From ff2f5dc939fc3b3799c875a765a91ee11bdcbd83 Mon Sep 17 00:00:00 2001
From: "stainless-app[bot]"
<142633134+stainless-app[bot]@users.noreply.github.com>
Date: Thu, 7 Nov 2024 17:33:35 +0000
Subject: [PATCH] feat(api): api update (#2129)
---
.stats.yml | 2 +-
api.md | 13 +-
.../zero_trust/access/applications/cas.py | 24 +--
.../resources/zero_trust/access/tags.py | 12 +-
.../types/zero_trust/access/__init__.py | 3 -
.../types/zero_trust/access/oidc_saas_app.py | 10 +-
.../zero_trust/access/oidc_saas_app_param.py | 12 +-
.../zero_trust/access/saas_app_name_format.py | 11 -
.../zero_trust/access/saas_app_source.py | 15 --
.../access/saas_app_source_param.py | 16 --
.../types/zero_trust/access/saml_saas_app.py | 28 ++-
.../zero_trust/access/saml_saas_app_param.py | 25 ++-
.../zero_trust/access/tag_create_params.py | 2 +-
.../identity_provider_scim_config_param.py | 7 -
.../access/applications/test_cas.py | 32 +--
.../zero_trust/access/test_applications.py | 200 ++++++++++++++----
.../zero_trust/access/test_tags.py | 24 ++-
.../zero_trust/test_identity_providers.py | 56 -----
18 files changed, 260 insertions(+), 232 deletions(-)
delete mode 100644 src/cloudflare/types/zero_trust/access/saas_app_name_format.py
delete mode 100644 src/cloudflare/types/zero_trust/access/saas_app_source.py
delete mode 100644 src/cloudflare/types/zero_trust/access/saas_app_source_param.py
diff --git a/.stats.yml b/.stats.yml
index a756722ccdf..cc2f9a62f63 100644
--- a/.stats.yml
+++ b/.stats.yml
@@ -1,2 +1,2 @@
configured_endpoints: 1397
-openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-66874390672543889c6f739266ab0e815d7c6a65deb464a2c41c965b45d3e24a.yml
+openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-eb646c11ed31a9e0730c5860d58b7ed8757c84c20012ea4e7d4a4750c8e908f2.yml
diff --git a/api.md b/api.md
index af34e305ade..c490b9016ad 100644
--- a/api.md
+++ b/api.md
@@ -5059,9 +5059,7 @@ from cloudflare.types.zero_trust.access import (
CORSHeaders,
Decision,
OIDCSaaSApp,
- SaaSAppNameFormat,
SaaSAppNameIDFormat,
- SaaSAppSource,
SAMLSaaSApp,
SCIMConfigAuthenticationHTTPBasic,
SCIMConfigAuthenticationOAuthBearerToken,
@@ -5091,20 +5089,15 @@ Methods:
Types:
```python
-from cloudflare.types.zero_trust.access.applications import (
- CA,
- CACreateResponse,
- CADeleteResponse,
- CAGetResponse,
-)
+from cloudflare.types.zero_trust.access.applications import CA, CADeleteResponse
```
Methods:
-- client.zero_trust.access.applications.cas.create(app_id, \*, account_id, zone_id) -> object
+- client.zero_trust.access.applications.cas.create(app_id, \*, account_id, zone_id) -> Optional
- client.zero_trust.access.applications.cas.list(\*, account_id, zone_id) -> SyncSinglePage[CA]
- client.zero_trust.access.applications.cas.delete(app_id, \*, account_id, zone_id) -> Optional
-- client.zero_trust.access.applications.cas.get(app_id, \*, account_id, zone_id) -> object
+- client.zero_trust.access.applications.cas.get(app_id, \*, account_id, zone_id) -> Optional
#### UserPolicyChecks
diff --git a/src/cloudflare/resources/zero_trust/access/applications/cas.py b/src/cloudflare/resources/zero_trust/access/applications/cas.py
index bb4b5452832..bc9acc32378 100644
--- a/src/cloudflare/resources/zero_trust/access/applications/cas.py
+++ b/src/cloudflare/resources/zero_trust/access/applications/cas.py
@@ -56,7 +56,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> object:
+ ) -> Optional[CA]:
"""
Generates a new short-lived certificate CA and public key.
@@ -96,9 +96,9 @@ def create(
extra_query=extra_query,
extra_body=extra_body,
timeout=timeout,
- post_parser=ResultWrapper[Optional[object]]._unwrapper,
+ post_parser=ResultWrapper[Optional[CA]]._unwrapper,
),
- cast_to=cast(Type[object], ResultWrapper[object]),
+ cast_to=cast(Type[Optional[CA]], ResultWrapper[CA]),
)
def list(
@@ -219,7 +219,7 @@ def get(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> object:
+ ) -> Optional[CA]:
"""
Fetches a short-lived certificate CA and its public key.
@@ -259,9 +259,9 @@ def get(
extra_query=extra_query,
extra_body=extra_body,
timeout=timeout,
- post_parser=ResultWrapper[Optional[object]]._unwrapper,
+ post_parser=ResultWrapper[Optional[CA]]._unwrapper,
),
- cast_to=cast(Type[object], ResultWrapper[object]),
+ cast_to=cast(Type[Optional[CA]], ResultWrapper[CA]),
)
@@ -297,7 +297,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> object:
+ ) -> Optional[CA]:
"""
Generates a new short-lived certificate CA and public key.
@@ -337,9 +337,9 @@ async def create(
extra_query=extra_query,
extra_body=extra_body,
timeout=timeout,
- post_parser=ResultWrapper[Optional[object]]._unwrapper,
+ post_parser=ResultWrapper[Optional[CA]]._unwrapper,
),
- cast_to=cast(Type[object], ResultWrapper[object]),
+ cast_to=cast(Type[Optional[CA]], ResultWrapper[CA]),
)
def list(
@@ -460,7 +460,7 @@ async def get(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> object:
+ ) -> Optional[CA]:
"""
Fetches a short-lived certificate CA and its public key.
@@ -500,9 +500,9 @@ async def get(
extra_query=extra_query,
extra_body=extra_body,
timeout=timeout,
- post_parser=ResultWrapper[Optional[object]]._unwrapper,
+ post_parser=ResultWrapper[Optional[CA]]._unwrapper,
),
- cast_to=cast(Type[object], ResultWrapper[object]),
+ cast_to=cast(Type[Optional[CA]], ResultWrapper[CA]),
)
diff --git a/src/cloudflare/resources/zero_trust/access/tags.py b/src/cloudflare/resources/zero_trust/access/tags.py
index 7c93891dcd8..7f039682cc8 100644
--- a/src/cloudflare/resources/zero_trust/access/tags.py
+++ b/src/cloudflare/resources/zero_trust/access/tags.py
@@ -53,7 +53,7 @@ def create(
self,
*,
account_id: str,
- body: str,
+ name: str | NotGiven = NOT_GIVEN,
# Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs.
# The extra values given here take precedence over values defined on the client or passed to this method.
extra_headers: Headers | None = None,
@@ -67,7 +67,7 @@ def create(
Args:
account_id: Identifier
- body: The name of the tag
+ name: The name of the tag
extra_headers: Send extra headers
@@ -81,7 +81,7 @@ def create(
raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}")
return self._post(
f"/accounts/{account_id}/access/tags",
- body=maybe_transform(body, tag_create_params.TagCreateParams),
+ body=maybe_transform({"name": name}, tag_create_params.TagCreateParams),
options=make_request_options(
extra_headers=extra_headers,
extra_query=extra_query,
@@ -289,7 +289,7 @@ async def create(
self,
*,
account_id: str,
- body: str,
+ name: str | NotGiven = NOT_GIVEN,
# Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs.
# The extra values given here take precedence over values defined on the client or passed to this method.
extra_headers: Headers | None = None,
@@ -303,7 +303,7 @@ async def create(
Args:
account_id: Identifier
- body: The name of the tag
+ name: The name of the tag
extra_headers: Send extra headers
@@ -317,7 +317,7 @@ async def create(
raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}")
return await self._post(
f"/accounts/{account_id}/access/tags",
- body=await async_maybe_transform(body, tag_create_params.TagCreateParams),
+ body=await async_maybe_transform({"name": name}, tag_create_params.TagCreateParams),
options=make_request_options(
extra_headers=extra_headers,
extra_query=extra_query,
diff --git a/src/cloudflare/types/zero_trust/access/__init__.py b/src/cloudflare/types/zero_trust/access/__init__.py
index 3db57d74aae..d4539711a03 100644
--- a/src/cloudflare/types/zero_trust/access/__init__.py
+++ b/src/cloudflare/types/zero_trust/access/__init__.py
@@ -17,7 +17,6 @@
from .allowed_headers import AllowedHeaders as AllowedHeaders
from .allowed_methods import AllowedMethods as AllowedMethods
from .allowed_origins import AllowedOrigins as AllowedOrigins
-from .saas_app_source import SaaSAppSource as SaaSAppSource
from .application_type import ApplicationType as ApplicationType
from .key_get_response import KeyGetResponse as KeyGetResponse
from .zero_trust_group import ZeroTrustGroup as ZeroTrustGroup
@@ -41,9 +40,7 @@
from .policy_create_params import PolicyCreateParams as PolicyCreateParams
from .policy_list_response import PolicyListResponse as PolicyListResponse
from .policy_update_params import PolicyUpdateParams as PolicyUpdateParams
-from .saas_app_name_format import SaaSAppNameFormat as SaaSAppNameFormat
from .group_delete_response import GroupDeleteResponse as GroupDeleteResponse
-from .saas_app_source_param import SaaSAppSourceParam as SaaSAppSourceParam
from .bookmark_create_params import BookmarkCreateParams as BookmarkCreateParams
from .bookmark_update_params import BookmarkUpdateParams as BookmarkUpdateParams
from .policy_create_response import PolicyCreateResponse as PolicyCreateResponse
diff --git a/src/cloudflare/types/zero_trust/access/oidc_saas_app.py b/src/cloudflare/types/zero_trust/access/oidc_saas_app.py
index b3e45b6e11c..d5f3046170d 100644
--- a/src/cloudflare/types/zero_trust/access/oidc_saas_app.py
+++ b/src/cloudflare/types/zero_trust/access/oidc_saas_app.py
@@ -6,10 +6,10 @@
from ...._models import BaseModel
-__all__ = ["OIDCSaaSApp", "CustomClaims", "CustomClaimsSource", "HybridAndImplicitOptions", "RefreshTokenOptions"]
+__all__ = ["OIDCSaaSApp", "CustomClaim", "CustomClaimSource", "HybridAndImplicitOptions", "RefreshTokenOptions"]
-class CustomClaimsSource(BaseModel):
+class CustomClaimSource(BaseModel):
name: Optional[str] = None
"""The name of the IdP claim."""
@@ -17,7 +17,7 @@ class CustomClaimsSource(BaseModel):
"""A mapping from IdP ID to claim name."""
-class CustomClaims(BaseModel):
+class CustomClaim(BaseModel):
name: Optional[str] = None
"""The name of the claim."""
@@ -27,7 +27,7 @@ class CustomClaims(BaseModel):
scope: Optional[Literal["groups", "profile", "email", "openid"]] = None
"""The scope of the claim."""
- source: Optional[CustomClaimsSource] = None
+ source: Optional[CustomClaimSource] = None
class HybridAndImplicitOptions(BaseModel):
@@ -77,7 +77,7 @@ class OIDCSaaSApp(BaseModel):
created_at: Optional[datetime] = None
- custom_claims: Optional[CustomClaims] = None
+ custom_claims: Optional[List[CustomClaim]] = None
grant_types: Optional[
List[Literal["authorization_code", "authorization_code_with_pkce", "refresh_tokens", "hybrid", "implicit"]]
diff --git a/src/cloudflare/types/zero_trust/access/oidc_saas_app_param.py b/src/cloudflare/types/zero_trust/access/oidc_saas_app_param.py
index 22418735dc9..b98cb430e77 100644
--- a/src/cloudflare/types/zero_trust/access/oidc_saas_app_param.py
+++ b/src/cloudflare/types/zero_trust/access/oidc_saas_app_param.py
@@ -2,13 +2,13 @@
from __future__ import annotations
-from typing import Dict, List
+from typing import Dict, List, Iterable
from typing_extensions import Literal, TypedDict
-__all__ = ["OIDCSaaSAppParam", "CustomClaims", "CustomClaimsSource", "HybridAndImplicitOptions", "RefreshTokenOptions"]
+__all__ = ["OIDCSaaSAppParam", "CustomClaim", "CustomClaimSource", "HybridAndImplicitOptions", "RefreshTokenOptions"]
-class CustomClaimsSource(TypedDict, total=False):
+class CustomClaimSource(TypedDict, total=False):
name: str
"""The name of the IdP claim."""
@@ -16,7 +16,7 @@ class CustomClaimsSource(TypedDict, total=False):
"""A mapping from IdP ID to claim name."""
-class CustomClaims(TypedDict, total=False):
+class CustomClaim(TypedDict, total=False):
name: str
"""The name of the claim."""
@@ -26,7 +26,7 @@ class CustomClaims(TypedDict, total=False):
scope: Literal["groups", "profile", "email", "openid"]
"""The scope of the claim."""
- source: CustomClaimsSource
+ source: CustomClaimSource
class HybridAndImplicitOptions(TypedDict, total=False):
@@ -74,7 +74,7 @@ class OIDCSaaSAppParam(TypedDict, total=False):
client_secret: str
"""The application client secret, only returned on POST request."""
- custom_claims: CustomClaims
+ custom_claims: Iterable[CustomClaim]
grant_types: List[
Literal["authorization_code", "authorization_code_with_pkce", "refresh_tokens", "hybrid", "implicit"]
diff --git a/src/cloudflare/types/zero_trust/access/saas_app_name_format.py b/src/cloudflare/types/zero_trust/access/saas_app_name_format.py
deleted file mode 100644
index d16a7495aba..00000000000
--- a/src/cloudflare/types/zero_trust/access/saas_app_name_format.py
+++ /dev/null
@@ -1,11 +0,0 @@
-# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
-
-from typing_extensions import Literal, TypeAlias
-
-__all__ = ["SaaSAppNameFormat"]
-
-SaaSAppNameFormat: TypeAlias = Literal[
- "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
- "urn:oasis:names:tc:SAML:2.0:attrname-format:basic",
- "urn:oasis:names:tc:SAML:2.0:attrname-format:uri",
-]
diff --git a/src/cloudflare/types/zero_trust/access/saas_app_source.py b/src/cloudflare/types/zero_trust/access/saas_app_source.py
deleted file mode 100644
index 5a4e157c195..00000000000
--- a/src/cloudflare/types/zero_trust/access/saas_app_source.py
+++ /dev/null
@@ -1,15 +0,0 @@
-# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
-
-from typing import Dict, Optional
-
-from ...._models import BaseModel
-
-__all__ = ["SaaSAppSource"]
-
-
-class SaaSAppSource(BaseModel):
- name: Optional[str] = None
- """The name of the IdP attribute."""
-
- name_by_idp: Optional[Dict[str, str]] = None
- """A mapping from IdP ID to attribute name."""
diff --git a/src/cloudflare/types/zero_trust/access/saas_app_source_param.py b/src/cloudflare/types/zero_trust/access/saas_app_source_param.py
deleted file mode 100644
index 12b4abc2d05..00000000000
--- a/src/cloudflare/types/zero_trust/access/saas_app_source_param.py
+++ /dev/null
@@ -1,16 +0,0 @@
-# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
-
-from __future__ import annotations
-
-from typing import Dict
-from typing_extensions import TypedDict
-
-__all__ = ["SaaSAppSourceParam"]
-
-
-class SaaSAppSourceParam(TypedDict, total=False):
- name: str
- """The name of the IdP attribute."""
-
- name_by_idp: Dict[str, str]
- """A mapping from IdP ID to attribute name."""
diff --git a/src/cloudflare/types/zero_trust/access/saml_saas_app.py b/src/cloudflare/types/zero_trust/access/saml_saas_app.py
index 495e76604aa..4912e03680d 100644
--- a/src/cloudflare/types/zero_trust/access/saml_saas_app.py
+++ b/src/cloudflare/types/zero_trust/access/saml_saas_app.py
@@ -1,31 +1,43 @@
# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
-from typing import Optional
+from typing import Dict, List, Optional
from datetime import datetime
from typing_extensions import Literal
from ...._models import BaseModel
-from .saas_app_source import SaaSAppSource
-from .saas_app_name_format import SaaSAppNameFormat
from .saas_app_name_id_format import SaaSAppNameIDFormat
-__all__ = ["SAMLSaaSApp", "CustomAttributes"]
+__all__ = ["SAMLSaaSApp", "CustomAttribute", "CustomAttributeSource"]
-class CustomAttributes(BaseModel):
+class CustomAttributeSource(BaseModel):
+ name: Optional[str] = None
+ """The name of the IdP attribute."""
+
+ name_by_idp: Optional[Dict[str, str]] = None
+ """A mapping from IdP ID to attribute name."""
+
+
+class CustomAttribute(BaseModel):
friendly_name: Optional[str] = None
"""The SAML FriendlyName of the attribute."""
name: Optional[str] = None
"""The name of the attribute."""
- name_format: Optional[SaaSAppNameFormat] = None
+ name_format: Optional[
+ Literal[
+ "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "urn:oasis:names:tc:SAML:2.0:attrname-format:basic",
+ "urn:oasis:names:tc:SAML:2.0:attrname-format:uri",
+ ]
+ ] = None
"""A globally unique name for an identity or service provider."""
required: Optional[bool] = None
"""If the attribute is required when building a SAML assertion."""
- source: Optional[SaaSAppSource] = None
+ source: Optional[CustomAttributeSource] = None
class SAMLSaaSApp(BaseModel):
@@ -44,7 +56,7 @@ class SAMLSaaSApp(BaseModel):
created_at: Optional[datetime] = None
- custom_attributes: Optional[CustomAttributes] = None
+ custom_attributes: Optional[List[CustomAttribute]] = None
default_relay_state: Optional[str] = None
"""
diff --git a/src/cloudflare/types/zero_trust/access/saml_saas_app_param.py b/src/cloudflare/types/zero_trust/access/saml_saas_app_param.py
index 8eace9c0634..34f1827a5a0 100644
--- a/src/cloudflare/types/zero_trust/access/saml_saas_app_param.py
+++ b/src/cloudflare/types/zero_trust/access/saml_saas_app_param.py
@@ -2,29 +2,40 @@
from __future__ import annotations
+from typing import Dict, Iterable
from typing_extensions import Literal, TypedDict
-from .saas_app_name_format import SaaSAppNameFormat
-from .saas_app_source_param import SaaSAppSourceParam
from .saas_app_name_id_format import SaaSAppNameIDFormat
-__all__ = ["SAMLSaaSAppParam", "CustomAttributes"]
+__all__ = ["SAMLSaaSAppParam", "CustomAttribute", "CustomAttributeSource"]
-class CustomAttributes(TypedDict, total=False):
+class CustomAttributeSource(TypedDict, total=False):
+ name: str
+ """The name of the IdP attribute."""
+
+ name_by_idp: Dict[str, str]
+ """A mapping from IdP ID to attribute name."""
+
+
+class CustomAttribute(TypedDict, total=False):
friendly_name: str
"""The SAML FriendlyName of the attribute."""
name: str
"""The name of the attribute."""
- name_format: SaaSAppNameFormat
+ name_format: Literal[
+ "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "urn:oasis:names:tc:SAML:2.0:attrname-format:basic",
+ "urn:oasis:names:tc:SAML:2.0:attrname-format:uri",
+ ]
"""A globally unique name for an identity or service provider."""
required: bool
"""If the attribute is required when building a SAML assertion."""
- source: SaaSAppSourceParam
+ source: CustomAttributeSource
class SAMLSaaSAppParam(TypedDict, total=False):
@@ -41,7 +52,7 @@ class SAMLSaaSAppParam(TypedDict, total=False):
SAML assertion.
"""
- custom_attributes: CustomAttributes
+ custom_attributes: Iterable[CustomAttribute]
default_relay_state: str
"""
diff --git a/src/cloudflare/types/zero_trust/access/tag_create_params.py b/src/cloudflare/types/zero_trust/access/tag_create_params.py
index 6b88e56c7a1..2c4abf601d7 100644
--- a/src/cloudflare/types/zero_trust/access/tag_create_params.py
+++ b/src/cloudflare/types/zero_trust/access/tag_create_params.py
@@ -11,5 +11,5 @@ class TagCreateParams(TypedDict, total=False):
account_id: Required[str]
"""Identifier"""
- body: Required[str]
+ name: str
"""The name of the tag"""
diff --git a/src/cloudflare/types/zero_trust/identity_provider_scim_config_param.py b/src/cloudflare/types/zero_trust/identity_provider_scim_config_param.py
index 45d28d4abaa..9b75330d770 100644
--- a/src/cloudflare/types/zero_trust/identity_provider_scim_config_param.py
+++ b/src/cloudflare/types/zero_trust/identity_provider_scim_config_param.py
@@ -25,13 +25,6 @@ class IdentityProviderSCIMConfigParam(TypedDict, total=False):
enabled.
"""
- secret: str
- """
- A read-only token generated when the SCIM integration is enabled for the first
- time. It is redacted on subsequent requests. If you lose this you will need to
- refresh it token at /access/identity_providers/:idpID/refresh_scim_secret.
- """
-
user_deprovision: bool
"""
A flag to enable revoking a user's session in Access and Gateway when they have
diff --git a/tests/api_resources/zero_trust/access/applications/test_cas.py b/tests/api_resources/zero_trust/access/applications/test_cas.py
index 24a86014f91..0c4259ce3e3 100644
--- a/tests/api_resources/zero_trust/access/applications/test_cas.py
+++ b/tests/api_resources/zero_trust/access/applications/test_cas.py
@@ -25,7 +25,7 @@ def test_method_create(self, client: Cloudflare) -> None:
app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="account_id",
)
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -34,7 +34,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None:
app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="account_id",
)
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -47,7 +47,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
ca = response.parse()
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -60,7 +60,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
ca = response.parse()
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -214,7 +214,7 @@ def test_method_get(self, client: Cloudflare) -> None:
app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="account_id",
)
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -223,7 +223,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None:
app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="account_id",
)
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -236,7 +236,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
ca = response.parse()
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -249,7 +249,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
ca = response.parse()
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -285,7 +285,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None:
app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="account_id",
)
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -294,7 +294,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare
app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="account_id",
)
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -307,7 +307,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
ca = await response.parse()
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -320,7 +320,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) ->
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
ca = await response.parse()
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -474,7 +474,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None:
app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="account_id",
)
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -483,7 +483,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) -
app_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="account_id",
)
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -496,7 +496,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
ca = await response.parse()
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -509,7 +509,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
ca = await response.parse()
- assert_matches_type(object, ca, path=["response"])
+ assert_matches_type(Optional[CA], ca, path=["response"])
assert cast(Any, response.is_closed) is True
diff --git a/tests/api_resources/zero_trust/access/test_applications.py b/tests/api_resources/zero_trust/access/test_applications.py
index 5b37cb07ff0..811eae95365 100644
--- a/tests/api_resources/zero_trust/access/test_applications.py
+++ b/tests/api_resources/zero_trust/access/test_applications.py
@@ -236,19 +236,47 @@ def test_method_create_with_all_params_overload_2(self, client: Cloudflare) -> N
saas_app={
"auth_type": "saml",
"consumer_service_url": "https://example.com",
- "custom_attributes": {
- "friendly_name": "Last Name",
- "name": "family_name",
- "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
- "required": True,
- "source": {
- "name": "last_name",
- "name_by_idp": {
- "exampleIdPID1": "AttributeName1",
- "exampleIdPID2": "AttributeName2",
+ "custom_attributes": [
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
},
},
- },
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
+ },
+ },
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
+ },
+ },
+ ],
"default_relay_state": "https://example.com",
"idp_entity_id": "https://example.cloudflareaccess.com",
"name_id_format": "id",
@@ -1692,19 +1720,47 @@ def test_method_update_with_all_params_overload_2(self, client: Cloudflare) -> N
saas_app={
"auth_type": "saml",
"consumer_service_url": "https://example.com",
- "custom_attributes": {
- "friendly_name": "Last Name",
- "name": "family_name",
- "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
- "required": True,
- "source": {
- "name": "last_name",
- "name_by_idp": {
- "exampleIdPID1": "AttributeName1",
- "exampleIdPID2": "AttributeName2",
+ "custom_attributes": [
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
},
},
- },
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
+ },
+ },
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
+ },
+ },
+ ],
"default_relay_state": "https://example.com",
"idp_entity_id": "https://example.cloudflareaccess.com",
"name_id_format": "id",
@@ -3511,19 +3567,47 @@ async def test_method_create_with_all_params_overload_2(self, async_client: Asyn
saas_app={
"auth_type": "saml",
"consumer_service_url": "https://example.com",
- "custom_attributes": {
- "friendly_name": "Last Name",
- "name": "family_name",
- "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
- "required": True,
- "source": {
- "name": "last_name",
- "name_by_idp": {
- "exampleIdPID1": "AttributeName1",
- "exampleIdPID2": "AttributeName2",
+ "custom_attributes": [
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
},
},
- },
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
+ },
+ },
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
+ },
+ },
+ ],
"default_relay_state": "https://example.com",
"idp_entity_id": "https://example.cloudflareaccess.com",
"name_id_format": "id",
@@ -4967,19 +5051,47 @@ async def test_method_update_with_all_params_overload_2(self, async_client: Asyn
saas_app={
"auth_type": "saml",
"consumer_service_url": "https://example.com",
- "custom_attributes": {
- "friendly_name": "Last Name",
- "name": "family_name",
- "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
- "required": True,
- "source": {
- "name": "last_name",
- "name_by_idp": {
- "exampleIdPID1": "AttributeName1",
- "exampleIdPID2": "AttributeName2",
+ "custom_attributes": [
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
},
},
- },
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
+ },
+ },
+ {
+ "friendly_name": "Last Name",
+ "name": "family_name",
+ "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified",
+ "required": True,
+ "source": {
+ "name": "last_name",
+ "name_by_idp": {
+ "exampleIdPID1": "AttributeName1",
+ "exampleIdPID2": "AttributeName2",
+ },
+ },
+ },
+ ],
"default_relay_state": "https://example.com",
"idp_entity_id": "https://example.cloudflareaccess.com",
"name_id_format": "id",
diff --git a/tests/api_resources/zero_trust/access/test_tags.py b/tests/api_resources/zero_trust/access/test_tags.py
index 24674ecb4ec..26cebba1a61 100644
--- a/tests/api_resources/zero_trust/access/test_tags.py
+++ b/tests/api_resources/zero_trust/access/test_tags.py
@@ -22,7 +22,14 @@ class TestTags:
def test_method_create(self, client: Cloudflare) -> None:
tag = client.zero_trust.access.tags.create(
account_id="023e105f4ecef8ad9ca31a8372d0c353",
- body="engineers",
+ )
+ assert_matches_type(Optional[Tag], tag, path=["response"])
+
+ @parametrize
+ def test_method_create_with_all_params(self, client: Cloudflare) -> None:
+ tag = client.zero_trust.access.tags.create(
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
+ name="engineers",
)
assert_matches_type(Optional[Tag], tag, path=["response"])
@@ -30,7 +37,6 @@ def test_method_create(self, client: Cloudflare) -> None:
def test_raw_response_create(self, client: Cloudflare) -> None:
response = client.zero_trust.access.tags.with_raw_response.create(
account_id="023e105f4ecef8ad9ca31a8372d0c353",
- body="engineers",
)
assert response.is_closed is True
@@ -42,7 +48,6 @@ def test_raw_response_create(self, client: Cloudflare) -> None:
def test_streaming_response_create(self, client: Cloudflare) -> None:
with client.zero_trust.access.tags.with_streaming_response.create(
account_id="023e105f4ecef8ad9ca31a8372d0c353",
- body="engineers",
) as response:
assert not response.is_closed
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
@@ -57,7 +62,6 @@ def test_path_params_create(self, client: Cloudflare) -> None:
with pytest.raises(ValueError, match=r"Expected a non-empty value for `account_id` but received ''"):
client.zero_trust.access.tags.with_raw_response.create(
account_id="",
- body="engineers",
)
@parametrize
@@ -255,7 +259,14 @@ class TestAsyncTags:
async def test_method_create(self, async_client: AsyncCloudflare) -> None:
tag = await async_client.zero_trust.access.tags.create(
account_id="023e105f4ecef8ad9ca31a8372d0c353",
- body="engineers",
+ )
+ assert_matches_type(Optional[Tag], tag, path=["response"])
+
+ @parametrize
+ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare) -> None:
+ tag = await async_client.zero_trust.access.tags.create(
+ account_id="023e105f4ecef8ad9ca31a8372d0c353",
+ name="engineers",
)
assert_matches_type(Optional[Tag], tag, path=["response"])
@@ -263,7 +274,6 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None:
async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None:
response = await async_client.zero_trust.access.tags.with_raw_response.create(
account_id="023e105f4ecef8ad9ca31a8372d0c353",
- body="engineers",
)
assert response.is_closed is True
@@ -275,7 +285,6 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None:
async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> None:
async with async_client.zero_trust.access.tags.with_streaming_response.create(
account_id="023e105f4ecef8ad9ca31a8372d0c353",
- body="engineers",
) as response:
assert not response.is_closed
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
@@ -290,7 +299,6 @@ async def test_path_params_create(self, async_client: AsyncCloudflare) -> None:
with pytest.raises(ValueError, match=r"Expected a non-empty value for `account_id` but received ''"):
await async_client.zero_trust.access.tags.with_raw_response.create(
account_id="",
- body="engineers",
)
@parametrize
diff --git a/tests/api_resources/zero_trust/test_identity_providers.py b/tests/api_resources/zero_trust/test_identity_providers.py
index ae705188fa3..7cc12686d04 100644
--- a/tests/api_resources/zero_trust/test_identity_providers.py
+++ b/tests/api_resources/zero_trust/test_identity_providers.py
@@ -54,7 +54,6 @@ def test_method_create_with_all_params_overload_1(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -141,7 +140,6 @@ def test_method_create_with_all_params_overload_2(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -224,7 +222,6 @@ def test_method_create_with_all_params_overload_3(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -307,7 +304,6 @@ def test_method_create_with_all_params_overload_4(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -392,7 +388,6 @@ def test_method_create_with_all_params_overload_5(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -478,7 +473,6 @@ def test_method_create_with_all_params_overload_6(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -561,7 +555,6 @@ def test_method_create_with_all_params_overload_7(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -650,7 +643,6 @@ def test_method_create_with_all_params_overload_8(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -737,7 +729,6 @@ def test_method_create_with_all_params_overload_9(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -823,7 +814,6 @@ def test_method_create_with_all_params_overload_10(self, client: Cloudflare) ->
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -909,7 +899,6 @@ def test_method_create_with_all_params_overload_11(self, client: Cloudflare) ->
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1010,7 +999,6 @@ def test_method_create_with_all_params_overload_12(self, client: Cloudflare) ->
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1093,7 +1081,6 @@ def test_method_create_with_all_params_overload_13(self, client: Cloudflare) ->
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1173,7 +1160,6 @@ def test_method_create_with_all_params_overload_14(self, client: Cloudflare) ->
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1264,7 +1250,6 @@ def test_method_update_with_all_params_overload_1(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1366,7 +1351,6 @@ def test_method_update_with_all_params_overload_2(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1464,7 +1448,6 @@ def test_method_update_with_all_params_overload_3(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1562,7 +1545,6 @@ def test_method_update_with_all_params_overload_4(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1662,7 +1644,6 @@ def test_method_update_with_all_params_overload_5(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1763,7 +1744,6 @@ def test_method_update_with_all_params_overload_6(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1861,7 +1841,6 @@ def test_method_update_with_all_params_overload_7(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -1965,7 +1944,6 @@ def test_method_update_with_all_params_overload_8(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -2067,7 +2045,6 @@ def test_method_update_with_all_params_overload_9(self, client: Cloudflare) -> N
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -2168,7 +2145,6 @@ def test_method_update_with_all_params_overload_10(self, client: Cloudflare) ->
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -2269,7 +2245,6 @@ def test_method_update_with_all_params_overload_11(self, client: Cloudflare) ->
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -2385,7 +2360,6 @@ def test_method_update_with_all_params_overload_12(self, client: Cloudflare) ->
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -2483,7 +2457,6 @@ def test_method_update_with_all_params_overload_13(self, client: Cloudflare) ->
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -2578,7 +2551,6 @@ def test_method_update_with_all_params_overload_14(self, client: Cloudflare) ->
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -2873,7 +2845,6 @@ async def test_method_create_with_all_params_overload_1(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -2960,7 +2931,6 @@ async def test_method_create_with_all_params_overload_2(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3043,7 +3013,6 @@ async def test_method_create_with_all_params_overload_3(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3126,7 +3095,6 @@ async def test_method_create_with_all_params_overload_4(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3211,7 +3179,6 @@ async def test_method_create_with_all_params_overload_5(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3297,7 +3264,6 @@ async def test_method_create_with_all_params_overload_6(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3380,7 +3346,6 @@ async def test_method_create_with_all_params_overload_7(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3469,7 +3434,6 @@ async def test_method_create_with_all_params_overload_8(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3556,7 +3520,6 @@ async def test_method_create_with_all_params_overload_9(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3642,7 +3605,6 @@ async def test_method_create_with_all_params_overload_10(self, async_client: Asy
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3728,7 +3690,6 @@ async def test_method_create_with_all_params_overload_11(self, async_client: Asy
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3829,7 +3790,6 @@ async def test_method_create_with_all_params_overload_12(self, async_client: Asy
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3912,7 +3872,6 @@ async def test_method_create_with_all_params_overload_13(self, async_client: Asy
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -3992,7 +3951,6 @@ async def test_method_create_with_all_params_overload_14(self, async_client: Asy
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -4083,7 +4041,6 @@ async def test_method_update_with_all_params_overload_1(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -4185,7 +4142,6 @@ async def test_method_update_with_all_params_overload_2(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -4283,7 +4239,6 @@ async def test_method_update_with_all_params_overload_3(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -4381,7 +4336,6 @@ async def test_method_update_with_all_params_overload_4(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -4481,7 +4435,6 @@ async def test_method_update_with_all_params_overload_5(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -4582,7 +4535,6 @@ async def test_method_update_with_all_params_overload_6(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -4680,7 +4632,6 @@ async def test_method_update_with_all_params_overload_7(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -4784,7 +4735,6 @@ async def test_method_update_with_all_params_overload_8(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -4886,7 +4836,6 @@ async def test_method_update_with_all_params_overload_9(self, async_client: Asyn
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -4987,7 +4936,6 @@ async def test_method_update_with_all_params_overload_10(self, async_client: Asy
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -5088,7 +5036,6 @@ async def test_method_update_with_all_params_overload_11(self, async_client: Asy
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -5204,7 +5151,6 @@ async def test_method_update_with_all_params_overload_12(self, async_client: Asy
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -5302,7 +5248,6 @@ async def test_method_update_with_all_params_overload_13(self, async_client: Asy
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)
@@ -5397,7 +5342,6 @@ async def test_method_update_with_all_params_overload_14(self, async_client: Asy
"enabled": True,
"group_member_deprovision": True,
"seat_deprovision": True,
- "secret": "secret",
"user_deprovision": True,
},
)