From 2dc376ed1effac78c98bf1f781ea86f368f931ab Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Tue, 7 May 2024 05:24:04 +0000 Subject: [PATCH] feat(api): update via SDK Studio (#477) --- api.md | 9 +- .../zero_trust/identity_providers.py | 164 ++--- src/cloudflare/types/zero_trust/__init__.py | 4 +- .../identity_provider_create_response.py | 588 ++++++++++++++++++ ...r.py => identity_provider_get_response.py} | 4 +- .../identity_provider_update_response.py | 588 ++++++++++++++++++ .../zero_trust/test_identity_providers.py | 468 +++++++------- 7 files changed, 1505 insertions(+), 320 deletions(-) create mode 100644 src/cloudflare/types/zero_trust/identity_provider_create_response.py rename src/cloudflare/types/zero_trust/{identity_provider.py => identity_provider_get_response.py} (99%) create mode 100644 src/cloudflare/types/zero_trust/identity_provider_update_response.py diff --git a/api.md b/api.md index 876bb0d3509..195fbc3c5e3 100644 --- a/api.md +++ b/api.md @@ -5008,18 +5008,21 @@ from cloudflare.types.zero_trust import ( IdentityProvider, IdentityProviderType, ScimConfig, + IdentityProviderCreateResponse, + IdentityProviderUpdateResponse, IdentityProviderListResponse, IdentityProviderDeleteResponse, + IdentityProviderGetResponse, ) ``` Methods: -- client.zero_trust.identity_providers.create(\*, account_id, zone_id, \*\*params) -> Optional -- client.zero_trust.identity_providers.update(uuid, \*, account_id, zone_id, \*\*params) -> Optional +- client.zero_trust.identity_providers.create(\*, account_id, zone_id, \*\*params) -> Optional +- client.zero_trust.identity_providers.update(uuid, \*, account_id, zone_id, \*\*params) -> Optional - client.zero_trust.identity_providers.list(\*, account_id, zone_id) -> SyncSinglePage[IdentityProviderListResponse] - client.zero_trust.identity_providers.delete(uuid, \*, account_id, zone_id) -> Optional -- client.zero_trust.identity_providers.get(uuid, \*, account_id, zone_id) -> Optional +- client.zero_trust.identity_providers.get(uuid, \*, account_id, zone_id) -> Optional ## Organizations diff --git a/src/cloudflare/resources/zero_trust/identity_providers.py b/src/cloudflare/resources/zero_trust/identity_providers.py index 3e9508b349d..ea66fb7f8a9 100644 --- a/src/cloudflare/resources/zero_trust/identity_providers.py +++ b/src/cloudflare/resources/zero_trust/identity_providers.py @@ -31,12 +31,14 @@ identity_provider_create_params, identity_provider_update_params, ) -from ...types.zero_trust.identity_provider import IdentityProvider from ...types.zero_trust.scim_config_param import ScimConfigParam from ...types.zero_trust.identity_provider_type import IdentityProviderType from ...types.zero_trust.generic_oauth_config_param import GenericOAuthConfigParam +from ...types.zero_trust.identity_provider_get_response import IdentityProviderGetResponse from ...types.zero_trust.identity_provider_list_response import IdentityProviderListResponse +from ...types.zero_trust.identity_provider_create_response import IdentityProviderCreateResponse from ...types.zero_trust.identity_provider_delete_response import IdentityProviderDeleteResponse +from ...types.zero_trust.identity_provider_update_response import IdentityProviderUpdateResponse __all__ = ["IdentityProvidersResource", "AsyncIdentityProvidersResource"] @@ -66,7 +68,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -114,7 +116,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -162,7 +164,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -210,7 +212,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -258,7 +260,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -306,7 +308,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -354,7 +356,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -402,7 +404,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -450,7 +452,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -498,7 +500,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -546,7 +548,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -594,7 +596,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -642,7 +644,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -690,7 +692,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -763,7 +765,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: if account_id and zone_id: raise ValueError("You cannot provide both account_id and zone_id") @@ -777,7 +779,7 @@ def create( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProvider], + Optional[IdentityProviderCreateResponse], self._post( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers", body=maybe_transform( @@ -794,10 +796,10 @@ def create( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProviderCreateResponse]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProvider] + Any, ResultWrapper[IdentityProviderCreateResponse] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -819,7 +821,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -870,7 +872,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -921,7 +923,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -972,7 +974,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1023,7 +1025,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1074,7 +1076,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1125,7 +1127,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1176,7 +1178,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1227,7 +1229,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1278,7 +1280,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1329,7 +1331,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1380,7 +1382,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1431,7 +1433,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1482,7 +1484,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -1558,7 +1560,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: if not uuid: raise ValueError(f"Expected a non-empty value for `uuid` but received {uuid!r}") if account_id and zone_id: @@ -1574,7 +1576,7 @@ def update( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProvider], + Optional[IdentityProviderUpdateResponse], self._put( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", body=maybe_transform( @@ -1591,10 +1593,10 @@ def update( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProviderUpdateResponse]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProvider] + Any, ResultWrapper[IdentityProviderUpdateResponse] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -1719,7 +1721,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderGetResponse]: """ Fetches a configured identity provider. @@ -1753,7 +1755,7 @@ def get( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProvider], + Optional[IdentityProviderGetResponse], self._get( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", options=make_request_options( @@ -1761,10 +1763,10 @@ def get( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProviderGetResponse]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProvider] + Any, ResultWrapper[IdentityProviderGetResponse] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -1795,7 +1797,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -1843,7 +1845,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -1891,7 +1893,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -1939,7 +1941,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -1987,7 +1989,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -2035,7 +2037,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -2083,7 +2085,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -2131,7 +2133,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -2179,7 +2181,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -2227,7 +2229,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -2275,7 +2277,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -2323,7 +2325,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -2371,7 +2373,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -2419,7 +2421,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: """ Adds a new identity provider to Access. @@ -2492,7 +2494,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderCreateResponse]: if account_id and zone_id: raise ValueError("You cannot provide both account_id and zone_id") @@ -2506,7 +2508,7 @@ async def create( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProvider], + Optional[IdentityProviderCreateResponse], await self._post( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers", body=await async_maybe_transform( @@ -2523,10 +2525,10 @@ async def create( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProviderCreateResponse]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProvider] + Any, ResultWrapper[IdentityProviderCreateResponse] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -2548,7 +2550,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -2599,7 +2601,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -2650,7 +2652,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -2701,7 +2703,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -2752,7 +2754,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -2803,7 +2805,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -2854,7 +2856,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -2905,7 +2907,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -2956,7 +2958,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -3007,7 +3009,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -3058,7 +3060,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -3109,7 +3111,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -3160,7 +3162,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -3211,7 +3213,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: """ Updates a configured identity provider. @@ -3287,7 +3289,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderUpdateResponse]: if not uuid: raise ValueError(f"Expected a non-empty value for `uuid` but received {uuid!r}") if account_id and zone_id: @@ -3303,7 +3305,7 @@ async def update( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProvider], + Optional[IdentityProviderUpdateResponse], await self._put( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", body=await async_maybe_transform( @@ -3320,10 +3322,10 @@ async def update( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProviderUpdateResponse]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProvider] + Any, ResultWrapper[IdentityProviderUpdateResponse] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -3448,7 +3450,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProvider]: + ) -> Optional[IdentityProviderGetResponse]: """ Fetches a configured identity provider. @@ -3482,7 +3484,7 @@ async def get( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProvider], + Optional[IdentityProviderGetResponse], await self._get( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", options=make_request_options( @@ -3490,10 +3492,10 @@ async def get( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProviderGetResponse]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProvider] + Any, ResultWrapper[IdentityProviderGetResponse] ), # Union types cannot be passed in as arguments in the type system ), ) diff --git a/src/cloudflare/types/zero_trust/__init__.py b/src/cloudflare/types/zero_trust/__init__.py index fe2de93ed13..5d13447e38c 100644 --- a/src/cloudflare/types/zero_trust/__init__.py +++ b/src/cloudflare/types/zero_trust/__init__.py @@ -31,7 +31,6 @@ from .access_rule_param import AccessRuleParam as AccessRuleParam from .domain_rule_param import DomainRuleParam as DomainRuleParam from .gsuite_group_rule import GSuiteGroupRule as GSuiteGroupRule -from .identity_provider import IdentityProvider as IdentityProvider from .scim_config_param import ScimConfigParam as ScimConfigParam from .country_rule_param import CountryRuleParam as CountryRuleParam from .ip_list_rule_param import IPListRuleParam as IPListRuleParam @@ -74,6 +73,7 @@ from .any_valid_service_token_rule import AnyValidServiceTokenRule as AnyValidServiceTokenRule from .external_evaluation_rule_param import ExternalEvaluationRuleParam as ExternalEvaluationRuleParam from .github_organization_rule_param import GitHubOrganizationRuleParam as GitHubOrganizationRuleParam +from .identity_provider_get_response import IdentityProviderGetResponse as IdentityProviderGetResponse from .identity_provider_create_params import IdentityProviderCreateParams as IdentityProviderCreateParams from .identity_provider_list_response import IdentityProviderListResponse as IdentityProviderListResponse from .identity_provider_update_params import IdentityProviderUpdateParams as IdentityProviderUpdateParams @@ -82,7 +82,9 @@ from .connectivity_setting_edit_params import ConnectivitySettingEditParams as ConnectivitySettingEditParams from .organization_revoke_users_params import OrganizationRevokeUsersParams as OrganizationRevokeUsersParams from .connectivity_setting_get_response import ConnectivitySettingGetResponse as ConnectivitySettingGetResponse +from .identity_provider_create_response import IdentityProviderCreateResponse as IdentityProviderCreateResponse from .identity_provider_delete_response import IdentityProviderDeleteResponse as IdentityProviderDeleteResponse +from .identity_provider_update_response import IdentityProviderUpdateResponse as IdentityProviderUpdateResponse from .any_valid_service_token_rule_param import AnyValidServiceTokenRuleParam as AnyValidServiceTokenRuleParam from .connectivity_setting_edit_response import ConnectivitySettingEditResponse as ConnectivitySettingEditResponse from .organization_revoke_users_response import OrganizationRevokeUsersResponse as OrganizationRevokeUsersResponse diff --git a/src/cloudflare/types/zero_trust/identity_provider_create_response.py b/src/cloudflare/types/zero_trust/identity_provider_create_response.py new file mode 100644 index 00000000000..bf1f94e8cc4 --- /dev/null +++ b/src/cloudflare/types/zero_trust/identity_provider_create_response.py @@ -0,0 +1,588 @@ +# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. + +from typing import List, Union, Optional + +from .azure_ad import AzureAD +from ..._models import BaseModel +from .scim_config import ScimConfig +from .generic_oauth_config import GenericOAuthConfig +from .identity_provider_type import IdentityProviderType + +__all__ = [ + "IdentityProviderCreateResponse", + "AccessCentrify", + "AccessCentrifyConfig", + "AccessFacebook", + "AccessGitHub", + "AccessGoogle", + "AccessGoogleConfig", + "AccessGoogleApps", + "AccessGoogleAppsConfig", + "AccessLinkedin", + "AccessOIDC", + "AccessOIDCConfig", + "AccessOkta", + "AccessOktaConfig", + "AccessOnelogin", + "AccessOneloginConfig", + "AccessPingone", + "AccessPingoneConfig", + "AccessSAML", + "AccessSAMLConfig", + "AccessSAMLConfigHeaderAttribute", + "AccessYandex", + "AccessOnetimepin", +] + + +class AccessCentrifyConfig(BaseModel): + centrify_account: Optional[str] = None + """Your centrify account url""" + + centrify_app_id: Optional[str] = None + """Your centrify app id""" + + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + +class AccessCentrify(BaseModel): + config: AccessCentrifyConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessFacebook(BaseModel): + config: GenericOAuthConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessGitHub(BaseModel): + config: GenericOAuthConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessGoogleConfig(BaseModel): + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + +class AccessGoogle(BaseModel): + config: AccessGoogleConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessGoogleAppsConfig(BaseModel): + apps_domain: Optional[str] = None + """Your companies TLD""" + + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + +class AccessGoogleApps(BaseModel): + config: AccessGoogleAppsConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessLinkedin(BaseModel): + config: GenericOAuthConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessOIDCConfig(BaseModel): + auth_url: Optional[str] = None + """The authorization_endpoint URL of your IdP""" + + certs_url: Optional[str] = None + """The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens""" + + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + scopes: Optional[List[str]] = None + """OAuth scopes""" + + token_url: Optional[str] = None + """The token_endpoint URL of your IdP""" + + +class AccessOIDC(BaseModel): + config: AccessOIDCConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessOktaConfig(BaseModel): + authorization_server_id: Optional[str] = None + """Your okta authorization server id""" + + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + okta_account: Optional[str] = None + """Your okta account url""" + + +class AccessOkta(BaseModel): + config: AccessOktaConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessOneloginConfig(BaseModel): + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + onelogin_account: Optional[str] = None + """Your OneLogin account url""" + + +class AccessOnelogin(BaseModel): + config: AccessOneloginConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessPingoneConfig(BaseModel): + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + ping_env_id: Optional[str] = None + """Your PingOne environment identifier""" + + +class AccessPingone(BaseModel): + config: AccessPingoneConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessSAMLConfigHeaderAttribute(BaseModel): + attribute_name: Optional[str] = None + """attribute name from the IDP""" + + header_name: Optional[str] = None + """header that will be added on the request to the origin""" + + +class AccessSAMLConfig(BaseModel): + attributes: Optional[List[str]] = None + """ + A list of SAML attribute names that will be added to your signed JWT token and + can be used in SAML policy rules. + """ + + email_attribute_name: Optional[str] = None + """The attribute name for email in the SAML response.""" + + header_attributes: Optional[List[AccessSAMLConfigHeaderAttribute]] = None + """ + Add a list of attribute names that will be returned in the response header from + the Access callback. + """ + + idp_public_certs: Optional[List[str]] = None + """X509 certificate to verify the signature in the SAML authentication response""" + + issuer_url: Optional[str] = None + """IdP Entity ID or Issuer URL""" + + sign_request: Optional[bool] = None + """Sign the SAML authentication request with Access credentials. + + To verify the signature, use the public key from the Access certs endpoints. + """ + + sso_target_url: Optional[str] = None + """URL to send the SAML authentication requests to""" + + +class AccessSAML(BaseModel): + config: AccessSAMLConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessYandex(BaseModel): + config: GenericOAuthConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessOnetimepin(BaseModel): + config: object + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +IdentityProviderCreateResponse = Union[ + AzureAD, + AccessCentrify, + AccessFacebook, + AccessGitHub, + AccessGoogle, + AccessGoogleApps, + AccessLinkedin, + AccessOIDC, + AccessOkta, + AccessOnelogin, + AccessPingone, + AccessSAML, + AccessYandex, + AccessOnetimepin, +] diff --git a/src/cloudflare/types/zero_trust/identity_provider.py b/src/cloudflare/types/zero_trust/identity_provider_get_response.py similarity index 99% rename from src/cloudflare/types/zero_trust/identity_provider.py rename to src/cloudflare/types/zero_trust/identity_provider_get_response.py index 6731d7bc439..2ad98f250b5 100644 --- a/src/cloudflare/types/zero_trust/identity_provider.py +++ b/src/cloudflare/types/zero_trust/identity_provider_get_response.py @@ -9,7 +9,7 @@ from .identity_provider_type import IdentityProviderType __all__ = [ - "IdentityProvider", + "IdentityProviderGetResponse", "AccessCentrify", "AccessCentrifyConfig", "AccessFacebook", @@ -570,7 +570,7 @@ class AccessOnetimepin(BaseModel): """ -IdentityProvider = Union[ +IdentityProviderGetResponse = Union[ AzureAD, AccessCentrify, AccessFacebook, diff --git a/src/cloudflare/types/zero_trust/identity_provider_update_response.py b/src/cloudflare/types/zero_trust/identity_provider_update_response.py new file mode 100644 index 00000000000..21f2aa100d7 --- /dev/null +++ b/src/cloudflare/types/zero_trust/identity_provider_update_response.py @@ -0,0 +1,588 @@ +# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. + +from typing import List, Union, Optional + +from .azure_ad import AzureAD +from ..._models import BaseModel +from .scim_config import ScimConfig +from .generic_oauth_config import GenericOAuthConfig +from .identity_provider_type import IdentityProviderType + +__all__ = [ + "IdentityProviderUpdateResponse", + "AccessCentrify", + "AccessCentrifyConfig", + "AccessFacebook", + "AccessGitHub", + "AccessGoogle", + "AccessGoogleConfig", + "AccessGoogleApps", + "AccessGoogleAppsConfig", + "AccessLinkedin", + "AccessOIDC", + "AccessOIDCConfig", + "AccessOkta", + "AccessOktaConfig", + "AccessOnelogin", + "AccessOneloginConfig", + "AccessPingone", + "AccessPingoneConfig", + "AccessSAML", + "AccessSAMLConfig", + "AccessSAMLConfigHeaderAttribute", + "AccessYandex", + "AccessOnetimepin", +] + + +class AccessCentrifyConfig(BaseModel): + centrify_account: Optional[str] = None + """Your centrify account url""" + + centrify_app_id: Optional[str] = None + """Your centrify app id""" + + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + +class AccessCentrify(BaseModel): + config: AccessCentrifyConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessFacebook(BaseModel): + config: GenericOAuthConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessGitHub(BaseModel): + config: GenericOAuthConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessGoogleConfig(BaseModel): + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + +class AccessGoogle(BaseModel): + config: AccessGoogleConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessGoogleAppsConfig(BaseModel): + apps_domain: Optional[str] = None + """Your companies TLD""" + + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + +class AccessGoogleApps(BaseModel): + config: AccessGoogleAppsConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessLinkedin(BaseModel): + config: GenericOAuthConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessOIDCConfig(BaseModel): + auth_url: Optional[str] = None + """The authorization_endpoint URL of your IdP""" + + certs_url: Optional[str] = None + """The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens""" + + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + scopes: Optional[List[str]] = None + """OAuth scopes""" + + token_url: Optional[str] = None + """The token_endpoint URL of your IdP""" + + +class AccessOIDC(BaseModel): + config: AccessOIDCConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessOktaConfig(BaseModel): + authorization_server_id: Optional[str] = None + """Your okta authorization server id""" + + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + okta_account: Optional[str] = None + """Your okta account url""" + + +class AccessOkta(BaseModel): + config: AccessOktaConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessOneloginConfig(BaseModel): + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + onelogin_account: Optional[str] = None + """Your OneLogin account url""" + + +class AccessOnelogin(BaseModel): + config: AccessOneloginConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessPingoneConfig(BaseModel): + claims: Optional[List[str]] = None + """Custom claims""" + + client_id: Optional[str] = None + """Your OAuth Client ID""" + + client_secret: Optional[str] = None + """Your OAuth Client Secret""" + + email_claim_name: Optional[str] = None + """The claim name for email in the id_token response.""" + + ping_env_id: Optional[str] = None + """Your PingOne environment identifier""" + + +class AccessPingone(BaseModel): + config: AccessPingoneConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessSAMLConfigHeaderAttribute(BaseModel): + attribute_name: Optional[str] = None + """attribute name from the IDP""" + + header_name: Optional[str] = None + """header that will be added on the request to the origin""" + + +class AccessSAMLConfig(BaseModel): + attributes: Optional[List[str]] = None + """ + A list of SAML attribute names that will be added to your signed JWT token and + can be used in SAML policy rules. + """ + + email_attribute_name: Optional[str] = None + """The attribute name for email in the SAML response.""" + + header_attributes: Optional[List[AccessSAMLConfigHeaderAttribute]] = None + """ + Add a list of attribute names that will be returned in the response header from + the Access callback. + """ + + idp_public_certs: Optional[List[str]] = None + """X509 certificate to verify the signature in the SAML authentication response""" + + issuer_url: Optional[str] = None + """IdP Entity ID or Issuer URL""" + + sign_request: Optional[bool] = None + """Sign the SAML authentication request with Access credentials. + + To verify the signature, use the public key from the Access certs endpoints. + """ + + sso_target_url: Optional[str] = None + """URL to send the SAML authentication requests to""" + + +class AccessSAML(BaseModel): + config: AccessSAMLConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessYandex(BaseModel): + config: GenericOAuthConfig + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +class AccessOnetimepin(BaseModel): + config: object + """The configuration parameters for the identity provider. + + To view the required parameters for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + name: str + """The name of the identity provider, shown to users on the login page.""" + + type: IdentityProviderType + """The type of identity provider. + + To determine the value for a specific provider, refer to our + [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). + """ + + id: Optional[str] = None + """UUID""" + + scim_config: Optional[ScimConfig] = None + """ + The configuration settings for enabling a System for Cross-Domain Identity + Management (SCIM) with the identity provider. + """ + + +IdentityProviderUpdateResponse = Union[ + AzureAD, + AccessCentrify, + AccessFacebook, + AccessGitHub, + AccessGoogle, + AccessGoogleApps, + AccessLinkedin, + AccessOIDC, + AccessOkta, + AccessOnelogin, + AccessPingone, + AccessSAML, + AccessYandex, + AccessOnetimepin, +] diff --git a/tests/api_resources/zero_trust/test_identity_providers.py b/tests/api_resources/zero_trust/test_identity_providers.py index 7204c198113..0e32620edcb 100644 --- a/tests/api_resources/zero_trust/test_identity_providers.py +++ b/tests/api_resources/zero_trust/test_identity_providers.py @@ -11,9 +11,11 @@ from tests.utils import assert_matches_type from cloudflare.pagination import SyncSinglePage, AsyncSinglePage from cloudflare.types.zero_trust import ( - IdentityProvider, + IdentityProviderGetResponse, IdentityProviderListResponse, + IdentityProviderCreateResponse, IdentityProviderDeleteResponse, + IdentityProviderUpdateResponse, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -31,7 +33,7 @@ def test_method_create_overload_1(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -58,7 +60,7 @@ def test_method_create_with_all_params_overload_1(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -73,7 +75,7 @@ def test_raw_response_create_overload_1(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -88,7 +90,7 @@ def test_streaming_response_create_overload_1(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -120,7 +122,7 @@ def test_method_create_overload_2(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -145,7 +147,7 @@ def test_method_create_with_all_params_overload_2(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -160,7 +162,7 @@ def test_raw_response_create_overload_2(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -175,7 +177,7 @@ def test_streaming_response_create_overload_2(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -207,7 +209,7 @@ def test_method_create_overload_3(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -228,7 +230,7 @@ def test_method_create_with_all_params_overload_3(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -243,7 +245,7 @@ def test_raw_response_create_overload_3(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -258,7 +260,7 @@ def test_streaming_response_create_overload_3(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -290,7 +292,7 @@ def test_method_create_overload_4(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -311,7 +313,7 @@ def test_method_create_with_all_params_overload_4(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -326,7 +328,7 @@ def test_raw_response_create_overload_4(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -341,7 +343,7 @@ def test_streaming_response_create_overload_4(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -373,7 +375,7 @@ def test_method_create_overload_5(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -396,7 +398,7 @@ def test_method_create_with_all_params_overload_5(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -411,7 +413,7 @@ def test_raw_response_create_overload_5(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -426,7 +428,7 @@ def test_streaming_response_create_overload_5(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -458,7 +460,7 @@ def test_method_create_overload_6(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -482,7 +484,7 @@ def test_method_create_with_all_params_overload_6(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -497,7 +499,7 @@ def test_raw_response_create_overload_6(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -512,7 +514,7 @@ def test_streaming_response_create_overload_6(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -544,7 +546,7 @@ def test_method_create_overload_7(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -565,7 +567,7 @@ def test_method_create_with_all_params_overload_7(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -580,7 +582,7 @@ def test_raw_response_create_overload_7(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -595,7 +597,7 @@ def test_streaming_response_create_overload_7(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -627,7 +629,7 @@ def test_method_create_overload_8(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -654,7 +656,7 @@ def test_method_create_with_all_params_overload_8(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -669,7 +671,7 @@ def test_raw_response_create_overload_8(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -684,7 +686,7 @@ def test_streaming_response_create_overload_8(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -716,7 +718,7 @@ def test_method_create_overload_9(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -741,7 +743,7 @@ def test_method_create_with_all_params_overload_9(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -756,7 +758,7 @@ def test_raw_response_create_overload_9(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -771,7 +773,7 @@ def test_streaming_response_create_overload_9(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -803,7 +805,7 @@ def test_method_create_overload_10(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -827,7 +829,7 @@ def test_method_create_with_all_params_overload_10(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -842,7 +844,7 @@ def test_raw_response_create_overload_10(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -857,7 +859,7 @@ def test_streaming_response_create_overload_10(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -889,7 +891,7 @@ def test_method_create_overload_11(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -913,7 +915,7 @@ def test_method_create_with_all_params_overload_11(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -928,7 +930,7 @@ def test_raw_response_create_overload_11(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -943,7 +945,7 @@ def test_streaming_response_create_overload_11(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -975,7 +977,7 @@ def test_method_create_overload_12(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1014,7 +1016,7 @@ def test_method_create_with_all_params_overload_12(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1029,7 +1031,7 @@ def test_raw_response_create_overload_12(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1044,7 +1046,7 @@ def test_streaming_response_create_overload_12(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1076,7 +1078,7 @@ def test_method_create_overload_13(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1097,7 +1099,7 @@ def test_method_create_with_all_params_overload_13(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1112,7 +1114,7 @@ def test_raw_response_create_overload_13(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1127,7 +1129,7 @@ def test_streaming_response_create_overload_13(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1159,7 +1161,7 @@ def test_method_create_overload_14(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1177,7 +1179,7 @@ def test_method_create_with_all_params_overload_14(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1192,7 +1194,7 @@ def test_raw_response_create_overload_14(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1207,7 +1209,7 @@ def test_streaming_response_create_overload_14(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1240,7 +1242,7 @@ def test_method_update_overload_1(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1268,7 +1270,7 @@ def test_method_update_with_all_params_overload_1(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1284,7 +1286,7 @@ def test_raw_response_update_overload_1(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1300,7 +1302,7 @@ def test_streaming_response_update_overload_1(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1344,7 +1346,7 @@ def test_method_update_overload_2(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1370,7 +1372,7 @@ def test_method_update_with_all_params_overload_2(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1386,7 +1388,7 @@ def test_raw_response_update_overload_2(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1402,7 +1404,7 @@ def test_streaming_response_update_overload_2(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1446,7 +1448,7 @@ def test_method_update_overload_3(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1468,7 +1470,7 @@ def test_method_update_with_all_params_overload_3(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1484,7 +1486,7 @@ def test_raw_response_update_overload_3(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1500,7 +1502,7 @@ def test_streaming_response_update_overload_3(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1544,7 +1546,7 @@ def test_method_update_overload_4(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1566,7 +1568,7 @@ def test_method_update_with_all_params_overload_4(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1582,7 +1584,7 @@ def test_raw_response_update_overload_4(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1598,7 +1600,7 @@ def test_streaming_response_update_overload_4(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1642,7 +1644,7 @@ def test_method_update_overload_5(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1666,7 +1668,7 @@ def test_method_update_with_all_params_overload_5(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1682,7 +1684,7 @@ def test_raw_response_update_overload_5(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1698,7 +1700,7 @@ def test_streaming_response_update_overload_5(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1742,7 +1744,7 @@ def test_method_update_overload_6(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1767,7 +1769,7 @@ def test_method_update_with_all_params_overload_6(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1783,7 +1785,7 @@ def test_raw_response_update_overload_6(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1799,7 +1801,7 @@ def test_streaming_response_update_overload_6(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1843,7 +1845,7 @@ def test_method_update_overload_7(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1865,7 +1867,7 @@ def test_method_update_with_all_params_overload_7(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1881,7 +1883,7 @@ def test_raw_response_update_overload_7(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1897,7 +1899,7 @@ def test_streaming_response_update_overload_7(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1941,7 +1943,7 @@ def test_method_update_overload_8(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1969,7 +1971,7 @@ def test_method_update_with_all_params_overload_8(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1985,7 +1987,7 @@ def test_raw_response_update_overload_8(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2001,7 +2003,7 @@ def test_streaming_response_update_overload_8(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2045,7 +2047,7 @@ def test_method_update_overload_9(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2071,7 +2073,7 @@ def test_method_update_with_all_params_overload_9(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2087,7 +2089,7 @@ def test_raw_response_update_overload_9(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2103,7 +2105,7 @@ def test_streaming_response_update_overload_9(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2147,7 +2149,7 @@ def test_method_update_overload_10(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2172,7 +2174,7 @@ def test_method_update_with_all_params_overload_10(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2188,7 +2190,7 @@ def test_raw_response_update_overload_10(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2204,7 +2206,7 @@ def test_streaming_response_update_overload_10(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2248,7 +2250,7 @@ def test_method_update_overload_11(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2273,7 +2275,7 @@ def test_method_update_with_all_params_overload_11(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2289,7 +2291,7 @@ def test_raw_response_update_overload_11(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2305,7 +2307,7 @@ def test_streaming_response_update_overload_11(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2349,7 +2351,7 @@ def test_method_update_overload_12(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2389,7 +2391,7 @@ def test_method_update_with_all_params_overload_12(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2405,7 +2407,7 @@ def test_raw_response_update_overload_12(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2421,7 +2423,7 @@ def test_streaming_response_update_overload_12(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2465,7 +2467,7 @@ def test_method_update_overload_13(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2487,7 +2489,7 @@ def test_method_update_with_all_params_overload_13(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2503,7 +2505,7 @@ def test_raw_response_update_overload_13(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2519,7 +2521,7 @@ def test_streaming_response_update_overload_13(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2563,7 +2565,7 @@ def test_method_update_overload_14(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2582,7 +2584,7 @@ def test_method_update_with_all_params_overload_14(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2598,7 +2600,7 @@ def test_raw_response_update_overload_14(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2614,7 +2616,7 @@ def test_streaming_response_update_overload_14(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2777,7 +2779,7 @@ def test_method_get(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2786,7 +2788,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2799,7 +2801,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2812,7 +2814,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2850,7 +2852,7 @@ async def test_method_create_overload_1(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2877,7 +2879,7 @@ async def test_method_create_with_all_params_overload_1(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2892,7 +2894,7 @@ async def test_raw_response_create_overload_1(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2907,7 +2909,7 @@ async def test_streaming_response_create_overload_1(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2939,7 +2941,7 @@ async def test_method_create_overload_2(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2964,7 +2966,7 @@ async def test_method_create_with_all_params_overload_2(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2979,7 +2981,7 @@ async def test_raw_response_create_overload_2(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2994,7 +2996,7 @@ async def test_streaming_response_create_overload_2(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3026,7 +3028,7 @@ async def test_method_create_overload_3(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3047,7 +3049,7 @@ async def test_method_create_with_all_params_overload_3(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3062,7 +3064,7 @@ async def test_raw_response_create_overload_3(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3077,7 +3079,7 @@ async def test_streaming_response_create_overload_3(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3109,7 +3111,7 @@ async def test_method_create_overload_4(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3130,7 +3132,7 @@ async def test_method_create_with_all_params_overload_4(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3145,7 +3147,7 @@ async def test_raw_response_create_overload_4(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3160,7 +3162,7 @@ async def test_streaming_response_create_overload_4(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3192,7 +3194,7 @@ async def test_method_create_overload_5(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3215,7 +3217,7 @@ async def test_method_create_with_all_params_overload_5(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3230,7 +3232,7 @@ async def test_raw_response_create_overload_5(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3245,7 +3247,7 @@ async def test_streaming_response_create_overload_5(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3277,7 +3279,7 @@ async def test_method_create_overload_6(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3301,7 +3303,7 @@ async def test_method_create_with_all_params_overload_6(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3316,7 +3318,7 @@ async def test_raw_response_create_overload_6(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3331,7 +3333,7 @@ async def test_streaming_response_create_overload_6(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3363,7 +3365,7 @@ async def test_method_create_overload_7(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3384,7 +3386,7 @@ async def test_method_create_with_all_params_overload_7(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3399,7 +3401,7 @@ async def test_raw_response_create_overload_7(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3414,7 +3416,7 @@ async def test_streaming_response_create_overload_7(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3446,7 +3448,7 @@ async def test_method_create_overload_8(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3473,7 +3475,7 @@ async def test_method_create_with_all_params_overload_8(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3488,7 +3490,7 @@ async def test_raw_response_create_overload_8(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3503,7 +3505,7 @@ async def test_streaming_response_create_overload_8(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3535,7 +3537,7 @@ async def test_method_create_overload_9(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3560,7 +3562,7 @@ async def test_method_create_with_all_params_overload_9(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3575,7 +3577,7 @@ async def test_raw_response_create_overload_9(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3590,7 +3592,7 @@ async def test_streaming_response_create_overload_9(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3622,7 +3624,7 @@ async def test_method_create_overload_10(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3646,7 +3648,7 @@ async def test_method_create_with_all_params_overload_10(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3661,7 +3663,7 @@ async def test_raw_response_create_overload_10(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3676,7 +3678,7 @@ async def test_streaming_response_create_overload_10(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3708,7 +3710,7 @@ async def test_method_create_overload_11(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3732,7 +3734,7 @@ async def test_method_create_with_all_params_overload_11(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3747,7 +3749,7 @@ async def test_raw_response_create_overload_11(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3762,7 +3764,7 @@ async def test_streaming_response_create_overload_11(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3794,7 +3796,7 @@ async def test_method_create_overload_12(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3833,7 +3835,7 @@ async def test_method_create_with_all_params_overload_12(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3848,7 +3850,7 @@ async def test_raw_response_create_overload_12(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3863,7 +3865,7 @@ async def test_streaming_response_create_overload_12(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3895,7 +3897,7 @@ async def test_method_create_overload_13(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3916,7 +3918,7 @@ async def test_method_create_with_all_params_overload_13(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3931,7 +3933,7 @@ async def test_raw_response_create_overload_13(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3946,7 +3948,7 @@ async def test_streaming_response_create_overload_13(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3978,7 +3980,7 @@ async def test_method_create_overload_14(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3996,7 +3998,7 @@ async def test_method_create_with_all_params_overload_14(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4011,7 +4013,7 @@ async def test_raw_response_create_overload_14(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4026,7 +4028,7 @@ async def test_streaming_response_create_overload_14(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4059,7 +4061,7 @@ async def test_method_update_overload_1(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4087,7 +4089,7 @@ async def test_method_update_with_all_params_overload_1(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4103,7 +4105,7 @@ async def test_raw_response_update_overload_1(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4119,7 +4121,7 @@ async def test_streaming_response_update_overload_1(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4163,7 +4165,7 @@ async def test_method_update_overload_2(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4189,7 +4191,7 @@ async def test_method_update_with_all_params_overload_2(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4205,7 +4207,7 @@ async def test_raw_response_update_overload_2(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4221,7 +4223,7 @@ async def test_streaming_response_update_overload_2(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4265,7 +4267,7 @@ async def test_method_update_overload_3(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4287,7 +4289,7 @@ async def test_method_update_with_all_params_overload_3(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4303,7 +4305,7 @@ async def test_raw_response_update_overload_3(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4319,7 +4321,7 @@ async def test_streaming_response_update_overload_3(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4363,7 +4365,7 @@ async def test_method_update_overload_4(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4385,7 +4387,7 @@ async def test_method_update_with_all_params_overload_4(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4401,7 +4403,7 @@ async def test_raw_response_update_overload_4(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4417,7 +4419,7 @@ async def test_streaming_response_update_overload_4(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4461,7 +4463,7 @@ async def test_method_update_overload_5(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4485,7 +4487,7 @@ async def test_method_update_with_all_params_overload_5(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4501,7 +4503,7 @@ async def test_raw_response_update_overload_5(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4517,7 +4519,7 @@ async def test_streaming_response_update_overload_5(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4561,7 +4563,7 @@ async def test_method_update_overload_6(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4586,7 +4588,7 @@ async def test_method_update_with_all_params_overload_6(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4602,7 +4604,7 @@ async def test_raw_response_update_overload_6(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4618,7 +4620,7 @@ async def test_streaming_response_update_overload_6(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4662,7 +4664,7 @@ async def test_method_update_overload_7(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4684,7 +4686,7 @@ async def test_method_update_with_all_params_overload_7(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4700,7 +4702,7 @@ async def test_raw_response_update_overload_7(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4716,7 +4718,7 @@ async def test_streaming_response_update_overload_7(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4760,7 +4762,7 @@ async def test_method_update_overload_8(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4788,7 +4790,7 @@ async def test_method_update_with_all_params_overload_8(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4804,7 +4806,7 @@ async def test_raw_response_update_overload_8(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4820,7 +4822,7 @@ async def test_streaming_response_update_overload_8(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4864,7 +4866,7 @@ async def test_method_update_overload_9(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4890,7 +4892,7 @@ async def test_method_update_with_all_params_overload_9(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4906,7 +4908,7 @@ async def test_raw_response_update_overload_9(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4922,7 +4924,7 @@ async def test_streaming_response_update_overload_9(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4966,7 +4968,7 @@ async def test_method_update_overload_10(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4991,7 +4993,7 @@ async def test_method_update_with_all_params_overload_10(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5007,7 +5009,7 @@ async def test_raw_response_update_overload_10(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5023,7 +5025,7 @@ async def test_streaming_response_update_overload_10(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5067,7 +5069,7 @@ async def test_method_update_overload_11(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5092,7 +5094,7 @@ async def test_method_update_with_all_params_overload_11(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5108,7 +5110,7 @@ async def test_raw_response_update_overload_11(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5124,7 +5126,7 @@ async def test_streaming_response_update_overload_11(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5168,7 +5170,7 @@ async def test_method_update_overload_12(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5208,7 +5210,7 @@ async def test_method_update_with_all_params_overload_12(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5224,7 +5226,7 @@ async def test_raw_response_update_overload_12(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5240,7 +5242,7 @@ async def test_streaming_response_update_overload_12(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5284,7 +5286,7 @@ async def test_method_update_overload_13(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5306,7 +5308,7 @@ async def test_method_update_with_all_params_overload_13(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5322,7 +5324,7 @@ async def test_raw_response_update_overload_13(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5338,7 +5340,7 @@ async def test_streaming_response_update_overload_13(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5382,7 +5384,7 @@ async def test_method_update_overload_14(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5401,7 +5403,7 @@ async def test_method_update_with_all_params_overload_14(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5417,7 +5419,7 @@ async def test_raw_response_update_overload_14(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5433,7 +5435,7 @@ async def test_streaming_response_update_overload_14(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5596,7 +5598,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5605,7 +5607,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="string", ) - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5618,7 +5620,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5631,7 +5633,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True