Skip to content

Commit 937f7c1

Browse files
committed
ci: regenerated with OpenAPI Doc , Speakeasy CLI 1.751.0
1 parent 4a15c63 commit 937f7c1

663 files changed

Lines changed: 2674 additions & 1972 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.speakeasy/gen.lock

Lines changed: 1331 additions & 1331 deletions
Large diffs are not rendered by default.

.speakeasy/gen.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ generation:
2929
generateNewTests: false
3030
skipResponseBodyAssertions: false
3131
python:
32-
version: 0.13.1
32+
version: 0.13.2
3333
additionalDependencies:
3434
dev: {}
3535
main: {}

.speakeasy/workflow.lock

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,20 @@
1-
speakeasyVersion: 1.731.2
1+
speakeasyVersion: 1.751.0
22
sources:
33
converge-source:
44
sourceNamespace: converge-source
5-
sourceRevisionDigest: sha256:48cf182ee10951ce591e9d09c41ff31c245676976837dc8efeeb81de92331450
6-
sourceBlobDigest: sha256:7de50b965211e15a8a2e0f0aa4bf2e80879f8e95decc394147e411317e37caa0
5+
sourceRevisionDigest: sha256:313f9cd08b2344c58acbb9205c7c6a2869aeb18a6a6aef75b0004f4dbcd02b51
6+
sourceBlobDigest: sha256:294a929e310068628cf19eef16616cd4f95bd3e0f4aef0439588354e9bd55794
77
tags:
88
- latest
9-
- speakeasy-sdk-regen-1771979923
10-
- 1.0.80
9+
- 1.0.82
1110
targets:
1211
censys-sdk-python:
1312
source: converge-source
1413
sourceNamespace: converge-source
15-
sourceRevisionDigest: sha256:48cf182ee10951ce591e9d09c41ff31c245676976837dc8efeeb81de92331450
16-
sourceBlobDigest: sha256:7de50b965211e15a8a2e0f0aa4bf2e80879f8e95decc394147e411317e37caa0
14+
sourceRevisionDigest: sha256:313f9cd08b2344c58acbb9205c7c6a2869aeb18a6a6aef75b0004f4dbcd02b51
15+
sourceBlobDigest: sha256:294a929e310068628cf19eef16616cd4f95bd3e0f4aef0439588354e9bd55794
1716
codeSamplesNamespace: converge-source-python-code-samples
18-
codeSamplesRevisionDigest: sha256:3888134d241e822364240410bd135065d6da335e32aa1173967eeeb211429867
17+
codeSamplesRevisionDigest: sha256:d2c8988ccc3a249c97ccdc8b0d52e62c708a67220d19774c728ed7e3c1800bc8
1918
workflow:
2019
workflowVersion: 1.0.0
2120
speakeasyVersion: latest

RELEASES.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,4 +216,14 @@ Based on:
216216
### Generated
217217
- [python v0.13.1] .
218218
### Releases
219-
- [PyPI v0.13.1] https://pypi.org/project/censys-platform/0.13.1 - .
219+
- [PyPI v0.13.1] https://pypi.org/project/censys-platform/0.13.1 - .
220+
221+
## 2026-03-11 00:33:20
222+
### Changes
223+
Based on:
224+
- OpenAPI Doc
225+
- Speakeasy CLI 1.751.0 (2.858.2) https://github.com/speakeasy-api/speakeasy
226+
### Generated
227+
- [python v0.13.2] .
228+
### Releases
229+
- [PyPI v0.13.2] https://pypi.org/project/censys-platform/0.13.2 - .

docs/models/assetchangetypes.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,13 @@
11
# AssetChangeTypes
22

3+
## Example Usage
4+
5+
```python
6+
from censys_platform.models import AssetChangeTypes
7+
8+
value = AssetChangeTypes.ADDED
9+
```
10+
311

412
## Values
513

docs/models/attackcomplexity.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,16 @@
22

33
Indicates conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. The Attack Complexity metric is scored as either Low or High. There are two possible values: Low (L) – There are no specific pre-conditions required for exploitation, High (H) – The attacker must complete some number of preparatory steps in order to get access.
44

5+
## Example Usage
6+
7+
```python
8+
from censys_platform.models import AttackComplexity
9+
10+
value = AttackComplexity.UNKNOWN
11+
12+
# Open enum: unrecognized values are captured as UnrecognizedStr
13+
```
14+
515

616
## Values
717

docs/models/attackrequirements.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
# AttackRequirements
22

3+
## Example Usage
4+
5+
```python
6+
from censys_platform.models import AttackRequirements
7+
8+
value = AttackRequirements.UNKNOWN
9+
10+
# Open enum: unrecognized values are captured as UnrecognizedStr
11+
```
12+
313

414
## Values
515

docs/models/attackvector.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,16 @@
22

33
Indicates the level of access required for an attacker to exploit the vulnerability. The Attack Vector metric is scored in one of four levels: Network (N) – Vulnerabilities with this rating are remotely exploitable, from one or more hops away, up to, and including, remote exploitation over the Internet, Adjacent (A) – A vulnerability with this rating requires network adjacency for exploitation. The attack must be launched from the same physical or logical network, Local (L) – Vulnerabilities with this rating are not exploitable over a network, Physical (P) – An attacker must physically interact with the target system.
44

5+
## Example Usage
6+
7+
```python
8+
from censys_platform.models import AttackVector
9+
10+
value = AttackVector.UNKNOWN
11+
12+
# Open enum: unrecognized values are captured as UnrecognizedStr
13+
```
14+
515

616
## Values
717

docs/models/automatable.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
# Automatable
22

3+
## Example Usage
4+
5+
```python
6+
from censys_platform.models import Automatable
7+
8+
value = Automatable.UNKNOWN
9+
10+
# Open enum: unrecognized values are captured as UnrecognizedStr
11+
```
12+
313

414
## Values
515

docs/models/availability.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,16 @@
22

33
If an attack renders information unavailable, such as when a system crashes or through a DDoS attack, availability is negatively impacted. Availability has three possible values: None (N) – There is no loss of availability, Low (L) – Availability might be intermittently limited, or performance might be negatively impacted, as a result of a successful attack, High (H) – There is a complete loss of availability of the impacted system or information.
44

5+
## Example Usage
6+
7+
```python
8+
from censys_platform.models import Availability
9+
10+
value = Availability.UNKNOWN
11+
12+
# Open enum: unrecognized values are captured as UnrecognizedStr
13+
```
14+
515

616
## Values
717

0 commit comments

Comments
 (0)