B `@sGdddeZdS)cs:eZdZfddZedddZeedddZZS) MalwareSettingscstt|||_dS)N)superr__init___session)selfsession) __class__y/private/var/folders/7j/8686xlfs15q3tgljmghtvg0r0000gn/T/pip-target-isidps9b/lib/python/meraki_v0/api/malware_settings.pyrszMalwareSettings.__init__) networkIdcCs&dgdd}d|d}|j||S)z **Returns all supported malware settings for an MX network** https://developer.cisco.com/meraki/api/#!get-network-security-malware-settings - networkId (string) zMalware settings!getNetworkSecurityMalwareSettings)tags operationz /networks/z/security/malwareSettings)rget)rr metadataresourcerrr r s  z1MalwareSettings.getNetworkSecurityMalwareSettings)r modec s|td|kr@ddg}|d|ks@td|dd|dgdd}d |d }dd d gfd d|D}|j|||S)a **Set the supported malware settings for an MX network** https://developer.cisco.com/meraki/api/#!update-network-security-malware-settings - networkId (string) - mode (string): Set mode to 'enabled' to enable malware prevention, otherwise 'disabled' - allowedUrls (array): The urls that should be permitted by the malware detection engine. If omitted, the current config will remain unchanged. This is available only if your network supports AMP allow listing - allowedFiles (array): The sha256 digests of files that should be permitted by the malware detection engine. If omitted, the current config will remain unchanged. This is available only if your network supports AMP allow listing rZenableddisabledz"mode" cannot be "z", & must be set to one of: zMalware settings$updateNetworkSecurityMalwareSettings)r r z /networks/z/security/malwareSettingsZ allowedUrlsZ allowedFilescs&i|]\}}|kr||qSr)strip).0kv) body_paramsrr .szHMalwareSettings.updateNetworkSecurityMalwareSettings..)updatelocalsAssertionErroritemsrput)rr rkwargsoptionsrrpayloadr)rr rs $  z4MalwareSettings.updateNetworkSecurityMalwareSettings)__name__ __module__ __qualname__rstrr r __classcell__rr)rr rs rN)objectrrrrr