From ff2f5dc939fc3b3799c875a765a91ee11bdcbd83 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Thu, 7 Nov 2024 17:33:35 +0000 Subject: [PATCH] feat(api): api update (#2129) --- .stats.yml | 2 +- api.md | 13 +- .../zero_trust/access/applications/cas.py | 24 +-- .../resources/zero_trust/access/tags.py | 12 +- .../types/zero_trust/access/__init__.py | 3 - .../types/zero_trust/access/oidc_saas_app.py | 10 +- .../zero_trust/access/oidc_saas_app_param.py | 12 +- .../zero_trust/access/saas_app_name_format.py | 11 - .../zero_trust/access/saas_app_source.py | 15 -- .../access/saas_app_source_param.py | 16 -- .../types/zero_trust/access/saml_saas_app.py | 28 ++- .../zero_trust/access/saml_saas_app_param.py | 25 ++- .../zero_trust/access/tag_create_params.py | 2 +- .../identity_provider_scim_config_param.py | 7 - .../access/applications/test_cas.py | 32 +-- .../zero_trust/access/test_applications.py | 200 ++++++++++++++---- .../zero_trust/access/test_tags.py | 24 ++- .../zero_trust/test_identity_providers.py | 56 ----- 18 files changed, 260 insertions(+), 232 deletions(-) delete mode 100644 src/cloudflare/types/zero_trust/access/saas_app_name_format.py delete mode 100644 src/cloudflare/types/zero_trust/access/saas_app_source.py delete mode 100644 src/cloudflare/types/zero_trust/access/saas_app_source_param.py diff --git a/.stats.yml b/.stats.yml index a756722ccdf..cc2f9a62f63 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,2 +1,2 @@ configured_endpoints: 1397 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-66874390672543889c6f739266ab0e815d7c6a65deb464a2c41c965b45d3e24a.yml +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-eb646c11ed31a9e0730c5860d58b7ed8757c84c20012ea4e7d4a4750c8e908f2.yml diff --git a/api.md b/api.md index af34e305ade..c490b9016ad 100644 --- a/api.md +++ b/api.md @@ -5059,9 +5059,7 @@ from cloudflare.types.zero_trust.access import ( CORSHeaders, Decision, OIDCSaaSApp, - SaaSAppNameFormat, SaaSAppNameIDFormat, - SaaSAppSource, SAMLSaaSApp, SCIMConfigAuthenticationHTTPBasic, SCIMConfigAuthenticationOAuthBearerToken, @@ -5091,20 +5089,15 @@ Methods: Types: ```python -from cloudflare.types.zero_trust.access.applications import ( - CA, - CACreateResponse, - CADeleteResponse, - CAGetResponse, -) +from cloudflare.types.zero_trust.access.applications import CA, CADeleteResponse ``` Methods: -- client.zero_trust.access.applications.cas.create(app_id, \*, account_id, zone_id) -> object +- client.zero_trust.access.applications.cas.create(app_id, \*, account_id, zone_id) -> Optional - client.zero_trust.access.applications.cas.list(\*, account_id, zone_id) -> SyncSinglePage[CA] - client.zero_trust.access.applications.cas.delete(app_id, \*, account_id, zone_id) -> Optional -- client.zero_trust.access.applications.cas.get(app_id, \*, account_id, zone_id) -> object +- client.zero_trust.access.applications.cas.get(app_id, \*, account_id, zone_id) -> Optional #### UserPolicyChecks diff --git a/src/cloudflare/resources/zero_trust/access/applications/cas.py b/src/cloudflare/resources/zero_trust/access/applications/cas.py index bb4b5452832..bc9acc32378 100644 --- a/src/cloudflare/resources/zero_trust/access/applications/cas.py +++ b/src/cloudflare/resources/zero_trust/access/applications/cas.py @@ -56,7 +56,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> object: + ) -> Optional[CA]: """ Generates a new short-lived certificate CA and public key. @@ -96,9 +96,9 @@ def create( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[object]]._unwrapper, + post_parser=ResultWrapper[Optional[CA]]._unwrapper, ), - cast_to=cast(Type[object], ResultWrapper[object]), + cast_to=cast(Type[Optional[CA]], ResultWrapper[CA]), ) def list( @@ -219,7 +219,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> object: + ) -> Optional[CA]: """ Fetches a short-lived certificate CA and its public key. @@ -259,9 +259,9 @@ def get( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[object]]._unwrapper, + post_parser=ResultWrapper[Optional[CA]]._unwrapper, ), - cast_to=cast(Type[object], ResultWrapper[object]), + cast_to=cast(Type[Optional[CA]], ResultWrapper[CA]), ) @@ -297,7 +297,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> object: + ) -> Optional[CA]: """ Generates a new short-lived certificate CA and public key. @@ -337,9 +337,9 @@ async def create( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[object]]._unwrapper, + post_parser=ResultWrapper[Optional[CA]]._unwrapper, ), - cast_to=cast(Type[object], ResultWrapper[object]), + cast_to=cast(Type[Optional[CA]], ResultWrapper[CA]), ) def list( @@ -460,7 +460,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> object: + ) -> Optional[CA]: """ Fetches a short-lived certificate CA and its public key. @@ -500,9 +500,9 @@ async def get( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[object]]._unwrapper, + post_parser=ResultWrapper[Optional[CA]]._unwrapper, ), - cast_to=cast(Type[object], ResultWrapper[object]), + cast_to=cast(Type[Optional[CA]], ResultWrapper[CA]), ) diff --git a/src/cloudflare/resources/zero_trust/access/tags.py b/src/cloudflare/resources/zero_trust/access/tags.py index 7c93891dcd8..7f039682cc8 100644 --- a/src/cloudflare/resources/zero_trust/access/tags.py +++ b/src/cloudflare/resources/zero_trust/access/tags.py @@ -53,7 +53,7 @@ def create( self, *, account_id: str, - body: str, + name: str | NotGiven = NOT_GIVEN, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, @@ -67,7 +67,7 @@ def create( Args: account_id: Identifier - body: The name of the tag + name: The name of the tag extra_headers: Send extra headers @@ -81,7 +81,7 @@ def create( raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") return self._post( f"/accounts/{account_id}/access/tags", - body=maybe_transform(body, tag_create_params.TagCreateParams), + body=maybe_transform({"name": name}, tag_create_params.TagCreateParams), options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -289,7 +289,7 @@ async def create( self, *, account_id: str, - body: str, + name: str | NotGiven = NOT_GIVEN, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, @@ -303,7 +303,7 @@ async def create( Args: account_id: Identifier - body: The name of the tag + name: The name of the tag extra_headers: Send extra headers @@ -317,7 +317,7 @@ async def create( raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") return await self._post( f"/accounts/{account_id}/access/tags", - body=await async_maybe_transform(body, tag_create_params.TagCreateParams), + body=await async_maybe_transform({"name": name}, tag_create_params.TagCreateParams), options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, diff --git a/src/cloudflare/types/zero_trust/access/__init__.py b/src/cloudflare/types/zero_trust/access/__init__.py index 3db57d74aae..d4539711a03 100644 --- a/src/cloudflare/types/zero_trust/access/__init__.py +++ b/src/cloudflare/types/zero_trust/access/__init__.py @@ -17,7 +17,6 @@ from .allowed_headers import AllowedHeaders as AllowedHeaders from .allowed_methods import AllowedMethods as AllowedMethods from .allowed_origins import AllowedOrigins as AllowedOrigins -from .saas_app_source import SaaSAppSource as SaaSAppSource from .application_type import ApplicationType as ApplicationType from .key_get_response import KeyGetResponse as KeyGetResponse from .zero_trust_group import ZeroTrustGroup as ZeroTrustGroup @@ -41,9 +40,7 @@ from .policy_create_params import PolicyCreateParams as PolicyCreateParams from .policy_list_response import PolicyListResponse as PolicyListResponse from .policy_update_params import PolicyUpdateParams as PolicyUpdateParams -from .saas_app_name_format import SaaSAppNameFormat as SaaSAppNameFormat from .group_delete_response import GroupDeleteResponse as GroupDeleteResponse -from .saas_app_source_param import SaaSAppSourceParam as SaaSAppSourceParam from .bookmark_create_params import BookmarkCreateParams as BookmarkCreateParams from .bookmark_update_params import BookmarkUpdateParams as BookmarkUpdateParams from .policy_create_response import PolicyCreateResponse as PolicyCreateResponse diff --git a/src/cloudflare/types/zero_trust/access/oidc_saas_app.py b/src/cloudflare/types/zero_trust/access/oidc_saas_app.py index b3e45b6e11c..d5f3046170d 100644 --- a/src/cloudflare/types/zero_trust/access/oidc_saas_app.py +++ b/src/cloudflare/types/zero_trust/access/oidc_saas_app.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["OIDCSaaSApp", "CustomClaims", "CustomClaimsSource", "HybridAndImplicitOptions", "RefreshTokenOptions"] +__all__ = ["OIDCSaaSApp", "CustomClaim", "CustomClaimSource", "HybridAndImplicitOptions", "RefreshTokenOptions"] -class CustomClaimsSource(BaseModel): +class CustomClaimSource(BaseModel): name: Optional[str] = None """The name of the IdP claim.""" @@ -17,7 +17,7 @@ class CustomClaimsSource(BaseModel): """A mapping from IdP ID to claim name.""" -class CustomClaims(BaseModel): +class CustomClaim(BaseModel): name: Optional[str] = None """The name of the claim.""" @@ -27,7 +27,7 @@ class CustomClaims(BaseModel): scope: Optional[Literal["groups", "profile", "email", "openid"]] = None """The scope of the claim.""" - source: Optional[CustomClaimsSource] = None + source: Optional[CustomClaimSource] = None class HybridAndImplicitOptions(BaseModel): @@ -77,7 +77,7 @@ class OIDCSaaSApp(BaseModel): created_at: Optional[datetime] = None - custom_claims: Optional[CustomClaims] = None + custom_claims: Optional[List[CustomClaim]] = None grant_types: Optional[ List[Literal["authorization_code", "authorization_code_with_pkce", "refresh_tokens", "hybrid", "implicit"]] diff --git a/src/cloudflare/types/zero_trust/access/oidc_saas_app_param.py b/src/cloudflare/types/zero_trust/access/oidc_saas_app_param.py index 22418735dc9..b98cb430e77 100644 --- a/src/cloudflare/types/zero_trust/access/oidc_saas_app_param.py +++ b/src/cloudflare/types/zero_trust/access/oidc_saas_app_param.py @@ -2,13 +2,13 @@ from __future__ import annotations -from typing import Dict, List +from typing import Dict, List, Iterable from typing_extensions import Literal, TypedDict -__all__ = ["OIDCSaaSAppParam", "CustomClaims", "CustomClaimsSource", "HybridAndImplicitOptions", "RefreshTokenOptions"] +__all__ = ["OIDCSaaSAppParam", "CustomClaim", "CustomClaimSource", "HybridAndImplicitOptions", "RefreshTokenOptions"] -class CustomClaimsSource(TypedDict, total=False): +class CustomClaimSource(TypedDict, total=False): name: str """The name of the IdP claim.""" @@ -16,7 +16,7 @@ class CustomClaimsSource(TypedDict, total=False): """A mapping from IdP ID to claim name.""" -class CustomClaims(TypedDict, total=False): +class CustomClaim(TypedDict, total=False): name: str """The name of the claim.""" @@ -26,7 +26,7 @@ class CustomClaims(TypedDict, total=False): scope: Literal["groups", "profile", "email", "openid"] """The scope of the claim.""" - source: CustomClaimsSource + source: CustomClaimSource class HybridAndImplicitOptions(TypedDict, total=False): @@ -74,7 +74,7 @@ class OIDCSaaSAppParam(TypedDict, total=False): client_secret: str """The application client secret, only returned on POST request.""" - custom_claims: CustomClaims + custom_claims: Iterable[CustomClaim] grant_types: List[ Literal["authorization_code", "authorization_code_with_pkce", "refresh_tokens", "hybrid", "implicit"] diff --git a/src/cloudflare/types/zero_trust/access/saas_app_name_format.py b/src/cloudflare/types/zero_trust/access/saas_app_name_format.py deleted file mode 100644 index d16a7495aba..00000000000 --- a/src/cloudflare/types/zero_trust/access/saas_app_name_format.py +++ /dev/null @@ -1,11 +0,0 @@ -# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. - -from typing_extensions import Literal, TypeAlias - -__all__ = ["SaaSAppNameFormat"] - -SaaSAppNameFormat: TypeAlias = Literal[ - "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", - "urn:oasis:names:tc:SAML:2.0:attrname-format:basic", - "urn:oasis:names:tc:SAML:2.0:attrname-format:uri", -] diff --git a/src/cloudflare/types/zero_trust/access/saas_app_source.py b/src/cloudflare/types/zero_trust/access/saas_app_source.py deleted file mode 100644 index 5a4e157c195..00000000000 --- a/src/cloudflare/types/zero_trust/access/saas_app_source.py +++ /dev/null @@ -1,15 +0,0 @@ -# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. - -from typing import Dict, Optional - -from ...._models import BaseModel - -__all__ = ["SaaSAppSource"] - - -class SaaSAppSource(BaseModel): - name: Optional[str] = None - """The name of the IdP attribute.""" - - name_by_idp: Optional[Dict[str, str]] = None - """A mapping from IdP ID to attribute name.""" diff --git a/src/cloudflare/types/zero_trust/access/saas_app_source_param.py b/src/cloudflare/types/zero_trust/access/saas_app_source_param.py deleted file mode 100644 index 12b4abc2d05..00000000000 --- a/src/cloudflare/types/zero_trust/access/saas_app_source_param.py +++ /dev/null @@ -1,16 +0,0 @@ -# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. - -from __future__ import annotations - -from typing import Dict -from typing_extensions import TypedDict - -__all__ = ["SaaSAppSourceParam"] - - -class SaaSAppSourceParam(TypedDict, total=False): - name: str - """The name of the IdP attribute.""" - - name_by_idp: Dict[str, str] - """A mapping from IdP ID to attribute name.""" diff --git a/src/cloudflare/types/zero_trust/access/saml_saas_app.py b/src/cloudflare/types/zero_trust/access/saml_saas_app.py index 495e76604aa..4912e03680d 100644 --- a/src/cloudflare/types/zero_trust/access/saml_saas_app.py +++ b/src/cloudflare/types/zero_trust/access/saml_saas_app.py @@ -1,31 +1,43 @@ # File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. -from typing import Optional +from typing import Dict, List, Optional from datetime import datetime from typing_extensions import Literal from ...._models import BaseModel -from .saas_app_source import SaaSAppSource -from .saas_app_name_format import SaaSAppNameFormat from .saas_app_name_id_format import SaaSAppNameIDFormat -__all__ = ["SAMLSaaSApp", "CustomAttributes"] +__all__ = ["SAMLSaaSApp", "CustomAttribute", "CustomAttributeSource"] -class CustomAttributes(BaseModel): +class CustomAttributeSource(BaseModel): + name: Optional[str] = None + """The name of the IdP attribute.""" + + name_by_idp: Optional[Dict[str, str]] = None + """A mapping from IdP ID to attribute name.""" + + +class CustomAttribute(BaseModel): friendly_name: Optional[str] = None """The SAML FriendlyName of the attribute.""" name: Optional[str] = None """The name of the attribute.""" - name_format: Optional[SaaSAppNameFormat] = None + name_format: Optional[ + Literal[ + "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "urn:oasis:names:tc:SAML:2.0:attrname-format:basic", + "urn:oasis:names:tc:SAML:2.0:attrname-format:uri", + ] + ] = None """A globally unique name for an identity or service provider.""" required: Optional[bool] = None """If the attribute is required when building a SAML assertion.""" - source: Optional[SaaSAppSource] = None + source: Optional[CustomAttributeSource] = None class SAMLSaaSApp(BaseModel): @@ -44,7 +56,7 @@ class SAMLSaaSApp(BaseModel): created_at: Optional[datetime] = None - custom_attributes: Optional[CustomAttributes] = None + custom_attributes: Optional[List[CustomAttribute]] = None default_relay_state: Optional[str] = None """ diff --git a/src/cloudflare/types/zero_trust/access/saml_saas_app_param.py b/src/cloudflare/types/zero_trust/access/saml_saas_app_param.py index 8eace9c0634..34f1827a5a0 100644 --- a/src/cloudflare/types/zero_trust/access/saml_saas_app_param.py +++ b/src/cloudflare/types/zero_trust/access/saml_saas_app_param.py @@ -2,29 +2,40 @@ from __future__ import annotations +from typing import Dict, Iterable from typing_extensions import Literal, TypedDict -from .saas_app_name_format import SaaSAppNameFormat -from .saas_app_source_param import SaaSAppSourceParam from .saas_app_name_id_format import SaaSAppNameIDFormat -__all__ = ["SAMLSaaSAppParam", "CustomAttributes"] +__all__ = ["SAMLSaaSAppParam", "CustomAttribute", "CustomAttributeSource"] -class CustomAttributes(TypedDict, total=False): +class CustomAttributeSource(TypedDict, total=False): + name: str + """The name of the IdP attribute.""" + + name_by_idp: Dict[str, str] + """A mapping from IdP ID to attribute name.""" + + +class CustomAttribute(TypedDict, total=False): friendly_name: str """The SAML FriendlyName of the attribute.""" name: str """The name of the attribute.""" - name_format: SaaSAppNameFormat + name_format: Literal[ + "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "urn:oasis:names:tc:SAML:2.0:attrname-format:basic", + "urn:oasis:names:tc:SAML:2.0:attrname-format:uri", + ] """A globally unique name for an identity or service provider.""" required: bool """If the attribute is required when building a SAML assertion.""" - source: SaaSAppSourceParam + source: CustomAttributeSource class SAMLSaaSAppParam(TypedDict, total=False): @@ -41,7 +52,7 @@ class SAMLSaaSAppParam(TypedDict, total=False): SAML assertion. """ - custom_attributes: CustomAttributes + custom_attributes: Iterable[CustomAttribute] default_relay_state: str """ diff --git a/src/cloudflare/types/zero_trust/access/tag_create_params.py b/src/cloudflare/types/zero_trust/access/tag_create_params.py index 6b88e56c7a1..2c4abf601d7 100644 --- a/src/cloudflare/types/zero_trust/access/tag_create_params.py +++ b/src/cloudflare/types/zero_trust/access/tag_create_params.py @@ -11,5 +11,5 @@ class TagCreateParams(TypedDict, total=False): account_id: Required[str] """Identifier""" - body: Required[str] + name: str """The name of the tag""" diff --git a/src/cloudflare/types/zero_trust/identity_provider_scim_config_param.py b/src/cloudflare/types/zero_trust/identity_provider_scim_config_param.py index 45d28d4abaa..9b75330d770 100644 --- a/src/cloudflare/types/zero_trust/identity_provider_scim_config_param.py +++ b/src/cloudflare/types/zero_trust/identity_provider_scim_config_param.py @@ -25,13 +25,6 @@ class IdentityProviderSCIMConfigParam(TypedDict, total=False): enabled. """ - secret: str - """ - A read-only token generated when the SCIM integration is enabled for the first - time. It is redacted on subsequent requests. If you lose this you will need to - refresh it token at /access/identity_providers/:idpID/refresh_scim_secret. - """ - user_deprovision: bool """ A flag to enable revoking a user's session in Access and Gateway when they have diff --git a/tests/api_resources/zero_trust/access/applications/test_cas.py b/tests/api_resources/zero_trust/access/applications/test_cas.py index 24a86014f91..0c4259ce3e3 100644 --- a/tests/api_resources/zero_trust/access/applications/test_cas.py +++ b/tests/api_resources/zero_trust/access/applications/test_cas.py @@ -25,7 +25,7 @@ def test_method_create(self, client: Cloudflare) -> None: app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="account_id", ) - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -34,7 +34,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="account_id", ) - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -47,7 +47,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ca = response.parse() - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -60,7 +60,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" ca = response.parse() - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) assert cast(Any, response.is_closed) is True @@ -214,7 +214,7 @@ def test_method_get(self, client: Cloudflare) -> None: app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="account_id", ) - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -223,7 +223,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="account_id", ) - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -236,7 +236,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ca = response.parse() - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -249,7 +249,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" ca = response.parse() - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) assert cast(Any, response.is_closed) is True @@ -285,7 +285,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="account_id", ) - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -294,7 +294,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="account_id", ) - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -307,7 +307,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ca = await response.parse() - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -320,7 +320,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" ca = await response.parse() - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) assert cast(Any, response.is_closed) is True @@ -474,7 +474,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="account_id", ) - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -483,7 +483,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="account_id", ) - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -496,7 +496,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ca = await response.parse() - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -509,7 +509,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" ca = await response.parse() - assert_matches_type(object, ca, path=["response"]) + assert_matches_type(Optional[CA], ca, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/access/test_applications.py b/tests/api_resources/zero_trust/access/test_applications.py index 5b37cb07ff0..811eae95365 100644 --- a/tests/api_resources/zero_trust/access/test_applications.py +++ b/tests/api_resources/zero_trust/access/test_applications.py @@ -236,19 +236,47 @@ def test_method_create_with_all_params_overload_2(self, client: Cloudflare) -> N saas_app={ "auth_type": "saml", "consumer_service_url": "https://example.com", - "custom_attributes": { - "friendly_name": "Last Name", - "name": "family_name", - "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", - "required": True, - "source": { - "name": "last_name", - "name_by_idp": { - "exampleIdPID1": "AttributeName1", - "exampleIdPID2": "AttributeName2", + "custom_attributes": [ + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, }, }, - }, + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, + }, + }, + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, + }, + }, + ], "default_relay_state": "https://example.com", "idp_entity_id": "https://example.cloudflareaccess.com", "name_id_format": "id", @@ -1692,19 +1720,47 @@ def test_method_update_with_all_params_overload_2(self, client: Cloudflare) -> N saas_app={ "auth_type": "saml", "consumer_service_url": "https://example.com", - "custom_attributes": { - "friendly_name": "Last Name", - "name": "family_name", - "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", - "required": True, - "source": { - "name": "last_name", - "name_by_idp": { - "exampleIdPID1": "AttributeName1", - "exampleIdPID2": "AttributeName2", + "custom_attributes": [ + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, }, }, - }, + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, + }, + }, + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, + }, + }, + ], "default_relay_state": "https://example.com", "idp_entity_id": "https://example.cloudflareaccess.com", "name_id_format": "id", @@ -3511,19 +3567,47 @@ async def test_method_create_with_all_params_overload_2(self, async_client: Asyn saas_app={ "auth_type": "saml", "consumer_service_url": "https://example.com", - "custom_attributes": { - "friendly_name": "Last Name", - "name": "family_name", - "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", - "required": True, - "source": { - "name": "last_name", - "name_by_idp": { - "exampleIdPID1": "AttributeName1", - "exampleIdPID2": "AttributeName2", + "custom_attributes": [ + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, }, }, - }, + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, + }, + }, + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, + }, + }, + ], "default_relay_state": "https://example.com", "idp_entity_id": "https://example.cloudflareaccess.com", "name_id_format": "id", @@ -4967,19 +5051,47 @@ async def test_method_update_with_all_params_overload_2(self, async_client: Asyn saas_app={ "auth_type": "saml", "consumer_service_url": "https://example.com", - "custom_attributes": { - "friendly_name": "Last Name", - "name": "family_name", - "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", - "required": True, - "source": { - "name": "last_name", - "name_by_idp": { - "exampleIdPID1": "AttributeName1", - "exampleIdPID2": "AttributeName2", + "custom_attributes": [ + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, }, }, - }, + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, + }, + }, + { + "friendly_name": "Last Name", + "name": "family_name", + "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", + "required": True, + "source": { + "name": "last_name", + "name_by_idp": { + "exampleIdPID1": "AttributeName1", + "exampleIdPID2": "AttributeName2", + }, + }, + }, + ], "default_relay_state": "https://example.com", "idp_entity_id": "https://example.cloudflareaccess.com", "name_id_format": "id", diff --git a/tests/api_resources/zero_trust/access/test_tags.py b/tests/api_resources/zero_trust/access/test_tags.py index 24674ecb4ec..26cebba1a61 100644 --- a/tests/api_resources/zero_trust/access/test_tags.py +++ b/tests/api_resources/zero_trust/access/test_tags.py @@ -22,7 +22,14 @@ class TestTags: def test_method_create(self, client: Cloudflare) -> None: tag = client.zero_trust.access.tags.create( account_id="023e105f4ecef8ad9ca31a8372d0c353", - body="engineers", + ) + assert_matches_type(Optional[Tag], tag, path=["response"]) + + @parametrize + def test_method_create_with_all_params(self, client: Cloudflare) -> None: + tag = client.zero_trust.access.tags.create( + account_id="023e105f4ecef8ad9ca31a8372d0c353", + name="engineers", ) assert_matches_type(Optional[Tag], tag, path=["response"]) @@ -30,7 +37,6 @@ def test_method_create(self, client: Cloudflare) -> None: def test_raw_response_create(self, client: Cloudflare) -> None: response = client.zero_trust.access.tags.with_raw_response.create( account_id="023e105f4ecef8ad9ca31a8372d0c353", - body="engineers", ) assert response.is_closed is True @@ -42,7 +48,6 @@ def test_raw_response_create(self, client: Cloudflare) -> None: def test_streaming_response_create(self, client: Cloudflare) -> None: with client.zero_trust.access.tags.with_streaming_response.create( account_id="023e105f4ecef8ad9ca31a8372d0c353", - body="engineers", ) as response: assert not response.is_closed assert response.http_request.headers.get("X-Stainless-Lang") == "python" @@ -57,7 +62,6 @@ def test_path_params_create(self, client: Cloudflare) -> None: with pytest.raises(ValueError, match=r"Expected a non-empty value for `account_id` but received ''"): client.zero_trust.access.tags.with_raw_response.create( account_id="", - body="engineers", ) @parametrize @@ -255,7 +259,14 @@ class TestAsyncTags: async def test_method_create(self, async_client: AsyncCloudflare) -> None: tag = await async_client.zero_trust.access.tags.create( account_id="023e105f4ecef8ad9ca31a8372d0c353", - body="engineers", + ) + assert_matches_type(Optional[Tag], tag, path=["response"]) + + @parametrize + async def test_method_create_with_all_params(self, async_client: AsyncCloudflare) -> None: + tag = await async_client.zero_trust.access.tags.create( + account_id="023e105f4ecef8ad9ca31a8372d0c353", + name="engineers", ) assert_matches_type(Optional[Tag], tag, path=["response"]) @@ -263,7 +274,6 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: response = await async_client.zero_trust.access.tags.with_raw_response.create( account_id="023e105f4ecef8ad9ca31a8372d0c353", - body="engineers", ) assert response.is_closed is True @@ -275,7 +285,6 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> None: async with async_client.zero_trust.access.tags.with_streaming_response.create( account_id="023e105f4ecef8ad9ca31a8372d0c353", - body="engineers", ) as response: assert not response.is_closed assert response.http_request.headers.get("X-Stainless-Lang") == "python" @@ -290,7 +299,6 @@ async def test_path_params_create(self, async_client: AsyncCloudflare) -> None: with pytest.raises(ValueError, match=r"Expected a non-empty value for `account_id` but received ''"): await async_client.zero_trust.access.tags.with_raw_response.create( account_id="", - body="engineers", ) @parametrize diff --git a/tests/api_resources/zero_trust/test_identity_providers.py b/tests/api_resources/zero_trust/test_identity_providers.py index ae705188fa3..7cc12686d04 100644 --- a/tests/api_resources/zero_trust/test_identity_providers.py +++ b/tests/api_resources/zero_trust/test_identity_providers.py @@ -54,7 +54,6 @@ def test_method_create_with_all_params_overload_1(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -141,7 +140,6 @@ def test_method_create_with_all_params_overload_2(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -224,7 +222,6 @@ def test_method_create_with_all_params_overload_3(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -307,7 +304,6 @@ def test_method_create_with_all_params_overload_4(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -392,7 +388,6 @@ def test_method_create_with_all_params_overload_5(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -478,7 +473,6 @@ def test_method_create_with_all_params_overload_6(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -561,7 +555,6 @@ def test_method_create_with_all_params_overload_7(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -650,7 +643,6 @@ def test_method_create_with_all_params_overload_8(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -737,7 +729,6 @@ def test_method_create_with_all_params_overload_9(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -823,7 +814,6 @@ def test_method_create_with_all_params_overload_10(self, client: Cloudflare) -> "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -909,7 +899,6 @@ def test_method_create_with_all_params_overload_11(self, client: Cloudflare) -> "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1010,7 +999,6 @@ def test_method_create_with_all_params_overload_12(self, client: Cloudflare) -> "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1093,7 +1081,6 @@ def test_method_create_with_all_params_overload_13(self, client: Cloudflare) -> "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1173,7 +1160,6 @@ def test_method_create_with_all_params_overload_14(self, client: Cloudflare) -> "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1264,7 +1250,6 @@ def test_method_update_with_all_params_overload_1(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1366,7 +1351,6 @@ def test_method_update_with_all_params_overload_2(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1464,7 +1448,6 @@ def test_method_update_with_all_params_overload_3(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1562,7 +1545,6 @@ def test_method_update_with_all_params_overload_4(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1662,7 +1644,6 @@ def test_method_update_with_all_params_overload_5(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1763,7 +1744,6 @@ def test_method_update_with_all_params_overload_6(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1861,7 +1841,6 @@ def test_method_update_with_all_params_overload_7(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -1965,7 +1944,6 @@ def test_method_update_with_all_params_overload_8(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -2067,7 +2045,6 @@ def test_method_update_with_all_params_overload_9(self, client: Cloudflare) -> N "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -2168,7 +2145,6 @@ def test_method_update_with_all_params_overload_10(self, client: Cloudflare) -> "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -2269,7 +2245,6 @@ def test_method_update_with_all_params_overload_11(self, client: Cloudflare) -> "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -2385,7 +2360,6 @@ def test_method_update_with_all_params_overload_12(self, client: Cloudflare) -> "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -2483,7 +2457,6 @@ def test_method_update_with_all_params_overload_13(self, client: Cloudflare) -> "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -2578,7 +2551,6 @@ def test_method_update_with_all_params_overload_14(self, client: Cloudflare) -> "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -2873,7 +2845,6 @@ async def test_method_create_with_all_params_overload_1(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -2960,7 +2931,6 @@ async def test_method_create_with_all_params_overload_2(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3043,7 +3013,6 @@ async def test_method_create_with_all_params_overload_3(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3126,7 +3095,6 @@ async def test_method_create_with_all_params_overload_4(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3211,7 +3179,6 @@ async def test_method_create_with_all_params_overload_5(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3297,7 +3264,6 @@ async def test_method_create_with_all_params_overload_6(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3380,7 +3346,6 @@ async def test_method_create_with_all_params_overload_7(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3469,7 +3434,6 @@ async def test_method_create_with_all_params_overload_8(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3556,7 +3520,6 @@ async def test_method_create_with_all_params_overload_9(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3642,7 +3605,6 @@ async def test_method_create_with_all_params_overload_10(self, async_client: Asy "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3728,7 +3690,6 @@ async def test_method_create_with_all_params_overload_11(self, async_client: Asy "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3829,7 +3790,6 @@ async def test_method_create_with_all_params_overload_12(self, async_client: Asy "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3912,7 +3872,6 @@ async def test_method_create_with_all_params_overload_13(self, async_client: Asy "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -3992,7 +3951,6 @@ async def test_method_create_with_all_params_overload_14(self, async_client: Asy "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -4083,7 +4041,6 @@ async def test_method_update_with_all_params_overload_1(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -4185,7 +4142,6 @@ async def test_method_update_with_all_params_overload_2(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -4283,7 +4239,6 @@ async def test_method_update_with_all_params_overload_3(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -4381,7 +4336,6 @@ async def test_method_update_with_all_params_overload_4(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -4481,7 +4435,6 @@ async def test_method_update_with_all_params_overload_5(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -4582,7 +4535,6 @@ async def test_method_update_with_all_params_overload_6(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -4680,7 +4632,6 @@ async def test_method_update_with_all_params_overload_7(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -4784,7 +4735,6 @@ async def test_method_update_with_all_params_overload_8(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -4886,7 +4836,6 @@ async def test_method_update_with_all_params_overload_9(self, async_client: Asyn "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -4987,7 +4936,6 @@ async def test_method_update_with_all_params_overload_10(self, async_client: Asy "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -5088,7 +5036,6 @@ async def test_method_update_with_all_params_overload_11(self, async_client: Asy "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -5204,7 +5151,6 @@ async def test_method_update_with_all_params_overload_12(self, async_client: Asy "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -5302,7 +5248,6 @@ async def test_method_update_with_all_params_overload_13(self, async_client: Asy "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, ) @@ -5397,7 +5342,6 @@ async def test_method_update_with_all_params_overload_14(self, async_client: Asy "enabled": True, "group_member_deprovision": True, "seat_deprovision": True, - "secret": "secret", "user_deprovision": True, }, )