From fa5aec0507f2ba2ae4d95eb707c4bf327f09e1de Mon Sep 17 00:00:00 2001 From: Ujjwal Nasra <125353741+unasra@users.noreply.github.com> Date: Wed, 29 Jan 2025 04:17:17 +0530 Subject: [PATCH] Refactor : Rename Bloxone Python Client to Universal DDI Client (#18) * removed bloxone_python_client occurences * modified all objects * updated env variables --- .github/workflows/python.yml | 2 +- README.md | 66 ++-- pyproject.toml | 8 +- setup.py | 8 +- src/.openapi-generator/FILES | 342 ++++++++++++++---- src/anycast/README.md | 8 +- src/anycast/__init__.py | 4 +- .../api/on_prem_anycast_manager_api.py | 10 +- src/anycast/docs/OnPremAnycastManagerApi.md | 136 +++---- src/anycast/models/__init__.py | 4 +- src/anycast/models/anycast_config.py | 4 +- src/anycast/models/anycast_config_ref.py | 4 +- src/anycast/models/anycast_config_response.py | 4 +- src/anycast/models/anycast_version.py | 4 +- src/anycast/models/bgp_config.py | 4 +- src/anycast/models/bgp_neighbor.py | 4 +- .../get_anycast_config_list_response.py | 4 +- src/anycast/models/onprem_host.py | 4 +- src/anycast/models/onprem_host_ref.py | 4 +- src/anycast/models/onprem_host_response.py | 4 +- src/anycast/models/ospf_config.py | 4 +- src/anycast/models/ospfv3_config.py | 4 +- src/anycast/models/protobuf_field_mask.py | 4 +- src/anycast/models/service_config.py | 4 +- src/anycast/models/service_config_object.py | 4 +- src/anycast/models/service_status_code.py | 4 +- .../models/service_status_update_request.py | 4 +- .../test/test_on_prem_anycast_manager_api.py | 6 +- src/bloxone_client/__init__.py | 21 -- src/cloud_discovery/README.md | 8 +- src/cloud_discovery/__init__.py | 2 +- src/cloud_discovery/api/accounts_api.py | 8 +- src/cloud_discovery/api/providers_api.py | 8 +- src/cloud_discovery/api/sub_accounts_api.py | 8 +- src/cloud_discovery/docs/AccountsApi.md | 8 +- src/cloud_discovery/docs/ProvidersApi.md | 40 +- src/cloud_discovery/docs/SubAccountsApi.md | 8 +- src/cloud_discovery/models/__init__.py | 2 +- src/cloud_discovery/models/account.py | 2 +- .../models/account_list_response.py | 2 +- .../models/additional_config.py | 2 +- src/cloud_discovery/models/api_page_info.py | 2 +- src/cloud_discovery/models/category.py | 2 +- .../models/credential_config.py | 2 +- .../models/credential_preference.py | 2 +- src/cloud_discovery/models/destination.py | 2 +- .../models/destination_config.py | 2 +- .../models/discovery_config.py | 2 +- src/cloud_discovery/models/dns_config.py | 2 +- src/cloud_discovery/models/ipam_config.py | 2 +- src/cloud_discovery/models/object.py | 2 +- src/cloud_discovery/models/object_type.py | 2 +- .../models/provider_create_response.py | 2 +- .../models/provider_list_response.py | 2 +- .../models/provider_read_response.py | 2 +- .../models/provider_update_response.py | 2 +- src/cloud_discovery/models/resource.py | 2 +- src/cloud_discovery/models/source_config.py | 2 +- .../models/sub_account_list_request_v2.py | 2 +- .../models/sub_account_list_response_v2.py | 2 +- .../models/sub_account_prov_cred_config.py | 2 +- src/cloud_discovery/models/sub_account_v2.py | 2 +- src/cloud_discovery/test/test_accounts_api.py | 4 +- .../test/test_providers_api.py | 4 +- .../test/test_sub_accounts_api.py | 4 +- src/dfp/README.md | 6 +- src/dfp/__init__.py | 2 +- src/dfp/api/accounts_api.py | 8 +- src/dfp/api/infra_services_api.py | 8 +- src/dfp/docs/AccountsApi.md | 6 +- src/dfp/docs/DfpCreateOrUpdatePayload.md | 2 +- src/dfp/docs/InfraServicesApi.md | 18 +- src/dfp/docs/Resolver.md | 2 +- src/dfp/models/__init__.py | 2 +- src/dfp/models/dfp.py | 2 +- .../models/dfp_create_or_update_payload.py | 4 +- .../models/dfp_create_or_update_response.py | 2 +- src/dfp/models/dfp_host.py | 2 +- src/dfp/models/dfp_list_response.py | 2 +- src/dfp/models/dfp_read_response.py | 2 +- src/dfp/models/dns_protocol.py | 2 +- ...reate_or_update_dfp_service400_response.py | 2 +- ...or_update_dfp_service400_response_error.py | 2 +- ...reate_or_update_dfp_service404_response.py | 2 +- ...or_update_dfp_service404_response_error.py | 2 +- ..._services_list_dfp_services500_response.py | 2 +- ...ces_list_dfp_services500_response_error.py | 2 +- src/dfp/models/net_addr_policy_assignment.py | 2 +- src/dfp/models/resolver.py | 4 +- src/dfp/models/types_config_check_request.py | 2 +- src/dfp/models/types_config_check_response.py | 2 +- src/dfp/models/types_config_check_result.py | 2 +- src/dfp/test/test_accounts_api.py | 4 +- src/dfp/test/test_infra_services_api.py | 4 +- src/dns_config/README.md | 8 +- src/dns_config/__init__.py | 2 +- src/dns_config/api/acl_api.py | 8 +- src/dns_config/api/auth_nsg_api.py | 8 +- src/dns_config/api/auth_zone_api.py | 8 +- src/dns_config/api/cache_flush_api.py | 8 +- src/dns_config/api/convert_domain_name_api.py | 8 +- src/dns_config/api/convert_rname_api.py | 8 +- src/dns_config/api/delegation_api.py | 8 +- src/dns_config/api/forward_nsg_api.py | 8 +- src/dns_config/api/forward_zone_api.py | 8 +- src/dns_config/api/global_api.py | 8 +- src/dns_config/api/host_api.py | 8 +- src/dns_config/api/lbdn_api.py | 8 +- src/dns_config/api/server_api.py | 8 +- src/dns_config/api/view_api.py | 8 +- src/dns_config/docs/AclApi.md | 40 +- src/dns_config/docs/AuthNsgApi.md | 40 +- src/dns_config/docs/AuthZoneApi.md | 48 +-- src/dns_config/docs/CacheFlushApi.md | 8 +- src/dns_config/docs/ConvertDomainNameApi.md | 8 +- src/dns_config/docs/ConvertRnameApi.md | 8 +- src/dns_config/docs/DelegationApi.md | 40 +- src/dns_config/docs/ForwardNsgApi.md | 40 +- src/dns_config/docs/ForwardZoneApi.md | 48 +-- src/dns_config/docs/GlobalApi.md | 32 +- src/dns_config/docs/HostApi.md | 24 +- src/dns_config/docs/LbdnApi.md | 40 +- src/dns_config/docs/ServerApi.md | 40 +- src/dns_config/docs/ViewApi.md | 48 +-- src/dns_config/models/__init__.py | 2 +- src/dns_config/models/acl.py | 2 +- src/dns_config/models/acl_item.py | 2 +- src/dns_config/models/auth_nsg.py | 2 +- src/dns_config/models/auth_zone.py | 2 +- src/dns_config/models/auth_zone_config.py | 2 +- .../models/auth_zone_external_provider.py | 2 +- .../models/auth_zone_inheritance.py | 2 +- src/dns_config/models/bulk_copy_error.py | 2 +- src/dns_config/models/bulk_copy_response.py | 2 +- src/dns_config/models/bulk_copy_view.py | 2 +- src/dns_config/models/cache_flush.py | 2 +- src/dns_config/models/convert_domain_name.py | 2 +- .../models/convert_domain_name_response.py | 2 +- .../models/convert_r_name_response.py | 2 +- src/dns_config/models/copy_auth_zone.py | 2 +- .../models/copy_auth_zone_response.py | 2 +- src/dns_config/models/copy_forward_zone.py | 2 +- .../models/copy_forward_zone_response.py | 2 +- src/dns_config/models/copy_response.py | 2 +- src/dns_config/models/create_acl_response.py | 2 +- .../models/create_auth_nsg_response.py | 2 +- .../models/create_auth_zone_response.py | 2 +- .../models/create_delegation_response.py | 2 +- .../models/create_forward_nsg_response.py | 2 +- .../models/create_forward_zone_response.py | 2 +- src/dns_config/models/create_lbdn_response.py | 2 +- .../models/create_server_response.py | 2 +- src/dns_config/models/create_view_response.py | 2 +- src/dns_config/models/custom_root_ns_block.py | 2 +- src/dns_config/models/delegation.py | 2 +- src/dns_config/models/delegation_server.py | 2 +- src/dns_config/models/display_view.py | 2 +- src/dns_config/models/dns_global.py | 2 +- .../models/dnssec_validation_block.py | 2 +- src/dns_config/models/dtc_config.py | 2 +- src/dns_config/models/dtc_policy.py | 2 +- src/dns_config/models/ecs_block.py | 2 +- src/dns_config/models/ecs_zone.py | 2 +- src/dns_config/models/external_primary.py | 2 +- src/dns_config/models/external_secondary.py | 2 +- src/dns_config/models/forward_nsg.py | 2 +- src/dns_config/models/forward_zone.py | 2 +- src/dns_config/models/forward_zone_config.py | 2 +- src/dns_config/models/forwarder.py | 2 +- src/dns_config/models/forwarders_block.py | 2 +- src/dns_config/models/host.py | 2 +- .../models/host_associated_server.py | 2 +- src/dns_config/models/host_inheritance.py | 2 +- .../models/inheritance2_assigned_host.py | 2 +- .../models/inheritance2_inherited_bool.py | 2 +- .../models/inheritance2_inherited_string.py | 2 +- .../models/inheritance2_inherited_u_int32.py | 2 +- src/dns_config/models/inherited_acl_items.py | 2 +- .../models/inherited_custom_root_ns_block.py | 2 +- .../inherited_dnssec_validation_block.py | 2 +- src/dns_config/models/inherited_dtc_config.py | 2 +- src/dns_config/models/inherited_ecs_block.py | 2 +- .../models/inherited_forwarders_block.py | 2 +- .../models/inherited_kerberos_keys.py | 2 +- .../models/inherited_sort_list_items.py | 2 +- .../models/inherited_zone_authority.py | 2 +- .../inherited_zone_authority_m_name_block.py | 2 +- src/dns_config/models/internal_secondary.py | 2 +- src/dns_config/models/kerberos_key.py | 2 +- src/dns_config/models/lbdn.py | 2 +- src/dns_config/models/list_acl_response.py | 2 +- .../models/list_auth_nsg_response.py | 2 +- .../models/list_auth_zone_response.py | 2 +- .../models/list_delegation_response.py | 2 +- .../models/list_forward_nsg_response.py | 2 +- .../models/list_forward_zone_response.py | 2 +- src/dns_config/models/list_host_response.py | 2 +- src/dns_config/models/list_lbdn_response.py | 2 +- src/dns_config/models/list_server_response.py | 2 +- src/dns_config/models/list_view_response.py | 2 +- src/dns_config/models/read_acl_response.py | 2 +- .../models/read_auth_nsg_response.py | 2 +- .../models/read_auth_zone_response.py | 2 +- .../models/read_delegation_response.py | 2 +- .../models/read_forward_nsg_response.py | 2 +- .../models/read_forward_zone_response.py | 2 +- src/dns_config/models/read_global_response.py | 2 +- src/dns_config/models/read_host_response.py | 2 +- src/dns_config/models/read_lbdn_response.py | 2 +- src/dns_config/models/read_server_response.py | 2 +- src/dns_config/models/read_view_response.py | 2 +- src/dns_config/models/root_ns.py | 2 +- src/dns_config/models/server.py | 2 +- src/dns_config/models/server_inheritance.py | 2 +- src/dns_config/models/sort_list_item.py | 2 +- src/dns_config/models/trust_anchor.py | 2 +- src/dns_config/models/tsig_key.py | 2 +- src/dns_config/models/ttl_inheritance.py | 2 +- src/dns_config/models/update_acl_response.py | 2 +- .../models/update_auth_nsg_response.py | 2 +- .../models/update_auth_zone_response.py | 2 +- .../models/update_delegation_response.py | 2 +- .../models/update_forward_nsg_response.py | 2 +- .../models/update_forward_zone_response.py | 2 +- .../models/update_global_response.py | 2 +- src/dns_config/models/update_host_response.py | 2 +- src/dns_config/models/update_lbdn_response.py | 2 +- .../models/update_server_response.py | 2 +- src/dns_config/models/update_view_response.py | 2 +- src/dns_config/models/view.py | 2 +- src/dns_config/models/view_inheritance.py | 2 +- src/dns_config/models/warning.py | 2 +- src/dns_config/models/zone_authority.py | 2 +- .../models/zone_authority_m_name_block.py | 2 +- src/dns_config/test/test_acl_api.py | 4 +- src/dns_config/test/test_auth_nsg_api.py | 4 +- src/dns_config/test/test_auth_zone_api.py | 4 +- src/dns_config/test/test_cache_flush_api.py | 4 +- .../test/test_convert_domain_name_api.py | 4 +- src/dns_config/test/test_convert_rname_api.py | 4 +- src/dns_config/test/test_delegation_api.py | 4 +- src/dns_config/test/test_forward_nsg_api.py | 4 +- src/dns_config/test/test_forward_zone_api.py | 4 +- src/dns_config/test/test_global_api.py | 4 +- src/dns_config/test/test_host_api.py | 4 +- src/dns_config/test/test_lbdn_api.py | 4 +- src/dns_config/test/test_server_api.py | 4 +- src/dns_config/test/test_view_api.py | 4 +- src/dns_data/README.md | 8 +- src/dns_data/__init__.py | 2 +- src/dns_data/api/record_api.py | 8 +- src/dns_data/docs/Record.md | 2 +- src/dns_data/docs/RecordApi.md | 48 +-- src/dns_data/models/__init__.py | 2 +- src/dns_data/models/create_record_response.py | 2 +- .../models/inheritance2_inherited_u_int32.py | 2 +- src/dns_data/models/list_record_response.py | 2 +- src/dns_data/models/protobuf_field_mask.py | 2 +- src/dns_data/models/read_record_response.py | 2 +- src/dns_data/models/record.py | 7 +- src/dns_data/models/record_inheritance.py | 2 +- .../models/soa_serial_increment_request.py | 2 +- .../models/soa_serial_increment_response.py | 2 +- src/dns_data/models/update_record_response.py | 2 +- src/dns_data/test/test_record_api.py | 4 +- src/fw/README.md | 6 +- src/fw/__init__.py | 4 +- src/fw/api/access_codes_api.py | 10 +- src/fw/api/app_approvals_api.py | 10 +- src/fw/api/application_filters_api.py | 16 +- src/fw/api/category_filters_api.py | 46 +-- src/fw/api/content_categories_api.py | 16 +- src/fw/api/internal_domain_lists_api.py | 10 +- src/fw/api/named_list_items_api.py | 10 +- src/fw/api/named_lists_api.py | 46 +-- src/fw/api/network_lists_api.py | 46 +-- src/fw/api/pop_regions_api.py | 10 +- src/fw/api/security_policies_api.py | 46 +-- src/fw/api/security_policy_rules_api.py | 10 +- src/fw/api/threat_feeds_api.py | 16 +- src/fw/docs/AccessCodesApi.md | 36 +- src/fw/docs/AppApprovalsApi.md | 18 +- src/fw/docs/ApplicationFilter.md | 2 +- src/fw/docs/ApplicationFiltersApi.md | 38 +- src/fw/docs/CategoryFilter.md | 2 +- src/fw/docs/CategoryFiltersApi.md | 48 +-- src/fw/docs/ContentCategoriesApi.md | 8 +- src/fw/docs/ContentCategory.md | 2 +- src/fw/docs/InternalDomainListsApi.md | 42 +-- src/fw/docs/NamedList.md | 2 +- src/fw/docs/NamedListItemsApi.md | 18 +- src/fw/docs/NamedListRead.md | 2 +- src/fw/docs/NamedListsApi.md | 66 ++-- src/fw/docs/NetworkList.md | 2 +- src/fw/docs/NetworkListsApi.md | 52 +-- src/fw/docs/PopRegionsApi.md | 12 +- src/fw/docs/SecurityPoliciesApi.md | 48 +-- src/fw/docs/SecurityPolicy.md | 4 +- src/fw/docs/SecurityPolicyRulesApi.md | 6 +- src/fw/docs/ThreatFeed.md | 2 +- src/fw/docs/ThreatFeedsApi.md | 8 +- src/fw/models/__init__.py | 4 +- src/fw/models/access_code.py | 4 +- src/fw/models/access_code_create_response.py | 4 +- src/fw/models/access_code_delete_request.py | 4 +- src/fw/models/access_code_multi_response.py | 4 +- src/fw/models/access_code_read_response.py | 4 +- src/fw/models/access_code_rule.py | 4 +- src/fw/models/access_code_update_response.py | 4 +- ...ss_codes_create_access_code400_response.py | 4 +- ...es_create_access_code400_response_error.py | 4 +- ...ss_codes_create_access_code404_response.py | 4 +- ...es_create_access_code404_response_error.py | 4 +- ...ss_codes_create_access_code409_response.py | 4 +- ...es_create_access_code409_response_error.py | 4 +- ...s_codes_delete_access_codes400_response.py | 4 +- ...s_delete_access_codes400_response_error.py | 4 +- ..._delete_single_access_codes400_response.py | 4 +- ...e_single_access_codes400_response_error.py | 4 +- ...ess_codes_list_access_codes500_response.py | 4 +- ...des_list_access_codes500_response_error.py | 4 +- ...cess_codes_read_access_code404_response.py | 4 +- ...odes_read_access_code404_response_error.py | 4 +- src/fw/models/app_approval.py | 4 +- src/fw/models/app_approval_multi_response.py | 4 +- src/fw/models/app_approval_removal_request.py | 4 +- .../models/app_approvals_replace_request.py | 4 +- src/fw/models/app_approvals_update_request.py | 4 +- src/fw/models/application_criterion.py | 4 +- src/fw/models/application_filter.py | 6 +- .../application_filter_create_response.py | 4 +- .../application_filter_multi_response.py | 4 +- .../application_filter_read_response.py | 4 +- .../application_filter_update_response.py | 4 +- ..._delete_application_filters400_response.py | 4 +- ...e_application_filters400_response_error.py | 4 +- .../application_filters_delete_request.py | 4 +- ..._single_application_filters400_response.py | 4 +- ...e_application_filters400_response_error.py | 4 +- src/fw/models/category_filter.py | 6 +- .../models/category_filter_create_response.py | 4 +- .../models/category_filter_multi_response.py | 4 +- .../models/category_filter_read_response.py | 4 +- .../models/category_filter_update_response.py | 4 +- ...ters_create_category_filter400_response.py | 4 +- ...reate_category_filter400_response_error.py | 4 +- ...ters_create_category_filter409_response.py | 4 +- ...reate_category_filter409_response_error.py | 4 +- ...ers_delete_category_filters400_response.py | 4 +- ...lete_category_filters400_response_error.py | 4 +- .../models/category_filters_delete_request.py | 4 +- ...ilters_read_category_filter404_response.py | 4 +- ..._read_category_filter404_response_error.py | 4 +- src/fw/models/content_category.py | 6 +- .../models/content_category_multi_response.py | 4 +- ...sts_create_internal_domains400_response.py | 4 +- ...eate_internal_domains400_response_error.py | 4 +- ...sts_create_internal_domains409_response.py | 4 +- ...eate_internal_domains409_response_error.py | 4 +- ...sts_delete_internal_domains400_response.py | 4 +- ...lete_internal_domains400_response_error.py | 4 +- ...sts_delete_internal_domains404_response.py | 4 +- ...lete_internal_domains404_response_error.py | 4 +- ...ete_single_internal_domains400_response.py | 4 +- ...ngle_internal_domains400_response_error.py | 4 +- ...omains_items_partial_update400_response.py | 4 +- ..._items_partial_update400_response_error.py | 4 +- ...omains_items_partial_update404_response.py | 4 +- ..._items_partial_update404_response_error.py | 4 +- ...lists_read_internal_domains404_response.py | 4 +- ...read_internal_domains404_response_error.py | 4 +- ...sts_update_internal_domains400_response.py | 4 +- ...date_internal_domains400_response_error.py | 4 +- ...sts_update_internal_domains404_response.py | 4 +- ...date_internal_domains404_response_error.py | 4 +- src/fw/models/internal_domains.py | 4 +- .../internal_domains_create_response.py | 4 +- .../models/internal_domains_delete_request.py | 4 +- src/fw/models/internal_domains_items.py | 4 +- .../models/internal_domains_multi_response.py | 4 +- .../models/internal_domains_read_response.py | 4 +- .../internal_domains_update_response.py | 4 +- src/fw/models/item_structs.py | 4 +- src/fw/models/list_po_p_regions_response.py | 4 +- src/fw/models/list_severity_levels.py | 4 +- src/fw/models/multi_list_update.py | 4 +- src/fw/models/named_list.py | 6 +- src/fw/models/named_list_create_response.py | 4 +- src/fw/models/named_list_csv_list_response.py | 4 +- ...ems_delete_named_list_items400_response.py | 4 +- ...lete_named_list_items400_response_error.py | 4 +- .../models/named_list_items_delete_request.py | 4 +- ...or_replace_named_list_items400_response.py | 4 +- ...lace_named_list_items400_response_error.py | 4 +- .../named_list_items_insert_or_update.py | 4 +- ...ed_list_items_insert_or_update_response.py | 4 +- ...items_insert_or_update_response_success.py | 4 +- ...d_list_items_partial_update400_response.py | 4 +- ..._items_partial_update400_response_error.py | 4 +- .../models/named_list_items_partial_update.py | 4 +- src/fw/models/named_list_read.py | 6 +- .../models/named_list_read_multi_response.py | 4 +- src/fw/models/named_list_read_response.py | 4 +- src/fw/models/named_list_update_response.py | 4 +- ...med_lists_create_named_list409_response.py | 4 +- ...sts_create_named_list409_response_error.py | 4 +- ...ed_lists_delete_named_lists400_response.py | 4 +- ...ts_delete_named_lists400_response_error.py | 4 +- ...ed_lists_delete_named_lists404_response.py | 4 +- ...ts_delete_named_lists404_response_error.py | 4 +- src/fw/models/named_lists_delete_request.py | 4 +- ...s_delete_single_named_lists404_response.py | 4 +- ...te_single_named_lists404_response_error.py | 4 +- ...med_lists_multi_list_update404_response.py | 4 +- ...sts_multi_list_update404_response_error.py | 4 +- ...s_update_named_list_partial400_response.py | 4 +- ...te_named_list_partial400_response_error.py | 4 +- ...s_update_named_list_partial404_response.py | 4 +- ...te_named_list_partial404_response_error.py | 4 +- ...s_update_named_list_partial405_response.py | 4 +- ...te_named_list_partial405_response_error.py | 4 +- src/fw/models/net_addr_dfp_assignment.py | 4 +- .../net_addr_dfp_assignment_scope_type.py | 4 +- src/fw/models/network_list.py | 6 +- src/fw/models/network_list_create_response.py | 4 +- src/fw/models/network_list_multi_response.py | 4 +- src/fw/models/network_list_read_response.py | 4 +- src/fw/models/network_list_update_response.py | 4 +- ...k_lists_create_network_list409_response.py | 4 +- ...s_create_network_list409_response_error.py | 4 +- ..._lists_delete_network_lists400_response.py | 4 +- ..._delete_network_lists400_response_error.py | 4 +- ..._lists_delete_network_lists404_response.py | 4 +- ..._delete_network_lists404_response_error.py | 4 +- src/fw/models/network_lists_delete_request.py | 4 +- src/fw/models/po_p_region.py | 4 +- ...op_regions_read_po_p_region404_response.py | 4 +- ...ions_read_po_p_region404_response_error.py | 4 +- src/fw/models/protobuf_field_mask.py | 4 +- src/fw/models/read_po_p_region_response.py | 4 +- ...cies_create_security_policy400_response.py | 4 +- ...reate_security_policy400_response_error.py | 4 +- ...cies_create_security_policy409_response.py | 4 +- ...reate_security_policy409_response_error.py | 4 +- ...licies_read_security_policy404_response.py | 4 +- ..._read_security_policy404_response_error.py | 4 +- src/fw/models/security_policy.py | 8 +- .../models/security_policy_create_response.py | 4 +- .../models/security_policy_delete_request.py | 4 +- .../models/security_policy_multi_response.py | 4 +- .../models/security_policy_read_response.py | 4 +- src/fw/models/security_policy_rule.py | 4 +- .../security_policy_rule_multi_response.py | 4 +- .../models/security_policy_update_response.py | 4 +- src/fw/models/threat_feed.py | 6 +- src/fw/models/threat_feed_multi_response.py | 4 +- src/fw/models/threat_feed_source.py | 4 +- src/fw/test/test_access_codes_api.py | 6 +- src/fw/test/test_app_approvals_api.py | 6 +- src/fw/test/test_application_filters_api.py | 6 +- src/fw/test/test_category_filters_api.py | 6 +- src/fw/test/test_content_categories_api.py | 6 +- src/fw/test/test_internal_domain_lists_api.py | 6 +- src/fw/test/test_named_list_items_api.py | 6 +- src/fw/test/test_named_lists_api.py | 6 +- src/fw/test/test_network_lists_api.py | 6 +- src/fw/test/test_pop_regions_api.py | 6 +- src/fw/test/test_security_policies_api.py | 6 +- src/fw/test/test_security_policy_rules_api.py | 6 +- src/fw/test/test_threat_feeds_api.py | 6 +- src/infra_mgmt/README.md | 8 +- src/infra_mgmt/__init__.py | 2 +- src/infra_mgmt/api/detail_api.py | 8 +- src/infra_mgmt/api/hosts_api.py | 8 +- src/infra_mgmt/api/services_api.py | 8 +- src/infra_mgmt/docs/DetailApi.md | 16 +- src/infra_mgmt/docs/DetailHost.md | 2 +- src/infra_mgmt/docs/Host.md | 4 +- src/infra_mgmt/docs/HostsApi.md | 72 ++-- src/infra_mgmt/docs/ServicesApi.md | 48 +-- src/infra_mgmt/models/__init__.py | 2 +- src/infra_mgmt/models/api_page_info.py | 2 +- src/infra_mgmt/models/applications.py | 2 +- .../models/applications_response.py | 2 +- src/infra_mgmt/models/assign_tags_request.py | 2 +- src/infra_mgmt/models/create_host_response.py | 2 +- .../models/create_service_response.py | 2 +- src/infra_mgmt/models/detail_host.py | 4 +- .../models/detail_host_service_config.py | 2 +- src/infra_mgmt/models/detail_location.py | 2 +- src/infra_mgmt/models/detail_service.py | 2 +- src/infra_mgmt/models/detail_service_host.py | 2 +- .../models/detail_service_host_config.py | 2 +- src/infra_mgmt/models/disconnect_request.py | 2 +- src/infra_mgmt/models/get_host_response.py | 2 +- src/infra_mgmt/models/get_service_response.py | 2 +- src/infra_mgmt/models/host.py | 6 +- .../models/list_detail_hosts_response.py | 2 +- .../models/list_detail_services_response.py | 2 +- src/infra_mgmt/models/list_host_response.py | 2 +- .../models/list_service_response.py | 2 +- src/infra_mgmt/models/pool_info.py | 2 +- src/infra_mgmt/models/replace_host_request.py | 2 +- src/infra_mgmt/models/service.py | 2 +- src/infra_mgmt/models/service_host_config.py | 2 +- src/infra_mgmt/models/short_service_status.py | 2 +- .../models/unassign_tags_request.py | 2 +- src/infra_mgmt/models/update_host_response.py | 2 +- .../models/update_service_response.py | 2 +- src/infra_mgmt/test/test_detail_api.py | 4 +- src/infra_mgmt/test/test_hosts_api.py | 4 +- src/infra_mgmt/test/test_services_api.py | 4 +- src/infra_provision/README.md | 6 +- src/infra_provision/api/ui_join_token_api.py | 6 +- src/infra_provision/api/uicsr_api.py | 18 +- src/infra_provision/docs/RevokeCertRequest.md | 2 +- src/infra_provision/docs/UICSRApi.md | 44 +-- src/infra_provision/docs/UIJoinTokenApi.md | 48 +-- .../models/revoke_cert_request.py | 2 +- .../test/test_ui_join_token_api.py | 2 +- src/infra_provision/test/test_uicsr_api.py | 2 +- src/ipam/README.md | 8 +- src/ipam/__init__.py | 2 +- src/ipam/api/address_api.py | 8 +- src/ipam/api/address_block_api.py | 8 +- src/ipam/api/asm_api.py | 8 +- src/ipam/api/config_profile_api.py | 8 +- src/ipam/api/dhcp_host_api.py | 8 +- src/ipam/api/dns_usage_api.py | 8 +- src/ipam/api/filter_api.py | 8 +- src/ipam/api/fixed_address_api.py | 8 +- src/ipam/api/global_api.py | 8 +- src/ipam/api/ha_group_api.py | 8 +- src/ipam/api/hardware_filter_api.py | 8 +- src/ipam/api/ip_space_api.py | 8 +- src/ipam/api/ipam_host_api.py | 8 +- src/ipam/api/leases_command_api.py | 8 +- src/ipam/api/mac_address_item_api.py | 8 +- src/ipam/api/option_code_api.py | 8 +- src/ipam/api/option_filter_api.py | 8 +- src/ipam/api/option_group_api.py | 8 +- src/ipam/api/option_space_api.py | 8 +- src/ipam/api/range_api.py | 8 +- src/ipam/api/server_api.py | 8 +- src/ipam/api/service_api.py | 8 +- src/ipam/api/subnet_api.py | 8 +- src/ipam/docs/Address.md | 2 +- src/ipam/docs/AddressApi.md | 40 +- src/ipam/docs/AddressBlockApi.md | 104 +++--- src/ipam/docs/AsmApi.md | 24 +- src/ipam/docs/ConfigProfileApi.md | 48 +-- src/ipam/docs/DhcpHostApi.md | 32 +- src/ipam/docs/DnsUsageApi.md | 16 +- src/ipam/docs/FilterApi.md | 8 +- src/ipam/docs/FixedAddressApi.md | 40 +- src/ipam/docs/GlobalApi.md | 32 +- src/ipam/docs/HaGroupApi.md | 40 +- src/ipam/docs/HardwareFilterApi.md | 40 +- src/ipam/docs/IpSpaceApi.md | 64 ++-- src/ipam/docs/IpamHostApi.md | 40 +- src/ipam/docs/LeasesCommandApi.md | 8 +- src/ipam/docs/MacAddressItemApi.md | 56 +-- src/ipam/docs/OptionCodeApi.md | 40 +- src/ipam/docs/OptionFilterApi.md | 40 +- src/ipam/docs/OptionGroupApi.md | 40 +- src/ipam/docs/OptionSpaceApi.md | 40 +- src/ipam/docs/RangeApi.md | 56 +-- src/ipam/docs/ServerApi.md | 40 +- src/ipam/docs/ServiceApi.md | 16 +- src/ipam/docs/SubnetApi.md | 72 ++-- src/ipam/models/__init__.py | 2 +- src/ipam/models/access_filter.py | 2 +- src/ipam/models/address.py | 5 +- src/ipam/models/address_block.py | 2 +- src/ipam/models/asm.py | 2 +- src/ipam/models/asm_config.py | 2 +- src/ipam/models/asm_enable_block.py | 2 +- src/ipam/models/asm_growth_block.py | 2 +- ...ciate_config_profile_to_objects_request.py | 2 +- ...ciate_object_to_config_profiles_request.py | 2 +- src/ipam/models/associated_host.py | 2 +- src/ipam/models/bulk_copy_error.py | 2 +- src/ipam/models/bulk_copy_ip_space.py | 2 +- .../models/bulk_copy_ip_space_response.py | 2 +- .../bulk_create_mac_address_item_response.py | 2 +- src/ipam/models/bulk_mac_address_item.py | 2 +- src/ipam/models/cidr_block.py | 2 +- src/ipam/models/copy_address_block.py | 2 +- .../models/copy_address_block_response.py | 2 +- src/ipam/models/copy_ip_space.py | 2 +- src/ipam/models/copy_ip_space_response.py | 2 +- src/ipam/models/copy_response.py | 2 +- src/ipam/models/copy_subnet.py | 2 +- src/ipam/models/copy_subnet_response.py | 2 +- src/ipam/models/cp_subnet.py | 2 +- .../models/create_address_block_response.py | 2 +- src/ipam/models/create_address_response.py | 2 +- src/ipam/models/create_asm_response.py | 2 +- .../models/create_fixed_address_response.py | 2 +- src/ipam/models/create_ha_group_response.py | 2 +- .../models/create_hardware_filter_response.py | 2 +- src/ipam/models/create_ip_space_response.py | 2 +- src/ipam/models/create_ipam_host_response.py | 2 +- .../models/create_leases_command_response.py | 2 +- .../create_mac_address_item_response.py | 2 +- .../create_next_available_ab_response.py | 2 +- .../create_next_available_ip_response.py | 2 +- .../create_next_available_subnet_response.py | 2 +- .../models/create_option_code_response.py | 2 +- .../models/create_option_filter_response.py | 2 +- .../models/create_option_group_response.py | 2 +- .../models/create_option_space_response.py | 2 +- src/ipam/models/create_range_response.py | 2 +- src/ipam/models/create_server_response.py | 2 +- src/ipam/models/create_subnet_response.py | 2 +- src/ipam/models/ddns_block.py | 2 +- src/ipam/models/ddns_hostname_block.py | 2 +- src/ipam/models/ddns_update_block.py | 2 +- src/ipam/models/ddns_zone.py | 2 +- src/ipam/models/dhcp_config.py | 2 +- src/ipam/models/dhcp_global.py | 2 +- src/ipam/models/dhcp_info.py | 2 +- src/ipam/models/dhcp_inheritance.py | 2 +- src/ipam/models/dhcp_options_inheritance.py | 2 +- src/ipam/models/dhcp_packet_stats.py | 2 +- src/ipam/models/dhcp_service_instance.py | 2 +- src/ipam/models/dhcp_utilization.py | 2 +- src/ipam/models/dhcp_utilization_threshold.py | 2 +- ...ate_config_profile_from_objects_request.py | 2 +- ...ate_object_from_config_profiles_request.py | 2 +- src/ipam/models/dns_usage.py | 2 +- src/ipam/models/exclusion_range.py | 2 +- src/ipam/models/filter.py | 2 +- src/ipam/models/fixed_address.py | 2 +- src/ipam/models/fixed_address_inheritance.py | 2 +- src/ipam/models/ha_group.py | 2 +- src/ipam/models/ha_group_heartbeats.py | 2 +- src/ipam/models/ha_group_host.py | 2 +- src/ipam/models/hardware_filter.py | 2 +- src/ipam/models/host.py | 2 +- src/ipam/models/host_address.py | 2 +- src/ipam/models/host_associated_server.py | 2 +- src/ipam/models/host_associations_response.py | 2 +- src/ipam/models/host_name.py | 2 +- src/ipam/models/hostname_rewrite_block.py | 2 +- src/ipam/models/ignore_item.py | 2 +- src/ipam/models/inheritance_assigned_host.py | 2 +- src/ipam/models/inheritance_inherited_bool.py | 2 +- .../models/inheritance_inherited_float.py | 2 +- .../inheritance_inherited_identifier.py | 2 +- .../models/inheritance_inherited_string.py | 2 +- .../models/inheritance_inherited_u_int32.py | 2 +- src/ipam/models/inherited_asm_config.py | 2 +- src/ipam/models/inherited_asm_enable_block.py | 2 +- src/ipam/models/inherited_asm_growth_block.py | 2 +- src/ipam/models/inherited_ddns_block.py | 2 +- .../models/inherited_ddns_hostname_block.py | 2 +- .../models/inherited_ddns_update_block.py | 2 +- src/ipam/models/inherited_dhcp_config.py | 2 +- .../inherited_dhcp_config_filter_list.py | 2 +- .../inherited_dhcp_config_ignore_item_list.py | 2 +- src/ipam/models/inherited_dhcp_option.py | 2 +- src/ipam/models/inherited_dhcp_option_item.py | 2 +- src/ipam/models/inherited_dhcp_option_list.py | 2 +- .../inherited_hostname_rewrite_block.py | 2 +- src/ipam/models/ip_space.py | 2 +- src/ipam/models/ip_space_inheritance.py | 2 +- src/ipam/models/ipam_host.py | 2 +- src/ipam/models/kerberos_key.py | 2 +- src/ipam/models/lease_address.py | 2 +- src/ipam/models/lease_range.py | 2 +- src/ipam/models/lease_subnet.py | 2 +- src/ipam/models/leases_command.py | 2 +- .../models/list_address_block_response.py | 2 +- src/ipam/models/list_address_response.py | 2 +- src/ipam/models/list_ancestor_response.py | 2 +- src/ipam/models/list_asm_response.py | 2 +- .../models/list_config_profile_response.py | 2 +- src/ipam/models/list_cp_subnet_response.py | 2 +- .../list_dhcp_service_instance_response.py | 2 +- src/ipam/models/list_dns_usage_response.py | 2 +- src/ipam/models/list_filter_response.py | 2 +- .../models/list_fixed_address_response.py | 2 +- src/ipam/models/list_ha_group_response.py | 2 +- .../models/list_hardware_filter_response.py | 2 +- src/ipam/models/list_host_response.py | 2 +- src/ipam/models/list_ip_space_response.py | 2 +- src/ipam/models/list_ipam_host_response.py | 2 +- .../models/list_mac_address_item_response.py | 2 +- src/ipam/models/list_option_code_response.py | 2 +- .../models/list_option_filter_response.py | 2 +- src/ipam/models/list_option_group_response.py | 2 +- src/ipam/models/list_option_space_response.py | 2 +- src/ipam/models/list_range_response.py | 2 +- src/ipam/models/list_server_response.py | 2 +- src/ipam/models/list_subnet_response.py | 2 +- src/ipam/models/mac_address_item.py | 2 +- src/ipam/models/mac_address_item_upload.py | 2 +- .../mac_address_item_upload_response.py | 2 +- src/ipam/models/name.py | 2 +- src/ipam/models/nameserver.py | 2 +- src/ipam/models/next_available_ab_response.py | 2 +- src/ipam/models/next_available_ip_response.py | 2 +- .../models/next_available_subnet_response.py | 2 +- src/ipam/models/option_code.py | 2 +- src/ipam/models/option_filter.py | 2 +- src/ipam/models/option_filter_rule.py | 2 +- src/ipam/models/option_filter_rule_list.py | 2 +- src/ipam/models/option_group.py | 2 +- src/ipam/models/option_item.py | 2 +- src/ipam/models/option_space.py | 2 +- src/ipam/models/protobuf_field_mask.py | 2 +- src/ipam/models/range.py | 2 +- .../models/read_address_block_response.py | 2 +- src/ipam/models/read_address_response.py | 2 +- src/ipam/models/read_asm_response.py | 2 +- .../read_dhcp_service_instance_response.py | 2 +- src/ipam/models/read_dns_usage_response.py | 2 +- .../models/read_fixed_address_response.py | 2 +- src/ipam/models/read_global_response.py | 2 +- src/ipam/models/read_ha_group_response.py | 2 +- .../models/read_hardware_filter_response.py | 2 +- src/ipam/models/read_host_response.py | 2 +- src/ipam/models/read_ip_space_response.py | 2 +- src/ipam/models/read_ipam_host_response.py | 2 +- .../models/read_mac_address_item_response.py | 2 +- src/ipam/models/read_option_code_response.py | 2 +- .../models/read_option_filter_response.py | 2 +- src/ipam/models/read_option_group_response.py | 2 +- src/ipam/models/read_option_space_response.py | 2 +- src/ipam/models/read_range_response.py | 2 +- src/ipam/models/read_server_response.py | 2 +- src/ipam/models/read_subnet_response.py | 2 +- src/ipam/models/realms_conflict.py | 2 +- src/ipam/models/realms_conflict_response.py | 2 +- src/ipam/models/server.py | 2 +- src/ipam/models/server_inheritance.py | 2 +- src/ipam/models/subnet.py | 2 +- src/ipam/models/tsig_key.py | 2 +- .../models/update_address_block_response.py | 2 +- src/ipam/models/update_address_response.py | 2 +- .../models/update_fixed_address_response.py | 2 +- src/ipam/models/update_global_response.py | 2 +- src/ipam/models/update_ha_group_response.py | 2 +- .../models/update_hardware_filter_response.py | 2 +- src/ipam/models/update_host_response.py | 2 +- src/ipam/models/update_ip_space_response.py | 2 +- src/ipam/models/update_ipam_host_response.py | 2 +- .../update_mac_address_item_response.py | 2 +- .../models/update_option_code_response.py | 2 +- .../models/update_option_filter_response.py | 2 +- .../models/update_option_group_response.py | 2 +- .../models/update_option_space_response.py | 2 +- src/ipam/models/update_range_response.py | 2 +- src/ipam/models/update_server_response.py | 2 +- src/ipam/models/update_subnet_response.py | 2 +- src/ipam/models/utilization.py | 2 +- src/ipam/models/utilization_threshold.py | 2 +- src/ipam/models/utilization_v6.py | 2 +- src/ipam/test/test_address_api.py | 4 +- src/ipam/test/test_address_block_api.py | 4 +- src/ipam/test/test_asm_api.py | 4 +- src/ipam/test/test_config_profile_api.py | 4 +- src/ipam/test/test_dhcp_host_api.py | 4 +- src/ipam/test/test_dns_usage_api.py | 4 +- src/ipam/test/test_filter_api.py | 4 +- src/ipam/test/test_fixed_address_api.py | 4 +- src/ipam/test/test_global_api.py | 4 +- src/ipam/test/test_ha_group_api.py | 4 +- src/ipam/test/test_hardware_filter_api.py | 4 +- src/ipam/test/test_ip_space_api.py | 4 +- src/ipam/test/test_ipam_host_api.py | 4 +- src/ipam/test/test_leases_command_api.py | 4 +- src/ipam/test/test_mac_address_item_api.py | 4 +- src/ipam/test/test_option_code_api.py | 4 +- src/ipam/test/test_option_filter_api.py | 4 +- src/ipam/test/test_option_group_api.py | 4 +- src/ipam/test/test_option_space_api.py | 4 +- src/ipam/test/test_range_api.py | 4 +- src/ipam/test/test_server_api.py | 4 +- src/ipam/test/test_service_api.py | 4 +- src/ipam/test/test_subnet_api.py | 4 +- src/ipam_federation/README.md | 6 +- .../api/federated_block_api.py | 6 +- .../api/federated_realm_api.py | 6 +- .../api/next_available_federated_block_api.py | 6 +- .../next_available_overlapping_block_api.py | 6 +- .../api/next_available_reserved_block_api.py | 6 +- .../api/overlapping_block_api.py | 6 +- src/ipam_federation/api/reserved_block_api.py | 6 +- src/ipam_federation/docs/FederatedBlockApi.md | 53 ++- src/ipam_federation/docs/FederatedRealmApi.md | 53 ++- .../docs/NextAvailableFederatedBlockApi.md | 38 +- .../docs/NextAvailableOverlappingBlockApi.md | 14 +- .../docs/NextAvailableReservedBlockApi.md | 14 +- .../docs/OverlappingBlockApi.md | 53 ++- src/ipam_federation/docs/ReservedBlockApi.md | 53 ++- .../test/test_federated_block_api.py | 2 +- .../test/test_federated_realm_api.py | 2 +- ...test_next_available_federated_block_api.py | 2 +- ...st_next_available_overlapping_block_api.py | 2 +- .../test_next_available_reserved_block_api.py | 2 +- .../test/test_overlapping_block_api.py | 2 +- .../test/test_reserved_block_api.py | 2 +- src/keys/README.md | 8 +- src/keys/__init__.py | 2 +- src/keys/api/generate_tsig_api.py | 8 +- src/keys/api/kerberos_api.py | 8 +- src/keys/api/tsig_api.py | 8 +- src/keys/api/upload_api.py | 8 +- src/keys/docs/GenerateTsigApi.md | 8 +- src/keys/docs/KerberosApi.md | 32 +- src/keys/docs/TsigApi.md | 40 +- src/keys/docs/UploadApi.md | 8 +- src/keys/models/__init__.py | 2 +- src/keys/models/create_tsig_key_response.py | 2 +- src/keys/models/ddiupload_response.py | 2 +- src/keys/models/generate_tsig_response.py | 2 +- src/keys/models/generate_tsig_result.py | 2 +- src/keys/models/kerberos_key.py | 2 +- src/keys/models/kerberos_keys.py | 2 +- src/keys/models/list_kerberos_key_response.py | 2 +- src/keys/models/list_tsig_key_response.py | 2 +- src/keys/models/protobuf_field_mask.py | 2 +- src/keys/models/read_kerberos_key_response.py | 2 +- src/keys/models/read_tsig_key_response.py | 2 +- src/keys/models/tsig_key.py | 2 +- .../models/update_kerberos_key_response.py | 2 +- src/keys/models/update_tsig_key_response.py | 2 +- src/keys/models/upload_content_type.py | 2 +- src/keys/models/upload_request.py | 2 +- src/keys/test/test_generate_tsig_api.py | 4 +- src/keys/test/test_kerberos_api.py | 4 +- src/keys/test/test_tsig_api.py | 4 +- src/keys/test/test_upload_api.py | 4 +- src/redirect/README.md | 6 +- src/redirect/__init__.py | 4 +- src/redirect/api/certificate_api.py | 10 +- src/redirect/api/custom_redirects_api.py | 46 +-- src/redirect/api/redirect_page_api.py | 10 +- src/redirect/docs/CertificateApi.md | 6 +- src/redirect/docs/CustomRedirect.md | 2 +- src/redirect/docs/CustomRedirectsApi.md | 48 +-- src/redirect/docs/RedirectPageApi.md | 12 +- src/redirect/models/__init__.py | 4 +- ...cate_get_proxy_certificates500_response.py | 4 +- ...et_proxy_certificates500_response_error.py | 4 +- src/redirect/models/custom_redirect.py | 6 +- .../models/custom_redirect_create_response.py | 4 +- .../models/custom_redirect_delete_request.py | 4 +- .../models/custom_redirect_multi_response.py | 4 +- .../models/custom_redirect_read_response.py | 4 +- .../models/custom_redirect_update_response.py | 4 +- ...ects_create_custom_redirect400_response.py | 4 +- ...reate_custom_redirect400_response_error.py | 4 +- ...ects_create_custom_redirect409_response.py | 4 +- ...reate_custom_redirect409_response_error.py | 4 +- ...ects_delete_custom_redirect400_response.py | 4 +- ...elete_custom_redirect400_response_error.py | 4 +- ...lete_single_custom_redirect400_response.py | 4 +- ...ingle_custom_redirect400_response_error.py | 4 +- ...irects_read_custom_redirect404_response.py | 4 +- ..._read_custom_redirect404_response_error.py | 4 +- ...ects_update_custom_redirect409_response.py | 4 +- ...pdate_custom_redirect409_response_error.py | 4 +- .../page_update_redirect_page400_response.py | 4 +- ..._update_redirect_page400_response_error.py | 4 +- src/redirect/models/proxy_cert_response.py | 4 +- src/redirect/models/redirect_page.py | 4 +- .../models/redirect_page_read_response.py | 4 +- .../models/redirect_page_update_response.py | 4 +- .../models/update_redirect_page_payload.py | 4 +- src/redirect/test/test_certificate_api.py | 6 +- .../test/test_custom_redirects_api.py | 6 +- src/redirect/test/test_redirect_page_api.py | 6 +- src/universal_ddi_client/__init__.py | 21 ++ .../api_client.py | 10 +- .../api_client_test.py | 6 +- .../api_response.py | 0 .../configuration.py | 18 +- .../exceptions.py | 0 .../py.typed | 0 .../rest.py | 2 +- src/upgrade_policy/README.md | 6 +- .../api/upgrade_policy_v2_api.py | 6 +- src/upgrade_policy/docs/UpgradePolicyV2Api.md | 56 +-- .../test/test_upgrade_policy_v2_api.py | 2 +- tox.ini | 2 +- 888 files changed, 3196 insertions(+), 3054 deletions(-) delete mode 100644 src/bloxone_client/__init__.py create mode 100644 src/universal_ddi_client/__init__.py rename src/{bloxone_client => universal_ddi_client}/api_client.py (98%) rename src/{bloxone_client => universal_ddi_client}/api_client_test.py (91%) rename src/{bloxone_client => universal_ddi_client}/api_response.py (100%) rename src/{bloxone_client => universal_ddi_client}/configuration.py (93%) rename src/{bloxone_client => universal_ddi_client}/exceptions.py (100%) rename src/{bloxone_client => universal_ddi_client}/py.typed (100%) rename src/{bloxone_client => universal_ddi_client}/rest.py (99%) diff --git a/.github/workflows/python.yml b/.github/workflows/python.yml index 5a9c26c..3e0010a 100644 --- a/.github/workflows/python.yml +++ b/.github/workflows/python.yml @@ -3,7 +3,7 @@ # # ref: https://docs.github.com/en/actions/automating-builds-and-tests/building-and-testing-python -name: bloxone_python_client Python package +name: universal_ddi_python_client Python package on: [push, pull_request] diff --git a/README.md b/README.md index 6c19b58..f687058 100644 --- a/README.md +++ b/README.md @@ -1,43 +1,43 @@ -# Bloxone Python Client +# Universal DDI Python Client -This repository provides a Python Client library for interacting with Infoblox BloxOne APIs. The library is generated using the [OpenAPI Generator](https://openapi-generator.tech) project. +This repository provides a Python Client library for interacting with Infoblox APIs. The library is generated using the [OpenAPI Generator](https://openapi-generator.tech) project. -The following Bloxone APIs are supported: +The following Infoblox APIs are supported: -## Bloxone Cloud -- [Infrastructure Management](infra_mgmt/README.md) -- [Infrastructure Provision (HostActivation API)](infra_provision/README.md) -- [Anycast Configuration Manager](anycast/README.md) +## Infoblox Cloud +- [Infrastructure Management](src/infra_mgmt/README.md) +- [Infrastructure Provision (HostActivation API)](src/infra_provision/README.md) +- [Anycast Configuration Manager](src/anycast/README.md) - [Upgrade Policy](upgradePolicy/README.md) -## Bloxone Threat Defense -- [Threat Defense Cloud (FW API)](fw/README.md) -- [DNS Forwarding Proxy (DFP API)](dfp/README.md) -- [Redirect](redirect/README.md) +## Infoblox Threat Defense +- [Threat Defense Cloud (FW API)](src/fw/README.md) +- [DNS Forwarding Proxy (DFP API)](src/dfp/README.md) +- [Redirect](src/redirect/README.md) ## Universal DDI -- [IP Address Management](ipam/README.md) -- [DNS Configuration](dns_config/README.md) -- [DNS Data](dns_data/README.md) -- [Keys](keys/README.md) -- [Cloud Discovery Providers](cloud_discovery/README.md) -- [IPAM Federation](ipam_federation/README.md) +- [IP Address Management](src/ipam/README.md) +- [DNS Configuration](src/dns_config/README.md) +- [DNS Data](src/dns_data/README.md) +- [Keys](src/keys/README.md) +- [Cloud Discovery Providers](src/cloud_discovery/README.md) +- [IPAM Federation](src/ipam_federation/README.md) ## Installation -To install the Bloxone Python Client, use the following command: +To install the Universal DDI Python Client, use the following command: ```bash -pip install git+https://github.com/infobloxopen/bloxone-python-client +pip install git+https://github.com/infobloxopen/universal-ddi-python-client ``` ## Usage -To use the Bloxone Python Client, you need to import the client and create an instance of the client. For example: +To use the Universal DDI Python Client, you need to import the client and create an instance of the client. For example: ```python -from bloxone_client import ApiClient +from universal_ddi_client import ApiClient client = ApiClient() ``` @@ -45,7 +45,7 @@ client = ApiClient() Additionally , you can also add a custom config to the client. For example: ```python -from bloxone_client import Configuration, ApiClient +from universal_ddi_client import Configuration, ApiClient config = Configuration() @@ -64,10 +64,10 @@ view_api = ViewApi(client) ### Client Name -The client name is used to identify the client in the logs. By default, the client name is set to `bloxone-python-client`. You can change this by creating an instance of Configuration and setting the client name. For example: +The client name is used to identify the client in the logs. By default, the client name is set to `universal-ddi-python-client`. You can change this by creating an instance of Configuration and setting the client name. For example: ```python -from bloxone_client import Configuration +from universal_ddi_client import Configuration config = Configuration( client_name = "my-client", @@ -79,41 +79,41 @@ config = Configuration( The default URL for the Cloud Services Portal is `https://csp.infoblox.com`. If you need to change this, you can create an instance of Configuration and set the URL. For example: ```python -from bloxone_client import Configuration +from universal_ddi_client import Configuration config = Configuration( csp_url = "https://csp.eu.infoblox.com", ) ``` -You can also set the URL using the environment variable `BLOXONE_CSP_URL` +You can also set the URL using the environment variable `INFOBLOX_PORTAL_URL` ### Authorization -An API key is required to access BloxOne API. You can obtain an API key by following the instructions in the guide for [Configuring User API Keys](https://docs.infoblox.com/space/BloxOneCloud/35430405/Configuring+User+API+Keys). +An API key is required to access Infoblox API. You can obtain an API key by following the instructions in the guide for [Configuring User API Keys](https://docs.infoblox.com/space/BloxOneCloud/35430405/Configuring+User+API+Keys). -To use an API key with BloxOne API, you can create a new instance of Configuration . For example: +To use an API key with Infoblox API, you can create a new instance of Configuration . For example: ```python -from bloxone_client import Configuration +from universal_ddi_client import Configuration config = Configuration( api_key = "API_KEY", ) ``` -Alternatively, You can also set the API key using the environment variable `BLOXONE_API_KEY` +Alternatively, You can also set the API key using the environment variable `INFOBLOX_PORTAL_KEY` Note: The API key is a secret and should be handled securely. Hardcoding the API key in your code is not recommended. ### Default Tags -The BloxOne API supports tagging resources. You can set default tags for all resources created using the client. +The Infoblox API supports tagging resources. You can set default tags for all resources created using the client. To set the Default Tags , you can create a new instance of Configuration to set the tags. For example: ```python -from bloxone_client import Configuration +from universal_ddi_client import Configuration config = Configuration( default_tags = { @@ -125,4 +125,4 @@ config = Configuration( ## Support -For support and inquiries, contact Infoblox Support or refer to the official [BloxOne documentation](https://csp.infoblox.com/apidoc). \ No newline at end of file +For support and inquiries, contact Infoblox Support or refer to the official [Universal DDI documentation](https://csp.infoblox.com/apidoc). \ No newline at end of file diff --git a/pyproject.toml b/pyproject.toml index 1025e9c..87aca49 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -1,12 +1,12 @@ [tool.poetry] -name = "bloxone_python_client" +name = "universal_ddi_python_client" version = "0.1.0" -description = "Python Client for Infoblox BloxOne API" +description = "Python Client for Infoblox Universal DDI APIs" authors = ["Infoblox"] license = "Apache-2.0" readme = "README.md" -repository = "https://github.com/infobloxopen/bloxone-python-client" -keywords = ["Infoblox", "BloxOne", "OpenAPI-Generator"] +repository = "https://github.com/infobloxopen/universal-ddi-python-client" +keywords = ["Infoblox", "Universal", "DDI", "OpenAPI-Generator"] [tool.poetry.dependencies] python = "^3.7" diff --git a/setup.py b/setup.py index 237c8a1..0943904 100644 --- a/setup.py +++ b/setup.py @@ -8,7 +8,7 @@ # # prerequisite: setuptools # http://pypi.python.org/pypi/setuptools -NAME = "bloxone-python-client" +NAME = "universal-ddi-python-client" VERSION = "0.1.0" PYTHON_REQUIRES = ">=3.7" REQUIRES = [ @@ -23,10 +23,10 @@ setup( name=NAME, version=VERSION, - description="Python client for the BloxOne API", + description="Python client for the Universal DDI APIs", author="Infoblox", - url="https://github.com/infobloxopen/bloxone-python-client", - keywords=["Infoblox", "BloxOne", "OpenAPI-Generator"], + url="https://github.com/infobloxopen/universal-ddi-python-client", + keywords = ["Infoblox", "Universal", "DDI", "OpenAPI-Generator"], install_requires=REQUIRES, packages=find_packages('src', exclude=["test", "tests"]), package_dir={'': 'src'}, diff --git a/src/.openapi-generator/FILES b/src/.openapi-generator/FILES index 19e9e88..c9bd2f7 100644 --- a/src/.openapi-generator/FILES +++ b/src/.openapi-generator/FILES @@ -1,76 +1,266 @@ -ipam_federation/README.md -ipam_federation/__init__.py -ipam_federation/api/__init__.py -ipam_federation/api/federated_block_api.py -ipam_federation/api/federated_realm_api.py -ipam_federation/api/next_available_federated_block_api.py -ipam_federation/api/next_available_overlapping_block_api.py -ipam_federation/api/next_available_reserved_block_api.py -ipam_federation/api/overlapping_block_api.py -ipam_federation/api/reserved_block_api.py -ipam_federation/docs/Allocation.md -ipam_federation/docs/CreateFederatedBlockResponse.md -ipam_federation/docs/CreateFederatedRealmResponse.md -ipam_federation/docs/CreateNextAvailableFederatedBlockResponse.md -ipam_federation/docs/CreateNextAvailableOverlappingBlockResponse.md -ipam_federation/docs/CreateNextAvailableReservedBlockResponse.md -ipam_federation/docs/CreateOverlappingBlockResponse.md -ipam_federation/docs/CreateReservedBlockResponse.md -ipam_federation/docs/FederatedBlock.md -ipam_federation/docs/FederatedBlockApi.md -ipam_federation/docs/FederatedRealm.md -ipam_federation/docs/FederatedRealmApi.md -ipam_federation/docs/ListFederatedBlockResponse.md -ipam_federation/docs/ListFederatedRealmResponse.md -ipam_federation/docs/ListNextAvailableFederatedBlockResponse.md -ipam_federation/docs/ListNextAvailableOverlappingBlockResponse.md -ipam_federation/docs/ListNextAvailableReservedBlockResponse.md -ipam_federation/docs/ListOverlappingBlockResponse.md -ipam_federation/docs/ListReservedBlockResponse.md -ipam_federation/docs/NextAvailableBlockRequest.md -ipam_federation/docs/NextAvailableFederatedBlockApi.md -ipam_federation/docs/NextAvailableOverlappingBlockApi.md -ipam_federation/docs/NextAvailableReservedBlockApi.md -ipam_federation/docs/OverlappingBlock.md -ipam_federation/docs/OverlappingBlockApi.md -ipam_federation/docs/ReadFederatedBlockResponse.md -ipam_federation/docs/ReadFederatedRealmResponse.md -ipam_federation/docs/ReadOverlappingBlockResponse.md -ipam_federation/docs/ReadReservedBlockResponse.md -ipam_federation/docs/ReservedBlock.md -ipam_federation/docs/ReservedBlockApi.md -ipam_federation/docs/UpdateFederatedBlockResponse.md -ipam_federation/docs/UpdateFederatedRealmResponse.md -ipam_federation/docs/UpdateOverlappingBlockResponse.md -ipam_federation/docs/UpdateReservedBlockResponse.md -ipam_federation/models/__init__.py -ipam_federation/models/allocation.py -ipam_federation/models/create_federated_block_response.py -ipam_federation/models/create_federated_realm_response.py -ipam_federation/models/create_next_available_federated_block_response.py -ipam_federation/models/create_next_available_overlapping_block_response.py -ipam_federation/models/create_next_available_reserved_block_response.py -ipam_federation/models/create_overlapping_block_response.py -ipam_federation/models/create_reserved_block_response.py -ipam_federation/models/federated_block.py -ipam_federation/models/federated_realm.py -ipam_federation/models/list_federated_block_response.py -ipam_federation/models/list_federated_realm_response.py -ipam_federation/models/list_next_available_federated_block_response.py -ipam_federation/models/list_next_available_overlapping_block_response.py -ipam_federation/models/list_next_available_reserved_block_response.py -ipam_federation/models/list_overlapping_block_response.py -ipam_federation/models/list_reserved_block_response.py -ipam_federation/models/next_available_block_request.py -ipam_federation/models/overlapping_block.py -ipam_federation/models/read_federated_block_response.py -ipam_federation/models/read_federated_realm_response.py -ipam_federation/models/read_overlapping_block_response.py -ipam_federation/models/read_reserved_block_response.py -ipam_federation/models/reserved_block.py -ipam_federation/models/update_federated_block_response.py -ipam_federation/models/update_federated_realm_response.py -ipam_federation/models/update_overlapping_block_response.py -ipam_federation/models/update_reserved_block_response.py -ipam_federation/py.typed -ipam_federation/test/__init__.py +dns_config/README.md +dns_config/__init__.py +dns_config/api/__init__.py +dns_config/api/acl_api.py +dns_config/api/auth_nsg_api.py +dns_config/api/auth_zone_api.py +dns_config/api/cache_flush_api.py +dns_config/api/convert_domain_name_api.py +dns_config/api/convert_rname_api.py +dns_config/api/delegation_api.py +dns_config/api/forward_nsg_api.py +dns_config/api/forward_zone_api.py +dns_config/api/global_api.py +dns_config/api/host_api.py +dns_config/api/lbdn_api.py +dns_config/api/server_api.py +dns_config/api/view_api.py +dns_config/docs/ACL.md +dns_config/docs/ACLItem.md +dns_config/docs/AclApi.md +dns_config/docs/AuthNSG.md +dns_config/docs/AuthNsgApi.md +dns_config/docs/AuthZone.md +dns_config/docs/AuthZoneApi.md +dns_config/docs/AuthZoneConfig.md +dns_config/docs/AuthZoneExternalProvider.md +dns_config/docs/AuthZoneInheritance.md +dns_config/docs/BulkCopyError.md +dns_config/docs/BulkCopyResponse.md +dns_config/docs/BulkCopyView.md +dns_config/docs/CacheFlush.md +dns_config/docs/CacheFlushApi.md +dns_config/docs/ConvertDomainName.md +dns_config/docs/ConvertDomainNameApi.md +dns_config/docs/ConvertDomainNameResponse.md +dns_config/docs/ConvertRNameResponse.md +dns_config/docs/ConvertRnameApi.md +dns_config/docs/CopyAuthZone.md +dns_config/docs/CopyAuthZoneResponse.md +dns_config/docs/CopyForwardZone.md +dns_config/docs/CopyForwardZoneResponse.md +dns_config/docs/CopyResponse.md +dns_config/docs/CreateACLResponse.md +dns_config/docs/CreateAuthNSGResponse.md +dns_config/docs/CreateAuthZoneResponse.md +dns_config/docs/CreateDelegationResponse.md +dns_config/docs/CreateForwardNSGResponse.md +dns_config/docs/CreateForwardZoneResponse.md +dns_config/docs/CreateLBDNResponse.md +dns_config/docs/CreateServerResponse.md +dns_config/docs/CreateViewResponse.md +dns_config/docs/CustomRootNSBlock.md +dns_config/docs/DNSGlobal.md +dns_config/docs/DNSSECValidationBlock.md +dns_config/docs/DTCConfig.md +dns_config/docs/DTCPolicy.md +dns_config/docs/Delegation.md +dns_config/docs/DelegationApi.md +dns_config/docs/DelegationServer.md +dns_config/docs/DisplayView.md +dns_config/docs/ECSBlock.md +dns_config/docs/ECSZone.md +dns_config/docs/ExternalPrimary.md +dns_config/docs/ExternalSecondary.md +dns_config/docs/ForwardNSG.md +dns_config/docs/ForwardNsgApi.md +dns_config/docs/ForwardZone.md +dns_config/docs/ForwardZoneApi.md +dns_config/docs/ForwardZoneConfig.md +dns_config/docs/Forwarder.md +dns_config/docs/ForwardersBlock.md +dns_config/docs/GlobalApi.md +dns_config/docs/Host.md +dns_config/docs/HostApi.md +dns_config/docs/HostAssociatedServer.md +dns_config/docs/HostInheritance.md +dns_config/docs/Inheritance2AssignedHost.md +dns_config/docs/Inheritance2InheritedBool.md +dns_config/docs/Inheritance2InheritedString.md +dns_config/docs/Inheritance2InheritedUInt32.md +dns_config/docs/InheritedACLItems.md +dns_config/docs/InheritedCustomRootNSBlock.md +dns_config/docs/InheritedDNSSECValidationBlock.md +dns_config/docs/InheritedDtcConfig.md +dns_config/docs/InheritedECSBlock.md +dns_config/docs/InheritedForwardersBlock.md +dns_config/docs/InheritedKerberosKeys.md +dns_config/docs/InheritedSortListItems.md +dns_config/docs/InheritedZoneAuthority.md +dns_config/docs/InheritedZoneAuthorityMNameBlock.md +dns_config/docs/InternalSecondary.md +dns_config/docs/KerberosKey.md +dns_config/docs/LBDN.md +dns_config/docs/LbdnApi.md +dns_config/docs/ListACLResponse.md +dns_config/docs/ListAuthNSGResponse.md +dns_config/docs/ListAuthZoneResponse.md +dns_config/docs/ListDelegationResponse.md +dns_config/docs/ListForwardNSGResponse.md +dns_config/docs/ListForwardZoneResponse.md +dns_config/docs/ListHostResponse.md +dns_config/docs/ListLBDNResponse.md +dns_config/docs/ListServerResponse.md +dns_config/docs/ListViewResponse.md +dns_config/docs/ReadACLResponse.md +dns_config/docs/ReadAuthNSGResponse.md +dns_config/docs/ReadAuthZoneResponse.md +dns_config/docs/ReadDelegationResponse.md +dns_config/docs/ReadForwardNSGResponse.md +dns_config/docs/ReadForwardZoneResponse.md +dns_config/docs/ReadGlobalResponse.md +dns_config/docs/ReadHostResponse.md +dns_config/docs/ReadLBDNResponse.md +dns_config/docs/ReadServerResponse.md +dns_config/docs/ReadViewResponse.md +dns_config/docs/RootNS.md +dns_config/docs/Server.md +dns_config/docs/ServerApi.md +dns_config/docs/ServerInheritance.md +dns_config/docs/SortListItem.md +dns_config/docs/TSIGKey.md +dns_config/docs/TTLInheritance.md +dns_config/docs/TrustAnchor.md +dns_config/docs/UpdateACLResponse.md +dns_config/docs/UpdateAuthNSGResponse.md +dns_config/docs/UpdateAuthZoneResponse.md +dns_config/docs/UpdateDelegationResponse.md +dns_config/docs/UpdateForwardNSGResponse.md +dns_config/docs/UpdateForwardZoneResponse.md +dns_config/docs/UpdateGlobalResponse.md +dns_config/docs/UpdateHostResponse.md +dns_config/docs/UpdateLBDNResponse.md +dns_config/docs/UpdateServerResponse.md +dns_config/docs/UpdateViewResponse.md +dns_config/docs/View.md +dns_config/docs/ViewApi.md +dns_config/docs/ViewInheritance.md +dns_config/docs/Warning.md +dns_config/docs/ZoneAuthority.md +dns_config/docs/ZoneAuthorityMNameBlock.md +dns_config/models/__init__.py +dns_config/models/acl.py +dns_config/models/acl_item.py +dns_config/models/auth_nsg.py +dns_config/models/auth_zone.py +dns_config/models/auth_zone_config.py +dns_config/models/auth_zone_external_provider.py +dns_config/models/auth_zone_inheritance.py +dns_config/models/bulk_copy_error.py +dns_config/models/bulk_copy_response.py +dns_config/models/bulk_copy_view.py +dns_config/models/cache_flush.py +dns_config/models/convert_domain_name.py +dns_config/models/convert_domain_name_response.py +dns_config/models/convert_r_name_response.py +dns_config/models/copy_auth_zone.py +dns_config/models/copy_auth_zone_response.py +dns_config/models/copy_forward_zone.py +dns_config/models/copy_forward_zone_response.py +dns_config/models/copy_response.py +dns_config/models/create_acl_response.py +dns_config/models/create_auth_nsg_response.py +dns_config/models/create_auth_zone_response.py +dns_config/models/create_delegation_response.py +dns_config/models/create_forward_nsg_response.py +dns_config/models/create_forward_zone_response.py +dns_config/models/create_lbdn_response.py +dns_config/models/create_server_response.py +dns_config/models/create_view_response.py +dns_config/models/custom_root_ns_block.py +dns_config/models/delegation.py +dns_config/models/delegation_server.py +dns_config/models/display_view.py +dns_config/models/dns_global.py +dns_config/models/dnssec_validation_block.py +dns_config/models/dtc_config.py +dns_config/models/dtc_policy.py +dns_config/models/ecs_block.py +dns_config/models/ecs_zone.py +dns_config/models/external_primary.py +dns_config/models/external_secondary.py +dns_config/models/forward_nsg.py +dns_config/models/forward_zone.py +dns_config/models/forward_zone_config.py +dns_config/models/forwarder.py +dns_config/models/forwarders_block.py +dns_config/models/host.py +dns_config/models/host_associated_server.py +dns_config/models/host_inheritance.py +dns_config/models/inheritance2_assigned_host.py +dns_config/models/inheritance2_inherited_bool.py +dns_config/models/inheritance2_inherited_string.py +dns_config/models/inheritance2_inherited_u_int32.py +dns_config/models/inherited_acl_items.py +dns_config/models/inherited_custom_root_ns_block.py +dns_config/models/inherited_dnssec_validation_block.py +dns_config/models/inherited_dtc_config.py +dns_config/models/inherited_ecs_block.py +dns_config/models/inherited_forwarders_block.py +dns_config/models/inherited_kerberos_keys.py +dns_config/models/inherited_sort_list_items.py +dns_config/models/inherited_zone_authority.py +dns_config/models/inherited_zone_authority_m_name_block.py +dns_config/models/internal_secondary.py +dns_config/models/kerberos_key.py +dns_config/models/lbdn.py +dns_config/models/list_acl_response.py +dns_config/models/list_auth_nsg_response.py +dns_config/models/list_auth_zone_response.py +dns_config/models/list_delegation_response.py +dns_config/models/list_forward_nsg_response.py +dns_config/models/list_forward_zone_response.py +dns_config/models/list_host_response.py +dns_config/models/list_lbdn_response.py +dns_config/models/list_server_response.py +dns_config/models/list_view_response.py +dns_config/models/read_acl_response.py +dns_config/models/read_auth_nsg_response.py +dns_config/models/read_auth_zone_response.py +dns_config/models/read_delegation_response.py +dns_config/models/read_forward_nsg_response.py +dns_config/models/read_forward_zone_response.py +dns_config/models/read_global_response.py +dns_config/models/read_host_response.py +dns_config/models/read_lbdn_response.py +dns_config/models/read_server_response.py +dns_config/models/read_view_response.py +dns_config/models/root_ns.py +dns_config/models/server.py +dns_config/models/server_inheritance.py +dns_config/models/sort_list_item.py +dns_config/models/trust_anchor.py +dns_config/models/tsig_key.py +dns_config/models/ttl_inheritance.py +dns_config/models/update_acl_response.py +dns_config/models/update_auth_nsg_response.py +dns_config/models/update_auth_zone_response.py +dns_config/models/update_delegation_response.py +dns_config/models/update_forward_nsg_response.py +dns_config/models/update_forward_zone_response.py +dns_config/models/update_global_response.py +dns_config/models/update_host_response.py +dns_config/models/update_lbdn_response.py +dns_config/models/update_server_response.py +dns_config/models/update_view_response.py +dns_config/models/view.py +dns_config/models/view_inheritance.py +dns_config/models/warning.py +dns_config/models/zone_authority.py +dns_config/models/zone_authority_m_name_block.py +dns_config/py.typed +dns_config/test/__init__.py +dns_config/test/test_acl_api.py +dns_config/test/test_auth_nsg_api.py +dns_config/test/test_auth_zone_api.py +dns_config/test/test_cache_flush_api.py +dns_config/test/test_convert_domain_name_api.py +dns_config/test/test_convert_rname_api.py +dns_config/test/test_delegation_api.py +dns_config/test/test_forward_nsg_api.py +dns_config/test/test_forward_zone_api.py +dns_config/test/test_global_api.py +dns_config/test/test_host_api.py +dns_config/test/test_lbdn_api.py +dns_config/test/test_server_api.py +dns_config/test/test_view_api.py diff --git a/src/anycast/README.md b/src/anycast/README.md index cb71206..fa9c283 100644 --- a/src/anycast/README.md +++ b/src/anycast/README.md @@ -1,12 +1,12 @@ # anycast -Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. +Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The `anycast` package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,14 +36,14 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client diff --git a/src/anycast/__init__.py b/src/anycast/__init__.py index e160bb6..9b67ebf 100644 --- a/src/anycast/__init__.py +++ b/src/anycast/__init__.py @@ -3,9 +3,9 @@ # flake8: noqa """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/api/on_prem_anycast_manager_api.py b/src/anycast/api/on_prem_anycast_manager_api.py index 0c11383..04f8927 100644 --- a/src/anycast/api/on_prem_anycast_manager_api.py +++ b/src/anycast/api/on_prem_anycast_manager_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,9 +29,9 @@ from anycast.models.service_status_update_request import ServiceStatusUpdateRequest from anycast import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class OnPremAnycastManagerApi: diff --git a/src/anycast/docs/OnPremAnycastManagerApi.md b/src/anycast/docs/OnPremAnycastManagerApi.md index 88405c9..652f154 100644 --- a/src/anycast/docs/OnPremAnycastManagerApi.md +++ b/src/anycast/docs/OnPremAnycastManagerApi.md @@ -39,20 +39,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -115,20 +115,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -191,20 +191,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -267,20 +267,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -343,20 +343,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -419,20 +419,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -495,20 +495,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -576,20 +576,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -652,20 +652,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -732,20 +732,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -812,20 +812,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -888,20 +888,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -964,20 +964,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -1040,20 +1040,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -1121,20 +1121,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -1197,20 +1197,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -1275,20 +1275,20 @@ from pprint import pprint import anycast -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/anycast/models/__init__.py b/src/anycast/models/__init__.py index e0d4127..189773c 100644 --- a/src/anycast/models/__init__.py +++ b/src/anycast/models/__init__.py @@ -2,9 +2,9 @@ # flake8: noqa """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/anycast_config.py b/src/anycast/models/anycast_config.py index da9f9e5..054c9d0 100644 --- a/src/anycast/models/anycast_config.py +++ b/src/anycast/models/anycast_config.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/anycast_config_ref.py b/src/anycast/models/anycast_config_ref.py index a714375..6a45d0c 100644 --- a/src/anycast/models/anycast_config_ref.py +++ b/src/anycast/models/anycast_config_ref.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/anycast_config_response.py b/src/anycast/models/anycast_config_response.py index dc68384..6710a70 100644 --- a/src/anycast/models/anycast_config_response.py +++ b/src/anycast/models/anycast_config_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/anycast_version.py b/src/anycast/models/anycast_version.py index 54f3a43..ae10fcf 100644 --- a/src/anycast/models/anycast_version.py +++ b/src/anycast/models/anycast_version.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/bgp_config.py b/src/anycast/models/bgp_config.py index a84177b..04e12c1 100644 --- a/src/anycast/models/bgp_config.py +++ b/src/anycast/models/bgp_config.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/bgp_neighbor.py b/src/anycast/models/bgp_neighbor.py index 13def11..a1e743c 100644 --- a/src/anycast/models/bgp_neighbor.py +++ b/src/anycast/models/bgp_neighbor.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/get_anycast_config_list_response.py b/src/anycast/models/get_anycast_config_list_response.py index 2042746..bf66c13 100644 --- a/src/anycast/models/get_anycast_config_list_response.py +++ b/src/anycast/models/get_anycast_config_list_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/onprem_host.py b/src/anycast/models/onprem_host.py index b1ff946..da57fa4 100644 --- a/src/anycast/models/onprem_host.py +++ b/src/anycast/models/onprem_host.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/onprem_host_ref.py b/src/anycast/models/onprem_host_ref.py index 088ace6..4558154 100644 --- a/src/anycast/models/onprem_host_ref.py +++ b/src/anycast/models/onprem_host_ref.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/onprem_host_response.py b/src/anycast/models/onprem_host_response.py index f2a7658..bce0ece 100644 --- a/src/anycast/models/onprem_host_response.py +++ b/src/anycast/models/onprem_host_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/ospf_config.py b/src/anycast/models/ospf_config.py index 3328234..f496489 100644 --- a/src/anycast/models/ospf_config.py +++ b/src/anycast/models/ospf_config.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/ospfv3_config.py b/src/anycast/models/ospfv3_config.py index 09357d8..7b3f6a5 100644 --- a/src/anycast/models/ospfv3_config.py +++ b/src/anycast/models/ospfv3_config.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/protobuf_field_mask.py b/src/anycast/models/protobuf_field_mask.py index db72f75..0af787e 100644 --- a/src/anycast/models/protobuf_field_mask.py +++ b/src/anycast/models/protobuf_field_mask.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/service_config.py b/src/anycast/models/service_config.py index 1648c6b..f1ec4a4 100644 --- a/src/anycast/models/service_config.py +++ b/src/anycast/models/service_config.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/service_config_object.py b/src/anycast/models/service_config_object.py index 222c3e7..f86aeee 100644 --- a/src/anycast/models/service_config_object.py +++ b/src/anycast/models/service_config_object.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/service_status_code.py b/src/anycast/models/service_status_code.py index 111b6fa..ce1c4cf 100644 --- a/src/anycast/models/service_status_code.py +++ b/src/anycast/models/service_status_code.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/models/service_status_update_request.py b/src/anycast/models/service_status_update_request.py index 60529eb..d4f0c05 100644 --- a/src/anycast/models/service_status_update_request.py +++ b/src/anycast/models/service_status_update_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/anycast/test/test_on_prem_anycast_manager_api.py b/src/anycast/test/test_on_prem_anycast_manager_api.py index c65bef6..fd344ad 100644 --- a/src/anycast/test/test_on_prem_anycast_manager_api.py +++ b/src/anycast/test/test_on_prem_anycast_manager_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Anycast API + Universal DDI Anycast API - Anycast capability enables HA (High Availability) configuration of BloxOne applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. + Anycast capability enables HA (High Availability) configuration of Universal DDI applications that run on equipment located on customer's premises (on-prem hosts). Anycast supports DNS, as well as DNS-forwarding services. Anycast-enabled application setups use multiple on-premises installations for one particular application type. Multiple application instances are configured to use the same endpoint address. Anycast capability is collocated with such application instance, monitoring the local application instance and advertising to the upstream router (a customer equipment) a per-instance, local route to the common application endpoint address, as long as the local application instance is available. Depending on the type of the upstream router, the customer may configure local route advertisement via either BGP (Boarder Gateway Protocol) or OSPF (Open Shortest Path First) routing protocols. Both protocols may be enabled as well. Multiple routes to the common application service address provide redundancy without the need to reconfigure application clients. Should an application instance become unavailable, the local route advertisements stop, resulting in withdrawal of the route (in the upstream router) to the application instance that has gone out of service and ensuring that subsequent application requests thus get routed to the remaining available application instances. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from anycast.api.on_prem_anycast_manager_api import OnPremAnycastManagerApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestOnPremAnycastManagerApi(unittest.TestCase): diff --git a/src/bloxone_client/__init__.py b/src/bloxone_client/__init__.py deleted file mode 100644 index c2c4bc8..0000000 --- a/src/bloxone_client/__init__.py +++ /dev/null @@ -1,21 +0,0 @@ -__version__ = "0.1.0" - -# import ApiClient -from bloxone_client.api_response import ApiResponse -from bloxone_client.api_client import RequestSerialized -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration -from bloxone_client.exceptions import OpenApiException -from bloxone_client.exceptions import ApiTypeError -from bloxone_client.exceptions import ApiValueError -from bloxone_client.exceptions import ApiKeyError -from bloxone_client.exceptions import ApiAttributeError -from bloxone_client.exceptions import ApiException -from bloxone_client.exceptions import BadRequestException -from bloxone_client.exceptions import NotFoundException -from bloxone_client.exceptions import UnauthorizedException -from bloxone_client.exceptions import ForbiddenException -from bloxone_client.exceptions import ServiceException -from bloxone_client.rest import RESTResponse -from bloxone_client.rest import RESTClientObject -from bloxone_client.rest import RESTResponseType diff --git a/src/cloud_discovery/README.md b/src/cloud_discovery/README.md index ff82905..cf26521 100644 --- a/src/cloud_discovery/README.md +++ b/src/cloud_discovery/README.md @@ -1,12 +1,12 @@ # cloud-discovery -The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** +The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The `cloud_discovery` package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: v2 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,14 +36,14 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client diff --git a/src/cloud_discovery/__init__.py b/src/cloud_discovery/__init__.py index 3980e64..528b14c 100644 --- a/src/cloud_discovery/__init__.py +++ b/src/cloud_discovery/__init__.py @@ -5,7 +5,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/api/accounts_api.py b/src/cloud_discovery/api/accounts_api.py index 1d55756..4988a4b 100644 --- a/src/cloud_discovery/api/accounts_api.py +++ b/src/cloud_discovery/api/accounts_api.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -22,9 +22,9 @@ from cloud_discovery.models.account_list_response import AccountListResponse from cloud_discovery import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class AccountsApi: diff --git a/src/cloud_discovery/api/providers_api.py b/src/cloud_discovery/api/providers_api.py index 1e5aa5c..04dc7fd 100644 --- a/src/cloud_discovery/api/providers_api.py +++ b/src/cloud_discovery/api/providers_api.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from cloud_discovery.models.provider_update_response import ProviderUpdateResponse from cloud_discovery import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ProvidersApi: diff --git a/src/cloud_discovery/api/sub_accounts_api.py b/src/cloud_discovery/api/sub_accounts_api.py index 73cdbc1..216b2a2 100644 --- a/src/cloud_discovery/api/sub_accounts_api.py +++ b/src/cloud_discovery/api/sub_accounts_api.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,9 +20,9 @@ from cloud_discovery.models.sub_account_list_response_v2 import SubAccountListResponseV2 from cloud_discovery import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class SubAccountsApi: diff --git a/src/cloud_discovery/docs/AccountsApi.md b/src/cloud_discovery/docs/AccountsApi.md index 6a54a1c..2e3c0ae 100644 --- a/src/cloud_discovery/docs/AccountsApi.md +++ b/src/cloud_discovery/docs/AccountsApi.md @@ -23,20 +23,20 @@ from pprint import pprint import cloud_discovery -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/cloud_discovery/docs/ProvidersApi.md b/src/cloud_discovery/docs/ProvidersApi.md index d6867d5..f46ce0d 100644 --- a/src/cloud_discovery/docs/ProvidersApi.md +++ b/src/cloud_discovery/docs/ProvidersApi.md @@ -27,20 +27,20 @@ from pprint import pprint import cloud_discovery -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import cloud_discovery -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import cloud_discovery -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import cloud_discovery -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import cloud_discovery -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/cloud_discovery/docs/SubAccountsApi.md b/src/cloud_discovery/docs/SubAccountsApi.md index 805c2e6..055b0d2 100644 --- a/src/cloud_discovery/docs/SubAccountsApi.md +++ b/src/cloud_discovery/docs/SubAccountsApi.md @@ -23,20 +23,20 @@ from pprint import pprint import cloud_discovery -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/cloud_discovery/models/__init__.py b/src/cloud_discovery/models/__init__.py index dd02183..8239a10 100644 --- a/src/cloud_discovery/models/__init__.py +++ b/src/cloud_discovery/models/__init__.py @@ -4,7 +4,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/account.py b/src/cloud_discovery/models/account.py index 625b269..c6e739c 100644 --- a/src/cloud_discovery/models/account.py +++ b/src/cloud_discovery/models/account.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/account_list_response.py b/src/cloud_discovery/models/account_list_response.py index 226490a..dc23197 100644 --- a/src/cloud_discovery/models/account_list_response.py +++ b/src/cloud_discovery/models/account_list_response.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/additional_config.py b/src/cloud_discovery/models/additional_config.py index aa5e2e6..1106cd3 100644 --- a/src/cloud_discovery/models/additional_config.py +++ b/src/cloud_discovery/models/additional_config.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/api_page_info.py b/src/cloud_discovery/models/api_page_info.py index 626798a..116e9e0 100644 --- a/src/cloud_discovery/models/api_page_info.py +++ b/src/cloud_discovery/models/api_page_info.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/category.py b/src/cloud_discovery/models/category.py index 168466f..6d796ae 100644 --- a/src/cloud_discovery/models/category.py +++ b/src/cloud_discovery/models/category.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/credential_config.py b/src/cloud_discovery/models/credential_config.py index 72e5c18..f9aef36 100644 --- a/src/cloud_discovery/models/credential_config.py +++ b/src/cloud_discovery/models/credential_config.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/credential_preference.py b/src/cloud_discovery/models/credential_preference.py index fc1429c..9eb74bb 100644 --- a/src/cloud_discovery/models/credential_preference.py +++ b/src/cloud_discovery/models/credential_preference.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/destination.py b/src/cloud_discovery/models/destination.py index b989d57..ffceda0 100644 --- a/src/cloud_discovery/models/destination.py +++ b/src/cloud_discovery/models/destination.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/destination_config.py b/src/cloud_discovery/models/destination_config.py index 1039336..ecc9cdb 100644 --- a/src/cloud_discovery/models/destination_config.py +++ b/src/cloud_discovery/models/destination_config.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/discovery_config.py b/src/cloud_discovery/models/discovery_config.py index 5b4280c..b42b44e 100644 --- a/src/cloud_discovery/models/discovery_config.py +++ b/src/cloud_discovery/models/discovery_config.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/dns_config.py b/src/cloud_discovery/models/dns_config.py index 5383092..d2f0a62 100644 --- a/src/cloud_discovery/models/dns_config.py +++ b/src/cloud_discovery/models/dns_config.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/ipam_config.py b/src/cloud_discovery/models/ipam_config.py index e9a88e5..4faff06 100644 --- a/src/cloud_discovery/models/ipam_config.py +++ b/src/cloud_discovery/models/ipam_config.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/object.py b/src/cloud_discovery/models/object.py index 6d50142..dce70ee 100644 --- a/src/cloud_discovery/models/object.py +++ b/src/cloud_discovery/models/object.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/object_type.py b/src/cloud_discovery/models/object_type.py index 88da07d..765505f 100644 --- a/src/cloud_discovery/models/object_type.py +++ b/src/cloud_discovery/models/object_type.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/provider_create_response.py b/src/cloud_discovery/models/provider_create_response.py index 1c8658e..3983487 100644 --- a/src/cloud_discovery/models/provider_create_response.py +++ b/src/cloud_discovery/models/provider_create_response.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/provider_list_response.py b/src/cloud_discovery/models/provider_list_response.py index 511d7e9..836565f 100644 --- a/src/cloud_discovery/models/provider_list_response.py +++ b/src/cloud_discovery/models/provider_list_response.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/provider_read_response.py b/src/cloud_discovery/models/provider_read_response.py index 5fb77bb..359725d 100644 --- a/src/cloud_discovery/models/provider_read_response.py +++ b/src/cloud_discovery/models/provider_read_response.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/provider_update_response.py b/src/cloud_discovery/models/provider_update_response.py index 097c978..90fb23b 100644 --- a/src/cloud_discovery/models/provider_update_response.py +++ b/src/cloud_discovery/models/provider_update_response.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/resource.py b/src/cloud_discovery/models/resource.py index cfa2468..01af239 100644 --- a/src/cloud_discovery/models/resource.py +++ b/src/cloud_discovery/models/resource.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/source_config.py b/src/cloud_discovery/models/source_config.py index 1b5b813..8b225b4 100644 --- a/src/cloud_discovery/models/source_config.py +++ b/src/cloud_discovery/models/source_config.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/sub_account_list_request_v2.py b/src/cloud_discovery/models/sub_account_list_request_v2.py index 6ec1de3..4c5aa17 100644 --- a/src/cloud_discovery/models/sub_account_list_request_v2.py +++ b/src/cloud_discovery/models/sub_account_list_request_v2.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/sub_account_list_response_v2.py b/src/cloud_discovery/models/sub_account_list_response_v2.py index 21c36f2..77d70c3 100644 --- a/src/cloud_discovery/models/sub_account_list_response_v2.py +++ b/src/cloud_discovery/models/sub_account_list_response_v2.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/sub_account_prov_cred_config.py b/src/cloud_discovery/models/sub_account_prov_cred_config.py index d9c972c..358f5ec 100644 --- a/src/cloud_discovery/models/sub_account_prov_cred_config.py +++ b/src/cloud_discovery/models/sub_account_prov_cred_config.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/models/sub_account_v2.py b/src/cloud_discovery/models/sub_account_v2.py index 43ddec1..3b7ee65 100644 --- a/src/cloud_discovery/models/sub_account_v2.py +++ b/src/cloud_discovery/models/sub_account_v2.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/cloud_discovery/test/test_accounts_api.py b/src/cloud_discovery/test/test_accounts_api.py index 35cf4fa..2d23d4e 100644 --- a/src/cloud_discovery/test/test_accounts_api.py +++ b/src/cloud_discovery/test/test_accounts_api.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from cloud_discovery.api.accounts_api import AccountsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestAccountsApi(unittest.TestCase): diff --git a/src/cloud_discovery/test/test_providers_api.py b/src/cloud_discovery/test/test_providers_api.py index 50d9f48..0e8d8f9 100644 --- a/src/cloud_discovery/test/test_providers_api.py +++ b/src/cloud_discovery/test/test_providers_api.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from cloud_discovery.api.providers_api import ProvidersApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestProvidersApi(unittest.TestCase): diff --git a/src/cloud_discovery/test/test_sub_accounts_api.py b/src/cloud_discovery/test/test_sub_accounts_api.py index d94c2cf..bad1757 100644 --- a/src/cloud_discovery/test/test_sub_accounts_api.py +++ b/src/cloud_discovery/test/test_sub_accounts_api.py @@ -3,7 +3,7 @@ """ Discovery Configuration API V2 - The Discovery configuration service is a BloxOne Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** + The Discovery configuration service is a Universal DDI Service that provides configuration for accessing and syncing the Cloud assets Base Paths: 1. provider: **/api/cloud_discovery/v2/** The version of the OpenAPI document: v2 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from cloud_discovery.api.sub_accounts_api import SubAccountsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestSubAccountsApi(unittest.TestCase): diff --git a/src/dfp/README.md b/src/dfp/README.md index 4976e4e..98c849a 100644 --- a/src/dfp/README.md +++ b/src/dfp/README.md @@ -1,12 +1,12 @@ # dfp -BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. +Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The `dfp` package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,7 +36,7 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/dfp/__init__.py b/src/dfp/__init__.py index 0bcdf8c..ce126ee 100644 --- a/src/dfp/__init__.py +++ b/src/dfp/__init__.py @@ -5,7 +5,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/api/accounts_api.py b/src/dfp/api/accounts_api.py index 763a624..f25e850 100644 --- a/src/dfp/api/accounts_api.py +++ b/src/dfp/api/accounts_api.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,9 +20,9 @@ from dfp.models.types_config_check_response import TypesConfigCheckResponse from dfp import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class AccountsApi: diff --git a/src/dfp/api/infra_services_api.py b/src/dfp/api/infra_services_api.py index a1d72c2..58f021c 100644 --- a/src/dfp/api/infra_services_api.py +++ b/src/dfp/api/infra_services_api.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ from dfp.models.dfp_read_response import DfpReadResponse from dfp import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class InfraServicesApi: diff --git a/src/dfp/docs/AccountsApi.md b/src/dfp/docs/AccountsApi.md index 53018be..8774f14 100644 --- a/src/dfp/docs/AccountsApi.md +++ b/src/dfp/docs/AccountsApi.md @@ -22,13 +22,13 @@ from pprint import pprint import dfp -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/dfp/docs/DfpCreateOrUpdatePayload.md b/src/dfp/docs/DfpCreateOrUpdatePayload.md index d709525..c148c2d 100644 --- a/src/dfp/docs/DfpCreateOrUpdatePayload.md +++ b/src/dfp/docs/DfpCreateOrUpdatePayload.md @@ -1,6 +1,6 @@ # DfpCreateOrUpdatePayload -DNS Forwarding Proxy object. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. Note that DNS Forwarding Proxy cannot be created (all information regarding DFP is synchronized from hostapp service). +DNS Forwarding Proxy object. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. Note that DNS Forwarding Proxy cannot be created (all information regarding DFP is synchronized from hostapp service). ## Properties diff --git a/src/dfp/docs/InfraServicesApi.md b/src/dfp/docs/InfraServicesApi.md index b245e47..550361f 100644 --- a/src/dfp/docs/InfraServicesApi.md +++ b/src/dfp/docs/InfraServicesApi.md @@ -24,13 +24,13 @@ from pprint import pprint import dfp -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -99,13 +99,13 @@ from pprint import pprint import dfp -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -173,13 +173,13 @@ from pprint import pprint import dfp -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/dfp/docs/Resolver.md b/src/dfp/docs/Resolver.md index f7e939b..47e6e9c 100644 --- a/src/dfp/docs/Resolver.md +++ b/src/dfp/docs/Resolver.md @@ -6,7 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **address** | **str** | address that can be used as resolver | [optional] -**is_fallback** | **bool** | Mark it true to set default DNS resolvers that will be used in case if the BloxOne Cloud is unreachable. | [optional] +**is_fallback** | **bool** | Mark it true to set default DNS resolvers that will be used in case if the Infoblox Cloud is unreachable. | [optional] **is_local** | **bool** | Mark it true to set internal or local DNS servers' IPv4 or IPv6 addresses that are used as DNS resolvers | [optional] **protocols** | [**List[DNSProtocol]**](DNSProtocol.md) | The list of DNS resolver communication protocols. | [optional] diff --git a/src/dfp/models/__init__.py b/src/dfp/models/__init__.py index 8d0ef45..e340f20 100644 --- a/src/dfp/models/__init__.py +++ b/src/dfp/models/__init__.py @@ -4,7 +4,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/dfp.py b/src/dfp/models/dfp.py index fde3947..de9ac10 100644 --- a/src/dfp/models/dfp.py +++ b/src/dfp/models/dfp.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/dfp_create_or_update_payload.py b/src/dfp/models/dfp_create_or_update_payload.py index 70e28c1..5d85ae1 100644 --- a/src/dfp/models/dfp_create_or_update_payload.py +++ b/src/dfp/models/dfp_create_or_update_payload.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class DfpCreateOrUpdatePayload(BaseModel): """ - DNS Forwarding Proxy object. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. Note that DNS Forwarding Proxy cannot be created (all information regarding DFP is synchronized from hostapp service). + DNS Forwarding Proxy object. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. Note that DNS Forwarding Proxy cannot be created (all information regarding DFP is synchronized from hostapp service). """ # noqa: E501 forwarding_policy: Optional[StrictStr] = Field( default=None, diff --git a/src/dfp/models/dfp_create_or_update_response.py b/src/dfp/models/dfp_create_or_update_response.py index 913512a..26e2d7f 100644 --- a/src/dfp/models/dfp_create_or_update_response.py +++ b/src/dfp/models/dfp_create_or_update_response.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/dfp_host.py b/src/dfp/models/dfp_host.py index 7e38f84..47b25ff 100644 --- a/src/dfp/models/dfp_host.py +++ b/src/dfp/models/dfp_host.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/dfp_list_response.py b/src/dfp/models/dfp_list_response.py index 30117e2..5f496aa 100644 --- a/src/dfp/models/dfp_list_response.py +++ b/src/dfp/models/dfp_list_response.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/dfp_read_response.py b/src/dfp/models/dfp_read_response.py index 15e6a29..03aaec6 100644 --- a/src/dfp/models/dfp_read_response.py +++ b/src/dfp/models/dfp_read_response.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/dns_protocol.py b/src/dfp/models/dns_protocol.py index a48863e..106b47e 100644 --- a/src/dfp/models/dns_protocol.py +++ b/src/dfp/models/dns_protocol.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/infra_services_create_or_update_dfp_service400_response.py b/src/dfp/models/infra_services_create_or_update_dfp_service400_response.py index 1b4ba3a..b89f728 100644 --- a/src/dfp/models/infra_services_create_or_update_dfp_service400_response.py +++ b/src/dfp/models/infra_services_create_or_update_dfp_service400_response.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/infra_services_create_or_update_dfp_service400_response_error.py b/src/dfp/models/infra_services_create_or_update_dfp_service400_response_error.py index 829aac8..ebd663d 100644 --- a/src/dfp/models/infra_services_create_or_update_dfp_service400_response_error.py +++ b/src/dfp/models/infra_services_create_or_update_dfp_service400_response_error.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/infra_services_create_or_update_dfp_service404_response.py b/src/dfp/models/infra_services_create_or_update_dfp_service404_response.py index 9089944..b95dce6 100644 --- a/src/dfp/models/infra_services_create_or_update_dfp_service404_response.py +++ b/src/dfp/models/infra_services_create_or_update_dfp_service404_response.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/infra_services_create_or_update_dfp_service404_response_error.py b/src/dfp/models/infra_services_create_or_update_dfp_service404_response_error.py index 2e32c6d..2fb6754 100644 --- a/src/dfp/models/infra_services_create_or_update_dfp_service404_response_error.py +++ b/src/dfp/models/infra_services_create_or_update_dfp_service404_response_error.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/infra_services_list_dfp_services500_response.py b/src/dfp/models/infra_services_list_dfp_services500_response.py index c3cac19..eb82d18 100644 --- a/src/dfp/models/infra_services_list_dfp_services500_response.py +++ b/src/dfp/models/infra_services_list_dfp_services500_response.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/infra_services_list_dfp_services500_response_error.py b/src/dfp/models/infra_services_list_dfp_services500_response_error.py index 981ff7b..61c19dd 100644 --- a/src/dfp/models/infra_services_list_dfp_services500_response_error.py +++ b/src/dfp/models/infra_services_list_dfp_services500_response_error.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/net_addr_policy_assignment.py b/src/dfp/models/net_addr_policy_assignment.py index cf7262e..00adcde 100644 --- a/src/dfp/models/net_addr_policy_assignment.py +++ b/src/dfp/models/net_addr_policy_assignment.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/resolver.py b/src/dfp/models/resolver.py index f604d0d..daee7bd 100644 --- a/src/dfp/models/resolver.py +++ b/src/dfp/models/resolver.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -34,7 +34,7 @@ class Resolver(BaseModel): is_fallback: Optional[StrictBool] = Field( default=None, description= - "Mark it true to set default DNS resolvers that will be used in case if the BloxOne Cloud is unreachable." + "Mark it true to set default DNS resolvers that will be used in case if the Infoblox Cloud is unreachable." ) is_local: Optional[StrictBool] = Field( default=None, diff --git a/src/dfp/models/types_config_check_request.py b/src/dfp/models/types_config_check_request.py index acd8ee4..d1be118 100644 --- a/src/dfp/models/types_config_check_request.py +++ b/src/dfp/models/types_config_check_request.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/types_config_check_response.py b/src/dfp/models/types_config_check_response.py index bb8567e..f1d76cf 100644 --- a/src/dfp/models/types_config_check_response.py +++ b/src/dfp/models/types_config_check_response.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/models/types_config_check_result.py b/src/dfp/models/types_config_check_result.py index e30813a..9513971 100644 --- a/src/dfp/models/types_config_check_result.py +++ b/src/dfp/models/types_config_check_result.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dfp/test/test_accounts_api.py b/src/dfp/test/test_accounts_api.py index 12bb404..8517af6 100644 --- a/src/dfp/test/test_accounts_api.py +++ b/src/dfp/test/test_accounts_api.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dfp.api.accounts_api import AccountsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestAccountsApi(unittest.TestCase): diff --git a/src/dfp/test/test_infra_services_api.py b/src/dfp/test/test_infra_services_api.py index 7f394b6..fc80d77 100644 --- a/src/dfp/test/test_infra_services_api.py +++ b/src/dfp/test/test_infra_services_api.py @@ -3,7 +3,7 @@ """ DFP API - BloxOne Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the BloxOne Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to BloxOne Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that BloxOne Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows BloxOne Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. + Infoblox Cloud is a SaaS offering designed to provide protection to devices on and off-premises, including roaming, remote, and branch offices. It provides visibility into infected and compromised devices, prevents DNS-based data exfiltration, and automatically stops device communications with command-and-control servers (C&Cs) and botnets, in addition to providing recursive DNS services in the cloud. You can access the services by deploying the Infoblox Endpoint agent or the DNS forwarding proxy. For remote office deployments or in cases where installing an endpoint agent is not desirable or possible, you can use the DNS forwarding proxy. It is a software that runs on bare-metal, VM infrastructures, or Infoblox NIOS appliances; and it embeds the client IPs in DNS queries before forwarding them to Infoblox Cloud. The communications are encrypted and client visibility is maintained. The proxy also provides DNS resolution to local DNS zones when you configure local resolvers. Once you set up a DNS forwarding proxy, it becomes the main DNS server for your remote site. It will also cache responses to speed resolution of future queries. By implementing the DNS forwarding proxy, you can rest assured that Infoblox Cloud effectively enforces DNS client-based security policies at your remote sites. On-premises devices that send DNS queries reveal their actual client IP addresses (instead of their NAT IP address), which allows Infoblox Cloud to apply the security policies applicable to the respective endpoints and identify infected clients. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dfp.api.infra_services_api import InfraServicesApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestInfraServicesApi(unittest.TestCase): diff --git a/src/dns_config/README.md b/src/dns_config/README.md index 0d829b1..9d0e03d 100644 --- a/src/dns_config/README.md +++ b/src/dns_config/README.md @@ -1,12 +1,12 @@ # dns-config -The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. +The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The `dns_config` package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,14 +36,14 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client diff --git a/src/dns_config/__init__.py b/src/dns_config/__init__.py index 6bb458f..9a015b9 100644 --- a/src/dns_config/__init__.py +++ b/src/dns_config/__init__.py @@ -5,7 +5,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/api/acl_api.py b/src/dns_config/api/acl_api.py index ceb9f71..7d3c840 100644 --- a/src/dns_config/api/acl_api.py +++ b/src/dns_config/api/acl_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from dns_config.models.update_acl_response import UpdateACLResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class AclApi: diff --git a/src/dns_config/api/auth_nsg_api.py b/src/dns_config/api/auth_nsg_api.py index 982f634..c864b75 100644 --- a/src/dns_config/api/auth_nsg_api.py +++ b/src/dns_config/api/auth_nsg_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from dns_config.models.update_auth_nsg_response import UpdateAuthNSGResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class AuthNsgApi: diff --git a/src/dns_config/api/auth_zone_api.py b/src/dns_config/api/auth_zone_api.py index 237c2dd..d42650e 100644 --- a/src/dns_config/api/auth_zone_api.py +++ b/src/dns_config/api/auth_zone_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,9 +28,9 @@ from dns_config.models.update_auth_zone_response import UpdateAuthZoneResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class AuthZoneApi: diff --git a/src/dns_config/api/cache_flush_api.py b/src/dns_config/api/cache_flush_api.py index a2043a2..bb789ec 100644 --- a/src/dns_config/api/cache_flush_api.py +++ b/src/dns_config/api/cache_flush_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,9 +20,9 @@ from dns_config.models.cache_flush import CacheFlush from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class CacheFlushApi: diff --git a/src/dns_config/api/convert_domain_name_api.py b/src/dns_config/api/convert_domain_name_api.py index e843ca4..c3881c1 100644 --- a/src/dns_config/api/convert_domain_name_api.py +++ b/src/dns_config/api/convert_domain_name_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -21,9 +21,9 @@ from dns_config.models.convert_domain_name_response import ConvertDomainNameResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ConvertDomainNameApi: diff --git a/src/dns_config/api/convert_rname_api.py b/src/dns_config/api/convert_rname_api.py index 5ae204d..a5b2b11 100644 --- a/src/dns_config/api/convert_rname_api.py +++ b/src/dns_config/api/convert_rname_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -21,9 +21,9 @@ from dns_config.models.convert_r_name_response import ConvertRNameResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ConvertRnameApi: diff --git a/src/dns_config/api/delegation_api.py b/src/dns_config/api/delegation_api.py index bebd97d..8c436a0 100644 --- a/src/dns_config/api/delegation_api.py +++ b/src/dns_config/api/delegation_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from dns_config.models.update_delegation_response import UpdateDelegationResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class DelegationApi: diff --git a/src/dns_config/api/forward_nsg_api.py b/src/dns_config/api/forward_nsg_api.py index 8ed31fb..8da5c39 100644 --- a/src/dns_config/api/forward_nsg_api.py +++ b/src/dns_config/api/forward_nsg_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from dns_config.models.update_forward_nsg_response import UpdateForwardNSGResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ForwardNsgApi: diff --git a/src/dns_config/api/forward_zone_api.py b/src/dns_config/api/forward_zone_api.py index 0dc8e7a..d647dd0 100644 --- a/src/dns_config/api/forward_zone_api.py +++ b/src/dns_config/api/forward_zone_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,9 +28,9 @@ from dns_config.models.update_forward_zone_response import UpdateForwardZoneResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ForwardZoneApi: diff --git a/src/dns_config/api/global_api.py b/src/dns_config/api/global_api.py index 2cb57f6..0908032 100644 --- a/src/dns_config/api/global_api.py +++ b/src/dns_config/api/global_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -24,9 +24,9 @@ from dns_config.models.update_global_response import UpdateGlobalResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class GlobalApi: diff --git a/src/dns_config/api/host_api.py b/src/dns_config/api/host_api.py index ebacd53..ef24edf 100644 --- a/src/dns_config/api/host_api.py +++ b/src/dns_config/api/host_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ from dns_config.models.update_host_response import UpdateHostResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class HostApi: diff --git a/src/dns_config/api/lbdn_api.py b/src/dns_config/api/lbdn_api.py index e60b04d..33ae74b 100644 --- a/src/dns_config/api/lbdn_api.py +++ b/src/dns_config/api/lbdn_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from dns_config.models.update_lbdn_response import UpdateLBDNResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class LbdnApi: diff --git a/src/dns_config/api/server_api.py b/src/dns_config/api/server_api.py index 0d0ae56..62a2857 100644 --- a/src/dns_config/api/server_api.py +++ b/src/dns_config/api/server_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from dns_config.models.update_server_response import UpdateServerResponse from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ServerApi: diff --git a/src/dns_config/api/view_api.py b/src/dns_config/api/view_api.py index 9b28101..9a33148 100644 --- a/src/dns_config/api/view_api.py +++ b/src/dns_config/api/view_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,9 +28,9 @@ from dns_config.models.view import View from dns_config import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ViewApi: diff --git a/src/dns_config/docs/AclApi.md b/src/dns_config/docs/AclApi.md index 4bab93d..8f76c81 100644 --- a/src/dns_config/docs/AclApi.md +++ b/src/dns_config/docs/AclApi.md @@ -27,20 +27,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/AuthNsgApi.md b/src/dns_config/docs/AuthNsgApi.md index b7978d9..a6be9a7 100644 --- a/src/dns_config/docs/AuthNsgApi.md +++ b/src/dns_config/docs/AuthNsgApi.md @@ -27,20 +27,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/AuthZoneApi.md b/src/dns_config/docs/AuthZoneApi.md index e577cbf..cca79c4 100644 --- a/src/dns_config/docs/AuthZoneApi.md +++ b/src/dns_config/docs/AuthZoneApi.md @@ -28,20 +28,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -104,20 +104,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -181,20 +181,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -255,20 +255,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -338,20 +338,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -416,20 +416,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/CacheFlushApi.md b/src/dns_config/docs/CacheFlushApi.md index 68adc62..1f84395 100644 --- a/src/dns_config/docs/CacheFlushApi.md +++ b/src/dns_config/docs/CacheFlushApi.md @@ -23,20 +23,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/ConvertDomainNameApi.md b/src/dns_config/docs/ConvertDomainNameApi.md index fb92958..fe9a0d2 100644 --- a/src/dns_config/docs/ConvertDomainNameApi.md +++ b/src/dns_config/docs/ConvertDomainNameApi.md @@ -23,20 +23,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/ConvertRnameApi.md b/src/dns_config/docs/ConvertRnameApi.md index 296c7bb..b836fc0 100644 --- a/src/dns_config/docs/ConvertRnameApi.md +++ b/src/dns_config/docs/ConvertRnameApi.md @@ -23,20 +23,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/DelegationApi.md b/src/dns_config/docs/DelegationApi.md index 1167c6c..6f984f9 100644 --- a/src/dns_config/docs/DelegationApi.md +++ b/src/dns_config/docs/DelegationApi.md @@ -27,20 +27,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/ForwardNsgApi.md b/src/dns_config/docs/ForwardNsgApi.md index f421929..50eac61 100644 --- a/src/dns_config/docs/ForwardNsgApi.md +++ b/src/dns_config/docs/ForwardNsgApi.md @@ -27,20 +27,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/ForwardZoneApi.md b/src/dns_config/docs/ForwardZoneApi.md index babd2e3..e25c979 100644 --- a/src/dns_config/docs/ForwardZoneApi.md +++ b/src/dns_config/docs/ForwardZoneApi.md @@ -28,20 +28,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -104,20 +104,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -180,20 +180,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -254,20 +254,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -413,20 +413,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/GlobalApi.md b/src/dns_config/docs/GlobalApi.md index 91c85fb..2646f26 100644 --- a/src/dns_config/docs/GlobalApi.md +++ b/src/dns_config/docs/GlobalApi.md @@ -26,20 +26,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -101,20 +101,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -178,20 +178,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -254,20 +254,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/HostApi.md b/src/dns_config/docs/HostApi.md index e25411d..b16e849 100644 --- a/src/dns_config/docs/HostApi.md +++ b/src/dns_config/docs/HostApi.md @@ -25,20 +25,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -108,20 +108,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -186,20 +186,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/LbdnApi.md b/src/dns_config/docs/LbdnApi.md index ab0fd8d..af802a9 100644 --- a/src/dns_config/docs/LbdnApi.md +++ b/src/dns_config/docs/LbdnApi.md @@ -27,20 +27,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/ServerApi.md b/src/dns_config/docs/ServerApi.md index beb3ace..c2b0381 100644 --- a/src/dns_config/docs/ServerApi.md +++ b/src/dns_config/docs/ServerApi.md @@ -27,20 +27,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -104,20 +104,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -178,20 +178,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -261,20 +261,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -339,20 +339,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/docs/ViewApi.md b/src/dns_config/docs/ViewApi.md index 1731236..f8c8a28 100644 --- a/src/dns_config/docs/ViewApi.md +++ b/src/dns_config/docs/ViewApi.md @@ -28,20 +28,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -104,20 +104,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -181,20 +181,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -255,20 +255,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -338,20 +338,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -416,20 +416,20 @@ from pprint import pprint import dns_config -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_config/models/__init__.py b/src/dns_config/models/__init__.py index fca8d42..b310592 100644 --- a/src/dns_config/models/__init__.py +++ b/src/dns_config/models/__init__.py @@ -4,7 +4,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/acl.py b/src/dns_config/models/acl.py index f19c2b5..08b7f54 100644 --- a/src/dns_config/models/acl.py +++ b/src/dns_config/models/acl.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/acl_item.py b/src/dns_config/models/acl_item.py index 886fabc..173c74e 100644 --- a/src/dns_config/models/acl_item.py +++ b/src/dns_config/models/acl_item.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/auth_nsg.py b/src/dns_config/models/auth_nsg.py index 5684dc2..623d25e 100644 --- a/src/dns_config/models/auth_nsg.py +++ b/src/dns_config/models/auth_nsg.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/auth_zone.py b/src/dns_config/models/auth_zone.py index 91ea2e7..d1416df 100644 --- a/src/dns_config/models/auth_zone.py +++ b/src/dns_config/models/auth_zone.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/auth_zone_config.py b/src/dns_config/models/auth_zone_config.py index 01e3b90..b026a14 100644 --- a/src/dns_config/models/auth_zone_config.py +++ b/src/dns_config/models/auth_zone_config.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/auth_zone_external_provider.py b/src/dns_config/models/auth_zone_external_provider.py index 84dedee..81f89f7 100644 --- a/src/dns_config/models/auth_zone_external_provider.py +++ b/src/dns_config/models/auth_zone_external_provider.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/auth_zone_inheritance.py b/src/dns_config/models/auth_zone_inheritance.py index 17638b6..f0d3ba8 100644 --- a/src/dns_config/models/auth_zone_inheritance.py +++ b/src/dns_config/models/auth_zone_inheritance.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/bulk_copy_error.py b/src/dns_config/models/bulk_copy_error.py index cc3352f..1bfd206 100644 --- a/src/dns_config/models/bulk_copy_error.py +++ b/src/dns_config/models/bulk_copy_error.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/bulk_copy_response.py b/src/dns_config/models/bulk_copy_response.py index 5c5a9dc..3071f94 100644 --- a/src/dns_config/models/bulk_copy_response.py +++ b/src/dns_config/models/bulk_copy_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/bulk_copy_view.py b/src/dns_config/models/bulk_copy_view.py index ee126a4..9252fa3 100644 --- a/src/dns_config/models/bulk_copy_view.py +++ b/src/dns_config/models/bulk_copy_view.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/cache_flush.py b/src/dns_config/models/cache_flush.py index 20a267f..5ce53b3 100644 --- a/src/dns_config/models/cache_flush.py +++ b/src/dns_config/models/cache_flush.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/convert_domain_name.py b/src/dns_config/models/convert_domain_name.py index cb8289e..67e0512 100644 --- a/src/dns_config/models/convert_domain_name.py +++ b/src/dns_config/models/convert_domain_name.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/convert_domain_name_response.py b/src/dns_config/models/convert_domain_name_response.py index 04838fb..f747ff9 100644 --- a/src/dns_config/models/convert_domain_name_response.py +++ b/src/dns_config/models/convert_domain_name_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/convert_r_name_response.py b/src/dns_config/models/convert_r_name_response.py index ff88f62..906e20f 100644 --- a/src/dns_config/models/convert_r_name_response.py +++ b/src/dns_config/models/convert_r_name_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/copy_auth_zone.py b/src/dns_config/models/copy_auth_zone.py index cf10116..13aa7d0 100644 --- a/src/dns_config/models/copy_auth_zone.py +++ b/src/dns_config/models/copy_auth_zone.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/copy_auth_zone_response.py b/src/dns_config/models/copy_auth_zone_response.py index b2b3f66..a0705ee 100644 --- a/src/dns_config/models/copy_auth_zone_response.py +++ b/src/dns_config/models/copy_auth_zone_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/copy_forward_zone.py b/src/dns_config/models/copy_forward_zone.py index 53c740c..1d1b76f 100644 --- a/src/dns_config/models/copy_forward_zone.py +++ b/src/dns_config/models/copy_forward_zone.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/copy_forward_zone_response.py b/src/dns_config/models/copy_forward_zone_response.py index a18be00..c44394c 100644 --- a/src/dns_config/models/copy_forward_zone_response.py +++ b/src/dns_config/models/copy_forward_zone_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/copy_response.py b/src/dns_config/models/copy_response.py index 28d6102..40918d1 100644 --- a/src/dns_config/models/copy_response.py +++ b/src/dns_config/models/copy_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/create_acl_response.py b/src/dns_config/models/create_acl_response.py index b32f946..d0e24b2 100644 --- a/src/dns_config/models/create_acl_response.py +++ b/src/dns_config/models/create_acl_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/create_auth_nsg_response.py b/src/dns_config/models/create_auth_nsg_response.py index fa47152..1b5536b 100644 --- a/src/dns_config/models/create_auth_nsg_response.py +++ b/src/dns_config/models/create_auth_nsg_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/create_auth_zone_response.py b/src/dns_config/models/create_auth_zone_response.py index 1954f8a..3777528 100644 --- a/src/dns_config/models/create_auth_zone_response.py +++ b/src/dns_config/models/create_auth_zone_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/create_delegation_response.py b/src/dns_config/models/create_delegation_response.py index 920018b..df738a2 100644 --- a/src/dns_config/models/create_delegation_response.py +++ b/src/dns_config/models/create_delegation_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/create_forward_nsg_response.py b/src/dns_config/models/create_forward_nsg_response.py index 2c350f6..f015933 100644 --- a/src/dns_config/models/create_forward_nsg_response.py +++ b/src/dns_config/models/create_forward_nsg_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/create_forward_zone_response.py b/src/dns_config/models/create_forward_zone_response.py index ff9ae23..2c48431 100644 --- a/src/dns_config/models/create_forward_zone_response.py +++ b/src/dns_config/models/create_forward_zone_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/create_lbdn_response.py b/src/dns_config/models/create_lbdn_response.py index 9747d36..2d1d9a8 100644 --- a/src/dns_config/models/create_lbdn_response.py +++ b/src/dns_config/models/create_lbdn_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/create_server_response.py b/src/dns_config/models/create_server_response.py index 47503e7..bef913f 100644 --- a/src/dns_config/models/create_server_response.py +++ b/src/dns_config/models/create_server_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/create_view_response.py b/src/dns_config/models/create_view_response.py index 91ded84..956eb9c 100644 --- a/src/dns_config/models/create_view_response.py +++ b/src/dns_config/models/create_view_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/custom_root_ns_block.py b/src/dns_config/models/custom_root_ns_block.py index 386c963..a2f412e 100644 --- a/src/dns_config/models/custom_root_ns_block.py +++ b/src/dns_config/models/custom_root_ns_block.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/delegation.py b/src/dns_config/models/delegation.py index 0af6045..4c90e48 100644 --- a/src/dns_config/models/delegation.py +++ b/src/dns_config/models/delegation.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/delegation_server.py b/src/dns_config/models/delegation_server.py index 0997e6f..1a38574 100644 --- a/src/dns_config/models/delegation_server.py +++ b/src/dns_config/models/delegation_server.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/display_view.py b/src/dns_config/models/display_view.py index 8f8a480..58676ab 100644 --- a/src/dns_config/models/display_view.py +++ b/src/dns_config/models/display_view.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/dns_global.py b/src/dns_config/models/dns_global.py index 0546a36..a896825 100644 --- a/src/dns_config/models/dns_global.py +++ b/src/dns_config/models/dns_global.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/dnssec_validation_block.py b/src/dns_config/models/dnssec_validation_block.py index 0e088d1..052e29f 100644 --- a/src/dns_config/models/dnssec_validation_block.py +++ b/src/dns_config/models/dnssec_validation_block.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/dtc_config.py b/src/dns_config/models/dtc_config.py index 2067013..b49b35c 100644 --- a/src/dns_config/models/dtc_config.py +++ b/src/dns_config/models/dtc_config.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/dtc_policy.py b/src/dns_config/models/dtc_policy.py index f2d30da..171053c 100644 --- a/src/dns_config/models/dtc_policy.py +++ b/src/dns_config/models/dtc_policy.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/ecs_block.py b/src/dns_config/models/ecs_block.py index 05a2917..6e755d8 100644 --- a/src/dns_config/models/ecs_block.py +++ b/src/dns_config/models/ecs_block.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/ecs_zone.py b/src/dns_config/models/ecs_zone.py index 2638d8a..3fe53c7 100644 --- a/src/dns_config/models/ecs_zone.py +++ b/src/dns_config/models/ecs_zone.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/external_primary.py b/src/dns_config/models/external_primary.py index 8cb9f3b..93ad7c7 100644 --- a/src/dns_config/models/external_primary.py +++ b/src/dns_config/models/external_primary.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/external_secondary.py b/src/dns_config/models/external_secondary.py index a7a3972..64599fc 100644 --- a/src/dns_config/models/external_secondary.py +++ b/src/dns_config/models/external_secondary.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/forward_nsg.py b/src/dns_config/models/forward_nsg.py index 90195cc..0bb4bcf 100644 --- a/src/dns_config/models/forward_nsg.py +++ b/src/dns_config/models/forward_nsg.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/forward_zone.py b/src/dns_config/models/forward_zone.py index ac0761d..99d9d66 100644 --- a/src/dns_config/models/forward_zone.py +++ b/src/dns_config/models/forward_zone.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/forward_zone_config.py b/src/dns_config/models/forward_zone_config.py index f0532a4..853bc6d 100644 --- a/src/dns_config/models/forward_zone_config.py +++ b/src/dns_config/models/forward_zone_config.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/forwarder.py b/src/dns_config/models/forwarder.py index c393c66..4cc1f59 100644 --- a/src/dns_config/models/forwarder.py +++ b/src/dns_config/models/forwarder.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/forwarders_block.py b/src/dns_config/models/forwarders_block.py index e349bfe..ea271da 100644 --- a/src/dns_config/models/forwarders_block.py +++ b/src/dns_config/models/forwarders_block.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/host.py b/src/dns_config/models/host.py index ad3db2f..c5b8d13 100644 --- a/src/dns_config/models/host.py +++ b/src/dns_config/models/host.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/host_associated_server.py b/src/dns_config/models/host_associated_server.py index 6cf5c7d..400e309 100644 --- a/src/dns_config/models/host_associated_server.py +++ b/src/dns_config/models/host_associated_server.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/host_inheritance.py b/src/dns_config/models/host_inheritance.py index 94605ee..602e99a 100644 --- a/src/dns_config/models/host_inheritance.py +++ b/src/dns_config/models/host_inheritance.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inheritance2_assigned_host.py b/src/dns_config/models/inheritance2_assigned_host.py index f5871c8..f29f099 100644 --- a/src/dns_config/models/inheritance2_assigned_host.py +++ b/src/dns_config/models/inheritance2_assigned_host.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inheritance2_inherited_bool.py b/src/dns_config/models/inheritance2_inherited_bool.py index d111ce8..c6e6b32 100644 --- a/src/dns_config/models/inheritance2_inherited_bool.py +++ b/src/dns_config/models/inheritance2_inherited_bool.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inheritance2_inherited_string.py b/src/dns_config/models/inheritance2_inherited_string.py index ebd5273..805f0f3 100644 --- a/src/dns_config/models/inheritance2_inherited_string.py +++ b/src/dns_config/models/inheritance2_inherited_string.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inheritance2_inherited_u_int32.py b/src/dns_config/models/inheritance2_inherited_u_int32.py index 72608b4..a7efda7 100644 --- a/src/dns_config/models/inheritance2_inherited_u_int32.py +++ b/src/dns_config/models/inheritance2_inherited_u_int32.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inherited_acl_items.py b/src/dns_config/models/inherited_acl_items.py index d93df88..723f331 100644 --- a/src/dns_config/models/inherited_acl_items.py +++ b/src/dns_config/models/inherited_acl_items.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inherited_custom_root_ns_block.py b/src/dns_config/models/inherited_custom_root_ns_block.py index 810442a..3a8d4b7 100644 --- a/src/dns_config/models/inherited_custom_root_ns_block.py +++ b/src/dns_config/models/inherited_custom_root_ns_block.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inherited_dnssec_validation_block.py b/src/dns_config/models/inherited_dnssec_validation_block.py index e32c8d4..90d623d 100644 --- a/src/dns_config/models/inherited_dnssec_validation_block.py +++ b/src/dns_config/models/inherited_dnssec_validation_block.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inherited_dtc_config.py b/src/dns_config/models/inherited_dtc_config.py index d1d7487..6546e5d 100644 --- a/src/dns_config/models/inherited_dtc_config.py +++ b/src/dns_config/models/inherited_dtc_config.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inherited_ecs_block.py b/src/dns_config/models/inherited_ecs_block.py index 269304b..12ae011 100644 --- a/src/dns_config/models/inherited_ecs_block.py +++ b/src/dns_config/models/inherited_ecs_block.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inherited_forwarders_block.py b/src/dns_config/models/inherited_forwarders_block.py index 44d72a7..ff12c8e 100644 --- a/src/dns_config/models/inherited_forwarders_block.py +++ b/src/dns_config/models/inherited_forwarders_block.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inherited_kerberos_keys.py b/src/dns_config/models/inherited_kerberos_keys.py index 9efe954..be0d096 100644 --- a/src/dns_config/models/inherited_kerberos_keys.py +++ b/src/dns_config/models/inherited_kerberos_keys.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inherited_sort_list_items.py b/src/dns_config/models/inherited_sort_list_items.py index 185a3ee..8419598 100644 --- a/src/dns_config/models/inherited_sort_list_items.py +++ b/src/dns_config/models/inherited_sort_list_items.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inherited_zone_authority.py b/src/dns_config/models/inherited_zone_authority.py index 77c374a..a29118e 100644 --- a/src/dns_config/models/inherited_zone_authority.py +++ b/src/dns_config/models/inherited_zone_authority.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/inherited_zone_authority_m_name_block.py b/src/dns_config/models/inherited_zone_authority_m_name_block.py index 0af51b6..0e717ee 100644 --- a/src/dns_config/models/inherited_zone_authority_m_name_block.py +++ b/src/dns_config/models/inherited_zone_authority_m_name_block.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/internal_secondary.py b/src/dns_config/models/internal_secondary.py index 63283ce..2b0d04f 100644 --- a/src/dns_config/models/internal_secondary.py +++ b/src/dns_config/models/internal_secondary.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/kerberos_key.py b/src/dns_config/models/kerberos_key.py index 09fd421..a589907 100644 --- a/src/dns_config/models/kerberos_key.py +++ b/src/dns_config/models/kerberos_key.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/lbdn.py b/src/dns_config/models/lbdn.py index e908135..96b0a3e 100644 --- a/src/dns_config/models/lbdn.py +++ b/src/dns_config/models/lbdn.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/list_acl_response.py b/src/dns_config/models/list_acl_response.py index f2880fa..1919154 100644 --- a/src/dns_config/models/list_acl_response.py +++ b/src/dns_config/models/list_acl_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/list_auth_nsg_response.py b/src/dns_config/models/list_auth_nsg_response.py index b81756d..452e8c7 100644 --- a/src/dns_config/models/list_auth_nsg_response.py +++ b/src/dns_config/models/list_auth_nsg_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/list_auth_zone_response.py b/src/dns_config/models/list_auth_zone_response.py index db8536c..05733dc 100644 --- a/src/dns_config/models/list_auth_zone_response.py +++ b/src/dns_config/models/list_auth_zone_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/list_delegation_response.py b/src/dns_config/models/list_delegation_response.py index 42a517d..d73a727 100644 --- a/src/dns_config/models/list_delegation_response.py +++ b/src/dns_config/models/list_delegation_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/list_forward_nsg_response.py b/src/dns_config/models/list_forward_nsg_response.py index 82882bd..56b4df1 100644 --- a/src/dns_config/models/list_forward_nsg_response.py +++ b/src/dns_config/models/list_forward_nsg_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/list_forward_zone_response.py b/src/dns_config/models/list_forward_zone_response.py index 191f80e..c965047 100644 --- a/src/dns_config/models/list_forward_zone_response.py +++ b/src/dns_config/models/list_forward_zone_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/list_host_response.py b/src/dns_config/models/list_host_response.py index 0aedf8b..deac560 100644 --- a/src/dns_config/models/list_host_response.py +++ b/src/dns_config/models/list_host_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/list_lbdn_response.py b/src/dns_config/models/list_lbdn_response.py index 0fcc6ea..8558fe9 100644 --- a/src/dns_config/models/list_lbdn_response.py +++ b/src/dns_config/models/list_lbdn_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/list_server_response.py b/src/dns_config/models/list_server_response.py index 869adb7..5b522d5 100644 --- a/src/dns_config/models/list_server_response.py +++ b/src/dns_config/models/list_server_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/list_view_response.py b/src/dns_config/models/list_view_response.py index b220f88..e50f948 100644 --- a/src/dns_config/models/list_view_response.py +++ b/src/dns_config/models/list_view_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_acl_response.py b/src/dns_config/models/read_acl_response.py index 548005a..12e061f 100644 --- a/src/dns_config/models/read_acl_response.py +++ b/src/dns_config/models/read_acl_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_auth_nsg_response.py b/src/dns_config/models/read_auth_nsg_response.py index e1d96ea..a1e78f5 100644 --- a/src/dns_config/models/read_auth_nsg_response.py +++ b/src/dns_config/models/read_auth_nsg_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_auth_zone_response.py b/src/dns_config/models/read_auth_zone_response.py index 9489ca6..04eb699 100644 --- a/src/dns_config/models/read_auth_zone_response.py +++ b/src/dns_config/models/read_auth_zone_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_delegation_response.py b/src/dns_config/models/read_delegation_response.py index 742fe22..2683536 100644 --- a/src/dns_config/models/read_delegation_response.py +++ b/src/dns_config/models/read_delegation_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_forward_nsg_response.py b/src/dns_config/models/read_forward_nsg_response.py index 39c610a..e16428d 100644 --- a/src/dns_config/models/read_forward_nsg_response.py +++ b/src/dns_config/models/read_forward_nsg_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_forward_zone_response.py b/src/dns_config/models/read_forward_zone_response.py index 9341a25..53be96f 100644 --- a/src/dns_config/models/read_forward_zone_response.py +++ b/src/dns_config/models/read_forward_zone_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_global_response.py b/src/dns_config/models/read_global_response.py index a143f86..50da0f6 100644 --- a/src/dns_config/models/read_global_response.py +++ b/src/dns_config/models/read_global_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_host_response.py b/src/dns_config/models/read_host_response.py index 84a72af..d5d36ad 100644 --- a/src/dns_config/models/read_host_response.py +++ b/src/dns_config/models/read_host_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_lbdn_response.py b/src/dns_config/models/read_lbdn_response.py index b9f2194..1e3bb16 100644 --- a/src/dns_config/models/read_lbdn_response.py +++ b/src/dns_config/models/read_lbdn_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_server_response.py b/src/dns_config/models/read_server_response.py index 905b08b..2331efc 100644 --- a/src/dns_config/models/read_server_response.py +++ b/src/dns_config/models/read_server_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/read_view_response.py b/src/dns_config/models/read_view_response.py index c271593..a9f62b7 100644 --- a/src/dns_config/models/read_view_response.py +++ b/src/dns_config/models/read_view_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/root_ns.py b/src/dns_config/models/root_ns.py index 4cceaeb..045fc09 100644 --- a/src/dns_config/models/root_ns.py +++ b/src/dns_config/models/root_ns.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/server.py b/src/dns_config/models/server.py index 21ebd04..bbe83e6 100644 --- a/src/dns_config/models/server.py +++ b/src/dns_config/models/server.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/server_inheritance.py b/src/dns_config/models/server_inheritance.py index 0231705..a54f063 100644 --- a/src/dns_config/models/server_inheritance.py +++ b/src/dns_config/models/server_inheritance.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/sort_list_item.py b/src/dns_config/models/sort_list_item.py index 822f664..017286b 100644 --- a/src/dns_config/models/sort_list_item.py +++ b/src/dns_config/models/sort_list_item.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/trust_anchor.py b/src/dns_config/models/trust_anchor.py index 6a9921d..2754ed6 100644 --- a/src/dns_config/models/trust_anchor.py +++ b/src/dns_config/models/trust_anchor.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/tsig_key.py b/src/dns_config/models/tsig_key.py index 47b4f3c..c1427f2 100644 --- a/src/dns_config/models/tsig_key.py +++ b/src/dns_config/models/tsig_key.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/ttl_inheritance.py b/src/dns_config/models/ttl_inheritance.py index 01df59a..a02b43a 100644 --- a/src/dns_config/models/ttl_inheritance.py +++ b/src/dns_config/models/ttl_inheritance.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_acl_response.py b/src/dns_config/models/update_acl_response.py index 576a900..3de7e09 100644 --- a/src/dns_config/models/update_acl_response.py +++ b/src/dns_config/models/update_acl_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_auth_nsg_response.py b/src/dns_config/models/update_auth_nsg_response.py index d559688..3d7d118 100644 --- a/src/dns_config/models/update_auth_nsg_response.py +++ b/src/dns_config/models/update_auth_nsg_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_auth_zone_response.py b/src/dns_config/models/update_auth_zone_response.py index 1bb073c..8c3d23c 100644 --- a/src/dns_config/models/update_auth_zone_response.py +++ b/src/dns_config/models/update_auth_zone_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_delegation_response.py b/src/dns_config/models/update_delegation_response.py index 9f92d64..9ba4827 100644 --- a/src/dns_config/models/update_delegation_response.py +++ b/src/dns_config/models/update_delegation_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_forward_nsg_response.py b/src/dns_config/models/update_forward_nsg_response.py index c4dd638..626c842 100644 --- a/src/dns_config/models/update_forward_nsg_response.py +++ b/src/dns_config/models/update_forward_nsg_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_forward_zone_response.py b/src/dns_config/models/update_forward_zone_response.py index f5fb73b..a1d50dd 100644 --- a/src/dns_config/models/update_forward_zone_response.py +++ b/src/dns_config/models/update_forward_zone_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_global_response.py b/src/dns_config/models/update_global_response.py index 195c888..3bc4020 100644 --- a/src/dns_config/models/update_global_response.py +++ b/src/dns_config/models/update_global_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_host_response.py b/src/dns_config/models/update_host_response.py index c6556aa..e1ea5b1 100644 --- a/src/dns_config/models/update_host_response.py +++ b/src/dns_config/models/update_host_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_lbdn_response.py b/src/dns_config/models/update_lbdn_response.py index dd6ea5b..4669837 100644 --- a/src/dns_config/models/update_lbdn_response.py +++ b/src/dns_config/models/update_lbdn_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_server_response.py b/src/dns_config/models/update_server_response.py index ef77a99..cbb888a 100644 --- a/src/dns_config/models/update_server_response.py +++ b/src/dns_config/models/update_server_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/update_view_response.py b/src/dns_config/models/update_view_response.py index 2a267e7..b7b9a3d 100644 --- a/src/dns_config/models/update_view_response.py +++ b/src/dns_config/models/update_view_response.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/view.py b/src/dns_config/models/view.py index 6e9827d..1e7b034 100644 --- a/src/dns_config/models/view.py +++ b/src/dns_config/models/view.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/view_inheritance.py b/src/dns_config/models/view_inheritance.py index 1dcc308..9b0f077 100644 --- a/src/dns_config/models/view_inheritance.py +++ b/src/dns_config/models/view_inheritance.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/warning.py b/src/dns_config/models/warning.py index 7ebe7ee..36605d8 100644 --- a/src/dns_config/models/warning.py +++ b/src/dns_config/models/warning.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/zone_authority.py b/src/dns_config/models/zone_authority.py index 58b0e87..60d2ead 100644 --- a/src/dns_config/models/zone_authority.py +++ b/src/dns_config/models/zone_authority.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/models/zone_authority_m_name_block.py b/src/dns_config/models/zone_authority_m_name_block.py index 507e413..e272ba3 100644 --- a/src/dns_config/models/zone_authority_m_name_block.py +++ b/src/dns_config/models/zone_authority_m_name_block.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_config/test/test_acl_api.py b/src/dns_config/test/test_acl_api.py index 54ccb2b..8fbf720 100644 --- a/src/dns_config/test/test_acl_api.py +++ b/src/dns_config/test/test_acl_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.acl_api import AclApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestAclApi(unittest.TestCase): diff --git a/src/dns_config/test/test_auth_nsg_api.py b/src/dns_config/test/test_auth_nsg_api.py index f040ad5..11d4947 100644 --- a/src/dns_config/test/test_auth_nsg_api.py +++ b/src/dns_config/test/test_auth_nsg_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.auth_nsg_api import AuthNsgApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestAuthNsgApi(unittest.TestCase): diff --git a/src/dns_config/test/test_auth_zone_api.py b/src/dns_config/test/test_auth_zone_api.py index 2f0bd6e..85f7a8f 100644 --- a/src/dns_config/test/test_auth_zone_api.py +++ b/src/dns_config/test/test_auth_zone_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.auth_zone_api import AuthZoneApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestAuthZoneApi(unittest.TestCase): diff --git a/src/dns_config/test/test_cache_flush_api.py b/src/dns_config/test/test_cache_flush_api.py index 1944f6c..47c89f7 100644 --- a/src/dns_config/test/test_cache_flush_api.py +++ b/src/dns_config/test/test_cache_flush_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.cache_flush_api import CacheFlushApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestCacheFlushApi(unittest.TestCase): diff --git a/src/dns_config/test/test_convert_domain_name_api.py b/src/dns_config/test/test_convert_domain_name_api.py index 9003a87..df8d7ac 100644 --- a/src/dns_config/test/test_convert_domain_name_api.py +++ b/src/dns_config/test/test_convert_domain_name_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.convert_domain_name_api import ConvertDomainNameApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestConvertDomainNameApi(unittest.TestCase): diff --git a/src/dns_config/test/test_convert_rname_api.py b/src/dns_config/test/test_convert_rname_api.py index e5718bc..1d2311d 100644 --- a/src/dns_config/test/test_convert_rname_api.py +++ b/src/dns_config/test/test_convert_rname_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.convert_rname_api import ConvertRnameApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestConvertRnameApi(unittest.TestCase): diff --git a/src/dns_config/test/test_delegation_api.py b/src/dns_config/test/test_delegation_api.py index ad6627e..54b76b8 100644 --- a/src/dns_config/test/test_delegation_api.py +++ b/src/dns_config/test/test_delegation_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.delegation_api import DelegationApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestDelegationApi(unittest.TestCase): diff --git a/src/dns_config/test/test_forward_nsg_api.py b/src/dns_config/test/test_forward_nsg_api.py index 33f59e7..f78a862 100644 --- a/src/dns_config/test/test_forward_nsg_api.py +++ b/src/dns_config/test/test_forward_nsg_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.forward_nsg_api import ForwardNsgApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestForwardNsgApi(unittest.TestCase): diff --git a/src/dns_config/test/test_forward_zone_api.py b/src/dns_config/test/test_forward_zone_api.py index 09357c1..3b42ebf 100644 --- a/src/dns_config/test/test_forward_zone_api.py +++ b/src/dns_config/test/test_forward_zone_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.forward_zone_api import ForwardZoneApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestForwardZoneApi(unittest.TestCase): diff --git a/src/dns_config/test/test_global_api.py b/src/dns_config/test/test_global_api.py index 2ad7dab..2dd25cd 100644 --- a/src/dns_config/test/test_global_api.py +++ b/src/dns_config/test/test_global_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.global_api import GlobalApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestGlobalApi(unittest.TestCase): diff --git a/src/dns_config/test/test_host_api.py b/src/dns_config/test/test_host_api.py index 89f310b..2d7127c 100644 --- a/src/dns_config/test/test_host_api.py +++ b/src/dns_config/test/test_host_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.host_api import HostApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestHostApi(unittest.TestCase): diff --git a/src/dns_config/test/test_lbdn_api.py b/src/dns_config/test/test_lbdn_api.py index 3c1a4dc..39bacdd 100644 --- a/src/dns_config/test/test_lbdn_api.py +++ b/src/dns_config/test/test_lbdn_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.lbdn_api import LbdnApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestLbdnApi(unittest.TestCase): diff --git a/src/dns_config/test/test_server_api.py b/src/dns_config/test/test_server_api.py index f497b52..216fdc8 100644 --- a/src/dns_config/test/test_server_api.py +++ b/src/dns_config/test/test_server_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.server_api import ServerApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestServerApi(unittest.TestCase): diff --git a/src/dns_config/test/test_view_api.py b/src/dns_config/test/test_view_api.py index 7147da0..fac6bf6 100644 --- a/src/dns_config/test/test_view_api.py +++ b/src/dns_config/test/test_view_api.py @@ -3,7 +3,7 @@ """ DNS Configuration API - The DNS application is a BloxOne DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured BloxOne DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. + The DNS application is a Universal DDI service that provides cloud-based DNS configuration with on-prem host serving DNS protocol. It is part of the full-featured Universal DDI solution that enables customers the ability to deploy large numbers of protocol servers in the delivery of DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_config.api.view_api import ViewApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestViewApi(unittest.TestCase): diff --git a/src/dns_data/README.md b/src/dns_data/README.md index 8d18c0f..b1808c5 100644 --- a/src/dns_data/README.md +++ b/src/dns_data/README.md @@ -1,12 +1,12 @@ # dns-data -The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. +The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The `dns_data` package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,14 +36,14 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client diff --git a/src/dns_data/__init__.py b/src/dns_data/__init__.py index ed7aaca..9a7fbe4 100644 --- a/src/dns_data/__init__.py +++ b/src/dns_data/__init__.py @@ -5,7 +5,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/api/record_api.py b/src/dns_data/api/record_api.py index 4499bfa..738843e 100644 --- a/src/dns_data/api/record_api.py +++ b/src/dns_data/api/record_api.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,9 +28,9 @@ from dns_data.models.update_record_response import UpdateRecordResponse from dns_data import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class RecordApi: diff --git a/src/dns_data/docs/Record.md b/src/dns_data/docs/Record.md index 52c4d80..7011079 100644 --- a/src/dns_data/docs/Record.md +++ b/src/dns_data/docs/Record.md @@ -19,7 +19,7 @@ Name | Type | Description | Notes **id** | **str** | The resource identifier. | [optional] [readonly] **inheritance_sources** | [**RecordInheritance**](RecordInheritance.md) | The inheritance configuration. | [optional] **ipam_host** | **str** | The resource identifier. | [optional] [readonly] -**name_in_zone** | **str** | The relative owner name to the zone origin. Must be specified for creating the DNS resource record and is read only for other operations. | [optional] +**name_in_zone** | **str** | The relative owner name to the zone origin. Must be specified for creating the DNS resource record and is read only for other operations. | [optional] [default to ''] **options** | **object** | The DNS resource record type-specific non-protocol options. Valid value for _A_ (Address) and _AAAA_ (IPv6 Address) records: Option | Description -----------|----------------------------------------- create_ptr | A boolean flag which can be set to _true_ for POST operation to automatically create the corresponding PTR record. check_rmz | A boolean flag which can be set to _true_ for POST operation to check the existence of reverse zone for creating the corresponding PTR record. Only applicable if the _create_ptr_ option is set to _true_. Valid value for _PTR_ (Pointer) records: Option | Description -----------|---------------------------------------- address | For GET operation it contains the IPv4 or IPv6 address represented by the PTR record.<br><br>For POST and PATCH operations it can be used to create/update a PTR record based on the IP address it represents. In this case, in addition to the _address_ in the options field, need to specify the _view_ field. | | [optional] **provider_metadata** | **object** | external DNS provider metadata. | [optional] [readonly] **rdata** | **object** | The DNS resource record data in JSON format. Certain DNS resource record-specific subfields are required for creating the DNS resource record. Subfields for _A_ (Address) record: Subfield | Description |Required ---------|---------------------------------------|-------- address | The IPv4 address of the host.<br><br> | Yes Subfields for _AAAA_ (IPv6 Address) record: Subfield | Description | Required ---------|---------------------------------------|--------- address | The IPv6 address of the host.<br><br> | Yes Subfields for _CAA_ (Certification Authority Authorization) record: Subfield | Description | Required ---------|---------------------------------------|--------- flags | An unsigned 8-bit integer which specifies the CAA record flags. RFC 6844 defines one (highest) bit in flag octet, remaining bits are deferred for future use. This bit is referenced as _Critical_. When the bit is set (flag value == 128), issuers must not issue certificates in case CAA records contain unknown property tags.<br><br>Defaults to 0.<br><br> | No tag | The CAA record property tag string which indicates the type of CAA record. The following property tags are defined by RFC 6844:<ul><li>_issue_: Used to explicitly authorize CA to issue certificates for the domain in which the property is published.</li><li>_issuewild_: Used to explicitly authorize a single CA to issue wildcard certificates for the domain in which the property is published.</li><li>_iodef_: Used to specify an email address or URL to report invalid certificate requests or issuers’ certificate policy violations.</li></ul>Note: _issuewild_ type takes precedence over _issue_.<br><br> | Yes value | A string which contains the CAA record property value.<br><br>Specifies the CA who is authorized to issue a certificate for the domain if the CAA record property tag is _issue_ or _issuewild_.<br><br> Specifies the URL/email address to report CAA policy violation for the domain if the CAA record property tag is _iodef_.<br><br> | Yes Subfields for _CNAME_ (Canonical Name) record: Subfield | Description | Required ---------|---------------------------------------|--------- cname | A domain name which specifies the canonical or primary name for the owner. The owner name is an alias. Can be empty.<br><br> | Yes Subfields for _DNAME_ (Delegation Name) record: Subfield | Description | Required ---------|---------------------------------------|--------- target | The target domain name to which the zone will be mapped. Can be empty.<br><br> | Yes Subfields for _DHCID_ (DHCP Identifier) record: Subfield | Description | Required ---------|---------------------------------------|--------- dhcid | The Base64 encoded string which contains DHCP client information.<br><br> | Yes Subfields for _MX_ (Mail Exchanger) record: Subfield | Description | Required -----------|-----------------------------------|--------- exchange | A domain name which specifies a host willing to act as a mail exchange for the owner name.<br><br> | Yes preference | An unsigned 16-bit integer which specifies the preference given to this RR among others at the same owner. Lower values are preferred. The range of the value is 0 to 65535. <br><br> | Yes Subfields for _NAPTR_ (Naming Authority Pointer) record: Subfield | Description | Required ------------|-------------------------------------|--------- flags | A character string containing flags to control aspects of the rewriting and interpretation of the fields in the DNS resource record. The flags that are currently used are: <ul><li> __U__: Indicates that the output maps to a URI (Uniform Record Identifier). </li><li> __S__: Indicates that the output is a domain name that has at least one SRV record. The DNS client must then send a query for the SRV record of the resulting domain name. </li><li> __A__: Indicates that the output is a domain name that has at least one A or AAAA record. The DNS client must then send a query for the A or AAAA record of the resulting domain name. </li><li> __P__: Indicates that the protocol specified in the _services_ field defines the next step or phase. </li></ul> | No order | A 16-bit unsigned integer specifying the order in which the NAPTR records must be processed. Low numbers are processed before high numbers, and once a NAPTR is found whose rule \"matches\" the target, the client must not consider any NAPTRs with a higher value for order (except as noted below for the \"flags\" field. The range of the value is 0 to 65535. <br><br> | Yes preference |A 16-bit unsigned integer that specifies the order in which NAPTR records with equal \"order\" values should be processed, low numbers being processed before high numbers. This is similar to the preference field in an MX record, and is used so domain administrators can direct clients towards more capable hosts or lighter weight protocols. A client may look at records with higher preference values if it has a good reason to do so such as not understanding the preferred protocol or service. The range of the value is 0 to 65535.<br><br> | Yes regexp | A string containing a substitution expression that is applied to the original string held by the client in order to construct the next domain name to lookup.<br><br>Defaults to none.<br><br> | No replacement | The next name to query for NAPTR, SRV, or address records depending on the value of the _flags_ field. This can be an absolute or relative domain name. Can be empty.<br><br> | Yes services | Specifies the service(s) available down this rewrite path. It may also specify the particular protocol that is used to talk with a service. A protocol must be specified if the flags field states that the NAPTR is terminal. If a protocol is specified, but the flags field does not state that the NAPTR is terminal, the next lookup must be for a NAPTR. The client may choose not to perform the next lookup if the protocol is unknown, but that behavior must not be relied upon.<br><br>The service field may take any of the values below (using the Augmented BNF of RFC 2234):<br><br>service_field = [ [protocol] *(\"+\" rs)]<br>protocol = ALPHA * 31 ALPHANUM<br>rs = ALPHA * 31 ALPHANUM<br><br>The protocol and rs fields are limited to 32 characters and must start with an alphabetic character.<br><br> For example, an optional protocol specification followed by 0 or more resolution services. Each resolution service is indicated by an initial '+' character.<br><br> Note that the empty string is also a valid service field. This will typically be seen at the beginning of a series of rules, when it is impossible to know what services and protocols will be offered by a particular service.<br><br> The actual format of the service request and response will be determined by the resolution protocol. Protocols need not offer all services. The labels for service requests shall be formed from the set of characters [A-Z0-9]. The case of the alphabetic characters is not significant.<br><br> | Yes Subfields for _NS_ (Name Server) record: Subfield | Description | Required ---------|-------------------------------------|--------- dname | A domain-name which specifies a host which should be authoritative for the specified class and domain. Can be absolute or relative domain name and include UTF-8. <br><br> | Yes Subfields for _PTR_ (Pointer) record: Subfield | Description | Required ---------|-------------------------------------|--------- dname | A domain name which points to some location in the domain name space. Can be absolute or relative domain name and include UTF-8. <br><br> | Yes Subfields for _SOA_ (Start of Authority) record: Subfield | Description | Required ------------ |-------------------------------------|--------- expire | The time interval in seconds after which zone data will expire and secondary server stops answering requests for the zone.<br><br> | No mname | The domain name for the master server for the zone. Can be absolute or relative domain name.<br><br> | Yes negative_ttl | The time interval in seconds for which name servers can cache negative responses for zone. <br><br>Defaults to 900 seconds (15 minutes).<br><br> | No refresh | The time interval in seconds that specifies how often secondary servers need to send a message to the primary server for a zone to check that their data is current, and retrieve fresh data if it is not.<br><br>Defaults to 10800 seconds (3 hours).<br><br> | No retry | The time interval in seconds for which the secondary server will wait before attempting to recontact the primary server after a connection failure occurs.<br><br>Defaults to 3600 seconds (1 hour).<br><br> | No rname | The domain name which specifies the mailbox of the person responsible for this zone. <br><br> | No serial | An unsigned 32-bit integer that specifies the serial number of the zone. Used to indicate that zone data was updated, so the secondary name server can initiate zone transfer. The range of the value is 0 to 4294967295. <br><br> | No Subfields for _SRV_ (Service) record: Subfield | Description | Required ---------|-------------------------------------|--------- port | An unsigned 16-bit integer which specifies the port on this target host of this service. The range of the value is 0 to 65535. This is often as specified in Assigned Numbers but need not be.<br><br> | Yes priority | An unsigned 16-bit integer which specifies the priority of this target host. The range of the value is 0 to 65535. A client must attempt to contact the target host with the lowest-numbered priority it can reach. Target hosts with the same priority should be tried in an order defined by the _weight_ field.<br><br>| Yes target | The domain name of the target host. There must be one or more address records for this name, the name must not be an alias (in the sense of RFC 1034 or RFC 2181).<br><br>A target of \".\" means that the service is decidedly not available at this domain. | Yes weight | An unsigned 16-bit integer which specifies a relative weight for entries with the same priority. The range of the value is 0 to 65535. Larger weights should be given a proportionately higher probability of being selected. Domain administrators should use weight 0 when there isn't any server selection to do, to make the RR easier to read for humans (less noisy). In the presence of records containing weights greater than 0, records with weight 0 should have a very small chance of being selected.<br><br>In the absence of a protocol whose specification calls for the use of other weighting information, a client arranges the SRV RRs of the same priority in the order in which target hosts, specified by the SRV RRs, will be contacted.<br><br>Defaults to 0.<br><br>| No Subfields for _TXT_ (Text) record: Subfield | Description | Required ---------|-------------------------------------|--------- text | The semantics of the text depends on the domain where it is found.<br><br> | No Generic record can be used to represent any DNS resource record not listed above. Subfields for a generic record consist of a list of struct subfields, each having the following sub-subfields: Sub-subfield | Description | Required -------------|------------------------------------|--------- type | Following types are supported:<ul><li>_8BIT_: Unsigned 8-bit integer. </li><li> _16BIT_: Unsigned 16-bit integer. </li><li> _32BIT_: Unsigned 32-bit integer. </li><li> _IPV6_: IPv6 address. For example, \"abcd:123::abcd\". </li><li> _IPV4_: IPv4 address. For example, \"1.1.1.1\". </li><li> _DomainName_: Domain name (absolute or relative). </li><li> _TEXT_: ASCII text. </li><li> _BASE64_: Base64 encoded binary data. </li><li> _HEX_: Hex encoded binary data. </li><li>_PRESENTATION_: Presentation is a standard textual form of record data, as shown in a standard master zone file. <br><br> For example, an IPSEC RDATA could be specified using the PRESENTATION type field whose value is \"10 1 2 192.0.2.38 AQNRU3mG7TVTO2BkR47usntb102uFJtugbo6BSGvgqt4AQ==\", instead of a sequence of the following subfields: <ul><li> 8BIT: value=10 </li><li> 8BIT: value=1 </li><li> 8BIT: value=2 </li><li> IPV4: value=\"192.0.2.38\" </li><li> BASE64 (without _length_kind_ sub-subfield): value=\"AQNRU3mG7TVTO2BkR47usntb102uFJtugbo6BSGvgqt4AQ==\" </li></ul></li></ul>If type is _PRESENTATION_, only one struct subfield can be specified. <br><br> | Yes length_kind | A string indicating the size in bits of a sub-subfield that is prepended to the value and encodes the length of the value. Valid values are:<ul><li>_8_: If _type_ is _ASCII_ or _BASE64_. </li><li>_16_: If _type_ is _HEX_.</li></ul>Defaults to none. <br><br>| Only required for some types. value | A string representing the value for the sub-subfield | Yes | diff --git a/src/dns_data/docs/RecordApi.md b/src/dns_data/docs/RecordApi.md index 4ed5b67..ff8a8b7 100644 --- a/src/dns_data/docs/RecordApi.md +++ b/src/dns_data/docs/RecordApi.md @@ -28,20 +28,20 @@ from pprint import pprint import dns_data -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -105,20 +105,20 @@ from pprint import pprint import dns_data -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -179,20 +179,20 @@ from pprint import pprint import dns_data -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -262,20 +262,20 @@ from pprint import pprint import dns_data -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -340,20 +340,20 @@ from pprint import pprint import dns_data -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -418,20 +418,20 @@ from pprint import pprint import dns_data -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/dns_data/models/__init__.py b/src/dns_data/models/__init__.py index 29bbf1d..bbd26fb 100644 --- a/src/dns_data/models/__init__.py +++ b/src/dns_data/models/__init__.py @@ -4,7 +4,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/models/create_record_response.py b/src/dns_data/models/create_record_response.py index 140f731..860d973 100644 --- a/src/dns_data/models/create_record_response.py +++ b/src/dns_data/models/create_record_response.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/models/inheritance2_inherited_u_int32.py b/src/dns_data/models/inheritance2_inherited_u_int32.py index 7584162..dd7f375 100644 --- a/src/dns_data/models/inheritance2_inherited_u_int32.py +++ b/src/dns_data/models/inheritance2_inherited_u_int32.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/models/list_record_response.py b/src/dns_data/models/list_record_response.py index 98b4504..d116a20 100644 --- a/src/dns_data/models/list_record_response.py +++ b/src/dns_data/models/list_record_response.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/models/protobuf_field_mask.py b/src/dns_data/models/protobuf_field_mask.py index 0276f7b..ef7a77a 100644 --- a/src/dns_data/models/protobuf_field_mask.py +++ b/src/dns_data/models/protobuf_field_mask.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/models/read_record_response.py b/src/dns_data/models/read_record_response.py index 219ede8..1a8af9c 100644 --- a/src/dns_data/models/read_record_response.py +++ b/src/dns_data/models/read_record_response.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/models/record.py b/src/dns_data/models/record.py index a40a4a5..a543225 100644 --- a/src/dns_data/models/record.py +++ b/src/dns_data/models/record.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -78,7 +78,7 @@ class Record(BaseModel): ipam_host: Optional[StrictStr] = Field( default=None, description="The resource identifier.") name_in_zone: Optional[StrictStr] = Field( - default=None, + default='', description= "The relative owner name to the zone origin. Must be specified for creating the DNS resource record and is read only for other operations." ) @@ -256,7 +256,8 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "ipam_host": obj.get("ipam_host"), "name_in_zone": - obj.get("name_in_zone"), + obj.get("name_in_zone") + if obj.get("name_in_zone") is not None else '', "options": obj.get("options"), "provider_metadata": diff --git a/src/dns_data/models/record_inheritance.py b/src/dns_data/models/record_inheritance.py index 589ba4f..a4110eb 100644 --- a/src/dns_data/models/record_inheritance.py +++ b/src/dns_data/models/record_inheritance.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/models/soa_serial_increment_request.py b/src/dns_data/models/soa_serial_increment_request.py index 88e324c..baa7957 100644 --- a/src/dns_data/models/soa_serial_increment_request.py +++ b/src/dns_data/models/soa_serial_increment_request.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/models/soa_serial_increment_response.py b/src/dns_data/models/soa_serial_increment_response.py index 7198f08..7f5fd48 100644 --- a/src/dns_data/models/soa_serial_increment_response.py +++ b/src/dns_data/models/soa_serial_increment_response.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/models/update_record_response.py b/src/dns_data/models/update_record_response.py index 7de065a..59cea2b 100644 --- a/src/dns_data/models/update_record_response.py +++ b/src/dns_data/models/update_record_response.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/dns_data/test/test_record_api.py b/src/dns_data/test/test_record_api.py index 4d2048d..c2f6ffa 100644 --- a/src/dns_data/test/test_record_api.py +++ b/src/dns_data/test/test_record_api.py @@ -3,7 +3,7 @@ """ DNS Data API - The DNS Data is a BloxOne DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DNS Data is a Universal DDI service providing primary authoritative zone support. DNS Data is authoritative for all DNS resource records and is acting as a primary DNS server. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from dns_data.api.record_api import RecordApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestRecordApi(unittest.TestCase): diff --git a/src/fw/README.md b/src/fw/README.md index da8188e..45c6557 100644 --- a/src/fw/README.md +++ b/src/fw/README.md @@ -1,12 +1,12 @@ # fw -BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. +Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The `fw` package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,7 +36,7 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/__init__.py b/src/fw/__init__.py index 3df5edc..422a419 100644 --- a/src/fw/__init__.py +++ b/src/fw/__init__.py @@ -3,9 +3,9 @@ # flake8: noqa """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/api/access_codes_api.py b/src/fw/api/access_codes_api.py index 68099c2..1b5394a 100644 --- a/src/fw/api/access_codes_api.py +++ b/src/fw/api/access_codes_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,9 +27,9 @@ from fw.models.access_code_update_response import AccessCodeUpdateResponse from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class AccessCodesApi: diff --git a/src/fw/api/app_approvals_api.py b/src/fw/api/app_approvals_api.py index 8edca64..1de05f0 100644 --- a/src/fw/api/app_approvals_api.py +++ b/src/fw/api/app_approvals_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -24,9 +24,9 @@ from fw.models.app_approvals_update_request import AppApprovalsUpdateRequest from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class AppApprovalsApi: diff --git a/src/fw/api/application_filters_api.py b/src/fw/api/application_filters_api.py index 87c3eb7..6e48a9d 100644 --- a/src/fw/api/application_filters_api.py +++ b/src/fw/api/application_filters_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,9 +27,9 @@ from fw.models.application_filters_delete_request import ApplicationFiltersDeleteRequest from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ApplicationFiltersApi: @@ -1519,7 +1519,7 @@ def update_application_filter( ) -> ApplicationFilterUpdateResponse: """Update Application Filter. - Use this method to update the specified Application Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - id - name - criteria + Use this method to update the specified Application Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - id - name - criteria :param id: The Application Filter object identifier. (required) :type id: int @@ -1589,7 +1589,7 @@ def update_application_filter_with_http_info( ) -> ApiResponse[ApplicationFilterUpdateResponse]: """Update Application Filter. - Use this method to update the specified Application Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - id - name - criteria + Use this method to update the specified Application Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - id - name - criteria :param id: The Application Filter object identifier. (required) :type id: int @@ -1659,7 +1659,7 @@ def update_application_filter_without_preload_content( ) -> RESTResponseType: """Update Application Filter. - Use this method to update the specified Application Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - id - name - criteria + Use this method to update the specified Application Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - id - name - criteria :param id: The Application Filter object identifier. (required) :type id: int diff --git a/src/fw/api/category_filters_api.py b/src/fw/api/category_filters_api.py index f37429e..4961b56 100644 --- a/src/fw/api/category_filters_api.py +++ b/src/fw/api/category_filters_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,9 +27,9 @@ from fw.models.category_filters_delete_request import CategoryFiltersDeleteRequest from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class CategoryFiltersApi: @@ -62,7 +62,7 @@ def create_category_filter( ) -> CategoryFilterCreateResponse: """Create Category Filter. - Use this method to create a Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories + Use this method to create a Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories :param body: The Category Filter object. (required) :type body: CategoryFilter @@ -128,7 +128,7 @@ def create_category_filter_with_http_info( ) -> ApiResponse[CategoryFilterCreateResponse]: """Create Category Filter. - Use this method to create a Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories + Use this method to create a Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories :param body: The Category Filter object. (required) :type body: CategoryFilter @@ -194,7 +194,7 @@ def create_category_filter_without_preload_content( ) -> RESTResponseType: """Create Category Filter. - Use this method to create a Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories + Use this method to create a Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories :param body: The Category Filter object. (required) :type body: CategoryFilter @@ -314,7 +314,7 @@ def delete_category_filters( ) -> None: """Delete Category Filters By ID. - Use this method to delete Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - ids + Use this method to delete Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - ids :param body: (required) :type body: CategoryFiltersDeleteRequest @@ -378,7 +378,7 @@ def delete_category_filters_with_http_info( ) -> ApiResponse[None]: """Delete Category Filters By ID. - Use this method to delete Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - ids + Use this method to delete Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - ids :param body: (required) :type body: CategoryFiltersDeleteRequest @@ -442,7 +442,7 @@ def delete_category_filters_without_preload_content( ) -> RESTResponseType: """Delete Category Filters By ID. - Use this method to delete Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - ids + Use this method to delete Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - ids :param body: (required) :type body: CategoryFiltersDeleteRequest @@ -563,7 +563,7 @@ def delete_single_category_filters( ) -> None: """Delete Category Filters. - Use this method to delete Category Filter objects. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. + Use this method to delete Category Filter objects. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. :param id: The Category Filter object identifier. (required) :type id: int @@ -630,7 +630,7 @@ def delete_single_category_filters_with_http_info( ) -> ApiResponse[None]: """Delete Category Filters. - Use this method to delete Category Filter objects. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. + Use this method to delete Category Filter objects. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. :param id: The Category Filter object identifier. (required) :type id: int @@ -697,7 +697,7 @@ def delete_single_category_filters_without_preload_content( ) -> RESTResponseType: """Delete Category Filters. - Use this method to delete Category Filter objects. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. + Use this method to delete Category Filter objects. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. :param id: The Category Filter object identifier. (required) :type id: int @@ -840,7 +840,7 @@ def list_category_filters( ) -> CategoryFilterMultiResponse: """List Category Filters. - Use this method to retrieve information on all Category Filter objects for the account. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. + Use this method to retrieve information on all Category Filter objects for the account. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ------------------ | ------ | --------------------------- | | name | string | !=, ==, ~, !~, >, <, <=, >= | In addition, grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | Example: ``` ?_filter=\"((name=='cat-filter')or(name~'key'))and(name!='something')\" ``` :type filter: str @@ -954,7 +954,7 @@ def list_category_filters_with_http_info( ) -> ApiResponse[CategoryFilterMultiResponse]: """List Category Filters. - Use this method to retrieve information on all Category Filter objects for the account. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. + Use this method to retrieve information on all Category Filter objects for the account. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ------------------ | ------ | --------------------------- | | name | string | !=, ==, ~, !~, >, <, <=, >= | In addition, grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | Example: ``` ?_filter=\"((name=='cat-filter')or(name~'key'))and(name!='something')\" ``` :type filter: str @@ -1068,7 +1068,7 @@ def list_category_filters_without_preload_content( ) -> RESTResponseType: """List Category Filters. - Use this method to retrieve information on all Category Filter objects for the account. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. + Use this method to retrieve information on all Category Filter objects for the account. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ------------------ | ------ | --------------------------- | | name | string | !=, ==, ~, !~, >, <, <=, >= | In addition, grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | Example: ``` ?_filter=\"((name=='cat-filter')or(name~'key'))and(name!='something')\" ``` :type filter: str @@ -1235,7 +1235,7 @@ def read_category_filter( ) -> CategoryFilterReadResponse: """Read Category Filter. - Use this method to retrieve information on the specified Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. + Use this method to retrieve information on the specified Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. :param id: The Category Filter object identifier. (required) :type id: int @@ -1314,7 +1314,7 @@ def read_category_filter_with_http_info( ) -> ApiResponse[CategoryFilterReadResponse]: """Read Category Filter. - Use this method to retrieve information on the specified Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. + Use this method to retrieve information on the specified Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. :param id: The Category Filter object identifier. (required) :type id: int @@ -1393,7 +1393,7 @@ def read_category_filter_without_preload_content( ) -> RESTResponseType: """Read Category Filter. - Use this method to retrieve information on the specified Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. + Use this method to retrieve information on the specified Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. :param id: The Category Filter object identifier. (required) :type id: int @@ -1522,7 +1522,7 @@ def update_category_filter( ) -> CategoryFilterUpdateResponse: """Update Category Filter. - Use this method to update the specified Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories + Use this method to update the specified Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories :param id: The Category Filter object identifier. (required) :type id: int @@ -1595,7 +1595,7 @@ def update_category_filter_with_http_info( ) -> ApiResponse[CategoryFilterUpdateResponse]: """Update Category Filter. - Use this method to update the specified Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories + Use this method to update the specified Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories :param id: The Category Filter object identifier. (required) :type id: int @@ -1668,7 +1668,7 @@ def update_category_filter_without_preload_content( ) -> RESTResponseType: """Update Category Filter. - Use this method to update the specified Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories + Use this method to update the specified Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories :param id: The Category Filter object identifier. (required) :type id: int diff --git a/src/fw/api/content_categories_api.py b/src/fw/api/content_categories_api.py index 1f1d840..7647829 100644 --- a/src/fw/api/content_categories_api.py +++ b/src/fw/api/content_categories_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -22,9 +22,9 @@ from fw.models.content_category_multi_response import ContentCategoryMultiResponse from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ContentCategoriesApi: @@ -61,7 +61,7 @@ def list_content_categories( ) -> ContentCategoryMultiResponse: """List Content Categories. - Use this method to retrieve information on all Content Category objects for the account. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. + Use this method to retrieve information on all Content Category objects for the account. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. :param fields: A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. :type fields: str @@ -129,7 +129,7 @@ def list_content_categories_with_http_info( ) -> ApiResponse[ContentCategoryMultiResponse]: """List Content Categories. - Use this method to retrieve information on all Content Category objects for the account. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. + Use this method to retrieve information on all Content Category objects for the account. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. :param fields: A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. :type fields: str @@ -197,7 +197,7 @@ def list_content_categories_without_preload_content( ) -> RESTResponseType: """List Content Categories. - Use this method to retrieve information on all Content Category objects for the account. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. + Use this method to retrieve information on all Content Category objects for the account. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. :param fields: A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. :type fields: str diff --git a/src/fw/api/internal_domain_lists_api.py b/src/fw/api/internal_domain_lists_api.py index 3c3ebd2..44da2c4 100644 --- a/src/fw/api/internal_domain_lists_api.py +++ b/src/fw/api/internal_domain_lists_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,9 +28,9 @@ from fw.models.internal_domains_update_response import InternalDomainsUpdateResponse from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class InternalDomainListsApi: diff --git a/src/fw/api/named_list_items_api.py b/src/fw/api/named_list_items_api.py index 9cbac62..9434e07 100644 --- a/src/fw/api/named_list_items_api.py +++ b/src/fw/api/named_list_items_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ from fw.models.named_list_items_partial_update import NamedListItemsPartialUpdate from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class NamedListItemsApi: diff --git a/src/fw/api/named_lists_api.py b/src/fw/api/named_lists_api.py index 20f8588..479a6b9 100644 --- a/src/fw/api/named_lists_api.py +++ b/src/fw/api/named_lists_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,9 +30,9 @@ from fw.models.named_lists_delete_request import NamedListsDeleteRequest from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class NamedListsApi: @@ -65,7 +65,7 @@ def create_named_list( ) -> NamedListCreateResponse: """Create Named List. - Use this method to create a Named List object. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - type - items or items_described + Use this method to create a Named List object. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - type - items or items_described :param body: The Named List object. (required) :type body: NamedList @@ -130,7 +130,7 @@ def create_named_list_with_http_info( ) -> ApiResponse[NamedListCreateResponse]: """Create Named List. - Use this method to create a Named List object. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - type - items or items_described + Use this method to create a Named List object. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - type - items or items_described :param body: The Named List object. (required) :type body: NamedList @@ -195,7 +195,7 @@ def create_named_list_without_preload_content( ) -> RESTResponseType: """Create Named List. - Use this method to create a Named List object. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - type - items or items_described + Use this method to create a Named List object. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - type - items or items_described :param body: The Named List object. (required) :type body: NamedList @@ -314,7 +314,7 @@ def delete_named_lists( ) -> None: """Delete Named Lists. - Use this method to delete Named List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Required: - ids + Use this method to delete Named List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Required: - ids :param body: (required) :type body: NamedListsDeleteRequest @@ -379,7 +379,7 @@ def delete_named_lists_with_http_info( ) -> ApiResponse[None]: """Delete Named Lists. - Use this method to delete Named List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Required: - ids + Use this method to delete Named List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Required: - ids :param body: (required) :type body: NamedListsDeleteRequest @@ -444,7 +444,7 @@ def delete_named_lists_without_preload_content( ) -> RESTResponseType: """Delete Named Lists. - Use this method to delete Named List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Required: - ids + Use this method to delete Named List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Required: - ids :param body: (required) :type body: NamedListsDeleteRequest @@ -565,7 +565,7 @@ def delete_single_named_lists( ) -> None: """Delete Named Lists. - Use this method to delete Named List object by given Named List object identifier. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + Use this method to delete Named List object by given Named List object identifier. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. :param id: The Named List object identifiers. (required) :type id: int @@ -632,7 +632,7 @@ def delete_single_named_lists_with_http_info( ) -> ApiResponse[None]: """Delete Named Lists. - Use this method to delete Named List object by given Named List object identifier. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + Use this method to delete Named List object by given Named List object identifier. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. :param id: The Named List object identifiers. (required) :type id: int @@ -699,7 +699,7 @@ def delete_single_named_lists_without_preload_content( ) -> RESTResponseType: """Delete Named Lists. - Use this method to delete Named List object by given Named List object identifier. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + Use this method to delete Named List object by given Named List object identifier. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. :param id: The Named List object identifiers. (required) :type id: int @@ -843,7 +843,7 @@ def list_named_lists( ) -> NamedListReadMultiResponse: """List Named Lists. - Use this method to retrieve information on all Named List objects for the account. Note that list items are not returned for this operation. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + Use this method to retrieve information on all Named List objects for the account. Note that list items are not returned for this operation. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Ops | | ------------------ | ------ | ---------------- | | type | string | ==, != | | items | string | ~, !~ | | items_described | string | == | Grouping operators (and, or, not, ()) are not supported between different fields. :type filter: str @@ -956,7 +956,7 @@ def list_named_lists_with_http_info( ) -> ApiResponse[NamedListReadMultiResponse]: """List Named Lists. - Use this method to retrieve information on all Named List objects for the account. Note that list items are not returned for this operation. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + Use this method to retrieve information on all Named List objects for the account. Note that list items are not returned for this operation. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Ops | | ------------------ | ------ | ---------------- | | type | string | ==, != | | items | string | ~, !~ | | items_described | string | == | Grouping operators (and, or, not, ()) are not supported between different fields. :type filter: str @@ -1069,7 +1069,7 @@ def list_named_lists_without_preload_content( ) -> RESTResponseType: """List Named Lists. - Use this method to retrieve information on all Named List objects for the account. Note that list items are not returned for this operation. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + Use this method to retrieve information on all Named List objects for the account. Note that list items are not returned for this operation. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Ops | | ------------------ | ------ | ---------------- | | type | string | ==, != | | items | string | ~, !~ | | items_described | string | == | Grouping operators (and, or, not, ()) are not supported between different fields. :type filter: str @@ -1836,7 +1836,7 @@ def read_named_list( ) -> NamedListReadResponse: """Read Named List. - Use this method to retrieve information on the specified Named List object. Note that returned data includes list items. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + Use this method to retrieve information on the specified Named List object. Note that returned data includes list items. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. :param id: The Named List identifier. (required) :type id: int @@ -1954,7 +1954,7 @@ def read_named_list_with_http_info( ) -> ApiResponse[NamedListReadResponse]: """Read Named List. - Use this method to retrieve information on the specified Named List object. Note that returned data includes list items. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + Use this method to retrieve information on the specified Named List object. Note that returned data includes list items. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. :param id: The Named List identifier. (required) :type id: int @@ -2072,7 +2072,7 @@ def read_named_list_without_preload_content( ) -> RESTResponseType: """Read Named List. - Use this method to retrieve information on the specified Named List object. Note that returned data includes list items. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + Use this method to retrieve information on the specified Named List object. Note that returned data includes list items. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. :param id: The Named List identifier. (required) :type id: int @@ -2231,7 +2231,7 @@ def update_named_list( ) -> NamedListUpdateResponse: """Update Named List. - Use this method to update the specified Named List object. Note that list type cannot be updated. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - items or items_described + Use this method to update the specified Named List object. Note that list type cannot be updated. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - items or items_described :param id: The Named List object identifier. (required) :type id: int @@ -2302,7 +2302,7 @@ def update_named_list_with_http_info( ) -> ApiResponse[NamedListUpdateResponse]: """Update Named List. - Use this method to update the specified Named List object. Note that list type cannot be updated. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - items or items_described + Use this method to update the specified Named List object. Note that list type cannot be updated. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - items or items_described :param id: The Named List object identifier. (required) :type id: int @@ -2373,7 +2373,7 @@ def update_named_list_without_preload_content( ) -> RESTResponseType: """Update Named List. - Use this method to update the specified Named List object. Note that list type cannot be updated. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - items or items_described + Use this method to update the specified Named List object. Note that list type cannot be updated. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - items or items_described :param id: The Named List object identifier. (required) :type id: int diff --git a/src/fw/api/network_lists_api.py b/src/fw/api/network_lists_api.py index 54c42f4..4fd6bf0 100644 --- a/src/fw/api/network_lists_api.py +++ b/src/fw/api/network_lists_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,9 +27,9 @@ from fw.models.network_lists_delete_request import NetworkListsDeleteRequest from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class NetworkListsApi: @@ -62,7 +62,7 @@ def create_network_list( ) -> NetworkListCreateResponse: """Create Network List. - Use this method to create a Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items + Use this method to create a Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items :param body: The Network List object. (required) :type body: NetworkList @@ -128,7 +128,7 @@ def create_network_list_with_http_info( ) -> ApiResponse[NetworkListCreateResponse]: """Create Network List. - Use this method to create a Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items + Use this method to create a Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items :param body: The Network List object. (required) :type body: NetworkList @@ -194,7 +194,7 @@ def create_network_list_without_preload_content( ) -> RESTResponseType: """Create Network List. - Use this method to create a Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items + Use this method to create a Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items :param body: The Network List object. (required) :type body: NetworkList @@ -314,7 +314,7 @@ def delete_network_lists( ) -> None: """Delete Network Lists. - Use this method to delete the Network List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. Required: - ids + Use this method to delete the Network List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. Required: - ids :param body: (required) :type body: NetworkListsDeleteRequest @@ -379,7 +379,7 @@ def delete_network_lists_with_http_info( ) -> ApiResponse[None]: """Delete Network Lists. - Use this method to delete the Network List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. Required: - ids + Use this method to delete the Network List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. Required: - ids :param body: (required) :type body: NetworkListsDeleteRequest @@ -444,7 +444,7 @@ def delete_network_lists_without_preload_content( ) -> RESTResponseType: """Delete Network Lists. - Use this method to delete the Network List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. Required: - ids + Use this method to delete the Network List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. Required: - ids :param body: (required) :type body: NetworkListsDeleteRequest @@ -566,7 +566,7 @@ def delete_single_network_lists( ) -> None: """Delete Network Lists. - Use this method to delete the Network List object by the specified Network List object id. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. + Use this method to delete the Network List object by the specified Network List object id. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. :param id: The Network List object identifier. (required) :type id: int @@ -634,7 +634,7 @@ def delete_single_network_lists_with_http_info( ) -> ApiResponse[None]: """Delete Network Lists. - Use this method to delete the Network List object by the specified Network List object id. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. + Use this method to delete the Network List object by the specified Network List object id. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. :param id: The Network List object identifier. (required) :type id: int @@ -702,7 +702,7 @@ def delete_single_network_lists_without_preload_content( ) -> RESTResponseType: """Delete Network Lists. - Use this method to delete the Network List object by the specified Network List object id. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. + Use this method to delete the Network List object by the specified Network List object id. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. :param id: The Network List object identifier. (required) :type id: int @@ -842,7 +842,7 @@ def list_network_lists( ) -> NetworkListMultiResponse: """List Network Lists. - Use this method to retrieve information on all Network List objects for the account. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. + Use this method to retrieve information on all Network List objects for the account. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ----------------------- | ------ | --------------------------- | | id | int32 | !=, ==, >, <, <=, >= | | policy_id | int32 | !=, ==, >, <, <=, >= | | name | string | !=, ==, ~, !~, >, <, <=, >= | | description | string | !=, ==, ~, !~, >, <, <=, >= | | default_security_policy | bool | !=, == | | items | string | >= | In addition grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | Allowed sets of parameters that can be groupped in one query: - id, policy_id, name, description, default_security_policy - items Example: ``` ?_filter=\"((name=='net_list1')or(name~'list_b'))and(default_security_policy!='true')\" ``` :type filter: str @@ -946,7 +946,7 @@ def list_network_lists_with_http_info( ) -> ApiResponse[NetworkListMultiResponse]: """List Network Lists. - Use this method to retrieve information on all Network List objects for the account. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. + Use this method to retrieve information on all Network List objects for the account. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ----------------------- | ------ | --------------------------- | | id | int32 | !=, ==, >, <, <=, >= | | policy_id | int32 | !=, ==, >, <, <=, >= | | name | string | !=, ==, ~, !~, >, <, <=, >= | | description | string | !=, ==, ~, !~, >, <, <=, >= | | default_security_policy | bool | !=, == | | items | string | >= | In addition grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | Allowed sets of parameters that can be groupped in one query: - id, policy_id, name, description, default_security_policy - items Example: ``` ?_filter=\"((name=='net_list1')or(name~'list_b'))and(default_security_policy!='true')\" ``` :type filter: str @@ -1050,7 +1050,7 @@ def list_network_lists_without_preload_content( ) -> RESTResponseType: """List Network Lists. - Use this method to retrieve information on all Network List objects for the account. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. + Use this method to retrieve information on all Network List objects for the account. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ----------------------- | ------ | --------------------------- | | id | int32 | !=, ==, >, <, <=, >= | | policy_id | int32 | !=, ==, >, <, <=, >= | | name | string | !=, ==, ~, !~, >, <, <=, >= | | description | string | !=, ==, ~, !~, >, <, <=, >= | | default_security_policy | bool | !=, == | | items | string | >= | In addition grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | Allowed sets of parameters that can be groupped in one query: - id, policy_id, name, description, default_security_policy - items Example: ``` ?_filter=\"((name=='net_list1')or(name~'list_b'))and(default_security_policy!='true')\" ``` :type filter: str @@ -1203,7 +1203,7 @@ def read_network_list( ) -> NetworkListReadResponse: """Read Network List. - Use this method to retrieve information on the specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. + Use this method to retrieve information on the specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. :param id: The Network List object identifier. (required) :type id: int @@ -1283,7 +1283,7 @@ def read_network_list_with_http_info( ) -> ApiResponse[NetworkListReadResponse]: """Read Network List. - Use this method to retrieve information on the specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. + Use this method to retrieve information on the specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. :param id: The Network List object identifier. (required) :type id: int @@ -1363,7 +1363,7 @@ def read_network_list_without_preload_content( ) -> RESTResponseType: """Read Network List. - Use this method to retrieve information on the specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. + Use this method to retrieve information on the specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. :param id: The Network List object identifier. (required) :type id: int @@ -1491,7 +1491,7 @@ def update_network_list( ) -> NetworkListUpdateResponse: """Update Network List. - Use this method to update a specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items + Use this method to update a specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items :param id: The Network List object identifier. (required) :type id: int @@ -1564,7 +1564,7 @@ def update_network_list_with_http_info( ) -> ApiResponse[NetworkListUpdateResponse]: """Update Network List. - Use this method to update a specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items + Use this method to update a specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items :param id: The Network List object identifier. (required) :type id: int @@ -1637,7 +1637,7 @@ def update_network_list_without_preload_content( ) -> RESTResponseType: """Update Network List. - Use this method to update a specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items + Use this method to update a specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items :param id: The Network List object identifier. (required) :type id: int diff --git a/src/fw/api/pop_regions_api.py b/src/fw/api/pop_regions_api.py index 34011c7..667b1c8 100644 --- a/src/fw/api/pop_regions_api.py +++ b/src/fw/api/pop_regions_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -23,9 +23,9 @@ from fw.models.read_po_p_region_response import ReadPoPRegionResponse from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class PopRegionsApi: diff --git a/src/fw/api/security_policies_api.py b/src/fw/api/security_policies_api.py index 0024cfe..9f425bc 100644 --- a/src/fw/api/security_policies_api.py +++ b/src/fw/api/security_policies_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,9 +27,9 @@ from fw.models.security_policy_update_response import SecurityPolicyUpdateResponse from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class SecurityPoliciesApi: @@ -62,7 +62,7 @@ def create_security_policy( ) -> SecurityPolicyCreateResponse: """Create Security Policy. - Use this method to create a Security Policy object. If no rule list is specified, the newly created Security Policy object will create these rules as a copy of default Security Policy rules (\"Default Global Policy\"). If rule list is provided it must contain at least the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name + Use this method to create a Security Policy object. If no rule list is specified, the newly created Security Policy object will create these rules as a copy of default Security Policy rules (\"Default Global Policy\"). If rule list is provided it must contain at least the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name :param body: The Security Policy object. (required) :type body: SecurityPolicy @@ -129,7 +129,7 @@ def create_security_policy_with_http_info( ) -> ApiResponse[SecurityPolicyCreateResponse]: """Create Security Policy. - Use this method to create a Security Policy object. If no rule list is specified, the newly created Security Policy object will create these rules as a copy of default Security Policy rules (\"Default Global Policy\"). If rule list is provided it must contain at least the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name + Use this method to create a Security Policy object. If no rule list is specified, the newly created Security Policy object will create these rules as a copy of default Security Policy rules (\"Default Global Policy\"). If rule list is provided it must contain at least the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name :param body: The Security Policy object. (required) :type body: SecurityPolicy @@ -196,7 +196,7 @@ def create_security_policy_without_preload_content( ) -> RESTResponseType: """Create Security Policy. - Use this method to create a Security Policy object. If no rule list is specified, the newly created Security Policy object will create these rules as a copy of default Security Policy rules (\"Default Global Policy\"). If rule list is provided it must contain at least the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name + Use this method to create a Security Policy object. If no rule list is specified, the newly created Security Policy object will create these rules as a copy of default Security Policy rules (\"Default Global Policy\"). If rule list is provided it must contain at least the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name :param body: The Security Policy object. (required) :type body: SecurityPolicy @@ -317,7 +317,7 @@ def delete_security_policy( ) -> None: """Delete Security Policies. - Use this method to delete Security Policy objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - ids + Use this method to delete Security Policy objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - ids :param body: (required) :type body: SecurityPolicyDeleteRequest @@ -381,7 +381,7 @@ def delete_security_policy_with_http_info( ) -> ApiResponse[None]: """Delete Security Policies. - Use this method to delete Security Policy objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - ids + Use this method to delete Security Policy objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - ids :param body: (required) :type body: SecurityPolicyDeleteRequest @@ -445,7 +445,7 @@ def delete_security_policy_without_preload_content( ) -> RESTResponseType: """Delete Security Policies. - Use this method to delete Security Policy objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - ids + Use this method to delete Security Policy objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - ids :param body: (required) :type body: SecurityPolicyDeleteRequest @@ -566,7 +566,7 @@ def delete_single_security_policy( ) -> None: """Delete Security Policy. - Use this method to delete Security Policy object by given Security Policy object id. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. + Use this method to delete Security Policy object by given Security Policy object id. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. :param id: The Security Policy object identifiers. (required) :type id: int @@ -633,7 +633,7 @@ def delete_single_security_policy_with_http_info( ) -> ApiResponse[None]: """Delete Security Policy. - Use this method to delete Security Policy object by given Security Policy object id. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. + Use this method to delete Security Policy object by given Security Policy object id. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. :param id: The Security Policy object identifiers. (required) :type id: int @@ -700,7 +700,7 @@ def delete_single_security_policy_without_preload_content( ) -> RESTResponseType: """Delete Security Policy. - Use this method to delete Security Policy object by given Security Policy object id. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. + Use this method to delete Security Policy object by given Security Policy object id. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. :param id: The Security Policy object identifiers. (required) :type id: int @@ -844,7 +844,7 @@ def list_security_policies( ) -> SecurityPolicyMultiResponse: """List Security Policies. - Use this method to retrieve information on all Security Policy objects for the account. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. + Use this method to retrieve information on all Security Policy objects for the account. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ------------------ | ------ | --------------------------- | | id | int32 | !=, ==, >, <, <=, >= | | name | string | !=, ==, ~, !~, >, <, <=, >= | | description | string | !=, ==, ~, !~, >, <, <=, >= | | is_default | bool | !=, == | In addition grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | Example: ``` ?_filter=\"((name=='sec_policy_a')or(name~'policy_b'))and(is_default!='true')\" ``` :type filter: str @@ -962,7 +962,7 @@ def list_security_policies_with_http_info( ) -> ApiResponse[SecurityPolicyMultiResponse]: """List Security Policies. - Use this method to retrieve information on all Security Policy objects for the account. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. + Use this method to retrieve information on all Security Policy objects for the account. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ------------------ | ------ | --------------------------- | | id | int32 | !=, ==, >, <, <=, >= | | name | string | !=, ==, ~, !~, >, <, <=, >= | | description | string | !=, ==, ~, !~, >, <, <=, >= | | is_default | bool | !=, == | In addition grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | Example: ``` ?_filter=\"((name=='sec_policy_a')or(name~'policy_b'))and(is_default!='true')\" ``` :type filter: str @@ -1080,7 +1080,7 @@ def list_security_policies_without_preload_content( ) -> RESTResponseType: """List Security Policies. - Use this method to retrieve information on all Security Policy objects for the account. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. + Use this method to retrieve information on all Security Policy objects for the account. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ------------------ | ------ | --------------------------- | | id | int32 | !=, ==, >, <, <=, >= | | name | string | !=, ==, ~, !~, >, <, <=, >= | | description | string | !=, ==, ~, !~, >, <, <=, >= | | is_default | bool | !=, == | In addition grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | Example: ``` ?_filter=\"((name=='sec_policy_a')or(name~'policy_b'))and(is_default!='true')\" ``` :type filter: str @@ -1256,7 +1256,7 @@ def read_security_policy( ) -> SecurityPolicyReadResponse: """Read Security Policy. - Use this method to retrieve information on the specified Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. + Use this method to retrieve information on the specified Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. :param id: The Security Policy object identifier. (required) :type id: int @@ -1335,7 +1335,7 @@ def read_security_policy_with_http_info( ) -> ApiResponse[SecurityPolicyReadResponse]: """Read Security Policy. - Use this method to retrieve information on the specified Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. + Use this method to retrieve information on the specified Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. :param id: The Security Policy object identifier. (required) :type id: int @@ -1414,7 +1414,7 @@ def read_security_policy_without_preload_content( ) -> RESTResponseType: """Read Security Policy. - Use this method to retrieve information on the specified Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. + Use this method to retrieve information on the specified Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. :param id: The Security Policy object identifier. (required) :type id: int @@ -1543,7 +1543,7 @@ def update_security_policy( ) -> SecurityPolicyUpdateResponse: """Update Security Policy. - Use this method to update a specified Network List object. The policy data supplied with the update request must have the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name - rules - dfps - network_lists - roaming_device_groups + Use this method to update a specified Network List object. The policy data supplied with the update request must have the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name - rules - dfps - network_lists - roaming_device_groups :param id: The Security Policy object identifier. (required) :type id: int @@ -1616,7 +1616,7 @@ def update_security_policy_with_http_info( ) -> ApiResponse[SecurityPolicyUpdateResponse]: """Update Security Policy. - Use this method to update a specified Network List object. The policy data supplied with the update request must have the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name - rules - dfps - network_lists - roaming_device_groups + Use this method to update a specified Network List object. The policy data supplied with the update request must have the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name - rules - dfps - network_lists - roaming_device_groups :param id: The Security Policy object identifier. (required) :type id: int @@ -1689,7 +1689,7 @@ def update_security_policy_without_preload_content( ) -> RESTResponseType: """Update Security Policy. - Use this method to update a specified Network List object. The policy data supplied with the update request must have the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name - rules - dfps - network_lists - roaming_device_groups + Use this method to update a specified Network List object. The policy data supplied with the update request must have the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name - rules - dfps - network_lists - roaming_device_groups :param id: The Security Policy object identifier. (required) :type id: int diff --git a/src/fw/api/security_policy_rules_api.py b/src/fw/api/security_policy_rules_api.py index 7401589..3952b89 100644 --- a/src/fw/api/security_policy_rules_api.py +++ b/src/fw/api/security_policy_rules_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -22,9 +22,9 @@ from fw.models.security_policy_rule_multi_response import SecurityPolicyRuleMultiResponse from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class SecurityPolicyRulesApi: diff --git a/src/fw/api/threat_feeds_api.py b/src/fw/api/threat_feeds_api.py index 5deb5b3..2a7a97a 100644 --- a/src/fw/api/threat_feeds_api.py +++ b/src/fw/api/threat_feeds_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -22,9 +22,9 @@ from fw.models.threat_feed_multi_response import ThreatFeedMultiResponse from fw import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ThreatFeedsApi: @@ -85,7 +85,7 @@ def list_threat_feeds( ) -> ThreatFeedMultiResponse: """List Threat Feeds. - Use this method to retrieve information on all Threat Feed objects for the account. BloxOne Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. + Use this method to retrieve information on all Threat Feed objects for the account. Infoblox Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ------------------ | ------ | --------------------------- | | name | string | !=, ==, ~, !~, >, <, <=, >= | In addition grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Grouping Operators | Example: ``` ?_filter=\"((name=='AntiMalware')or(name~'FarSightNOD'))\" ``` :type filter: str @@ -188,7 +188,7 @@ def list_threat_feeds_with_http_info( ) -> ApiResponse[ThreatFeedMultiResponse]: """List Threat Feeds. - Use this method to retrieve information on all Threat Feed objects for the account. BloxOne Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. + Use this method to retrieve information on all Threat Feed objects for the account. Infoblox Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ------------------ | ------ | --------------------------- | | name | string | !=, ==, ~, !~, >, <, <=, >= | In addition grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Grouping Operators | Example: ``` ?_filter=\"((name=='AntiMalware')or(name~'FarSightNOD'))\" ``` :type filter: str @@ -291,7 +291,7 @@ def list_threat_feeds_without_preload_content( ) -> RESTResponseType: """List Threat Feeds. - Use this method to retrieve information on all Threat Feed objects for the account. BloxOne Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. + Use this method to retrieve information on all Threat Feed objects for the account. Infoblox Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. :param filter: A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. You can filter by following fields: | Name | type | Supported Op | | ------------------ | ------ | --------------------------- | | name | string | !=, ==, ~, !~, >, <, <=, >= | In addition grouping operators are supported: | Op | Description | | --- | -------------------- | | and | Logical AND | | or | Logical OR | | not | Logical NOT | | () | Grouping Operators | Example: ``` ?_filter=\"((name=='AntiMalware')or(name~'FarSightNOD'))\" ``` :type filter: str diff --git a/src/fw/docs/AccessCodesApi.md b/src/fw/docs/AccessCodesApi.md index 58dc1c0..5dffe72 100644 --- a/src/fw/docs/AccessCodesApi.md +++ b/src/fw/docs/AccessCodesApi.md @@ -27,13 +27,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -101,13 +101,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -171,13 +171,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -241,13 +241,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -314,13 +314,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -387,13 +387,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/AppApprovalsApi.md b/src/fw/docs/AppApprovalsApi.md index cf1d8db..2672962 100644 --- a/src/fw/docs/AppApprovalsApi.md +++ b/src/fw/docs/AppApprovalsApi.md @@ -22,13 +22,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -90,13 +90,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -159,13 +159,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/ApplicationFilter.md b/src/fw/docs/ApplicationFilter.md index a10e77b..4a9a701 100644 --- a/src/fw/docs/ApplicationFilter.md +++ b/src/fw/docs/ApplicationFilter.md @@ -1,6 +1,6 @@ # ApplicationFilter -The Application Filter object. Application filters are content application rules that BloxOne Cloud uses to detect and filter specific internet content. +The Application Filter object. Application filters are content application rules that Infoblox Cloud uses to detect and filter specific internet content. ## Properties diff --git a/src/fw/docs/ApplicationFiltersApi.md b/src/fw/docs/ApplicationFiltersApi.md index 9ad0ce1..dd1181c 100644 --- a/src/fw/docs/ApplicationFiltersApi.md +++ b/src/fw/docs/ApplicationFiltersApi.md @@ -27,13 +27,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -98,13 +98,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -168,13 +168,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -238,13 +238,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -314,13 +314,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -377,7 +377,7 @@ No authorization required Update Application Filter. -Use this method to update the specified Application Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - id - name - criteria +Use this method to update the specified Application Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - id - name - criteria ### Example @@ -387,13 +387,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/CategoryFilter.md b/src/fw/docs/CategoryFilter.md index 5772715..e725d14 100644 --- a/src/fw/docs/CategoryFilter.md +++ b/src/fw/docs/CategoryFilter.md @@ -1,6 +1,6 @@ # CategoryFilter -The Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. +The Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. ## Properties diff --git a/src/fw/docs/CategoryFiltersApi.md b/src/fw/docs/CategoryFiltersApi.md index 0382ffb..2c52c7a 100644 --- a/src/fw/docs/CategoryFiltersApi.md +++ b/src/fw/docs/CategoryFiltersApi.md @@ -17,7 +17,7 @@ Method | HTTP request | Description Create Category Filter. -Use this method to create a Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories +Use this method to create a Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories ### Example @@ -27,13 +27,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -90,7 +90,7 @@ No authorization required Delete Category Filters By ID. -Use this method to delete Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - ids +Use this method to delete Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - ids ### Example @@ -100,13 +100,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -160,7 +160,7 @@ No authorization required Delete Category Filters. -Use this method to delete Category Filter objects. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. +Use this method to delete Category Filter objects. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. ### Example @@ -170,13 +170,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -230,7 +230,7 @@ No authorization required List Category Filters. -Use this method to retrieve information on all Category Filter objects for the account. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. +Use this method to retrieve information on all Category Filter objects for the account. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. ### Example @@ -240,13 +240,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -306,7 +306,7 @@ No authorization required Read Category Filter. -Use this method to retrieve information on the specified Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. +Use this method to retrieve information on the specified Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. ### Example @@ -316,13 +316,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -380,7 +380,7 @@ No authorization required Update Category Filter. -Use this method to update the specified Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories +Use this method to update the specified Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. Required: - name - categories ### Example @@ -390,13 +390,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/ContentCategoriesApi.md b/src/fw/docs/ContentCategoriesApi.md index 4a90051..5b25371 100644 --- a/src/fw/docs/ContentCategoriesApi.md +++ b/src/fw/docs/ContentCategoriesApi.md @@ -12,7 +12,7 @@ Method | HTTP request | Description List Content Categories. -Use this method to retrieve information on all Content Category objects for the account. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. +Use this method to retrieve information on all Content Category objects for the account. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. ### Example @@ -22,13 +22,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/ContentCategory.md b/src/fw/docs/ContentCategory.md index bd96862..69c5c0d 100644 --- a/src/fw/docs/ContentCategory.md +++ b/src/fw/docs/ContentCategory.md @@ -1,6 +1,6 @@ # ContentCategory -The Content Category object. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many categories and sub-categories as you need. +The Content Category object. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many categories and sub-categories as you need. ## Properties diff --git a/src/fw/docs/InternalDomainListsApi.md b/src/fw/docs/InternalDomainListsApi.md index 16fe712..93e82d5 100644 --- a/src/fw/docs/InternalDomainListsApi.md +++ b/src/fw/docs/InternalDomainListsApi.md @@ -28,13 +28,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -101,13 +101,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -172,13 +172,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -243,13 +243,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -318,13 +318,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -394,13 +394,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -471,13 +471,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/NamedList.md b/src/fw/docs/NamedList.md index 77f9fdb..df8aa63 100644 --- a/src/fw/docs/NamedList.md +++ b/src/fw/docs/NamedList.md @@ -1,6 +1,6 @@ # NamedList -The Named List object. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. +The Named List object. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. ## Properties diff --git a/src/fw/docs/NamedListItemsApi.md b/src/fw/docs/NamedListItemsApi.md index cec15f9..8ef1c5a 100644 --- a/src/fw/docs/NamedListItemsApi.md +++ b/src/fw/docs/NamedListItemsApi.md @@ -24,13 +24,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -97,13 +97,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -172,13 +172,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/NamedListRead.md b/src/fw/docs/NamedListRead.md index a3b0b1f..f2c26f0 100644 --- a/src/fw/docs/NamedListRead.md +++ b/src/fw/docs/NamedListRead.md @@ -1,6 +1,6 @@ # NamedListRead -The Named List object. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. +The Named List object. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. ## Properties diff --git a/src/fw/docs/NamedListsApi.md b/src/fw/docs/NamedListsApi.md index a3b3adc..d8a8257 100644 --- a/src/fw/docs/NamedListsApi.md +++ b/src/fw/docs/NamedListsApi.md @@ -20,7 +20,7 @@ Method | HTTP request | Description Create Named List. -Use this method to create a Named List object. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - type - items or items_described +Use this method to create a Named List object. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - type - items or items_described ### Example @@ -30,13 +30,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -93,7 +93,7 @@ No authorization required Delete Named Lists. -Use this method to delete Named List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Required: - ids +Use this method to delete Named List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Required: - ids ### Example @@ -103,13 +103,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -164,7 +164,7 @@ No authorization required Delete Named Lists. -Use this method to delete Named List object by given Named List object identifier. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. +Use this method to delete Named List object by given Named List object identifier. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. ### Example @@ -174,13 +174,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -235,7 +235,7 @@ No authorization required List Named Lists. -Use this method to retrieve information on all Named List objects for the account. Note that list items are not returned for this operation. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. +Use this method to retrieve information on all Named List objects for the account. Note that list items are not returned for this operation. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. ### Example @@ -245,13 +245,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -321,13 +321,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -394,13 +394,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -457,7 +457,7 @@ No authorization required Read Named List. -Use this method to retrieve information on the specified Named List object. Note that returned data includes list items. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. +Use this method to retrieve information on the specified Named List object. Note that returned data includes list items. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. ### Example @@ -467,13 +467,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -535,7 +535,7 @@ No authorization required Update Named List. -Use this method to update the specified Named List object. Note that list type cannot be updated. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - items or items_described +Use this method to update the specified Named List object. Note that list type cannot be updated. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. Also use of the field 'items' is discouraged and instead use of new field 'item_described' is suggested as it is possible to add the description/comments to each item in the custom list using this field. In any case, note that use of both the fields 'items' and 'items_described' is not supported and when one of these field is used they must have some value i.e, it cannot be empty. Required: - name - items or items_described ### Example @@ -545,13 +545,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -621,13 +621,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/NetworkList.md b/src/fw/docs/NetworkList.md index b0eace5..ef0a726 100644 --- a/src/fw/docs/NetworkList.md +++ b/src/fw/docs/NetworkList.md @@ -1,6 +1,6 @@ # NetworkList -The Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. +The Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. ## Properties diff --git a/src/fw/docs/NetworkListsApi.md b/src/fw/docs/NetworkListsApi.md index 48230a6..d5c5b05 100644 --- a/src/fw/docs/NetworkListsApi.md +++ b/src/fw/docs/NetworkListsApi.md @@ -17,7 +17,7 @@ Method | HTTP request | Description Create Network List. -Use this method to create a Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items +Use this method to create a Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items ### Example @@ -27,13 +27,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -79,7 +79,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| **201** | POST operation response | - | -**400** | - 'name' length cannot exceed 256 characters limit - 'name' value cannot be equal to 'All BloxOne Endpoints (Default)', 'All Networks (Default)', 'All DNS Forwarder Proxies (Default)' - 'description' length cannot exceed 256 characters limit - 'items' value must not be empty - 'items' value must contain valid CIDRs from range [24, 32] - CIDRs in 'items' cannot overlap with each other and with existing items for all accounts | - | +**400** | - 'name' length cannot exceed 256 characters limit - 'name' value cannot be equal to 'All Infoblox Endpoints (Default)', 'All Networks (Default)', 'All DNS Forwarder Proxies (Default)' - 'description' length cannot exceed 256 characters limit - 'items' value must not be empty - 'items' value must contain valid CIDRs from range [24, 32] - CIDRs in 'items' cannot overlap with each other and with existing items for all accounts | - | **409** | - 'name' value must be unique among network lists belonging to the same account | - | **500** | - Internal server error occurred | - | @@ -90,7 +90,7 @@ No authorization required Delete Network Lists. -Use this method to delete the Network List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. Required: - ids +Use this method to delete the Network List objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. Required: - ids ### Example @@ -100,13 +100,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -161,7 +161,7 @@ No authorization required Delete Network Lists. -Use this method to delete the Network List object by the specified Network List object id. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. +Use this method to delete the Network List object by the specified Network List object id. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of or IPv6 addresses or blocks. ### Example @@ -171,13 +171,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -232,7 +232,7 @@ No authorization required List Network Lists. -Use this method to retrieve information on all Network List objects for the account. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. +Use this method to retrieve information on all Network List objects for the account. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. ### Example @@ -242,13 +242,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -306,7 +306,7 @@ No authorization required Read Network List. -Use this method to retrieve information on the specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. +Use this method to retrieve information on the specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. ### Example @@ -316,13 +316,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -380,7 +380,7 @@ No authorization required Update Network List. -Use this method to update a specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items +Use this method to update a specified Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. Required: - name - items ### Example @@ -390,13 +390,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -444,7 +444,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| **201** | PUT operation response | - | -**400** | - 'name' length cannot exceed 256 characters limit - 'name' value cannot be equal to 'All BloxOne Endpoints (Default)', 'All Networks (Default)', 'All DNS Forwarder Proxies (Default)' - 'description' length cannot exceed 256 characters limit - 'items' value must not be empty - 'items' value must contain valid CIDRs from range [24, 32] - CIDRs in 'items' cannot overlap with each other and with existing items for all accounts | - | +**400** | - 'name' length cannot exceed 256 characters limit - 'name' value cannot be equal to 'All Infoblox Endpoints (Default)', 'All Networks (Default)', 'All DNS Forwarder Proxies (Default)' - 'description' length cannot exceed 256 characters limit - 'items' value must not be empty - 'items' value must contain valid CIDRs from range [24, 32] - CIDRs in 'items' cannot overlap with each other and with existing items for all accounts | - | **404** | - 'id' value must contain existing network list identifier | - | **409** | - 'name' value must be unique among network lists belonging to the same account | - | **500** | - Internal server error occurred | - | diff --git a/src/fw/docs/PopRegionsApi.md b/src/fw/docs/PopRegionsApi.md index 3c01ce8..aac80d1 100644 --- a/src/fw/docs/PopRegionsApi.md +++ b/src/fw/docs/PopRegionsApi.md @@ -23,13 +23,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -99,13 +99,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/SecurityPoliciesApi.md b/src/fw/docs/SecurityPoliciesApi.md index c58b5fe..9308f49 100644 --- a/src/fw/docs/SecurityPoliciesApi.md +++ b/src/fw/docs/SecurityPoliciesApi.md @@ -17,7 +17,7 @@ Method | HTTP request | Description Create Security Policy. -Use this method to create a Security Policy object. If no rule list is specified, the newly created Security Policy object will create these rules as a copy of default Security Policy rules (\"Default Global Policy\"). If rule list is provided it must contain at least the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name +Use this method to create a Security Policy object. If no rule list is specified, the newly created Security Policy object will create these rules as a copy of default Security Policy rules (\"Default Global Policy\"). If rule list is provided it must contain at least the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name ### Example @@ -27,13 +27,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -91,7 +91,7 @@ No authorization required Delete Security Policies. -Use this method to delete Security Policy objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - ids +Use this method to delete Security Policy objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - ids ### Example @@ -101,13 +101,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -161,7 +161,7 @@ No authorization required Delete Security Policy. -Use this method to delete Security Policy object by given Security Policy object id. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. +Use this method to delete Security Policy object by given Security Policy object id. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. ### Example @@ -171,13 +171,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -231,7 +231,7 @@ No authorization required List Security Policies. -Use this method to retrieve information on all Security Policy objects for the account. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. +Use this method to retrieve information on all Security Policy objects for the account. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. ### Example @@ -241,13 +241,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -308,7 +308,7 @@ No authorization required Read Security Policy. -Use this method to retrieve information on the specified Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. +Use this method to retrieve information on the specified Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. ### Example @@ -318,13 +318,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -382,7 +382,7 @@ No authorization required Update Security Policy. -Use this method to update a specified Network List object. The policy data supplied with the update request must have the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name - rules - dfps - network_lists - roaming_device_groups +Use this method to update a specified Network List object. The policy data supplied with the update request must have the complete list of policy rules, including the rules based on all feeds that the account is entitled to. If no network list is specified, networking scope for this policy is empty, thus no action can be performed by this policy. Note that you are not allowed to add DNS Forwarding Proxies and Roaming Device Groups that are already assigned to a Security Policy different from \"Default Global Policy\", to assign them to this Security Policy object you should remove them from other Security Policy first. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. Required: - name - rules - dfps - network_lists - roaming_device_groups ### Example @@ -392,13 +392,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/SecurityPolicy.md b/src/fw/docs/SecurityPolicy.md index 6ae3a8c..d75c72d 100644 --- a/src/fw/docs/SecurityPolicy.md +++ b/src/fw/docs/SecurityPolicy.md @@ -1,6 +1,6 @@ # SecurityPolicy -The Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. +The Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. ## Properties @@ -21,7 +21,7 @@ Name | Type | Description | Notes **network_lists** | **List[int]** | The list of Network Lists identifiers that represents networks that you want to protect from malicious attacks. | [optional] **onprem_resolve** | **bool** | Use DNS resolve on onprem side | [optional] **precedence** | **int** | Security precedence enable selection of the highest priority policy, in cases where a query matches multiple policies. | [optional] -**roaming_device_groups** | **List[int]** | The list of BloxOne Endpoint groups identifiers. | [optional] +**roaming_device_groups** | **List[int]** | The list of Infoblox Endpoint groups identifiers. | [optional] **rules** | [**List[SecurityPolicyRule]**](SecurityPolicyRule.md) | The list of Security Policy Rules objects that represent the set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. | [optional] **safe_search** | **bool** | Apply automated rules to enforce safe search | [optional] **tags** | **object** | Enables tag support for resource where tags attribute contains user-defined key value pairs | [optional] diff --git a/src/fw/docs/SecurityPolicyRulesApi.md b/src/fw/docs/SecurityPolicyRulesApi.md index e1faffa..70a250c 100644 --- a/src/fw/docs/SecurityPolicyRulesApi.md +++ b/src/fw/docs/SecurityPolicyRulesApi.md @@ -22,13 +22,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/docs/ThreatFeed.md b/src/fw/docs/ThreatFeed.md index 466847a..15229cc 100644 --- a/src/fw/docs/ThreatFeed.md +++ b/src/fw/docs/ThreatFeed.md @@ -1,6 +1,6 @@ # ThreatFeed -The Threat Feed object. BloxOne Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. +The Threat Feed object. Infoblox Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. ## Properties diff --git a/src/fw/docs/ThreatFeedsApi.md b/src/fw/docs/ThreatFeedsApi.md index 634486e..d26bcf7 100644 --- a/src/fw/docs/ThreatFeedsApi.md +++ b/src/fw/docs/ThreatFeedsApi.md @@ -12,7 +12,7 @@ Method | HTTP request | Description List Threat Feeds. -Use this method to retrieve information on all Threat Feed objects for the account. BloxOne Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. +Use this method to retrieve information on all Threat Feed objects for the account. Infoblox Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. ### Example @@ -22,13 +22,13 @@ from pprint import pprint import fw -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/fw/models/__init__.py b/src/fw/models/__init__.py index df9acf7..fa48f32 100644 --- a/src/fw/models/__init__.py +++ b/src/fw/models/__init__.py @@ -2,9 +2,9 @@ # flake8: noqa """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_code.py b/src/fw/models/access_code.py index 8ee75d1..4981177 100644 --- a/src/fw/models/access_code.py +++ b/src/fw/models/access_code.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_code_create_response.py b/src/fw/models/access_code_create_response.py index f046d3a..a90050e 100644 --- a/src/fw/models/access_code_create_response.py +++ b/src/fw/models/access_code_create_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_code_delete_request.py b/src/fw/models/access_code_delete_request.py index 002ff87..b9c54cd 100644 --- a/src/fw/models/access_code_delete_request.py +++ b/src/fw/models/access_code_delete_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_code_multi_response.py b/src/fw/models/access_code_multi_response.py index 3ab4180..3bf4712 100644 --- a/src/fw/models/access_code_multi_response.py +++ b/src/fw/models/access_code_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_code_read_response.py b/src/fw/models/access_code_read_response.py index 1bd80c1..0023a02 100644 --- a/src/fw/models/access_code_read_response.py +++ b/src/fw/models/access_code_read_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_code_rule.py b/src/fw/models/access_code_rule.py index b836477..a3214ea 100644 --- a/src/fw/models/access_code_rule.py +++ b/src/fw/models/access_code_rule.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_code_update_response.py b/src/fw/models/access_code_update_response.py index 8eb7e90..9d89cb5 100644 --- a/src/fw/models/access_code_update_response.py +++ b/src/fw/models/access_code_update_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_create_access_code400_response.py b/src/fw/models/access_codes_create_access_code400_response.py index db95d3d..5e27a6c 100644 --- a/src/fw/models/access_codes_create_access_code400_response.py +++ b/src/fw/models/access_codes_create_access_code400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_create_access_code400_response_error.py b/src/fw/models/access_codes_create_access_code400_response_error.py index 321f60a..d169bfd 100644 --- a/src/fw/models/access_codes_create_access_code400_response_error.py +++ b/src/fw/models/access_codes_create_access_code400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_create_access_code404_response.py b/src/fw/models/access_codes_create_access_code404_response.py index 0bd577a..8e07e67 100644 --- a/src/fw/models/access_codes_create_access_code404_response.py +++ b/src/fw/models/access_codes_create_access_code404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_create_access_code404_response_error.py b/src/fw/models/access_codes_create_access_code404_response_error.py index 126e5dc..64dab30 100644 --- a/src/fw/models/access_codes_create_access_code404_response_error.py +++ b/src/fw/models/access_codes_create_access_code404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_create_access_code409_response.py b/src/fw/models/access_codes_create_access_code409_response.py index f7cec91..3b3735c 100644 --- a/src/fw/models/access_codes_create_access_code409_response.py +++ b/src/fw/models/access_codes_create_access_code409_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_create_access_code409_response_error.py b/src/fw/models/access_codes_create_access_code409_response_error.py index bd2df4d..0807b12 100644 --- a/src/fw/models/access_codes_create_access_code409_response_error.py +++ b/src/fw/models/access_codes_create_access_code409_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_delete_access_codes400_response.py b/src/fw/models/access_codes_delete_access_codes400_response.py index aa976e0..c27d159 100644 --- a/src/fw/models/access_codes_delete_access_codes400_response.py +++ b/src/fw/models/access_codes_delete_access_codes400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_delete_access_codes400_response_error.py b/src/fw/models/access_codes_delete_access_codes400_response_error.py index 70b673b..e181e4e 100644 --- a/src/fw/models/access_codes_delete_access_codes400_response_error.py +++ b/src/fw/models/access_codes_delete_access_codes400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_delete_single_access_codes400_response.py b/src/fw/models/access_codes_delete_single_access_codes400_response.py index 3a94e7a..77947b1 100644 --- a/src/fw/models/access_codes_delete_single_access_codes400_response.py +++ b/src/fw/models/access_codes_delete_single_access_codes400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_delete_single_access_codes400_response_error.py b/src/fw/models/access_codes_delete_single_access_codes400_response_error.py index ffc11ad..2738761 100644 --- a/src/fw/models/access_codes_delete_single_access_codes400_response_error.py +++ b/src/fw/models/access_codes_delete_single_access_codes400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_list_access_codes500_response.py b/src/fw/models/access_codes_list_access_codes500_response.py index e29ad20..d300579 100644 --- a/src/fw/models/access_codes_list_access_codes500_response.py +++ b/src/fw/models/access_codes_list_access_codes500_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_list_access_codes500_response_error.py b/src/fw/models/access_codes_list_access_codes500_response_error.py index b1ffc98..be4ed25 100644 --- a/src/fw/models/access_codes_list_access_codes500_response_error.py +++ b/src/fw/models/access_codes_list_access_codes500_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_read_access_code404_response.py b/src/fw/models/access_codes_read_access_code404_response.py index 2bb2b1f..84adfbd 100644 --- a/src/fw/models/access_codes_read_access_code404_response.py +++ b/src/fw/models/access_codes_read_access_code404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/access_codes_read_access_code404_response_error.py b/src/fw/models/access_codes_read_access_code404_response_error.py index 9cbbdf2..b906a0b 100644 --- a/src/fw/models/access_codes_read_access_code404_response_error.py +++ b/src/fw/models/access_codes_read_access_code404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/app_approval.py b/src/fw/models/app_approval.py index 01a3464..3caaed5 100644 --- a/src/fw/models/app_approval.py +++ b/src/fw/models/app_approval.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/app_approval_multi_response.py b/src/fw/models/app_approval_multi_response.py index d36efc1..6359351 100644 --- a/src/fw/models/app_approval_multi_response.py +++ b/src/fw/models/app_approval_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/app_approval_removal_request.py b/src/fw/models/app_approval_removal_request.py index f6420f6..16a0fc6 100644 --- a/src/fw/models/app_approval_removal_request.py +++ b/src/fw/models/app_approval_removal_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/app_approvals_replace_request.py b/src/fw/models/app_approvals_replace_request.py index 80694d0..5200d50 100644 --- a/src/fw/models/app_approvals_replace_request.py +++ b/src/fw/models/app_approvals_replace_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/app_approvals_update_request.py b/src/fw/models/app_approvals_update_request.py index 02cd3d0..6dda544 100644 --- a/src/fw/models/app_approvals_update_request.py +++ b/src/fw/models/app_approvals_update_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/application_criterion.py b/src/fw/models/application_criterion.py index ee16e83..e95e030 100644 --- a/src/fw/models/application_criterion.py +++ b/src/fw/models/application_criterion.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/application_filter.py b/src/fw/models/application_filter.py index 6a5b76b..a1f984b 100644 --- a/src/fw/models/application_filter.py +++ b/src/fw/models/application_filter.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApplicationFilter(BaseModel): """ - The Application Filter object. Application filters are content application rules that BloxOne Cloud uses to detect and filter specific internet content. + The Application Filter object. Application filters are content application rules that Infoblox Cloud uses to detect and filter specific internet content. """ # noqa: E501 created_time: Optional[datetime] = Field( default=None, diff --git a/src/fw/models/application_filter_create_response.py b/src/fw/models/application_filter_create_response.py index bfb0a0e..df7d5e2 100644 --- a/src/fw/models/application_filter_create_response.py +++ b/src/fw/models/application_filter_create_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/application_filter_multi_response.py b/src/fw/models/application_filter_multi_response.py index 6ff7483..a9a8837 100644 --- a/src/fw/models/application_filter_multi_response.py +++ b/src/fw/models/application_filter_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/application_filter_read_response.py b/src/fw/models/application_filter_read_response.py index f22b94e..5109ba2 100644 --- a/src/fw/models/application_filter_read_response.py +++ b/src/fw/models/application_filter_read_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/application_filter_update_response.py b/src/fw/models/application_filter_update_response.py index 6c09c9c..4e478fb 100644 --- a/src/fw/models/application_filter_update_response.py +++ b/src/fw/models/application_filter_update_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/application_filters_delete_application_filters400_response.py b/src/fw/models/application_filters_delete_application_filters400_response.py index ff18c0a..609cf56 100644 --- a/src/fw/models/application_filters_delete_application_filters400_response.py +++ b/src/fw/models/application_filters_delete_application_filters400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/application_filters_delete_application_filters400_response_error.py b/src/fw/models/application_filters_delete_application_filters400_response_error.py index d6c6ad2..6c05a52 100644 --- a/src/fw/models/application_filters_delete_application_filters400_response_error.py +++ b/src/fw/models/application_filters_delete_application_filters400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/application_filters_delete_request.py b/src/fw/models/application_filters_delete_request.py index 6c4a84e..d05e837 100644 --- a/src/fw/models/application_filters_delete_request.py +++ b/src/fw/models/application_filters_delete_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/application_filters_delete_single_application_filters400_response.py b/src/fw/models/application_filters_delete_single_application_filters400_response.py index 48b4343..f2020af 100644 --- a/src/fw/models/application_filters_delete_single_application_filters400_response.py +++ b/src/fw/models/application_filters_delete_single_application_filters400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/application_filters_delete_single_application_filters400_response_error.py b/src/fw/models/application_filters_delete_single_application_filters400_response_error.py index dd72c67..de25ee6 100644 --- a/src/fw/models/application_filters_delete_single_application_filters400_response_error.py +++ b/src/fw/models/application_filters_delete_single_application_filters400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filter.py b/src/fw/models/category_filter.py index bbf5101..ab52304 100644 --- a/src/fw/models/category_filter.py +++ b/src/fw/models/category_filter.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class CategoryFilter(BaseModel): """ - The Category Filter object. Category filters are content categorization rules that BloxOne Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. + The Category Filter object. Category filters are content categorization rules that Infoblox Cloud uses to detect and filter specific internet content. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many sub-categories as you need. You then add the category filter to your security policy and assign the Block action for the filter. """ # noqa: E501 categories: Optional[List[StrictStr]] = Field( default=None, diff --git a/src/fw/models/category_filter_create_response.py b/src/fw/models/category_filter_create_response.py index ea84325..5341523 100644 --- a/src/fw/models/category_filter_create_response.py +++ b/src/fw/models/category_filter_create_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filter_multi_response.py b/src/fw/models/category_filter_multi_response.py index 1808cb8..0edb3ec 100644 --- a/src/fw/models/category_filter_multi_response.py +++ b/src/fw/models/category_filter_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filter_read_response.py b/src/fw/models/category_filter_read_response.py index d9cbec7..e035364 100644 --- a/src/fw/models/category_filter_read_response.py +++ b/src/fw/models/category_filter_read_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filter_update_response.py b/src/fw/models/category_filter_update_response.py index 146e4e3..57bfc04 100644 --- a/src/fw/models/category_filter_update_response.py +++ b/src/fw/models/category_filter_update_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filters_create_category_filter400_response.py b/src/fw/models/category_filters_create_category_filter400_response.py index 858ecf6..cb2c09e 100644 --- a/src/fw/models/category_filters_create_category_filter400_response.py +++ b/src/fw/models/category_filters_create_category_filter400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filters_create_category_filter400_response_error.py b/src/fw/models/category_filters_create_category_filter400_response_error.py index 88e3c44..9f81eda 100644 --- a/src/fw/models/category_filters_create_category_filter400_response_error.py +++ b/src/fw/models/category_filters_create_category_filter400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filters_create_category_filter409_response.py b/src/fw/models/category_filters_create_category_filter409_response.py index 537f873..3294b76 100644 --- a/src/fw/models/category_filters_create_category_filter409_response.py +++ b/src/fw/models/category_filters_create_category_filter409_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filters_create_category_filter409_response_error.py b/src/fw/models/category_filters_create_category_filter409_response_error.py index b32a7e5..e8b73fc 100644 --- a/src/fw/models/category_filters_create_category_filter409_response_error.py +++ b/src/fw/models/category_filters_create_category_filter409_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filters_delete_category_filters400_response.py b/src/fw/models/category_filters_delete_category_filters400_response.py index 07dff91..b7804c3 100644 --- a/src/fw/models/category_filters_delete_category_filters400_response.py +++ b/src/fw/models/category_filters_delete_category_filters400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filters_delete_category_filters400_response_error.py b/src/fw/models/category_filters_delete_category_filters400_response_error.py index ecc90cc..f92a479 100644 --- a/src/fw/models/category_filters_delete_category_filters400_response_error.py +++ b/src/fw/models/category_filters_delete_category_filters400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filters_delete_request.py b/src/fw/models/category_filters_delete_request.py index f947cd6..dc72002 100644 --- a/src/fw/models/category_filters_delete_request.py +++ b/src/fw/models/category_filters_delete_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filters_read_category_filter404_response.py b/src/fw/models/category_filters_read_category_filter404_response.py index b5aa731..7a5967e 100644 --- a/src/fw/models/category_filters_read_category_filter404_response.py +++ b/src/fw/models/category_filters_read_category_filter404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/category_filters_read_category_filter404_response_error.py b/src/fw/models/category_filters_read_category_filter404_response_error.py index 2f581ba..b598cdf 100644 --- a/src/fw/models/category_filters_read_category_filter404_response_error.py +++ b/src/fw/models/category_filters_read_category_filter404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/content_category.py b/src/fw/models/content_category.py index 00395ce..7f56600 100644 --- a/src/fw/models/content_category.py +++ b/src/fw/models/content_category.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -24,7 +24,7 @@ class ContentCategory(BaseModel): """ - The Content Category object. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. BloxOne Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many categories and sub-categories as you need. + The Content Category object. The Content Category object represents a specific internet content and used to configure category filters. Based on your configuration, specific actions such as Allow or Block, will be taken on the detected content. Infoblox Cloud provides the following content categories from which you can build your category filters: Drugs, Risk/Fraud/Crime, Entertainment/Culture, Purchasing, Information/Communication, Business/Services, Information Technology, Lifestyle, Society/Education/Religion, Mature/Violent, Games/Gambling, Pornography/Nudity and Uncategorized. Each of these categories contains sub-categories that further define the respective content. When you configure your category filter, you can add as many categories and sub-categories as you need. """ # noqa: E501 category_code: Optional[StrictInt] = Field( default=None, description="The category code.") diff --git a/src/fw/models/content_category_multi_response.py b/src/fw/models/content_category_multi_response.py index 3ae481f..2473922 100644 --- a/src/fw/models/content_category_multi_response.py +++ b/src/fw/models/content_category_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_create_internal_domains400_response.py b/src/fw/models/internal_domain_lists_create_internal_domains400_response.py index 80e555c..4b6ac0a 100644 --- a/src/fw/models/internal_domain_lists_create_internal_domains400_response.py +++ b/src/fw/models/internal_domain_lists_create_internal_domains400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_create_internal_domains400_response_error.py b/src/fw/models/internal_domain_lists_create_internal_domains400_response_error.py index 23d7e70..3f7900a 100644 --- a/src/fw/models/internal_domain_lists_create_internal_domains400_response_error.py +++ b/src/fw/models/internal_domain_lists_create_internal_domains400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_create_internal_domains409_response.py b/src/fw/models/internal_domain_lists_create_internal_domains409_response.py index 334eda7..208d5a9 100644 --- a/src/fw/models/internal_domain_lists_create_internal_domains409_response.py +++ b/src/fw/models/internal_domain_lists_create_internal_domains409_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_create_internal_domains409_response_error.py b/src/fw/models/internal_domain_lists_create_internal_domains409_response_error.py index 0b58a20..8ad4011 100644 --- a/src/fw/models/internal_domain_lists_create_internal_domains409_response_error.py +++ b/src/fw/models/internal_domain_lists_create_internal_domains409_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_delete_internal_domains400_response.py b/src/fw/models/internal_domain_lists_delete_internal_domains400_response.py index e0046ae..4902fbe 100644 --- a/src/fw/models/internal_domain_lists_delete_internal_domains400_response.py +++ b/src/fw/models/internal_domain_lists_delete_internal_domains400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_delete_internal_domains400_response_error.py b/src/fw/models/internal_domain_lists_delete_internal_domains400_response_error.py index fc8e1a1..060300e 100644 --- a/src/fw/models/internal_domain_lists_delete_internal_domains400_response_error.py +++ b/src/fw/models/internal_domain_lists_delete_internal_domains400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_delete_internal_domains404_response.py b/src/fw/models/internal_domain_lists_delete_internal_domains404_response.py index b673833..5dece41 100644 --- a/src/fw/models/internal_domain_lists_delete_internal_domains404_response.py +++ b/src/fw/models/internal_domain_lists_delete_internal_domains404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_delete_internal_domains404_response_error.py b/src/fw/models/internal_domain_lists_delete_internal_domains404_response_error.py index b75351a..e77c848 100644 --- a/src/fw/models/internal_domain_lists_delete_internal_domains404_response_error.py +++ b/src/fw/models/internal_domain_lists_delete_internal_domains404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_delete_single_internal_domains400_response.py b/src/fw/models/internal_domain_lists_delete_single_internal_domains400_response.py index 36fb437..6401b4d 100644 --- a/src/fw/models/internal_domain_lists_delete_single_internal_domains400_response.py +++ b/src/fw/models/internal_domain_lists_delete_single_internal_domains400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_delete_single_internal_domains400_response_error.py b/src/fw/models/internal_domain_lists_delete_single_internal_domains400_response_error.py index c6d261f..a3018f8 100644 --- a/src/fw/models/internal_domain_lists_delete_single_internal_domains400_response_error.py +++ b/src/fw/models/internal_domain_lists_delete_single_internal_domains400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_internal_domains_items_partial_update400_response.py b/src/fw/models/internal_domain_lists_internal_domains_items_partial_update400_response.py index 5d1eabf..fe0466f 100644 --- a/src/fw/models/internal_domain_lists_internal_domains_items_partial_update400_response.py +++ b/src/fw/models/internal_domain_lists_internal_domains_items_partial_update400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_internal_domains_items_partial_update400_response_error.py b/src/fw/models/internal_domain_lists_internal_domains_items_partial_update400_response_error.py index c29624c..bb8323c 100644 --- a/src/fw/models/internal_domain_lists_internal_domains_items_partial_update400_response_error.py +++ b/src/fw/models/internal_domain_lists_internal_domains_items_partial_update400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_internal_domains_items_partial_update404_response.py b/src/fw/models/internal_domain_lists_internal_domains_items_partial_update404_response.py index c945b3f..3ab8f53 100644 --- a/src/fw/models/internal_domain_lists_internal_domains_items_partial_update404_response.py +++ b/src/fw/models/internal_domain_lists_internal_domains_items_partial_update404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_internal_domains_items_partial_update404_response_error.py b/src/fw/models/internal_domain_lists_internal_domains_items_partial_update404_response_error.py index 1097fc6..765a073 100644 --- a/src/fw/models/internal_domain_lists_internal_domains_items_partial_update404_response_error.py +++ b/src/fw/models/internal_domain_lists_internal_domains_items_partial_update404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_read_internal_domains404_response.py b/src/fw/models/internal_domain_lists_read_internal_domains404_response.py index a05d053..5969368 100644 --- a/src/fw/models/internal_domain_lists_read_internal_domains404_response.py +++ b/src/fw/models/internal_domain_lists_read_internal_domains404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_read_internal_domains404_response_error.py b/src/fw/models/internal_domain_lists_read_internal_domains404_response_error.py index 45753e9..31c85c5 100644 --- a/src/fw/models/internal_domain_lists_read_internal_domains404_response_error.py +++ b/src/fw/models/internal_domain_lists_read_internal_domains404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_update_internal_domains400_response.py b/src/fw/models/internal_domain_lists_update_internal_domains400_response.py index b54870a..eddbbb6 100644 --- a/src/fw/models/internal_domain_lists_update_internal_domains400_response.py +++ b/src/fw/models/internal_domain_lists_update_internal_domains400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_update_internal_domains400_response_error.py b/src/fw/models/internal_domain_lists_update_internal_domains400_response_error.py index 82663f1..03bbf39 100644 --- a/src/fw/models/internal_domain_lists_update_internal_domains400_response_error.py +++ b/src/fw/models/internal_domain_lists_update_internal_domains400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_update_internal_domains404_response.py b/src/fw/models/internal_domain_lists_update_internal_domains404_response.py index f9b7fb1..6bf54a9 100644 --- a/src/fw/models/internal_domain_lists_update_internal_domains404_response.py +++ b/src/fw/models/internal_domain_lists_update_internal_domains404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domain_lists_update_internal_domains404_response_error.py b/src/fw/models/internal_domain_lists_update_internal_domains404_response_error.py index f373d5a..74b82fc 100644 --- a/src/fw/models/internal_domain_lists_update_internal_domains404_response_error.py +++ b/src/fw/models/internal_domain_lists_update_internal_domains404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domains.py b/src/fw/models/internal_domains.py index ff22171..03f42f6 100644 --- a/src/fw/models/internal_domains.py +++ b/src/fw/models/internal_domains.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domains_create_response.py b/src/fw/models/internal_domains_create_response.py index 4021015..8728064 100644 --- a/src/fw/models/internal_domains_create_response.py +++ b/src/fw/models/internal_domains_create_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domains_delete_request.py b/src/fw/models/internal_domains_delete_request.py index d1170f7..7604603 100644 --- a/src/fw/models/internal_domains_delete_request.py +++ b/src/fw/models/internal_domains_delete_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domains_items.py b/src/fw/models/internal_domains_items.py index ca34bc1..5989826 100644 --- a/src/fw/models/internal_domains_items.py +++ b/src/fw/models/internal_domains_items.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domains_multi_response.py b/src/fw/models/internal_domains_multi_response.py index 9b11dc9..3e729e1 100644 --- a/src/fw/models/internal_domains_multi_response.py +++ b/src/fw/models/internal_domains_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domains_read_response.py b/src/fw/models/internal_domains_read_response.py index 8f902a5..f2cb967 100644 --- a/src/fw/models/internal_domains_read_response.py +++ b/src/fw/models/internal_domains_read_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/internal_domains_update_response.py b/src/fw/models/internal_domains_update_response.py index 94faefd..01fc2b2 100644 --- a/src/fw/models/internal_domains_update_response.py +++ b/src/fw/models/internal_domains_update_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/item_structs.py b/src/fw/models/item_structs.py index 32cbdf6..c2c8a52 100644 --- a/src/fw/models/item_structs.py +++ b/src/fw/models/item_structs.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/list_po_p_regions_response.py b/src/fw/models/list_po_p_regions_response.py index 62da31e..4502385 100644 --- a/src/fw/models/list_po_p_regions_response.py +++ b/src/fw/models/list_po_p_regions_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/list_severity_levels.py b/src/fw/models/list_severity_levels.py index 2b3ce6d..ac21b5c 100644 --- a/src/fw/models/list_severity_levels.py +++ b/src/fw/models/list_severity_levels.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/multi_list_update.py b/src/fw/models/multi_list_update.py index 9d30fc7..d44d9b5 100644 --- a/src/fw/models/multi_list_update.py +++ b/src/fw/models/multi_list_update.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list.py b/src/fw/models/named_list.py index 0fbb3dd..1831fca 100644 --- a/src/fw/models/named_list.py +++ b/src/fw/models/named_list.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class NamedList(BaseModel): """ - The Named List object. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + The Named List object. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. """ # noqa: E501 confidence_level: Optional[StrictStr] = Field( default=None, diff --git a/src/fw/models/named_list_create_response.py b/src/fw/models/named_list_create_response.py index 0ab8b70..10711b7 100644 --- a/src/fw/models/named_list_create_response.py +++ b/src/fw/models/named_list_create_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_csv_list_response.py b/src/fw/models/named_list_csv_list_response.py index 70a1928..0f25f43 100644 --- a/src/fw/models/named_list_csv_list_response.py +++ b/src/fw/models/named_list_csv_list_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_delete_named_list_items400_response.py b/src/fw/models/named_list_items_delete_named_list_items400_response.py index 19fd715..e8153c6 100644 --- a/src/fw/models/named_list_items_delete_named_list_items400_response.py +++ b/src/fw/models/named_list_items_delete_named_list_items400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_delete_named_list_items400_response_error.py b/src/fw/models/named_list_items_delete_named_list_items400_response_error.py index c37807f..84c1e12 100644 --- a/src/fw/models/named_list_items_delete_named_list_items400_response_error.py +++ b/src/fw/models/named_list_items_delete_named_list_items400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_delete_request.py b/src/fw/models/named_list_items_delete_request.py index ed04989..da4d5ba 100644 --- a/src/fw/models/named_list_items_delete_request.py +++ b/src/fw/models/named_list_items_delete_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_insert_or_replace_named_list_items400_response.py b/src/fw/models/named_list_items_insert_or_replace_named_list_items400_response.py index 8b57005..ad923f0 100644 --- a/src/fw/models/named_list_items_insert_or_replace_named_list_items400_response.py +++ b/src/fw/models/named_list_items_insert_or_replace_named_list_items400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_insert_or_replace_named_list_items400_response_error.py b/src/fw/models/named_list_items_insert_or_replace_named_list_items400_response_error.py index 8110754..ac685e2 100644 --- a/src/fw/models/named_list_items_insert_or_replace_named_list_items400_response_error.py +++ b/src/fw/models/named_list_items_insert_or_replace_named_list_items400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_insert_or_update.py b/src/fw/models/named_list_items_insert_or_update.py index 55b0d13..48a37a9 100644 --- a/src/fw/models/named_list_items_insert_or_update.py +++ b/src/fw/models/named_list_items_insert_or_update.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_insert_or_update_response.py b/src/fw/models/named_list_items_insert_or_update_response.py index dfb6c68..99eca09 100644 --- a/src/fw/models/named_list_items_insert_or_update_response.py +++ b/src/fw/models/named_list_items_insert_or_update_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_insert_or_update_response_success.py b/src/fw/models/named_list_items_insert_or_update_response_success.py index 8e228dd..2e29a7b 100644 --- a/src/fw/models/named_list_items_insert_or_update_response_success.py +++ b/src/fw/models/named_list_items_insert_or_update_response_success.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_named_list_items_partial_update400_response.py b/src/fw/models/named_list_items_named_list_items_partial_update400_response.py index 5e33ee3..eb9055e 100644 --- a/src/fw/models/named_list_items_named_list_items_partial_update400_response.py +++ b/src/fw/models/named_list_items_named_list_items_partial_update400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_named_list_items_partial_update400_response_error.py b/src/fw/models/named_list_items_named_list_items_partial_update400_response_error.py index 7003d8a..1ee09d8 100644 --- a/src/fw/models/named_list_items_named_list_items_partial_update400_response_error.py +++ b/src/fw/models/named_list_items_named_list_items_partial_update400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_items_partial_update.py b/src/fw/models/named_list_items_partial_update.py index 8e639a2..0914d46 100644 --- a/src/fw/models/named_list_items_partial_update.py +++ b/src/fw/models/named_list_items_partial_update.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_read.py b/src/fw/models/named_list_read.py index 6259241..8efd500 100644 --- a/src/fw/models/named_list_read.py +++ b/src/fw/models/named_list_read.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class NamedListRead(BaseModel): """ - The Named List object. The Named List object represents several types of lists allowed for BloxOne Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. + The Named List object. The Named List object represents several types of lists allowed for Infoblox Cloud such as predefined threat intelligence feeds that your subscription offers (Threat Insight, Fast Flux, DGA, DNSM). In addition to the predefined threat intelligence feeds that your subscription offers, you can create custom lists (containing domains and IP addresses) to define whitelists and blacklists for additional protection. You can use a custom list to complement existing feeds or override the Block, Allow, Log, or Redirect action that is currently defined for an existing feed. Note that lists representing predefined TI feeds cannot be created, updated and deleted. """ # noqa: E501 confidence_level: Optional[StrictStr] = Field( default=None, diff --git a/src/fw/models/named_list_read_multi_response.py b/src/fw/models/named_list_read_multi_response.py index 6747fbd..ec08196 100644 --- a/src/fw/models/named_list_read_multi_response.py +++ b/src/fw/models/named_list_read_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_read_response.py b/src/fw/models/named_list_read_response.py index 0c14452..09c446d 100644 --- a/src/fw/models/named_list_read_response.py +++ b/src/fw/models/named_list_read_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_list_update_response.py b/src/fw/models/named_list_update_response.py index 8178132..057a3c5 100644 --- a/src/fw/models/named_list_update_response.py +++ b/src/fw/models/named_list_update_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_create_named_list409_response.py b/src/fw/models/named_lists_create_named_list409_response.py index e85436d..17f1813 100644 --- a/src/fw/models/named_lists_create_named_list409_response.py +++ b/src/fw/models/named_lists_create_named_list409_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_create_named_list409_response_error.py b/src/fw/models/named_lists_create_named_list409_response_error.py index b5a1a56..2914ddc 100644 --- a/src/fw/models/named_lists_create_named_list409_response_error.py +++ b/src/fw/models/named_lists_create_named_list409_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_delete_named_lists400_response.py b/src/fw/models/named_lists_delete_named_lists400_response.py index 8442227..5599dd3 100644 --- a/src/fw/models/named_lists_delete_named_lists400_response.py +++ b/src/fw/models/named_lists_delete_named_lists400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_delete_named_lists400_response_error.py b/src/fw/models/named_lists_delete_named_lists400_response_error.py index a701256..923ddd5 100644 --- a/src/fw/models/named_lists_delete_named_lists400_response_error.py +++ b/src/fw/models/named_lists_delete_named_lists400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_delete_named_lists404_response.py b/src/fw/models/named_lists_delete_named_lists404_response.py index ee2c621..97e07f3 100644 --- a/src/fw/models/named_lists_delete_named_lists404_response.py +++ b/src/fw/models/named_lists_delete_named_lists404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_delete_named_lists404_response_error.py b/src/fw/models/named_lists_delete_named_lists404_response_error.py index d9d904a..3a4e0ab 100644 --- a/src/fw/models/named_lists_delete_named_lists404_response_error.py +++ b/src/fw/models/named_lists_delete_named_lists404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_delete_request.py b/src/fw/models/named_lists_delete_request.py index e80cda9..3a17fb5 100644 --- a/src/fw/models/named_lists_delete_request.py +++ b/src/fw/models/named_lists_delete_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_delete_single_named_lists404_response.py b/src/fw/models/named_lists_delete_single_named_lists404_response.py index 1f79f54..75fda70 100644 --- a/src/fw/models/named_lists_delete_single_named_lists404_response.py +++ b/src/fw/models/named_lists_delete_single_named_lists404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_delete_single_named_lists404_response_error.py b/src/fw/models/named_lists_delete_single_named_lists404_response_error.py index b1fcb6b..69cedc6 100644 --- a/src/fw/models/named_lists_delete_single_named_lists404_response_error.py +++ b/src/fw/models/named_lists_delete_single_named_lists404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_multi_list_update404_response.py b/src/fw/models/named_lists_multi_list_update404_response.py index e4321b8..7cdad0b 100644 --- a/src/fw/models/named_lists_multi_list_update404_response.py +++ b/src/fw/models/named_lists_multi_list_update404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_multi_list_update404_response_error.py b/src/fw/models/named_lists_multi_list_update404_response_error.py index 6b0fac3..46988cf 100644 --- a/src/fw/models/named_lists_multi_list_update404_response_error.py +++ b/src/fw/models/named_lists_multi_list_update404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_update_named_list_partial400_response.py b/src/fw/models/named_lists_update_named_list_partial400_response.py index 67cba65..6acb39d 100644 --- a/src/fw/models/named_lists_update_named_list_partial400_response.py +++ b/src/fw/models/named_lists_update_named_list_partial400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_update_named_list_partial400_response_error.py b/src/fw/models/named_lists_update_named_list_partial400_response_error.py index da3f8bb..01f12e6 100644 --- a/src/fw/models/named_lists_update_named_list_partial400_response_error.py +++ b/src/fw/models/named_lists_update_named_list_partial400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_update_named_list_partial404_response.py b/src/fw/models/named_lists_update_named_list_partial404_response.py index 5bdaafc..185330c 100644 --- a/src/fw/models/named_lists_update_named_list_partial404_response.py +++ b/src/fw/models/named_lists_update_named_list_partial404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_update_named_list_partial404_response_error.py b/src/fw/models/named_lists_update_named_list_partial404_response_error.py index f36dfb9..0800e8a 100644 --- a/src/fw/models/named_lists_update_named_list_partial404_response_error.py +++ b/src/fw/models/named_lists_update_named_list_partial404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_update_named_list_partial405_response.py b/src/fw/models/named_lists_update_named_list_partial405_response.py index f28c10d..3d8329f 100644 --- a/src/fw/models/named_lists_update_named_list_partial405_response.py +++ b/src/fw/models/named_lists_update_named_list_partial405_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/named_lists_update_named_list_partial405_response_error.py b/src/fw/models/named_lists_update_named_list_partial405_response_error.py index 5c3a30a..e6fec12 100644 --- a/src/fw/models/named_lists_update_named_list_partial405_response_error.py +++ b/src/fw/models/named_lists_update_named_list_partial405_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/net_addr_dfp_assignment.py b/src/fw/models/net_addr_dfp_assignment.py index 590c019..1dc4e33 100644 --- a/src/fw/models/net_addr_dfp_assignment.py +++ b/src/fw/models/net_addr_dfp_assignment.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/net_addr_dfp_assignment_scope_type.py b/src/fw/models/net_addr_dfp_assignment_scope_type.py index a2d1029..dd32ddc 100644 --- a/src/fw/models/net_addr_dfp_assignment_scope_type.py +++ b/src/fw/models/net_addr_dfp_assignment_scope_type.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_list.py b/src/fw/models/network_list.py index 7a31da2..4c38e40 100644 --- a/src/fw/models/network_list.py +++ b/src/fw/models/network_list.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class NetworkList(BaseModel): """ - The Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring BloxOne Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. + The Network List object. Before you can apply security policies, you must first define the networks that you want to protect from malicious attacks. The first step in configuring Infoblox Cloud is to set up DNS Firewall by defining your remote networks. You identify these external networks by their IP addresses. A network can contain a group of IPv4 or IPv6 addresses or blocks. """ # noqa: E501 created_time: Optional[datetime] = Field( default=None, diff --git a/src/fw/models/network_list_create_response.py b/src/fw/models/network_list_create_response.py index bcb319e..fcb3229 100644 --- a/src/fw/models/network_list_create_response.py +++ b/src/fw/models/network_list_create_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_list_multi_response.py b/src/fw/models/network_list_multi_response.py index 1b83d56..e20daf6 100644 --- a/src/fw/models/network_list_multi_response.py +++ b/src/fw/models/network_list_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_list_read_response.py b/src/fw/models/network_list_read_response.py index b29aaeb..06b6258 100644 --- a/src/fw/models/network_list_read_response.py +++ b/src/fw/models/network_list_read_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_list_update_response.py b/src/fw/models/network_list_update_response.py index abe1c6a..ca067ec 100644 --- a/src/fw/models/network_list_update_response.py +++ b/src/fw/models/network_list_update_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_lists_create_network_list409_response.py b/src/fw/models/network_lists_create_network_list409_response.py index cbd38a0..99d5e5b 100644 --- a/src/fw/models/network_lists_create_network_list409_response.py +++ b/src/fw/models/network_lists_create_network_list409_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_lists_create_network_list409_response_error.py b/src/fw/models/network_lists_create_network_list409_response_error.py index ce7fa7d..11a63aa 100644 --- a/src/fw/models/network_lists_create_network_list409_response_error.py +++ b/src/fw/models/network_lists_create_network_list409_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_lists_delete_network_lists400_response.py b/src/fw/models/network_lists_delete_network_lists400_response.py index fe3980b..368b156 100644 --- a/src/fw/models/network_lists_delete_network_lists400_response.py +++ b/src/fw/models/network_lists_delete_network_lists400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_lists_delete_network_lists400_response_error.py b/src/fw/models/network_lists_delete_network_lists400_response_error.py index 2eebe34..39a3165 100644 --- a/src/fw/models/network_lists_delete_network_lists400_response_error.py +++ b/src/fw/models/network_lists_delete_network_lists400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_lists_delete_network_lists404_response.py b/src/fw/models/network_lists_delete_network_lists404_response.py index 10c17f8..53f45b5 100644 --- a/src/fw/models/network_lists_delete_network_lists404_response.py +++ b/src/fw/models/network_lists_delete_network_lists404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_lists_delete_network_lists404_response_error.py b/src/fw/models/network_lists_delete_network_lists404_response_error.py index f1ddbd2..2a2a352 100644 --- a/src/fw/models/network_lists_delete_network_lists404_response_error.py +++ b/src/fw/models/network_lists_delete_network_lists404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/network_lists_delete_request.py b/src/fw/models/network_lists_delete_request.py index c7fff82..9de7515 100644 --- a/src/fw/models/network_lists_delete_request.py +++ b/src/fw/models/network_lists_delete_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/po_p_region.py b/src/fw/models/po_p_region.py index 0b46413..622cdee 100644 --- a/src/fw/models/po_p_region.py +++ b/src/fw/models/po_p_region.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/pop_regions_read_po_p_region404_response.py b/src/fw/models/pop_regions_read_po_p_region404_response.py index baaa3d2..996e35a 100644 --- a/src/fw/models/pop_regions_read_po_p_region404_response.py +++ b/src/fw/models/pop_regions_read_po_p_region404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/pop_regions_read_po_p_region404_response_error.py b/src/fw/models/pop_regions_read_po_p_region404_response_error.py index 49fa47b..748ea5b 100644 --- a/src/fw/models/pop_regions_read_po_p_region404_response_error.py +++ b/src/fw/models/pop_regions_read_po_p_region404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/protobuf_field_mask.py b/src/fw/models/protobuf_field_mask.py index 0bfd122..1d55e24 100644 --- a/src/fw/models/protobuf_field_mask.py +++ b/src/fw/models/protobuf_field_mask.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/read_po_p_region_response.py b/src/fw/models/read_po_p_region_response.py index 4c17dd5..77a5659 100644 --- a/src/fw/models/read_po_p_region_response.py +++ b/src/fw/models/read_po_p_region_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policies_create_security_policy400_response.py b/src/fw/models/security_policies_create_security_policy400_response.py index 19ec3f7..236d2b6 100644 --- a/src/fw/models/security_policies_create_security_policy400_response.py +++ b/src/fw/models/security_policies_create_security_policy400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policies_create_security_policy400_response_error.py b/src/fw/models/security_policies_create_security_policy400_response_error.py index 3a7eb95..03912fe 100644 --- a/src/fw/models/security_policies_create_security_policy400_response_error.py +++ b/src/fw/models/security_policies_create_security_policy400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policies_create_security_policy409_response.py b/src/fw/models/security_policies_create_security_policy409_response.py index 6b34a4a..2ea8a4d 100644 --- a/src/fw/models/security_policies_create_security_policy409_response.py +++ b/src/fw/models/security_policies_create_security_policy409_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policies_create_security_policy409_response_error.py b/src/fw/models/security_policies_create_security_policy409_response_error.py index 4a1510b..7eddd55 100644 --- a/src/fw/models/security_policies_create_security_policy409_response_error.py +++ b/src/fw/models/security_policies_create_security_policy409_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policies_read_security_policy404_response.py b/src/fw/models/security_policies_read_security_policy404_response.py index 9f6bd3e..14eba74 100644 --- a/src/fw/models/security_policies_read_security_policy404_response.py +++ b/src/fw/models/security_policies_read_security_policy404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policies_read_security_policy404_response_error.py b/src/fw/models/security_policies_read_security_policy404_response_error.py index a522653..f426f29 100644 --- a/src/fw/models/security_policies_read_security_policy404_response_error.py +++ b/src/fw/models/security_policies_read_security_policy404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policy.py b/src/fw/models/security_policy.py index 070bdb1..62d5bb4 100644 --- a/src/fw/models/security_policy.py +++ b/src/fw/models/security_policy.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class SecurityPolicy(BaseModel): """ - The Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and BloxOne Endpoint groups. BloxOne Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. + The Security Policy object. A security policy defines a set of rules and actions that you define to balance access and constraints so you can mitigate malicious attacks and provide security for your networks. When you create a new security policy, you first define a network scope to which you add networks, DNS forwarding proxies, and Infoblox Endpoint groups. Infoblox Cloud applies the security policy to all the entities that you include in the network scope. You can also include DNS forwarding proxies to which you want to apply the security policy. After you define the network scope, you can add custom lists and category filters to the security policy. You can also specify actions for the added lists and filters, and to determine the precedence order for the entities. Depending on your subscription level, each security policy also comes with a set of predefined threat intelligence feeds and Threat Insight rules that are inherited from the default global policy. You cannot delete the inherited feeds and rules, but you can change their precedence order. For each policy you can define policy-level action (Default Action) gets applied when none of the policy rules apply/match. If an user really needs access to some blocked domain (web page) via a browser - there is a possibility to assign special bypass code(s) (Bypass Code) to any policy. """ # noqa: E501 access_codes: Optional[List[StrictStr]] = Field( default=None, description="Access codes assigned to Security Policy") @@ -84,7 +84,7 @@ class SecurityPolicy(BaseModel): ) roaming_device_groups: Optional[List[StrictInt]] = Field( default=None, - description="The list of BloxOne Endpoint groups identifiers.") + description="The list of Infoblox Endpoint groups identifiers.") rules: Optional[List[SecurityPolicyRule]] = Field( default=None, description= diff --git a/src/fw/models/security_policy_create_response.py b/src/fw/models/security_policy_create_response.py index 860b87f..34f712c 100644 --- a/src/fw/models/security_policy_create_response.py +++ b/src/fw/models/security_policy_create_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policy_delete_request.py b/src/fw/models/security_policy_delete_request.py index 052c012..b2f260a 100644 --- a/src/fw/models/security_policy_delete_request.py +++ b/src/fw/models/security_policy_delete_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policy_multi_response.py b/src/fw/models/security_policy_multi_response.py index 09f8136..df57615 100644 --- a/src/fw/models/security_policy_multi_response.py +++ b/src/fw/models/security_policy_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policy_read_response.py b/src/fw/models/security_policy_read_response.py index 5540858..9ef82c9 100644 --- a/src/fw/models/security_policy_read_response.py +++ b/src/fw/models/security_policy_read_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policy_rule.py b/src/fw/models/security_policy_rule.py index 43a99d4..baacbde 100644 --- a/src/fw/models/security_policy_rule.py +++ b/src/fw/models/security_policy_rule.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policy_rule_multi_response.py b/src/fw/models/security_policy_rule_multi_response.py index df4ec9b..a3e294c 100644 --- a/src/fw/models/security_policy_rule_multi_response.py +++ b/src/fw/models/security_policy_rule_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/security_policy_update_response.py b/src/fw/models/security_policy_update_response.py index 29ff39e..d18454d 100644 --- a/src/fw/models/security_policy_update_response.py +++ b/src/fw/models/security_policy_update_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/threat_feed.py b/src/fw/models/threat_feed.py index 267d237..3dbb525 100644 --- a/src/fw/models/threat_feed.py +++ b/src/fw/models/threat_feed.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ThreatFeed(BaseModel): """ - The Threat Feed object. BloxOne Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. + The Threat Feed object. Infoblox Cloud provides predefined threat intelligence feeds based on your subscription. The Plus subscription offers a few more feeds than the Standard subscription. The Advanced subscription offers a few more feeds than the Plus subscription. A threat feed subscription for RPZ updates offers protection against malicious hostnames. """ # noqa: E501 confidence_level: Optional[StrictStr] = Field( default=None, description="The Confidence Level of the Feed.") diff --git a/src/fw/models/threat_feed_multi_response.py b/src/fw/models/threat_feed_multi_response.py index d764168..2c69de0 100644 --- a/src/fw/models/threat_feed_multi_response.py +++ b/src/fw/models/threat_feed_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/models/threat_feed_source.py b/src/fw/models/threat_feed_source.py index e4851b7..2a1b22f 100644 --- a/src/fw/models/threat_feed_source.py +++ b/src/fw/models/threat_feed_source.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/fw/test/test_access_codes_api.py b/src/fw/test/test_access_codes_api.py index a942d5f..0fa2872 100644 --- a/src/fw/test/test_access_codes_api.py +++ b/src/fw/test/test_access_codes_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.access_codes_api import AccessCodesApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestAccessCodesApi(unittest.TestCase): diff --git a/src/fw/test/test_app_approvals_api.py b/src/fw/test/test_app_approvals_api.py index ce96848..890d4a6 100644 --- a/src/fw/test/test_app_approvals_api.py +++ b/src/fw/test/test_app_approvals_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.app_approvals_api import AppApprovalsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestAppApprovalsApi(unittest.TestCase): diff --git a/src/fw/test/test_application_filters_api.py b/src/fw/test/test_application_filters_api.py index 944e104..7532d36 100644 --- a/src/fw/test/test_application_filters_api.py +++ b/src/fw/test/test_application_filters_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.application_filters_api import ApplicationFiltersApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestApplicationFiltersApi(unittest.TestCase): diff --git a/src/fw/test/test_category_filters_api.py b/src/fw/test/test_category_filters_api.py index 93c6c43..d4ff4bd 100644 --- a/src/fw/test/test_category_filters_api.py +++ b/src/fw/test/test_category_filters_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.category_filters_api import CategoryFiltersApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestCategoryFiltersApi(unittest.TestCase): diff --git a/src/fw/test/test_content_categories_api.py b/src/fw/test/test_content_categories_api.py index 9b66a66..49a61ea 100644 --- a/src/fw/test/test_content_categories_api.py +++ b/src/fw/test/test_content_categories_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.content_categories_api import ContentCategoriesApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestContentCategoriesApi(unittest.TestCase): diff --git a/src/fw/test/test_internal_domain_lists_api.py b/src/fw/test/test_internal_domain_lists_api.py index fdde6d1..8ceb7e6 100644 --- a/src/fw/test/test_internal_domain_lists_api.py +++ b/src/fw/test/test_internal_domain_lists_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.internal_domain_lists_api import InternalDomainListsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestInternalDomainListsApi(unittest.TestCase): diff --git a/src/fw/test/test_named_list_items_api.py b/src/fw/test/test_named_list_items_api.py index f6f8882..83eef8e 100644 --- a/src/fw/test/test_named_list_items_api.py +++ b/src/fw/test/test_named_list_items_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.named_list_items_api import NamedListItemsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestNamedListItemsApi(unittest.TestCase): diff --git a/src/fw/test/test_named_lists_api.py b/src/fw/test/test_named_lists_api.py index 4de9c3f..8ac14e4 100644 --- a/src/fw/test/test_named_lists_api.py +++ b/src/fw/test/test_named_lists_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.named_lists_api import NamedListsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestNamedListsApi(unittest.TestCase): diff --git a/src/fw/test/test_network_lists_api.py b/src/fw/test/test_network_lists_api.py index 19e3fa8..9fed867 100644 --- a/src/fw/test/test_network_lists_api.py +++ b/src/fw/test/test_network_lists_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.network_lists_api import NetworkListsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestNetworkListsApi(unittest.TestCase): diff --git a/src/fw/test/test_pop_regions_api.py b/src/fw/test/test_pop_regions_api.py index 34538d4..ae8f430 100644 --- a/src/fw/test/test_pop_regions_api.py +++ b/src/fw/test/test_pop_regions_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.pop_regions_api import PopRegionsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestPopRegionsApi(unittest.TestCase): diff --git a/src/fw/test/test_security_policies_api.py b/src/fw/test/test_security_policies_api.py index 9eac0d5..111873b 100644 --- a/src/fw/test/test_security_policies_api.py +++ b/src/fw/test/test_security_policies_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.security_policies_api import SecurityPoliciesApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestSecurityPoliciesApi(unittest.TestCase): diff --git a/src/fw/test/test_security_policy_rules_api.py b/src/fw/test/test_security_policy_rules_api.py index 4e4a62c..defc92e 100644 --- a/src/fw/test/test_security_policy_rules_api.py +++ b/src/fw/test/test_security_policy_rules_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.security_policy_rules_api import SecurityPolicyRulesApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestSecurityPolicyRulesApi(unittest.TestCase): diff --git a/src/fw/test/test_threat_feeds_api.py b/src/fw/test/test_threat_feeds_api.py index edde803..a729c76 100644 --- a/src/fw/test/test_threat_feeds_api.py +++ b/src/fw/test/test_threat_feeds_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne FW API + Infoblox FW API - BloxOne Threat Defense Cloud is an extension of the BloxOne Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to BloxOne Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. BloxOne Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. + Infoblox Threat Defense Cloud is an extension of the Infoblox Suite that provides visibility into infected and compromised off-premises devices, roaming users, remote sites, and branch offices. You can subscribe to Infoblox Cloud and use its functionality to mitigate and control malware as well as provide unprecedented insight into your network security posture and enable timely action. Infoblox Cloud also offers unified policy management, reporting, and threat analytics across the entire spectrum. Using automated and high-quality threat intelligence feeds and unique behavioral analytics, it automatically stops device communications with C&Cs/botnets and prevents DNS based data exfiltration. The mission-critical DNS infrastructure can become a vulnerable component in your network when it is inadequately protected by traditional security solutions and consequently used as an attack surface. Compromised DNS services can result in catastrophic network and system failures. To fully protect your network in today’s cyber security threat environment, Infoblox sets a new DNS security standard by offering scalable, enterprise-grade, and integrated protection for your DNS infrastructure. Through the Infoblox Cloud Services Portal, you can view the status of your subscription and threat intelligence feeds, manage your network scope and roaming end users, and learn more about threats on your networks through the Infoblox Threat Lookup tool and predefined reports. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from fw.api.threat_feeds_api import ThreatFeedsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestThreatFeedsApi(unittest.TestCase): diff --git a/src/infra_mgmt/README.md b/src/infra_mgmt/README.md index 8571860..fb643d2 100644 --- a/src/infra_mgmt/README.md +++ b/src/infra_mgmt/README.md @@ -1,12 +1,12 @@ # infra-mgmt -The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- +The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The `infra_mgmt` package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,14 +36,14 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client diff --git a/src/infra_mgmt/__init__.py b/src/infra_mgmt/__init__.py index 0b6f0db..b219253 100644 --- a/src/infra_mgmt/__init__.py +++ b/src/infra_mgmt/__init__.py @@ -5,7 +5,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/api/detail_api.py b/src/infra_mgmt/api/detail_api.py index 65f9949..6fda4bb 100644 --- a/src/infra_mgmt/api/detail_api.py +++ b/src/infra_mgmt/api/detail_api.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -23,9 +23,9 @@ from infra_mgmt.models.list_detail_services_response import ListDetailServicesResponse from infra_mgmt import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class DetailApi: diff --git a/src/infra_mgmt/api/hosts_api.py b/src/infra_mgmt/api/hosts_api.py index b87eb08..4c717a8 100644 --- a/src/infra_mgmt/api/hosts_api.py +++ b/src/infra_mgmt/api/hosts_api.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,9 +30,9 @@ from infra_mgmt.models.update_host_response import UpdateHostResponse from infra_mgmt import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class HostsApi: diff --git a/src/infra_mgmt/api/services_api.py b/src/infra_mgmt/api/services_api.py index f739015..b53d5b3 100644 --- a/src/infra_mgmt/api/services_api.py +++ b/src/infra_mgmt/api/services_api.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,9 +27,9 @@ from infra_mgmt.models.update_service_response import UpdateServiceResponse from infra_mgmt import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ServicesApi: diff --git a/src/infra_mgmt/docs/DetailApi.md b/src/infra_mgmt/docs/DetailApi.md index 2976dc8..41ae0d0 100644 --- a/src/infra_mgmt/docs/DetailApi.md +++ b/src/infra_mgmt/docs/DetailApi.md @@ -22,20 +22,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -102,20 +102,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/infra_mgmt/docs/DetailHost.md b/src/infra_mgmt/docs/DetailHost.md index d219e5e..0000a94 100644 --- a/src/infra_mgmt/docs/DetailHost.md +++ b/src/infra_mgmt/docs/DetailHost.md @@ -11,7 +11,7 @@ Name | Type | Description | Notes **created_at** | **datetime** | The timestamp of creation of Host. | [optional] **description** | **str** | The description of the Host. | [optional] **display_name** | **str** | The name of the Host. | [optional] -**host_subtype** | **str** | The sub-type of a specific Host type. Example: For Host type BloxOne Appliance, sub-type could be \"B105\" or \"VEP1425\" | [optional] +**host_subtype** | **str** | The sub-type of a specific Host type. Example: For Host type NIOS-X Appliance, sub-type could be \"B105\" or \"VEP1425\" | [optional] **host_type** | **str** | | [optional] **host_version** | **str** | The version of the Host platform services. | [optional] **id** | **str** | The resource identifier. | [optional] [readonly] diff --git a/src/infra_mgmt/docs/Host.md b/src/infra_mgmt/docs/Host.md index 4e94028..3d9e994 100644 --- a/src/infra_mgmt/docs/Host.md +++ b/src/infra_mgmt/docs/Host.md @@ -12,8 +12,8 @@ Name | Type | Description | Notes **created_by** | **str** | The creator of the Host (internal use only). | [optional] [readonly] **description** | **str** | The description of the Host (optional). | [optional] **display_name** | **str** | The name of the Host (unique). | -**host_subtype** | **str** | The sub-type of a specific Host type. Example: For Host type BloxOne Appliance, sub-type could be \"B105\" or \"VEP1425\" | [optional] [readonly] -**host_type** | **str** | The type of Host. Should be one of: 1. NIOS , 2. NIOS HA, 3. BloxOne VM , 4. BloxOne Appliance, 5. BloxOne Container, 6. CNIOS | [optional] [readonly] +**host_subtype** | **str** | The sub-type of a specific Host type. Example: For Host type NIOS-X Appliance, sub-type could be \"B105\" or \"VEP1425\" | [optional] [readonly] +**host_type** | **str** | The type of Host. Should be one of: 1. NIOS , 2. NIOS HA, 3. NIOS-X VM , 4. NIOS-X Appliance, 5. NIOS-X Container, 6. CNIOS | [optional] [readonly] **host_version** | **str** | The version of the Host platform services. | [optional] [readonly] **id** | **str** | The resource identifier. | [optional] [readonly] **ip_address** | **str** | The IP address of the Host. | [optional] [readonly] diff --git a/src/infra_mgmt/docs/HostsApi.md b/src/infra_mgmt/docs/HostsApi.md index 45f75f5..bca0c05 100644 --- a/src/infra_mgmt/docs/HostsApi.md +++ b/src/infra_mgmt/docs/HostsApi.md @@ -31,20 +31,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -107,20 +107,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -183,20 +183,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -257,20 +257,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -333,20 +333,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -415,20 +415,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -489,20 +489,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -569,20 +569,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -645,20 +645,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/infra_mgmt/docs/ServicesApi.md b/src/infra_mgmt/docs/ServicesApi.md index 436e297..18b8153 100644 --- a/src/infra_mgmt/docs/ServicesApi.md +++ b/src/infra_mgmt/docs/ServicesApi.md @@ -28,20 +28,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -179,20 +179,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -251,20 +251,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -333,20 +333,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -409,20 +409,20 @@ from pprint import pprint import infra_mgmt -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/infra_mgmt/models/__init__.py b/src/infra_mgmt/models/__init__.py index 8f3dc82..16e1f49 100644 --- a/src/infra_mgmt/models/__init__.py +++ b/src/infra_mgmt/models/__init__.py @@ -4,7 +4,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/api_page_info.py b/src/infra_mgmt/models/api_page_info.py index 57b1f9d..ebcd8d2 100644 --- a/src/infra_mgmt/models/api_page_info.py +++ b/src/infra_mgmt/models/api_page_info.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/applications.py b/src/infra_mgmt/models/applications.py index 61de51e..5bef99f 100644 --- a/src/infra_mgmt/models/applications.py +++ b/src/infra_mgmt/models/applications.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/applications_response.py b/src/infra_mgmt/models/applications_response.py index 0f28581..4cd5558 100644 --- a/src/infra_mgmt/models/applications_response.py +++ b/src/infra_mgmt/models/applications_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/assign_tags_request.py b/src/infra_mgmt/models/assign_tags_request.py index 76dcc4a..a6290c8 100644 --- a/src/infra_mgmt/models/assign_tags_request.py +++ b/src/infra_mgmt/models/assign_tags_request.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/create_host_response.py b/src/infra_mgmt/models/create_host_response.py index 0668bf8..5ab385e 100644 --- a/src/infra_mgmt/models/create_host_response.py +++ b/src/infra_mgmt/models/create_host_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/create_service_response.py b/src/infra_mgmt/models/create_service_response.py index 43b32cb..0a121db 100644 --- a/src/infra_mgmt/models/create_service_response.py +++ b/src/infra_mgmt/models/create_service_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/detail_host.py b/src/infra_mgmt/models/detail_host.py index cfaffc4..330d36c 100644 --- a/src/infra_mgmt/models/detail_host.py +++ b/src/infra_mgmt/models/detail_host.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -52,7 +52,7 @@ class DetailHost(BaseModel): host_subtype: Optional[StrictStr] = Field( default=None, description= - "The sub-type of a specific Host type. Example: For Host type BloxOne Appliance, sub-type could be \"B105\" or \"VEP1425\"" + "The sub-type of a specific Host type. Example: For Host type NIOS-X Appliance, sub-type could be \"B105\" or \"VEP1425\"" ) host_type: Optional[StrictStr] = None host_version: Optional[StrictStr] = Field( diff --git a/src/infra_mgmt/models/detail_host_service_config.py b/src/infra_mgmt/models/detail_host_service_config.py index 5c79abe..c104ef6 100644 --- a/src/infra_mgmt/models/detail_host_service_config.py +++ b/src/infra_mgmt/models/detail_host_service_config.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/detail_location.py b/src/infra_mgmt/models/detail_location.py index 8a2baf4..937b813 100644 --- a/src/infra_mgmt/models/detail_location.py +++ b/src/infra_mgmt/models/detail_location.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/detail_service.py b/src/infra_mgmt/models/detail_service.py index 2dc1b12..90435b4 100644 --- a/src/infra_mgmt/models/detail_service.py +++ b/src/infra_mgmt/models/detail_service.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/detail_service_host.py b/src/infra_mgmt/models/detail_service_host.py index d0ef05d..c338757 100644 --- a/src/infra_mgmt/models/detail_service_host.py +++ b/src/infra_mgmt/models/detail_service_host.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/detail_service_host_config.py b/src/infra_mgmt/models/detail_service_host_config.py index 52ade08..ed6727f 100644 --- a/src/infra_mgmt/models/detail_service_host_config.py +++ b/src/infra_mgmt/models/detail_service_host_config.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/disconnect_request.py b/src/infra_mgmt/models/disconnect_request.py index c169779..1609b6c 100644 --- a/src/infra_mgmt/models/disconnect_request.py +++ b/src/infra_mgmt/models/disconnect_request.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/get_host_response.py b/src/infra_mgmt/models/get_host_response.py index 9e899b1..cff49cc 100644 --- a/src/infra_mgmt/models/get_host_response.py +++ b/src/infra_mgmt/models/get_host_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/get_service_response.py b/src/infra_mgmt/models/get_service_response.py index 2d7c7db..d9f7fa9 100644 --- a/src/infra_mgmt/models/get_service_response.py +++ b/src/infra_mgmt/models/get_service_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/host.py b/src/infra_mgmt/models/host.py index bae8b20..c747649 100644 --- a/src/infra_mgmt/models/host.py +++ b/src/infra_mgmt/models/host.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -52,12 +52,12 @@ class Host(BaseModel): host_subtype: Optional[StrictStr] = Field( default=None, description= - "The sub-type of a specific Host type. Example: For Host type BloxOne Appliance, sub-type could be \"B105\" or \"VEP1425\"" + "The sub-type of a specific Host type. Example: For Host type NIOS-X Appliance, sub-type could be \"B105\" or \"VEP1425\"" ) host_type: Optional[StrictStr] = Field( default=None, description= - "The type of Host. Should be one of: 1. NIOS , 2. NIOS HA, 3. BloxOne VM , 4. BloxOne Appliance, 5. BloxOne Container, 6. CNIOS" + "The type of Host. Should be one of: 1. NIOS , 2. NIOS HA, 3. NIOS-X VM , 4. NIOS-X Appliance, 5. NIOS-X Container, 6. CNIOS" ) host_version: Optional[StrictStr] = Field( default=None, description="The version of the Host platform services.") diff --git a/src/infra_mgmt/models/list_detail_hosts_response.py b/src/infra_mgmt/models/list_detail_hosts_response.py index 8372d2e..6f91e73 100644 --- a/src/infra_mgmt/models/list_detail_hosts_response.py +++ b/src/infra_mgmt/models/list_detail_hosts_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/list_detail_services_response.py b/src/infra_mgmt/models/list_detail_services_response.py index d7342c7..2bfe3e6 100644 --- a/src/infra_mgmt/models/list_detail_services_response.py +++ b/src/infra_mgmt/models/list_detail_services_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/list_host_response.py b/src/infra_mgmt/models/list_host_response.py index e2978d0..b817ecf 100644 --- a/src/infra_mgmt/models/list_host_response.py +++ b/src/infra_mgmt/models/list_host_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/list_service_response.py b/src/infra_mgmt/models/list_service_response.py index 8c6774c..71ccecc 100644 --- a/src/infra_mgmt/models/list_service_response.py +++ b/src/infra_mgmt/models/list_service_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/pool_info.py b/src/infra_mgmt/models/pool_info.py index 8e9ccc4..b731bd0 100644 --- a/src/infra_mgmt/models/pool_info.py +++ b/src/infra_mgmt/models/pool_info.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/replace_host_request.py b/src/infra_mgmt/models/replace_host_request.py index e89f57d..e1ddd5b 100644 --- a/src/infra_mgmt/models/replace_host_request.py +++ b/src/infra_mgmt/models/replace_host_request.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/service.py b/src/infra_mgmt/models/service.py index 2b45654..6aef329 100644 --- a/src/infra_mgmt/models/service.py +++ b/src/infra_mgmt/models/service.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/service_host_config.py b/src/infra_mgmt/models/service_host_config.py index 3b32b82..cbc004a 100644 --- a/src/infra_mgmt/models/service_host_config.py +++ b/src/infra_mgmt/models/service_host_config.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/short_service_status.py b/src/infra_mgmt/models/short_service_status.py index 6fc3d25..6135df6 100644 --- a/src/infra_mgmt/models/short_service_status.py +++ b/src/infra_mgmt/models/short_service_status.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/unassign_tags_request.py b/src/infra_mgmt/models/unassign_tags_request.py index 186d1f6..f7b1f41 100644 --- a/src/infra_mgmt/models/unassign_tags_request.py +++ b/src/infra_mgmt/models/unassign_tags_request.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/update_host_response.py b/src/infra_mgmt/models/update_host_response.py index edbc08c..af52b37 100644 --- a/src/infra_mgmt/models/update_host_response.py +++ b/src/infra_mgmt/models/update_host_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/models/update_service_response.py b/src/infra_mgmt/models/update_service_response.py index 0f9a356..ffc4a6a 100644 --- a/src/infra_mgmt/models/update_service_response.py +++ b/src/infra_mgmt/models/update_service_response.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/infra_mgmt/test/test_detail_api.py b/src/infra_mgmt/test/test_detail_api.py index 3944535..e816739 100644 --- a/src/infra_mgmt/test/test_detail_api.py +++ b/src/infra_mgmt/test/test_detail_api.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from infra_mgmt.api.detail_api import DetailApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestDetailApi(unittest.TestCase): diff --git a/src/infra_mgmt/test/test_hosts_api.py b/src/infra_mgmt/test/test_hosts_api.py index a8d0c3d..dc033cb 100644 --- a/src/infra_mgmt/test/test_hosts_api.py +++ b/src/infra_mgmt/test/test_hosts_api.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from infra_mgmt.api.hosts_api import HostsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestHostsApi(unittest.TestCase): diff --git a/src/infra_mgmt/test/test_services_api.py b/src/infra_mgmt/test/test_services_api.py index ce08cf1..a260f03 100644 --- a/src/infra_mgmt/test/test_services_api.py +++ b/src/infra_mgmt/test/test_services_api.py @@ -3,7 +3,7 @@ """ Infrastructure Management API - The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. BloxOne applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- + The **Infrastructure Management API** provides a RESTful interface to manage Infrastructure Hosts and Services objects. The following is a list of the different Services and their string types (the string types are to be used with the APIs for the `service_type` field): | Service name | Service type | | ------ | ------ | | Access Authentication | authn | | Anycast | anycast | | Data Connector | cdc | | DHCP | dhcp | | DNS | dns | | DNS Forwarding Proxy | dfp | | NIOS Grid Connector | orpheus | | MS AD Sync | msad | | NTP | ntp | | BGP | bgp | | RIP | rip | | OSPF | ospf | --- ### Hosts API The Hosts API is used to manage the Infrastructure Host resources. These include various operations related to hosts such as viewing, creating, updating, replacing, disconnecting, and deleting Hosts. Management of Hosts is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Hosts tab. --- ### Services API The Services API is used to manage the Infrastructure Service resources (a.k.a. NIOS-X applications). These include various operations related to hosts such as viewing, creating, updating, starting/stopping, configuring, and deleting Services. Management of Services is done from the Cloud Services Portal (CSP) by navigating to the Manage -> Infrastructure -> Services tab. --- ### Detail APIs The Detail APIs are read-only APIs used to list all the Infrastructure resources (Hosts and Services). Each resource record returned also contains information about its other associated resources and the status information for itself and the associated resource(s) (i.e., Host/Service status). --- The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from infra_mgmt.api.services_api import ServicesApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestServicesApi(unittest.TestCase): diff --git a/src/infra_provision/README.md b/src/infra_provision/README.md index 839e3bd..7a1e18a 100644 --- a/src/infra_provision/README.md +++ b/src/infra_provision/README.md @@ -6,7 +6,7 @@ The `infra_provision` package is automatically generated by the [OpenAPI Generat - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,14 +36,14 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client diff --git a/src/infra_provision/api/ui_join_token_api.py b/src/infra_provision/api/ui_join_token_api.py index b7dc2d3..b514f54 100644 --- a/src/infra_provision/api/ui_join_token_api.py +++ b/src/infra_provision/api/ui_join_token_api.py @@ -27,9 +27,9 @@ from infra_provision.models.update_join_token_response import UpdateJoinTokenResponse from infra_provision import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class UIJoinTokenApi: diff --git a/src/infra_provision/api/uicsr_api.py b/src/infra_provision/api/uicsr_api.py index 14d059b..91794fb 100644 --- a/src/infra_provision/api/uicsr_api.py +++ b/src/infra_provision/api/uicsr_api.py @@ -25,9 +25,9 @@ from infra_provision.models.revoke_cert_request import RevokeCertRequest from infra_provision import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class UICSRApi: @@ -1272,7 +1272,7 @@ def revoke2( StrictStr, Field( description= - "On-prem host ID which can be obtained either from on-prem or BloxOne UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) ." + "On-prem host ID which can be obtained either from on-prem or NIOS-X UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) ." )], body: RevokeCertRequest, _request_timeout: Union[None, Annotated[StrictFloat, @@ -1290,7 +1290,7 @@ def revoke2( The user can revoke the cert from the cloud (for example, if in case a host is compromised). Validation: - one of \"cert_serial\" or \"ophid\" should be provided - \"revoke_reason\" is optional - :param ophid: On-prem host ID which can be obtained either from on-prem or BloxOne UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . (required) + :param ophid: On-prem host ID which can be obtained either from on-prem or NIOS-X UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . (required) :type ophid: str :param body: (required) :type body: RevokeCertRequest @@ -1342,7 +1342,7 @@ def revoke2_with_http_info( StrictStr, Field( description= - "On-prem host ID which can be obtained either from on-prem or BloxOne UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) ." + "On-prem host ID which can be obtained either from on-prem or NIOS-X UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) ." )], body: RevokeCertRequest, _request_timeout: Union[None, Annotated[StrictFloat, @@ -1360,7 +1360,7 @@ def revoke2_with_http_info( The user can revoke the cert from the cloud (for example, if in case a host is compromised). Validation: - one of \"cert_serial\" or \"ophid\" should be provided - \"revoke_reason\" is optional - :param ophid: On-prem host ID which can be obtained either from on-prem or BloxOne UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . (required) + :param ophid: On-prem host ID which can be obtained either from on-prem or NIOS-X UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . (required) :type ophid: str :param body: (required) :type body: RevokeCertRequest @@ -1412,7 +1412,7 @@ def revoke2_without_preload_content( StrictStr, Field( description= - "On-prem host ID which can be obtained either from on-prem or BloxOne UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) ." + "On-prem host ID which can be obtained either from on-prem or NIOS-X UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) ." )], body: RevokeCertRequest, _request_timeout: Union[None, Annotated[StrictFloat, @@ -1430,7 +1430,7 @@ def revoke2_without_preload_content( The user can revoke the cert from the cloud (for example, if in case a host is compromised). Validation: - one of \"cert_serial\" or \"ophid\" should be provided - \"revoke_reason\" is optional - :param ophid: On-prem host ID which can be obtained either from on-prem or BloxOne UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . (required) + :param ophid: On-prem host ID which can be obtained either from on-prem or NIOS-X UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . (required) :type ophid: str :param body: (required) :type body: RevokeCertRequest diff --git a/src/infra_provision/docs/RevokeCertRequest.md b/src/infra_provision/docs/RevokeCertRequest.md index bdf2732..5dc9f40 100644 --- a/src/infra_provision/docs/RevokeCertRequest.md +++ b/src/infra_provision/docs/RevokeCertRequest.md @@ -6,7 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **cert_serial** | **str** | | [optional] -**ophid** | **str** | On-prem host ID which can be obtained either from on-prem or BloxOne UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . | [optional] +**ophid** | **str** | On-prem host ID which can be obtained either from on-prem or NIOS-X UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . | [optional] **revoke_reason** | **str** | | [optional] ## Example diff --git a/src/infra_provision/docs/UICSRApi.md b/src/infra_provision/docs/UICSRApi.md index decd48f..d58b5d8 100644 --- a/src/infra_provision/docs/UICSRApi.md +++ b/src/infra_provision/docs/UICSRApi.md @@ -25,20 +25,20 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -101,20 +101,20 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -258,20 +258,20 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,26 +336,26 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = infra_provision.UICSRApi(api_client) - ophid = 'ophid_example' # str | On-prem host ID which can be obtained either from on-prem or BloxOne UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . + ophid = 'ophid_example' # str | On-prem host ID which can be obtained either from on-prem or NIOS-X UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . body = infra_provision.RevokeCertRequest() # RevokeCertRequest | try: @@ -374,7 +374,7 @@ with ApiClient(config) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **ophid** | **str**| On-prem host ID which can be obtained either from on-prem or BloxOne UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . | + **ophid** | **str**| On-prem host ID which can be obtained either from on-prem or NIOS-X UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) . | **body** | [**RevokeCertRequest**](RevokeCertRequest.md)| | ### Return type diff --git a/src/infra_provision/docs/UIJoinTokenApi.md b/src/infra_provision/docs/UIJoinTokenApi.md index b63cd44..792f497 100644 --- a/src/infra_provision/docs/UIJoinTokenApi.md +++ b/src/infra_provision/docs/UIJoinTokenApi.md @@ -28,20 +28,20 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -102,20 +102,20 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -174,20 +174,20 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -248,20 +248,20 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -327,20 +327,20 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -404,20 +404,20 @@ from pprint import pprint import infra_provision -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/infra_provision/models/revoke_cert_request.py b/src/infra_provision/models/revoke_cert_request.py index e4bc953..f6320a5 100644 --- a/src/infra_provision/models/revoke_cert_request.py +++ b/src/infra_provision/models/revoke_cert_request.py @@ -32,7 +32,7 @@ class RevokeCertRequest(BaseModel): ophid: Optional[StrictStr] = Field( default=None, description= - "On-prem host ID which can be obtained either from on-prem or BloxOne UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) ." + "On-prem host ID which can be obtained either from on-prem or NIOS-X UI portal(Manage > Infrastructure > Hosts > Select the onprem > click on 3 dots on top right side > General Information > Ophid) ." ) revoke_reason: Optional[StrictStr] = None additional_properties: Dict[str, Any] = {} diff --git a/src/infra_provision/test/test_ui_join_token_api.py b/src/infra_provision/test/test_ui_join_token_api.py index 0c8d5f0..6d61fbd 100644 --- a/src/infra_provision/test/test_ui_join_token_api.py +++ b/src/infra_provision/test/test_ui_join_token_api.py @@ -15,7 +15,7 @@ from infra_provision.api.ui_join_token_api import UIJoinTokenApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestUIJoinTokenApi(unittest.TestCase): diff --git a/src/infra_provision/test/test_uicsr_api.py b/src/infra_provision/test/test_uicsr_api.py index d8361a8..faba988 100644 --- a/src/infra_provision/test/test_uicsr_api.py +++ b/src/infra_provision/test/test_uicsr_api.py @@ -15,7 +15,7 @@ from infra_provision.api.uicsr_api import UICSRApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestUICSRApi(unittest.TestCase): diff --git a/src/ipam/README.md b/src/ipam/README.md index 37ee83a..2033da4 100644 --- a/src/ipam/README.md +++ b/src/ipam/README.md @@ -1,12 +1,12 @@ # ipam -The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. +The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The `ipam` package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,14 +36,14 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client diff --git a/src/ipam/__init__.py b/src/ipam/__init__.py index 182c9d4..a82e573 100644 --- a/src/ipam/__init__.py +++ b/src/ipam/__init__.py @@ -5,7 +5,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/api/address_api.py b/src/ipam/api/address_api.py index 25ecf03..fe929bd 100644 --- a/src/ipam/api/address_api.py +++ b/src/ipam/api/address_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_address_response import UpdateAddressResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class AddressApi: diff --git a/src/ipam/api/address_block_api.py b/src/ipam/api/address_block_api.py index a457467..b633469 100644 --- a/src/ipam/api/address_block_api.py +++ b/src/ipam/api/address_block_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -35,9 +35,9 @@ from ipam.models.update_address_block_response import UpdateAddressBlockResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class AddressBlockApi: diff --git a/src/ipam/api/asm_api.py b/src/ipam/api/asm_api.py index 8a4804b..29a47da 100644 --- a/src/ipam/api/asm_api.py +++ b/src/ipam/api/asm_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ from ipam.models.read_asm_response import ReadASMResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class AsmApi: diff --git a/src/ipam/api/config_profile_api.py b/src/ipam/api/config_profile_api.py index 6a514e0..0c0598f 100644 --- a/src/ipam/api/config_profile_api.py +++ b/src/ipam/api/config_profile_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,9 +27,9 @@ from ipam.models.list_config_profile_response import ListConfigProfileResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ConfigProfileApi: diff --git a/src/ipam/api/dhcp_host_api.py b/src/ipam/api/dhcp_host_api.py index d9e0f6d..593f68c 100644 --- a/src/ipam/api/dhcp_host_api.py +++ b/src/ipam/api/dhcp_host_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_host_response import UpdateHostResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class DhcpHostApi: diff --git a/src/ipam/api/dns_usage_api.py b/src/ipam/api/dns_usage_api.py index 79d8505..2a2b39d 100644 --- a/src/ipam/api/dns_usage_api.py +++ b/src/ipam/api/dns_usage_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -23,9 +23,9 @@ from ipam.models.read_dns_usage_response import ReadDNSUsageResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class DnsUsageApi: diff --git a/src/ipam/api/filter_api.py b/src/ipam/api/filter_api.py index e81161b..ff928a8 100644 --- a/src/ipam/api/filter_api.py +++ b/src/ipam/api/filter_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -22,9 +22,9 @@ from ipam.models.list_filter_response import ListFilterResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class FilterApi: diff --git a/src/ipam/api/fixed_address_api.py b/src/ipam/api/fixed_address_api.py index 4e62a9d..4e93ae1 100644 --- a/src/ipam/api/fixed_address_api.py +++ b/src/ipam/api/fixed_address_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_fixed_address_response import UpdateFixedAddressResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class FixedAddressApi: diff --git a/src/ipam/api/global_api.py b/src/ipam/api/global_api.py index 4957f55..8ba51e6 100644 --- a/src/ipam/api/global_api.py +++ b/src/ipam/api/global_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -24,9 +24,9 @@ from ipam.models.update_global_response import UpdateGlobalResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class GlobalApi: diff --git a/src/ipam/api/ha_group_api.py b/src/ipam/api/ha_group_api.py index d45eaca..51152f9 100644 --- a/src/ipam/api/ha_group_api.py +++ b/src/ipam/api/ha_group_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_ha_group_response import UpdateHAGroupResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class HaGroupApi: diff --git a/src/ipam/api/hardware_filter_api.py b/src/ipam/api/hardware_filter_api.py index ed1e2ad..9e69814 100644 --- a/src/ipam/api/hardware_filter_api.py +++ b/src/ipam/api/hardware_filter_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_hardware_filter_response import UpdateHardwareFilterResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class HardwareFilterApi: diff --git a/src/ipam/api/ip_space_api.py b/src/ipam/api/ip_space_api.py index 107b1cc..56c12bd 100644 --- a/src/ipam/api/ip_space_api.py +++ b/src/ipam/api/ip_space_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,9 +31,9 @@ from ipam.models.update_ip_space_response import UpdateIPSpaceResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class IpSpaceApi: diff --git a/src/ipam/api/ipam_host_api.py b/src/ipam/api/ipam_host_api.py index 0f3490c..99779f0 100644 --- a/src/ipam/api/ipam_host_api.py +++ b/src/ipam/api/ipam_host_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_ipam_host_response import UpdateIpamHostResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class IpamHostApi: diff --git a/src/ipam/api/leases_command_api.py b/src/ipam/api/leases_command_api.py index d6a32ec..aed09f9 100644 --- a/src/ipam/api/leases_command_api.py +++ b/src/ipam/api/leases_command_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,9 +20,9 @@ from ipam.models.leases_command import LeasesCommand from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class LeasesCommandApi: diff --git a/src/ipam/api/mac_address_item_api.py b/src/ipam/api/mac_address_item_api.py index 0e1fef5..1bc75df 100644 --- a/src/ipam/api/mac_address_item_api.py +++ b/src/ipam/api/mac_address_item_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,9 +30,9 @@ from ipam.models.update_mac_address_item_response import UpdateMacAddressItemResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class MacAddressItemApi: diff --git a/src/ipam/api/option_code_api.py b/src/ipam/api/option_code_api.py index 7d59db4..c4463ff 100644 --- a/src/ipam/api/option_code_api.py +++ b/src/ipam/api/option_code_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_option_code_response import UpdateOptionCodeResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class OptionCodeApi: diff --git a/src/ipam/api/option_filter_api.py b/src/ipam/api/option_filter_api.py index a027680..63a243c 100644 --- a/src/ipam/api/option_filter_api.py +++ b/src/ipam/api/option_filter_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_option_filter_response import UpdateOptionFilterResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class OptionFilterApi: diff --git a/src/ipam/api/option_group_api.py b/src/ipam/api/option_group_api.py index f516c33..65c06d6 100644 --- a/src/ipam/api/option_group_api.py +++ b/src/ipam/api/option_group_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_option_group_response import UpdateOptionGroupResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class OptionGroupApi: diff --git a/src/ipam/api/option_space_api.py b/src/ipam/api/option_space_api.py index 5c0d87f..619a912 100644 --- a/src/ipam/api/option_space_api.py +++ b/src/ipam/api/option_space_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_option_space_response import UpdateOptionSpaceResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class OptionSpaceApi: diff --git a/src/ipam/api/range_api.py b/src/ipam/api/range_api.py index e8ced61..e8a96ec 100644 --- a/src/ipam/api/range_api.py +++ b/src/ipam/api/range_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,9 +28,9 @@ from ipam.models.update_range_response import UpdateRangeResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class RangeApi: diff --git a/src/ipam/api/server_api.py b/src/ipam/api/server_api.py index 48c5970..5cec39a 100644 --- a/src/ipam/api/server_api.py +++ b/src/ipam/api/server_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from ipam.models.update_server_response import UpdateServerResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ServerApi: diff --git a/src/ipam/api/service_api.py b/src/ipam/api/service_api.py index 07c7b8e..b747ba1 100644 --- a/src/ipam/api/service_api.py +++ b/src/ipam/api/service_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -23,9 +23,9 @@ from ipam.models.read_dhcp_service_instance_response import ReadDHCPServiceInstanceResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ServiceApi: diff --git a/src/ipam/api/subnet_api.py b/src/ipam/api/subnet_api.py index 8fb06d7..5b15a8f 100644 --- a/src/ipam/api/subnet_api.py +++ b/src/ipam/api/subnet_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,9 +31,9 @@ from ipam.models.update_subnet_response import UpdateSubnetResponse from ipam import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class SubnetApi: diff --git a/src/ipam/docs/Address.md b/src/ipam/docs/Address.md index 3918d2b..72a6ecf 100644 --- a/src/ipam/docs/Address.md +++ b/src/ipam/docs/Address.md @@ -6,7 +6,7 @@ An __Address__ object (_ipam/address_) represents any single IP address within a Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**address** | **str** | The address in form \"a.b.c.d\". | [optional] +**address** | **str** | The address in form \"a.b.c.d\". | **comment** | **str** | The description for the address object. May contain 0 to 1024 characters. Can include UTF-8. | [optional] **compartment_id** | **str** | The compartment associated with the object. If no compartment is associated with the object, the value defaults to empty. | [optional] [readonly] **created_at** | **datetime** | Time when the object has been created. | [optional] [readonly] diff --git a/src/ipam/docs/AddressApi.md b/src/ipam/docs/AddressApi.md index e8e2dd0..8065b66 100644 --- a/src/ipam/docs/AddressApi.md +++ b/src/ipam/docs/AddressApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -261,20 +261,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -338,20 +338,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/AddressBlockApi.md b/src/ipam/docs/AddressBlockApi.md index 40694d8..f55fc47 100644 --- a/src/ipam/docs/AddressBlockApi.md +++ b/src/ipam/docs/AddressBlockApi.md @@ -35,20 +35,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -113,20 +113,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -190,20 +190,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -271,20 +271,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -349,20 +349,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -431,20 +431,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -505,20 +505,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -588,20 +588,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -664,20 +664,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -746,20 +746,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -824,20 +824,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -906,20 +906,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -984,20 +984,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/AsmApi.md b/src/ipam/docs/AsmApi.md index 3572556..738c18b 100644 --- a/src/ipam/docs/AsmApi.md +++ b/src/ipam/docs/AsmApi.md @@ -25,20 +25,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -101,20 +101,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/ConfigProfileApi.md b/src/ipam/docs/ConfigProfileApi.md index 1b9a20b..381e689 100644 --- a/src/ipam/docs/ConfigProfileApi.md +++ b/src/ipam/docs/ConfigProfileApi.md @@ -28,20 +28,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -104,20 +104,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -180,20 +180,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -256,20 +256,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -332,20 +332,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -407,20 +407,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/DhcpHostApi.md b/src/ipam/docs/DhcpHostApi.md index bcd7a42..edb0033 100644 --- a/src/ipam/docs/DhcpHostApi.md +++ b/src/ipam/docs/DhcpHostApi.md @@ -26,20 +26,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -108,20 +108,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -184,20 +184,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -261,20 +261,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/DnsUsageApi.md b/src/ipam/docs/DnsUsageApi.md index 4297244..c593eff 100644 --- a/src/ipam/docs/DnsUsageApi.md +++ b/src/ipam/docs/DnsUsageApi.md @@ -24,20 +24,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -104,20 +104,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/FilterApi.md b/src/ipam/docs/FilterApi.md index 2001967..fe46aca 100644 --- a/src/ipam/docs/FilterApi.md +++ b/src/ipam/docs/FilterApi.md @@ -23,20 +23,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/FixedAddressApi.md b/src/ipam/docs/FixedAddressApi.md index 0a09c7b..e46e8e1 100644 --- a/src/ipam/docs/FixedAddressApi.md +++ b/src/ipam/docs/FixedAddressApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -104,20 +104,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -178,20 +178,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -261,20 +261,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -339,20 +339,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/GlobalApi.md b/src/ipam/docs/GlobalApi.md index d5eec6c..00ae5df 100644 --- a/src/ipam/docs/GlobalApi.md +++ b/src/ipam/docs/GlobalApi.md @@ -26,20 +26,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -101,20 +101,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -178,20 +178,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -254,20 +254,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/HaGroupApi.md b/src/ipam/docs/HaGroupApi.md index 05dc708..b9c8666 100644 --- a/src/ipam/docs/HaGroupApi.md +++ b/src/ipam/docs/HaGroupApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -260,20 +260,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -338,20 +338,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/HardwareFilterApi.md b/src/ipam/docs/HardwareFilterApi.md index 9d5dde6..edd5540 100644 --- a/src/ipam/docs/HardwareFilterApi.md +++ b/src/ipam/docs/HardwareFilterApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/IpSpaceApi.md b/src/ipam/docs/IpSpaceApi.md index 44f6b76..348aadf 100644 --- a/src/ipam/docs/IpSpaceApi.md +++ b/src/ipam/docs/IpSpaceApi.md @@ -30,20 +30,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -106,20 +106,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -184,20 +184,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -261,20 +261,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -335,20 +335,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -412,20 +412,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -495,20 +495,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -573,20 +573,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/IpamHostApi.md b/src/ipam/docs/IpamHostApi.md index f4dd258..c04c448 100644 --- a/src/ipam/docs/IpamHostApi.md +++ b/src/ipam/docs/IpamHostApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -337,20 +337,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/LeasesCommandApi.md b/src/ipam/docs/LeasesCommandApi.md index d9077b4..4fb0333 100644 --- a/src/ipam/docs/LeasesCommandApi.md +++ b/src/ipam/docs/LeasesCommandApi.md @@ -23,20 +23,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/MacAddressItemApi.md b/src/ipam/docs/MacAddressItemApi.md index fa5f3af..329bb5e 100644 --- a/src/ipam/docs/MacAddressItemApi.md +++ b/src/ipam/docs/MacAddressItemApi.md @@ -29,20 +29,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -105,20 +105,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -181,20 +181,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -255,20 +255,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -335,20 +335,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -412,20 +412,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -490,20 +490,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/OptionCodeApi.md b/src/ipam/docs/OptionCodeApi.md index e0596bd..416662c 100644 --- a/src/ipam/docs/OptionCodeApi.md +++ b/src/ipam/docs/OptionCodeApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -257,20 +257,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -334,20 +334,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/OptionFilterApi.md b/src/ipam/docs/OptionFilterApi.md index 16c0a65..4dd7a59 100644 --- a/src/ipam/docs/OptionFilterApi.md +++ b/src/ipam/docs/OptionFilterApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/OptionGroupApi.md b/src/ipam/docs/OptionGroupApi.md index 985e548..fec9523 100644 --- a/src/ipam/docs/OptionGroupApi.md +++ b/src/ipam/docs/OptionGroupApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/OptionSpaceApi.md b/src/ipam/docs/OptionSpaceApi.md index 29d8d3c..55747a2 100644 --- a/src/ipam/docs/OptionSpaceApi.md +++ b/src/ipam/docs/OptionSpaceApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/RangeApi.md b/src/ipam/docs/RangeApi.md index 1f87f88..8f71c8a 100644 --- a/src/ipam/docs/RangeApi.md +++ b/src/ipam/docs/RangeApi.md @@ -29,20 +29,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -106,20 +106,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -184,20 +184,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -258,20 +258,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -341,20 +341,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -419,20 +419,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -497,20 +497,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/ServerApi.md b/src/ipam/docs/ServerApi.md index 6cc4b67..7d137b3 100644 --- a/src/ipam/docs/ServerApi.md +++ b/src/ipam/docs/ServerApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -104,20 +104,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -178,20 +178,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -261,20 +261,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -339,20 +339,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/ServiceApi.md b/src/ipam/docs/ServiceApi.md index 31d406b..303b49d 100644 --- a/src/ipam/docs/ServiceApi.md +++ b/src/ipam/docs/ServiceApi.md @@ -24,20 +24,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -106,20 +106,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/docs/SubnetApi.md b/src/ipam/docs/SubnetApi.md index 3e91c72..e3e3142 100644 --- a/src/ipam/docs/SubnetApi.md +++ b/src/ipam/docs/SubnetApi.md @@ -31,20 +31,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -109,20 +109,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -186,20 +186,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -264,20 +264,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -338,20 +338,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -421,20 +421,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -498,20 +498,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -576,20 +576,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -654,20 +654,20 @@ from pprint import pprint import ipam -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam/models/__init__.py b/src/ipam/models/__init__.py index fa4068b..41e0c44 100644 --- a/src/ipam/models/__init__.py +++ b/src/ipam/models/__init__.py @@ -4,7 +4,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/access_filter.py b/src/ipam/models/access_filter.py index a045a1d..5c4e38e 100644 --- a/src/ipam/models/access_filter.py +++ b/src/ipam/models/access_filter.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/address.py b/src/ipam/models/address.py index bcbdc83..f5d1d75 100644 --- a/src/ipam/models/address.py +++ b/src/ipam/models/address.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,8 +29,7 @@ class Address(BaseModel): """ An __Address__ object (_ipam/address_) represents any single IP address within a given IP space. """ # noqa: E501 - address: Optional[StrictStr] = Field( - default=None, description="The address in form \"a.b.c.d\".") + address: StrictStr = Field(description="The address in form \"a.b.c.d\".") comment: Optional[StrictStr] = Field( default=None, description= diff --git a/src/ipam/models/address_block.py b/src/ipam/models/address_block.py index 664cc4a..a090b52 100644 --- a/src/ipam/models/address_block.py +++ b/src/ipam/models/address_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/asm.py b/src/ipam/models/asm.py index 32b03d0..a17a3a2 100644 --- a/src/ipam/models/asm.py +++ b/src/ipam/models/asm.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/asm_config.py b/src/ipam/models/asm_config.py index b90559c..0e49aa4 100644 --- a/src/ipam/models/asm_config.py +++ b/src/ipam/models/asm_config.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/asm_enable_block.py b/src/ipam/models/asm_enable_block.py index ccb8978..0bf29e9 100644 --- a/src/ipam/models/asm_enable_block.py +++ b/src/ipam/models/asm_enable_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/asm_growth_block.py b/src/ipam/models/asm_growth_block.py index 42f9d76..6ed9fe1 100644 --- a/src/ipam/models/asm_growth_block.py +++ b/src/ipam/models/asm_growth_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/associate_config_profile_to_objects_request.py b/src/ipam/models/associate_config_profile_to_objects_request.py index fb6fdd7..9c91473 100644 --- a/src/ipam/models/associate_config_profile_to_objects_request.py +++ b/src/ipam/models/associate_config_profile_to_objects_request.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/associate_object_to_config_profiles_request.py b/src/ipam/models/associate_object_to_config_profiles_request.py index a68dc74..cdca637 100644 --- a/src/ipam/models/associate_object_to_config_profiles_request.py +++ b/src/ipam/models/associate_object_to_config_profiles_request.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/associated_host.py b/src/ipam/models/associated_host.py index bc885ec..13b986a 100644 --- a/src/ipam/models/associated_host.py +++ b/src/ipam/models/associated_host.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/bulk_copy_error.py b/src/ipam/models/bulk_copy_error.py index 47e8c77..412b08f 100644 --- a/src/ipam/models/bulk_copy_error.py +++ b/src/ipam/models/bulk_copy_error.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/bulk_copy_ip_space.py b/src/ipam/models/bulk_copy_ip_space.py index 6670d55..7515cd0 100644 --- a/src/ipam/models/bulk_copy_ip_space.py +++ b/src/ipam/models/bulk_copy_ip_space.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/bulk_copy_ip_space_response.py b/src/ipam/models/bulk_copy_ip_space_response.py index 9f52316..76bb1e0 100644 --- a/src/ipam/models/bulk_copy_ip_space_response.py +++ b/src/ipam/models/bulk_copy_ip_space_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/bulk_create_mac_address_item_response.py b/src/ipam/models/bulk_create_mac_address_item_response.py index fadda88..368ff1e 100644 --- a/src/ipam/models/bulk_create_mac_address_item_response.py +++ b/src/ipam/models/bulk_create_mac_address_item_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/bulk_mac_address_item.py b/src/ipam/models/bulk_mac_address_item.py index 51ae4b2..4fdea4d 100644 --- a/src/ipam/models/bulk_mac_address_item.py +++ b/src/ipam/models/bulk_mac_address_item.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/cidr_block.py b/src/ipam/models/cidr_block.py index cb11e42..5d89093 100644 --- a/src/ipam/models/cidr_block.py +++ b/src/ipam/models/cidr_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/copy_address_block.py b/src/ipam/models/copy_address_block.py index 422c15d..8e4ae36 100644 --- a/src/ipam/models/copy_address_block.py +++ b/src/ipam/models/copy_address_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/copy_address_block_response.py b/src/ipam/models/copy_address_block_response.py index 4c5d6d7..2deb2c0 100644 --- a/src/ipam/models/copy_address_block_response.py +++ b/src/ipam/models/copy_address_block_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/copy_ip_space.py b/src/ipam/models/copy_ip_space.py index 4fa291b..44a7c6a 100644 --- a/src/ipam/models/copy_ip_space.py +++ b/src/ipam/models/copy_ip_space.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/copy_ip_space_response.py b/src/ipam/models/copy_ip_space_response.py index d050075..60a031f 100644 --- a/src/ipam/models/copy_ip_space_response.py +++ b/src/ipam/models/copy_ip_space_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/copy_response.py b/src/ipam/models/copy_response.py index bf4270f..7f996c3 100644 --- a/src/ipam/models/copy_response.py +++ b/src/ipam/models/copy_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/copy_subnet.py b/src/ipam/models/copy_subnet.py index 3809b72..87de494 100644 --- a/src/ipam/models/copy_subnet.py +++ b/src/ipam/models/copy_subnet.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/copy_subnet_response.py b/src/ipam/models/copy_subnet_response.py index 9edf66f..6816082 100644 --- a/src/ipam/models/copy_subnet_response.py +++ b/src/ipam/models/copy_subnet_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/cp_subnet.py b/src/ipam/models/cp_subnet.py index 49aeefa..2058b81 100644 --- a/src/ipam/models/cp_subnet.py +++ b/src/ipam/models/cp_subnet.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_address_block_response.py b/src/ipam/models/create_address_block_response.py index fd81b68..f713f7d 100644 --- a/src/ipam/models/create_address_block_response.py +++ b/src/ipam/models/create_address_block_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_address_response.py b/src/ipam/models/create_address_response.py index 514de94..948486c 100644 --- a/src/ipam/models/create_address_response.py +++ b/src/ipam/models/create_address_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_asm_response.py b/src/ipam/models/create_asm_response.py index 21b7df3..63f799a 100644 --- a/src/ipam/models/create_asm_response.py +++ b/src/ipam/models/create_asm_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_fixed_address_response.py b/src/ipam/models/create_fixed_address_response.py index 8b74b98..5630bfb 100644 --- a/src/ipam/models/create_fixed_address_response.py +++ b/src/ipam/models/create_fixed_address_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_ha_group_response.py b/src/ipam/models/create_ha_group_response.py index 30d5f34..0158a53 100644 --- a/src/ipam/models/create_ha_group_response.py +++ b/src/ipam/models/create_ha_group_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_hardware_filter_response.py b/src/ipam/models/create_hardware_filter_response.py index 2a876d6..1e0581c 100644 --- a/src/ipam/models/create_hardware_filter_response.py +++ b/src/ipam/models/create_hardware_filter_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_ip_space_response.py b/src/ipam/models/create_ip_space_response.py index 1d91476..be4fbef 100644 --- a/src/ipam/models/create_ip_space_response.py +++ b/src/ipam/models/create_ip_space_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_ipam_host_response.py b/src/ipam/models/create_ipam_host_response.py index 075a8e4..71a6d1e 100644 --- a/src/ipam/models/create_ipam_host_response.py +++ b/src/ipam/models/create_ipam_host_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_leases_command_response.py b/src/ipam/models/create_leases_command_response.py index a722216..984a6b2 100644 --- a/src/ipam/models/create_leases_command_response.py +++ b/src/ipam/models/create_leases_command_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_mac_address_item_response.py b/src/ipam/models/create_mac_address_item_response.py index ce9d155..7e9cf72 100644 --- a/src/ipam/models/create_mac_address_item_response.py +++ b/src/ipam/models/create_mac_address_item_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_next_available_ab_response.py b/src/ipam/models/create_next_available_ab_response.py index cecf255..7e51ec6 100644 --- a/src/ipam/models/create_next_available_ab_response.py +++ b/src/ipam/models/create_next_available_ab_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_next_available_ip_response.py b/src/ipam/models/create_next_available_ip_response.py index 33053cf..c96db94 100644 --- a/src/ipam/models/create_next_available_ip_response.py +++ b/src/ipam/models/create_next_available_ip_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_next_available_subnet_response.py b/src/ipam/models/create_next_available_subnet_response.py index 500d055..cc6f3f9 100644 --- a/src/ipam/models/create_next_available_subnet_response.py +++ b/src/ipam/models/create_next_available_subnet_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_option_code_response.py b/src/ipam/models/create_option_code_response.py index dfb8280..e6fc203 100644 --- a/src/ipam/models/create_option_code_response.py +++ b/src/ipam/models/create_option_code_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_option_filter_response.py b/src/ipam/models/create_option_filter_response.py index 46188f0..b6305af 100644 --- a/src/ipam/models/create_option_filter_response.py +++ b/src/ipam/models/create_option_filter_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_option_group_response.py b/src/ipam/models/create_option_group_response.py index e0b4d05..0b888e1 100644 --- a/src/ipam/models/create_option_group_response.py +++ b/src/ipam/models/create_option_group_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_option_space_response.py b/src/ipam/models/create_option_space_response.py index 7967156..009dce4 100644 --- a/src/ipam/models/create_option_space_response.py +++ b/src/ipam/models/create_option_space_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_range_response.py b/src/ipam/models/create_range_response.py index c018278..eb6a7ba 100644 --- a/src/ipam/models/create_range_response.py +++ b/src/ipam/models/create_range_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_server_response.py b/src/ipam/models/create_server_response.py index 74b665d..c1b254a 100644 --- a/src/ipam/models/create_server_response.py +++ b/src/ipam/models/create_server_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/create_subnet_response.py b/src/ipam/models/create_subnet_response.py index c723dcc..4418098 100644 --- a/src/ipam/models/create_subnet_response.py +++ b/src/ipam/models/create_subnet_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ddns_block.py b/src/ipam/models/ddns_block.py index 9babebf..1d40f9c 100644 --- a/src/ipam/models/ddns_block.py +++ b/src/ipam/models/ddns_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ddns_hostname_block.py b/src/ipam/models/ddns_hostname_block.py index 4bdd08c..d3a5c64 100644 --- a/src/ipam/models/ddns_hostname_block.py +++ b/src/ipam/models/ddns_hostname_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ddns_update_block.py b/src/ipam/models/ddns_update_block.py index f03b3c4..6e319ee 100644 --- a/src/ipam/models/ddns_update_block.py +++ b/src/ipam/models/ddns_update_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ddns_zone.py b/src/ipam/models/ddns_zone.py index 9ec2634..a477a8a 100644 --- a/src/ipam/models/ddns_zone.py +++ b/src/ipam/models/ddns_zone.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/dhcp_config.py b/src/ipam/models/dhcp_config.py index ef842eb..1039253 100644 --- a/src/ipam/models/dhcp_config.py +++ b/src/ipam/models/dhcp_config.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/dhcp_global.py b/src/ipam/models/dhcp_global.py index 9e80381..a7fd0fb 100644 --- a/src/ipam/models/dhcp_global.py +++ b/src/ipam/models/dhcp_global.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/dhcp_info.py b/src/ipam/models/dhcp_info.py index 069e0a0..f413f11 100644 --- a/src/ipam/models/dhcp_info.py +++ b/src/ipam/models/dhcp_info.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/dhcp_inheritance.py b/src/ipam/models/dhcp_inheritance.py index 7a6acbf..ed1075b 100644 --- a/src/ipam/models/dhcp_inheritance.py +++ b/src/ipam/models/dhcp_inheritance.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/dhcp_options_inheritance.py b/src/ipam/models/dhcp_options_inheritance.py index f777613..1cd2308 100644 --- a/src/ipam/models/dhcp_options_inheritance.py +++ b/src/ipam/models/dhcp_options_inheritance.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/dhcp_packet_stats.py b/src/ipam/models/dhcp_packet_stats.py index 0ec9f04..4d60af0 100644 --- a/src/ipam/models/dhcp_packet_stats.py +++ b/src/ipam/models/dhcp_packet_stats.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/dhcp_service_instance.py b/src/ipam/models/dhcp_service_instance.py index 90be865..c4a0bb9 100644 --- a/src/ipam/models/dhcp_service_instance.py +++ b/src/ipam/models/dhcp_service_instance.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/dhcp_utilization.py b/src/ipam/models/dhcp_utilization.py index e50a07e..f851fe8 100644 --- a/src/ipam/models/dhcp_utilization.py +++ b/src/ipam/models/dhcp_utilization.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/dhcp_utilization_threshold.py b/src/ipam/models/dhcp_utilization_threshold.py index f65e7d0..eacce24 100644 --- a/src/ipam/models/dhcp_utilization_threshold.py +++ b/src/ipam/models/dhcp_utilization_threshold.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/disassociate_config_profile_from_objects_request.py b/src/ipam/models/disassociate_config_profile_from_objects_request.py index 4525120..c338482 100644 --- a/src/ipam/models/disassociate_config_profile_from_objects_request.py +++ b/src/ipam/models/disassociate_config_profile_from_objects_request.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/disassociate_object_from_config_profiles_request.py b/src/ipam/models/disassociate_object_from_config_profiles_request.py index 977888c..bdb0147 100644 --- a/src/ipam/models/disassociate_object_from_config_profiles_request.py +++ b/src/ipam/models/disassociate_object_from_config_profiles_request.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/dns_usage.py b/src/ipam/models/dns_usage.py index fa5de83..4d09c51 100644 --- a/src/ipam/models/dns_usage.py +++ b/src/ipam/models/dns_usage.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/exclusion_range.py b/src/ipam/models/exclusion_range.py index 578d487..1884ac9 100644 --- a/src/ipam/models/exclusion_range.py +++ b/src/ipam/models/exclusion_range.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/filter.py b/src/ipam/models/filter.py index 5c33af7..a1d54a2 100644 --- a/src/ipam/models/filter.py +++ b/src/ipam/models/filter.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/fixed_address.py b/src/ipam/models/fixed_address.py index 2b53a48..94a1e1c 100644 --- a/src/ipam/models/fixed_address.py +++ b/src/ipam/models/fixed_address.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/fixed_address_inheritance.py b/src/ipam/models/fixed_address_inheritance.py index 685bedb..fbd112b 100644 --- a/src/ipam/models/fixed_address_inheritance.py +++ b/src/ipam/models/fixed_address_inheritance.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ha_group.py b/src/ipam/models/ha_group.py index 29a0e03..a930a19 100644 --- a/src/ipam/models/ha_group.py +++ b/src/ipam/models/ha_group.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ha_group_heartbeats.py b/src/ipam/models/ha_group_heartbeats.py index 2f1b75d..1b8c2ea 100644 --- a/src/ipam/models/ha_group_heartbeats.py +++ b/src/ipam/models/ha_group_heartbeats.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ha_group_host.py b/src/ipam/models/ha_group_host.py index 8fe5595..928a248 100644 --- a/src/ipam/models/ha_group_host.py +++ b/src/ipam/models/ha_group_host.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/hardware_filter.py b/src/ipam/models/hardware_filter.py index b16109d..3cec1d4 100644 --- a/src/ipam/models/hardware_filter.py +++ b/src/ipam/models/hardware_filter.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/host.py b/src/ipam/models/host.py index d731f46..0005002 100644 --- a/src/ipam/models/host.py +++ b/src/ipam/models/host.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/host_address.py b/src/ipam/models/host_address.py index 7c98971..322c348 100644 --- a/src/ipam/models/host_address.py +++ b/src/ipam/models/host_address.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/host_associated_server.py b/src/ipam/models/host_associated_server.py index 9207977..fa5133a 100644 --- a/src/ipam/models/host_associated_server.py +++ b/src/ipam/models/host_associated_server.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/host_associations_response.py b/src/ipam/models/host_associations_response.py index a3fdfe9..8da3204 100644 --- a/src/ipam/models/host_associations_response.py +++ b/src/ipam/models/host_associations_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/host_name.py b/src/ipam/models/host_name.py index ea25c20..11f8785 100644 --- a/src/ipam/models/host_name.py +++ b/src/ipam/models/host_name.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/hostname_rewrite_block.py b/src/ipam/models/hostname_rewrite_block.py index 7d94706..15f6e9a 100644 --- a/src/ipam/models/hostname_rewrite_block.py +++ b/src/ipam/models/hostname_rewrite_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ignore_item.py b/src/ipam/models/ignore_item.py index 615df06..4344e10 100644 --- a/src/ipam/models/ignore_item.py +++ b/src/ipam/models/ignore_item.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inheritance_assigned_host.py b/src/ipam/models/inheritance_assigned_host.py index 786fd0d..5a4c19f 100644 --- a/src/ipam/models/inheritance_assigned_host.py +++ b/src/ipam/models/inheritance_assigned_host.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inheritance_inherited_bool.py b/src/ipam/models/inheritance_inherited_bool.py index d404b9b..f5812c3 100644 --- a/src/ipam/models/inheritance_inherited_bool.py +++ b/src/ipam/models/inheritance_inherited_bool.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inheritance_inherited_float.py b/src/ipam/models/inheritance_inherited_float.py index 94c1dc5..c0281c5 100644 --- a/src/ipam/models/inheritance_inherited_float.py +++ b/src/ipam/models/inheritance_inherited_float.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inheritance_inherited_identifier.py b/src/ipam/models/inheritance_inherited_identifier.py index c00a205..d95d139 100644 --- a/src/ipam/models/inheritance_inherited_identifier.py +++ b/src/ipam/models/inheritance_inherited_identifier.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inheritance_inherited_string.py b/src/ipam/models/inheritance_inherited_string.py index 3e65f54..8625ea6 100644 --- a/src/ipam/models/inheritance_inherited_string.py +++ b/src/ipam/models/inheritance_inherited_string.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inheritance_inherited_u_int32.py b/src/ipam/models/inheritance_inherited_u_int32.py index d62f8fc..821f1d4 100644 --- a/src/ipam/models/inheritance_inherited_u_int32.py +++ b/src/ipam/models/inheritance_inherited_u_int32.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_asm_config.py b/src/ipam/models/inherited_asm_config.py index 4db7bf2..29a13fc 100644 --- a/src/ipam/models/inherited_asm_config.py +++ b/src/ipam/models/inherited_asm_config.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_asm_enable_block.py b/src/ipam/models/inherited_asm_enable_block.py index ed6fd59..9250a4e 100644 --- a/src/ipam/models/inherited_asm_enable_block.py +++ b/src/ipam/models/inherited_asm_enable_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_asm_growth_block.py b/src/ipam/models/inherited_asm_growth_block.py index f9d23f0..313f3c0 100644 --- a/src/ipam/models/inherited_asm_growth_block.py +++ b/src/ipam/models/inherited_asm_growth_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_ddns_block.py b/src/ipam/models/inherited_ddns_block.py index 161821e..bbe7e80 100644 --- a/src/ipam/models/inherited_ddns_block.py +++ b/src/ipam/models/inherited_ddns_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_ddns_hostname_block.py b/src/ipam/models/inherited_ddns_hostname_block.py index e22d4fc..9966f71 100644 --- a/src/ipam/models/inherited_ddns_hostname_block.py +++ b/src/ipam/models/inherited_ddns_hostname_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_ddns_update_block.py b/src/ipam/models/inherited_ddns_update_block.py index b042956..fe6ef71 100644 --- a/src/ipam/models/inherited_ddns_update_block.py +++ b/src/ipam/models/inherited_ddns_update_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_dhcp_config.py b/src/ipam/models/inherited_dhcp_config.py index 8b2197b..c6c42a6 100644 --- a/src/ipam/models/inherited_dhcp_config.py +++ b/src/ipam/models/inherited_dhcp_config.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_dhcp_config_filter_list.py b/src/ipam/models/inherited_dhcp_config_filter_list.py index 0e34278..02dec32 100644 --- a/src/ipam/models/inherited_dhcp_config_filter_list.py +++ b/src/ipam/models/inherited_dhcp_config_filter_list.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_dhcp_config_ignore_item_list.py b/src/ipam/models/inherited_dhcp_config_ignore_item_list.py index c104d65..4ba5bad 100644 --- a/src/ipam/models/inherited_dhcp_config_ignore_item_list.py +++ b/src/ipam/models/inherited_dhcp_config_ignore_item_list.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_dhcp_option.py b/src/ipam/models/inherited_dhcp_option.py index 2156ddb..38680bf 100644 --- a/src/ipam/models/inherited_dhcp_option.py +++ b/src/ipam/models/inherited_dhcp_option.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_dhcp_option_item.py b/src/ipam/models/inherited_dhcp_option_item.py index eb250aa..69a32c9 100644 --- a/src/ipam/models/inherited_dhcp_option_item.py +++ b/src/ipam/models/inherited_dhcp_option_item.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_dhcp_option_list.py b/src/ipam/models/inherited_dhcp_option_list.py index 782e836..0dd0f2f 100644 --- a/src/ipam/models/inherited_dhcp_option_list.py +++ b/src/ipam/models/inherited_dhcp_option_list.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/inherited_hostname_rewrite_block.py b/src/ipam/models/inherited_hostname_rewrite_block.py index 56601a6..fc030c9 100644 --- a/src/ipam/models/inherited_hostname_rewrite_block.py +++ b/src/ipam/models/inherited_hostname_rewrite_block.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ip_space.py b/src/ipam/models/ip_space.py index f6d8e97..2b86ff2 100644 --- a/src/ipam/models/ip_space.py +++ b/src/ipam/models/ip_space.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ip_space_inheritance.py b/src/ipam/models/ip_space_inheritance.py index b403a1f..7410e6d 100644 --- a/src/ipam/models/ip_space_inheritance.py +++ b/src/ipam/models/ip_space_inheritance.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/ipam_host.py b/src/ipam/models/ipam_host.py index 617be19..2278a63 100644 --- a/src/ipam/models/ipam_host.py +++ b/src/ipam/models/ipam_host.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/kerberos_key.py b/src/ipam/models/kerberos_key.py index ffff5ef..0bfeee4 100644 --- a/src/ipam/models/kerberos_key.py +++ b/src/ipam/models/kerberos_key.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/lease_address.py b/src/ipam/models/lease_address.py index aeace23..667f6ef 100644 --- a/src/ipam/models/lease_address.py +++ b/src/ipam/models/lease_address.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/lease_range.py b/src/ipam/models/lease_range.py index f1a9fa1..931717d 100644 --- a/src/ipam/models/lease_range.py +++ b/src/ipam/models/lease_range.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/lease_subnet.py b/src/ipam/models/lease_subnet.py index ac2f9dc..5feb8ea 100644 --- a/src/ipam/models/lease_subnet.py +++ b/src/ipam/models/lease_subnet.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/leases_command.py b/src/ipam/models/leases_command.py index 7f50f55..da02df7 100644 --- a/src/ipam/models/leases_command.py +++ b/src/ipam/models/leases_command.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_address_block_response.py b/src/ipam/models/list_address_block_response.py index 34df36b..3609e52 100644 --- a/src/ipam/models/list_address_block_response.py +++ b/src/ipam/models/list_address_block_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_address_response.py b/src/ipam/models/list_address_response.py index bec8ad2..f8b408b 100644 --- a/src/ipam/models/list_address_response.py +++ b/src/ipam/models/list_address_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_ancestor_response.py b/src/ipam/models/list_ancestor_response.py index ec378ae..ea07c41 100644 --- a/src/ipam/models/list_ancestor_response.py +++ b/src/ipam/models/list_ancestor_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_asm_response.py b/src/ipam/models/list_asm_response.py index 81fdc13..7902596 100644 --- a/src/ipam/models/list_asm_response.py +++ b/src/ipam/models/list_asm_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_config_profile_response.py b/src/ipam/models/list_config_profile_response.py index 39fc1c2..ac2e6bc 100644 --- a/src/ipam/models/list_config_profile_response.py +++ b/src/ipam/models/list_config_profile_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_cp_subnet_response.py b/src/ipam/models/list_cp_subnet_response.py index d915c24..fe0102e 100644 --- a/src/ipam/models/list_cp_subnet_response.py +++ b/src/ipam/models/list_cp_subnet_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_dhcp_service_instance_response.py b/src/ipam/models/list_dhcp_service_instance_response.py index 3a1c189..6903f92 100644 --- a/src/ipam/models/list_dhcp_service_instance_response.py +++ b/src/ipam/models/list_dhcp_service_instance_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_dns_usage_response.py b/src/ipam/models/list_dns_usage_response.py index c43e482..0268a13 100644 --- a/src/ipam/models/list_dns_usage_response.py +++ b/src/ipam/models/list_dns_usage_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_filter_response.py b/src/ipam/models/list_filter_response.py index 02cf699..8b51023 100644 --- a/src/ipam/models/list_filter_response.py +++ b/src/ipam/models/list_filter_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_fixed_address_response.py b/src/ipam/models/list_fixed_address_response.py index b5d235a..399d7fc 100644 --- a/src/ipam/models/list_fixed_address_response.py +++ b/src/ipam/models/list_fixed_address_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_ha_group_response.py b/src/ipam/models/list_ha_group_response.py index 4d916f2..cdaa2e3 100644 --- a/src/ipam/models/list_ha_group_response.py +++ b/src/ipam/models/list_ha_group_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_hardware_filter_response.py b/src/ipam/models/list_hardware_filter_response.py index 549bcec..47a7dd2 100644 --- a/src/ipam/models/list_hardware_filter_response.py +++ b/src/ipam/models/list_hardware_filter_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_host_response.py b/src/ipam/models/list_host_response.py index e49a5b5..f1c960e 100644 --- a/src/ipam/models/list_host_response.py +++ b/src/ipam/models/list_host_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_ip_space_response.py b/src/ipam/models/list_ip_space_response.py index 0d03ae0..2807efb 100644 --- a/src/ipam/models/list_ip_space_response.py +++ b/src/ipam/models/list_ip_space_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_ipam_host_response.py b/src/ipam/models/list_ipam_host_response.py index bd4fb38..6095465 100644 --- a/src/ipam/models/list_ipam_host_response.py +++ b/src/ipam/models/list_ipam_host_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_mac_address_item_response.py b/src/ipam/models/list_mac_address_item_response.py index 4e15dad..99cc6a1 100644 --- a/src/ipam/models/list_mac_address_item_response.py +++ b/src/ipam/models/list_mac_address_item_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_option_code_response.py b/src/ipam/models/list_option_code_response.py index 35fe7a1..ca752eb 100644 --- a/src/ipam/models/list_option_code_response.py +++ b/src/ipam/models/list_option_code_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_option_filter_response.py b/src/ipam/models/list_option_filter_response.py index 03c12fe..d61b1b9 100644 --- a/src/ipam/models/list_option_filter_response.py +++ b/src/ipam/models/list_option_filter_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_option_group_response.py b/src/ipam/models/list_option_group_response.py index bfbb1ca..f558ec7 100644 --- a/src/ipam/models/list_option_group_response.py +++ b/src/ipam/models/list_option_group_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_option_space_response.py b/src/ipam/models/list_option_space_response.py index 45e1c81..cae7c24 100644 --- a/src/ipam/models/list_option_space_response.py +++ b/src/ipam/models/list_option_space_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_range_response.py b/src/ipam/models/list_range_response.py index c7407d5..4ab3a39 100644 --- a/src/ipam/models/list_range_response.py +++ b/src/ipam/models/list_range_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_server_response.py b/src/ipam/models/list_server_response.py index 3fc222b..45b8022 100644 --- a/src/ipam/models/list_server_response.py +++ b/src/ipam/models/list_server_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/list_subnet_response.py b/src/ipam/models/list_subnet_response.py index 929e68e..3d50e07 100644 --- a/src/ipam/models/list_subnet_response.py +++ b/src/ipam/models/list_subnet_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/mac_address_item.py b/src/ipam/models/mac_address_item.py index 9d0348e..220d168 100644 --- a/src/ipam/models/mac_address_item.py +++ b/src/ipam/models/mac_address_item.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/mac_address_item_upload.py b/src/ipam/models/mac_address_item_upload.py index e4cdede..d6f28eb 100644 --- a/src/ipam/models/mac_address_item_upload.py +++ b/src/ipam/models/mac_address_item_upload.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/mac_address_item_upload_response.py b/src/ipam/models/mac_address_item_upload_response.py index 34cabac..a914117 100644 --- a/src/ipam/models/mac_address_item_upload_response.py +++ b/src/ipam/models/mac_address_item_upload_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/name.py b/src/ipam/models/name.py index fa9531f..3faa1d4 100644 --- a/src/ipam/models/name.py +++ b/src/ipam/models/name.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/nameserver.py b/src/ipam/models/nameserver.py index febeadd..7047a3d 100644 --- a/src/ipam/models/nameserver.py +++ b/src/ipam/models/nameserver.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/next_available_ab_response.py b/src/ipam/models/next_available_ab_response.py index 0d771e6..a306830 100644 --- a/src/ipam/models/next_available_ab_response.py +++ b/src/ipam/models/next_available_ab_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/next_available_ip_response.py b/src/ipam/models/next_available_ip_response.py index c80736b..ab1c9d9 100644 --- a/src/ipam/models/next_available_ip_response.py +++ b/src/ipam/models/next_available_ip_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/next_available_subnet_response.py b/src/ipam/models/next_available_subnet_response.py index 291edda..d79c1e7 100644 --- a/src/ipam/models/next_available_subnet_response.py +++ b/src/ipam/models/next_available_subnet_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/option_code.py b/src/ipam/models/option_code.py index 6a77853..11d7867 100644 --- a/src/ipam/models/option_code.py +++ b/src/ipam/models/option_code.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/option_filter.py b/src/ipam/models/option_filter.py index 01c6dd9..7c84c37 100644 --- a/src/ipam/models/option_filter.py +++ b/src/ipam/models/option_filter.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/option_filter_rule.py b/src/ipam/models/option_filter_rule.py index 8fb685b..48702e8 100644 --- a/src/ipam/models/option_filter_rule.py +++ b/src/ipam/models/option_filter_rule.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/option_filter_rule_list.py b/src/ipam/models/option_filter_rule_list.py index 126f802..22d0778 100644 --- a/src/ipam/models/option_filter_rule_list.py +++ b/src/ipam/models/option_filter_rule_list.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/option_group.py b/src/ipam/models/option_group.py index c3ad099..acbedad 100644 --- a/src/ipam/models/option_group.py +++ b/src/ipam/models/option_group.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/option_item.py b/src/ipam/models/option_item.py index ea5fae5..ac641b3 100644 --- a/src/ipam/models/option_item.py +++ b/src/ipam/models/option_item.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/option_space.py b/src/ipam/models/option_space.py index 4b017a2..c8b3ebd 100644 --- a/src/ipam/models/option_space.py +++ b/src/ipam/models/option_space.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/protobuf_field_mask.py b/src/ipam/models/protobuf_field_mask.py index d1da1ec..fe0f3f1 100644 --- a/src/ipam/models/protobuf_field_mask.py +++ b/src/ipam/models/protobuf_field_mask.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/range.py b/src/ipam/models/range.py index 2e3368e..0c3e0a7 100644 --- a/src/ipam/models/range.py +++ b/src/ipam/models/range.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_address_block_response.py b/src/ipam/models/read_address_block_response.py index 7c8fe40..bd55c2d 100644 --- a/src/ipam/models/read_address_block_response.py +++ b/src/ipam/models/read_address_block_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_address_response.py b/src/ipam/models/read_address_response.py index 7de59e5..4aabbfd 100644 --- a/src/ipam/models/read_address_response.py +++ b/src/ipam/models/read_address_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_asm_response.py b/src/ipam/models/read_asm_response.py index 0783234..d6ffff5 100644 --- a/src/ipam/models/read_asm_response.py +++ b/src/ipam/models/read_asm_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_dhcp_service_instance_response.py b/src/ipam/models/read_dhcp_service_instance_response.py index b47ee71..f1626d9 100644 --- a/src/ipam/models/read_dhcp_service_instance_response.py +++ b/src/ipam/models/read_dhcp_service_instance_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_dns_usage_response.py b/src/ipam/models/read_dns_usage_response.py index 141ec5d..941f848 100644 --- a/src/ipam/models/read_dns_usage_response.py +++ b/src/ipam/models/read_dns_usage_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_fixed_address_response.py b/src/ipam/models/read_fixed_address_response.py index 156e606..93e8008 100644 --- a/src/ipam/models/read_fixed_address_response.py +++ b/src/ipam/models/read_fixed_address_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_global_response.py b/src/ipam/models/read_global_response.py index 4b73aaa..e6b206c 100644 --- a/src/ipam/models/read_global_response.py +++ b/src/ipam/models/read_global_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_ha_group_response.py b/src/ipam/models/read_ha_group_response.py index 2750173..c211032 100644 --- a/src/ipam/models/read_ha_group_response.py +++ b/src/ipam/models/read_ha_group_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_hardware_filter_response.py b/src/ipam/models/read_hardware_filter_response.py index e50487f..575d70f 100644 --- a/src/ipam/models/read_hardware_filter_response.py +++ b/src/ipam/models/read_hardware_filter_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_host_response.py b/src/ipam/models/read_host_response.py index 717a7f3..4f37b28 100644 --- a/src/ipam/models/read_host_response.py +++ b/src/ipam/models/read_host_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_ip_space_response.py b/src/ipam/models/read_ip_space_response.py index 5c70a11..07cd963 100644 --- a/src/ipam/models/read_ip_space_response.py +++ b/src/ipam/models/read_ip_space_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_ipam_host_response.py b/src/ipam/models/read_ipam_host_response.py index 7344b90..edd7cf8 100644 --- a/src/ipam/models/read_ipam_host_response.py +++ b/src/ipam/models/read_ipam_host_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_mac_address_item_response.py b/src/ipam/models/read_mac_address_item_response.py index cb982e3..a3a97b2 100644 --- a/src/ipam/models/read_mac_address_item_response.py +++ b/src/ipam/models/read_mac_address_item_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_option_code_response.py b/src/ipam/models/read_option_code_response.py index d3a96ef..fc279f8 100644 --- a/src/ipam/models/read_option_code_response.py +++ b/src/ipam/models/read_option_code_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_option_filter_response.py b/src/ipam/models/read_option_filter_response.py index d2ff092..43e67de 100644 --- a/src/ipam/models/read_option_filter_response.py +++ b/src/ipam/models/read_option_filter_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_option_group_response.py b/src/ipam/models/read_option_group_response.py index b3f290b..97ab3d1 100644 --- a/src/ipam/models/read_option_group_response.py +++ b/src/ipam/models/read_option_group_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_option_space_response.py b/src/ipam/models/read_option_space_response.py index a9eb459..ff0b1c2 100644 --- a/src/ipam/models/read_option_space_response.py +++ b/src/ipam/models/read_option_space_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_range_response.py b/src/ipam/models/read_range_response.py index 6726947..c47383b 100644 --- a/src/ipam/models/read_range_response.py +++ b/src/ipam/models/read_range_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_server_response.py b/src/ipam/models/read_server_response.py index 1933756..85a4b4e 100644 --- a/src/ipam/models/read_server_response.py +++ b/src/ipam/models/read_server_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/read_subnet_response.py b/src/ipam/models/read_subnet_response.py index 3aee344..c2265b0 100644 --- a/src/ipam/models/read_subnet_response.py +++ b/src/ipam/models/read_subnet_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/realms_conflict.py b/src/ipam/models/realms_conflict.py index aba6251..697330b 100644 --- a/src/ipam/models/realms_conflict.py +++ b/src/ipam/models/realms_conflict.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/realms_conflict_response.py b/src/ipam/models/realms_conflict_response.py index b6fdfae..24e2c0a 100644 --- a/src/ipam/models/realms_conflict_response.py +++ b/src/ipam/models/realms_conflict_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/server.py b/src/ipam/models/server.py index 8a90c00..58ba40b 100644 --- a/src/ipam/models/server.py +++ b/src/ipam/models/server.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/server_inheritance.py b/src/ipam/models/server_inheritance.py index d9a82cb..a5fd2ee 100644 --- a/src/ipam/models/server_inheritance.py +++ b/src/ipam/models/server_inheritance.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/subnet.py b/src/ipam/models/subnet.py index b33eac1..ecb09dc 100644 --- a/src/ipam/models/subnet.py +++ b/src/ipam/models/subnet.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/tsig_key.py b/src/ipam/models/tsig_key.py index 8343469..1b49099 100644 --- a/src/ipam/models/tsig_key.py +++ b/src/ipam/models/tsig_key.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_address_block_response.py b/src/ipam/models/update_address_block_response.py index a9f96fc..0bf03b7 100644 --- a/src/ipam/models/update_address_block_response.py +++ b/src/ipam/models/update_address_block_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_address_response.py b/src/ipam/models/update_address_response.py index 605a4ce..9fc1188 100644 --- a/src/ipam/models/update_address_response.py +++ b/src/ipam/models/update_address_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_fixed_address_response.py b/src/ipam/models/update_fixed_address_response.py index 008dcd1..ea34fd7 100644 --- a/src/ipam/models/update_fixed_address_response.py +++ b/src/ipam/models/update_fixed_address_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_global_response.py b/src/ipam/models/update_global_response.py index 53d344b..c1bbd30 100644 --- a/src/ipam/models/update_global_response.py +++ b/src/ipam/models/update_global_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_ha_group_response.py b/src/ipam/models/update_ha_group_response.py index e13e66b..681b9b7 100644 --- a/src/ipam/models/update_ha_group_response.py +++ b/src/ipam/models/update_ha_group_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_hardware_filter_response.py b/src/ipam/models/update_hardware_filter_response.py index 09e4693..31790da 100644 --- a/src/ipam/models/update_hardware_filter_response.py +++ b/src/ipam/models/update_hardware_filter_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_host_response.py b/src/ipam/models/update_host_response.py index 33f1e91..ab4e8be 100644 --- a/src/ipam/models/update_host_response.py +++ b/src/ipam/models/update_host_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_ip_space_response.py b/src/ipam/models/update_ip_space_response.py index 0af3083..6b3124f 100644 --- a/src/ipam/models/update_ip_space_response.py +++ b/src/ipam/models/update_ip_space_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_ipam_host_response.py b/src/ipam/models/update_ipam_host_response.py index 8cabf74..9712b54 100644 --- a/src/ipam/models/update_ipam_host_response.py +++ b/src/ipam/models/update_ipam_host_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_mac_address_item_response.py b/src/ipam/models/update_mac_address_item_response.py index 4a88207..91a9bff 100644 --- a/src/ipam/models/update_mac_address_item_response.py +++ b/src/ipam/models/update_mac_address_item_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_option_code_response.py b/src/ipam/models/update_option_code_response.py index 2d03f00..11df47a 100644 --- a/src/ipam/models/update_option_code_response.py +++ b/src/ipam/models/update_option_code_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_option_filter_response.py b/src/ipam/models/update_option_filter_response.py index 665ce5a..ecb0118 100644 --- a/src/ipam/models/update_option_filter_response.py +++ b/src/ipam/models/update_option_filter_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_option_group_response.py b/src/ipam/models/update_option_group_response.py index 0cf46d7..5f4765f 100644 --- a/src/ipam/models/update_option_group_response.py +++ b/src/ipam/models/update_option_group_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_option_space_response.py b/src/ipam/models/update_option_space_response.py index 51950c6..34f7f39 100644 --- a/src/ipam/models/update_option_space_response.py +++ b/src/ipam/models/update_option_space_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_range_response.py b/src/ipam/models/update_range_response.py index 2cbbc69..f77910f 100644 --- a/src/ipam/models/update_range_response.py +++ b/src/ipam/models/update_range_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_server_response.py b/src/ipam/models/update_server_response.py index bce4a30..a38fc93 100644 --- a/src/ipam/models/update_server_response.py +++ b/src/ipam/models/update_server_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/update_subnet_response.py b/src/ipam/models/update_subnet_response.py index a7aed0f..85c85a3 100644 --- a/src/ipam/models/update_subnet_response.py +++ b/src/ipam/models/update_subnet_response.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/utilization.py b/src/ipam/models/utilization.py index 83b8ca6..2580edd 100644 --- a/src/ipam/models/utilization.py +++ b/src/ipam/models/utilization.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/utilization_threshold.py b/src/ipam/models/utilization_threshold.py index a2266b9..8095aea 100644 --- a/src/ipam/models/utilization_threshold.py +++ b/src/ipam/models/utilization_threshold.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/models/utilization_v6.py b/src/ipam/models/utilization_v6.py index e64e7ec..b37b06f 100644 --- a/src/ipam/models/utilization_v6.py +++ b/src/ipam/models/utilization_v6.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/ipam/test/test_address_api.py b/src/ipam/test/test_address_api.py index d485245..d92f6a9 100644 --- a/src/ipam/test/test_address_api.py +++ b/src/ipam/test/test_address_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.address_api import AddressApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestAddressApi(unittest.TestCase): diff --git a/src/ipam/test/test_address_block_api.py b/src/ipam/test/test_address_block_api.py index 173eb0e..4599100 100644 --- a/src/ipam/test/test_address_block_api.py +++ b/src/ipam/test/test_address_block_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.address_block_api import AddressBlockApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestAddressBlockApi(unittest.TestCase): diff --git a/src/ipam/test/test_asm_api.py b/src/ipam/test/test_asm_api.py index 9952550..e50d7b5 100644 --- a/src/ipam/test/test_asm_api.py +++ b/src/ipam/test/test_asm_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.asm_api import AsmApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestAsmApi(unittest.TestCase): diff --git a/src/ipam/test/test_config_profile_api.py b/src/ipam/test/test_config_profile_api.py index e779ad8..f12ccd8 100644 --- a/src/ipam/test/test_config_profile_api.py +++ b/src/ipam/test/test_config_profile_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.config_profile_api import ConfigProfileApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestConfigProfileApi(unittest.TestCase): diff --git a/src/ipam/test/test_dhcp_host_api.py b/src/ipam/test/test_dhcp_host_api.py index c86dc5f..07c57c0 100644 --- a/src/ipam/test/test_dhcp_host_api.py +++ b/src/ipam/test/test_dhcp_host_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.dhcp_host_api import DhcpHostApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestDhcpHostApi(unittest.TestCase): diff --git a/src/ipam/test/test_dns_usage_api.py b/src/ipam/test/test_dns_usage_api.py index 0269b6a..2d2514a 100644 --- a/src/ipam/test/test_dns_usage_api.py +++ b/src/ipam/test/test_dns_usage_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.dns_usage_api import DnsUsageApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestDnsUsageApi(unittest.TestCase): diff --git a/src/ipam/test/test_filter_api.py b/src/ipam/test/test_filter_api.py index 1c94efe..723a2c3 100644 --- a/src/ipam/test/test_filter_api.py +++ b/src/ipam/test/test_filter_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.filter_api import FilterApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestFilterApi(unittest.TestCase): diff --git a/src/ipam/test/test_fixed_address_api.py b/src/ipam/test/test_fixed_address_api.py index 08d7eb2..d28a40b 100644 --- a/src/ipam/test/test_fixed_address_api.py +++ b/src/ipam/test/test_fixed_address_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.fixed_address_api import FixedAddressApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestFixedAddressApi(unittest.TestCase): diff --git a/src/ipam/test/test_global_api.py b/src/ipam/test/test_global_api.py index 63f181b..acfcfc3 100644 --- a/src/ipam/test/test_global_api.py +++ b/src/ipam/test/test_global_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.global_api import GlobalApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestGlobalApi(unittest.TestCase): diff --git a/src/ipam/test/test_ha_group_api.py b/src/ipam/test/test_ha_group_api.py index 39faaa5..17000d1 100644 --- a/src/ipam/test/test_ha_group_api.py +++ b/src/ipam/test/test_ha_group_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.ha_group_api import HaGroupApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestHaGroupApi(unittest.TestCase): diff --git a/src/ipam/test/test_hardware_filter_api.py b/src/ipam/test/test_hardware_filter_api.py index 1190350..9d03907 100644 --- a/src/ipam/test/test_hardware_filter_api.py +++ b/src/ipam/test/test_hardware_filter_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.hardware_filter_api import HardwareFilterApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestHardwareFilterApi(unittest.TestCase): diff --git a/src/ipam/test/test_ip_space_api.py b/src/ipam/test/test_ip_space_api.py index 9640a50..c97842f 100644 --- a/src/ipam/test/test_ip_space_api.py +++ b/src/ipam/test/test_ip_space_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.ip_space_api import IpSpaceApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestIpSpaceApi(unittest.TestCase): diff --git a/src/ipam/test/test_ipam_host_api.py b/src/ipam/test/test_ipam_host_api.py index 6720ff5..e917a60 100644 --- a/src/ipam/test/test_ipam_host_api.py +++ b/src/ipam/test/test_ipam_host_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.ipam_host_api import IpamHostApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestIpamHostApi(unittest.TestCase): diff --git a/src/ipam/test/test_leases_command_api.py b/src/ipam/test/test_leases_command_api.py index 5e80e1d..a084a68 100644 --- a/src/ipam/test/test_leases_command_api.py +++ b/src/ipam/test/test_leases_command_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.leases_command_api import LeasesCommandApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestLeasesCommandApi(unittest.TestCase): diff --git a/src/ipam/test/test_mac_address_item_api.py b/src/ipam/test/test_mac_address_item_api.py index eab1a1c..a5ea2e5 100644 --- a/src/ipam/test/test_mac_address_item_api.py +++ b/src/ipam/test/test_mac_address_item_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.mac_address_item_api import MacAddressItemApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestMacAddressItemApi(unittest.TestCase): diff --git a/src/ipam/test/test_option_code_api.py b/src/ipam/test/test_option_code_api.py index fc54381..5f9912b 100644 --- a/src/ipam/test/test_option_code_api.py +++ b/src/ipam/test/test_option_code_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.option_code_api import OptionCodeApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestOptionCodeApi(unittest.TestCase): diff --git a/src/ipam/test/test_option_filter_api.py b/src/ipam/test/test_option_filter_api.py index 6084c25..c985276 100644 --- a/src/ipam/test/test_option_filter_api.py +++ b/src/ipam/test/test_option_filter_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.option_filter_api import OptionFilterApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestOptionFilterApi(unittest.TestCase): diff --git a/src/ipam/test/test_option_group_api.py b/src/ipam/test/test_option_group_api.py index 11937f7..bf85caf 100644 --- a/src/ipam/test/test_option_group_api.py +++ b/src/ipam/test/test_option_group_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.option_group_api import OptionGroupApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestOptionGroupApi(unittest.TestCase): diff --git a/src/ipam/test/test_option_space_api.py b/src/ipam/test/test_option_space_api.py index 7657eae..98e3c02 100644 --- a/src/ipam/test/test_option_space_api.py +++ b/src/ipam/test/test_option_space_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.option_space_api import OptionSpaceApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestOptionSpaceApi(unittest.TestCase): diff --git a/src/ipam/test/test_range_api.py b/src/ipam/test/test_range_api.py index 2a86744..fbe0f88 100644 --- a/src/ipam/test/test_range_api.py +++ b/src/ipam/test/test_range_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.range_api import RangeApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestRangeApi(unittest.TestCase): diff --git a/src/ipam/test/test_server_api.py b/src/ipam/test/test_server_api.py index c00398a..5e44660 100644 --- a/src/ipam/test/test_server_api.py +++ b/src/ipam/test/test_server_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.server_api import ServerApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestServerApi(unittest.TestCase): diff --git a/src/ipam/test/test_service_api.py b/src/ipam/test/test_service_api.py index 4db42da..1d0006a 100644 --- a/src/ipam/test/test_service_api.py +++ b/src/ipam/test/test_service_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.service_api import ServiceApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestServiceApi(unittest.TestCase): diff --git a/src/ipam/test/test_subnet_api.py b/src/ipam/test/test_subnet_api.py index 091bc35..ab3feed 100644 --- a/src/ipam/test/test_subnet_api.py +++ b/src/ipam/test/test_subnet_api.py @@ -3,7 +3,7 @@ """ IP Address Management API - The IPAM/DHCP Application is a BloxOne DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The IPAM/DHCP Application is a Universal DDI service providing IP address management and DHCP protocol features. The IPAM component provides visibility into and provisioning tools to manage networking spaces, monitoring and reporting of entire IP address infrastructures, and integration with DNS and DHCP protocols. The DHCP component provides DHCP protocol configuration service with on-prem host serving DHCP protocol. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from ipam.api.subnet_api import SubnetApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestSubnetApi(unittest.TestCase): diff --git a/src/ipam_federation/README.md b/src/ipam_federation/README.md index 93f3c92..80769b2 100644 --- a/src/ipam_federation/README.md +++ b/src/ipam_federation/README.md @@ -6,7 +6,7 @@ The `ipam_federation` package is automatically generated by the [OpenAPI Generat - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,14 +36,14 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client diff --git a/src/ipam_federation/api/federated_block_api.py b/src/ipam_federation/api/federated_block_api.py index 6ad0ab7..081931e 100644 --- a/src/ipam_federation/api/federated_block_api.py +++ b/src/ipam_federation/api/federated_block_api.py @@ -26,9 +26,9 @@ from ipam_federation.models.update_federated_block_response import UpdateFederatedBlockResponse from ipam_federation import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class FederatedBlockApi: diff --git a/src/ipam_federation/api/federated_realm_api.py b/src/ipam_federation/api/federated_realm_api.py index fceab1d..2f74c3f 100644 --- a/src/ipam_federation/api/federated_realm_api.py +++ b/src/ipam_federation/api/federated_realm_api.py @@ -26,9 +26,9 @@ from ipam_federation.models.update_federated_realm_response import UpdateFederatedRealmResponse from ipam_federation import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class FederatedRealmApi: diff --git a/src/ipam_federation/api/next_available_federated_block_api.py b/src/ipam_federation/api/next_available_federated_block_api.py index 3d9a378..df9cf5d 100644 --- a/src/ipam_federation/api/next_available_federated_block_api.py +++ b/src/ipam_federation/api/next_available_federated_block_api.py @@ -26,9 +26,9 @@ from ipam_federation.models.next_available_block_request import NextAvailableBlockRequest from ipam_federation import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class NextAvailableFederatedBlockApi: diff --git a/src/ipam_federation/api/next_available_overlapping_block_api.py b/src/ipam_federation/api/next_available_overlapping_block_api.py index 92b672e..82e023e 100644 --- a/src/ipam_federation/api/next_available_overlapping_block_api.py +++ b/src/ipam_federation/api/next_available_overlapping_block_api.py @@ -22,9 +22,9 @@ from ipam_federation.models.list_next_available_overlapping_block_response import ListNextAvailableOverlappingBlockResponse from ipam_federation import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class NextAvailableOverlappingBlockApi: diff --git a/src/ipam_federation/api/next_available_reserved_block_api.py b/src/ipam_federation/api/next_available_reserved_block_api.py index 98def98..5a63e2b 100644 --- a/src/ipam_federation/api/next_available_reserved_block_api.py +++ b/src/ipam_federation/api/next_available_reserved_block_api.py @@ -22,9 +22,9 @@ from ipam_federation.models.list_next_available_reserved_block_response import ListNextAvailableReservedBlockResponse from ipam_federation import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class NextAvailableReservedBlockApi: diff --git a/src/ipam_federation/api/overlapping_block_api.py b/src/ipam_federation/api/overlapping_block_api.py index df4299d..053e1a8 100644 --- a/src/ipam_federation/api/overlapping_block_api.py +++ b/src/ipam_federation/api/overlapping_block_api.py @@ -26,9 +26,9 @@ from ipam_federation.models.update_overlapping_block_response import UpdateOverlappingBlockResponse from ipam_federation import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class OverlappingBlockApi: diff --git a/src/ipam_federation/api/reserved_block_api.py b/src/ipam_federation/api/reserved_block_api.py index ed8c653..13c94eb 100644 --- a/src/ipam_federation/api/reserved_block_api.py +++ b/src/ipam_federation/api/reserved_block_api.py @@ -26,9 +26,9 @@ from ipam_federation.models.update_reserved_block_response import UpdateReservedBlockResponse from ipam_federation import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class ReservedBlockApi: diff --git a/src/ipam_federation/docs/FederatedBlockApi.md b/src/ipam_federation/docs/FederatedBlockApi.md index 2b73cf9..d306d34 100644 --- a/src/ipam_federation/docs/FederatedBlockApi.md +++ b/src/ipam_federation/docs/FederatedBlockApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,37 +177,29 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.FederatedBlockApi(api_client) - fields = 'fields_example' # str | A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. (optional) - filter = 'filter_example' # str | A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. The following operators are commonly used in filter expressions: | Op | Description | | -- | ----------- | | == | Equal | | != | Not Equal | | > | Greater Than | | >= | Greater Than or Equal To | | < | Less Than | | <= | Less Than or Equal To | | and | Logical AND | | ~ | Matches Regex | | !~ | Does Not Match Regex | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | (optional) - offset = 56 # int | The integer index (zero-origin) of the offset into a collection of resources. If omitted or null the value is assumed to be '0'. (optional) - limit = 56 # int | The integer number of resources to be returned in the response. The service may impose maximum value. If omitted the service may impose a default value. (optional) - page_token = 'page_token_example' # str | The service-defined string used to identify a page of resources. A null value indicates the first page. (optional) - order_by = 'order_by_example' # str | A collection of response resources can be sorted by their JSON tags. For a 'flat' resource, the tag name is straightforward. If sorting is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, its value is assumed to be null.) Specify this parameter as a comma-separated list of JSON tag names. The sort direction can be specified by a suffix separated by whitespace before the tag name. The suffix 'asc' sorts the data in ascending order. The suffix 'desc' sorts the data in descending order. If no suffix is specified the data is sorted in ascending order. (optional) - torder_by = 'torder_by_example' # str | This parameter is used for sorting by tags. (optional) - tfilter = 'tfilter_example' # str | This parameter is used for filtering by tags. (optional) try: # Retrieve the federated blocks. - api_response = api_instance.list(fields=fields, filter=filter, offset=offset, limit=limit, page_token=page_token, order_by=order_by, torder_by=torder_by, tfilter=tfilter) + api_response = api_instance.list() pprint("The response of FederatedBlockApi->list:\n") pprint(api_response) except Exception as e: @@ -267,31 +259,30 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.FederatedBlockApi(api_client) id = 'id_example' # str | An application specific resource identity of a resource - fields = 'fields_example' # str | A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. (optional) try: # Retrieve the federated block. - api_response = api_instance.read(id, fields=fields) + api_response = api_instance.read(id) pprint("The response of FederatedBlockApi->read:\n") pprint(api_response) except Exception as e: @@ -345,20 +336,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam_federation/docs/FederatedRealmApi.md b/src/ipam_federation/docs/FederatedRealmApi.md index 0e5810c..b9cb163 100644 --- a/src/ipam_federation/docs/FederatedRealmApi.md +++ b/src/ipam_federation/docs/FederatedRealmApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,37 +177,29 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.FederatedRealmApi(api_client) - filter = 'filter_example' # str | A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. The following operators are commonly used in filter expressions: | Op | Description | | -- | ----------- | | == | Equal | | != | Not Equal | | > | Greater Than | | >= | Greater Than or Equal To | | < | Less Than | | <= | Less Than or Equal To | | and | Logical AND | | ~ | Matches Regex | | !~ | Does Not Match Regex | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | (optional) - order_by = 'order_by_example' # str | A collection of response resources can be sorted by their JSON tags. For a 'flat' resource, the tag name is straightforward. If sorting is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, its value is assumed to be null.) Specify this parameter as a comma-separated list of JSON tag names. The sort direction can be specified by a suffix separated by whitespace before the tag name. The suffix 'asc' sorts the data in ascending order. The suffix 'desc' sorts the data in descending order. If no suffix is specified the data is sorted in ascending order. (optional) - fields = 'fields_example' # str | A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. (optional) - offset = 56 # int | The integer index (zero-origin) of the offset into a collection of resources. If omitted or null the value is assumed to be '0'. (optional) - limit = 56 # int | The integer number of resources to be returned in the response. The service may impose maximum value. If omitted the service may impose a default value. (optional) - page_token = 'page_token_example' # str | The service-defined string used to identify a page of resources. A null value indicates the first page. (optional) - torder_by = 'torder_by_example' # str | This parameter is used for sorting by tags. (optional) - tfilter = 'tfilter_example' # str | This parameter is used for filtering by tags. (optional) try: # Retrieve federated realms. - api_response = api_instance.list(filter=filter, order_by=order_by, fields=fields, offset=offset, limit=limit, page_token=page_token, torder_by=torder_by, tfilter=tfilter) + api_response = api_instance.list() pprint("The response of FederatedRealmApi->list:\n") pprint(api_response) except Exception as e: @@ -267,31 +259,30 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.FederatedRealmApi(api_client) id = 'id_example' # str | An application specific resource identity of a resource - fields = 'fields_example' # str | A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. (optional) try: # Retrieve the federated realm. - api_response = api_instance.read(id, fields=fields) + api_response = api_instance.read(id) pprint("The response of FederatedRealmApi->read:\n") pprint(api_response) except Exception as e: @@ -345,20 +336,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam_federation/docs/NextAvailableFederatedBlockApi.md b/src/ipam_federation/docs/NextAvailableFederatedBlockApi.md index 8695e44..dff872a 100644 --- a/src/ipam_federation/docs/NextAvailableFederatedBlockApi.md +++ b/src/ipam_federation/docs/NextAvailableFederatedBlockApi.md @@ -26,20 +26,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -104,20 +104,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -182,20 +182,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -260,34 +260,30 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.NextAvailableFederatedBlockApi(api_client) id = 'id_example' # str | An application specific resource identity of a resource - cidr = 56 # int | The CIDR of the federated block. This is required, if _address_ does not specify it in its input. (optional) - count = 56 # int | The count of __Block__ required. If not provided, it will default to 1. (optional) - name = 'name_example' # str | The name to be provided. (optional) - comment = 'comment_example' # str | The description for the _federation/federated_block_. May contain 0 to 1024 characters. Can include UTF-8. (optional) try: # List the next available federated block. - api_response = api_instance.list_next_available_federated_blocks(id, cidr=cidr, count=count, name=name, comment=comment) + api_response = api_instance.list_next_available_federated_blocks(id) pprint("The response of NextAvailableFederatedBlockApi->list_next_available_federated_blocks:\n") pprint(api_response) except Exception as e: diff --git a/src/ipam_federation/docs/NextAvailableOverlappingBlockApi.md b/src/ipam_federation/docs/NextAvailableOverlappingBlockApi.md index 329e56a..0967caa 100644 --- a/src/ipam_federation/docs/NextAvailableOverlappingBlockApi.md +++ b/src/ipam_federation/docs/NextAvailableOverlappingBlockApi.md @@ -23,34 +23,30 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.NextAvailableOverlappingBlockApi(api_client) id = 'id_example' # str | An application specific resource identity of a resource - cidr = 56 # int | The CIDR of the federated block. This is required, if _address_ does not specify it in its input. (optional) - count = 56 # int | The count of __Block__ required. If not provided, it will default to 1. (optional) - name = 'name_example' # str | The name to be provided. (optional) - comment = 'comment_example' # str | The description for the _federation/federated_block_. May contain 0 to 1024 characters. Can include UTF-8. (optional) try: # List the next available overlapping block. - api_response = api_instance.list_next_available_overlapping_blocks(id, cidr=cidr, count=count, name=name, comment=comment) + api_response = api_instance.list_next_available_overlapping_blocks(id) pprint("The response of NextAvailableOverlappingBlockApi->list_next_available_overlapping_blocks:\n") pprint(api_response) except Exception as e: diff --git a/src/ipam_federation/docs/NextAvailableReservedBlockApi.md b/src/ipam_federation/docs/NextAvailableReservedBlockApi.md index b68866a..21da65d 100644 --- a/src/ipam_federation/docs/NextAvailableReservedBlockApi.md +++ b/src/ipam_federation/docs/NextAvailableReservedBlockApi.md @@ -23,34 +23,30 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.NextAvailableReservedBlockApi(api_client) id = 'id_example' # str | An application specific resource identity of a resource - cidr = 56 # int | The CIDR of the federated block. This is required, if _address_ does not specify it in its input. (optional) - count = 56 # int | The count of __Block__ required. If not provided, it will default to 1. (optional) - name = 'name_example' # str | The name to be provided. (optional) - comment = 'comment_example' # str | The description for the _federation/federated_block_. May contain 0 to 1024 characters. Can include UTF-8. (optional) try: # List the next available reserved block. - api_response = api_instance.list_next_available_reserved_blocks(id, cidr=cidr, count=count, name=name, comment=comment) + api_response = api_instance.list_next_available_reserved_blocks(id) pprint("The response of NextAvailableReservedBlockApi->list_next_available_reserved_blocks:\n") pprint(api_response) except Exception as e: diff --git a/src/ipam_federation/docs/OverlappingBlockApi.md b/src/ipam_federation/docs/OverlappingBlockApi.md index 7b4cf42..4850744 100644 --- a/src/ipam_federation/docs/OverlappingBlockApi.md +++ b/src/ipam_federation/docs/OverlappingBlockApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,37 +177,29 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.OverlappingBlockApi(api_client) - fields = 'fields_example' # str | A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. (optional) - filter = 'filter_example' # str | A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. The following operators are commonly used in filter expressions: | Op | Description | | -- | ----------- | | == | Equal | | != | Not Equal | | > | Greater Than | | >= | Greater Than or Equal To | | < | Less Than | | <= | Less Than or Equal To | | and | Logical AND | | ~ | Matches Regex | | !~ | Does Not Match Regex | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | (optional) - offset = 56 # int | The integer index (zero-origin) of the offset into a collection of resources. If omitted or null the value is assumed to be '0'. (optional) - limit = 56 # int | The integer number of resources to be returned in the response. The service may impose maximum value. If omitted the service may impose a default value. (optional) - page_token = 'page_token_example' # str | The service-defined string used to identify a page of resources. A null value indicates the first page. (optional) - order_by = 'order_by_example' # str | A collection of response resources can be sorted by their JSON tags. For a 'flat' resource, the tag name is straightforward. If sorting is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, its value is assumed to be null.) Specify this parameter as a comma-separated list of JSON tag names. The sort direction can be specified by a suffix separated by whitespace before the tag name. The suffix 'asc' sorts the data in ascending order. The suffix 'desc' sorts the data in descending order. If no suffix is specified the data is sorted in ascending order. (optional) - torder_by = 'torder_by_example' # str | This parameter is used for sorting by tags. (optional) - tfilter = 'tfilter_example' # str | This parameter is used for filtering by tags. (optional) try: # Retrieve the overlapping block. - api_response = api_instance.list(fields=fields, filter=filter, offset=offset, limit=limit, page_token=page_token, order_by=order_by, torder_by=torder_by, tfilter=tfilter) + api_response = api_instance.list() pprint("The response of OverlappingBlockApi->list:\n") pprint(api_response) except Exception as e: @@ -267,31 +259,30 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.OverlappingBlockApi(api_client) id = 'id_example' # str | An application specific resource identity of a resource - fields = 'fields_example' # str | A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. (optional) try: # Retrieve the overlapping block. - api_response = api_instance.read(id, fields=fields) + api_response = api_instance.read(id) pprint("The response of OverlappingBlockApi->read:\n") pprint(api_response) except Exception as e: @@ -345,20 +336,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam_federation/docs/ReservedBlockApi.md b/src/ipam_federation/docs/ReservedBlockApi.md index 47f8aa0..cd04a05 100644 --- a/src/ipam_federation/docs/ReservedBlockApi.md +++ b/src/ipam_federation/docs/ReservedBlockApi.md @@ -27,20 +27,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,37 +177,29 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.ReservedBlockApi(api_client) - fields = 'fields_example' # str | A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. (optional) - filter = 'filter_example' # str | A collection of response resources can be filtered by a logical expression string that includes JSON tag references to values in each resource, literal values, and logical operators. If a resource does not have the specified tag, its value is assumed to be null. Literal values include numbers (integer and floating-point), and quoted (both single- or double-quoted) literal strings, and 'null'. The following operators are commonly used in filter expressions: | Op | Description | | -- | ----------- | | == | Equal | | != | Not Equal | | > | Greater Than | | >= | Greater Than or Equal To | | < | Less Than | | <= | Less Than or Equal To | | and | Logical AND | | ~ | Matches Regex | | !~ | Does Not Match Regex | | or | Logical OR | | not | Logical NOT | | () | Groupping Operators | (optional) - offset = 56 # int | The integer index (zero-origin) of the offset into a collection of resources. If omitted or null the value is assumed to be '0'. (optional) - limit = 56 # int | The integer number of resources to be returned in the response. The service may impose maximum value. If omitted the service may impose a default value. (optional) - page_token = 'page_token_example' # str | The service-defined string used to identify a page of resources. A null value indicates the first page. (optional) - order_by = 'order_by_example' # str | A collection of response resources can be sorted by their JSON tags. For a 'flat' resource, the tag name is straightforward. If sorting is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, its value is assumed to be null.) Specify this parameter as a comma-separated list of JSON tag names. The sort direction can be specified by a suffix separated by whitespace before the tag name. The suffix 'asc' sorts the data in ascending order. The suffix 'desc' sorts the data in descending order. If no suffix is specified the data is sorted in ascending order. (optional) - torder_by = 'torder_by_example' # str | This parameter is used for sorting by tags. (optional) - tfilter = 'tfilter_example' # str | This parameter is used for filtering by tags. (optional) try: # Retrieve the reserved block. - api_response = api_instance.list(fields=fields, filter=filter, offset=offset, limit=limit, page_token=page_token, order_by=order_by, torder_by=torder_by, tfilter=tfilter) + api_response = api_instance.list() pprint("The response of ReservedBlockApi->list:\n") pprint(api_response) except Exception as e: @@ -267,31 +259,30 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: # Create an instance of the API class api_instance = ipam_federation.ReservedBlockApi(api_client) id = 'id_example' # str | An application specific resource identity of a resource - fields = 'fields_example' # str | A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. (optional) try: # Retrieve the reserved block. - api_response = api_instance.read(id, fields=fields) + api_response = api_instance.read(id) pprint("The response of ReservedBlockApi->read:\n") pprint(api_response) except Exception as e: @@ -345,20 +336,20 @@ from pprint import pprint import ipam_federation -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/ipam_federation/test/test_federated_block_api.py b/src/ipam_federation/test/test_federated_block_api.py index 3b8b67f..d02930a 100644 --- a/src/ipam_federation/test/test_federated_block_api.py +++ b/src/ipam_federation/test/test_federated_block_api.py @@ -15,7 +15,7 @@ from ipam_federation.api.federated_block_api import FederatedBlockApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestFederatedBlockApi(unittest.TestCase): diff --git a/src/ipam_federation/test/test_federated_realm_api.py b/src/ipam_federation/test/test_federated_realm_api.py index 3b1b75a..6114d8d 100644 --- a/src/ipam_federation/test/test_federated_realm_api.py +++ b/src/ipam_federation/test/test_federated_realm_api.py @@ -15,7 +15,7 @@ from ipam_federation.api.federated_realm_api import FederatedRealmApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestFederatedRealmApi(unittest.TestCase): diff --git a/src/ipam_federation/test/test_next_available_federated_block_api.py b/src/ipam_federation/test/test_next_available_federated_block_api.py index 456e06e..8f70502 100644 --- a/src/ipam_federation/test/test_next_available_federated_block_api.py +++ b/src/ipam_federation/test/test_next_available_federated_block_api.py @@ -15,7 +15,7 @@ from ipam_federation.api.next_available_federated_block_api import NextAvailableFederatedBlockApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestNextAvailableFederatedBlockApi(unittest.TestCase): diff --git a/src/ipam_federation/test/test_next_available_overlapping_block_api.py b/src/ipam_federation/test/test_next_available_overlapping_block_api.py index fd36c03..1514cb7 100644 --- a/src/ipam_federation/test/test_next_available_overlapping_block_api.py +++ b/src/ipam_federation/test/test_next_available_overlapping_block_api.py @@ -15,7 +15,7 @@ from ipam_federation.api.next_available_overlapping_block_api import NextAvailableOverlappingBlockApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestNextAvailableOverlappingBlockApi(unittest.TestCase): diff --git a/src/ipam_federation/test/test_next_available_reserved_block_api.py b/src/ipam_federation/test/test_next_available_reserved_block_api.py index c9986c4..7dc6414 100644 --- a/src/ipam_federation/test/test_next_available_reserved_block_api.py +++ b/src/ipam_federation/test/test_next_available_reserved_block_api.py @@ -15,7 +15,7 @@ from ipam_federation.api.next_available_reserved_block_api import NextAvailableReservedBlockApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestNextAvailableReservedBlockApi(unittest.TestCase): diff --git a/src/ipam_federation/test/test_overlapping_block_api.py b/src/ipam_federation/test/test_overlapping_block_api.py index 6610ac5..4d5535f 100644 --- a/src/ipam_federation/test/test_overlapping_block_api.py +++ b/src/ipam_federation/test/test_overlapping_block_api.py @@ -15,7 +15,7 @@ from ipam_federation.api.overlapping_block_api import OverlappingBlockApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestOverlappingBlockApi(unittest.TestCase): diff --git a/src/ipam_federation/test/test_reserved_block_api.py b/src/ipam_federation/test/test_reserved_block_api.py index bc33caa..7688335 100644 --- a/src/ipam_federation/test/test_reserved_block_api.py +++ b/src/ipam_federation/test/test_reserved_block_api.py @@ -15,7 +15,7 @@ from ipam_federation.api.reserved_block_api import ReservedBlockApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestReservedBlockApi(unittest.TestCase): diff --git a/src/keys/README.md b/src/keys/README.md index 7f96d66..1aad09b 100644 --- a/src/keys/README.md +++ b/src/keys/README.md @@ -1,12 +1,12 @@ # keys -The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. +The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The `keys` package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,14 +36,14 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client diff --git a/src/keys/__init__.py b/src/keys/__init__.py index 326eaed..79f48af 100644 --- a/src/keys/__init__.py +++ b/src/keys/__init__.py @@ -5,7 +5,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/api/generate_tsig_api.py b/src/keys/api/generate_tsig_api.py index f8877fa..9c31339 100644 --- a/src/keys/api/generate_tsig_api.py +++ b/src/keys/api/generate_tsig_api.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -22,9 +22,9 @@ from keys.models.generate_tsig_response import GenerateTSIGResponse from keys import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class GenerateTsigApi: diff --git a/src/keys/api/kerberos_api.py b/src/keys/api/kerberos_api.py index f689d19..dbe87c9 100644 --- a/src/keys/api/kerberos_api.py +++ b/src/keys/api/kerberos_api.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ from keys.models.update_kerberos_key_response import UpdateKerberosKeyResponse from keys import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class KerberosApi: diff --git a/src/keys/api/tsig_api.py b/src/keys/api/tsig_api.py index f45e3fc..00c4d7e 100644 --- a/src/keys/api/tsig_api.py +++ b/src/keys/api/tsig_api.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ from keys.models.update_tsig_key_response import UpdateTSIGKeyResponse from keys import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class TsigApi: diff --git a/src/keys/api/upload_api.py b/src/keys/api/upload_api.py index ed27036..1b6b5c9 100644 --- a/src/keys/api/upload_api.py +++ b/src/keys/api/upload_api.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,9 +20,9 @@ from keys.models.upload_request import UploadRequest from keys import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class UploadApi: diff --git a/src/keys/docs/GenerateTsigApi.md b/src/keys/docs/GenerateTsigApi.md index c486e70..c7e462a 100644 --- a/src/keys/docs/GenerateTsigApi.md +++ b/src/keys/docs/GenerateTsigApi.md @@ -23,20 +23,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/keys/docs/KerberosApi.md b/src/keys/docs/KerberosApi.md index bffa149..851bcc8 100644 --- a/src/keys/docs/KerberosApi.md +++ b/src/keys/docs/KerberosApi.md @@ -26,20 +26,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -100,20 +100,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -182,20 +182,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/keys/docs/TsigApi.md b/src/keys/docs/TsigApi.md index eca7577..c3f13e1 100644 --- a/src/keys/docs/TsigApi.md +++ b/src/keys/docs/TsigApi.md @@ -27,20 +27,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -103,20 +103,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -177,20 +177,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -259,20 +259,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -336,20 +336,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/keys/docs/UploadApi.md b/src/keys/docs/UploadApi.md index 4d00638..84d83ce 100644 --- a/src/keys/docs/UploadApi.md +++ b/src/keys/docs/UploadApi.md @@ -23,20 +23,20 @@ from pprint import pprint import keys -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/keys/models/__init__.py b/src/keys/models/__init__.py index 2ad72e8..0e467be 100644 --- a/src/keys/models/__init__.py +++ b/src/keys/models/__init__.py @@ -4,7 +4,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/create_tsig_key_response.py b/src/keys/models/create_tsig_key_response.py index 43f61a3..953a102 100644 --- a/src/keys/models/create_tsig_key_response.py +++ b/src/keys/models/create_tsig_key_response.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/ddiupload_response.py b/src/keys/models/ddiupload_response.py index a8148b7..82a0f51 100644 --- a/src/keys/models/ddiupload_response.py +++ b/src/keys/models/ddiupload_response.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/generate_tsig_response.py b/src/keys/models/generate_tsig_response.py index 5297ca3..4ffdcba 100644 --- a/src/keys/models/generate_tsig_response.py +++ b/src/keys/models/generate_tsig_response.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/generate_tsig_result.py b/src/keys/models/generate_tsig_result.py index c0b2c08..0571e61 100644 --- a/src/keys/models/generate_tsig_result.py +++ b/src/keys/models/generate_tsig_result.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/kerberos_key.py b/src/keys/models/kerberos_key.py index 521c5e7..379a364 100644 --- a/src/keys/models/kerberos_key.py +++ b/src/keys/models/kerberos_key.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/kerberos_keys.py b/src/keys/models/kerberos_keys.py index 0faa380..df30998 100644 --- a/src/keys/models/kerberos_keys.py +++ b/src/keys/models/kerberos_keys.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/list_kerberos_key_response.py b/src/keys/models/list_kerberos_key_response.py index fec9f9b..0f9b3fb 100644 --- a/src/keys/models/list_kerberos_key_response.py +++ b/src/keys/models/list_kerberos_key_response.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/list_tsig_key_response.py b/src/keys/models/list_tsig_key_response.py index 1793bca..6432c71 100644 --- a/src/keys/models/list_tsig_key_response.py +++ b/src/keys/models/list_tsig_key_response.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/protobuf_field_mask.py b/src/keys/models/protobuf_field_mask.py index 3347fbd..18fc8b6 100644 --- a/src/keys/models/protobuf_field_mask.py +++ b/src/keys/models/protobuf_field_mask.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/read_kerberos_key_response.py b/src/keys/models/read_kerberos_key_response.py index 142f9b1..88919a4 100644 --- a/src/keys/models/read_kerberos_key_response.py +++ b/src/keys/models/read_kerberos_key_response.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/read_tsig_key_response.py b/src/keys/models/read_tsig_key_response.py index 54a26c8..09c2e34 100644 --- a/src/keys/models/read_tsig_key_response.py +++ b/src/keys/models/read_tsig_key_response.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/tsig_key.py b/src/keys/models/tsig_key.py index 5160932..1b57b15 100644 --- a/src/keys/models/tsig_key.py +++ b/src/keys/models/tsig_key.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/update_kerberos_key_response.py b/src/keys/models/update_kerberos_key_response.py index 67ecac6..85266ad 100644 --- a/src/keys/models/update_kerberos_key_response.py +++ b/src/keys/models/update_kerberos_key_response.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/update_tsig_key_response.py b/src/keys/models/update_tsig_key_response.py index e080f87..1a9628b 100644 --- a/src/keys/models/update_tsig_key_response.py +++ b/src/keys/models/update_tsig_key_response.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/upload_content_type.py b/src/keys/models/upload_content_type.py index d536a68..2ca6b34 100644 --- a/src/keys/models/upload_content_type.py +++ b/src/keys/models/upload_content_type.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/models/upload_request.py b/src/keys/models/upload_request.py index cbf911b..c5946b5 100644 --- a/src/keys/models/upload_request.py +++ b/src/keys/models/upload_request.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/keys/test/test_generate_tsig_api.py b/src/keys/test/test_generate_tsig_api.py index cbd5663..bd07883 100644 --- a/src/keys/test/test_generate_tsig_api.py +++ b/src/keys/test/test_generate_tsig_api.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from keys.api.generate_tsig_api import GenerateTsigApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestGenerateTsigApi(unittest.TestCase): diff --git a/src/keys/test/test_kerberos_api.py b/src/keys/test/test_kerberos_api.py index 1de0ac9..991c561 100644 --- a/src/keys/test/test_kerberos_api.py +++ b/src/keys/test/test_kerberos_api.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from keys.api.kerberos_api import KerberosApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestKerberosApi(unittest.TestCase): diff --git a/src/keys/test/test_tsig_api.py b/src/keys/test/test_tsig_api.py index 20f4aa8..9f90638 100644 --- a/src/keys/test/test_tsig_api.py +++ b/src/keys/test/test_tsig_api.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from keys.api.tsig_api import TsigApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestTsigApi(unittest.TestCase): diff --git a/src/keys/test/test_upload_api.py b/src/keys/test/test_upload_api.py index a69a48f..e002d6b 100644 --- a/src/keys/test/test_upload_api.py +++ b/src/keys/test/test_upload_api.py @@ -3,7 +3,7 @@ """ DDI Keys API - The DDI Keys application is a BloxOne DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other BloxOne DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. + The DDI Keys application is a Universal DDI service for managing TSIG keys and GSS-TSIG (Kerberos) keys which are used by other Universal DDI applications. It is part of the full-featured, DDI cloud solution that enables customers to deploy large numbers of protocol servers to deliver DNS and DHCP throughout their enterprise network. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from keys.api.upload_api import UploadApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestUploadApi(unittest.TestCase): diff --git a/src/redirect/README.md b/src/redirect/README.md index e890f65..eef1154 100644 --- a/src/redirect/README.md +++ b/src/redirect/README.md @@ -1,12 +1,12 @@ # redirect -You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. +You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The `redirect` package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: v1 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,7 +36,7 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/redirect/__init__.py b/src/redirect/__init__.py index 58e3ccb..7b0908f 100644 --- a/src/redirect/__init__.py +++ b/src/redirect/__init__.py @@ -3,9 +3,9 @@ # flake8: noqa """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/api/certificate_api.py b/src/redirect/api/certificate_api.py index 5c442eb..8f77a75 100644 --- a/src/redirect/api/certificate_api.py +++ b/src/redirect/api/certificate_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -22,9 +22,9 @@ from redirect.models.proxy_cert_response import ProxyCertResponse from redirect import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class CertificateApi: diff --git a/src/redirect/api/custom_redirects_api.py b/src/redirect/api/custom_redirects_api.py index 59d9429..249eb1d 100644 --- a/src/redirect/api/custom_redirects_api.py +++ b/src/redirect/api/custom_redirects_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,9 +27,9 @@ from redirect.models.custom_redirect_update_response import CustomRedirectUpdateResponse from redirect import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class CustomRedirectsApi: @@ -62,7 +62,7 @@ def create_custom_redirect( ) -> CustomRedirectCreateResponse: """Create Custom Redirect. - Use this method to create a Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data + Use this method to create a Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data :param body: The Custom Redirect object. (required) :type body: CustomRedirect @@ -128,7 +128,7 @@ def create_custom_redirect_with_http_info( ) -> ApiResponse[CustomRedirectCreateResponse]: """Create Custom Redirect. - Use this method to create a Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data + Use this method to create a Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data :param body: The Custom Redirect object. (required) :type body: CustomRedirect @@ -194,7 +194,7 @@ def create_custom_redirect_without_preload_content( ) -> RESTResponseType: """Create Custom Redirect. - Use this method to create a Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data + Use this method to create a Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data :param body: The Custom Redirect object. (required) :type body: CustomRedirect @@ -314,7 +314,7 @@ def delete_custom_redirect( ) -> None: """Delete Custom Redirect. - Use this method to delete Custom Redirect objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - ids + Use this method to delete Custom Redirect objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - ids :param body: (required) :type body: CustomRedirectDeleteRequest @@ -378,7 +378,7 @@ def delete_custom_redirect_with_http_info( ) -> ApiResponse[None]: """Delete Custom Redirect. - Use this method to delete Custom Redirect objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - ids + Use this method to delete Custom Redirect objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - ids :param body: (required) :type body: CustomRedirectDeleteRequest @@ -442,7 +442,7 @@ def delete_custom_redirect_without_preload_content( ) -> RESTResponseType: """Delete Custom Redirect. - Use this method to delete Custom Redirect objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - ids + Use this method to delete Custom Redirect objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - ids :param body: (required) :type body: CustomRedirectDeleteRequest @@ -563,7 +563,7 @@ def delete_single_custom_redirect( ) -> None: """Delete Custom Redirect By Id. - Use this method to delete Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. + Use this method to delete Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. :param id: The Custom Redirect object identifier. (required) :type id: int @@ -629,7 +629,7 @@ def delete_single_custom_redirect_with_http_info( ) -> ApiResponse[None]: """Delete Custom Redirect By Id. - Use this method to delete Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. + Use this method to delete Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. :param id: The Custom Redirect object identifier. (required) :type id: int @@ -695,7 +695,7 @@ def delete_single_custom_redirect_without_preload_content( ) -> RESTResponseType: """Delete Custom Redirect By Id. - Use this method to delete Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. + Use this method to delete Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. :param id: The Custom Redirect object identifier. (required) :type id: int @@ -815,7 +815,7 @@ def list_custom_redirect( ) -> CustomRedirectMultiResponse: """List Custom Redirects. - Use this method to retrieve information on all Custom Redirect objects for the account. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. + Use this method to retrieve information on all Custom Redirect objects for the account. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. :param fields: A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. :type fields: str @@ -892,7 +892,7 @@ def list_custom_redirect_with_http_info( ) -> ApiResponse[CustomRedirectMultiResponse]: """List Custom Redirects. - Use this method to retrieve information on all Custom Redirect objects for the account. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. + Use this method to retrieve information on all Custom Redirect objects for the account. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. :param fields: A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. :type fields: str @@ -969,7 +969,7 @@ def list_custom_redirect_without_preload_content( ) -> RESTResponseType: """List Custom Redirects. - Use this method to retrieve information on all Custom Redirect objects for the account. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. + Use this method to retrieve information on all Custom Redirect objects for the account. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. :param fields: A collection of response resources can be transformed by specifying a set of JSON tags to be returned. For a “flat” resource, the tag name is straightforward. If field selection is allowed on non-flat hierarchical resources, the service should implement a qualified naming scheme such as dot-qualification to reference data down the hierarchy. If a resource does not have the specified tag, the tag does not appear in the output resource. Specify this parameter as a comma-separated list of JSON tag names. :type fields: str @@ -1100,7 +1100,7 @@ def read_custom_redirect( ) -> CustomRedirectReadResponse: """Read Custom Redirect. - Use this method to retrieve information on the specified Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. + Use this method to retrieve information on the specified Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. :param id: The Custom Redirect object identifier. (required) :type id: int @@ -1183,7 +1183,7 @@ def read_custom_redirect_with_http_info( ) -> ApiResponse[CustomRedirectReadResponse]: """Read Custom Redirect. - Use this method to retrieve information on the specified Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. + Use this method to retrieve information on the specified Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. :param id: The Custom Redirect object identifier. (required) :type id: int @@ -1266,7 +1266,7 @@ def read_custom_redirect_without_preload_content( ) -> RESTResponseType: """Read Custom Redirect. - Use this method to retrieve information on the specified Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. + Use this method to retrieve information on the specified Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. :param id: The Custom Redirect object identifier. (required) :type id: int @@ -1395,7 +1395,7 @@ def update_custom_redirect( ) -> CustomRedirectUpdateResponse: """Update Custom Redirect. - Use this method to update a specified Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data + Use this method to update a specified Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data :param id: The Custom Redirect object identifier. (required) :type id: int @@ -1468,7 +1468,7 @@ def update_custom_redirect_with_http_info( ) -> ApiResponse[CustomRedirectUpdateResponse]: """Update Custom Redirect. - Use this method to update a specified Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data + Use this method to update a specified Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data :param id: The Custom Redirect object identifier. (required) :type id: int @@ -1541,7 +1541,7 @@ def update_custom_redirect_without_preload_content( ) -> RESTResponseType: """Update Custom Redirect. - Use this method to update a specified Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data + Use this method to update a specified Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data :param id: The Custom Redirect object identifier. (required) :type id: int diff --git a/src/redirect/api/redirect_page_api.py b/src/redirect/api/redirect_page_api.py index aa6386d..f5386ee 100644 --- a/src/redirect/api/redirect_page_api.py +++ b/src/redirect/api/redirect_page_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -24,9 +24,9 @@ from redirect.models.update_redirect_page_payload import UpdateRedirectPagePayload from redirect import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class RedirectPageApi: diff --git a/src/redirect/docs/CertificateApi.md b/src/redirect/docs/CertificateApi.md index 77b2e17..2ef431c 100644 --- a/src/redirect/docs/CertificateApi.md +++ b/src/redirect/docs/CertificateApi.md @@ -22,13 +22,13 @@ from pprint import pprint import redirect -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/redirect/docs/CustomRedirect.md b/src/redirect/docs/CustomRedirect.md index c3cd1bd..da2a95d 100644 --- a/src/redirect/docs/CustomRedirect.md +++ b/src/redirect/docs/CustomRedirect.md @@ -1,6 +1,6 @@ # CustomRedirect -The Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. +The Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. ## Properties diff --git a/src/redirect/docs/CustomRedirectsApi.md b/src/redirect/docs/CustomRedirectsApi.md index 35e4afb..b7467d3 100644 --- a/src/redirect/docs/CustomRedirectsApi.md +++ b/src/redirect/docs/CustomRedirectsApi.md @@ -17,7 +17,7 @@ Method | HTTP request | Description Create Custom Redirect. -Use this method to create a Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data +Use this method to create a Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data ### Example @@ -27,13 +27,13 @@ from pprint import pprint import redirect -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -90,7 +90,7 @@ No authorization required Delete Custom Redirect. -Use this method to delete Custom Redirect objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - ids +Use this method to delete Custom Redirect objects. Deletion of multiple lists is an all-or-nothing operation (if any of the specified lists can not be deleted then none of the specified lists will be deleted). You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - ids ### Example @@ -100,13 +100,13 @@ from pprint import pprint import redirect -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -160,7 +160,7 @@ No authorization required Delete Custom Redirect By Id. -Use this method to delete Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. +Use this method to delete Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. ### Example @@ -170,13 +170,13 @@ from pprint import pprint import redirect -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -230,7 +230,7 @@ No authorization required List Custom Redirects. -Use this method to retrieve information on all Custom Redirect objects for the account. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. +Use this method to retrieve information on all Custom Redirect objects for the account. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. ### Example @@ -240,13 +240,13 @@ from pprint import pprint import redirect -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -301,7 +301,7 @@ No authorization required Read Custom Redirect. -Use this method to retrieve information on the specified Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. +Use this method to retrieve information on the specified Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. ### Example @@ -311,13 +311,13 @@ from pprint import pprint import redirect -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -375,7 +375,7 @@ No authorization required Update Custom Redirect. -Use this method to update a specified Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data +Use this method to update a specified Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. Required: - name - data ### Example @@ -385,13 +385,13 @@ from pprint import pprint import redirect -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/redirect/docs/RedirectPageApi.md b/src/redirect/docs/RedirectPageApi.md index 5d98196..312b169 100644 --- a/src/redirect/docs/RedirectPageApi.md +++ b/src/redirect/docs/RedirectPageApi.md @@ -23,13 +23,13 @@ from pprint import pprint import redirect -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) @@ -94,13 +94,13 @@ from pprint import pprint import redirect -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) diff --git a/src/redirect/models/__init__.py b/src/redirect/models/__init__.py index 6a6de29..c342034 100644 --- a/src/redirect/models/__init__.py +++ b/src/redirect/models/__init__.py @@ -2,9 +2,9 @@ # flake8: noqa """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/certificate_get_proxy_certificates500_response.py b/src/redirect/models/certificate_get_proxy_certificates500_response.py index 7c88018..c498a52 100644 --- a/src/redirect/models/certificate_get_proxy_certificates500_response.py +++ b/src/redirect/models/certificate_get_proxy_certificates500_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/certificate_get_proxy_certificates500_response_error.py b/src/redirect/models/certificate_get_proxy_certificates500_response_error.py index d7135ae..529b430 100644 --- a/src/redirect/models/certificate_get_proxy_certificates500_response_error.py +++ b/src/redirect/models/certificate_get_proxy_certificates500_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirect.py b/src/redirect/models/custom_redirect.py index 0d8c886..ef18630 100644 --- a/src/redirect/models/custom_redirect.py +++ b/src/redirect/models/custom_redirect.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class CustomRedirect(BaseModel): """ - The Custom Redirect object. You can configure BloxOne Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. BloxOne Cloud allows you to apply multiple redirect actions and integrate BloxOne Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. + The Custom Redirect object. You can configure Infoblox Cloud to redirect traffic to the Infoblox redirect page or a custom redirect destination. Infoblox Cloud allows you to apply multiple redirect actions and integrate Infoblox Cloud with third-party proxies, secure web gateways, blackholes, honeypots and sinkhole solutions. """ # noqa: E501 created_time: Optional[datetime] = Field( default=None, diff --git a/src/redirect/models/custom_redirect_create_response.py b/src/redirect/models/custom_redirect_create_response.py index 72bc60a..69a4ce8 100644 --- a/src/redirect/models/custom_redirect_create_response.py +++ b/src/redirect/models/custom_redirect_create_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirect_delete_request.py b/src/redirect/models/custom_redirect_delete_request.py index dd7d149..6b4e395 100644 --- a/src/redirect/models/custom_redirect_delete_request.py +++ b/src/redirect/models/custom_redirect_delete_request.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirect_multi_response.py b/src/redirect/models/custom_redirect_multi_response.py index e8d94e3..6e80e27 100644 --- a/src/redirect/models/custom_redirect_multi_response.py +++ b/src/redirect/models/custom_redirect_multi_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirect_read_response.py b/src/redirect/models/custom_redirect_read_response.py index 93c6edd..d47c000 100644 --- a/src/redirect/models/custom_redirect_read_response.py +++ b/src/redirect/models/custom_redirect_read_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirect_update_response.py b/src/redirect/models/custom_redirect_update_response.py index 0811d83..47957a1 100644 --- a/src/redirect/models/custom_redirect_update_response.py +++ b/src/redirect/models/custom_redirect_update_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_create_custom_redirect400_response.py b/src/redirect/models/custom_redirects_create_custom_redirect400_response.py index 37f1d7e..1eb9601 100644 --- a/src/redirect/models/custom_redirects_create_custom_redirect400_response.py +++ b/src/redirect/models/custom_redirects_create_custom_redirect400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_create_custom_redirect400_response_error.py b/src/redirect/models/custom_redirects_create_custom_redirect400_response_error.py index c5cf4ef..37dec95 100644 --- a/src/redirect/models/custom_redirects_create_custom_redirect400_response_error.py +++ b/src/redirect/models/custom_redirects_create_custom_redirect400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_create_custom_redirect409_response.py b/src/redirect/models/custom_redirects_create_custom_redirect409_response.py index 1a7974a..c418320 100644 --- a/src/redirect/models/custom_redirects_create_custom_redirect409_response.py +++ b/src/redirect/models/custom_redirects_create_custom_redirect409_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_create_custom_redirect409_response_error.py b/src/redirect/models/custom_redirects_create_custom_redirect409_response_error.py index 161dcd7..8cb47db 100644 --- a/src/redirect/models/custom_redirects_create_custom_redirect409_response_error.py +++ b/src/redirect/models/custom_redirects_create_custom_redirect409_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_delete_custom_redirect400_response.py b/src/redirect/models/custom_redirects_delete_custom_redirect400_response.py index a28410f..758c314 100644 --- a/src/redirect/models/custom_redirects_delete_custom_redirect400_response.py +++ b/src/redirect/models/custom_redirects_delete_custom_redirect400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_delete_custom_redirect400_response_error.py b/src/redirect/models/custom_redirects_delete_custom_redirect400_response_error.py index b52e321..ed89da3 100644 --- a/src/redirect/models/custom_redirects_delete_custom_redirect400_response_error.py +++ b/src/redirect/models/custom_redirects_delete_custom_redirect400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_delete_single_custom_redirect400_response.py b/src/redirect/models/custom_redirects_delete_single_custom_redirect400_response.py index 44a6386..a65a566 100644 --- a/src/redirect/models/custom_redirects_delete_single_custom_redirect400_response.py +++ b/src/redirect/models/custom_redirects_delete_single_custom_redirect400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_delete_single_custom_redirect400_response_error.py b/src/redirect/models/custom_redirects_delete_single_custom_redirect400_response_error.py index eec9e11..fde43e5 100644 --- a/src/redirect/models/custom_redirects_delete_single_custom_redirect400_response_error.py +++ b/src/redirect/models/custom_redirects_delete_single_custom_redirect400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_read_custom_redirect404_response.py b/src/redirect/models/custom_redirects_read_custom_redirect404_response.py index 8dc6ff9..0ea78e3 100644 --- a/src/redirect/models/custom_redirects_read_custom_redirect404_response.py +++ b/src/redirect/models/custom_redirects_read_custom_redirect404_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_read_custom_redirect404_response_error.py b/src/redirect/models/custom_redirects_read_custom_redirect404_response_error.py index d77320a..bdf127e 100644 --- a/src/redirect/models/custom_redirects_read_custom_redirect404_response_error.py +++ b/src/redirect/models/custom_redirects_read_custom_redirect404_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_update_custom_redirect409_response.py b/src/redirect/models/custom_redirects_update_custom_redirect409_response.py index 2ea15ca..f442c3d 100644 --- a/src/redirect/models/custom_redirects_update_custom_redirect409_response.py +++ b/src/redirect/models/custom_redirects_update_custom_redirect409_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/custom_redirects_update_custom_redirect409_response_error.py b/src/redirect/models/custom_redirects_update_custom_redirect409_response_error.py index d0a242a..7c246da 100644 --- a/src/redirect/models/custom_redirects_update_custom_redirect409_response_error.py +++ b/src/redirect/models/custom_redirects_update_custom_redirect409_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/page_update_redirect_page400_response.py b/src/redirect/models/page_update_redirect_page400_response.py index 276c475..ec35566 100644 --- a/src/redirect/models/page_update_redirect_page400_response.py +++ b/src/redirect/models/page_update_redirect_page400_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/page_update_redirect_page400_response_error.py b/src/redirect/models/page_update_redirect_page400_response_error.py index 5fe02fc..5ce2ee8 100644 --- a/src/redirect/models/page_update_redirect_page400_response_error.py +++ b/src/redirect/models/page_update_redirect_page400_response_error.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/proxy_cert_response.py b/src/redirect/models/proxy_cert_response.py index 2f1d720..a6bee59 100644 --- a/src/redirect/models/proxy_cert_response.py +++ b/src/redirect/models/proxy_cert_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/redirect_page.py b/src/redirect/models/redirect_page.py index 9664d63..cf763f0 100644 --- a/src/redirect/models/redirect_page.py +++ b/src/redirect/models/redirect_page.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/redirect_page_read_response.py b/src/redirect/models/redirect_page_read_response.py index a28cf03..affa914 100644 --- a/src/redirect/models/redirect_page_read_response.py +++ b/src/redirect/models/redirect_page_read_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/redirect_page_update_response.py b/src/redirect/models/redirect_page_update_response.py index d1ff500..27962dc 100644 --- a/src/redirect/models/redirect_page_update_response.py +++ b/src/redirect/models/redirect_page_update_response.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/models/update_redirect_page_payload.py b/src/redirect/models/update_redirect_page_payload.py index 401d115..0233384 100644 --- a/src/redirect/models/update_redirect_page_payload.py +++ b/src/redirect/models/update_redirect_page_payload.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/src/redirect/test/test_certificate_api.py b/src/redirect/test/test_certificate_api.py index da9b92c..c92fa60 100644 --- a/src/redirect/test/test_certificate_api.py +++ b/src/redirect/test/test_certificate_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from redirect.api.certificate_api import CertificateApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestCertificateApi(unittest.TestCase): diff --git a/src/redirect/test/test_custom_redirects_api.py b/src/redirect/test/test_custom_redirects_api.py index 6959480..74671d2 100644 --- a/src/redirect/test/test_custom_redirects_api.py +++ b/src/redirect/test/test_custom_redirects_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from redirect.api.custom_redirects_api import CustomRedirectsApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestCustomRedirectsApi(unittest.TestCase): diff --git a/src/redirect/test/test_redirect_page_api.py b/src/redirect/test/test_redirect_page_api.py index a7f8bb8..b97864c 100644 --- a/src/redirect/test/test_redirect_page_api.py +++ b/src/redirect/test/test_redirect_page_api.py @@ -1,9 +1,9 @@ # coding: utf-8 """ - BloxOne Redirect API + Infoblox Redirect API - You can configure BloxOne Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. + You can configure Infoblox Threat Defense Cloud to redirect traffic to the Infoblox server that displays the default or customized redirect page. You can redirect traffic to a custom destination using custom redirects. The version of the OpenAPI document: v1 Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,7 +15,7 @@ from redirect.api.redirect_page_api import RedirectPageApi -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestRedirectPageApi(unittest.TestCase): diff --git a/src/universal_ddi_client/__init__.py b/src/universal_ddi_client/__init__.py new file mode 100644 index 0000000..e474893 --- /dev/null +++ b/src/universal_ddi_client/__init__.py @@ -0,0 +1,21 @@ +__version__ = "0.1.0" + +# import ApiClient +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.api_client import RequestSerialized +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration +from universal_ddi_client.exceptions import OpenApiException +from universal_ddi_client.exceptions import ApiTypeError +from universal_ddi_client.exceptions import ApiValueError +from universal_ddi_client.exceptions import ApiKeyError +from universal_ddi_client.exceptions import ApiAttributeError +from universal_ddi_client.exceptions import ApiException +from universal_ddi_client.exceptions import BadRequestException +from universal_ddi_client.exceptions import NotFoundException +from universal_ddi_client.exceptions import UnauthorizedException +from universal_ddi_client.exceptions import ForbiddenException +from universal_ddi_client.exceptions import ServiceException +from universal_ddi_client.rest import RESTResponse +from universal_ddi_client.rest import RESTClientObject +from universal_ddi_client.rest import RESTResponseType diff --git a/src/bloxone_client/api_client.py b/src/universal_ddi_client/api_client.py similarity index 98% rename from src/bloxone_client/api_client.py rename to src/universal_ddi_client/api_client.py index 905bb82..aae7e4d 100644 --- a/src/bloxone_client/api_client.py +++ b/src/universal_ddi_client/api_client.py @@ -13,10 +13,10 @@ from typing import Tuple, Optional, List, Dict, Union from pydantic import SecretStr -from bloxone_client.configuration import Configuration -from bloxone_client.api_response import ApiResponse, T as ApiResponseT -from bloxone_client.rest import RESTClientObject, RESTResponse -from bloxone_client.exceptions import (ApiValueError, ApiException, +from universal_ddi_client.configuration import Configuration +from universal_ddi_client.api_response import ApiResponse, T as ApiResponseT +from universal_ddi_client.rest import RESTClientObject, RESTResponse +from universal_ddi_client.exceptions import (ApiValueError, ApiException, BadRequestException, UnauthorizedException, ForbiddenException, NotFoundException, @@ -68,7 +68,7 @@ def __init__( self.rest_client = RESTClientObject(configuration) self.default_headers = {} # Set default User-Agent. - self.user_agent = f"bloxone-{SDK_IDENTIFIER}/{VERSION}" + self.user_agent = f"universal-ddi-{SDK_IDENTIFIER}/{VERSION}" self.client_side_validation = configuration.client_side_validation def __enter__(self): diff --git a/src/bloxone_client/api_client_test.py b/src/universal_ddi_client/api_client_test.py similarity index 91% rename from src/bloxone_client/api_client_test.py rename to src/universal_ddi_client/api_client_test.py index 3d72701..e16b191 100644 --- a/src/bloxone_client/api_client_test.py +++ b/src/universal_ddi_client/api_client_test.py @@ -1,12 +1,12 @@ import unittest -import bloxone_client +import universal_ddi_client class TestApiClient(unittest.TestCase): def setUp(self) -> None: - self.api_client = bloxone_client.ApiClient() + self.api_client = universal_ddi_client.ApiClient() def tearDown(self) -> None: pass @@ -16,7 +16,7 @@ def test_default_client(self): self.assertEqual(self.api_client.configuration.csp_url, 'https://csp.infoblox.com') self.assertEqual(self.api_client.configuration.client_name, - 'bloxone-python-client') + 'universal-ddi-python-client') def test_path_param_value_with_resource_id_type(self): result = self.api_client.path_param_value('id', 'app/type/id', diff --git a/src/bloxone_client/api_response.py b/src/universal_ddi_client/api_response.py similarity index 100% rename from src/bloxone_client/api_response.py rename to src/universal_ddi_client/api_response.py diff --git a/src/bloxone_client/configuration.py b/src/universal_ddi_client/configuration.py similarity index 93% rename from src/bloxone_client/configuration.py rename to src/universal_ddi_client/configuration.py index 6918909..c61a114 100644 --- a/src/bloxone_client/configuration.py +++ b/src/universal_ddi_client/configuration.py @@ -18,17 +18,17 @@ class Configuration: """This class contains various settings of the API client. - :param csp_url: URL for BloxOne Cloud Services Portal. - Can also be configured using the `BLOXONE_CSP_URL` environment variable. + :param csp_url: URL for Infoblox Cloud Services Portal. + Can also be configured using the `INFOBLOX_PORTAL_URL` environment variable. Default is `https://csp.infoblox.com`. - :param api_key: API Key for accessing the BloxOne API. - Can also be configured by using the `BLOXONE_API_KEY` environment variable. + :param api_key: API Key for accessing the Infoblox API. + Can also be configured by using the `INFOBLOX_PORTAL_KEY` environment variable. - You can configure an API key for your user account in the BloxOne Cloud Services Portal. + You can configure an API key for your user account in the Infoblox Cloud Services Portal. Please refer to the following link for more information: https://docs.infoblox.com/space/BloxOneCloud/35430405/Configuring+User+API+Keys. :param client_name: The name of the client using the API. This can be used to identify the client in the logs. - If not provided, the client name will be set to `bloxone-python-client`. + If not provided, the client name will be set to `universal-ddi-python-client`. :param ssl_ca_cert: str - the path to a file of concatenated CA certificates in PEM format. @@ -55,19 +55,19 @@ def __init__( """Constructor """ - self.csp_url = os.getenv('BLOXONE_CSP_URL', "https://csp.infoblox.com") if csp_url is None else csp_url + self.csp_url = os.getenv('INFOBLOX_PORTAL_URL', "https://csp.infoblox.com") if csp_url is None else csp_url """Default CSP url """ self.temp_folder_path = None """Temp file folder for downloading files """ # Authentication Settings - self.api_key = os.getenv('BLOXONE_API_KEY', "") + self.api_key = os.getenv('INFOBLOX_PORTAL_KEY', "") if api_key: self.api_key = api_key """API Key """ - self.client_name = "bloxone-python-client" if client_name is None else client_name + self.client_name = "universal-ddi-python-client" if client_name is None else client_name """Default Client name """ self.logger = {} diff --git a/src/bloxone_client/exceptions.py b/src/universal_ddi_client/exceptions.py similarity index 100% rename from src/bloxone_client/exceptions.py rename to src/universal_ddi_client/exceptions.py diff --git a/src/bloxone_client/py.typed b/src/universal_ddi_client/py.typed similarity index 100% rename from src/bloxone_client/py.typed rename to src/universal_ddi_client/py.typed diff --git a/src/bloxone_client/rest.py b/src/universal_ddi_client/rest.py similarity index 99% rename from src/bloxone_client/rest.py rename to src/universal_ddi_client/rest.py index 680cb5d..9c8f2a7 100644 --- a/src/bloxone_client/rest.py +++ b/src/universal_ddi_client/rest.py @@ -7,7 +7,7 @@ import urllib3 -from bloxone_client.exceptions import ApiException, ApiValueError +from universal_ddi_client.exceptions import ApiException, ApiValueError SUPPORTED_SOCKS_PROXIES = {"socks5", "socks5h", "socks4", "socks4a"} RESTResponseType = urllib3.HTTPResponse diff --git a/src/upgrade_policy/README.md b/src/upgrade_policy/README.md index dcd9933..42bcb85 100644 --- a/src/upgrade_policy/README.md +++ b/src/upgrade_policy/README.md @@ -6,7 +6,7 @@ The `upgrade_policy` package is automatically generated by the [OpenAPI Generato - API version: v2 - Package version: 0.1.0 - Generator version: 7.5.0 -- Build package: com.infoblox.codegen.BloxonePythonClientCodegen +- Build package: com.infoblox.codegen.UniversalDdiPythonClientCodegen ## Requirements. @@ -36,14 +36,14 @@ from pprint import pprint # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client diff --git a/src/upgrade_policy/api/upgrade_policy_v2_api.py b/src/upgrade_policy/api/upgrade_policy_v2_api.py index 4c809f9..212fe79 100644 --- a/src/upgrade_policy/api/upgrade_policy_v2_api.py +++ b/src/upgrade_policy/api/upgrade_policy_v2_api.py @@ -32,9 +32,9 @@ from upgrade_policy.models.update_maintenance_window_response import UpdateMaintenanceWindowResponse from upgrade_policy import models -from bloxone_client.api_client import ApiClient, RequestSerialized -from bloxone_client.api_response import ApiResponse -from bloxone_client.rest import RESTResponseType +from universal_ddi_client.api_client import ApiClient, RequestSerialized +from universal_ddi_client.api_response import ApiResponse +from universal_ddi_client.rest import RESTResponseType class UpgradePolicyV2Api: diff --git a/src/upgrade_policy/docs/UpgradePolicyV2Api.md b/src/upgrade_policy/docs/UpgradePolicyV2Api.md index 5a71be1..ddbab5b 100644 --- a/src/upgrade_policy/docs/UpgradePolicyV2Api.md +++ b/src/upgrade_policy/docs/UpgradePolicyV2Api.md @@ -27,20 +27,20 @@ from pprint import pprint import upgrade_policy -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -101,20 +101,20 @@ from pprint import pprint import upgrade_policy -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -175,20 +175,20 @@ from pprint import pprint import upgrade_policy -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -249,20 +249,20 @@ from pprint import pprint import upgrade_policy -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -323,20 +323,20 @@ from pprint import pprint import upgrade_policy -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -397,20 +397,20 @@ from pprint import pprint import upgrade_policy -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: @@ -470,20 +470,20 @@ from pprint import pprint import upgrade_policy -from bloxone_client.api_client import ApiClient -from bloxone_client.configuration import Configuration +from universal_ddi_client.api_client import ApiClient +from universal_ddi_client.configuration import Configuration # Defining the CSP URL is optional and defaults to "https://csp.infoblox.com" # See configuration.py for a list of all supported configuration parameters. configuration = Configuration( - csp_url = os.getenv('BLOXONE_CSP_URL'), + csp_url = os.getenv('INFOBLOX_PORTAL_URL'), ) # The client must configure the authentication and authorization parameters # in accordance with the API server security policy. # Configure API key authorization: ApiKeyAuth -configuration.api_key = os.getenv("BLOXONE_API_KEY") +configuration.api_key = os.getenv("INFOBLOX_PORTAL_KEY") # Enter a context with an instance of the API client with ApiClient(config) as api_client: diff --git a/src/upgrade_policy/test/test_upgrade_policy_v2_api.py b/src/upgrade_policy/test/test_upgrade_policy_v2_api.py index 61fc52e..34d5fb9 100644 --- a/src/upgrade_policy/test/test_upgrade_policy_v2_api.py +++ b/src/upgrade_policy/test/test_upgrade_policy_v2_api.py @@ -15,7 +15,7 @@ from upgrade_policy.api.upgrade_policy_v2_api import UpgradePolicyV2Api -from bloxone_client.api_client import ApiClient +from universal_ddi_client.api_client import ApiClient class TestUpgradePolicyV2Api(unittest.TestCase): diff --git a/tox.ini b/tox.ini index eeafe2e..3914368 100644 --- a/tox.ini +++ b/tox.ini @@ -6,4 +6,4 @@ deps=-r{toxinidir}/requirements.txt -r{toxinidir}/test-requirements.txt commands= - pytest --cov=bloxone_python_client + pytest --cov=universal_ddi_python_client