From 2dc376ed1effac78c98bf1f781ea86f368f931ab Mon Sep 17 00:00:00 2001
From: "stainless-app[bot]"
<142633134+stainless-app[bot]@users.noreply.github.com>
Date: Tue, 7 May 2024 05:24:04 +0000
Subject: [PATCH] feat(api): update via SDK Studio (#477)
---
api.md | 9 +-
.../zero_trust/identity_providers.py | 164 ++---
src/cloudflare/types/zero_trust/__init__.py | 4 +-
.../identity_provider_create_response.py | 588 ++++++++++++++++++
...r.py => identity_provider_get_response.py} | 4 +-
.../identity_provider_update_response.py | 588 ++++++++++++++++++
.../zero_trust/test_identity_providers.py | 468 +++++++-------
7 files changed, 1505 insertions(+), 320 deletions(-)
create mode 100644 src/cloudflare/types/zero_trust/identity_provider_create_response.py
rename src/cloudflare/types/zero_trust/{identity_provider.py => identity_provider_get_response.py} (99%)
create mode 100644 src/cloudflare/types/zero_trust/identity_provider_update_response.py
diff --git a/api.md b/api.md
index 876bb0d3509..195fbc3c5e3 100644
--- a/api.md
+++ b/api.md
@@ -5008,18 +5008,21 @@ from cloudflare.types.zero_trust import (
IdentityProvider,
IdentityProviderType,
ScimConfig,
+ IdentityProviderCreateResponse,
+ IdentityProviderUpdateResponse,
IdentityProviderListResponse,
IdentityProviderDeleteResponse,
+ IdentityProviderGetResponse,
)
```
Methods:
-- client.zero_trust.identity_providers.create(\*, account_id, zone_id, \*\*params) -> Optional
-- client.zero_trust.identity_providers.update(uuid, \*, account_id, zone_id, \*\*params) -> Optional
+- client.zero_trust.identity_providers.create(\*, account_id, zone_id, \*\*params) -> Optional
+- client.zero_trust.identity_providers.update(uuid, \*, account_id, zone_id, \*\*params) -> Optional
- client.zero_trust.identity_providers.list(\*, account_id, zone_id) -> SyncSinglePage[IdentityProviderListResponse]
- client.zero_trust.identity_providers.delete(uuid, \*, account_id, zone_id) -> Optional
-- client.zero_trust.identity_providers.get(uuid, \*, account_id, zone_id) -> Optional
+- client.zero_trust.identity_providers.get(uuid, \*, account_id, zone_id) -> Optional
## Organizations
diff --git a/src/cloudflare/resources/zero_trust/identity_providers.py b/src/cloudflare/resources/zero_trust/identity_providers.py
index 3e9508b349d..ea66fb7f8a9 100644
--- a/src/cloudflare/resources/zero_trust/identity_providers.py
+++ b/src/cloudflare/resources/zero_trust/identity_providers.py
@@ -31,12 +31,14 @@
identity_provider_create_params,
identity_provider_update_params,
)
-from ...types.zero_trust.identity_provider import IdentityProvider
from ...types.zero_trust.scim_config_param import ScimConfigParam
from ...types.zero_trust.identity_provider_type import IdentityProviderType
from ...types.zero_trust.generic_oauth_config_param import GenericOAuthConfigParam
+from ...types.zero_trust.identity_provider_get_response import IdentityProviderGetResponse
from ...types.zero_trust.identity_provider_list_response import IdentityProviderListResponse
+from ...types.zero_trust.identity_provider_create_response import IdentityProviderCreateResponse
from ...types.zero_trust.identity_provider_delete_response import IdentityProviderDeleteResponse
+from ...types.zero_trust.identity_provider_update_response import IdentityProviderUpdateResponse
__all__ = ["IdentityProvidersResource", "AsyncIdentityProvidersResource"]
@@ -66,7 +68,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -114,7 +116,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -162,7 +164,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -210,7 +212,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -258,7 +260,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -306,7 +308,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -354,7 +356,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -402,7 +404,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -450,7 +452,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -498,7 +500,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -546,7 +548,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -594,7 +596,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -642,7 +644,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -690,7 +692,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -763,7 +765,7 @@ def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
if account_id and zone_id:
raise ValueError("You cannot provide both account_id and zone_id")
@@ -777,7 +779,7 @@ def create(
account_or_zone = "zones"
account_or_zone_id = zone_id
return cast(
- Optional[IdentityProvider],
+ Optional[IdentityProviderCreateResponse],
self._post(
f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers",
body=maybe_transform(
@@ -794,10 +796,10 @@ def create(
extra_query=extra_query,
extra_body=extra_body,
timeout=timeout,
- post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper,
+ post_parser=ResultWrapper[Optional[IdentityProviderCreateResponse]]._unwrapper,
),
cast_to=cast(
- Any, ResultWrapper[IdentityProvider]
+ Any, ResultWrapper[IdentityProviderCreateResponse]
), # Union types cannot be passed in as arguments in the type system
),
)
@@ -819,7 +821,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -870,7 +872,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -921,7 +923,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -972,7 +974,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1023,7 +1025,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1074,7 +1076,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1125,7 +1127,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1176,7 +1178,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1227,7 +1229,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1278,7 +1280,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1329,7 +1331,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1380,7 +1382,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1431,7 +1433,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1482,7 +1484,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -1558,7 +1560,7 @@ def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
if not uuid:
raise ValueError(f"Expected a non-empty value for `uuid` but received {uuid!r}")
if account_id and zone_id:
@@ -1574,7 +1576,7 @@ def update(
account_or_zone = "zones"
account_or_zone_id = zone_id
return cast(
- Optional[IdentityProvider],
+ Optional[IdentityProviderUpdateResponse],
self._put(
f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}",
body=maybe_transform(
@@ -1591,10 +1593,10 @@ def update(
extra_query=extra_query,
extra_body=extra_body,
timeout=timeout,
- post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper,
+ post_parser=ResultWrapper[Optional[IdentityProviderUpdateResponse]]._unwrapper,
),
cast_to=cast(
- Any, ResultWrapper[IdentityProvider]
+ Any, ResultWrapper[IdentityProviderUpdateResponse]
), # Union types cannot be passed in as arguments in the type system
),
)
@@ -1719,7 +1721,7 @@ def get(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderGetResponse]:
"""
Fetches a configured identity provider.
@@ -1753,7 +1755,7 @@ def get(
account_or_zone = "zones"
account_or_zone_id = zone_id
return cast(
- Optional[IdentityProvider],
+ Optional[IdentityProviderGetResponse],
self._get(
f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}",
options=make_request_options(
@@ -1761,10 +1763,10 @@ def get(
extra_query=extra_query,
extra_body=extra_body,
timeout=timeout,
- post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper,
+ post_parser=ResultWrapper[Optional[IdentityProviderGetResponse]]._unwrapper,
),
cast_to=cast(
- Any, ResultWrapper[IdentityProvider]
+ Any, ResultWrapper[IdentityProviderGetResponse]
), # Union types cannot be passed in as arguments in the type system
),
)
@@ -1795,7 +1797,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -1843,7 +1845,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -1891,7 +1893,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -1939,7 +1941,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -1987,7 +1989,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -2035,7 +2037,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -2083,7 +2085,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -2131,7 +2133,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -2179,7 +2181,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -2227,7 +2229,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -2275,7 +2277,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -2323,7 +2325,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -2371,7 +2373,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -2419,7 +2421,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
"""
Adds a new identity provider to Access.
@@ -2492,7 +2494,7 @@ async def create(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderCreateResponse]:
if account_id and zone_id:
raise ValueError("You cannot provide both account_id and zone_id")
@@ -2506,7 +2508,7 @@ async def create(
account_or_zone = "zones"
account_or_zone_id = zone_id
return cast(
- Optional[IdentityProvider],
+ Optional[IdentityProviderCreateResponse],
await self._post(
f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers",
body=await async_maybe_transform(
@@ -2523,10 +2525,10 @@ async def create(
extra_query=extra_query,
extra_body=extra_body,
timeout=timeout,
- post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper,
+ post_parser=ResultWrapper[Optional[IdentityProviderCreateResponse]]._unwrapper,
),
cast_to=cast(
- Any, ResultWrapper[IdentityProvider]
+ Any, ResultWrapper[IdentityProviderCreateResponse]
), # Union types cannot be passed in as arguments in the type system
),
)
@@ -2548,7 +2550,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -2599,7 +2601,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -2650,7 +2652,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -2701,7 +2703,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -2752,7 +2754,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -2803,7 +2805,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -2854,7 +2856,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -2905,7 +2907,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -2956,7 +2958,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -3007,7 +3009,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -3058,7 +3060,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -3109,7 +3111,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -3160,7 +3162,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -3211,7 +3213,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
"""
Updates a configured identity provider.
@@ -3287,7 +3289,7 @@ async def update(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderUpdateResponse]:
if not uuid:
raise ValueError(f"Expected a non-empty value for `uuid` but received {uuid!r}")
if account_id and zone_id:
@@ -3303,7 +3305,7 @@ async def update(
account_or_zone = "zones"
account_or_zone_id = zone_id
return cast(
- Optional[IdentityProvider],
+ Optional[IdentityProviderUpdateResponse],
await self._put(
f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}",
body=await async_maybe_transform(
@@ -3320,10 +3322,10 @@ async def update(
extra_query=extra_query,
extra_body=extra_body,
timeout=timeout,
- post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper,
+ post_parser=ResultWrapper[Optional[IdentityProviderUpdateResponse]]._unwrapper,
),
cast_to=cast(
- Any, ResultWrapper[IdentityProvider]
+ Any, ResultWrapper[IdentityProviderUpdateResponse]
), # Union types cannot be passed in as arguments in the type system
),
)
@@ -3448,7 +3450,7 @@ async def get(
extra_query: Query | None = None,
extra_body: Body | None = None,
timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN,
- ) -> Optional[IdentityProvider]:
+ ) -> Optional[IdentityProviderGetResponse]:
"""
Fetches a configured identity provider.
@@ -3482,7 +3484,7 @@ async def get(
account_or_zone = "zones"
account_or_zone_id = zone_id
return cast(
- Optional[IdentityProvider],
+ Optional[IdentityProviderGetResponse],
await self._get(
f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}",
options=make_request_options(
@@ -3490,10 +3492,10 @@ async def get(
extra_query=extra_query,
extra_body=extra_body,
timeout=timeout,
- post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper,
+ post_parser=ResultWrapper[Optional[IdentityProviderGetResponse]]._unwrapper,
),
cast_to=cast(
- Any, ResultWrapper[IdentityProvider]
+ Any, ResultWrapper[IdentityProviderGetResponse]
), # Union types cannot be passed in as arguments in the type system
),
)
diff --git a/src/cloudflare/types/zero_trust/__init__.py b/src/cloudflare/types/zero_trust/__init__.py
index fe2de93ed13..5d13447e38c 100644
--- a/src/cloudflare/types/zero_trust/__init__.py
+++ b/src/cloudflare/types/zero_trust/__init__.py
@@ -31,7 +31,6 @@
from .access_rule_param import AccessRuleParam as AccessRuleParam
from .domain_rule_param import DomainRuleParam as DomainRuleParam
from .gsuite_group_rule import GSuiteGroupRule as GSuiteGroupRule
-from .identity_provider import IdentityProvider as IdentityProvider
from .scim_config_param import ScimConfigParam as ScimConfigParam
from .country_rule_param import CountryRuleParam as CountryRuleParam
from .ip_list_rule_param import IPListRuleParam as IPListRuleParam
@@ -74,6 +73,7 @@
from .any_valid_service_token_rule import AnyValidServiceTokenRule as AnyValidServiceTokenRule
from .external_evaluation_rule_param import ExternalEvaluationRuleParam as ExternalEvaluationRuleParam
from .github_organization_rule_param import GitHubOrganizationRuleParam as GitHubOrganizationRuleParam
+from .identity_provider_get_response import IdentityProviderGetResponse as IdentityProviderGetResponse
from .identity_provider_create_params import IdentityProviderCreateParams as IdentityProviderCreateParams
from .identity_provider_list_response import IdentityProviderListResponse as IdentityProviderListResponse
from .identity_provider_update_params import IdentityProviderUpdateParams as IdentityProviderUpdateParams
@@ -82,7 +82,9 @@
from .connectivity_setting_edit_params import ConnectivitySettingEditParams as ConnectivitySettingEditParams
from .organization_revoke_users_params import OrganizationRevokeUsersParams as OrganizationRevokeUsersParams
from .connectivity_setting_get_response import ConnectivitySettingGetResponse as ConnectivitySettingGetResponse
+from .identity_provider_create_response import IdentityProviderCreateResponse as IdentityProviderCreateResponse
from .identity_provider_delete_response import IdentityProviderDeleteResponse as IdentityProviderDeleteResponse
+from .identity_provider_update_response import IdentityProviderUpdateResponse as IdentityProviderUpdateResponse
from .any_valid_service_token_rule_param import AnyValidServiceTokenRuleParam as AnyValidServiceTokenRuleParam
from .connectivity_setting_edit_response import ConnectivitySettingEditResponse as ConnectivitySettingEditResponse
from .organization_revoke_users_response import OrganizationRevokeUsersResponse as OrganizationRevokeUsersResponse
diff --git a/src/cloudflare/types/zero_trust/identity_provider_create_response.py b/src/cloudflare/types/zero_trust/identity_provider_create_response.py
new file mode 100644
index 00000000000..bf1f94e8cc4
--- /dev/null
+++ b/src/cloudflare/types/zero_trust/identity_provider_create_response.py
@@ -0,0 +1,588 @@
+# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
+
+from typing import List, Union, Optional
+
+from .azure_ad import AzureAD
+from ..._models import BaseModel
+from .scim_config import ScimConfig
+from .generic_oauth_config import GenericOAuthConfig
+from .identity_provider_type import IdentityProviderType
+
+__all__ = [
+ "IdentityProviderCreateResponse",
+ "AccessCentrify",
+ "AccessCentrifyConfig",
+ "AccessFacebook",
+ "AccessGitHub",
+ "AccessGoogle",
+ "AccessGoogleConfig",
+ "AccessGoogleApps",
+ "AccessGoogleAppsConfig",
+ "AccessLinkedin",
+ "AccessOIDC",
+ "AccessOIDCConfig",
+ "AccessOkta",
+ "AccessOktaConfig",
+ "AccessOnelogin",
+ "AccessOneloginConfig",
+ "AccessPingone",
+ "AccessPingoneConfig",
+ "AccessSAML",
+ "AccessSAMLConfig",
+ "AccessSAMLConfigHeaderAttribute",
+ "AccessYandex",
+ "AccessOnetimepin",
+]
+
+
+class AccessCentrifyConfig(BaseModel):
+ centrify_account: Optional[str] = None
+ """Your centrify account url"""
+
+ centrify_app_id: Optional[str] = None
+ """Your centrify app id"""
+
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+
+class AccessCentrify(BaseModel):
+ config: AccessCentrifyConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessFacebook(BaseModel):
+ config: GenericOAuthConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessGitHub(BaseModel):
+ config: GenericOAuthConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessGoogleConfig(BaseModel):
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+
+class AccessGoogle(BaseModel):
+ config: AccessGoogleConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessGoogleAppsConfig(BaseModel):
+ apps_domain: Optional[str] = None
+ """Your companies TLD"""
+
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+
+class AccessGoogleApps(BaseModel):
+ config: AccessGoogleAppsConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessLinkedin(BaseModel):
+ config: GenericOAuthConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessOIDCConfig(BaseModel):
+ auth_url: Optional[str] = None
+ """The authorization_endpoint URL of your IdP"""
+
+ certs_url: Optional[str] = None
+ """The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens"""
+
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+ scopes: Optional[List[str]] = None
+ """OAuth scopes"""
+
+ token_url: Optional[str] = None
+ """The token_endpoint URL of your IdP"""
+
+
+class AccessOIDC(BaseModel):
+ config: AccessOIDCConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessOktaConfig(BaseModel):
+ authorization_server_id: Optional[str] = None
+ """Your okta authorization server id"""
+
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+ okta_account: Optional[str] = None
+ """Your okta account url"""
+
+
+class AccessOkta(BaseModel):
+ config: AccessOktaConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessOneloginConfig(BaseModel):
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+ onelogin_account: Optional[str] = None
+ """Your OneLogin account url"""
+
+
+class AccessOnelogin(BaseModel):
+ config: AccessOneloginConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessPingoneConfig(BaseModel):
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+ ping_env_id: Optional[str] = None
+ """Your PingOne environment identifier"""
+
+
+class AccessPingone(BaseModel):
+ config: AccessPingoneConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessSAMLConfigHeaderAttribute(BaseModel):
+ attribute_name: Optional[str] = None
+ """attribute name from the IDP"""
+
+ header_name: Optional[str] = None
+ """header that will be added on the request to the origin"""
+
+
+class AccessSAMLConfig(BaseModel):
+ attributes: Optional[List[str]] = None
+ """
+ A list of SAML attribute names that will be added to your signed JWT token and
+ can be used in SAML policy rules.
+ """
+
+ email_attribute_name: Optional[str] = None
+ """The attribute name for email in the SAML response."""
+
+ header_attributes: Optional[List[AccessSAMLConfigHeaderAttribute]] = None
+ """
+ Add a list of attribute names that will be returned in the response header from
+ the Access callback.
+ """
+
+ idp_public_certs: Optional[List[str]] = None
+ """X509 certificate to verify the signature in the SAML authentication response"""
+
+ issuer_url: Optional[str] = None
+ """IdP Entity ID or Issuer URL"""
+
+ sign_request: Optional[bool] = None
+ """Sign the SAML authentication request with Access credentials.
+
+ To verify the signature, use the public key from the Access certs endpoints.
+ """
+
+ sso_target_url: Optional[str] = None
+ """URL to send the SAML authentication requests to"""
+
+
+class AccessSAML(BaseModel):
+ config: AccessSAMLConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessYandex(BaseModel):
+ config: GenericOAuthConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessOnetimepin(BaseModel):
+ config: object
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+IdentityProviderCreateResponse = Union[
+ AzureAD,
+ AccessCentrify,
+ AccessFacebook,
+ AccessGitHub,
+ AccessGoogle,
+ AccessGoogleApps,
+ AccessLinkedin,
+ AccessOIDC,
+ AccessOkta,
+ AccessOnelogin,
+ AccessPingone,
+ AccessSAML,
+ AccessYandex,
+ AccessOnetimepin,
+]
diff --git a/src/cloudflare/types/zero_trust/identity_provider.py b/src/cloudflare/types/zero_trust/identity_provider_get_response.py
similarity index 99%
rename from src/cloudflare/types/zero_trust/identity_provider.py
rename to src/cloudflare/types/zero_trust/identity_provider_get_response.py
index 6731d7bc439..2ad98f250b5 100644
--- a/src/cloudflare/types/zero_trust/identity_provider.py
+++ b/src/cloudflare/types/zero_trust/identity_provider_get_response.py
@@ -9,7 +9,7 @@
from .identity_provider_type import IdentityProviderType
__all__ = [
- "IdentityProvider",
+ "IdentityProviderGetResponse",
"AccessCentrify",
"AccessCentrifyConfig",
"AccessFacebook",
@@ -570,7 +570,7 @@ class AccessOnetimepin(BaseModel):
"""
-IdentityProvider = Union[
+IdentityProviderGetResponse = Union[
AzureAD,
AccessCentrify,
AccessFacebook,
diff --git a/src/cloudflare/types/zero_trust/identity_provider_update_response.py b/src/cloudflare/types/zero_trust/identity_provider_update_response.py
new file mode 100644
index 00000000000..21f2aa100d7
--- /dev/null
+++ b/src/cloudflare/types/zero_trust/identity_provider_update_response.py
@@ -0,0 +1,588 @@
+# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
+
+from typing import List, Union, Optional
+
+from .azure_ad import AzureAD
+from ..._models import BaseModel
+from .scim_config import ScimConfig
+from .generic_oauth_config import GenericOAuthConfig
+from .identity_provider_type import IdentityProviderType
+
+__all__ = [
+ "IdentityProviderUpdateResponse",
+ "AccessCentrify",
+ "AccessCentrifyConfig",
+ "AccessFacebook",
+ "AccessGitHub",
+ "AccessGoogle",
+ "AccessGoogleConfig",
+ "AccessGoogleApps",
+ "AccessGoogleAppsConfig",
+ "AccessLinkedin",
+ "AccessOIDC",
+ "AccessOIDCConfig",
+ "AccessOkta",
+ "AccessOktaConfig",
+ "AccessOnelogin",
+ "AccessOneloginConfig",
+ "AccessPingone",
+ "AccessPingoneConfig",
+ "AccessSAML",
+ "AccessSAMLConfig",
+ "AccessSAMLConfigHeaderAttribute",
+ "AccessYandex",
+ "AccessOnetimepin",
+]
+
+
+class AccessCentrifyConfig(BaseModel):
+ centrify_account: Optional[str] = None
+ """Your centrify account url"""
+
+ centrify_app_id: Optional[str] = None
+ """Your centrify app id"""
+
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+
+class AccessCentrify(BaseModel):
+ config: AccessCentrifyConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessFacebook(BaseModel):
+ config: GenericOAuthConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessGitHub(BaseModel):
+ config: GenericOAuthConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessGoogleConfig(BaseModel):
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+
+class AccessGoogle(BaseModel):
+ config: AccessGoogleConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessGoogleAppsConfig(BaseModel):
+ apps_domain: Optional[str] = None
+ """Your companies TLD"""
+
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+
+class AccessGoogleApps(BaseModel):
+ config: AccessGoogleAppsConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessLinkedin(BaseModel):
+ config: GenericOAuthConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessOIDCConfig(BaseModel):
+ auth_url: Optional[str] = None
+ """The authorization_endpoint URL of your IdP"""
+
+ certs_url: Optional[str] = None
+ """The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens"""
+
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+ scopes: Optional[List[str]] = None
+ """OAuth scopes"""
+
+ token_url: Optional[str] = None
+ """The token_endpoint URL of your IdP"""
+
+
+class AccessOIDC(BaseModel):
+ config: AccessOIDCConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessOktaConfig(BaseModel):
+ authorization_server_id: Optional[str] = None
+ """Your okta authorization server id"""
+
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+ okta_account: Optional[str] = None
+ """Your okta account url"""
+
+
+class AccessOkta(BaseModel):
+ config: AccessOktaConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessOneloginConfig(BaseModel):
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+ onelogin_account: Optional[str] = None
+ """Your OneLogin account url"""
+
+
+class AccessOnelogin(BaseModel):
+ config: AccessOneloginConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessPingoneConfig(BaseModel):
+ claims: Optional[List[str]] = None
+ """Custom claims"""
+
+ client_id: Optional[str] = None
+ """Your OAuth Client ID"""
+
+ client_secret: Optional[str] = None
+ """Your OAuth Client Secret"""
+
+ email_claim_name: Optional[str] = None
+ """The claim name for email in the id_token response."""
+
+ ping_env_id: Optional[str] = None
+ """Your PingOne environment identifier"""
+
+
+class AccessPingone(BaseModel):
+ config: AccessPingoneConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessSAMLConfigHeaderAttribute(BaseModel):
+ attribute_name: Optional[str] = None
+ """attribute name from the IDP"""
+
+ header_name: Optional[str] = None
+ """header that will be added on the request to the origin"""
+
+
+class AccessSAMLConfig(BaseModel):
+ attributes: Optional[List[str]] = None
+ """
+ A list of SAML attribute names that will be added to your signed JWT token and
+ can be used in SAML policy rules.
+ """
+
+ email_attribute_name: Optional[str] = None
+ """The attribute name for email in the SAML response."""
+
+ header_attributes: Optional[List[AccessSAMLConfigHeaderAttribute]] = None
+ """
+ Add a list of attribute names that will be returned in the response header from
+ the Access callback.
+ """
+
+ idp_public_certs: Optional[List[str]] = None
+ """X509 certificate to verify the signature in the SAML authentication response"""
+
+ issuer_url: Optional[str] = None
+ """IdP Entity ID or Issuer URL"""
+
+ sign_request: Optional[bool] = None
+ """Sign the SAML authentication request with Access credentials.
+
+ To verify the signature, use the public key from the Access certs endpoints.
+ """
+
+ sso_target_url: Optional[str] = None
+ """URL to send the SAML authentication requests to"""
+
+
+class AccessSAML(BaseModel):
+ config: AccessSAMLConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessYandex(BaseModel):
+ config: GenericOAuthConfig
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+class AccessOnetimepin(BaseModel):
+ config: object
+ """The configuration parameters for the identity provider.
+
+ To view the required parameters for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ name: str
+ """The name of the identity provider, shown to users on the login page."""
+
+ type: IdentityProviderType
+ """The type of identity provider.
+
+ To determine the value for a specific provider, refer to our
+ [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/).
+ """
+
+ id: Optional[str] = None
+ """UUID"""
+
+ scim_config: Optional[ScimConfig] = None
+ """
+ The configuration settings for enabling a System for Cross-Domain Identity
+ Management (SCIM) with the identity provider.
+ """
+
+
+IdentityProviderUpdateResponse = Union[
+ AzureAD,
+ AccessCentrify,
+ AccessFacebook,
+ AccessGitHub,
+ AccessGoogle,
+ AccessGoogleApps,
+ AccessLinkedin,
+ AccessOIDC,
+ AccessOkta,
+ AccessOnelogin,
+ AccessPingone,
+ AccessSAML,
+ AccessYandex,
+ AccessOnetimepin,
+]
diff --git a/tests/api_resources/zero_trust/test_identity_providers.py b/tests/api_resources/zero_trust/test_identity_providers.py
index 7204c198113..0e32620edcb 100644
--- a/tests/api_resources/zero_trust/test_identity_providers.py
+++ b/tests/api_resources/zero_trust/test_identity_providers.py
@@ -11,9 +11,11 @@
from tests.utils import assert_matches_type
from cloudflare.pagination import SyncSinglePage, AsyncSinglePage
from cloudflare.types.zero_trust import (
- IdentityProvider,
+ IdentityProviderGetResponse,
IdentityProviderListResponse,
+ IdentityProviderCreateResponse,
IdentityProviderDeleteResponse,
+ IdentityProviderUpdateResponse,
)
base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010")
@@ -31,7 +33,7 @@ def test_method_create_overload_1(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -58,7 +60,7 @@ def test_method_create_with_all_params_overload_1(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -73,7 +75,7 @@ def test_raw_response_create_overload_1(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -88,7 +90,7 @@ def test_streaming_response_create_overload_1(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -120,7 +122,7 @@ def test_method_create_overload_2(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -145,7 +147,7 @@ def test_method_create_with_all_params_overload_2(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -160,7 +162,7 @@ def test_raw_response_create_overload_2(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -175,7 +177,7 @@ def test_streaming_response_create_overload_2(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -207,7 +209,7 @@ def test_method_create_overload_3(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -228,7 +230,7 @@ def test_method_create_with_all_params_overload_3(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -243,7 +245,7 @@ def test_raw_response_create_overload_3(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -258,7 +260,7 @@ def test_streaming_response_create_overload_3(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -290,7 +292,7 @@ def test_method_create_overload_4(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -311,7 +313,7 @@ def test_method_create_with_all_params_overload_4(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -326,7 +328,7 @@ def test_raw_response_create_overload_4(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -341,7 +343,7 @@ def test_streaming_response_create_overload_4(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -373,7 +375,7 @@ def test_method_create_overload_5(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -396,7 +398,7 @@ def test_method_create_with_all_params_overload_5(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -411,7 +413,7 @@ def test_raw_response_create_overload_5(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -426,7 +428,7 @@ def test_streaming_response_create_overload_5(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -458,7 +460,7 @@ def test_method_create_overload_6(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -482,7 +484,7 @@ def test_method_create_with_all_params_overload_6(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -497,7 +499,7 @@ def test_raw_response_create_overload_6(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -512,7 +514,7 @@ def test_streaming_response_create_overload_6(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -544,7 +546,7 @@ def test_method_create_overload_7(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -565,7 +567,7 @@ def test_method_create_with_all_params_overload_7(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -580,7 +582,7 @@ def test_raw_response_create_overload_7(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -595,7 +597,7 @@ def test_streaming_response_create_overload_7(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -627,7 +629,7 @@ def test_method_create_overload_8(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -654,7 +656,7 @@ def test_method_create_with_all_params_overload_8(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -669,7 +671,7 @@ def test_raw_response_create_overload_8(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -684,7 +686,7 @@ def test_streaming_response_create_overload_8(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -716,7 +718,7 @@ def test_method_create_overload_9(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -741,7 +743,7 @@ def test_method_create_with_all_params_overload_9(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -756,7 +758,7 @@ def test_raw_response_create_overload_9(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -771,7 +773,7 @@ def test_streaming_response_create_overload_9(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -803,7 +805,7 @@ def test_method_create_overload_10(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -827,7 +829,7 @@ def test_method_create_with_all_params_overload_10(self, client: Cloudflare) ->
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -842,7 +844,7 @@ def test_raw_response_create_overload_10(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -857,7 +859,7 @@ def test_streaming_response_create_overload_10(self, client: Cloudflare) -> None
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -889,7 +891,7 @@ def test_method_create_overload_11(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -913,7 +915,7 @@ def test_method_create_with_all_params_overload_11(self, client: Cloudflare) ->
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -928,7 +930,7 @@ def test_raw_response_create_overload_11(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -943,7 +945,7 @@ def test_streaming_response_create_overload_11(self, client: Cloudflare) -> None
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -975,7 +977,7 @@ def test_method_create_overload_12(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1014,7 +1016,7 @@ def test_method_create_with_all_params_overload_12(self, client: Cloudflare) ->
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1029,7 +1031,7 @@ def test_raw_response_create_overload_12(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1044,7 +1046,7 @@ def test_streaming_response_create_overload_12(self, client: Cloudflare) -> None
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -1076,7 +1078,7 @@ def test_method_create_overload_13(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1097,7 +1099,7 @@ def test_method_create_with_all_params_overload_13(self, client: Cloudflare) ->
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1112,7 +1114,7 @@ def test_raw_response_create_overload_13(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1127,7 +1129,7 @@ def test_streaming_response_create_overload_13(self, client: Cloudflare) -> None
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -1159,7 +1161,7 @@ def test_method_create_overload_14(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1177,7 +1179,7 @@ def test_method_create_with_all_params_overload_14(self, client: Cloudflare) ->
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1192,7 +1194,7 @@ def test_raw_response_create_overload_14(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1207,7 +1209,7 @@ def test_streaming_response_create_overload_14(self, client: Cloudflare) -> None
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -1240,7 +1242,7 @@ def test_method_update_overload_1(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1268,7 +1270,7 @@ def test_method_update_with_all_params_overload_1(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1284,7 +1286,7 @@ def test_raw_response_update_overload_1(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1300,7 +1302,7 @@ def test_streaming_response_update_overload_1(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -1344,7 +1346,7 @@ def test_method_update_overload_2(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1370,7 +1372,7 @@ def test_method_update_with_all_params_overload_2(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1386,7 +1388,7 @@ def test_raw_response_update_overload_2(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1402,7 +1404,7 @@ def test_streaming_response_update_overload_2(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -1446,7 +1448,7 @@ def test_method_update_overload_3(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1468,7 +1470,7 @@ def test_method_update_with_all_params_overload_3(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1484,7 +1486,7 @@ def test_raw_response_update_overload_3(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1500,7 +1502,7 @@ def test_streaming_response_update_overload_3(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -1544,7 +1546,7 @@ def test_method_update_overload_4(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1566,7 +1568,7 @@ def test_method_update_with_all_params_overload_4(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1582,7 +1584,7 @@ def test_raw_response_update_overload_4(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1598,7 +1600,7 @@ def test_streaming_response_update_overload_4(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -1642,7 +1644,7 @@ def test_method_update_overload_5(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1666,7 +1668,7 @@ def test_method_update_with_all_params_overload_5(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1682,7 +1684,7 @@ def test_raw_response_update_overload_5(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1698,7 +1700,7 @@ def test_streaming_response_update_overload_5(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -1742,7 +1744,7 @@ def test_method_update_overload_6(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1767,7 +1769,7 @@ def test_method_update_with_all_params_overload_6(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1783,7 +1785,7 @@ def test_raw_response_update_overload_6(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1799,7 +1801,7 @@ def test_streaming_response_update_overload_6(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -1843,7 +1845,7 @@ def test_method_update_overload_7(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1865,7 +1867,7 @@ def test_method_update_with_all_params_overload_7(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1881,7 +1883,7 @@ def test_raw_response_update_overload_7(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1897,7 +1899,7 @@ def test_streaming_response_update_overload_7(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -1941,7 +1943,7 @@ def test_method_update_overload_8(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1969,7 +1971,7 @@ def test_method_update_with_all_params_overload_8(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -1985,7 +1987,7 @@ def test_raw_response_update_overload_8(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2001,7 +2003,7 @@ def test_streaming_response_update_overload_8(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -2045,7 +2047,7 @@ def test_method_update_overload_9(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2071,7 +2073,7 @@ def test_method_update_with_all_params_overload_9(self, client: Cloudflare) -> N
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2087,7 +2089,7 @@ def test_raw_response_update_overload_9(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2103,7 +2105,7 @@ def test_streaming_response_update_overload_9(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -2147,7 +2149,7 @@ def test_method_update_overload_10(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2172,7 +2174,7 @@ def test_method_update_with_all_params_overload_10(self, client: Cloudflare) ->
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2188,7 +2190,7 @@ def test_raw_response_update_overload_10(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2204,7 +2206,7 @@ def test_streaming_response_update_overload_10(self, client: Cloudflare) -> None
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -2248,7 +2250,7 @@ def test_method_update_overload_11(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2273,7 +2275,7 @@ def test_method_update_with_all_params_overload_11(self, client: Cloudflare) ->
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2289,7 +2291,7 @@ def test_raw_response_update_overload_11(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2305,7 +2307,7 @@ def test_streaming_response_update_overload_11(self, client: Cloudflare) -> None
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -2349,7 +2351,7 @@ def test_method_update_overload_12(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2389,7 +2391,7 @@ def test_method_update_with_all_params_overload_12(self, client: Cloudflare) ->
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2405,7 +2407,7 @@ def test_raw_response_update_overload_12(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2421,7 +2423,7 @@ def test_streaming_response_update_overload_12(self, client: Cloudflare) -> None
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -2465,7 +2467,7 @@ def test_method_update_overload_13(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2487,7 +2489,7 @@ def test_method_update_with_all_params_overload_13(self, client: Cloudflare) ->
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2503,7 +2505,7 @@ def test_raw_response_update_overload_13(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2519,7 +2521,7 @@ def test_streaming_response_update_overload_13(self, client: Cloudflare) -> None
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -2563,7 +2565,7 @@ def test_method_update_overload_14(self, client: Cloudflare) -> None:
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2582,7 +2584,7 @@ def test_method_update_with_all_params_overload_14(self, client: Cloudflare) ->
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2598,7 +2600,7 @@ def test_raw_response_update_overload_14(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2614,7 +2616,7 @@ def test_streaming_response_update_overload_14(self, client: Cloudflare) -> None
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -2777,7 +2779,7 @@ def test_method_get(self, client: Cloudflare) -> None:
"f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2786,7 +2788,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None:
"f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2799,7 +2801,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2812,7 +2814,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None:
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -2850,7 +2852,7 @@ async def test_method_create_overload_1(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2877,7 +2879,7 @@ async def test_method_create_with_all_params_overload_1(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2892,7 +2894,7 @@ async def test_raw_response_create_overload_1(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2907,7 +2909,7 @@ async def test_streaming_response_create_overload_1(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -2939,7 +2941,7 @@ async def test_method_create_overload_2(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2964,7 +2966,7 @@ async def test_method_create_with_all_params_overload_2(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2979,7 +2981,7 @@ async def test_raw_response_create_overload_2(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -2994,7 +2996,7 @@ async def test_streaming_response_create_overload_2(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3026,7 +3028,7 @@ async def test_method_create_overload_3(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3047,7 +3049,7 @@ async def test_method_create_with_all_params_overload_3(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3062,7 +3064,7 @@ async def test_raw_response_create_overload_3(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3077,7 +3079,7 @@ async def test_streaming_response_create_overload_3(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3109,7 +3111,7 @@ async def test_method_create_overload_4(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3130,7 +3132,7 @@ async def test_method_create_with_all_params_overload_4(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3145,7 +3147,7 @@ async def test_raw_response_create_overload_4(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3160,7 +3162,7 @@ async def test_streaming_response_create_overload_4(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3192,7 +3194,7 @@ async def test_method_create_overload_5(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3215,7 +3217,7 @@ async def test_method_create_with_all_params_overload_5(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3230,7 +3232,7 @@ async def test_raw_response_create_overload_5(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3245,7 +3247,7 @@ async def test_streaming_response_create_overload_5(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3277,7 +3279,7 @@ async def test_method_create_overload_6(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3301,7 +3303,7 @@ async def test_method_create_with_all_params_overload_6(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3316,7 +3318,7 @@ async def test_raw_response_create_overload_6(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3331,7 +3333,7 @@ async def test_streaming_response_create_overload_6(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3363,7 +3365,7 @@ async def test_method_create_overload_7(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3384,7 +3386,7 @@ async def test_method_create_with_all_params_overload_7(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3399,7 +3401,7 @@ async def test_raw_response_create_overload_7(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3414,7 +3416,7 @@ async def test_streaming_response_create_overload_7(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3446,7 +3448,7 @@ async def test_method_create_overload_8(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3473,7 +3475,7 @@ async def test_method_create_with_all_params_overload_8(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3488,7 +3490,7 @@ async def test_raw_response_create_overload_8(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3503,7 +3505,7 @@ async def test_streaming_response_create_overload_8(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3535,7 +3537,7 @@ async def test_method_create_overload_9(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3560,7 +3562,7 @@ async def test_method_create_with_all_params_overload_9(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3575,7 +3577,7 @@ async def test_raw_response_create_overload_9(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3590,7 +3592,7 @@ async def test_streaming_response_create_overload_9(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3622,7 +3624,7 @@ async def test_method_create_overload_10(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3646,7 +3648,7 @@ async def test_method_create_with_all_params_overload_10(self, async_client: Asy
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3661,7 +3663,7 @@ async def test_raw_response_create_overload_10(self, async_client: AsyncCloudfla
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3676,7 +3678,7 @@ async def test_streaming_response_create_overload_10(self, async_client: AsyncCl
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3708,7 +3710,7 @@ async def test_method_create_overload_11(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3732,7 +3734,7 @@ async def test_method_create_with_all_params_overload_11(self, async_client: Asy
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3747,7 +3749,7 @@ async def test_raw_response_create_overload_11(self, async_client: AsyncCloudfla
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3762,7 +3764,7 @@ async def test_streaming_response_create_overload_11(self, async_client: AsyncCl
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3794,7 +3796,7 @@ async def test_method_create_overload_12(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3833,7 +3835,7 @@ async def test_method_create_with_all_params_overload_12(self, async_client: Asy
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3848,7 +3850,7 @@ async def test_raw_response_create_overload_12(self, async_client: AsyncCloudfla
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3863,7 +3865,7 @@ async def test_streaming_response_create_overload_12(self, async_client: AsyncCl
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3895,7 +3897,7 @@ async def test_method_create_overload_13(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3916,7 +3918,7 @@ async def test_method_create_with_all_params_overload_13(self, async_client: Asy
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3931,7 +3933,7 @@ async def test_raw_response_create_overload_13(self, async_client: AsyncCloudfla
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3946,7 +3948,7 @@ async def test_streaming_response_create_overload_13(self, async_client: AsyncCl
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -3978,7 +3980,7 @@ async def test_method_create_overload_14(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -3996,7 +3998,7 @@ async def test_method_create_with_all_params_overload_14(self, async_client: Asy
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4011,7 +4013,7 @@ async def test_raw_response_create_overload_14(self, async_client: AsyncCloudfla
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4026,7 +4028,7 @@ async def test_streaming_response_create_overload_14(self, async_client: AsyncCl
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -4059,7 +4061,7 @@ async def test_method_update_overload_1(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4087,7 +4089,7 @@ async def test_method_update_with_all_params_overload_1(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4103,7 +4105,7 @@ async def test_raw_response_update_overload_1(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4119,7 +4121,7 @@ async def test_streaming_response_update_overload_1(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -4163,7 +4165,7 @@ async def test_method_update_overload_2(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4189,7 +4191,7 @@ async def test_method_update_with_all_params_overload_2(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4205,7 +4207,7 @@ async def test_raw_response_update_overload_2(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4221,7 +4223,7 @@ async def test_streaming_response_update_overload_2(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -4265,7 +4267,7 @@ async def test_method_update_overload_3(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4287,7 +4289,7 @@ async def test_method_update_with_all_params_overload_3(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4303,7 +4305,7 @@ async def test_raw_response_update_overload_3(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4319,7 +4321,7 @@ async def test_streaming_response_update_overload_3(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -4363,7 +4365,7 @@ async def test_method_update_overload_4(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4385,7 +4387,7 @@ async def test_method_update_with_all_params_overload_4(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4401,7 +4403,7 @@ async def test_raw_response_update_overload_4(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4417,7 +4419,7 @@ async def test_streaming_response_update_overload_4(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -4461,7 +4463,7 @@ async def test_method_update_overload_5(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4485,7 +4487,7 @@ async def test_method_update_with_all_params_overload_5(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4501,7 +4503,7 @@ async def test_raw_response_update_overload_5(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4517,7 +4519,7 @@ async def test_streaming_response_update_overload_5(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -4561,7 +4563,7 @@ async def test_method_update_overload_6(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4586,7 +4588,7 @@ async def test_method_update_with_all_params_overload_6(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4602,7 +4604,7 @@ async def test_raw_response_update_overload_6(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4618,7 +4620,7 @@ async def test_streaming_response_update_overload_6(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -4662,7 +4664,7 @@ async def test_method_update_overload_7(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4684,7 +4686,7 @@ async def test_method_update_with_all_params_overload_7(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4700,7 +4702,7 @@ async def test_raw_response_update_overload_7(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4716,7 +4718,7 @@ async def test_streaming_response_update_overload_7(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -4760,7 +4762,7 @@ async def test_method_update_overload_8(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4788,7 +4790,7 @@ async def test_method_update_with_all_params_overload_8(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4804,7 +4806,7 @@ async def test_raw_response_update_overload_8(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4820,7 +4822,7 @@ async def test_streaming_response_update_overload_8(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -4864,7 +4866,7 @@ async def test_method_update_overload_9(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4890,7 +4892,7 @@ async def test_method_update_with_all_params_overload_9(self, async_client: Asyn
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4906,7 +4908,7 @@ async def test_raw_response_update_overload_9(self, async_client: AsyncCloudflar
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4922,7 +4924,7 @@ async def test_streaming_response_update_overload_9(self, async_client: AsyncClo
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -4966,7 +4968,7 @@ async def test_method_update_overload_10(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -4991,7 +4993,7 @@ async def test_method_update_with_all_params_overload_10(self, async_client: Asy
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5007,7 +5009,7 @@ async def test_raw_response_update_overload_10(self, async_client: AsyncCloudfla
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5023,7 +5025,7 @@ async def test_streaming_response_update_overload_10(self, async_client: AsyncCl
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -5067,7 +5069,7 @@ async def test_method_update_overload_11(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5092,7 +5094,7 @@ async def test_method_update_with_all_params_overload_11(self, async_client: Asy
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5108,7 +5110,7 @@ async def test_raw_response_update_overload_11(self, async_client: AsyncCloudfla
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5124,7 +5126,7 @@ async def test_streaming_response_update_overload_11(self, async_client: AsyncCl
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -5168,7 +5170,7 @@ async def test_method_update_overload_12(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5208,7 +5210,7 @@ async def test_method_update_with_all_params_overload_12(self, async_client: Asy
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5224,7 +5226,7 @@ async def test_raw_response_update_overload_12(self, async_client: AsyncCloudfla
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5240,7 +5242,7 @@ async def test_streaming_response_update_overload_12(self, async_client: AsyncCl
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -5284,7 +5286,7 @@ async def test_method_update_overload_13(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5306,7 +5308,7 @@ async def test_method_update_with_all_params_overload_13(self, async_client: Asy
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5322,7 +5324,7 @@ async def test_raw_response_update_overload_13(self, async_client: AsyncCloudfla
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5338,7 +5340,7 @@ async def test_streaming_response_update_overload_13(self, async_client: AsyncCl
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -5382,7 +5384,7 @@ async def test_method_update_overload_14(self, async_client: AsyncCloudflare) ->
type="onetimepin",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5401,7 +5403,7 @@ async def test_method_update_with_all_params_overload_14(self, async_client: Asy
"user_deprovision": True,
},
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5417,7 +5419,7 @@ async def test_raw_response_update_overload_14(self, async_client: AsyncCloudfla
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5433,7 +5435,7 @@ async def test_streaming_response_update_overload_14(self, async_client: AsyncCl
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True
@@ -5596,7 +5598,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None:
"f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5605,7 +5607,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) -
"f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="string",
)
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5618,7 +5620,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None:
assert response.is_closed is True
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"])
@pytest.mark.skip(reason="TODO: investigate broken test")
@parametrize
@@ -5631,7 +5633,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No
assert response.http_request.headers.get("X-Stainless-Lang") == "python"
identity_provider = await response.parse()
- assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"])
+ assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"])
assert cast(Any, response.is_closed) is True