diff --git a/CHANGELOG.md b/CHANGELOG.md index 7e9d699d..9073d369 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -5,10 +5,31 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/), and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html). ## [Unreleased] + +## [2.7.2] - 2024-08-09 +- Update User-Agent header in RestSession - Update requirements: + python = "^3.8" + requests = "^2.32.0" + readthedocs-sphinx-search = "^0.3.2" +### Fixed +- Fix function names in 2.3.7.6 `user_and_roles` + + From add_role_ap_i to add_role_api + + From get_a_a_a_attribute_ap_i to get_aaa_attribute_api + + From get_permissions_ap_i to get_permissions_api + + From delete_role_ap_i to delete_role_api + + From get_roles_ap_i to get_roles_api + + From get_users_ap_i to get_users_api + + From add_user_ap_i to add_user_api + + From update_user_ap_i to update_user_api + + From delete_user_ap_i to delete_user_api + + From get_external_authentication_setting_ap_i to get_external_authentication_setting_api + + From manage_external_authentication_setting_ap_i to manage_external_authentication_setting_api + + From get_external_authentication_servers_ap_i to get_external_authentication_servers_api + + From add_and_update_a_a_a_attribute_ap_i to add_and_update_aaa_attribute_api + + From delete_a_a_a_attribute_ap_i to delete_aaa_attribute_api + + From get_a_a_a_attribute_ap_i to get_aaa_attribute_api + ## [2.7.1] - 2024-05-31 ### Fixed @@ -493,4 +514,5 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0 [2.6.11]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.6.10...v2.6.11 [2.7.0]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.6.11...v2.7.0 [2.7.1]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.7.0...v2.7.1 -[Unreleased]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.7.1...develop +[2.7.2]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.7.1...v2.7.2 +[Unreleased]: https://github.com/cisco-en-programmability/dnacentersdk/compare/v2.7.2...develop diff --git a/README.rst b/README.rst index 771c3441..c88cf567 100755 --- a/README.rst +++ b/README.rst @@ -158,7 +158,7 @@ The following table shows the supported versions. * - 2.3.5.3 - 2.6.11 * - 2.3.7.6 - - 2.7.1 + - 2.7.2 diff --git a/dnacentersdk/api/v2_3_7_6/user_and_roles.py b/dnacentersdk/api/v2_3_7_6/user_and_roles.py index 43b09972..3a571170 100644 --- a/dnacentersdk/api/v2_3_7_6/user_and_roles.py +++ b/dnacentersdk/api/v2_3_7_6/user_and_roles.py @@ -64,7 +64,7 @@ def __init__(self, session, object_factory, request_validator): self._object_factory = object_factory self._request_validator = request_validator - def add_role_ap_i(self, + def add_role_api(self, description=None, resourceTypes=None, role=None, @@ -145,7 +145,7 @@ def add_role_ap_i(self, return self._object_factory('bpm_a88c7510a15578b8eb2df183a92d5d_v2_3_7_6', json_data) - def update_role_ap_i(self, + def update_role_api(self, description=None, resourceTypes=None, roleId=None, @@ -223,7 +223,7 @@ def update_role_ap_i(self, return self._object_factory('bpm_ff5bf5a67c6c5c0aa9e7ba84c088e1a6_v2_3_7_6', json_data) - def get_permissions_ap_i(self, + def get_permissions_api(self, headers=None, **request_parameters): """Get permissions for a role from Cisco DNA Center System. . @@ -273,7 +273,7 @@ def get_permissions_ap_i(self, return self._object_factory('bpm_ec0b30eca9d540a845848cffd7c602a_v2_3_7_6', json_data) - def delete_role_ap_i(self, + def delete_role_api(self, role_id, headers=None, **request_parameters): @@ -328,7 +328,7 @@ def delete_role_ap_i(self, return self._object_factory('bpm_da9e850c44d353f78ab002a640e5604f_v2_3_7_6', json_data) - def get_roles_ap_i(self, + def get_roles_api(self, headers=None, **request_parameters): """Get all roles for the Cisco DNA Center System. . @@ -381,7 +381,7 @@ def get_roles_ap_i(self, return self._object_factory('bpm_bef02e8f6f8354dc99e375826a87c88c_v2_3_7_6', json_data) - def get_users_ap_i(self, + def get_users_api(self, invoke_source, auth_source=None, headers=None, @@ -445,7 +445,7 @@ def get_users_ap_i(self, return self._object_factory('bpm_fa405b6d1be56739f2dfeea63212015_v2_3_7_6', json_data) - def add_user_ap_i(self, + def add_user_api(self, email=None, firstName=None, lastName=None, @@ -535,7 +535,7 @@ def add_user_ap_i(self, return self._object_factory('bpm_d82755e5e03510daf0951c1f42c2702_v2_3_7_6', json_data) - def update_user_ap_i(self, + def update_user_api(self, email=None, firstName=None, lastName=None, @@ -625,7 +625,7 @@ def update_user_ap_i(self, return self._object_factory('bpm_d2bd5f05bd535a89ebadb30e2ede9e_v2_3_7_6', json_data) - def delete_user_ap_i(self, + def delete_user_api(self, user_id, headers=None, **request_parameters): @@ -680,7 +680,7 @@ def delete_user_ap_i(self, return self._object_factory('bpm_c65c6cc65f068766cbb8a42ad387_v2_3_7_6', json_data) - def get_external_authentication_setting_ap_i(self, + def get_external_authentication_setting_api(self, headers=None, **request_parameters): """Get the External Authentication setting. . @@ -730,7 +730,7 @@ def get_external_authentication_setting_ap_i(self, return self._object_factory('bpm_ac03ba045f60925fd7843bf9e279_v2_3_7_6', json_data) - def manage_external_authentication_setting_ap_i(self, + def manage_external_authentication_setting_api(self, enable=None, headers=None, payload=None, @@ -803,7 +803,7 @@ def manage_external_authentication_setting_ap_i(self, return self._object_factory('bpm_e4f57e8f06856ee9a7e490d01f7f692_v2_3_7_6', json_data) - def get_external_authentication_servers_ap_i(self, + def get_external_authentication_servers_api(self, invoke_source, headers=None, **request_parameters): @@ -860,7 +860,7 @@ def get_external_authentication_servers_ap_i(self, return self._object_factory('bpm_def9045d4d9c96bcd42172a79c_v2_3_7_6', json_data) - def add_and_update_a_a_a_attribute_ap_i(self, + def add_and_update_aaa_attribute_api(self, attributeName=None, headers=None, payload=None, @@ -936,7 +936,7 @@ def add_and_update_a_a_a_attribute_ap_i(self, return self._object_factory('bpm_f5bfccc7e30550baa7046f74daa1ef2_v2_3_7_6', json_data) - def delete_a_a_a_attribute_ap_i(self, + def delete_aaa_attribute_api(self, headers=None, **request_parameters): """Delete the custom AAA attribute that was added. Note that by deleting the AAA attribute, a default AAA attribute @@ -988,7 +988,7 @@ def delete_a_a_a_attribute_ap_i(self, return self._object_factory('bpm_f20c99b436bd5be8bdb9094db3a47f01_v2_3_7_6', json_data) - def get_a_a_a_attribute_ap_i(self, + def get_aaa_attribute_api(self, headers=None, **request_parameters): """Get the current value of the custom AAA attribute. . diff --git a/dnacentersdk/restsession.py b/dnacentersdk/restsession.py index 532b7132..8a6326d5 100644 --- a/dnacentersdk/restsession.py +++ b/dnacentersdk/restsession.py @@ -199,7 +199,8 @@ def __init__(self, get_access_token, access_token, base_url, # Update the headers of the `requests` session self.update_headers({'X-Auth-Token': access_token, - 'Content-type': 'application/json;charset=utf-8'}) + 'Content-type': 'application/json;charset=utf-8', + 'User-Agent': f'python-cisco-dnacsdk/{version}'}) @property def version(self): diff --git a/docs/CHANGELOG.rst b/docs/CHANGELOG.rst index 228bd74e..e1fd3979 100644 --- a/docs/CHANGELOG.rst +++ b/docs/CHANGELOG.rst @@ -8,14 +8,42 @@ Changelog `__, and this project adheres to `Semantic Versioning `__. -`Unreleased `__ +`Unreleased `__ -------------------------------------------------------------------------------------------------- +`2.7.2 `__ - 2024-08-09 +--------------------------------------------------------------------------------------------------------- + +- Update User-Agent header in RestSession - Update requirements: - python = “^3.8” - requests = “^2.32.0” - - readthedocs-sphinx-search = “^0.3.2” + - readthedocs-sphinx-search = “^0.3.2” ### Fixed + +- Fix function names in 2.3.7.6 ``user_and_roles`` + + - From add_role_ap_i to add_role_api + - From get_a_a_a_attribute_ap_i to get_aaa_attribute_api + - From get_permissions_ap_i to get_permissions_api + - From delete_role_ap_i to delete_role_api + - From get_roles_ap_i to get_roles_api + - From get_users_ap_i to get_users_api + - From add_user_ap_i to add_user_api + - From update_user_ap_i to update_user_api + - From delete_user_ap_i to delete_user_api + - From get_external_authentication_setting_ap_i to + get_external_authentication_setting_api + - From manage_external_authentication_setting_ap_i to + manage_external_authentication_setting_api + - From get_external_authentication_servers_ap_i to + get_external_authentication_servers_api + - From add_and_update_a_a_a_attribute_ap_i to + add_and_update_aaa_attribute_api + - From delete_a_a_a_attribute_ap_i to delete_aaa_attribute_api + - From get_a_a_a_attribute_ap_i to get_aaa_attribute_api + +.. _section-1: `2.7.1 `__ - 2024-05-31 --------------------------------------------------------------------------------------------------------- @@ -26,7 +54,7 @@ Fixed - Updated package version retrieval method from pkg_resources to importlib.metadata. -.. _section-1: +.. _section-2: `2.7.0 `__ - 2024-05-31 ---------------------------------------------------------------------------------------------------------- @@ -43,7 +71,7 @@ Added - Fix headers in ``create_webhook_destination`` and ``update_webhook_destination`` -.. _section-2: +.. _section-3: `2.6.11 `__ - 2023-01-10 ------------------------------------------------------------------------------------------------------------ @@ -57,7 +85,7 @@ Fixed Fixing required schema. - Updating request version. Issue #132 -.. _section-3: +.. _section-4: `2.6.10 `__ - 2023-11-10 ----------------------------------------------------------------------------------------------------------- @@ -72,7 +100,7 @@ Fixed - Fixed params in 2.3.5.3 claim_a_device_to_a_site from vlanID to vlanId -.. _section-4: +.. _section-5: `2.6.9 `__ - 2023-09-20 --------------------------------------------------------------------------------------------------------- @@ -83,7 +111,7 @@ Changed - AP port assignment API not working with DNAC APIs of 2.3.3.0 #126, Documetion bug, extra-space in enum. -.. _section-5: +.. _section-6: `2.6.8 `__ - 2023-09-12 --------------------------------------------------------------------------------------------------------- @@ -95,7 +123,7 @@ Changed - 2_3_3_0 sda sevice ``add_vn`` method update. -.. _section-6: +.. _section-7: `2.6.7 `__ - 2023-08-25 --------------------------------------------------------------------------------------------------------- @@ -107,7 +135,7 @@ Changed - Update readthedocs settings -.. _section-7: +.. _section-8: `2.6.6 `__ - 2023-07-10 --------------------------------------------------------------------------------------------------------- @@ -119,7 +147,7 @@ Changed - Change requests-toolbelt minimum version #101 -.. _section-8: +.. _section-9: `2.6.5 `__ - 2023-05-29 --------------------------------------------------------------------------------------------------------- @@ -131,7 +159,7 @@ Changed - user_and_roles::Unable to use user and roles module. #112 -.. _section-9: +.. _section-10: `2.6.4 `__ - 2023-05-25 --------------------------------------------------------------------------------------------------------- @@ -160,7 +188,7 @@ Changed - Poor naming of function: v2_3_5_3/authentication_management.py : ``authentication_ap_i( #102`` -.. _section-10: +.. _section-11: `2.6.3 `__ - 2023-04-28 --------------------------------------------------------------------------------------------------------- @@ -188,14 +216,14 @@ Changed .. rubric:: `2.6.2 `__ - 2023-04-25 - :name: section-11 + :name: section-12 .. rubric:: Changed :name: changed-7 - Add ``issue`` family on 2.3.3.0 -.. _section-12: +.. _section-13: `2.6.1 `__ - 2023-04-12 --------------------------------------------------------------------------------------------------------- @@ -209,7 +237,7 @@ Changed - Correct families names in 2.3.5.3 - Removing duplicate params -.. _section-13: +.. _section-14: `2.6.0 `__ - 2023-04-12 --------------------------------------------------------------------------------------------------------- @@ -222,7 +250,7 @@ Added - Add support of DNA Center versions (‘2.3.5.3’) - Adds modules for v2_3_5_3 -.. _section-14: +.. _section-15: `2.5.6 `__ - 2023-01-10 --------------------------------------------------------------------------------------------------------- @@ -261,7 +289,7 @@ Fixed - dnacentersdk.api.v2_3_3_0.tag - dnacentersdk.api.v2_3_3_0.task -.. _section-15: +.. _section-16: `2.5.5 `__ - 2022-11-17 --------------------------------------------------------------------------------------------------------- @@ -278,7 +306,7 @@ Fixed - Added Dict_of_str function call in custom_caller headers -.. _section-16: +.. _section-17: `2.5.4 `__ - 2022-08-11 --------------------------------------------------------------------------------------------------------- @@ -292,7 +320,7 @@ Added - ``add_ssid_to_ip_pool_mapping`` -.. _section-17: +.. _section-18: `2.5.3 `__ - 2022-08-09 --------------------------------------------------------------------------------------------------------- @@ -308,7 +336,7 @@ Fixed ``connectedToInternet`` on ``sda.adds_border_device`` comes from ``boolean`` to ``string``. -.. _section-18: +.. _section-19: `2.5.2 `__ - 2022-07-29 --------------------------------------------------------------------------------------------------------- @@ -345,7 +373,7 @@ Fixed - network - servers -.. _section-19: +.. _section-20: `2.5.1 `__ - 2022-07-12 --------------------------------------------------------------------------------------------------------- @@ -359,7 +387,7 @@ Fixed - IpAddressSpace -.. _section-20: +.. _section-21: `2.5.0 `__ - 2022-06-20 ---------------------------------------------------------------------------------------------------------- @@ -372,7 +400,7 @@ Added - Add support of DNA Center versions (‘2.3.3.0’) - Adds modules for v2_3_3_0 -.. _section-21: +.. _section-22: `2.4.11 `__ - 2022-06-15 ------------------------------------------------------------------------------------------------------------ @@ -388,7 +416,7 @@ Fixed - verify - debug -.. _section-22: +.. _section-23: `2.4.10 `__ - 2022-05-12 ----------------------------------------------------------------------------------------------------------- @@ -404,7 +432,7 @@ Added - site_name_hierarchy -.. _section-23: +.. _section-24: `2.4.9 `__ - 2022-04-20 --------------------------------------------------------------------------------------------------------- @@ -424,7 +452,7 @@ Added - subnetMask - vlanId -.. _section-24: +.. _section-25: `2.4.8 `__ - 2022-03-23 --------------------------------------------------------------------------------------------------------- @@ -470,7 +498,7 @@ Changed - dnacentersdk.api.v2_2_3_3.file.File.download_a_file_by_fileid - dnacentersdk.api.v2_2_3_3.reports.Reports.download_report_content -.. _section-25: +.. _section-26: `2.4.7 `__ - 2022-03-22 --------------------------------------------------------------------------------------------------------- @@ -483,7 +511,7 @@ Added - Add ``rfProfile`` parameter for request body struct of ``claim_a_device_to_a_site``. -.. _section-26: +.. _section-27: `2.4.6 `__ - 2022-03-14 --------------------------------------------------------------------------------------------------------- @@ -514,7 +542,7 @@ Changed - sda.adds_border_device -.. _section-27: +.. _section-28: `2.4.5 `__ - 2022-02-01 --------------------------------------------------------------------------------------------------------- @@ -540,7 +568,7 @@ Changed - devices.sync_devices -.. _section-28: +.. _section-29: `2.4.4 `__ - 2022-01-31 --------------------------------------------------------------------------------------------------------- @@ -584,7 +612,7 @@ Added - Adds parameters ``hostname``, ``imageInfo`` and ``configInfo`` to device_onboarding_pnp.pnp_device_claim_to_site -.. _section-29: +.. _section-30: `2.4.3 `__ - 2022-01-19 --------------------------------------------------------------------------------------------------------- @@ -607,7 +635,7 @@ Changed DNACenterAPI - Adds tests for env variables before/after DNACenterAPI import -.. _section-30: +.. _section-31: `2.4.2 `__ - 2021-12-14 --------------------------------------------------------------------------------------------------------- @@ -622,7 +650,7 @@ Fixed - Update json schemas for models/validators and tests/models/models/validators -.. _section-31: +.. _section-32: `2.4.1 `__ - 2021-12-01 --------------------------------------------------------------------------------------------------------- @@ -634,7 +662,7 @@ Changed - Update to match checksum -.. _section-32: +.. _section-33: `2.4.0 `__ - 2021-12-01 --------------------------------------------------------------------------------------------------------- @@ -665,7 +693,7 @@ Changed - Update missing dnac 2.2.3.3 files -.. _section-33: +.. _section-34: `2.3.3 `__ - 2021-11-24 --------------------------------------------------------------------------------------------------------- @@ -697,7 +725,7 @@ Changed - Add ``isGuestVirtualNetwork`` parameter to ``update_virtual_network_with_scalable_groups`` function -.. _section-34: +.. _section-35: `2.3.2 `__ - 2021-09-14 --------------------------------------------------------------------------------------------------------- @@ -709,7 +737,7 @@ Changed - Disable verify=False warnings of urllib3 -.. _section-35: +.. _section-36: `2.3.1 `__ - 2021-08-10 --------------------------------------------------------------------------------------------------------- @@ -722,7 +750,7 @@ Fixed - Fix devices param definition & schemas [``aba32f3``] - Remove unnecesary path_params [``25c4e99``] -.. _section-36: +.. _section-37: `2.3.0 `__ - 2021-08-09 --------------------------------------------------------------------------------------------------------- @@ -747,7 +775,7 @@ Changed - Updates restsession.py to handle downloads using Content-Disposition header rather than custom fileName header -.. _section-37: +.. _section-38: `2.2.5 `__ - 2021-08-05 --------------------------------------------------------------------------------------------------------- @@ -766,7 +794,7 @@ Changed - Removes minus char from docstrings. - Adds check_type conditions for ‘X-Auth-Token’ for v2_2_1 operations. -.. _section-38: +.. _section-39: `2.2.4 `__ - 2021-06-08 --------------------------------------------------------------------------------------------------------- @@ -779,7 +807,7 @@ Fixed - Fixes download_a_file_by_fileid and import_local_software_image for v2_2_1 -.. _section-39: +.. _section-40: `2.2.3 `__ - 2021-06-08 --------------------------------------------------------------------------------------------------------- @@ -802,7 +830,7 @@ Changed - Patch adds one function that was missing from previous release - Patch adds models/validators for v2_2_1 with new ids -.. _section-40: +.. _section-41: `2.2.2 `__ - 2021-05-10 --------------------------------------------------------------------------------------------------------- @@ -821,7 +849,7 @@ Changed - Updates requirements files -.. _section-41: +.. _section-42: `2.0.2 `__ - 2020-11-01 --------------------------------------------------------------------------------------------------------- @@ -850,7 +878,7 @@ Removed - Removed requirements.lock -.. _section-42: +.. _section-43: `2.0.0 `__ - 2020-07-17 --------------------------------------------------------------------------------------------------------- @@ -890,7 +918,7 @@ Removed - Removed Webex Teams Space Community reference from README - Removed Token refresh when changing base_url -.. _section-43: +.. _section-44: `1.3.0 `__ - 2019-08-19 ---------------------------------------------------------------------------------------------------------- @@ -911,7 +939,7 @@ Fixed - Fix error in setter in ``api/__init__.py`` - Fix errors for readthedocs -.. _section-44: +.. _section-45: `1.2.10 `__ - 2019-07-18 --------------------------------------------------------------------------------------------------- diff --git a/docs/api/api_structure_table_v2_3_5_3.rst b/docs/api/api_structure_table_v2_3_5_3.rst index 0c6bc799..fe74bc5c 100644 --- a/docs/api/api_structure_table_v2_3_5_3.rst +++ b/docs/api/api_structure_table_v2_3_5_3.rst @@ -24,7 +24,7 @@ +----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | | :ref:`applications ` | :meth:`applications() ` | +----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ -| | :ref:`authentication_management ` | :meth:`authentication_ap_i() ` | +| | :ref:`authentication_management ` | :meth:`authentication_api() ` | | | | :meth:`import_certificate() ` | | | | :meth:`import_certificate_p12() ` | +----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ @@ -475,12 +475,12 @@ | | | :meth:`get_topology_details() ` | | | | :meth:`get_vlan_details() ` | +----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ -| | :ref:`user_and_roles ` | :meth:`add_user_ap_i() ` | -| | | :meth:`get_external_authentication_servers_ap_i() ` | -| | | :meth:`get_permissions_ap_i() ` | -| | | :meth:`get_roles_ap_i() ` | -| | | :meth:`get_users_ap_i() ` | -| | | :meth:`update_user_ap_i() ` | +| | :ref:`user_and_roles ` | :meth:`add_user_api() ` | +| | | :meth:`get_external_authentication_servers_api() ` | +| | | :meth:`get_permissions_api() ` | +| | | :meth:`get_roles_api() ` | +| | | :meth:`get_users_api() ` | +| | | :meth:`update_user_api() ` | +----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | | :ref:`users ` | :meth:`get_user_enrichment_details() ` | +----------------------+--------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ diff --git a/docs/api/api_structure_table_v2_3_7_6.rst b/docs/api/api_structure_table_v2_3_7_6.rst index 5372c576..ccd430e5 100644 --- a/docs/api/api_structure_table_v2_3_7_6.rst +++ b/docs/api/api_structure_table_v2_3_7_6.rst @@ -562,21 +562,21 @@ | | | :meth:`get_topology_details() ` | | | | :meth:`get_vlan_details() ` | +----------------------+--------------------------------------------------------------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ -| | :ref:`userand_roles ` | :meth:`add_and_update_a_a_a_attribute_ap_i() ` | -| | | :meth:`add_role_ap_i() ` | -| | | :meth:`add_user_ap_i() ` | -| | | :meth:`delete_a_a_a_attribute_ap_i() ` | -| | | :meth:`delete_role_ap_i() ` | -| | | :meth:`delete_user_ap_i() ` | -| | | :meth:`get_a_a_a_attribute_ap_i() ` | -| | | :meth:`get_external_authentication_servers_ap_i() ` | -| | | :meth:`get_external_authentication_setting_ap_i() ` | -| | | :meth:`get_permissions_ap_i() ` | -| | | :meth:`get_roles_ap_i() ` | -| | | :meth:`get_users_ap_i() ` | -| | | :meth:`manage_external_authentication_setting_ap_i() ` | -| | | :meth:`update_role_ap_i() ` | -| | | :meth:`update_user_ap_i() ` | +| | :ref:`userand_roles ` | :meth:`add_and_update_aaa_attribute_api() ` | +| | | :meth:`add_role_api() ` | +| | | :meth:`add_user_api() ` | +| | | :meth:`delete_aaa_attribute_api() ` | +| | | :meth:`delete_role_api() ` | +| | | :meth:`delete_user_api() ` | +| | | :meth:`get_aaa_attribute_api() ` | +| | | :meth:`get_external_authentication_servers_api() ` | +| | | :meth:`get_external_authentication_setting_api() ` | +| | | :meth:`get_permissions_api() ` | +| | | :meth:`get_roles_api() ` | +| | | :meth:`get_users_api() ` | +| | | :meth:`manage_external_authentication_setting_api() ` | +| | | :meth:`update_role_api() ` | +| | | :meth:`update_user_api() ` | +----------------------+--------------------------------------------------------------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | | :ref:`users ` | :meth:`get_user_enrichment_details() ` | +----------------------+--------------------------------------------------------------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ diff --git a/pyproject.toml b/pyproject.toml index 0a59b498..770b94be 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -1,6 +1,6 @@ [tool.poetry] name = "dnacentersdk" -version = "2.7.1" +version = "2.7.2" description = "Cisco DNA Center Platform SDK" authors = ["Jose Bogarin Solano ", "William Astorga ", "Francisco Muñoz ", "Francisco Muñoz ", "Bryan Vargas "] license = "MIT" diff --git a/tests/api/v2_3_5_3/test_authentication_management.py b/tests/api/v2_3_5_3/test_authentication_management.py index 4bdfebf6..7b23ed62 100644 --- a/tests/api/v2_3_5_3/test_authentication_management.py +++ b/tests/api/v2_3_5_3/test_authentication_management.py @@ -139,13 +139,13 @@ def test_import_certificate_p12_default_val(api, validator): raise original_e -def is_valid_authentication_ap_i(json_schema_validate, obj): +def is_valid_authentication_api(json_schema_validate, obj): json_schema_validate('jsd_a6bfcd88e22c5c138657b340870b4ebb_v2_3_5_3').validate(obj) return True -def authentication_ap_i(api): - endpoint_result = api.authentication_management.authentication_ap_i( +def authentication_api(api): + endpoint_result = api.authentication_management.authentication_api( active_validation=True, payload=None ) @@ -153,11 +153,11 @@ def authentication_ap_i(api): @pytest.mark.authentication_management -def test_authentication_ap_i(api, validator): +def test_authentication_api(api, validator): try: - assert is_valid_authentication_ap_i( + assert is_valid_authentication_api( validator, - authentication_ap_i(api) + authentication_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -165,8 +165,8 @@ def test_authentication_ap_i(api, validator): raise original_e -def authentication_ap_i_default_val(api): - endpoint_result = api.authentication_management.authentication_ap_i( +def authentication_api_default_val(api): + endpoint_result = api.authentication_management.authentication_api( active_validation=True, payload=None ) @@ -174,11 +174,11 @@ def authentication_ap_i_default_val(api): @pytest.mark.authentication_management -def test_authentication_ap_i_default_val(api, validator): +def test_authentication_api_default_val(api, validator): try: - assert is_valid_authentication_ap_i( + assert is_valid_authentication_api( validator, - authentication_ap_i_default_val(api) + authentication_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): diff --git a/tests/api/v2_3_5_3/test_user_and_roles.py b/tests/api/v2_3_5_3/test_user_and_roles.py index 4c2eaffd..43fb2f68 100644 --- a/tests/api/v2_3_5_3/test_user_and_roles.py +++ b/tests/api/v2_3_5_3/test_user_and_roles.py @@ -29,24 +29,24 @@ pytestmark = pytest.mark.skipif(DNA_CENTER_VERSION != '2.3.5.3', reason='version does not match') -def is_valid_get_permissions_ap_i(json_schema_validate, obj): +def is_valid_get_permissions_api(json_schema_validate, obj): json_schema_validate('jsd_9ec0b30eca9d540a845848cffd7c602a_v2_3_5_3').validate(obj) return True -def get_permissions_ap_i(api): - endpoint_result = api.userand_roles.get_permissions_ap_i( +def get_permissions_api(api): + endpoint_result = api.userand_roles.get_permissions_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_permissions_ap_i(api, validator): +def test_get_permissions_api(api, validator): try: - assert is_valid_get_permissions_ap_i( + assert is_valid_get_permissions_api( validator, - get_permissions_ap_i(api) + get_permissions_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -54,43 +54,43 @@ def test_get_permissions_ap_i(api, validator): raise original_e -def get_permissions_ap_i_default_val(api): - endpoint_result = api.userand_roles.get_permissions_ap_i( +def get_permissions_api_default_val(api): + endpoint_result = api.userand_roles.get_permissions_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_permissions_ap_i_default_val(api, validator): +def test_get_permissions_api_default_val(api, validator): try: - assert is_valid_get_permissions_ap_i( + assert is_valid_get_permissions_api( validator, - get_permissions_ap_i_default_val(api) + get_permissions_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_get_roles_ap_i(json_schema_validate, obj): +def is_valid_get_roles_api(json_schema_validate, obj): json_schema_validate('jsd_bef02e8f6f8354dc99e375826a87c88c_v2_3_5_3').validate(obj) return True -def get_roles_ap_i(api): - endpoint_result = api.userand_roles.get_roles_ap_i( +def get_roles_api(api): + endpoint_result = api.userand_roles.get_roles_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_roles_ap_i(api, validator): +def test_get_roles_api(api, validator): try: - assert is_valid_get_roles_ap_i( + assert is_valid_get_roles_api( validator, - get_roles_ap_i(api) + get_roles_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -98,43 +98,43 @@ def test_get_roles_ap_i(api, validator): raise original_e -def get_roles_ap_i_default_val(api): - endpoint_result = api.userand_roles.get_roles_ap_i( +def get_roles_api_default_val(api): + endpoint_result = api.userand_roles.get_roles_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_roles_ap_i_default_val(api, validator): +def test_get_roles_api_default_val(api, validator): try: - assert is_valid_get_roles_ap_i( + assert is_valid_get_roles_api( validator, - get_roles_ap_i_default_val(api) + get_roles_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_get_users_ap_i(json_schema_validate, obj): +def is_valid_get_users_api(json_schema_validate, obj): json_schema_validate('jsd_7fa405b6d1be56739f2dfeea63212015_v2_3_5_3').validate(obj) return True -def get_users_ap_i(api): - endpoint_result = api.userand_roles.get_users_ap_i( +def get_users_api(api): + endpoint_result = api.userand_roles.get_users_api( invoke_source='string' ) return endpoint_result @pytest.mark.userand_roles -def test_get_users_ap_i(api, validator): +def test_get_users_api(api, validator): try: - assert is_valid_get_users_ap_i( + assert is_valid_get_users_api( validator, - get_users_ap_i(api) + get_users_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -142,32 +142,32 @@ def test_get_users_ap_i(api, validator): raise original_e -def get_users_ap_i_default_val(api): - endpoint_result = api.userand_roles.get_users_ap_i( +def get_users_api_default_val(api): + endpoint_result = api.userand_roles.get_users_api( invoke_source=None ) return endpoint_result @pytest.mark.userand_roles -def test_get_users_ap_i_default_val(api, validator): +def test_get_users_api_default_val(api, validator): try: - assert is_valid_get_users_ap_i( + assert is_valid_get_users_api( validator, - get_users_ap_i_default_val(api) + get_users_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_add_user_ap_i(json_schema_validate, obj): +def is_valid_add_user_api(json_schema_validate, obj): json_schema_validate('jsd_6d82755e5e03510daf0951c1f42c2702_v2_3_5_3').validate(obj) return True -def add_user_ap_i(api): - endpoint_result = api.userand_roles.add_user_ap_i( +def add_user_api(api): + endpoint_result = api.userand_roles.add_user_api( active_validation=True, email='string', firstName='string', @@ -181,11 +181,11 @@ def add_user_ap_i(api): @pytest.mark.userand_roles -def test_add_user_ap_i(api, validator): +def test_add_user_api(api, validator): try: - assert is_valid_add_user_ap_i( + assert is_valid_add_user_api( validator, - add_user_ap_i(api) + add_user_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -193,8 +193,8 @@ def test_add_user_ap_i(api, validator): raise original_e -def add_user_ap_i_default_val(api): - endpoint_result = api.userand_roles.add_user_ap_i( +def add_user_api_default_val(api): + endpoint_result = api.userand_roles.add_user_api( active_validation=True, email=None, firstName=None, @@ -208,24 +208,24 @@ def add_user_ap_i_default_val(api): @pytest.mark.userand_roles -def test_add_user_ap_i_default_val(api, validator): +def test_add_user_api_default_val(api, validator): try: - assert is_valid_add_user_ap_i( + assert is_valid_add_user_api( validator, - add_user_ap_i_default_val(api) + add_user_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_update_user_ap_i(json_schema_validate, obj): +def is_valid_update_user_api(json_schema_validate, obj): json_schema_validate('jsd_34d2bd5f05bd535a89ebadb30e2ede9e_v2_3_5_3').validate(obj) return True -def update_user_ap_i(api): - endpoint_result = api.userand_roles.update_user_ap_i( +def update_user_api(api): + endpoint_result = api.userand_roles.update_user_api( active_validation=True, email='string', firstName='string', @@ -239,11 +239,11 @@ def update_user_ap_i(api): @pytest.mark.userand_roles -def test_update_user_ap_i(api, validator): +def test_update_user_api(api, validator): try: - assert is_valid_update_user_ap_i( + assert is_valid_update_user_api( validator, - update_user_ap_i(api) + update_user_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -251,8 +251,8 @@ def test_update_user_ap_i(api, validator): raise original_e -def update_user_ap_i_default_val(api): - endpoint_result = api.userand_roles.update_user_ap_i( +def update_user_api_default_val(api): + endpoint_result = api.userand_roles.update_user_api( active_validation=True, email=None, firstName=None, @@ -266,35 +266,35 @@ def update_user_ap_i_default_val(api): @pytest.mark.userand_roles -def test_update_user_ap_i_default_val(api, validator): +def test_update_user_api_default_val(api, validator): try: - assert is_valid_update_user_ap_i( + assert is_valid_update_user_api( validator, - update_user_ap_i_default_val(api) + update_user_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_get_external_authentication_servers_ap_i(json_schema_validate, obj): +def is_valid_get_external_authentication_servers_api(json_schema_validate, obj): json_schema_validate('jsd_452738def9045d4d9c96bcd42172a79c_v2_3_5_3').validate(obj) return True -def get_external_authentication_servers_ap_i(api): - endpoint_result = api.userand_roles.get_external_authentication_servers_ap_i( +def get_external_authentication_servers_api(api): + endpoint_result = api.userand_roles.get_external_authentication_servers_api( invoke_source='string' ) return endpoint_result @pytest.mark.userand_roles -def test_get_external_authentication_servers_ap_i(api, validator): +def test_get_external_authentication_servers_api(api, validator): try: - assert is_valid_get_external_authentication_servers_ap_i( + assert is_valid_get_external_authentication_servers_api( validator, - get_external_authentication_servers_ap_i(api) + get_external_authentication_servers_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -302,19 +302,19 @@ def test_get_external_authentication_servers_ap_i(api, validator): raise original_e -def get_external_authentication_servers_ap_i_default_val(api): - endpoint_result = api.userand_roles.get_external_authentication_servers_ap_i( +def get_external_authentication_servers_api_default_val(api): + endpoint_result = api.userand_roles.get_external_authentication_servers_api( invoke_source=None ) return endpoint_result @pytest.mark.userand_roles -def test_get_external_authentication_servers_ap_i_default_val(api, validator): +def test_get_external_authentication_servers_api_default_val(api, validator): try: - assert is_valid_get_external_authentication_servers_ap_i( + assert is_valid_get_external_authentication_servers_api( validator, - get_external_authentication_servers_ap_i_default_val(api) + get_external_authentication_servers_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): diff --git a/tests/api/v2_3_7_6/test_user_and_roles.py b/tests/api/v2_3_7_6/test_user_and_roles.py index b6697357..4a9d59a6 100644 --- a/tests/api/v2_3_7_6/test_user_and_roles.py +++ b/tests/api/v2_3_7_6/test_user_and_roles.py @@ -29,13 +29,13 @@ pytestmark = pytest.mark.skipif(DNA_CENTER_VERSION != '2.3.7.6', reason='version does not match') -def is_valid_add_role_ap_i(json_schema_validate, obj): +def is_valid_add_role_api(json_schema_validate, obj): json_schema_validate('jsd_38a88c7510a15578b8eb2df183a92d5d_v2_3_7_6').validate(obj) return True -def add_role_ap_i(api): - endpoint_result = api.userand_roles.add_role_ap_i( +def add_role_api(api): + endpoint_result = api.userand_roles.add_role_api( active_validation=True, description='string', payload=None, @@ -46,11 +46,11 @@ def add_role_ap_i(api): @pytest.mark.userand_roles -def test_add_role_ap_i(api, validator): +def test_add_role_api(api, validator): try: - assert is_valid_add_role_ap_i( + assert is_valid_add_role_api( validator, - add_role_ap_i(api) + add_role_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -58,8 +58,8 @@ def test_add_role_ap_i(api, validator): raise original_e -def add_role_ap_i_default_val(api): - endpoint_result = api.userand_roles.add_role_ap_i( +def add_role_api_default_val(api): + endpoint_result = api.userand_roles.add_role_api( active_validation=True, description=None, payload=None, @@ -70,24 +70,24 @@ def add_role_ap_i_default_val(api): @pytest.mark.userand_roles -def test_add_role_ap_i_default_val(api, validator): +def test_add_role_api_default_val(api, validator): try: - assert is_valid_add_role_ap_i( + assert is_valid_add_role_api( validator, - add_role_ap_i_default_val(api) + add_role_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_update_role_ap_i(json_schema_validate, obj): +def is_valid_update_role_api(json_schema_validate, obj): json_schema_validate('jsd_ff5bf5a67c6c5c0aa9e7ba84c088e1a6_v2_3_7_6').validate(obj) return True -def update_role_ap_i(api): - endpoint_result = api.userand_roles.update_role_ap_i( +def update_role_api(api): + endpoint_result = api.userand_roles.update_role_api( active_validation=True, description='string', payload=None, @@ -98,11 +98,11 @@ def update_role_ap_i(api): @pytest.mark.userand_roles -def test_update_role_ap_i(api, validator): +def test_update_role_api(api, validator): try: - assert is_valid_update_role_ap_i( + assert is_valid_update_role_api( validator, - update_role_ap_i(api) + update_role_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -110,8 +110,8 @@ def test_update_role_ap_i(api, validator): raise original_e -def update_role_ap_i_default_val(api): - endpoint_result = api.userand_roles.update_role_ap_i( +def update_role_api_default_val(api): + endpoint_result = api.userand_roles.update_role_api( active_validation=True, description=None, payload=None, @@ -122,35 +122,35 @@ def update_role_ap_i_default_val(api): @pytest.mark.userand_roles -def test_update_role_ap_i_default_val(api, validator): +def test_update_role_api_default_val(api, validator): try: - assert is_valid_update_role_ap_i( + assert is_valid_update_role_api( validator, - update_role_ap_i_default_val(api) + update_role_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_get_permissions_ap_i(json_schema_validate, obj): +def is_valid_get_permissions_api(json_schema_validate, obj): json_schema_validate('jsd_9ec0b30eca9d540a845848cffd7c602a_v2_3_7_6').validate(obj) return True -def get_permissions_ap_i(api): - endpoint_result = api.userand_roles.get_permissions_ap_i( +def get_permissions_api(api): + endpoint_result = api.userand_roles.get_permissions_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_permissions_ap_i(api, validator): +def test_get_permissions_api(api, validator): try: - assert is_valid_get_permissions_ap_i( + assert is_valid_get_permissions_api( validator, - get_permissions_ap_i(api) + get_permissions_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -158,43 +158,43 @@ def test_get_permissions_ap_i(api, validator): raise original_e -def get_permissions_ap_i_default_val(api): - endpoint_result = api.userand_roles.get_permissions_ap_i( +def get_permissions_api_default_val(api): + endpoint_result = api.userand_roles.get_permissions_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_permissions_ap_i_default_val(api, validator): +def test_get_permissions_api_default_val(api, validator): try: - assert is_valid_get_permissions_ap_i( + assert is_valid_get_permissions_api( validator, - get_permissions_ap_i_default_val(api) + get_permissions_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_delete_role_ap_i(json_schema_validate, obj): +def is_valid_delete_role_api(json_schema_validate, obj): json_schema_validate('jsd_da9e850c44d353f78ab002a640e5604f_v2_3_7_6').validate(obj) return True -def delete_role_ap_i(api): - endpoint_result = api.userand_roles.delete_role_ap_i( +def delete_role_api(api): + endpoint_result = api.userand_roles.delete_role_api( role_id='string' ) return endpoint_result @pytest.mark.userand_roles -def test_delete_role_ap_i(api, validator): +def test_delete_role_api(api, validator): try: - assert is_valid_delete_role_ap_i( + assert is_valid_delete_role_api( validator, - delete_role_ap_i(api) + delete_role_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -202,43 +202,43 @@ def test_delete_role_ap_i(api, validator): raise original_e -def delete_role_ap_i_default_val(api): - endpoint_result = api.userand_roles.delete_role_ap_i( +def delete_role_api_default_val(api): + endpoint_result = api.userand_roles.delete_role_api( role_id='string' ) return endpoint_result @pytest.mark.userand_roles -def test_delete_role_ap_i_default_val(api, validator): +def test_delete_role_api_default_val(api, validator): try: - assert is_valid_delete_role_ap_i( + assert is_valid_delete_role_api( validator, - delete_role_ap_i_default_val(api) + delete_role_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_get_roles_ap_i(json_schema_validate, obj): +def is_valid_get_roles_api(json_schema_validate, obj): json_schema_validate('jsd_bef02e8f6f8354dc99e375826a87c88c_v2_3_7_6').validate(obj) return True -def get_roles_ap_i(api): - endpoint_result = api.userand_roles.get_roles_ap_i( +def get_roles_api(api): + endpoint_result = api.userand_roles.get_roles_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_roles_ap_i(api, validator): +def test_get_roles_api(api, validator): try: - assert is_valid_get_roles_ap_i( + assert is_valid_get_roles_api( validator, - get_roles_ap_i(api) + get_roles_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -246,32 +246,32 @@ def test_get_roles_ap_i(api, validator): raise original_e -def get_roles_ap_i_default_val(api): - endpoint_result = api.userand_roles.get_roles_ap_i( +def get_roles_api_default_val(api): + endpoint_result = api.userand_roles.get_roles_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_roles_ap_i_default_val(api, validator): +def test_get_roles_api_default_val(api, validator): try: - assert is_valid_get_roles_ap_i( + assert is_valid_get_roles_api( validator, - get_roles_ap_i_default_val(api) + get_roles_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_get_users_ap_i(json_schema_validate, obj): +def is_valid_get_users_api(json_schema_validate, obj): json_schema_validate('jsd_7fa405b6d1be56739f2dfeea63212015_v2_3_7_6').validate(obj) return True -def get_users_ap_i(api): - endpoint_result = api.userand_roles.get_users_ap_i( +def get_users_api(api): + endpoint_result = api.userand_roles.get_users_api( auth_source='string', invoke_source='string' ) @@ -279,11 +279,11 @@ def get_users_ap_i(api): @pytest.mark.userand_roles -def test_get_users_ap_i(api, validator): +def test_get_users_api(api, validator): try: - assert is_valid_get_users_ap_i( + assert is_valid_get_users_api( validator, - get_users_ap_i(api) + get_users_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -291,8 +291,8 @@ def test_get_users_ap_i(api, validator): raise original_e -def get_users_ap_i_default_val(api): - endpoint_result = api.userand_roles.get_users_ap_i( +def get_users_api_default_val(api): + endpoint_result = api.userand_roles.get_users_api( auth_source=None, invoke_source=None ) @@ -300,24 +300,24 @@ def get_users_ap_i_default_val(api): @pytest.mark.userand_roles -def test_get_users_ap_i_default_val(api, validator): +def test_get_users_api_default_val(api, validator): try: - assert is_valid_get_users_ap_i( + assert is_valid_get_users_api( validator, - get_users_ap_i_default_val(api) + get_users_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_add_user_ap_i(json_schema_validate, obj): +def is_valid_add_user_api(json_schema_validate, obj): json_schema_validate('jsd_6d82755e5e03510daf0951c1f42c2702_v2_3_7_6').validate(obj) return True -def add_user_ap_i(api): - endpoint_result = api.userand_roles.add_user_ap_i( +def add_user_api(api): + endpoint_result = api.userand_roles.add_user_api( active_validation=True, email='string', firstName='string', @@ -331,11 +331,11 @@ def add_user_ap_i(api): @pytest.mark.userand_roles -def test_add_user_ap_i(api, validator): +def test_add_user_api(api, validator): try: - assert is_valid_add_user_ap_i( + assert is_valid_add_user_api( validator, - add_user_ap_i(api) + add_user_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -343,8 +343,8 @@ def test_add_user_ap_i(api, validator): raise original_e -def add_user_ap_i_default_val(api): - endpoint_result = api.userand_roles.add_user_ap_i( +def add_user_api_default_val(api): + endpoint_result = api.userand_roles.add_user_api( active_validation=True, email=None, firstName=None, @@ -358,24 +358,24 @@ def add_user_ap_i_default_val(api): @pytest.mark.userand_roles -def test_add_user_ap_i_default_val(api, validator): +def test_add_user_api_default_val(api, validator): try: - assert is_valid_add_user_ap_i( + assert is_valid_add_user_api( validator, - add_user_ap_i_default_val(api) + add_user_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_update_user_ap_i(json_schema_validate, obj): +def is_valid_update_user_api(json_schema_validate, obj): json_schema_validate('jsd_34d2bd5f05bd535a89ebadb30e2ede9e_v2_3_7_6').validate(obj) return True -def update_user_ap_i(api): - endpoint_result = api.userand_roles.update_user_ap_i( +def update_user_api(api): + endpoint_result = api.userand_roles.update_user_api( active_validation=True, email='string', firstName='string', @@ -389,11 +389,11 @@ def update_user_ap_i(api): @pytest.mark.userand_roles -def test_update_user_ap_i(api, validator): +def test_update_user_api(api, validator): try: - assert is_valid_update_user_ap_i( + assert is_valid_update_user_api( validator, - update_user_ap_i(api) + update_user_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -401,8 +401,8 @@ def test_update_user_ap_i(api, validator): raise original_e -def update_user_ap_i_default_val(api): - endpoint_result = api.userand_roles.update_user_ap_i( +def update_user_api_default_val(api): + endpoint_result = api.userand_roles.update_user_api( active_validation=True, email=None, firstName=None, @@ -416,35 +416,35 @@ def update_user_ap_i_default_val(api): @pytest.mark.userand_roles -def test_update_user_ap_i_default_val(api, validator): +def test_update_user_api_default_val(api, validator): try: - assert is_valid_update_user_ap_i( + assert is_valid_update_user_api( validator, - update_user_ap_i_default_val(api) + update_user_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_delete_user_ap_i(json_schema_validate, obj): +def is_valid_delete_user_api(json_schema_validate, obj): json_schema_validate('jsd_3556c65c6cc65f068766cbb8a42ad387_v2_3_7_6').validate(obj) return True -def delete_user_ap_i(api): - endpoint_result = api.userand_roles.delete_user_ap_i( +def delete_user_api(api): + endpoint_result = api.userand_roles.delete_user_api( user_id='string' ) return endpoint_result @pytest.mark.userand_roles -def test_delete_user_ap_i(api, validator): +def test_delete_user_api(api, validator): try: - assert is_valid_delete_user_ap_i( + assert is_valid_delete_user_api( validator, - delete_user_ap_i(api) + delete_user_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -452,43 +452,43 @@ def test_delete_user_ap_i(api, validator): raise original_e -def delete_user_ap_i_default_val(api): - endpoint_result = api.userand_roles.delete_user_ap_i( +def delete_user_api_default_val(api): + endpoint_result = api.userand_roles.delete_user_api( user_id='string' ) return endpoint_result @pytest.mark.userand_roles -def test_delete_user_ap_i_default_val(api, validator): +def test_delete_user_api_default_val(api, validator): try: - assert is_valid_delete_user_ap_i( + assert is_valid_delete_user_api( validator, - delete_user_ap_i_default_val(api) + delete_user_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_get_external_authentication_setting_ap_i(json_schema_validate, obj): +def is_valid_get_external_authentication_setting_api(json_schema_validate, obj): json_schema_validate('jsd_5490ac03ba045f60925fd7843bf9e279_v2_3_7_6').validate(obj) return True -def get_external_authentication_setting_ap_i(api): - endpoint_result = api.userand_roles.get_external_authentication_setting_ap_i( +def get_external_authentication_setting_api(api): + endpoint_result = api.userand_roles.get_external_authentication_setting_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_external_authentication_setting_ap_i(api, validator): +def test_get_external_authentication_setting_api(api, validator): try: - assert is_valid_get_external_authentication_setting_ap_i( + assert is_valid_get_external_authentication_setting_api( validator, - get_external_authentication_setting_ap_i(api) + get_external_authentication_setting_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -496,32 +496,32 @@ def test_get_external_authentication_setting_ap_i(api, validator): raise original_e -def get_external_authentication_setting_ap_i_default_val(api): - endpoint_result = api.userand_roles.get_external_authentication_setting_ap_i( +def get_external_authentication_setting_api_default_val(api): + endpoint_result = api.userand_roles.get_external_authentication_setting_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_external_authentication_setting_ap_i_default_val(api, validator): +def test_get_external_authentication_setting_api_default_val(api, validator): try: - assert is_valid_get_external_authentication_setting_ap_i( + assert is_valid_get_external_authentication_setting_api( validator, - get_external_authentication_setting_ap_i_default_val(api) + get_external_authentication_setting_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_manage_external_authentication_setting_ap_i(json_schema_validate, obj): +def is_valid_manage_external_authentication_setting_api(json_schema_validate, obj): json_schema_validate('jsd_6e4f57e8f06856ee9a7e490d01f7f692_v2_3_7_6').validate(obj) return True -def manage_external_authentication_setting_ap_i(api): - endpoint_result = api.userand_roles.manage_external_authentication_setting_ap_i( +def manage_external_authentication_setting_api(api): + endpoint_result = api.userand_roles.manage_external_authentication_setting_api( active_validation=True, enable=True, payload=None @@ -530,11 +530,11 @@ def manage_external_authentication_setting_ap_i(api): @pytest.mark.userand_roles -def test_manage_external_authentication_setting_ap_i(api, validator): +def test_manage_external_authentication_setting_api(api, validator): try: - assert is_valid_manage_external_authentication_setting_ap_i( + assert is_valid_manage_external_authentication_setting_api( validator, - manage_external_authentication_setting_ap_i(api) + manage_external_authentication_setting_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -542,8 +542,8 @@ def test_manage_external_authentication_setting_ap_i(api, validator): raise original_e -def manage_external_authentication_setting_ap_i_default_val(api): - endpoint_result = api.userand_roles.manage_external_authentication_setting_ap_i( +def manage_external_authentication_setting_api_default_val(api): + endpoint_result = api.userand_roles.manage_external_authentication_setting_api( active_validation=True, enable=None, payload=None @@ -552,35 +552,35 @@ def manage_external_authentication_setting_ap_i_default_val(api): @pytest.mark.userand_roles -def test_manage_external_authentication_setting_ap_i_default_val(api, validator): +def test_manage_external_authentication_setting_api_default_val(api, validator): try: - assert is_valid_manage_external_authentication_setting_ap_i( + assert is_valid_manage_external_authentication_setting_api( validator, - manage_external_authentication_setting_ap_i_default_val(api) + manage_external_authentication_setting_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_get_external_authentication_servers_ap_i(json_schema_validate, obj): +def is_valid_get_external_authentication_servers_api(json_schema_validate, obj): json_schema_validate('jsd_452738def9045d4d9c96bcd42172a79c_v2_3_7_6').validate(obj) return True -def get_external_authentication_servers_ap_i(api): - endpoint_result = api.userand_roles.get_external_authentication_servers_ap_i( +def get_external_authentication_servers_api(api): + endpoint_result = api.userand_roles.get_external_authentication_servers_api( invoke_source='string' ) return endpoint_result @pytest.mark.userand_roles -def test_get_external_authentication_servers_ap_i(api, validator): +def test_get_external_authentication_servers_api(api, validator): try: - assert is_valid_get_external_authentication_servers_ap_i( + assert is_valid_get_external_authentication_servers_api( validator, - get_external_authentication_servers_ap_i(api) + get_external_authentication_servers_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -588,32 +588,32 @@ def test_get_external_authentication_servers_ap_i(api, validator): raise original_e -def get_external_authentication_servers_ap_i_default_val(api): - endpoint_result = api.userand_roles.get_external_authentication_servers_ap_i( +def get_external_authentication_servers_api_default_val(api): + endpoint_result = api.userand_roles.get_external_authentication_servers_api( invoke_source=None ) return endpoint_result @pytest.mark.userand_roles -def test_get_external_authentication_servers_ap_i_default_val(api, validator): +def test_get_external_authentication_servers_api_default_val(api, validator): try: - assert is_valid_get_external_authentication_servers_ap_i( + assert is_valid_get_external_authentication_servers_api( validator, - get_external_authentication_servers_ap_i_default_val(api) + get_external_authentication_servers_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_add_and_update_a_a_a_attribute_ap_i(json_schema_validate, obj): +def is_valid_add_and_update_aaa_attribute_api(json_schema_validate, obj): json_schema_validate('jsd_9f5bfccc7e30550baa7046f74daa1ef2_v2_3_7_6').validate(obj) return True -def add_and_update_a_a_a_attribute_ap_i(api): - endpoint_result = api.userand_roles.add_and_update_a_a_a_attribute_ap_i( +def add_and_update_aaa_attribute_api(api): + endpoint_result = api.userand_roles.add_and_update_aaa_attribute_api( active_validation=True, attributeName='string', payload=None @@ -622,11 +622,11 @@ def add_and_update_a_a_a_attribute_ap_i(api): @pytest.mark.userand_roles -def test_add_and_update_a_a_a_attribute_ap_i(api, validator): +def test_add_and_update_aaa_attribute_api(api, validator): try: - assert is_valid_add_and_update_a_a_a_attribute_ap_i( + assert is_valid_add_and_update_aaa_attribute_api( validator, - add_and_update_a_a_a_attribute_ap_i(api) + add_and_update_aaa_attribute_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -634,8 +634,8 @@ def test_add_and_update_a_a_a_attribute_ap_i(api, validator): raise original_e -def add_and_update_a_a_a_attribute_ap_i_default_val(api): - endpoint_result = api.userand_roles.add_and_update_a_a_a_attribute_ap_i( +def add_and_update_aaa_attribute_api_default_val(api): + endpoint_result = api.userand_roles.add_and_update_aaa_attribute_api( active_validation=True, attributeName=None, payload=None @@ -644,35 +644,35 @@ def add_and_update_a_a_a_attribute_ap_i_default_val(api): @pytest.mark.userand_roles -def test_add_and_update_a_a_a_attribute_ap_i_default_val(api, validator): +def test_add_and_update_aaa_attribute_api_default_val(api, validator): try: - assert is_valid_add_and_update_a_a_a_attribute_ap_i( + assert is_valid_add_and_update_aaa_attribute_api( validator, - add_and_update_a_a_a_attribute_ap_i_default_val(api) + add_and_update_aaa_attribute_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_delete_a_a_a_attribute_ap_i(json_schema_validate, obj): +def is_valid_delete_aaa_attribute_api(json_schema_validate, obj): json_schema_validate('jsd_f20c99b436bd5be8bdb9094db3a47f01_v2_3_7_6').validate(obj) return True -def delete_a_a_a_attribute_ap_i(api): - endpoint_result = api.userand_roles.delete_a_a_a_attribute_ap_i( +def delete_aaa_attribute_api(api): + endpoint_result = api.userand_roles.delete_aaa_attribute_api( ) return endpoint_result @pytest.mark.userand_roles -def test_delete_a_a_a_attribute_ap_i(api, validator): +def test_delete_aaa_attribute_api(api, validator): try: - assert is_valid_delete_a_a_a_attribute_ap_i( + assert is_valid_delete_aaa_attribute_api( validator, - delete_a_a_a_attribute_ap_i(api) + delete_aaa_attribute_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -680,43 +680,43 @@ def test_delete_a_a_a_attribute_ap_i(api, validator): raise original_e -def delete_a_a_a_attribute_ap_i_default_val(api): - endpoint_result = api.userand_roles.delete_a_a_a_attribute_ap_i( +def delete_aaa_attribute_api_default_val(api): + endpoint_result = api.userand_roles.delete_aaa_attribute_api( ) return endpoint_result @pytest.mark.userand_roles -def test_delete_a_a_a_attribute_ap_i_default_val(api, validator): +def test_delete_aaa_attribute_api_default_val(api, validator): try: - assert is_valid_delete_a_a_a_attribute_ap_i( + assert is_valid_delete_aaa_attribute_api( validator, - delete_a_a_a_attribute_ap_i_default_val(api) + delete_aaa_attribute_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): raise original_e -def is_valid_get_a_a_a_attribute_ap_i(json_schema_validate, obj): +def is_valid_get_aaa_attribute_api(json_schema_validate, obj): json_schema_validate('jsd_4bedf83096a45ad1beaaa1fc6c192103_v2_3_7_6').validate(obj) return True -def get_a_a_a_attribute_ap_i(api): - endpoint_result = api.userand_roles.get_a_a_a_attribute_ap_i( +def get_aaa_attribute_api(api): + endpoint_result = api.userand_roles.get_aaa_attribute_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_a_a_a_attribute_ap_i(api, validator): +def test_get_aaa_attribute_api(api, validator): try: - assert is_valid_get_a_a_a_attribute_ap_i( + assert is_valid_get_aaa_attribute_api( validator, - get_a_a_a_attribute_ap_i(api) + get_aaa_attribute_api(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest)): @@ -724,19 +724,19 @@ def test_get_a_a_a_attribute_ap_i(api, validator): raise original_e -def get_a_a_a_attribute_ap_i_default_val(api): - endpoint_result = api.userand_roles.get_a_a_a_attribute_ap_i( +def get_aaa_attribute_api_default_val(api): + endpoint_result = api.userand_roles.get_aaa_attribute_api( ) return endpoint_result @pytest.mark.userand_roles -def test_get_a_a_a_attribute_ap_i_default_val(api, validator): +def test_get_aaa_attribute_api_default_val(api, validator): try: - assert is_valid_get_a_a_a_attribute_ap_i( + assert is_valid_get_aaa_attribute_api( validator, - get_a_a_a_attribute_ap_i_default_val(api) + get_aaa_attribute_api_default_val(api) ) except Exception as original_e: with pytest.raises((JsonSchemaException, MalformedRequest, TypeError)): diff --git a/tests/mock/server/v2_3_5_3.py b/tests/mock/server/v2_3_5_3.py index cbe74762..ae456064 100644 --- a/tests/mock/server/v2_3_5_3.py +++ b/tests/mock/server/v2_3_5_3.py @@ -923,7 +923,7 @@ def matches_AUTHENTICATION_MANAGEMENT_a6bfcd88e22c5c138657b340870b4ebb(self): self.path ) - def authentication_management_authentication_ap_i_response(self): + def authentication_management_authentication_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -7876,7 +7876,7 @@ def matches_USERAND_ROLES_9ec0b30eca9d540a845848cffd7c602a(self): self.path ) - def userand_roles_get_permissions_ap_i_response(self): + def userand_roles_get_permissions_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -7893,7 +7893,7 @@ def matches_USERAND_ROLES_bef02e8f6f8354dc99e375826a87c88c(self): self.path ) - def userand_roles_get_roles_ap_i_response(self): + def userand_roles_get_roles_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -7910,7 +7910,7 @@ def matches_USERAND_ROLES_7fa405b6d1be56739f2dfeea63212015(self): self.path ) - def userand_roles_get_users_ap_i_response(self): + def userand_roles_get_users_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -7927,7 +7927,7 @@ def matches_USERAND_ROLES_6d82755e5e03510daf0951c1f42c2702(self): self.path ) - def userand_roles_add_user_ap_i_response(self): + def userand_roles_add_user_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -7944,7 +7944,7 @@ def matches_USERAND_ROLES_34d2bd5f05bd535a89ebadb30e2ede9e(self): self.path ) - def userand_roles_update_user_ap_i_response(self): + def userand_roles_update_user_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -7961,7 +7961,7 @@ def matches_USERAND_ROLES_452738def9045d4d9c96bcd42172a79c(self): self.path ) - def userand_roles_get_external_authentication_servers_ap_i_response(self): + def userand_roles_get_external_authentication_servers_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9350,19 +9350,19 @@ def do_GET(self): return if self.matches_USERAND_ROLES_9ec0b30eca9d540a845848cffd7c602a(): - self.userand_roles_get_permissions_ap_i_response() + self.userand_roles_get_permissions_api_response() return if self.matches_USERAND_ROLES_bef02e8f6f8354dc99e375826a87c88c(): - self.userand_roles_get_roles_ap_i_response() + self.userand_roles_get_roles_api_response() return if self.matches_USERAND_ROLES_7fa405b6d1be56739f2dfeea63212015(): - self.userand_roles_get_users_ap_i_response() + self.userand_roles_get_users_api_response() return if self.matches_USERAND_ROLES_452738def9045d4d9c96bcd42172a79c(): - self.userand_roles_get_external_authentication_servers_ap_i_response() + self.userand_roles_get_external_authentication_servers_api_response() return if self.matches_USERS_70f9c1d861a051b4a4928f2e6d84b2e3(): @@ -9439,7 +9439,7 @@ def do_POST(self): return if self.matches_AUTHENTICATION_MANAGEMENT_a6bfcd88e22c5c138657b340870b4ebb(): - self.authentication_management_authentication_ap_i_response() + self.authentication_management_authentication_api_response() return if self.matches_CISCO_DNA_CENTER_SYSTEM_5627d9227adc5f02b7cd264af7255d19(): @@ -9819,7 +9819,7 @@ def do_POST(self): return if self.matches_USERAND_ROLES_6d82755e5e03510daf0951c1f42c2702(): - self.userand_roles_add_user_ap_i_response() + self.userand_roles_add_user_api_response() return if self.matches_WIRELESS_d825ae9a117f5b6bb65b7d78fd42513c(): @@ -10085,7 +10085,7 @@ def do_PUT(self): return if self.matches_USERAND_ROLES_34d2bd5f05bd535a89ebadb30e2ede9e(): - self.userand_roles_update_user_ap_i_response() + self.userand_roles_update_user_api_response() return if self.matches_WIRELESS_25479623a94058a99acaaf8eb73c9227(): diff --git a/tests/mock/server/v2_3_7_6.py b/tests/mock/server/v2_3_7_6.py index ef955be9..1eb7fb4c 100644 --- a/tests/mock/server/v2_3_7_6.py +++ b/tests/mock/server/v2_3_7_6.py @@ -9488,7 +9488,7 @@ def matches_USERAND_ROLES_38a88c7510a15578b8eb2df183a92d5d(self): self.path ) - def userand_roles_add_role_ap_i_response(self): + def userand_roles_add_role_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9505,7 +9505,7 @@ def matches_USERAND_ROLES_ff5bf5a67c6c5c0aa9e7ba84c088e1a6(self): self.path ) - def userand_roles_update_role_ap_i_response(self): + def userand_roles_update_role_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9522,7 +9522,7 @@ def matches_USERAND_ROLES_9ec0b30eca9d540a845848cffd7c602a(self): self.path ) - def userand_roles_get_permissions_ap_i_response(self): + def userand_roles_get_permissions_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9539,7 +9539,7 @@ def matches_USERAND_ROLES_da9e850c44d353f78ab002a640e5604f(self): self.path ) - def userand_roles_delete_role_ap_i_response(self): + def userand_roles_delete_role_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9556,7 +9556,7 @@ def matches_USERAND_ROLES_bef02e8f6f8354dc99e375826a87c88c(self): self.path ) - def userand_roles_get_roles_ap_i_response(self): + def userand_roles_get_roles_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9573,7 +9573,7 @@ def matches_USERAND_ROLES_7fa405b6d1be56739f2dfeea63212015(self): self.path ) - def userand_roles_get_users_ap_i_response(self): + def userand_roles_get_users_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9590,7 +9590,7 @@ def matches_USERAND_ROLES_6d82755e5e03510daf0951c1f42c2702(self): self.path ) - def userand_roles_add_user_ap_i_response(self): + def userand_roles_add_user_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9607,7 +9607,7 @@ def matches_USERAND_ROLES_34d2bd5f05bd535a89ebadb30e2ede9e(self): self.path ) - def userand_roles_update_user_ap_i_response(self): + def userand_roles_update_user_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9624,7 +9624,7 @@ def matches_USERAND_ROLES_3556c65c6cc65f068766cbb8a42ad387(self): self.path ) - def userand_roles_delete_user_ap_i_response(self): + def userand_roles_delete_user_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9641,7 +9641,7 @@ def matches_USERAND_ROLES_5490ac03ba045f60925fd7843bf9e279(self): self.path ) - def userand_roles_get_external_authentication_setting_ap_i_response(self): + def userand_roles_get_external_authentication_setting_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9658,7 +9658,7 @@ def matches_USERAND_ROLES_6e4f57e8f06856ee9a7e490d01f7f692(self): self.path ) - def userand_roles_manage_external_authentication_setting_ap_i_response(self): + def userand_roles_manage_external_authentication_setting_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9675,7 +9675,7 @@ def matches_USERAND_ROLES_452738def9045d4d9c96bcd42172a79c(self): self.path ) - def userand_roles_get_external_authentication_servers_ap_i_response(self): + def userand_roles_get_external_authentication_servers_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9692,7 +9692,7 @@ def matches_USERAND_ROLES_9f5bfccc7e30550baa7046f74daa1ef2(self): self.path ) - def userand_roles_add_and_update_a_a_a_attribute_ap_i_response(self): + def userand_roles_add_and_update_aaa_attribute_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9709,7 +9709,7 @@ def matches_USERAND_ROLES_f20c99b436bd5be8bdb9094db3a47f01(self): self.path ) - def userand_roles_delete_a_a_a_attribute_ap_i_response(self): + def userand_roles_delete_aaa_attribute_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -9726,7 +9726,7 @@ def matches_USERAND_ROLES_4bedf83096a45ad1beaaa1fc6c192103(self): self.path ) - def userand_roles_get_a_a_a_attribute_ap_i_response(self): + def userand_roles_get_aaa_attribute_api_response(self): # Add response status code. self.send_response(requests.codes.ok) # Add response headers. @@ -11272,27 +11272,27 @@ def do_GET(self): return if self.matches_USERAND_ROLES_9ec0b30eca9d540a845848cffd7c602a(): - self.userand_roles_get_permissions_ap_i_response() + self.userand_roles_get_permissions_api_response() return if self.matches_USERAND_ROLES_bef02e8f6f8354dc99e375826a87c88c(): - self.userand_roles_get_roles_ap_i_response() + self.userand_roles_get_roles_api_response() return if self.matches_USERAND_ROLES_7fa405b6d1be56739f2dfeea63212015(): - self.userand_roles_get_users_ap_i_response() + self.userand_roles_get_users_api_response() return if self.matches_USERAND_ROLES_5490ac03ba045f60925fd7843bf9e279(): - self.userand_roles_get_external_authentication_setting_ap_i_response() + self.userand_roles_get_external_authentication_setting_api_response() return if self.matches_USERAND_ROLES_452738def9045d4d9c96bcd42172a79c(): - self.userand_roles_get_external_authentication_servers_ap_i_response() + self.userand_roles_get_external_authentication_servers_api_response() return if self.matches_USERAND_ROLES_4bedf83096a45ad1beaaa1fc6c192103(): - self.userand_roles_get_a_a_a_attribute_ap_i_response() + self.userand_roles_get_aaa_attribute_api_response() return if self.matches_USERS_70f9c1d861a051b4a4928f2e6d84b2e3(): @@ -11813,19 +11813,19 @@ def do_POST(self): return if self.matches_USERAND_ROLES_38a88c7510a15578b8eb2df183a92d5d(): - self.userand_roles_add_role_ap_i_response() + self.userand_roles_add_role_api_response() return if self.matches_USERAND_ROLES_6d82755e5e03510daf0951c1f42c2702(): - self.userand_roles_add_user_ap_i_response() + self.userand_roles_add_user_api_response() return if self.matches_USERAND_ROLES_6e4f57e8f06856ee9a7e490d01f7f692(): - self.userand_roles_manage_external_authentication_setting_ap_i_response() + self.userand_roles_manage_external_authentication_setting_api_response() return if self.matches_USERAND_ROLES_9f5bfccc7e30550baa7046f74daa1ef2(): - self.userand_roles_add_and_update_a_a_a_attribute_ap_i_response() + self.userand_roles_add_and_update_aaa_attribute_api_response() return if self.matches_WIRELESS_d825ae9a117f5b6bb65b7d78fd42513c(): @@ -12171,11 +12171,11 @@ def do_PUT(self): return if self.matches_USERAND_ROLES_ff5bf5a67c6c5c0aa9e7ba84c088e1a6(): - self.userand_roles_update_role_ap_i_response() + self.userand_roles_update_role_api_response() return if self.matches_USERAND_ROLES_34d2bd5f05bd535a89ebadb30e2ede9e(): - self.userand_roles_update_user_ap_i_response() + self.userand_roles_update_user_api_response() return if self.matches_WIRELESS_25479623a94058a99acaaf8eb73c9227(): @@ -12461,15 +12461,15 @@ def do_DELETE(self): return if self.matches_USERAND_ROLES_da9e850c44d353f78ab002a640e5604f(): - self.userand_roles_delete_role_ap_i_response() + self.userand_roles_delete_role_api_response() return if self.matches_USERAND_ROLES_3556c65c6cc65f068766cbb8a42ad387(): - self.userand_roles_delete_user_ap_i_response() + self.userand_roles_delete_user_api_response() return if self.matches_USERAND_ROLES_f20c99b436bd5be8bdb9094db3a47f01(): - self.userand_roles_delete_a_a_a_attribute_ap_i_response() + self.userand_roles_delete_aaa_attribute_api_response() return if self.matches_WIRELESS_8e56eb2c294159d891b7dbe493ddc434():