_add_user_api(
validator,
- add_user_ap_i(api)
+ add_user_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -193,8 +193,8 @@ def test_add_user_ap_i(api, validator):
raise original_e
-def add_user_ap_i_default_val(api):
- endpoint_result = api.userand_roles.add_user_ap_i(
+def add_user_api_default_val(api):
+ endpoint_result = api.userand_roles.add_user_api(
active_validation=True,
email=None,
firstName=None,
@@ -208,24 +208,24 @@ def add_user_ap_i_default_val(api):
@pytest.mark.userand_roles
-def test_add_user_ap_i_default_val(api, validator):
+def test_add_user_api_default_val(api, validator):
try:
- assert is_valid_add_user_ap_i(
+ assert is_valid_add_user_api(
validator,
- add_user_ap_i_default_val(api)
+ add_user_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_update_user_ap_i(json_schema_validate, obj):
+def is_valid_update_user_api(json_schema_validate, obj):
json_schema_validate('jsd_34d2bd5f05bd535a89ebadb30e2ede9e_v2_3_5_3').validate(obj)
return True
-def update_user_ap_i(api):
- endpoint_result = api.userand_roles.update_user_ap_i(
+def update_user_api(api):
+ endpoint_result = api.userand_roles.update_user_api(
active_validation=True,
email='string',
firstName='string',
@@ -239,11 +239,11 @@ def update_user_ap_i(api):
@pytest.mark.userand_roles
-def test_update_user_ap_i(api, validator):
+def test_update_user_api(api, validator):
try:
- assert is_valid_update_user_ap_i(
+ assert is_valid_update_user_api(
validator,
- update_user_ap_i(api)
+ update_user_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -251,8 +251,8 @@ def test_update_user_ap_i(api, validator):
raise original_e
-def update_user_ap_i_default_val(api):
- endpoint_result = api.userand_roles.update_user_ap_i(
+def update_user_api_default_val(api):
+ endpoint_result = api.userand_roles.update_user_api(
active_validation=True,
email=None,
firstName=None,
@@ -266,35 +266,35 @@ def update_user_ap_i_default_val(api):
@pytest.mark.userand_roles
-def test_update_user_ap_i_default_val(api, validator):
+def test_update_user_api_default_val(api, validator):
try:
- assert is_valid_update_user_ap_i(
+ assert is_valid_update_user_api(
validator,
- update_user_ap_i_default_val(api)
+ update_user_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_get_external_authentication_servers_ap_i(json_schema_validate, obj):
+def is_valid_get_external_authentication_servers_api(json_schema_validate, obj):
json_schema_validate('jsd_452738def9045d4d9c96bcd42172a79c_v2_3_5_3').validate(obj)
return True
-def get_external_authentication_servers_ap_i(api):
- endpoint_result = api.userand_roles.get_external_authentication_servers_ap_i(
+def get_external_authentication_servers_api(api):
+ endpoint_result = api.userand_roles.get_external_authentication_servers_api(
invoke_source='string'
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_external_authentication_servers_ap_i(api, validator):
+def test_get_external_authentication_servers_api(api, validator):
try:
- assert is_valid_get_external_authentication_servers_ap_i(
+ assert is_valid_get_external_authentication_servers_api(
validator,
- get_external_authentication_servers_ap_i(api)
+ get_external_authentication_servers_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -302,19 +302,19 @@ def test_get_external_authentication_servers_ap_i(api, validator):
raise original_e
-def get_external_authentication_servers_ap_i_default_val(api):
- endpoint_result = api.userand_roles.get_external_authentication_servers_ap_i(
+def get_external_authentication_servers_api_default_val(api):
+ endpoint_result = api.userand_roles.get_external_authentication_servers_api(
invoke_source=None
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_external_authentication_servers_ap_i_default_val(api, validator):
+def test_get_external_authentication_servers_api_default_val(api, validator):
try:
- assert is_valid_get_external_authentication_servers_ap_i(
+ assert is_valid_get_external_authentication_servers_api(
validator,
- get_external_authentication_servers_ap_i_default_val(api)
+ get_external_authentication_servers_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
diff --git a/tests/api/v2_3_7_6/test_user_and_roles.py b/tests/api/v2_3_7_6/test_user_and_roles.py
index b6697357..4a9d59a6 100644
--- a/tests/api/v2_3_7_6/test_user_and_roles.py
+++ b/tests/api/v2_3_7_6/test_user_and_roles.py
@@ -29,13 +29,13 @@
pytestmark = pytest.mark.skipif(DNA_CENTER_VERSION != '2.3.7.6', reason='version does not match')
-def is_valid_add_role_ap_i(json_schema_validate, obj):
+def is_valid_add_role_api(json_schema_validate, obj):
json_schema_validate('jsd_38a88c7510a15578b8eb2df183a92d5d_v2_3_7_6').validate(obj)
return True
-def add_role_ap_i(api):
- endpoint_result = api.userand_roles.add_role_ap_i(
+def add_role_api(api):
+ endpoint_result = api.userand_roles.add_role_api(
active_validation=True,
description='string',
payload=None,
@@ -46,11 +46,11 @@ def add_role_ap_i(api):
@pytest.mark.userand_roles
-def test_add_role_ap_i(api, validator):
+def test_add_role_api(api, validator):
try:
- assert is_valid_add_role_ap_i(
+ assert is_valid_add_role_api(
validator,
- add_role_ap_i(api)
+ add_role_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -58,8 +58,8 @@ def test_add_role_ap_i(api, validator):
raise original_e
-def add_role_ap_i_default_val(api):
- endpoint_result = api.userand_roles.add_role_ap_i(
+def add_role_api_default_val(api):
+ endpoint_result = api.userand_roles.add_role_api(
active_validation=True,
description=None,
payload=None,
@@ -70,24 +70,24 @@ def add_role_ap_i_default_val(api):
@pytest.mark.userand_roles
-def test_add_role_ap_i_default_val(api, validator):
+def test_add_role_api_default_val(api, validator):
try:
- assert is_valid_add_role_ap_i(
+ assert is_valid_add_role_api(
validator,
- add_role_ap_i_default_val(api)
+ add_role_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_update_role_ap_i(json_schema_validate, obj):
+def is_valid_update_role_api(json_schema_validate, obj):
json_schema_validate('jsd_ff5bf5a67c6c5c0aa9e7ba84c088e1a6_v2_3_7_6').validate(obj)
return True
-def update_role_ap_i(api):
- endpoint_result = api.userand_roles.update_role_ap_i(
+def update_role_api(api):
+ endpoint_result = api.userand_roles.update_role_api(
active_validation=True,
description='string',
payload=None,
@@ -98,11 +98,11 @@ def update_role_ap_i(api):
@pytest.mark.userand_roles
-def test_update_role_ap_i(api, validator):
+def test_update_role_api(api, validator):
try:
- assert is_valid_update_role_ap_i(
+ assert is_valid_update_role_api(
validator,
- update_role_ap_i(api)
+ update_role_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -110,8 +110,8 @@ def test_update_role_ap_i(api, validator):
raise original_e
-def update_role_ap_i_default_val(api):
- endpoint_result = api.userand_roles.update_role_ap_i(
+def update_role_api_default_val(api):
+ endpoint_result = api.userand_roles.update_role_api(
active_validation=True,
description=None,
payload=None,
@@ -122,35 +122,35 @@ def update_role_ap_i_default_val(api):
@pytest.mark.userand_roles
-def test_update_role_ap_i_default_val(api, validator):
+def test_update_role_api_default_val(api, validator):
try:
- assert is_valid_update_role_ap_i(
+ assert is_valid_update_role_api(
validator,
- update_role_ap_i_default_val(api)
+ update_role_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_get_permissions_ap_i(json_schema_validate, obj):
+def is_valid_get_permissions_api(json_schema_validate, obj):
json_schema_validate('jsd_9ec0b30eca9d540a845848cffd7c602a_v2_3_7_6').validate(obj)
return True
-def get_permissions_ap_i(api):
- endpoint_result = api.userand_roles.get_permissions_ap_i(
+def get_permissions_api(api):
+ endpoint_result = api.userand_roles.get_permissions_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_permissions_ap_i(api, validator):
+def test_get_permissions_api(api, validator):
try:
- assert is_valid_get_permissions_ap_i(
+ assert is_valid_get_permissions_api(
validator,
- get_permissions_ap_i(api)
+ get_permissions_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -158,43 +158,43 @@ def test_get_permissions_ap_i(api, validator):
raise original_e
-def get_permissions_ap_i_default_val(api):
- endpoint_result = api.userand_roles.get_permissions_ap_i(
+def get_permissions_api_default_val(api):
+ endpoint_result = api.userand_roles.get_permissions_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_permissions_ap_i_default_val(api, validator):
+def test_get_permissions_api_default_val(api, validator):
try:
- assert is_valid_get_permissions_ap_i(
+ assert is_valid_get_permissions_api(
validator,
- get_permissions_ap_i_default_val(api)
+ get_permissions_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_delete_role_ap_i(json_schema_validate, obj):
+def is_valid_delete_role_api(json_schema_validate, obj):
json_schema_validate('jsd_da9e850c44d353f78ab002a640e5604f_v2_3_7_6').validate(obj)
return True
-def delete_role_ap_i(api):
- endpoint_result = api.userand_roles.delete_role_ap_i(
+def delete_role_api(api):
+ endpoint_result = api.userand_roles.delete_role_api(
role_id='string'
)
return endpoint_result
@pytest.mark.userand_roles
-def test_delete_role_ap_i(api, validator):
+def test_delete_role_api(api, validator):
try:
- assert is_valid_delete_role_ap_i(
+ assert is_valid_delete_role_api(
validator,
- delete_role_ap_i(api)
+ delete_role_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -202,43 +202,43 @@ def test_delete_role_ap_i(api, validator):
raise original_e
-def delete_role_ap_i_default_val(api):
- endpoint_result = api.userand_roles.delete_role_ap_i(
+def delete_role_api_default_val(api):
+ endpoint_result = api.userand_roles.delete_role_api(
role_id='string'
)
return endpoint_result
@pytest.mark.userand_roles
-def test_delete_role_ap_i_default_val(api, validator):
+def test_delete_role_api_default_val(api, validator):
try:
- assert is_valid_delete_role_ap_i(
+ assert is_valid_delete_role_api(
validator,
- delete_role_ap_i_default_val(api)
+ delete_role_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_get_roles_ap_i(json_schema_validate, obj):
+def is_valid_get_roles_api(json_schema_validate, obj):
json_schema_validate('jsd_bef02e8f6f8354dc99e375826a87c88c_v2_3_7_6').validate(obj)
return True
-def get_roles_ap_i(api):
- endpoint_result = api.userand_roles.get_roles_ap_i(
+def get_roles_api(api):
+ endpoint_result = api.userand_roles.get_roles_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_roles_ap_i(api, validator):
+def test_get_roles_api(api, validator):
try:
- assert is_valid_get_roles_ap_i(
+ assert is_valid_get_roles_api(
validator,
- get_roles_ap_i(api)
+ get_roles_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -246,32 +246,32 @@ def test_get_roles_ap_i(api, validator):
raise original_e
-def get_roles_ap_i_default_val(api):
- endpoint_result = api.userand_roles.get_roles_ap_i(
+def get_roles_api_default_val(api):
+ endpoint_result = api.userand_roles.get_roles_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_roles_ap_i_default_val(api, validator):
+def test_get_roles_api_default_val(api, validator):
try:
- assert is_valid_get_roles_ap_i(
+ assert is_valid_get_roles_api(
validator,
- get_roles_ap_i_default_val(api)
+ get_roles_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_get_users_ap_i(json_schema_validate, obj):
+def is_valid_get_users_api(json_schema_validate, obj):
json_schema_validate('jsd_7fa405b6d1be56739f2dfeea63212015_v2_3_7_6').validate(obj)
return True
-def get_users_ap_i(api):
- endpoint_result = api.userand_roles.get_users_ap_i(
+def get_users_api(api):
+ endpoint_result = api.userand_roles.get_users_api(
auth_source='string',
invoke_source='string'
)
@@ -279,11 +279,11 @@ def get_users_ap_i(api):
@pytest.mark.userand_roles
-def test_get_users_ap_i(api, validator):
+def test_get_users_api(api, validator):
try:
- assert is_valid_get_users_ap_i(
+ assert is_valid_get_users_api(
validator,
- get_users_ap_i(api)
+ get_users_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -291,8 +291,8 @@ def test_get_users_ap_i(api, validator):
raise original_e
-def get_users_ap_i_default_val(api):
- endpoint_result = api.userand_roles.get_users_ap_i(
+def get_users_api_default_val(api):
+ endpoint_result = api.userand_roles.get_users_api(
auth_source=None,
invoke_source=None
)
@@ -300,24 +300,24 @@ def get_users_ap_i_default_val(api):
@pytest.mark.userand_roles
-def test_get_users_ap_i_default_val(api, validator):
+def test_get_users_api_default_val(api, validator):
try:
- assert is_valid_get_users_ap_i(
+ assert is_valid_get_users_api(
validator,
- get_users_ap_i_default_val(api)
+ get_users_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_add_user_ap_i(json_schema_validate, obj):
+def is_valid_add_user_api(json_schema_validate, obj):
json_schema_validate('jsd_6d82755e5e03510daf0951c1f42c2702_v2_3_7_6').validate(obj)
return True
-def add_user_ap_i(api):
- endpoint_result = api.userand_roles.add_user_ap_i(
+def add_user_api(api):
+ endpoint_result = api.userand_roles.add_user_api(
active_validation=True,
email='string',
firstName='string',
@@ -331,11 +331,11 @@ def add_user_ap_i(api):
@pytest.mark.userand_roles
-def test_add_user_ap_i(api, validator):
+def test_add_user_api(api, validator):
try:
- assert is_valid_add_user_ap_i(
+ assert is_valid_add_user_api(
validator,
- add_user_ap_i(api)
+ add_user_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -343,8 +343,8 @@ def test_add_user_ap_i(api, validator):
raise original_e
-def add_user_ap_i_default_val(api):
- endpoint_result = api.userand_roles.add_user_ap_i(
+def add_user_api_default_val(api):
+ endpoint_result = api.userand_roles.add_user_api(
active_validation=True,
email=None,
firstName=None,
@@ -358,24 +358,24 @@ def add_user_ap_i_default_val(api):
@pytest.mark.userand_roles
-def test_add_user_ap_i_default_val(api, validator):
+def test_add_user_api_default_val(api, validator):
try:
- assert is_valid_add_user_ap_i(
+ assert is_valid_add_user_api(
validator,
- add_user_ap_i_default_val(api)
+ add_user_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_update_user_ap_i(json_schema_validate, obj):
+def is_valid_update_user_api(json_schema_validate, obj):
json_schema_validate('jsd_34d2bd5f05bd535a89ebadb30e2ede9e_v2_3_7_6').validate(obj)
return True
-def update_user_ap_i(api):
- endpoint_result = api.userand_roles.update_user_ap_i(
+def update_user_api(api):
+ endpoint_result = api.userand_roles.update_user_api(
active_validation=True,
email='string',
firstName='string',
@@ -389,11 +389,11 @@ def update_user_ap_i(api):
@pytest.mark.userand_roles
-def test_update_user_ap_i(api, validator):
+def test_update_user_api(api, validator):
try:
- assert is_valid_update_user_ap_i(
+ assert is_valid_update_user_api(
validator,
- update_user_ap_i(api)
+ update_user_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -401,8 +401,8 @@ def test_update_user_ap_i(api, validator):
raise original_e
-def update_user_ap_i_default_val(api):
- endpoint_result = api.userand_roles.update_user_ap_i(
+def update_user_api_default_val(api):
+ endpoint_result = api.userand_roles.update_user_api(
active_validation=True,
email=None,
firstName=None,
@@ -416,35 +416,35 @@ def update_user_ap_i_default_val(api):
@pytest.mark.userand_roles
-def test_update_user_ap_i_default_val(api, validator):
+def test_update_user_api_default_val(api, validator):
try:
- assert is_valid_update_user_ap_i(
+ assert is_valid_update_user_api(
validator,
- update_user_ap_i_default_val(api)
+ update_user_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_delete_user_ap_i(json_schema_validate, obj):
+def is_valid_delete_user_api(json_schema_validate, obj):
json_schema_validate('jsd_3556c65c6cc65f068766cbb8a42ad387_v2_3_7_6').validate(obj)
return True
-def delete_user_ap_i(api):
- endpoint_result = api.userand_roles.delete_user_ap_i(
+def delete_user_api(api):
+ endpoint_result = api.userand_roles.delete_user_api(
user_id='string'
)
return endpoint_result
@pytest.mark.userand_roles
-def test_delete_user_ap_i(api, validator):
+def test_delete_user_api(api, validator):
try:
- assert is_valid_delete_user_ap_i(
+ assert is_valid_delete_user_api(
validator,
- delete_user_ap_i(api)
+ delete_user_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -452,43 +452,43 @@ def test_delete_user_ap_i(api, validator):
raise original_e
-def delete_user_ap_i_default_val(api):
- endpoint_result = api.userand_roles.delete_user_ap_i(
+def delete_user_api_default_val(api):
+ endpoint_result = api.userand_roles.delete_user_api(
user_id='string'
)
return endpoint_result
@pytest.mark.userand_roles
-def test_delete_user_ap_i_default_val(api, validator):
+def test_delete_user_api_default_val(api, validator):
try:
- assert is_valid_delete_user_ap_i(
+ assert is_valid_delete_user_api(
validator,
- delete_user_ap_i_default_val(api)
+ delete_user_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_get_external_authentication_setting_ap_i(json_schema_validate, obj):
+def is_valid_get_external_authentication_setting_api(json_schema_validate, obj):
json_schema_validate('jsd_5490ac03ba045f60925fd7843bf9e279_v2_3_7_6').validate(obj)
return True
-def get_external_authentication_setting_ap_i(api):
- endpoint_result = api.userand_roles.get_external_authentication_setting_ap_i(
+def get_external_authentication_setting_api(api):
+ endpoint_result = api.userand_roles.get_external_authentication_setting_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_external_authentication_setting_ap_i(api, validator):
+def test_get_external_authentication_setting_api(api, validator):
try:
- assert is_valid_get_external_authentication_setting_ap_i(
+ assert is_valid_get_external_authentication_setting_api(
validator,
- get_external_authentication_setting_ap_i(api)
+ get_external_authentication_setting_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -496,32 +496,32 @@ def test_get_external_authentication_setting_ap_i(api, validator):
raise original_e
-def get_external_authentication_setting_ap_i_default_val(api):
- endpoint_result = api.userand_roles.get_external_authentication_setting_ap_i(
+def get_external_authentication_setting_api_default_val(api):
+ endpoint_result = api.userand_roles.get_external_authentication_setting_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_external_authentication_setting_ap_i_default_val(api, validator):
+def test_get_external_authentication_setting_api_default_val(api, validator):
try:
- assert is_valid_get_external_authentication_setting_ap_i(
+ assert is_valid_get_external_authentication_setting_api(
validator,
- get_external_authentication_setting_ap_i_default_val(api)
+ get_external_authentication_setting_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_manage_external_authentication_setting_ap_i(json_schema_validate, obj):
+def is_valid_manage_external_authentication_setting_api(json_schema_validate, obj):
json_schema_validate('jsd_6e4f57e8f06856ee9a7e490d01f7f692_v2_3_7_6').validate(obj)
return True
-def manage_external_authentication_setting_ap_i(api):
- endpoint_result = api.userand_roles.manage_external_authentication_setting_ap_i(
+def manage_external_authentication_setting_api(api):
+ endpoint_result = api.userand_roles.manage_external_authentication_setting_api(
active_validation=True,
enable=True,
payload=None
@@ -530,11 +530,11 @@ def manage_external_authentication_setting_ap_i(api):
@pytest.mark.userand_roles
-def test_manage_external_authentication_setting_ap_i(api, validator):
+def test_manage_external_authentication_setting_api(api, validator):
try:
- assert is_valid_manage_external_authentication_setting_ap_i(
+ assert is_valid_manage_external_authentication_setting_api(
validator,
- manage_external_authentication_setting_ap_i(api)
+ manage_external_authentication_setting_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -542,8 +542,8 @@ def test_manage_external_authentication_setting_ap_i(api, validator):
raise original_e
-def manage_external_authentication_setting_ap_i_default_val(api):
- endpoint_result = api.userand_roles.manage_external_authentication_setting_ap_i(
+def manage_external_authentication_setting_api_default_val(api):
+ endpoint_result = api.userand_roles.manage_external_authentication_setting_api(
active_validation=True,
enable=None,
payload=None
@@ -552,35 +552,35 @@ def manage_external_authentication_setting_ap_i_default_val(api):
@pytest.mark.userand_roles
-def test_manage_external_authentication_setting_ap_i_default_val(api, validator):
+def test_manage_external_authentication_setting_api_default_val(api, validator):
try:
- assert is_valid_manage_external_authentication_setting_ap_i(
+ assert is_valid_manage_external_authentication_setting_api(
validator,
- manage_external_authentication_setting_ap_i_default_val(api)
+ manage_external_authentication_setting_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_get_external_authentication_servers_ap_i(json_schema_validate, obj):
+def is_valid_get_external_authentication_servers_api(json_schema_validate, obj):
json_schema_validate('jsd_452738def9045d4d9c96bcd42172a79c_v2_3_7_6').validate(obj)
return True
-def get_external_authentication_servers_ap_i(api):
- endpoint_result = api.userand_roles.get_external_authentication_servers_ap_i(
+def get_external_authentication_servers_api(api):
+ endpoint_result = api.userand_roles.get_external_authentication_servers_api(
invoke_source='string'
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_external_authentication_servers_ap_i(api, validator):
+def test_get_external_authentication_servers_api(api, validator):
try:
- assert is_valid_get_external_authentication_servers_ap_i(
+ assert is_valid_get_external_authentication_servers_api(
validator,
- get_external_authentication_servers_ap_i(api)
+ get_external_authentication_servers_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -588,32 +588,32 @@ def test_get_external_authentication_servers_ap_i(api, validator):
raise original_e
-def get_external_authentication_servers_ap_i_default_val(api):
- endpoint_result = api.userand_roles.get_external_authentication_servers_ap_i(
+def get_external_authentication_servers_api_default_val(api):
+ endpoint_result = api.userand_roles.get_external_authentication_servers_api(
invoke_source=None
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_external_authentication_servers_ap_i_default_val(api, validator):
+def test_get_external_authentication_servers_api_default_val(api, validator):
try:
- assert is_valid_get_external_authentication_servers_ap_i(
+ assert is_valid_get_external_authentication_servers_api(
validator,
- get_external_authentication_servers_ap_i_default_val(api)
+ get_external_authentication_servers_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_add_and_update_a_a_a_attribute_ap_i(json_schema_validate, obj):
+def is_valid_add_and_update_aaa_attribute_api(json_schema_validate, obj):
json_schema_validate('jsd_9f5bfccc7e30550baa7046f74daa1ef2_v2_3_7_6').validate(obj)
return True
-def add_and_update_a_a_a_attribute_ap_i(api):
- endpoint_result = api.userand_roles.add_and_update_a_a_a_attribute_ap_i(
+def add_and_update_aaa_attribute_api(api):
+ endpoint_result = api.userand_roles.add_and_update_aaa_attribute_api(
active_validation=True,
attributeName='string',
payload=None
@@ -622,11 +622,11 @@ def add_and_update_a_a_a_attribute_ap_i(api):
@pytest.mark.userand_roles
-def test_add_and_update_a_a_a_attribute_ap_i(api, validator):
+def test_add_and_update_aaa_attribute_api(api, validator):
try:
- assert is_valid_add_and_update_a_a_a_attribute_ap_i(
+ assert is_valid_add_and_update_aaa_attribute_api(
validator,
- add_and_update_a_a_a_attribute_ap_i(api)
+ add_and_update_aaa_attribute_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -634,8 +634,8 @@ def test_add_and_update_a_a_a_attribute_ap_i(api, validator):
raise original_e
-def add_and_update_a_a_a_attribute_ap_i_default_val(api):
- endpoint_result = api.userand_roles.add_and_update_a_a_a_attribute_ap_i(
+def add_and_update_aaa_attribute_api_default_val(api):
+ endpoint_result = api.userand_roles.add_and_update_aaa_attribute_api(
active_validation=True,
attributeName=None,
payload=None
@@ -644,35 +644,35 @@ def add_and_update_a_a_a_attribute_ap_i_default_val(api):
@pytest.mark.userand_roles
-def test_add_and_update_a_a_a_attribute_ap_i_default_val(api, validator):
+def test_add_and_update_aaa_attribute_api_default_val(api, validator):
try:
- assert is_valid_add_and_update_a_a_a_attribute_ap_i(
+ assert is_valid_add_and_update_aaa_attribute_api(
validator,
- add_and_update_a_a_a_attribute_ap_i_default_val(api)
+ add_and_update_aaa_attribute_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_delete_a_a_a_attribute_ap_i(json_schema_validate, obj):
+def is_valid_delete_aaa_attribute_api(json_schema_validate, obj):
json_schema_validate('jsd_f20c99b436bd5be8bdb9094db3a47f01_v2_3_7_6').validate(obj)
return True
-def delete_a_a_a_attribute_ap_i(api):
- endpoint_result = api.userand_roles.delete_a_a_a_attribute_ap_i(
+def delete_aaa_attribute_api(api):
+ endpoint_result = api.userand_roles.delete_aaa_attribute_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_delete_a_a_a_attribute_ap_i(api, validator):
+def test_delete_aaa_attribute_api(api, validator):
try:
- assert is_valid_delete_a_a_a_attribute_ap_i(
+ assert is_valid_delete_aaa_attribute_api(
validator,
- delete_a_a_a_attribute_ap_i(api)
+ delete_aaa_attribute_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -680,43 +680,43 @@ def test_delete_a_a_a_attribute_ap_i(api, validator):
raise original_e
-def delete_a_a_a_attribute_ap_i_default_val(api):
- endpoint_result = api.userand_roles.delete_a_a_a_attribute_ap_i(
+def delete_aaa_attribute_api_default_val(api):
+ endpoint_result = api.userand_roles.delete_aaa_attribute_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_delete_a_a_a_attribute_ap_i_default_val(api, validator):
+def test_delete_aaa_attribute_api_default_val(api, validator):
try:
- assert is_valid_delete_a_a_a_attribute_ap_i(
+ assert is_valid_delete_aaa_attribute_api(
validator,
- delete_a_a_a_attribute_ap_i_default_val(api)
+ delete_aaa_attribute_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
raise original_e
-def is_valid_get_a_a_a_attribute_ap_i(json_schema_validate, obj):
+def is_valid_get_aaa_attribute_api(json_schema_validate, obj):
json_schema_validate('jsd_4bedf83096a45ad1beaaa1fc6c192103_v2_3_7_6').validate(obj)
return True
-def get_a_a_a_attribute_ap_i(api):
- endpoint_result = api.userand_roles.get_a_a_a_attribute_ap_i(
+def get_aaa_attribute_api(api):
+ endpoint_result = api.userand_roles.get_aaa_attribute_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_a_a_a_attribute_ap_i(api, validator):
+def test_get_aaa_attribute_api(api, validator):
try:
- assert is_valid_get_a_a_a_attribute_ap_i(
+ assert is_valid_get_aaa_attribute_api(
validator,
- get_a_a_a_attribute_ap_i(api)
+ get_aaa_attribute_api(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest)):
@@ -724,19 +724,19 @@ def test_get_a_a_a_attribute_ap_i(api, validator):
raise original_e
-def get_a_a_a_attribute_ap_i_default_val(api):
- endpoint_result = api.userand_roles.get_a_a_a_attribute_ap_i(
+def get_aaa_attribute_api_default_val(api):
+ endpoint_result = api.userand_roles.get_aaa_attribute_api(
)
return endpoint_result
@pytest.mark.userand_roles
-def test_get_a_a_a_attribute_ap_i_default_val(api, validator):
+def test_get_aaa_attribute_api_default_val(api, validator):
try:
- assert is_valid_get_a_a_a_attribute_ap_i(
+ assert is_valid_get_aaa_attribute_api(
validator,
- get_a_a_a_attribute_ap_i_default_val(api)
+ get_aaa_attribute_api_default_val(api)
)
except Exception as original_e:
with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)):
diff --git a/tests/mock/server/v2_3_5_3.py b/tests/mock/server/v2_3_5_3.py
index cbe74762..ae456064 100644
--- a/tests/mock/server/v2_3_5_3.py
+++ b/tests/mock/server/v2_3_5_3.py
@@ -923,7 +923,7 @@ def matches_AUTHENTICATION_MANAGEMENT_a6bfcd88e22c5c138657b340870b4ebb(self):
self.path
)
- def authentication_management_authentication_ap_i_response(self):
+ def authentication_management_authentication_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -7876,7 +7876,7 @@ def matches_USERAND_ROLES_9ec0b30eca9d540a845848cffd7c602a(self):
self.path
)
- def userand_roles_get_permissions_ap_i_response(self):
+ def userand_roles_get_permissions_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -7893,7 +7893,7 @@ def matches_USERAND_ROLES_bef02e8f6f8354dc99e375826a87c88c(self):
self.path
)
- def userand_roles_get_roles_ap_i_response(self):
+ def userand_roles_get_roles_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -7910,7 +7910,7 @@ def matches_USERAND_ROLES_7fa405b6d1be56739f2dfeea63212015(self):
self.path
)
- def userand_roles_get_users_ap_i_response(self):
+ def userand_roles_get_users_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -7927,7 +7927,7 @@ def matches_USERAND_ROLES_6d82755e5e03510daf0951c1f42c2702(self):
self.path
)
- def userand_roles_add_user_ap_i_response(self):
+ def userand_roles_add_user_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -7944,7 +7944,7 @@ def matches_USERAND_ROLES_34d2bd5f05bd535a89ebadb30e2ede9e(self):
self.path
)
- def userand_roles_update_user_ap_i_response(self):
+ def userand_roles_update_user_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -7961,7 +7961,7 @@ def matches_USERAND_ROLES_452738def9045d4d9c96bcd42172a79c(self):
self.path
)
- def userand_roles_get_external_authentication_servers_ap_i_response(self):
+ def userand_roles_get_external_authentication_servers_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9350,19 +9350,19 @@ def do_GET(self):
return
if self.matches_USERAND_ROLES_9ec0b30eca9d540a845848cffd7c602a():
- self.userand_roles_get_permissions_ap_i_response()
+ self.userand_roles_get_permissions_api_response()
return
if self.matches_USERAND_ROLES_bef02e8f6f8354dc99e375826a87c88c():
- self.userand_roles_get_roles_ap_i_response()
+ self.userand_roles_get_roles_api_response()
return
if self.matches_USERAND_ROLES_7fa405b6d1be56739f2dfeea63212015():
- self.userand_roles_get_users_ap_i_response()
+ self.userand_roles_get_users_api_response()
return
if self.matches_USERAND_ROLES_452738def9045d4d9c96bcd42172a79c():
- self.userand_roles_get_external_authentication_servers_ap_i_response()
+ self.userand_roles_get_external_authentication_servers_api_response()
return
if self.matches_USERS_70f9c1d861a051b4a4928f2e6d84b2e3():
@@ -9439,7 +9439,7 @@ def do_POST(self):
return
if self.matches_AUTHENTICATION_MANAGEMENT_a6bfcd88e22c5c138657b340870b4ebb():
- self.authentication_management_authentication_ap_i_response()
+ self.authentication_management_authentication_api_response()
return
if self.matches_CISCO_DNA_CENTER_SYSTEM_5627d9227adc5f02b7cd264af7255d19():
@@ -9819,7 +9819,7 @@ def do_POST(self):
return
if self.matches_USERAND_ROLES_6d82755e5e03510daf0951c1f42c2702():
- self.userand_roles_add_user_ap_i_response()
+ self.userand_roles_add_user_api_response()
return
if self.matches_WIRELESS_d825ae9a117f5b6bb65b7d78fd42513c():
@@ -10085,7 +10085,7 @@ def do_PUT(self):
return
if self.matches_USERAND_ROLES_34d2bd5f05bd535a89ebadb30e2ede9e():
- self.userand_roles_update_user_ap_i_response()
+ self.userand_roles_update_user_api_response()
return
if self.matches_WIRELESS_25479623a94058a99acaaf8eb73c9227():
diff --git a/tests/mock/server/v2_3_7_6.py b/tests/mock/server/v2_3_7_6.py
index ef955be9..1eb7fb4c 100644
--- a/tests/mock/server/v2_3_7_6.py
+++ b/tests/mock/server/v2_3_7_6.py
@@ -9488,7 +9488,7 @@ def matches_USERAND_ROLES_38a88c7510a15578b8eb2df183a92d5d(self):
self.path
)
- def userand_roles_add_role_ap_i_response(self):
+ def userand_roles_add_role_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9505,7 +9505,7 @@ def matches_USERAND_ROLES_ff5bf5a67c6c5c0aa9e7ba84c088e1a6(self):
self.path
)
- def userand_roles_update_role_ap_i_response(self):
+ def userand_roles_update_role_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9522,7 +9522,7 @@ def matches_USERAND_ROLES_9ec0b30eca9d540a845848cffd7c602a(self):
self.path
)
- def userand_roles_get_permissions_ap_i_response(self):
+ def userand_roles_get_permissions_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9539,7 +9539,7 @@ def matches_USERAND_ROLES_da9e850c44d353f78ab002a640e5604f(self):
self.path
)
- def userand_roles_delete_role_ap_i_response(self):
+ def userand_roles_delete_role_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9556,7 +9556,7 @@ def matches_USERAND_ROLES_bef02e8f6f8354dc99e375826a87c88c(self):
self.path
)
- def userand_roles_get_roles_ap_i_response(self):
+ def userand_roles_get_roles_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9573,7 +9573,7 @@ def matches_USERAND_ROLES_7fa405b6d1be56739f2dfeea63212015(self):
self.path
)
- def userand_roles_get_users_ap_i_response(self):
+ def userand_roles_get_users_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9590,7 +9590,7 @@ def matches_USERAND_ROLES_6d82755e5e03510daf0951c1f42c2702(self):
self.path
)
- def userand_roles_add_user_ap_i_response(self):
+ def userand_roles_add_user_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9607,7 +9607,7 @@ def matches_USERAND_ROLES_34d2bd5f05bd535a89ebadb30e2ede9e(self):
self.path
)
- def userand_roles_update_user_ap_i_response(self):
+ def userand_roles_update_user_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9624,7 +9624,7 @@ def matches_USERAND_ROLES_3556c65c6cc65f068766cbb8a42ad387(self):
self.path
)
- def userand_roles_delete_user_ap_i_response(self):
+ def userand_roles_delete_user_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9641,7 +9641,7 @@ def matches_USERAND_ROLES_5490ac03ba045f60925fd7843bf9e279(self):
self.path
)
- def userand_roles_get_external_authentication_setting_ap_i_response(self):
+ def userand_roles_get_external_authentication_setting_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9658,7 +9658,7 @@ def matches_USERAND_ROLES_6e4f57e8f06856ee9a7e490d01f7f692(self):
self.path
)
- def userand_roles_manage_external_authentication_setting_ap_i_response(self):
+ def userand_roles_manage_external_authentication_setting_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9675,7 +9675,7 @@ def matches_USERAND_ROLES_452738def9045d4d9c96bcd42172a79c(self):
self.path
)
- def userand_roles_get_external_authentication_servers_ap_i_response(self):
+ def userand_roles_get_external_authentication_servers_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9692,7 +9692,7 @@ def matches_USERAND_ROLES_9f5bfccc7e30550baa7046f74daa1ef2(self):
self.path
)
- def userand_roles_add_and_update_a_a_a_attribute_ap_i_response(self):
+ def userand_roles_add_and_update_aaa_attribute_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9709,7 +9709,7 @@ def matches_USERAND_ROLES_f20c99b436bd5be8bdb9094db3a47f01(self):
self.path
)
- def userand_roles_delete_a_a_a_attribute_ap_i_response(self):
+ def userand_roles_delete_aaa_attribute_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -9726,7 +9726,7 @@ def matches_USERAND_ROLES_4bedf83096a45ad1beaaa1fc6c192103(self):
self.path
)
- def userand_roles_get_a_a_a_attribute_ap_i_response(self):
+ def userand_roles_get_aaa_attribute_api_response(self):
# Add response status code.
self.send_response(requests.codes.ok)
# Add response headers.
@@ -11272,27 +11272,27 @@ def do_GET(self):
return
if self.matches_USERAND_ROLES_9ec0b30eca9d540a845848cffd7c602a():
- self.userand_roles_get_permissions_ap_i_response()
+ self.userand_roles_get_permissions_api_response()
return
if self.matches_USERAND_ROLES_bef02e8f6f8354dc99e375826a87c88c():
- self.userand_roles_get_roles_ap_i_response()
+ self.userand_roles_get_roles_api_response()
return
if self.matches_USERAND_ROLES_7fa405b6d1be56739f2dfeea63212015():
- self.userand_roles_get_users_ap_i_response()
+ self.userand_roles_get_users_api_response()
return
if self.matches_USERAND_ROLES_5490ac03ba045f60925fd7843bf9e279():
- self.userand_roles_get_external_authentication_setting_ap_i_response()
+ self.userand_roles_get_external_authentication_setting_api_response()
return
if self.matches_USERAND_ROLES_452738def9045d4d9c96bcd42172a79c():
- self.userand_roles_get_external_authentication_servers_ap_i_response()
+ self.userand_roles_get_external_authentication_servers_api_response()
return
if self.matches_USERAND_ROLES_4bedf83096a45ad1beaaa1fc6c192103():
- self.userand_roles_get_a_a_a_attribute_ap_i_response()
+ self.userand_roles_get_aaa_attribute_api_response()
return
if self.matches_USERS_70f9c1d861a051b4a4928f2e6d84b2e3():
@@ -11813,19 +11813,19 @@ def do_POST(self):
return
if self.matches_USERAND_ROLES_38a88c7510a15578b8eb2df183a92d5d():
- self.userand_roles_add_role_ap_i_response()
+ self.userand_roles_add_role_api_response()
return
if self.matches_USERAND_ROLES_6d82755e5e03510daf0951c1f42c2702():
- self.userand_roles_add_user_ap_i_response()
+ self.userand_roles_add_user_api_response()
return
if self.matches_USERAND_ROLES_6e4f57e8f06856ee9a7e490d01f7f692():
- self.userand_roles_manage_external_authentication_setting_ap_i_response()
+ self.userand_roles_manage_external_authentication_setting_api_response()
return
if self.matches_USERAND_ROLES_9f5bfccc7e30550baa7046f74daa1ef2():
- self.userand_roles_add_and_update_a_a_a_attribute_ap_i_response()
+ self.userand_roles_add_and_update_aaa_attribute_api_response()
return
if self.matches_WIRELESS_d825ae9a117f5b6bb65b7d78fd42513c():
@@ -12171,11 +12171,11 @@ def do_PUT(self):
return
if self.matches_USERAND_ROLES_ff5bf5a67c6c5c0aa9e7ba84c088e1a6():
- self.userand_roles_update_role_ap_i_response()
+ self.userand_roles_update_role_api_response()
return
if self.matches_USERAND_ROLES_34d2bd5f05bd535a89ebadb30e2ede9e():
- self.userand_roles_update_user_ap_i_response()
+ self.userand_roles_update_user_api_response()
return
if self.matches_WIRELESS_25479623a94058a99acaaf8eb73c9227():
@@ -12461,15 +12461,15 @@ def do_DELETE(self):
return
if self.matches_USERAND_ROLES_da9e850c44d353f78ab002a640e5604f():
- self.userand_roles_delete_role_ap_i_response()
+ self.userand_roles_delete_role_api_response()
return
if self.matches_USERAND_ROLES_3556c65c6cc65f068766cbb8a42ad387():
- self.userand_roles_delete_user_ap_i_response()
+ self.userand_roles_delete_user_api_response()
return
if self.matches_USERAND_ROLES_f20c99b436bd5be8bdb9094db3a47f01():
- self.userand_roles_delete_a_a_a_attribute_ap_i_response()
+ self.userand_roles_delete_aaa_attribute_api_response()
return
if self.matches_WIRELESS_8e56eb2c294159d891b7dbe493ddc434():