From 4557d767d9b92a3715d07418deae2e5a1f33c16a Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Thu, 28 Mar 2024 04:20:00 +0000 Subject: [PATCH] feat(api): update via SDK Studio (#182) --- api.md | 886 +++++++++--------- src/cloudflare/_client.py | 16 +- src/cloudflare/resources/__init__.py | 24 +- .../alerting/destinations/webhooks.py | 10 +- src/cloudflare/resources/alerting/history.py | 14 +- src/cloudflare/resources/alerting/policies.py | 10 +- .../hostname_associations.py | 30 +- .../resources/client_certificates.py | 77 +- .../custom_certificates.py | 17 +- .../resources/custom_nameservers.py | 10 +- .../dns/analytics/reports/bytimes.py | 10 +- .../dns/analytics/reports/reports.py | 10 +- .../dns/firewall/analytics/reports/bytimes.py | 10 +- .../dns/firewall/analytics/reports/reports.py | 10 +- .../resources/dns/firewall/firewall.py | 38 +- src/cloudflare/resources/dnssec.py | 56 +- .../durable_objects/namespaces/objects.py | 14 +- src/cloudflare/resources/filters.py | 38 +- .../resources/firewall/lockdowns.py | 38 +- src/cloudflare/resources/firewall/rules.py | 38 +- .../resources/firewall/waf/overrides.py | 38 +- .../resources/firewall/waf/packages/groups.py | 14 +- .../resources/healthchecks/healthchecks.py | 34 +- .../resources/healthchecks/previews.py | 18 +- src/cloudflare/resources/images/v1/v1.py | 41 +- .../resources/keyless_certificates.py | 26 +- .../resources/load_balancers/previews.py | 10 +- src/cloudflare/resources/logpush/edge.py | 10 +- src/cloudflare/resources/logpush/jobs.py | 26 +- .../resources/logs/control/cmb/config.py | 18 +- .../configs/configs.py | 42 +- .../magic_network_monitoring/configs/full.py | 10 +- .../rules/advertisements.py | 12 +- .../magic_network_monitoring/rules/rules.py | 42 +- .../mtls_certificates/mtls_certificates.py | 46 +- .../hostnames/certificates.py | 44 +- .../hostnames/hostnames.py | 16 +- .../resources/page_shield/page_shield.py | 18 +- .../resources/page_shield/policies.py | 31 +- .../resources/pagerules/settings.py | 10 +- src/cloudflare/resources/plans.py | 10 +- .../resources/ssl/universal/settings.py | 26 +- .../resources/stream/audio_tracks.py | 18 +- .../resources/user/firewall/access_rules.py | 30 +- .../resources/user/load_balancers/preview.py | 10 +- .../resources/user/organizations.py | 14 +- .../resources/waiting_rooms/events/details.py | 10 +- .../resources/waiting_rooms/events/events.py | 34 +- .../resources/waiting_rooms/waiting_rooms.py | 34 +- .../resources/web3/hostnames/hostnames.py | 26 +- .../content_lists/content_lists.py | 24 +- .../content_lists/entries.py | 38 +- src/cloudflare/resources/workers/filters.py | 10 +- src/cloudflare/resources/workers/routes.py | 18 +- .../dispatch/namespaces/scripts/scripts.py | 10 +- .../access/applications/applications.py | 102 +- .../access/applications/policies.py | 26 +- .../resources/zero_trust/access/bookmarks.py | 26 +- .../access/certificates/certificates.py | 26 +- .../access/certificates/settings.py | 6 +- .../zero_trust/access/custom_pages.py | 28 +- .../resources/zero_trust/access/groups.py | 26 +- .../zero_trust/access/service_tokens.py | 26 +- .../resources/zero_trust/access/tags.py | 26 +- .../access/users/last_seen_identity.py | 10 +- .../resources/zero_trust/devices/dex_tests.py | 44 +- .../resources/zero_trust/devices/networks.py | 38 +- .../zero_trust/devices/policies/excludes.py | 6 +- .../devices/policies/fallback_domains.py | 6 +- .../zero_trust/devices/policies/includes.py | 6 +- .../zero_trust/devices/policies/policies.py | 38 +- .../devices/posture/integrations.py | 44 +- .../zero_trust/devices/posture/posture.py | 26 +- .../resources/zero_trust/devices/settings.py | 30 +- .../zero_trust/identity_providers.py | 150 +-- .../resources/zero_trust/organizations.py | 26 +- .../resources/zones/settings/advanced_ddos.py | 10 +- .../resources/zones/settings/always_online.py | 18 +- .../zones/settings/always_use_https.py | 18 +- .../settings/automatic_https_rewrites.py | 26 +- .../automatic_platform_optimization.py | 28 +- .../resources/zones/settings/brotli.py | 18 +- .../zones/settings/browser_cache_ttl.py | 18 +- .../resources/zones/settings/browser_check.py | 18 +- .../resources/zones/settings/cache_level.py | 18 +- .../resources/zones/settings/challenge_ttl.py | 18 +- .../resources/zones/settings/ciphers.py | 18 +- .../zones/settings/development_mode.py | 18 +- .../resources/zones/settings/early_hints.py | 18 +- .../zones/settings/email_obfuscation.py | 18 +- .../resources/zones/settings/font_settings.py | 18 +- .../zones/settings/h2_prioritization.py | 26 +- .../zones/settings/hotlink_protection.py | 18 +- .../resources/zones/settings/http2.py | 18 +- .../resources/zones/settings/http3.py | 18 +- .../zones/settings/image_resizing.py | 22 +- .../zones/settings/ip_geolocation.py | 18 +- .../resources/zones/settings/ipv6.py | 18 +- .../zones/settings/min_tls_version.py | 18 +- .../resources/zones/settings/minify.py | 18 +- .../resources/zones/settings/mirage.py | 18 +- .../zones/settings/mobile_redirect.py | 18 +- .../resources/zones/settings/nel.py | 22 +- .../settings/opportunistic_encryption.py | 26 +- .../zones/settings/opportunistic_onion.py | 18 +- .../zones/settings/orange_to_orange.py | 26 +- .../settings/origin_error_page_pass_thru.py | 26 +- .../resources/zones/settings/polish.py | 22 +- .../zones/settings/prefetch_preload.py | 18 +- .../zones/settings/proxy_read_timeout.py | 26 +- .../resources/zones/settings/pseudo_ipv4.py | 18 +- .../zones/settings/response_buffering.py | 18 +- .../resources/zones/settings/rocket_loader.py | 22 +- .../zones/settings/security_headers.py | 18 +- .../zones/settings/security_level.py | 18 +- .../zones/settings/server_side_excludes.py | 18 +- .../settings/sort_query_string_for_cache.py | 26 +- .../resources/zones/settings/ssl.py | 18 +- .../zones/settings/ssl_recommender.py | 26 +- .../resources/zones/settings/tls_1_3.py | 18 +- .../zones/settings/tls_client_auth.py | 18 +- .../zones/settings/true_client_ip_header.py | 18 +- .../resources/zones/settings/waf.py | 18 +- .../resources/zones/settings/webp.py | 18 +- .../resources/zones/settings/websocket.py | 18 +- .../resources/zones/settings/zero_rtt.py | 18 +- src/cloudflare/types/__init__.py | 36 +- src/cloudflare/types/accounts/__init__.py | 2 +- .../types/accounts/member_list_response.py | 4 +- .../accounts/{iam_schemas_role.py => role.py} | 4 +- .../types/accounts/role_list_response.py | 4 +- src/cloudflare/types/alerting/__init__.py | 4 +- .../{aaa_history.py => alerting_history.py} | 4 +- .../{aaa_policies.py => alerting_policies.py} | 4 +- .../types/alerting/destinations/__init__.py | 4 +- ...aaa_pagerduty.py => alerting_pagerduty.py} | 4 +- .../{aaa_webhooks.py => alerting_webhooks.py} | 4 +- .../destinations/pagerduty_get_response.py | 4 +- .../destinations/webhook_list_response.py | 4 +- .../types/alerting/policy_list_response.py | 4 +- ...le_rate_plan.py => available_rate_plan.py} | 4 +- .../types/certificate_authorities/__init__.py | 4 +- ...ciation.py => tls_hostname_association.py} | 4 +- ...t_certificate.py => client_certificate.py} | 4 +- ...m_certificate.py => custom_certificate.py} | 8 +- .../prioritize_update_response.py | 4 +- ...vers_custom_ns.py => custom_nameserver.py} | 4 +- .../types/custom_nameserver_get_response.py | 4 +- .../custom_nameserver_verify_response.py | 4 +- src/cloudflare/types/dns/__init__.py | 2 +- .../types/dns/analytics/__init__.py | 2 +- ..._api_report.py => dns_analytics_report.py} | 4 +- .../types/dns/analytics/reports/__init__.py | 2 +- ...ime.py => dns_analytics_report_by_time.py} | 4 +- ...rewall_dns_firewall.py => dns_firewall.py} | 4 +- .../types/{dnssec_dnssec.py => dnssec.py} | 4 +- .../types/durable_objects/__init__.py | 2 +- ...mespace.py => durable_object_namespace.py} | 4 +- .../namespace_list_response.py | 4 +- .../durable_objects/namespaces/__init__.py | 2 +- .../{workers_object.py => durable_object.py} | 4 +- .../types/filter_create_response.py | 4 +- src/cloudflare/types/firewall/__init__.py | 4 +- ...filter_rule.py => firewall_filter_rule.py} | 8 +- ...elockdown.py => firewall_zone_lockdown.py} | 4 +- .../types/firewall/rule_create_response.py | 4 +- .../types/firewall/rule_edit_response.py | 4 +- src/cloudflare/types/firewall/waf/__init__.py | 2 +- .../types/firewall/waf/packages/__init__.py | 2 +- ...as_group.py => waf_managed_rules_group.py} | 4 +- ...legacy_jhs_override.py => waf_override.py} | 4 +- ...egacy_jhs_filter.py => firewall_filter.py} | 4 +- ...hchecks_healthchecks.py => healthcheck.py} | 4 +- .../types/healthcheck_list_response.py | 4 +- src/cloudflare/types/images/__init__.py | 2 +- .../images/{images_image.py => image.py} | 4 +- .../types/images/v1_list_response.py | 4 +- .../types/images/v2_list_response.py | 4 +- src/cloudflare/types/intel/__init__.py | 2 +- ...inkhole_item.py => intel_sinkhole_item.py} | 4 +- .../types/intel/sinkhole_list_response.py | 4 +- ...ase.py => keyless_certificate_hostname.py} | 4 +- .../keyless_certificate_list_response.py | 4 +- src/cloudflare/types/logpush/__init__.py | 2 +- .../types/logpush/datasets/__init__.py | 2 +- .../logpush/datasets/job_get_response.py | 4 +- ...{logpush_logpush_job.py => logpush_job.py} | 4 +- .../types/logpush/edge_get_response.py | 4 +- ...ant_logs_job.py => instant_logpush_job.py} | 4 +- .../types/logpush/job_list_response.py | 4 +- .../types/logs/control/cmb/__init__.py | 2 +- ...logcontrol_cmb_config.py => cmb_config.py} | 4 +- .../magic_network_monitoring/__init__.py | 4 +- ....py => magic_network_monitoring_config.py} | 4 +- ...le.py => magic_network_monitoring_rule.py} | 4 +- .../rule_list_response.py | 4 +- .../rules/__init__.py | 4 +- ...c_network_monitoring_rule_advertisable.py} | 4 +- ...tificate_object.py => mtls_certificate.py} | 4 +- .../types/mtls_certificate_list_response.py | 6 +- ...ect_post.py => mtls_certificate_update.py} | 4 +- .../types/mtls_certificates/__init__.py | 4 +- .../association_get_response.py | 4 +- ...ct.py => mtls_certificate_asssociation.py} | 4 +- .../types/origin_tls_client_auth/__init__.py | 4 +- .../hostname_update_response.py | 4 +- .../hostnames/__init__.py | 4 +- .../hostnames/certificate_list_response.py | 4 +- ...ct.py => origin_tls_client_certificate.py} | 4 +- ...py => origin_tls_client_certificate_id.py} | 4 +- src/cloudflare/types/page_shield/__init__.py | 2 +- ...shield_policy.py => page_shield_policy.py} | 4 +- .../types/page_shield/policy_list_response.py | 4 +- ...one_settings.py => page_shield_setting.py} | 4 +- ...ings.py => page_shield_update_response.py} | 4 +- .../types/pagerule_list_response.py | 4 +- src/cloudflare/types/pagerules/__init__.py | 2 +- ..._settings.py => zone_pagerule_settings.py} | 4 +- src/cloudflare/types/plan_list_response.py | 4 +- .../types/request_tracers/__init__.py | 2 +- ...quest_tracer_trace.py => request_trace.py} | 12 +- .../request_tracers/trace_create_response.py | 4 +- .../types/secondary_dns/__init__.py | 9 +- ...t.py => secondary_dns_disable_transfer.py} | 4 +- .../secondary_dns_disable_transfer_result.py | 6 - .../secondary_dns_enable_transfer.py | 6 + .../secondary_dns_enable_transfer_result.py | 6 - ...force_result.py => secondary_dns_force.py} | 4 +- src/cloudflare/types/ssl/__init__.py | 4 +- ...ication.py => tls_verification_setting.py} | 4 +- .../types/ssl/universal/__init__.py | 4 +- ...universal.py => universal_ssl_settings.py} | 4 +- .../types/ssl/verification_get_response.py | 4 +- src/cloudflare/types/stream/__init__.py | 2 +- .../types/stream/audio_track_get_response.py | 4 +- ...am_additional_audio.py => stream_audio.py} | 4 +- src/cloudflare/types/user/__init__.py | 2 +- src/cloudflare/types/user/billing/__init__.py | 2 +- ..._billing_history.py => billing_history.py} | 4 +- .../user/billing/history_get_response.py | 4 +- .../types/user/firewall/__init__.py | 2 +- .../{legacy_jhs_rule.py => firewall_rule.py} | 4 +- .../types/user/invite_list_response.py | 4 +- .../types/user/load_balancers/__init__.py | 2 +- .../load_balancers/load_balancing_preview.py | 30 + .../load_balancing_preview_result.py | 32 - .../{iam_organization.py => organization.py} | 4 +- .../types/user/token_create_response.py | 4 +- src/cloudflare/types/user/tokens/__init__.py | 2 +- .../tokens/{iam_value.py => token_value.py} | 4 +- ...ingroom_waitingroom.py => waiting_room.py} | 4 +- .../types/waiting_room_list_response.py | 4 +- .../types/waiting_rooms/__init__.py | 4 +- .../waiting_rooms/event_list_response.py | 4 +- .../types/waiting_rooms/events/__init__.py | 2 +- ...result.py => waitingroom_event_details.py} | 4 +- .../waiting_rooms/rule_create_response.py | 4 +- .../waiting_rooms/rule_delete_response.py | 4 +- .../types/waiting_rooms/rule_edit_response.py | 4 +- .../types/waiting_rooms/rule_list_response.py | 4 +- .../waiting_rooms/rule_update_response.py | 4 +- ...m_event_result.py => waitingroom_event.py} | 4 +- ...oom_rule_result.py => waitingroom_rule.py} | 4 +- src/cloudflare/types/web3/__init__.py | 2 +- ...ostname.py => distributed_web_hostname.py} | 4 +- .../types/web3/hostname_list_response.py | 4 +- .../ipfs_universal_paths/__init__.py | 2 +- .../content_list_update_params.py | 4 +- .../content_lists/__init__.py | 8 +- ...tributed_web_config_content_list_entry.py} | 4 +- ...ed_web_config_content_list_entry_param.py} | 4 +- .../content_lists/entry_list_response.py | 4 +- ...=> distributed_web_config_content_list.py} | 4 +- src/cloudflare/types/workers/__init__.py | 4 +- .../types/workers/filter_list_response.py | 4 +- .../types/workers/route_list_response.py | 4 +- .../types/workers/scripts/__init__.py | 2 +- .../workers/scripts/binding_get_response.py | 4 +- ..._schemas_binding.py => workers_binding.py} | 4 +- .../{workers_filters.py => workers_filter.py} | 4 +- .../{workers_routes.py => workers_route.py} | 4 +- .../dispatch/namespaces/__init__.py | 4 +- ...workers_for_platforms_namespace_script.py} | 4 +- src/cloudflare/types/zero_trust/__init__.py | 8 +- .../types/zero_trust/access/__init__.py | 18 +- .../access/application_list_response.py | 4 +- .../access/applications/__init__.py | 4 +- .../access/applications/ca_list_response.py | 4 +- .../applications/policy_list_response.py | 4 +- .../{access_ca.py => zero_trust_ca.py} | 4 +- ...ess_policies.py => zero_trust_policies.py} | 4 +- .../access/bookmark_list_response.py | 4 +- .../access/certificate_list_response.py | 4 +- .../access/certificates/__init__.py | 4 +- .../certificates/setting_get_response.py | 4 +- .../certificates/setting_update_params.py | 4 +- .../certificates/setting_update_response.py | 4 +- ...ess_settings.py => zero_trust_settings.py} | 4 +- ..._param.py => zero_trust_settings_param.py} | 4 +- .../access/custom_page_list_response.py | 4 +- .../zero_trust/access/group_list_response.py | 4 +- .../types/zero_trust/access/logs/__init__.py | 2 +- .../logs/access_request_list_response.py | 4 +- ...uests.py => zero_trust_access_requests.py} | 4 +- .../access/service_token_list_response.py | 4 +- .../zero_trust/access/tag_list_response.py | 4 +- .../zero_trust/access/user_list_response.py | 4 +- .../types/zero_trust/access/users/__init__.py | 2 +- ...ess_identity.py => zero_trust_identity.py} | 4 +- .../{access_apps.py => zero_trust_apps.py} | 4 +- ...s_bookmarks.py => zero_trust_bookmarks.py} | 4 +- ...ificates.py => zero_trust_certificates.py} | 4 +- ...stom_page.py => zero_trust_custom_page.py} | 4 +- ...=> zero_trust_custom_page_without_html.py} | 4 +- ...{access_groups.py => zero_trust_groups.py} | 4 +- ...tokens.py => zero_trust_service_tokens.py} | 4 +- .../{access_tag.py => zero_trust_tag.py} | 4 +- .../{access_users.py => zero_trust_users.py} | 4 +- .../types/zero_trust/device_list_response.py | 4 +- .../types/zero_trust/devices/__init__.py | 16 +- ...networks.py => device_managed_networks.py} | 4 +- ...sture_rules.py => device_posture_rules.py} | 4 +- ...y.py => devices_device_settings_policy.py} | 12 +- .../devices/dex_test_delete_response.py | 4 +- .../devices/dex_test_list_response.py | 4 +- ...hemas_http.py => dex_test_schemas_http.py} | 4 +- .../devices/network_delete_response.py | 4 +- .../devices/network_list_response.py | 4 +- .../zero_trust/devices/policies/__init__.py | 14 +- ...k_domain.py => devices_fallback_domain.py} | 4 +- ...am.py => devices_fallback_domain_param.py} | 4 +- ...plit_tunnel.py => devices_split_tunnel.py} | 4 +- ...ude.py => devices_split_tunnel_include.py} | 4 +- ... => devices_split_tunnel_include_param.py} | 4 +- ...param.py => devices_split_tunnel_param.py} | 4 +- .../devices/policies/exclude_get_response.py | 4 +- .../devices/policies/exclude_list_response.py | 4 +- .../devices/policies/exclude_update_params.py | 4 +- .../policies/exclude_update_response.py | 4 +- .../policies/fallback_domain_get_response.py | 4 +- .../policies/fallback_domain_list_response.py | 4 +- .../policies/fallback_domain_update_params.py | 4 +- .../fallback_domain_update_response.py | 4 +- .../devices/policies/include_get_response.py | 4 +- .../devices/policies/include_list_response.py | 4 +- .../devices/policies/include_update_params.py | 4 +- .../policies/include_update_response.py | 4 +- .../devices/policy_delete_response.py | 4 +- .../devices/policy_list_response.py | 4 +- .../zero_trust/devices/posture/__init__.py | 4 +- ...ions.py => device_posture_integrations.py} | 4 +- .../posture/integration_list_response.py | 4 +- .../devices/posture_list_response.py | 4 +- ... => zero_trust_account_device_settings.py} | 4 +- .../types/zero_trust/seat_edit_response.py | 4 +- ...vices_devices.py => zero_trust_devices.py} | 4 +- ...rs.py => zero_trust_identity_providers.py} | 4 +- ...zations.py => zero_trust_organizations.py} | 4 +- .../{access_seats.py => zero_trust_seats.py} | 4 +- .../types/zones/setting_edit_params.py | 196 ++-- .../types/zones/setting_edit_response.py | 196 ++-- .../types/zones/setting_get_response.py | 196 ++-- .../types/zones/settings/__init__.py | 226 +++-- ...matic_platform_optimization_edit_params.py | 4 +- .../settings/h2_prioritization_edit_params.py | 4 +- .../settings/image_resizing_edit_params.py | 4 +- .../types/zones/settings/nel_edit_params.py | 4 +- .../settings/orange_to_orange_edit_params.py | 4 +- .../zones/settings/polish_edit_params.py | 4 +- .../proxy_read_timeout_edit_params.py | 4 +- .../settings/rocket_loader_edit_params.py | 4 +- .../settings/ssl_recommender_edit_params.py | 4 +- .../{zones_0rtt.py => zone_setting_0rtt.py} | 4 +- ...tt_param.py => zone_setting_0rtt_param.py} | 4 +- ..._ddos.py => zone_setting_advanced_ddos.py} | 4 +- ...py => zone_setting_advanced_ddos_param.py} | 4 +- ...nline.py => zone_setting_always_online.py} | 4 +- ...py => zone_setting_always_online_param.py} | 4 +- ...ps.py => zone_setting_always_use_https.py} | 4 +- ...=> zone_setting_always_use_https_param.py} | 4 +- ... zone_setting_automatic_https_rewrites.py} | 4 +- ...setting_automatic_https_rewrites_param.py} | 4 +- ...etting_automatic_platform_optimization.py} | 4 +- ..._automatic_platform_optimization_param.py} | 4 +- ...zones_brotli.py => zone_setting_brotli.py} | 4 +- ..._param.py => zone_setting_brotli_param.py} | 4 +- ...l.py => zone_setting_browser_cache_ttl.py} | 4 +- ...> zone_setting_browser_cache_ttl_param.py} | 4 +- ...check.py => zone_setting_browser_check.py} | 4 +- ...py => zone_setting_browser_check_param.py} | 4 +- ...buffering.py => zone_setting_buffering.py} | 4 +- ...ram.py => zone_setting_buffering_param.py} | 4 +- ...e_level.py => zone_setting_cache_level.py} | 4 +- ...m.py => zone_setting_cache_level_param.py} | 4 +- ...e_ttl.py => zone_setting_challenge_ttl.py} | 4 +- ...py => zone_setting_challenge_ttl_param.py} | 4 +- ...nes_ciphers.py => zone_setting_ciphers.py} | 4 +- ...param.py => zone_setting_ciphers_param.py} | 4 +- ...de.py => zone_setting_development_mode.py} | 4 +- ...=> zone_setting_development_mode_param.py} | 4 +- ...y_hints.py => zone_setting_early_hints.py} | 4 +- ...m.py => zone_setting_early_hints_param.py} | 4 +- ...n.py => zone_setting_email_obfuscation.py} | 4 +- ...> zone_setting_email_obfuscation_param.py} | 4 +- ...udflare_fonts.py => zone_setting_fonts.py} | 4 +- ...n.py => zone_setting_h2_prioritization.py} | 4 +- ...> zone_setting_h2_prioritization_param.py} | 4 +- ....py => zone_setting_hotlink_protection.py} | 4 +- ... zone_setting_hotlink_protection_param.py} | 4 +- .../{zones_http2.py => zone_setting_http2.py} | 4 +- ...2_param.py => zone_setting_http2_param.py} | 4 +- .../{zones_http3.py => zone_setting_http3.py} | 4 +- ...3_param.py => zone_setting_http3_param.py} | 4 +- ...zing.py => zone_setting_image_resizing.py} | 4 +- ...y => zone_setting_image_resizing_param.py} | 4 +- ...tion.py => zone_setting_ip_geolocation.py} | 4 +- ...y => zone_setting_ip_geolocation_param.py} | 4 +- .../{zones_ipv6.py => zone_setting_ipv6.py} | 4 +- ...v6_param.py => zone_setting_ipv6_param.py} | 4 +- ...ion.py => zone_setting_min_tls_version.py} | 4 +- ... => zone_setting_min_tls_version_param.py} | 4 +- ...zones_minify.py => zone_setting_minify.py} | 4 +- ..._param.py => zone_setting_minify_param.py} | 4 +- ...zones_mirage.py => zone_setting_mirage.py} | 4 +- ..._param.py => zone_setting_mirage_param.py} | 4 +- ...ect.py => zone_setting_mobile_redirect.py} | 4 +- ... => zone_setting_mobile_redirect_param.py} | 4 +- .../{zones_nel.py => zone_setting_nel.py} | 4 +- ...nel_param.py => zone_setting_nel_param.py} | 4 +- ... zone_setting_opportunistic_encryption.py} | 4 +- ...setting_opportunistic_encryption_param.py} | 4 +- ...py => zone_setting_opportunistic_onion.py} | 4 +- ...zone_setting_opportunistic_onion_param.py} | 4 +- ...ge.py => zone_setting_orange_to_orange.py} | 4 +- ...=> zone_setting_orange_to_orange_param.py} | 4 +- ...ne_setting_origin_error_page_pass_thru.py} | 4 +- ...ting_origin_error_page_pass_thru_param.py} | 4 +- ...zones_polish.py => zone_setting_polish.py} | 4 +- ..._param.py => zone_setting_polish_param.py} | 4 +- ...ad.py => zone_setting_prefetch_preload.py} | 4 +- ...=> zone_setting_prefetch_preload_param.py} | 4 +- ....py => zone_setting_proxy_read_timeout.py} | 4 +- ... zone_setting_proxy_read_timeout_param.py} | 4 +- ...do_ipv4.py => zone_setting_pseudo_ipv4.py} | 4 +- ...m.py => zone_setting_pseudo_ipv4_param.py} | 4 +- ...oader.py => zone_setting_rocket_loader.py} | 4 +- ...py => zone_setting_rocket_loader_param.py} | 4 +- ...der.py => zone_setting_security_header.py} | 4 +- ... => zone_setting_security_header_param.py} | 4 +- ...evel.py => zone_setting_security_level.py} | 4 +- ...y => zone_setting_security_level_param.py} | 4 +- ...py => zone_setting_server_side_exclude.py} | 4 +- ...zone_setting_server_side_exclude_param.py} | 4 +- ...ne_setting_sort_query_string_for_cache.py} | 4 +- ...ting_sort_query_string_for_cache_param.py} | 4 +- .../{zones_ssl.py => zone_setting_ssl.py} | 4 +- ...ssl_param.py => zone_setting_ssl_param.py} | 4 +- ...der.py => zone_setting_ssl_recommender.py} | 4 +- ... => zone_setting_ssl_recommender_param.py} | 4 +- ...nes_tls_1_3.py => zone_setting_tls_1_3.py} | 4 +- ...param.py => zone_setting_tls_1_3_param.py} | 4 +- ...uth.py => zone_setting_tls_client_auth.py} | 4 +- ... => zone_setting_tls_client_auth_param.py} | 4 +- ... => zone_setting_true_client_ip_header.py} | 4 +- ...ne_setting_true_client_ip_header_param.py} | 4 +- .../{zones_waf.py => zone_setting_waf.py} | 4 +- ...waf_param.py => zone_setting_waf_param.py} | 4 +- .../{zones_webp.py => zone_setting_webp.py} | 4 +- ...bp_param.py => zone_setting_webp_param.py} | 4 +- ...bsockets.py => zone_setting_websockets.py} | 4 +- ...am.py => zone_setting_websockets_param.py} | 4 +- .../{zones_page_rule.py => zones_pagerule.py} | 4 +- .../alerting/destinations/test_webhooks.py | 14 +- tests/api_resources/alerting/test_history.py | 18 +- tests/api_resources/alerting/test_policies.py | 14 +- .../test_hostname_associations.py | 34 +- .../dns/analytics/reports/test_bytimes.py | 18 +- .../dns/analytics/test_reports.py | 18 +- .../analytics/reports/test_bytimes.py | 18 +- .../dns/firewall/analytics/test_reports.py | 18 +- tests/api_resources/dns/test_firewall.py | 62 +- .../namespaces/test_objects.py | 18 +- .../api_resources/firewall/test_lockdowns.py | 54 +- tests/api_resources/firewall/test_rules.py | 58 +- .../firewall/waf/packages/test_groups.py | 18 +- .../firewall/waf/test_overrides.py | 54 +- .../healthchecks/test_previews.py | 30 +- tests/api_resources/images/test_v1.py | 54 +- .../load_balancers/test_previews.py | 14 +- tests/api_resources/logpush/test_edge.py | 18 +- tests/api_resources/logpush/test_jobs.py | 50 +- .../logs/control/cmb/test_config.py | 30 +- .../configs/test_full.py | 14 +- .../rules/test_advertisements.py | 14 +- .../magic_network_monitoring/test_configs.py | 62 +- .../magic_network_monitoring/test_rules.py | 62 +- .../hostnames/test_certificates.py | 38 +- .../origin_tls_client_auth/test_hostnames.py | 14 +- .../page_shield/test_policies.py | 46 +- .../api_resources/pagerules/test_settings.py | 14 +- .../ssl/universal/test_settings.py | 30 +- .../api_resources/stream/test_audio_tracks.py | 34 +- .../api_resources/test_client_certificates.py | 100 +- .../api_resources/test_custom_certificates.py | 50 +- .../api_resources/test_custom_nameservers.py | 18 +- tests/api_resources/test_dnssec.py | 30 +- tests/api_resources/test_filters.py | 54 +- tests/api_resources/test_healthchecks.py | 62 +- .../test_keyless_certificates.py | 46 +- tests/api_resources/test_mtls_certificates.py | 68 +- tests/api_resources/test_page_shield.py | 30 +- tests/api_resources/test_plans.py | 14 +- tests/api_resources/test_waiting_rooms.py | 62 +- .../user/firewall/test_access_rules.py | 50 +- .../user/load_balancers/test_preview.py | 14 +- .../api_resources/user/test_organizations.py | 18 +- .../waiting_rooms/events/test_details.py | 14 +- .../waiting_rooms/test_events.py | 62 +- .../content_lists/test_entries.py | 46 +- .../test_content_lists.py | 26 +- tests/api_resources/web3/test_hostnames.py | 46 +- tests/api_resources/workers/test_filters.py | 14 +- tests/api_resources/workers/test_routes.py | 30 +- .../dispatch/namespaces/test_scripts.py | 14 +- .../access/applications/test_policies.py | 50 +- .../zero_trust/access/test_applications.py | 274 +++--- .../zero_trust/access/test_bookmarks.py | 38 +- .../zero_trust/access/test_certificates.py | 50 +- .../zero_trust/access/test_custom_pages.py | 48 +- .../zero_trust/access/test_groups.py | 50 +- .../zero_trust/access/test_service_tokens.py | 46 +- .../zero_trust/access/test_tags.py | 38 +- .../access/users/test_last_seen_identity.py | 14 +- .../devices/posture/test_integrations.py | 46 +- .../zero_trust/devices/test_dex_tests.py | 46 +- .../zero_trust/devices/test_networks.py | 46 +- .../zero_trust/devices/test_policies.py | 46 +- .../zero_trust/devices/test_posture.py | 46 +- .../zero_trust/devices/test_settings.py | 30 +- .../zero_trust/test_identity_providers.py | 466 ++++----- .../zero_trust/test_organizations.py | 50 +- .../zones/settings/test_advanced_ddos.py | 14 +- .../zones/settings/test_always_online.py | 26 +- .../zones/settings/test_always_use_https.py | 26 +- .../settings/test_automatic_https_rewrites.py | 26 +- .../test_automatic_platform_optimization.py | 26 +- .../zones/settings/test_brotli.py | 26 +- .../zones/settings/test_browser_cache_ttl.py | 26 +- .../zones/settings/test_browser_check.py | 26 +- .../zones/settings/test_cache_level.py | 26 +- .../zones/settings/test_challenge_ttl.py | 26 +- .../zones/settings/test_ciphers.py | 26 +- .../zones/settings/test_development_mode.py | 26 +- .../zones/settings/test_early_hints.py | 26 +- .../zones/settings/test_email_obfuscation.py | 26 +- .../zones/settings/test_font_settings.py | 26 +- .../zones/settings/test_h2_prioritization.py | 30 +- .../zones/settings/test_hotlink_protection.py | 26 +- .../zones/settings/test_http2.py | 26 +- .../zones/settings/test_http3.py | 26 +- .../zones/settings/test_image_resizing.py | 30 +- .../zones/settings/test_ip_geolocation.py | 26 +- .../api_resources/zones/settings/test_ipv6.py | 26 +- .../zones/settings/test_min_tls_version.py | 26 +- .../zones/settings/test_minify.py | 30 +- .../zones/settings/test_mirage.py | 26 +- .../zones/settings/test_mobile_redirect.py | 30 +- .../api_resources/zones/settings/test_nel.py | 30 +- .../settings/test_opportunistic_encryption.py | 34 +- .../settings/test_opportunistic_onion.py | 26 +- .../zones/settings/test_orange_to_orange.py | 30 +- .../test_origin_error_page_pass_thru.py | 50 +- .../zones/settings/test_polish.py | 30 +- .../zones/settings/test_prefetch_preload.py | 26 +- .../zones/settings/test_proxy_read_timeout.py | 30 +- .../zones/settings/test_pseudo_ipv4.py | 26 +- .../zones/settings/test_response_buffering.py | 26 +- .../zones/settings/test_rocket_loader.py | 30 +- .../zones/settings/test_security_headers.py | 30 +- .../zones/settings/test_security_level.py | 26 +- .../settings/test_server_side_excludes.py | 26 +- .../test_sort_query_string_for_cache.py | 50 +- .../api_resources/zones/settings/test_ssl.py | 26 +- .../zones/settings/test_ssl_recommender.py | 30 +- .../zones/settings/test_tls_1_3.py | 26 +- .../zones/settings/test_tls_client_auth.py | 26 +- .../settings/test_true_client_ip_header.py | 26 +- .../api_resources/zones/settings/test_waf.py | 26 +- .../api_resources/zones/settings/test_webp.py | 26 +- .../zones/settings/test_websocket.py | 26 +- .../zones/settings/test_zero_rtt.py | 26 +- 591 files changed, 5281 insertions(+), 5464 deletions(-) rename src/cloudflare/types/accounts/{iam_schemas_role.py => role.py} (85%) rename src/cloudflare/types/alerting/{aaa_history.py => alerting_history.py} (94%) rename src/cloudflare/types/alerting/{aaa_policies.py => alerting_policies.py} (98%) rename src/cloudflare/types/alerting/destinations/{aaa_pagerduty.py => alerting_pagerduty.py} (80%) rename src/cloudflare/types/alerting/destinations/{aaa_webhooks.py => alerting_webhooks.py} (95%) rename src/cloudflare/types/{bill_subs_api_available_rate_plan.py => available_rate_plan.py} (92%) rename src/cloudflare/types/certificate_authorities/{tls_certificates_and_hostnames_hostname_association.py => tls_hostname_association.py} (78%) rename src/cloudflare/types/{tls_certificates_and_hostnames_client_certificate.py => client_certificate.py} (93%) rename src/cloudflare/types/{tls_certificates_and_hostnames_custom_certificate.py => custom_certificate.py} (90%) rename src/cloudflare/types/{dns_custom_nameservers_custom_ns.py => custom_nameserver.py} (88%) rename src/cloudflare/types/dns/analytics/{dns_dns_analytics_api_report.py => dns_analytics_report.py} (95%) rename src/cloudflare/types/dns/analytics/reports/{dns_dns_analytics_api_report_bytime.py => dns_analytics_report_by_time.py} (95%) rename src/cloudflare/types/dns/{dns_firewall_dns_firewall.py => dns_firewall.py} (94%) rename src/cloudflare/types/{dnssec_dnssec.py => dnssec.py} (97%) rename src/cloudflare/types/durable_objects/{workers_namespace.py => durable_object_namespace.py} (82%) rename src/cloudflare/types/durable_objects/namespaces/{workers_object.py => durable_object.py} (86%) rename src/cloudflare/types/firewall/{legacy_jhs_filter_rule.py => firewall_filter_rule.py} (87%) rename src/cloudflare/types/firewall/{legacy_jhs_zonelockdown.py => firewall_zone_lockdown.py} (96%) rename src/cloudflare/types/firewall/waf/packages/{waf_managed_rules_schemas_group.py => waf_managed_rules_group.py} (92%) rename src/cloudflare/types/firewall/waf/{legacy_jhs_override.py => waf_override.py} (96%) rename src/cloudflare/types/{legacy_jhs_filter.py => firewall_filter.py} (91%) rename src/cloudflare/types/{healthchecks_healthchecks.py => healthcheck.py} (97%) rename src/cloudflare/types/images/{images_image.py => image.py} (94%) rename src/cloudflare/types/intel/{intel_sinkholes_sinkhole_item.py => intel_sinkhole_item.py} (90%) rename src/cloudflare/types/{tls_certificates_and_hostnames_base.py => keyless_certificate_hostname.py} (92%) rename src/cloudflare/types/logpush/datasets/{logpush_logpush_job.py => logpush_job.py} (98%) rename src/cloudflare/types/logpush/{logpush_instant_logs_job.py => instant_logpush_job.py} (90%) rename src/cloudflare/types/logs/control/cmb/{logcontrol_cmb_config.py => cmb_config.py} (76%) rename src/cloudflare/types/magic_network_monitoring/{magic_visibility_mnm_config.py => magic_network_monitoring_config.py} (81%) rename src/cloudflare/types/magic_network_monitoring/{magic_visibility_mnm_rule.py => magic_network_monitoring_rule.py} (94%) rename src/cloudflare/types/magic_network_monitoring/rules/{magic_visibility_mnm_rule_advertisable.py => magic_network_monitoring_rule_advertisable.py} (79%) rename src/cloudflare/types/{tls_certificates_and_hostnames_components_schemas_certificate_object.py => mtls_certificate.py} (86%) rename src/cloudflare/types/{tls_certificates_and_hostnames_certificate_object_post.py => mtls_certificate_update.py} (89%) rename src/cloudflare/types/mtls_certificates/{tls_certificates_and_hostnames_association_object.py => mtls_certificate_asssociation.py} (72%) rename src/cloudflare/types/origin_tls_client_auth/hostnames/{tls_certificates_and_hostnames_schemas_certificate_object.py => origin_tls_client_certificate.py} (89%) rename src/cloudflare/types/origin_tls_client_auth/{tls_certificates_and_hostnames_hostname_certid_object.py => origin_tls_client_certificate_id.py} (94%) rename src/cloudflare/types/page_shield/{page_shield_pageshield_policy.py => page_shield_policy.py} (89%) rename src/cloudflare/types/{page_shield_get_zone_settings.py => page_shield_setting.py} (88%) rename src/cloudflare/types/{page_shield_update_zone_settings.py => page_shield_update_response.py} (88%) rename src/cloudflare/types/pagerules/{zones_settings.py => zone_pagerule_settings.py} (61%) rename src/cloudflare/types/request_tracers/{request_tracer_trace.py => request_trace.py} (78%) rename src/cloudflare/types/secondary_dns/{secondary_dns_schemas_force_result.py => secondary_dns_disable_transfer.py} (52%) delete mode 100644 src/cloudflare/types/secondary_dns/secondary_dns_disable_transfer_result.py create mode 100644 src/cloudflare/types/secondary_dns/secondary_dns_enable_transfer.py delete mode 100644 src/cloudflare/types/secondary_dns/secondary_dns_enable_transfer_result.py rename src/cloudflare/types/secondary_dns/{secondary_dns_force_result.py => secondary_dns_force.py} (56%) rename src/cloudflare/types/ssl/{tls_certificates_and_hostnames_verification.py => tls_verification_setting.py} (91%) rename src/cloudflare/types/ssl/universal/{tls_certificates_and_hostnames_universal.py => universal_ssl_settings.py} (93%) rename src/cloudflare/types/stream/{stream_additional_audio.py => stream_audio.py} (89%) rename src/cloudflare/types/user/billing/{bill_subs_api_billing_history.py => billing_history.py} (88%) rename src/cloudflare/types/user/firewall/{legacy_jhs_rule.py => firewall_rule.py} (98%) create mode 100644 src/cloudflare/types/user/load_balancers/load_balancing_preview.py delete mode 100644 src/cloudflare/types/user/load_balancers/load_balancing_preview_result.py rename src/cloudflare/types/user/{iam_organization.py => organization.py} (91%) rename src/cloudflare/types/user/tokens/{iam_value.py => token_value.py} (67%) rename src/cloudflare/types/{waitingroom_waitingroom.py => waiting_room.py} (99%) rename src/cloudflare/types/waiting_rooms/events/{waitingroom_event_details_result.py => waitingroom_event_details.py} (95%) rename src/cloudflare/types/waiting_rooms/{waitingroom_event_result.py => waitingroom_event.py} (97%) rename src/cloudflare/types/waiting_rooms/{waitingroom_rule_result.py => waitingroom_rule.py} (91%) rename src/cloudflare/types/web3/{dweb_config_web3_hostname.py => distributed_web_hostname.py} (91%) rename src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/{dweb_config_content_list_entry.py => distributed_web_config_content_list_entry.py} (86%) rename src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/{dweb_config_content_list_entry_param.py => distributed_web_config_content_list_entry_param.py} (76%) rename src/cloudflare/types/web3/hostnames/ipfs_universal_paths/{dweb_config_content_list_details.py => distributed_web_config_content_list.py} (74%) rename src/cloudflare/types/workers/scripts/{workers_schemas_binding.py => workers_binding.py} (78%) rename src/cloudflare/types/workers/{workers_filters.py => workers_filter.py} (75%) rename src/cloudflare/types/workers/{workers_routes.py => workers_route.py} (81%) rename src/cloudflare/types/workers_for_platforms/dispatch/namespaces/{workers_namespace_script.py => workers_for_platforms_namespace_script.py} (84%) rename src/cloudflare/types/zero_trust/access/applications/{access_ca.py => zero_trust_ca.py} (88%) rename src/cloudflare/types/zero_trust/access/applications/{access_policies.py => zero_trust_policies.py} (99%) rename src/cloudflare/types/zero_trust/access/certificates/{access_settings.py => zero_trust_settings.py} (90%) rename src/cloudflare/types/zero_trust/access/certificates/{access_settings_param.py => zero_trust_settings_param.py} (88%) rename src/cloudflare/types/zero_trust/access/logs/{access_access_requests.py => zero_trust_access_requests.py} (92%) rename src/cloudflare/types/zero_trust/access/users/{access_identity.py => zero_trust_identity.py} (92%) rename src/cloudflare/types/zero_trust/access/{access_apps.py => zero_trust_apps.py} (99%) rename src/cloudflare/types/zero_trust/access/{access_bookmarks.py => zero_trust_bookmarks.py} (91%) rename src/cloudflare/types/zero_trust/access/{access_certificates.py => zero_trust_certificates.py} (90%) rename src/cloudflare/types/zero_trust/access/{access_custom_page.py => zero_trust_custom_page.py} (89%) rename src/cloudflare/types/zero_trust/access/{access_custom_page_without_html.py => zero_trust_custom_page_without_html.py} (85%) rename src/cloudflare/types/zero_trust/access/{access_groups.py => zero_trust_groups.py} (99%) rename src/cloudflare/types/zero_trust/access/{access_service_tokens.py => zero_trust_service_tokens.py} (91%) rename src/cloudflare/types/zero_trust/access/{access_tag.py => zero_trust_tag.py} (87%) rename src/cloudflare/types/zero_trust/access/{access_users.py => zero_trust_users.py} (94%) rename src/cloudflare/types/zero_trust/devices/{teams_devices_device_managed_networks.py => device_managed_networks.py} (90%) rename src/cloudflare/types/zero_trust/devices/{teams_devices_device_posture_rules.py => device_posture_rules.py} (99%) rename src/cloudflare/types/zero_trust/devices/{teams_devices_device_settings_policy.py => devices_device_settings_policy.py} (87%) rename src/cloudflare/types/zero_trust/devices/{teams_devices_device_dex_test_schemas_http.py => dex_test_schemas_http.py} (87%) rename src/cloudflare/types/zero_trust/devices/policies/{teams_devices_fallback_domain.py => devices_fallback_domain.py} (84%) rename src/cloudflare/types/zero_trust/devices/policies/{teams_devices_fallback_domain_param.py => devices_fallback_domain_param.py} (81%) rename src/cloudflare/types/zero_trust/devices/policies/{teams_devices_split_tunnel.py => devices_split_tunnel.py} (87%) rename src/cloudflare/types/zero_trust/devices/policies/{teams_devices_split_tunnel_include.py => devices_split_tunnel_include.py} (85%) rename src/cloudflare/types/zero_trust/devices/policies/{teams_devices_split_tunnel_include_param.py => devices_split_tunnel_include_param.py} (82%) rename src/cloudflare/types/zero_trust/devices/policies/{teams_devices_split_tunnel_param.py => devices_split_tunnel_param.py} (84%) rename src/cloudflare/types/zero_trust/devices/posture/{teams_devices_device_posture_integrations.py => device_posture_integrations.py} (90%) rename src/cloudflare/types/zero_trust/devices/{teams_devices_zero_trust_account_device_settings.py => zero_trust_account_device_settings.py} (83%) rename src/cloudflare/types/zero_trust/{teams_devices_devices.py => zero_trust_devices.py} (96%) rename src/cloudflare/types/zero_trust/{access_identity_providers.py => zero_trust_identity_providers.py} (99%) rename src/cloudflare/types/zero_trust/{access_organizations.py => zero_trust_organizations.py} (96%) rename src/cloudflare/types/zero_trust/{access_seats.py => zero_trust_seats.py} (88%) rename src/cloudflare/types/zones/settings/{zones_0rtt.py => zone_setting_0rtt.py} (90%) rename src/cloudflare/types/zones/settings/{zones_0rtt_param.py => zone_setting_0rtt_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_advanced_ddos.py => zone_setting_advanced_ddos.py} (88%) rename src/cloudflare/types/zones/settings/{zones_advanced_ddos_param.py => zone_setting_advanced_ddos_param.py} (77%) rename src/cloudflare/types/zones/settings/{zones_always_online.py => zone_setting_always_online.py} (88%) rename src/cloudflare/types/zones/settings/{zones_always_online_param.py => zone_setting_always_online_param.py} (77%) rename src/cloudflare/types/zones/settings/{zones_always_use_https.py => zone_setting_always_use_https.py} (88%) rename src/cloudflare/types/zones/settings/{zones_always_use_https_param.py => zone_setting_always_use_https_param.py} (76%) rename src/cloudflare/types/zones/settings/{zones_automatic_https_rewrites.py => zone_setting_automatic_https_rewrites.py} (86%) rename src/cloudflare/types/zones/settings/{zones_automatic_https_rewrites_param.py => zone_setting_automatic_https_rewrites_param.py} (74%) rename src/cloudflare/types/zones/settings/{zones_automatic_platform_optimization.py => zone_setting_automatic_platform_optimization.py} (89%) rename src/cloudflare/types/zones/settings/{zones_automatic_platform_optimization_param.py => zone_setting_automatic_platform_optimization_param.py} (88%) rename src/cloudflare/types/zones/settings/{zones_brotli.py => zone_setting_brotli.py} (90%) rename src/cloudflare/types/zones/settings/{zones_brotli_param.py => zone_setting_brotli_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_browser_cache_ttl.py => zone_setting_browser_cache_ttl.py} (92%) rename src/cloudflare/types/zones/settings/{zones_browser_cache_ttl_param.py => zone_setting_browser_cache_ttl_param.py} (89%) rename src/cloudflare/types/zones/settings/{zones_browser_check.py => zone_setting_browser_check.py} (88%) rename src/cloudflare/types/zones/settings/{zones_browser_check_param.py => zone_setting_browser_check_param.py} (77%) rename src/cloudflare/types/zones/settings/{zones_buffering.py => zone_setting_buffering.py} (89%) rename src/cloudflare/types/zones/settings/{zones_buffering_param.py => zone_setting_buffering_param.py} (78%) rename src/cloudflare/types/zones/settings/{zones_cache_level.py => zone_setting_cache_level.py} (89%) rename src/cloudflare/types/zones/settings/{zones_cache_level_param.py => zone_setting_cache_level_param.py} (78%) rename src/cloudflare/types/zones/settings/{zones_challenge_ttl.py => zone_setting_challenge_ttl.py} (89%) rename src/cloudflare/types/zones/settings/{zones_challenge_ttl_param.py => zone_setting_challenge_ttl_param.py} (81%) rename src/cloudflare/types/zones/settings/{zones_ciphers.py => zone_setting_ciphers.py} (89%) rename src/cloudflare/types/zones/settings/{zones_ciphers_param.py => zone_setting_ciphers_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_development_mode.py => zone_setting_development_mode.py} (91%) rename src/cloudflare/types/zones/settings/{zones_development_mode_param.py => zone_setting_development_mode_param.py} (76%) rename src/cloudflare/types/zones/settings/{zones_early_hints.py => zone_setting_early_hints.py} (89%) rename src/cloudflare/types/zones/settings/{zones_early_hints_param.py => zone_setting_early_hints_param.py} (77%) rename src/cloudflare/types/zones/settings/{zones_email_obfuscation.py => zone_setting_email_obfuscation.py} (87%) rename src/cloudflare/types/zones/settings/{zones_email_obfuscation_param.py => zone_setting_email_obfuscation_param.py} (76%) rename src/cloudflare/types/zones/settings/{speed_cloudflare_fonts.py => zone_setting_fonts.py} (89%) rename src/cloudflare/types/zones/settings/{zones_h2_prioritization.py => zone_setting_h2_prioritization.py} (87%) rename src/cloudflare/types/zones/settings/{zones_h2_prioritization_param.py => zone_setting_h2_prioritization_param.py} (76%) rename src/cloudflare/types/zones/settings/{zones_hotlink_protection.py => zone_setting_hotlink_protection.py} (87%) rename src/cloudflare/types/zones/settings/{zones_hotlink_protection_param.py => zone_setting_hotlink_protection_param.py} (75%) rename src/cloudflare/types/zones/settings/{zones_http2.py => zone_setting_http2.py} (90%) rename src/cloudflare/types/zones/settings/{zones_http2_param.py => zone_setting_http2_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_http3.py => zone_setting_http3.py} (90%) rename src/cloudflare/types/zones/settings/{zones_http3_param.py => zone_setting_http3_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_image_resizing.py => zone_setting_image_resizing.py} (88%) rename src/cloudflare/types/zones/settings/{zones_image_resizing_param.py => zone_setting_image_resizing_param.py} (77%) rename src/cloudflare/types/zones/settings/{zones_ip_geolocation.py => zone_setting_ip_geolocation.py} (88%) rename src/cloudflare/types/zones/settings/{zones_ip_geolocation_param.py => zone_setting_ip_geolocation_param.py} (76%) rename src/cloudflare/types/zones/settings/{zones_ipv6.py => zone_setting_ipv6.py} (90%) rename src/cloudflare/types/zones/settings/{zones_ipv6_param.py => zone_setting_ipv6_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_min_tls_version.py => zone_setting_min_tls_version.py} (88%) rename src/cloudflare/types/zones/settings/{zones_min_tls_version_param.py => zone_setting_min_tls_version_param.py} (77%) rename src/cloudflare/types/zones/settings/{zones_minify.py => zone_setting_minify.py} (92%) rename src/cloudflare/types/zones/settings/{zones_minify_param.py => zone_setting_minify_param.py} (86%) rename src/cloudflare/types/zones/settings/{zones_mirage.py => zone_setting_mirage.py} (90%) rename src/cloudflare/types/zones/settings/{zones_mirage_param.py => zone_setting_mirage_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_mobile_redirect.py => zone_setting_mobile_redirect.py} (92%) rename src/cloudflare/types/zones/settings/{zones_mobile_redirect_param.py => zone_setting_mobile_redirect_param.py} (88%) rename src/cloudflare/types/zones/settings/{zones_nel.py => zone_setting_nel.py} (90%) rename src/cloudflare/types/zones/settings/{zones_nel_param.py => zone_setting_nel_param.py} (80%) rename src/cloudflare/types/zones/settings/{zones_opportunistic_encryption.py => zone_setting_opportunistic_encryption.py} (86%) rename src/cloudflare/types/zones/settings/{zones_opportunistic_encryption_param.py => zone_setting_opportunistic_encryption_param.py} (74%) rename src/cloudflare/types/zones/settings/{zones_opportunistic_onion.py => zone_setting_opportunistic_onion.py} (87%) rename src/cloudflare/types/zones/settings/{zones_opportunistic_onion_param.py => zone_setting_opportunistic_onion_param.py} (75%) rename src/cloudflare/types/zones/settings/{zones_orange_to_orange.py => zone_setting_orange_to_orange.py} (88%) rename src/cloudflare/types/zones/settings/{zones_orange_to_orange_param.py => zone_setting_orange_to_orange_param.py} (76%) rename src/cloudflare/types/zones/settings/{zones_origin_error_page_pass_thru.py => zone_setting_origin_error_page_pass_thru.py} (86%) rename src/cloudflare/types/zones/settings/{zones_origin_error_page_pass_thru_param.py => zone_setting_origin_error_page_pass_thru_param.py} (74%) rename src/cloudflare/types/zones/settings/{zones_polish.py => zone_setting_polish.py} (90%) rename src/cloudflare/types/zones/settings/{zones_polish_param.py => zone_setting_polish_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_prefetch_preload.py => zone_setting_prefetch_preload.py} (88%) rename src/cloudflare/types/zones/settings/{zones_prefetch_preload_param.py => zone_setting_prefetch_preload_param.py} (76%) rename src/cloudflare/types/zones/settings/{zones_proxy_read_timeout.py => zone_setting_proxy_read_timeout.py} (87%) rename src/cloudflare/types/zones/settings/{zones_proxy_read_timeout_param.py => zone_setting_proxy_read_timeout_param.py} (75%) rename src/cloudflare/types/zones/settings/{zones_pseudo_ipv4.py => zone_setting_pseudo_ipv4.py} (89%) rename src/cloudflare/types/zones/settings/{zones_pseudo_ipv4_param.py => zone_setting_pseudo_ipv4_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_rocket_loader.py => zone_setting_rocket_loader.py} (88%) rename src/cloudflare/types/zones/settings/{zones_rocket_loader_param.py => zone_setting_rocket_loader_param.py} (77%) rename src/cloudflare/types/zones/settings/{zones_security_header.py => zone_setting_security_header.py} (90%) rename src/cloudflare/types/zones/settings/{zones_security_header_param.py => zone_setting_security_header_param.py} (85%) rename src/cloudflare/types/zones/settings/{zones_security_level.py => zone_setting_security_level.py} (89%) rename src/cloudflare/types/zones/settings/{zones_security_level_param.py => zone_setting_security_level_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_server_side_exclude.py => zone_setting_server_side_exclude.py} (87%) rename src/cloudflare/types/zones/settings/{zones_server_side_exclude_param.py => zone_setting_server_side_exclude_param.py} (75%) rename src/cloudflare/types/zones/settings/{zones_sort_query_string_for_cache.py => zone_setting_sort_query_string_for_cache.py} (86%) rename src/cloudflare/types/zones/settings/{zones_sort_query_string_for_cache_param.py => zone_setting_sort_query_string_for_cache_param.py} (74%) rename src/cloudflare/types/zones/settings/{zones_ssl.py => zone_setting_ssl.py} (91%) rename src/cloudflare/types/zones/settings/{zones_ssl_param.py => zone_setting_ssl_param.py} (81%) rename src/cloudflare/types/zones/settings/{zones_ssl_recommender.py => zone_setting_ssl_recommender.py} (81%) rename src/cloudflare/types/zones/settings/{zones_ssl_recommender_param.py => zone_setting_ssl_recommender_param.py} (75%) rename src/cloudflare/types/zones/settings/{zones_tls_1_3.py => zone_setting_tls_1_3.py} (90%) rename src/cloudflare/types/zones/settings/{zones_tls_1_3_param.py => zone_setting_tls_1_3_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_tls_client_auth.py => zone_setting_tls_client_auth.py} (88%) rename src/cloudflare/types/zones/settings/{zones_tls_client_auth_param.py => zone_setting_tls_client_auth_param.py} (77%) rename src/cloudflare/types/zones/settings/{zones_true_client_ip_header.py => zone_setting_true_client_ip_header.py} (87%) rename src/cloudflare/types/zones/settings/{zones_true_client_ip_header_param.py => zone_setting_true_client_ip_header_param.py} (75%) rename src/cloudflare/types/zones/settings/{zones_waf.py => zone_setting_waf.py} (90%) rename src/cloudflare/types/zones/settings/{zones_waf_param.py => zone_setting_waf_param.py} (80%) rename src/cloudflare/types/zones/settings/{zones_webp.py => zone_setting_webp.py} (90%) rename src/cloudflare/types/zones/settings/{zones_webp_param.py => zone_setting_webp_param.py} (79%) rename src/cloudflare/types/zones/settings/{zones_websockets.py => zone_setting_websockets.py} (89%) rename src/cloudflare/types/zones/settings/{zones_websockets_param.py => zone_setting_websockets_param.py} (77%) rename src/cloudflare/types/{zones_page_rule.py => zones_pagerule.py} (96%) diff --git a/api.md b/api.md index 772bbed26a2..9c60a9851ae 100644 --- a/api.md +++ b/api.md @@ -44,7 +44,7 @@ Methods: Types: ```python -from cloudflare.types.accounts import IamSchemasRole, RoleListResponse, RoleGetResponse +from cloudflare.types.accounts import Role, RoleListResponse, RoleGetResponse ``` Methods: @@ -137,7 +137,7 @@ Methods: Types: ```python -from cloudflare.types.user.billing import BillSubsAPIBillingHistory, HistoryGetResponse +from cloudflare.types.user.billing import BillingHistory, HistoryGetResponse ``` Methods: @@ -163,15 +163,15 @@ Methods: Types: ```python -from cloudflare.types.user.firewall import LegacyJhsRule, AccessRuleDeleteResponse +from cloudflare.types.user.firewall import FirewallRule, AccessRuleDeleteResponse ``` Methods: -- client.user.firewall.access_rules.create(\*\*params) -> Optional -- client.user.firewall.access_rules.list(\*\*params) -> SyncV4PagePaginationArray[LegacyJhsRule] +- client.user.firewall.access_rules.create(\*\*params) -> Optional +- client.user.firewall.access_rules.list(\*\*params) -> SyncV4PagePaginationArray[FirewallRule] - client.user.firewall.access_rules.delete(identifier) -> Optional -- client.user.firewall.access_rules.edit(identifier, \*\*params) -> Optional +- client.user.firewall.access_rules.edit(identifier, \*\*params) -> Optional ## Invites @@ -179,7 +179,7 @@ Types: ```python from cloudflare.types.user import ( - IamSchemasInvite, + UserInvite, InviteListResponse, InviteEditResponse, InviteGetResponse, @@ -251,12 +251,12 @@ Methods: Types: ```python -from cloudflare.types.user.load_balancers import LoadBalancingPreviewResult +from cloudflare.types.user.load_balancers import LoadBalancingPreview ``` Methods: -- client.user.load_balancers.preview.get(preview_id) -> LoadBalancingPreviewResult +- client.user.load_balancers.preview.get(preview_id) -> LoadBalancingPreview ### Analytics @@ -277,16 +277,12 @@ Methods: Types: ```python -from cloudflare.types.user import ( - IamOrganization, - OrganizationDeleteResponse, - OrganizationGetResponse, -) +from cloudflare.types.user import Organization, OrganizationDeleteResponse, OrganizationGetResponse ``` Methods: -- client.user.organizations.list(\*\*params) -> SyncV4PagePaginationArray[IamOrganization] +- client.user.organizations.list(\*\*params) -> SyncV4PagePaginationArray[Organization] - client.user.organizations.delete(organization_id) -> OrganizationDeleteResponse - client.user.organizations.get(organization_id) -> OrganizationGetResponse @@ -296,7 +292,7 @@ Types: ```python from cloudflare.types.user import ( - BillSubsAPISubscription, + Subscription, SubscriptionUpdateResponse, SubscriptionDeleteResponse, SubscriptionEditResponse, @@ -352,12 +348,12 @@ Methods: Types: ```python -from cloudflare.types.user.tokens import IamValue +from cloudflare.types.user.tokens import TokenValue ``` Methods: -- client.user.tokens.value.update(token_id, \*\*params) -> str +- client.user.tokens.value.update(token_id, \*\*params) -> str # Zones @@ -418,402 +414,402 @@ Methods: Types: ```python -from cloudflare.types.zones.settings import Zones0rtt +from cloudflare.types.zones.settings import ZoneSetting0rtt ``` Methods: -- client.zones.settings.zero_rtt.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.zero_rtt.get(\*, zone_id) -> Optional +- client.zones.settings.zero_rtt.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.zero_rtt.get(\*, zone_id) -> Optional ### AdvancedDDOS Types: ```python -from cloudflare.types.zones.settings import ZonesAdvancedDDOS +from cloudflare.types.zones.settings import ZoneSettingAdvancedDDOS ``` Methods: -- client.zones.settings.advanced_ddos.get(\*, zone_id) -> Optional +- client.zones.settings.advanced_ddos.get(\*, zone_id) -> Optional ### AlwaysOnline Types: ```python -from cloudflare.types.zones.settings import ZonesAlwaysOnline +from cloudflare.types.zones.settings import ZoneSettingAlwaysOnline ``` Methods: -- client.zones.settings.always_online.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.always_online.get(\*, zone_id) -> Optional +- client.zones.settings.always_online.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.always_online.get(\*, zone_id) -> Optional ### AlwaysUseHTTPS Types: ```python -from cloudflare.types.zones.settings import ZonesAlwaysUseHTTPS +from cloudflare.types.zones.settings import ZoneSettingAlwaysUseHTTPS ``` Methods: -- client.zones.settings.always_use_https.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.always_use_https.get(\*, zone_id) -> Optional +- client.zones.settings.always_use_https.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.always_use_https.get(\*, zone_id) -> Optional ### AutomaticHTTPSRewrites Types: ```python -from cloudflare.types.zones.settings import ZonesAutomaticHTTPSRewrites +from cloudflare.types.zones.settings import ZoneSettingAutomaticHTTPSRewrites ``` Methods: -- client.zones.settings.automatic_https_rewrites.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.automatic_https_rewrites.get(\*, zone_id) -> Optional +- client.zones.settings.automatic_https_rewrites.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.automatic_https_rewrites.get(\*, zone_id) -> Optional ### AutomaticPlatformOptimization Types: ```python -from cloudflare.types.zones.settings import ZonesAutomaticPlatformOptimization +from cloudflare.types.zones.settings import ZoneSettingAutomaticPlatformOptimization ``` Methods: -- client.zones.settings.automatic_platform_optimization.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.automatic_platform_optimization.get(\*, zone_id) -> Optional +- client.zones.settings.automatic_platform_optimization.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.automatic_platform_optimization.get(\*, zone_id) -> Optional ### Brotli Types: ```python -from cloudflare.types.zones.settings import ZonesBrotli +from cloudflare.types.zones.settings import ZoneSettingBrotli ``` Methods: -- client.zones.settings.brotli.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.brotli.get(\*, zone_id) -> Optional +- client.zones.settings.brotli.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.brotli.get(\*, zone_id) -> Optional ### BrowserCacheTTL Types: ```python -from cloudflare.types.zones.settings import ZonesBrowserCacheTTL +from cloudflare.types.zones.settings import ZoneSettingBrowserCacheTTL ``` Methods: -- client.zones.settings.browser_cache_ttl.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.browser_cache_ttl.get(\*, zone_id) -> Optional +- client.zones.settings.browser_cache_ttl.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.browser_cache_ttl.get(\*, zone_id) -> Optional ### BrowserCheck Types: ```python -from cloudflare.types.zones.settings import ZonesBrowserCheck +from cloudflare.types.zones.settings import ZoneSettingBrowserCheck ``` Methods: -- client.zones.settings.browser_check.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.browser_check.get(\*, zone_id) -> Optional +- client.zones.settings.browser_check.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.browser_check.get(\*, zone_id) -> Optional ### CacheLevel Types: ```python -from cloudflare.types.zones.settings import ZonesCacheLevel +from cloudflare.types.zones.settings import ZoneSettingCacheLevel ``` Methods: -- client.zones.settings.cache_level.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.cache_level.get(\*, zone_id) -> Optional +- client.zones.settings.cache_level.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.cache_level.get(\*, zone_id) -> Optional ### ChallengeTTL Types: ```python -from cloudflare.types.zones.settings import ZonesChallengeTTL +from cloudflare.types.zones.settings import ZoneSettingChallengeTTL ``` Methods: -- client.zones.settings.challenge_ttl.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.challenge_ttl.get(\*, zone_id) -> Optional +- client.zones.settings.challenge_ttl.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.challenge_ttl.get(\*, zone_id) -> Optional ### Ciphers Types: ```python -from cloudflare.types.zones.settings import ZonesCiphers +from cloudflare.types.zones.settings import ZoneSettingCiphers ``` Methods: -- client.zones.settings.ciphers.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.ciphers.get(\*, zone_id) -> Optional +- client.zones.settings.ciphers.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.ciphers.get(\*, zone_id) -> Optional ### DevelopmentMode Types: ```python -from cloudflare.types.zones.settings import ZonesDevelopmentMode +from cloudflare.types.zones.settings import ZoneSettingDevelopmentMode ``` Methods: -- client.zones.settings.development_mode.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.development_mode.get(\*, zone_id) -> Optional +- client.zones.settings.development_mode.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.development_mode.get(\*, zone_id) -> Optional ### EarlyHints Types: ```python -from cloudflare.types.zones.settings import ZonesEarlyHints +from cloudflare.types.zones.settings import ZoneSettingEarlyHints ``` Methods: -- client.zones.settings.early_hints.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.early_hints.get(\*, zone_id) -> Optional +- client.zones.settings.early_hints.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.early_hints.get(\*, zone_id) -> Optional ### EmailObfuscation Types: ```python -from cloudflare.types.zones.settings import ZonesEmailObfuscation +from cloudflare.types.zones.settings import ZoneSettingEmailObfuscation ``` Methods: -- client.zones.settings.email_obfuscation.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.email_obfuscation.get(\*, zone_id) -> Optional +- client.zones.settings.email_obfuscation.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.email_obfuscation.get(\*, zone_id) -> Optional ### H2Prioritization Types: ```python -from cloudflare.types.zones.settings import ZonesH2Prioritization +from cloudflare.types.zones.settings import ZoneSettingH2Prioritization ``` Methods: -- client.zones.settings.h2_prioritization.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.h2_prioritization.get(\*, zone_id) -> Optional +- client.zones.settings.h2_prioritization.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.h2_prioritization.get(\*, zone_id) -> Optional ### HotlinkProtection Types: ```python -from cloudflare.types.zones.settings import ZonesHotlinkProtection +from cloudflare.types.zones.settings import ZoneSettingHotlinkProtection ``` Methods: -- client.zones.settings.hotlink_protection.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.hotlink_protection.get(\*, zone_id) -> Optional +- client.zones.settings.hotlink_protection.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.hotlink_protection.get(\*, zone_id) -> Optional ### HTTP2 Types: ```python -from cloudflare.types.zones.settings import ZonesHTTP2 +from cloudflare.types.zones.settings import ZoneSettingHTTP2 ``` Methods: -- client.zones.settings.http2.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.http2.get(\*, zone_id) -> Optional +- client.zones.settings.http2.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.http2.get(\*, zone_id) -> Optional ### HTTP3 Types: ```python -from cloudflare.types.zones.settings import ZonesHTTP3 +from cloudflare.types.zones.settings import ZoneSettingHTTP3 ``` Methods: -- client.zones.settings.http3.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.http3.get(\*, zone_id) -> Optional +- client.zones.settings.http3.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.http3.get(\*, zone_id) -> Optional ### ImageResizing Types: ```python -from cloudflare.types.zones.settings import ZonesImageResizing +from cloudflare.types.zones.settings import ZoneSettingImageResizing ``` Methods: -- client.zones.settings.image_resizing.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.image_resizing.get(\*, zone_id) -> Optional +- client.zones.settings.image_resizing.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.image_resizing.get(\*, zone_id) -> Optional ### IPGeolocation Types: ```python -from cloudflare.types.zones.settings import ZonesIPGeolocation +from cloudflare.types.zones.settings import ZoneSettingIPGeolocation ``` Methods: -- client.zones.settings.ip_geolocation.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.ip_geolocation.get(\*, zone_id) -> Optional +- client.zones.settings.ip_geolocation.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.ip_geolocation.get(\*, zone_id) -> Optional ### IPV6 Types: ```python -from cloudflare.types.zones.settings import ZonesIPV6 +from cloudflare.types.zones.settings import ZoneSettingIPV6 ``` Methods: -- client.zones.settings.ipv6.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.ipv6.get(\*, zone_id) -> Optional +- client.zones.settings.ipv6.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.ipv6.get(\*, zone_id) -> Optional ### MinTLSVersion Types: ```python -from cloudflare.types.zones.settings import ZonesMinTLSVersion +from cloudflare.types.zones.settings import ZoneSettingMinTLSVersion ``` Methods: -- client.zones.settings.min_tls_version.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.min_tls_version.get(\*, zone_id) -> Optional +- client.zones.settings.min_tls_version.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.min_tls_version.get(\*, zone_id) -> Optional ### Minify Types: ```python -from cloudflare.types.zones.settings import ZonesMinify +from cloudflare.types.zones.settings import ZoneSettingMinify ``` Methods: -- client.zones.settings.minify.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.minify.get(\*, zone_id) -> Optional +- client.zones.settings.minify.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.minify.get(\*, zone_id) -> Optional ### Mirage Types: ```python -from cloudflare.types.zones.settings import ZonesMirage +from cloudflare.types.zones.settings import ZoneSettingMirage ``` Methods: -- client.zones.settings.mirage.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.mirage.get(\*, zone_id) -> Optional +- client.zones.settings.mirage.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.mirage.get(\*, zone_id) -> Optional ### MobileRedirect Types: ```python -from cloudflare.types.zones.settings import ZonesMobileRedirect +from cloudflare.types.zones.settings import ZoneSettingMobileRedirect ``` Methods: -- client.zones.settings.mobile_redirect.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.mobile_redirect.get(\*, zone_id) -> Optional +- client.zones.settings.mobile_redirect.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.mobile_redirect.get(\*, zone_id) -> Optional ### NEL Types: ```python -from cloudflare.types.zones.settings import ZonesNEL +from cloudflare.types.zones.settings import ZoneSettingNEL ``` Methods: -- client.zones.settings.nel.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.nel.get(\*, zone_id) -> Optional +- client.zones.settings.nel.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.nel.get(\*, zone_id) -> Optional ### OpportunisticEncryption Types: ```python -from cloudflare.types.zones.settings import ZonesOpportunisticEncryption +from cloudflare.types.zones.settings import ZoneSettingOpportunisticEncryption ``` Methods: -- client.zones.settings.opportunistic_encryption.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.opportunistic_encryption.get(\*, zone_id) -> Optional +- client.zones.settings.opportunistic_encryption.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.opportunistic_encryption.get(\*, zone_id) -> Optional ### OpportunisticOnion Types: ```python -from cloudflare.types.zones.settings import ZonesOpportunisticOnion +from cloudflare.types.zones.settings import ZoneSettingOpportunisticOnion ``` Methods: -- client.zones.settings.opportunistic_onion.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.opportunistic_onion.get(\*, zone_id) -> Optional +- client.zones.settings.opportunistic_onion.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.opportunistic_onion.get(\*, zone_id) -> Optional ### OrangeToOrange Types: ```python -from cloudflare.types.zones.settings import ZonesOrangeToOrange +from cloudflare.types.zones.settings import ZoneSettingOrangeToOrange ``` Methods: -- client.zones.settings.orange_to_orange.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.orange_to_orange.get(\*, zone_id) -> Optional +- client.zones.settings.orange_to_orange.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.orange_to_orange.get(\*, zone_id) -> Optional ### OriginErrorPagePassThru Types: ```python -from cloudflare.types.zones.settings import ZonesOriginErrorPagePassThru +from cloudflare.types.zones.settings import ZoneSettingOriginErrorPagePassThru ``` Methods: -- client.zones.settings.origin_error_page_pass_thru.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.origin_error_page_pass_thru.get(\*, zone_id) -> Optional +- client.zones.settings.origin_error_page_pass_thru.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.origin_error_page_pass_thru.get(\*, zone_id) -> Optional ### OriginMaxHTTPVersion @@ -836,247 +832,247 @@ Methods: Types: ```python -from cloudflare.types.zones.settings import ZonesPolish +from cloudflare.types.zones.settings import ZoneSettingPolish ``` Methods: -- client.zones.settings.polish.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.polish.get(\*, zone_id) -> Optional +- client.zones.settings.polish.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.polish.get(\*, zone_id) -> Optional ### PrefetchPreload Types: ```python -from cloudflare.types.zones.settings import ZonesPrefetchPreload +from cloudflare.types.zones.settings import ZoneSettingPrefetchPreload ``` Methods: -- client.zones.settings.prefetch_preload.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.prefetch_preload.get(\*, zone_id) -> Optional +- client.zones.settings.prefetch_preload.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.prefetch_preload.get(\*, zone_id) -> Optional ### ProxyReadTimeout Types: ```python -from cloudflare.types.zones.settings import ZonesProxyReadTimeout +from cloudflare.types.zones.settings import ZoneSettingProxyReadTimeout ``` Methods: -- client.zones.settings.proxy_read_timeout.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.proxy_read_timeout.get(\*, zone_id) -> Optional +- client.zones.settings.proxy_read_timeout.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.proxy_read_timeout.get(\*, zone_id) -> Optional ### PseudoIPV4 Types: ```python -from cloudflare.types.zones.settings import ZonesPseudoIPV4 +from cloudflare.types.zones.settings import ZoneSettingPseudoIPV4 ``` Methods: -- client.zones.settings.pseudo_ipv4.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.pseudo_ipv4.get(\*, zone_id) -> Optional +- client.zones.settings.pseudo_ipv4.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.pseudo_ipv4.get(\*, zone_id) -> Optional ### ResponseBuffering Types: ```python -from cloudflare.types.zones.settings import ZonesBuffering +from cloudflare.types.zones.settings import ZoneSettingBuffering ``` Methods: -- client.zones.settings.response_buffering.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.response_buffering.get(\*, zone_id) -> Optional +- client.zones.settings.response_buffering.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.response_buffering.get(\*, zone_id) -> Optional ### RocketLoader Types: ```python -from cloudflare.types.zones.settings import ZonesRocketLoader +from cloudflare.types.zones.settings import ZoneSettingRocketLoader ``` Methods: -- client.zones.settings.rocket_loader.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.rocket_loader.get(\*, zone_id) -> Optional +- client.zones.settings.rocket_loader.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.rocket_loader.get(\*, zone_id) -> Optional ### SecurityHeaders Types: ```python -from cloudflare.types.zones.settings import ZonesSecurityHeader +from cloudflare.types.zones.settings import ZoneSettingSecurityHeader ``` Methods: -- client.zones.settings.security_headers.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.security_headers.get(\*, zone_id) -> Optional +- client.zones.settings.security_headers.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.security_headers.get(\*, zone_id) -> Optional ### SecurityLevel Types: ```python -from cloudflare.types.zones.settings import ZonesSecurityLevel +from cloudflare.types.zones.settings import ZoneSettingSecurityLevel ``` Methods: -- client.zones.settings.security_level.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.security_level.get(\*, zone_id) -> Optional +- client.zones.settings.security_level.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.security_level.get(\*, zone_id) -> Optional ### ServerSideExcludes Types: ```python -from cloudflare.types.zones.settings import ZonesServerSideExclude +from cloudflare.types.zones.settings import ZoneSettingServerSideExclude ``` Methods: -- client.zones.settings.server_side_excludes.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.server_side_excludes.get(\*, zone_id) -> Optional +- client.zones.settings.server_side_excludes.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.server_side_excludes.get(\*, zone_id) -> Optional ### SortQueryStringForCache Types: ```python -from cloudflare.types.zones.settings import ZonesSortQueryStringForCache +from cloudflare.types.zones.settings import ZoneSettingSortQueryStringForCache ``` Methods: -- client.zones.settings.sort_query_string_for_cache.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.sort_query_string_for_cache.get(\*, zone_id) -> Optional +- client.zones.settings.sort_query_string_for_cache.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.sort_query_string_for_cache.get(\*, zone_id) -> Optional ### SSL Types: ```python -from cloudflare.types.zones.settings import ZonesSSL +from cloudflare.types.zones.settings import ZoneSettingSSL ``` Methods: -- client.zones.settings.ssl.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.ssl.get(\*, zone_id) -> Optional +- client.zones.settings.ssl.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.ssl.get(\*, zone_id) -> Optional ### SSLRecommender Types: ```python -from cloudflare.types.zones.settings import ZonesSSLRecommender +from cloudflare.types.zones.settings import ZoneSettingSSLRecommender ``` Methods: -- client.zones.settings.ssl_recommender.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.ssl_recommender.get(\*, zone_id) -> Optional +- client.zones.settings.ssl_recommender.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.ssl_recommender.get(\*, zone_id) -> Optional ### TLS1_3 Types: ```python -from cloudflare.types.zones.settings import ZonesTLS1_3 +from cloudflare.types.zones.settings import ZoneSettingTLS1_3 ``` Methods: -- client.zones.settings.tls_1_3.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.tls_1_3.get(\*, zone_id) -> Optional +- client.zones.settings.tls_1_3.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.tls_1_3.get(\*, zone_id) -> Optional ### TLSClientAuth Types: ```python -from cloudflare.types.zones.settings import ZonesTLSClientAuth +from cloudflare.types.zones.settings import ZoneSettingTLSClientAuth ``` Methods: -- client.zones.settings.tls_client_auth.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.tls_client_auth.get(\*, zone_id) -> Optional +- client.zones.settings.tls_client_auth.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.tls_client_auth.get(\*, zone_id) -> Optional ### TrueClientIPHeader Types: ```python -from cloudflare.types.zones.settings import ZonesTrueClientIPHeader +from cloudflare.types.zones.settings import ZoneSettingTrueClientIPHeader ``` Methods: -- client.zones.settings.true_client_ip_header.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.true_client_ip_header.get(\*, zone_id) -> Optional +- client.zones.settings.true_client_ip_header.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.true_client_ip_header.get(\*, zone_id) -> Optional ### WAF Types: ```python -from cloudflare.types.zones.settings import ZonesWAF +from cloudflare.types.zones.settings import ZoneSettingWAF ``` Methods: -- client.zones.settings.waf.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.waf.get(\*, zone_id) -> Optional +- client.zones.settings.waf.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.waf.get(\*, zone_id) -> Optional ### WebP Types: ```python -from cloudflare.types.zones.settings import ZonesWebP +from cloudflare.types.zones.settings import ZoneSettingWebP ``` Methods: -- client.zones.settings.webp.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.webp.get(\*, zone_id) -> Optional +- client.zones.settings.webp.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.webp.get(\*, zone_id) -> Optional ### Websocket Types: ```python -from cloudflare.types.zones.settings import ZonesWebsockets +from cloudflare.types.zones.settings import ZoneSettingWebsockets ``` Methods: -- client.zones.settings.websocket.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.websocket.get(\*, zone_id) -> Optional +- client.zones.settings.websocket.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.websocket.get(\*, zone_id) -> Optional ### FontSettings Types: ```python -from cloudflare.types.zones.settings import SpeedCloudflareFonts +from cloudflare.types.zones.settings import ZoneSettingFonts ``` Methods: -- client.zones.settings.font_settings.edit(\*, zone_id, \*\*params) -> Optional -- client.zones.settings.font_settings.get(\*, zone_id) -> Optional +- client.zones.settings.font_settings.edit(\*, zone_id, \*\*params) -> Optional +- client.zones.settings.font_settings.get(\*, zone_id) -> Optional ## CustomNameservers @@ -1243,7 +1239,7 @@ Methods: Methods: -- client.load_balancers.previews.get(preview_id, \*, account_id) -> LoadBalancingPreviewResult +- client.load_balancers.previews.get(preview_id, \*, account_id) -> LoadBalancingPreview ## Regions @@ -1424,13 +1420,13 @@ Methods: Types: ```python -from cloudflare.types.ssl.universal import TLSCertificatesAndHostnamesUniversal +from cloudflare.types.ssl.universal import UniversalSSLSettings ``` Methods: -- client.ssl.universal.settings.edit(\*, zone_id, \*\*params) -> TLSCertificatesAndHostnamesUniversal -- client.ssl.universal.settings.get(\*, zone_id) -> TLSCertificatesAndHostnamesUniversal +- client.ssl.universal.settings.edit(\*, zone_id, \*\*params) -> UniversalSSLSettings +- client.ssl.universal.settings.get(\*, zone_id) -> UniversalSSLSettings ## Verification @@ -1438,7 +1434,7 @@ Types: ```python from cloudflare.types.ssl import ( - TLSCertificatesAndHostnamesVerification, + TLSVerificationSetting, VerificationEditResponse, VerificationGetResponse, ) @@ -1519,20 +1515,20 @@ Methods: Types: ```python -from cloudflare.types import BillSubsAPIAvailableRatePlan, PlanListResponse +from cloudflare.types import AvailableRatePlan, PlanListResponse ``` Methods: - client.plans.list(zone_identifier) -> Optional -- client.plans.get(plan_identifier, \*, zone_identifier) -> BillSubsAPIAvailableRatePlan +- client.plans.get(plan_identifier, \*, zone_identifier) -> AvailableRatePlan # RatePlans Types: ```python -from cloudflare.types import BillSubsRatePlan, RatePlanGetResponse +from cloudflare.types import RatePlan, RatePlanGetResponse ``` Methods: @@ -1546,29 +1542,29 @@ Methods: Types: ```python -from cloudflare.types.certificate_authorities import TLSCertificatesAndHostnamesHostnameAssociation +from cloudflare.types.certificate_authorities import TLSHostnameAssociation ``` Methods: -- client.certificate_authorities.hostname_associations.update(\*, zone_id, \*\*params) -> TLSCertificatesAndHostnamesHostnameAssociation -- client.certificate_authorities.hostname_associations.get(\*, zone_id, \*\*params) -> TLSCertificatesAndHostnamesHostnameAssociation +- client.certificate_authorities.hostname_associations.update(\*, zone_id, \*\*params) -> TLSHostnameAssociation +- client.certificate_authorities.hostname_associations.get(\*, zone_id, \*\*params) -> TLSHostnameAssociation # ClientCertificates Types: ```python -from cloudflare.types import TLSCertificatesAndHostnamesClientCertificate +from cloudflare.types import ClientCertificate ``` Methods: -- client.client_certificates.create(\*, zone_id, \*\*params) -> TLSCertificatesAndHostnamesClientCertificate -- client.client_certificates.list(\*, zone_id, \*\*params) -> SyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate] -- client.client_certificates.delete(client_certificate_id, \*, zone_id) -> TLSCertificatesAndHostnamesClientCertificate -- client.client_certificates.edit(client_certificate_id, \*, zone_id) -> TLSCertificatesAndHostnamesClientCertificate -- client.client_certificates.get(client_certificate_id, \*, zone_id) -> TLSCertificatesAndHostnamesClientCertificate +- client.client_certificates.create(\*, zone_id, \*\*params) -> ClientCertificate +- client.client_certificates.list(\*, zone_id, \*\*params) -> SyncV4PagePaginationArray[ClientCertificate] +- client.client_certificates.delete(client_certificate_id, \*, zone_id) -> ClientCertificate +- client.client_certificates.edit(client_certificate_id, \*, zone_id) -> ClientCertificate +- client.client_certificates.get(client_certificate_id, \*, zone_id) -> ClientCertificate # CustomCertificates @@ -1576,7 +1572,7 @@ Types: ```python from cloudflare.types import ( - TLSCertificatesAndHostnamesCustomCertificate, + CustomCertificate, CustomCertificateCreateResponse, CustomCertificateDeleteResponse, CustomCertificateEditResponse, @@ -1587,7 +1583,7 @@ from cloudflare.types import ( Methods: - client.custom_certificates.create(\*, zone_id, \*\*params) -> CustomCertificateCreateResponse -- client.custom_certificates.list(\*, zone_id, \*\*params) -> SyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate] +- client.custom_certificates.list(\*, zone_id, \*\*params) -> SyncV4PagePaginationArray[CustomCertificate] - client.custom_certificates.delete(custom_certificate_id, \*, zone_id) -> CustomCertificateDeleteResponse - client.custom_certificates.edit(custom_certificate_id, \*, zone_id, \*\*params) -> CustomCertificateEditResponse - client.custom_certificates.get(custom_certificate_id, \*, zone_id) -> CustomCertificateGetResponse @@ -1610,7 +1606,7 @@ Types: ```python from cloudflare.types import ( - TLSCertificatesAndHostnamesCustomHostname, + CustomHostname, CustomHostnameCreateResponse, CustomHostnameListResponse, CustomHostnameDeleteResponse, @@ -1651,7 +1647,7 @@ Types: ```python from cloudflare.types import ( - DNSCustomNameserversCustomNS, + CustomNameserver, CustomNameserverDeleteResponse, CustomNameserverAvailabiltyResponse, CustomNameserverGetResponse, @@ -1661,7 +1657,7 @@ from cloudflare.types import ( Methods: -- client.custom_nameservers.create(\*, account_id, \*\*params) -> DNSCustomNameserversCustomNS +- client.custom_nameservers.create(\*, account_id, \*\*params) -> CustomNameserver - client.custom_nameservers.delete(custom_ns_id, \*, account_id) -> Optional - client.custom_nameservers.availabilty(\*, account_id) -> Optional - client.custom_nameservers.get(\*, account_id) -> Optional @@ -1702,40 +1698,40 @@ Methods: Types: ```python -from cloudflare.types.dns.analytics import DNSDNSAnalyticsAPIReport +from cloudflare.types.dns.analytics import DNSAnalyticsReport ``` Methods: -- client.dns.analytics.reports.get(\*, zone_id, \*\*params) -> DNSDNSAnalyticsAPIReport +- client.dns.analytics.reports.get(\*, zone_id, \*\*params) -> DNSAnalyticsReport #### Bytimes Types: ```python -from cloudflare.types.dns.analytics.reports import DNSDNSAnalyticsAPIReportBytime +from cloudflare.types.dns.analytics.reports import DNSAnalyticsReportByTime ``` Methods: -- client.dns.analytics.reports.bytimes.get(\*, zone_id, \*\*params) -> DNSDNSAnalyticsAPIReportBytime +- client.dns.analytics.reports.bytimes.get(\*, zone_id, \*\*params) -> DNSAnalyticsReportByTime ## Firewall Types: ```python -from cloudflare.types.dns import DNSFirewallDNSFirewall, FirewallDeleteResponse +from cloudflare.types.dns import DNSFirewall, FirewallDeleteResponse ``` Methods: -- client.dns.firewall.create(\*, account_id, \*\*params) -> DNSFirewallDNSFirewall -- client.dns.firewall.list(\*, account_id, \*\*params) -> SyncV4PagePaginationArray[DNSFirewallDNSFirewall] +- client.dns.firewall.create(\*, account_id, \*\*params) -> DNSFirewall +- client.dns.firewall.list(\*, account_id, \*\*params) -> SyncV4PagePaginationArray[DNSFirewall] - client.dns.firewall.delete(dns_firewall_id, \*, account_id) -> FirewallDeleteResponse -- client.dns.firewall.edit(dns_firewall_id, \*, account_id, \*\*params) -> DNSFirewallDNSFirewall -- client.dns.firewall.get(dns_firewall_id, \*, account_id) -> DNSFirewallDNSFirewall +- client.dns.firewall.edit(dns_firewall_id, \*, account_id, \*\*params) -> DNSFirewall +- client.dns.firewall.get(dns_firewall_id, \*, account_id) -> DNSFirewall ### Analytics @@ -1743,27 +1739,27 @@ Methods: Methods: -- client.dns.firewall.analytics.reports.get(dns_firewall_id, \*, account_id, \*\*params) -> DNSDNSAnalyticsAPIReport +- client.dns.firewall.analytics.reports.get(dns_firewall_id, \*, account_id, \*\*params) -> DNSAnalyticsReport ##### Bytimes Methods: -- client.dns.firewall.analytics.reports.bytimes.get(dns_firewall_id, \*, account_id, \*\*params) -> DNSDNSAnalyticsAPIReportBytime +- client.dns.firewall.analytics.reports.bytimes.get(dns_firewall_id, \*, account_id, \*\*params) -> DNSAnalyticsReportByTime -# DNSSEC +# DNSSECResource Types: ```python -from cloudflare.types import DNSSECDNSSEC, DNSSECDeleteResponse +from cloudflare.types import DNSSEC, DNSSECDeleteResponse ``` Methods: - client.dnssec.delete(\*, zone_id) -> DNSSECDeleteResponse -- client.dnssec.edit(\*, zone_id, \*\*params) -> DNSSECDNSSEC -- client.dnssec.get(\*, zone_id) -> DNSSECDNSSEC +- client.dnssec.edit(\*, zone_id, \*\*params) -> DNSSEC +- client.dnssec.get(\*, zone_id) -> DNSSEC # EmailRouting @@ -1858,16 +1854,16 @@ Methods: Types: ```python -from cloudflare.types import LegacyJhsFilter, FilterCreateResponse +from cloudflare.types import FirewallFilter, FilterCreateResponse ``` Methods: - client.filters.create(zone_identifier, \*\*params) -> Optional -- client.filters.update(id, \*, zone_identifier, \*\*params) -> Optional -- client.filters.list(zone_identifier, \*\*params) -> SyncV4PagePaginationArray[LegacyJhsFilter] -- client.filters.delete(id, \*, zone_identifier) -> Optional -- client.filters.get(id, \*, zone_identifier) -> Optional +- client.filters.update(id, \*, zone_identifier, \*\*params) -> Optional +- client.filters.list(zone_identifier, \*\*params) -> SyncV4PagePaginationArray[FirewallFilter] +- client.filters.delete(id, \*, zone_identifier) -> Optional +- client.filters.get(id, \*, zone_identifier) -> Optional # Firewall @@ -1876,33 +1872,33 @@ Methods: Types: ```python -from cloudflare.types.firewall import LegacyJhsZonelockdown, LockdownDeleteResponse +from cloudflare.types.firewall import FirewallZoneLockdown, LockdownDeleteResponse ``` Methods: -- client.firewall.lockdowns.create(zone_identifier, \*\*params) -> Optional -- client.firewall.lockdowns.update(id, \*, zone_identifier, \*\*params) -> Optional -- client.firewall.lockdowns.list(zone_identifier, \*\*params) -> SyncV4PagePaginationArray[LegacyJhsZonelockdown] +- client.firewall.lockdowns.create(zone_identifier, \*\*params) -> Optional +- client.firewall.lockdowns.update(id, \*, zone_identifier, \*\*params) -> Optional +- client.firewall.lockdowns.list(zone_identifier, \*\*params) -> SyncV4PagePaginationArray[FirewallZoneLockdown] - client.firewall.lockdowns.delete(id, \*, zone_identifier) -> Optional -- client.firewall.lockdowns.get(id, \*, zone_identifier) -> Optional +- client.firewall.lockdowns.get(id, \*, zone_identifier) -> Optional ## Rules Types: ```python -from cloudflare.types.firewall import LegacyJhsFilterRule, RuleCreateResponse, RuleEditResponse +from cloudflare.types.firewall import FirewallFilterRule, RuleCreateResponse, RuleEditResponse ``` Methods: - client.firewall.rules.create(zone_identifier, \*\*params) -> Optional -- client.firewall.rules.update(id, \*, zone_identifier, \*\*params) -> Optional -- client.firewall.rules.list(zone_identifier, \*\*params) -> SyncV4PagePaginationArray[LegacyJhsFilterRule] -- client.firewall.rules.delete(id, \*, zone_identifier, \*\*params) -> Optional +- client.firewall.rules.update(id, \*, zone_identifier, \*\*params) -> Optional +- client.firewall.rules.list(zone_identifier, \*\*params) -> SyncV4PagePaginationArray[FirewallFilterRule] +- client.firewall.rules.delete(id, \*, zone_identifier, \*\*params) -> Optional - client.firewall.rules.edit(id, \*, zone_identifier, \*\*params) -> Optional -- client.firewall.rules.get(id, \*, zone_identifier) -> Optional +- client.firewall.rules.get(id, \*, zone_identifier) -> Optional ## AccessRules @@ -1932,7 +1928,7 @@ Types: ```python from cloudflare.types.firewall import ( - LegacyJhsUARules, + FirewallUserAgentRule, UARuleCreateResponse, UARuleUpdateResponse, UARuleListResponse, @@ -1956,16 +1952,16 @@ Methods: Types: ```python -from cloudflare.types.firewall.waf import LegacyJhsOverride, OverrideDeleteResponse +from cloudflare.types.firewall.waf import WAFOverride, OverrideDeleteResponse ``` Methods: -- client.firewall.waf.overrides.create(zone_identifier, \*\*params) -> Optional -- client.firewall.waf.overrides.update(id, \*, zone_identifier, \*\*params) -> Optional -- client.firewall.waf.overrides.list(zone_identifier, \*\*params) -> SyncV4PagePaginationArray[LegacyJhsOverride] +- client.firewall.waf.overrides.create(zone_identifier, \*\*params) -> Optional +- client.firewall.waf.overrides.update(id, \*, zone_identifier, \*\*params) -> Optional +- client.firewall.waf.overrides.list(zone_identifier, \*\*params) -> SyncV4PagePaginationArray[WAFOverride] - client.firewall.waf.overrides.delete(id, \*, zone_identifier) -> Optional -- client.firewall.waf.overrides.get(id, \*, zone_identifier) -> Optional +- client.firewall.waf.overrides.get(id, \*, zone_identifier) -> Optional ### Packages @@ -1986,7 +1982,7 @@ Types: ```python from cloudflare.types.firewall.waf.packages import ( - WAFManagedRulesSchemasGroup, + WAFManagedRulesGroup, GroupEditResponse, GroupGetResponse, ) @@ -1994,7 +1990,7 @@ from cloudflare.types.firewall.waf.packages import ( Methods: -- client.firewall.waf.packages.groups.list(package_id, \*, zone_id, \*\*params) -> SyncV4PagePaginationArray[WAFManagedRulesSchemasGroup] +- client.firewall.waf.packages.groups.list(package_id, \*, zone_id, \*\*params) -> SyncV4PagePaginationArray[WAFManagedRulesGroup] - client.firewall.waf.packages.groups.edit(group_id, \*, zone_id, package_id, \*\*params) -> GroupEditResponse - client.firewall.waf.packages.groups.get(group_id, \*, zone_id, package_id) -> GroupGetResponse @@ -2021,21 +2017,17 @@ Methods: Types: ```python -from cloudflare.types import ( - HealthchecksHealthchecks, - HealthcheckListResponse, - HealthcheckDeleteResponse, -) +from cloudflare.types import Healthcheck, HealthcheckListResponse, HealthcheckDeleteResponse ``` Methods: -- client.healthchecks.create(\*, zone_id, \*\*params) -> HealthchecksHealthchecks -- client.healthchecks.update(healthcheck_id, \*, zone_id, \*\*params) -> HealthchecksHealthchecks +- client.healthchecks.create(\*, zone_id, \*\*params) -> Healthcheck +- client.healthchecks.update(healthcheck_id, \*, zone_id, \*\*params) -> Healthcheck - client.healthchecks.list(\*, zone_id) -> Optional - client.healthchecks.delete(healthcheck_id, \*, zone_id) -> HealthcheckDeleteResponse -- client.healthchecks.edit(healthcheck_id, \*, zone_id, \*\*params) -> HealthchecksHealthchecks -- client.healthchecks.get(healthcheck_id, \*, zone_id) -> HealthchecksHealthchecks +- client.healthchecks.edit(healthcheck_id, \*, zone_id, \*\*params) -> Healthcheck +- client.healthchecks.get(healthcheck_id, \*, zone_id) -> Healthcheck ## Previews @@ -2047,9 +2039,9 @@ from cloudflare.types.healthchecks import PreviewDeleteResponse Methods: -- client.healthchecks.previews.create(\*, zone_id, \*\*params) -> HealthchecksHealthchecks +- client.healthchecks.previews.create(\*, zone_id, \*\*params) -> Healthcheck - client.healthchecks.previews.delete(healthcheck_id, \*, zone_id) -> PreviewDeleteResponse -- client.healthchecks.previews.get(healthcheck_id, \*, zone_id) -> HealthchecksHealthchecks +- client.healthchecks.previews.get(healthcheck_id, \*, zone_id) -> Healthcheck # KeylessCertificates @@ -2057,8 +2049,8 @@ Types: ```python from cloudflare.types import ( - TLSCertificatesAndHostnamesBase, - TLSCertificatesAndHostnamesKeylessCertificate, + KeylessCertificate, + KeylessCertificateHostname, KeylessCertificateListResponse, KeylessCertificateDeleteResponse, ) @@ -2066,11 +2058,11 @@ from cloudflare.types import ( Methods: -- client.keyless_certificates.create(\*, zone_id, \*\*params) -> TLSCertificatesAndHostnamesBase +- client.keyless_certificates.create(\*, zone_id, \*\*params) -> KeylessCertificateHostname - client.keyless_certificates.list(\*, zone_id) -> Optional - client.keyless_certificates.delete(keyless_certificate_id, \*, zone_id) -> KeylessCertificateDeleteResponse -- client.keyless_certificates.edit(keyless_certificate_id, \*, zone_id, \*\*params) -> TLSCertificatesAndHostnamesBase -- client.keyless_certificates.get(keyless_certificate_id, \*, zone_id) -> TLSCertificatesAndHostnamesBase +- client.keyless_certificates.edit(keyless_certificate_id, \*, zone_id, \*\*params) -> KeylessCertificateHostname +- client.keyless_certificates.get(keyless_certificate_id, \*, zone_id) -> KeylessCertificateHostname # Logpush @@ -2093,7 +2085,7 @@ Methods: Types: ```python -from cloudflare.types.logpush.datasets import LogpushLogpushJob, JobGetResponse +from cloudflare.types.logpush.datasets import LogpushJob, JobGetResponse ``` Methods: @@ -2105,12 +2097,12 @@ Methods: Types: ```python -from cloudflare.types.logpush import LogpushInstantLogsJob, EdgeGetResponse +from cloudflare.types.logpush import InstantLogpushJob, EdgeGetResponse ``` Methods: -- client.logpush.edge.create(\*, zone_id, \*\*params) -> Optional +- client.logpush.edge.create(\*, zone_id, \*\*params) -> Optional - client.logpush.edge.get(\*, zone_id) -> EdgeGetResponse ## Jobs @@ -2123,11 +2115,11 @@ from cloudflare.types.logpush import JobListResponse, JobDeleteResponse Methods: -- client.logpush.jobs.create(\*, account_id, zone_id, \*\*params) -> Optional -- client.logpush.jobs.update(job_id, \*, account_id, zone_id, \*\*params) -> Optional +- client.logpush.jobs.create(\*, account_id, zone_id, \*\*params) -> Optional +- client.logpush.jobs.update(job_id, \*, account_id, zone_id, \*\*params) -> Optional - client.logpush.jobs.list(\*, account_id, zone_id) -> JobListResponse - client.logpush.jobs.delete(job_id, \*, account_id, zone_id) -> Optional -- client.logpush.jobs.get(job_id, \*, account_id, zone_id) -> Optional +- client.logpush.jobs.get(job_id, \*, account_id, zone_id) -> Optional ## Ownership @@ -2181,14 +2173,14 @@ Methods: Types: ```python -from cloudflare.types.logs.control.cmb import LogcontrolCmbConfig, ConfigDeleteResponse +from cloudflare.types.logs.control.cmb import CmbConfig, ConfigDeleteResponse ``` Methods: -- client.logs.control.cmb.config.create(\*, account_id, \*\*params) -> Optional +- client.logs.control.cmb.config.create(\*, account_id, \*\*params) -> Optional - client.logs.control.cmb.config.delete(\*, account_id) -> Optional -- client.logs.control.cmb.config.get(\*, account_id) -> Optional +- client.logs.control.cmb.config.get(\*, account_id) -> Optional ## RayID @@ -2232,7 +2224,7 @@ Types: ```python from cloudflare.types import ( - TLSCertificatesAndHostnamesZoneAuthenticatedOriginPull, + OriginTLSClientCertificateZoneAuthenticatedOriginPull, OriginTLSClientAuthCreateResponse, OriginTLSClientAuthListResponse, OriginTLSClientAuthDeleteResponse, @@ -2253,8 +2245,8 @@ Types: ```python from cloudflare.types.origin_tls_client_auth import ( - TLSCertificatesAndHostnamesHostnameAuthenticatedOriginPull, - TLSCertificatesAndHostnamesHostnameCertidObject, + OriginTLSClientCertificateAuthenticatedOriginPull, + OriginTLSClientCertificateID, HostnameUpdateResponse, ) ``` @@ -2262,7 +2254,7 @@ from cloudflare.types.origin_tls_client_auth import ( Methods: - client.origin_tls_client_auth.hostnames.update(\*, zone_id, \*\*params) -> Optional -- client.origin_tls_client_auth.hostnames.get(hostname, \*, zone_id) -> TLSCertificatesAndHostnamesHostnameCertidObject +- client.origin_tls_client_auth.hostnames.get(hostname, \*, zone_id) -> OriginTLSClientCertificateID ### Certificates @@ -2270,17 +2262,17 @@ Types: ```python from cloudflare.types.origin_tls_client_auth.hostnames import ( - TLSCertificatesAndHostnamesSchemasCertificateObject, + OriginTLSClientCertificate, CertificateListResponse, ) ``` Methods: -- client.origin_tls_client_auth.hostnames.certificates.create(\*, zone_id, \*\*params) -> TLSCertificatesAndHostnamesSchemasCertificateObject +- client.origin_tls_client_auth.hostnames.certificates.create(\*, zone_id, \*\*params) -> OriginTLSClientCertificate - client.origin_tls_client_auth.hostnames.certificates.list(\*, zone_id) -> Optional -- client.origin_tls_client_auth.hostnames.certificates.delete(certificate_id, \*, zone_id) -> TLSCertificatesAndHostnamesSchemasCertificateObject -- client.origin_tls_client_auth.hostnames.certificates.get(certificate_id, \*, zone_id) -> TLSCertificatesAndHostnamesSchemasCertificateObject +- client.origin_tls_client_auth.hostnames.certificates.delete(certificate_id, \*, zone_id) -> OriginTLSClientCertificate +- client.origin_tls_client_auth.hostnames.certificates.get(certificate_id, \*, zone_id) -> OriginTLSClientCertificate ## Settings @@ -2301,7 +2293,7 @@ Types: ```python from cloudflare.types import ( - ZonesPageRule, + ZonesPagerule, PageruleCreateResponse, PageruleUpdateResponse, PageruleListResponse, @@ -2325,12 +2317,12 @@ Methods: Types: ```python -from cloudflare.types.pagerules import ZonesSettings +from cloudflare.types.pagerules import ZonePageruleSettings ``` Methods: -- client.pagerules.settings.list(\*, zone_id) -> ZonesSettings +- client.pagerules.settings.list(\*, zone_id) -> ZonePageruleSettings # RateLimits @@ -2338,7 +2330,7 @@ Types: ```python from cloudflare.types import ( - LegacyJhsRateLimits, + RateLimit, RateLimitCreateResponse, RateLimitListResponse, RateLimitDeleteResponse, @@ -2362,12 +2354,12 @@ Methods: Types: ```python -from cloudflare.types.secondary_dns import SecondaryDNSForceResult +from cloudflare.types.secondary_dns import SecondaryDNSForce ``` Methods: -- client.secondary_dns.force_axfr.create(\*, zone_id) -> str +- client.secondary_dns.force_axfr.create(\*, zone_id) -> str ## Incoming @@ -2395,9 +2387,9 @@ Types: ```python from cloudflare.types.secondary_dns import ( - SecondaryDNSDisableTransferResult, - SecondaryDNSEnableTransferResult, - SecondaryDNSSchemasForceResult, + SecondaryDNSDisableTransfer, + SecondaryDNSEnableTransfer, + SecondaryDNSForce, OutgoingCreateResponse, OutgoingUpdateResponse, OutgoingDeleteResponse, @@ -2410,16 +2402,16 @@ Methods: - client.secondary_dns.outgoing.create(\*, zone_id, \*\*params) -> OutgoingCreateResponse - client.secondary_dns.outgoing.update(\*, zone_id, \*\*params) -> OutgoingUpdateResponse - client.secondary_dns.outgoing.delete(\*, zone_id) -> OutgoingDeleteResponse -- client.secondary_dns.outgoing.disable(\*, zone_id) -> str -- client.secondary_dns.outgoing.enable(\*, zone_id) -> str -- client.secondary_dns.outgoing.force_notify(\*, zone_id) -> str +- client.secondary_dns.outgoing.disable(\*, zone_id) -> str +- client.secondary_dns.outgoing.enable(\*, zone_id) -> str +- client.secondary_dns.outgoing.force_notify(\*, zone_id) -> str - client.secondary_dns.outgoing.get(\*, zone_id) -> OutgoingGetResponse ### Status Methods: -- client.secondary_dns.outgoing.status.get(\*, zone_id) -> str +- client.secondary_dns.outgoing.status.get(\*, zone_id) -> str ## ACLs @@ -2474,21 +2466,17 @@ Methods: Types: ```python -from cloudflare.types import ( - WaitingroomWaitingroom, - WaitingRoomListResponse, - WaitingRoomDeleteResponse, -) +from cloudflare.types import WaitingRoom, WaitingRoomListResponse, WaitingRoomDeleteResponse ``` Methods: -- client.waiting_rooms.create(zone_identifier, \*\*params) -> WaitingroomWaitingroom -- client.waiting_rooms.update(waiting_room_id, \*, zone_identifier, \*\*params) -> WaitingroomWaitingroom +- client.waiting_rooms.create(zone_identifier, \*\*params) -> WaitingRoom +- client.waiting_rooms.update(waiting_room_id, \*, zone_identifier, \*\*params) -> WaitingRoom - client.waiting_rooms.list(zone_identifier) -> Optional - client.waiting_rooms.delete(waiting_room_id, \*, zone_identifier) -> WaitingRoomDeleteResponse -- client.waiting_rooms.edit(waiting_room_id, \*, zone_identifier, \*\*params) -> WaitingroomWaitingroom -- client.waiting_rooms.get(waiting_room_id, \*, zone_identifier) -> WaitingroomWaitingroom +- client.waiting_rooms.edit(waiting_room_id, \*, zone_identifier, \*\*params) -> WaitingRoom +- client.waiting_rooms.get(waiting_room_id, \*, zone_identifier) -> WaitingRoom ## Page @@ -2507,33 +2495,29 @@ Methods: Types: ```python -from cloudflare.types.waiting_rooms import ( - WaitingroomEventResult, - EventListResponse, - EventDeleteResponse, -) +from cloudflare.types.waiting_rooms import WaitingroomEvent, EventListResponse, EventDeleteResponse ``` Methods: -- client.waiting_rooms.events.create(waiting_room_id, \*, zone_identifier, \*\*params) -> WaitingroomEventResult -- client.waiting_rooms.events.update(event_id, \*, zone_identifier, waiting_room_id, \*\*params) -> WaitingroomEventResult +- client.waiting_rooms.events.create(waiting_room_id, \*, zone_identifier, \*\*params) -> WaitingroomEvent +- client.waiting_rooms.events.update(event_id, \*, zone_identifier, waiting_room_id, \*\*params) -> WaitingroomEvent - client.waiting_rooms.events.list(waiting_room_id, \*, zone_identifier) -> Optional - client.waiting_rooms.events.delete(event_id, \*, zone_identifier, waiting_room_id) -> EventDeleteResponse -- client.waiting_rooms.events.edit(event_id, \*, zone_identifier, waiting_room_id, \*\*params) -> WaitingroomEventResult -- client.waiting_rooms.events.get(event_id, \*, zone_identifier, waiting_room_id) -> WaitingroomEventResult +- client.waiting_rooms.events.edit(event_id, \*, zone_identifier, waiting_room_id, \*\*params) -> WaitingroomEvent +- client.waiting_rooms.events.get(event_id, \*, zone_identifier, waiting_room_id) -> WaitingroomEvent ### Details Types: ```python -from cloudflare.types.waiting_rooms.events import WaitingroomEventDetailsResult +from cloudflare.types.waiting_rooms.events import WaitingroomEventDetails ``` Methods: -- client.waiting_rooms.events.details.get(event_id, \*, zone_identifier, waiting_room_id) -> WaitingroomEventDetailsResult +- client.waiting_rooms.events.details.get(event_id, \*, zone_identifier, waiting_room_id) -> WaitingroomEventDetails ## Rules @@ -2541,7 +2525,7 @@ Types: ```python from cloudflare.types.waiting_rooms import ( - WaitingroomRuleResult, + WaitingroomRule, RuleCreateResponse, RuleUpdateResponse, RuleListResponse, @@ -2596,7 +2580,7 @@ Types: ```python from cloudflare.types.web3 import ( - DwebConfigWeb3Hostname, + DistributedWebHostname, HostnameListResponse, HostnameDeleteResponse, ) @@ -2604,11 +2588,11 @@ from cloudflare.types.web3 import ( Methods: -- client.web3.hostnames.create(zone_identifier, \*\*params) -> DwebConfigWeb3Hostname +- client.web3.hostnames.create(zone_identifier, \*\*params) -> DistributedWebHostname - client.web3.hostnames.list(zone_identifier) -> Optional - client.web3.hostnames.delete(identifier, \*, zone_identifier) -> Optional -- client.web3.hostnames.edit(identifier, \*, zone_identifier, \*\*params) -> DwebConfigWeb3Hostname -- client.web3.hostnames.get(identifier, \*, zone_identifier) -> DwebConfigWeb3Hostname +- client.web3.hostnames.edit(identifier, \*, zone_identifier, \*\*params) -> DistributedWebHostname +- client.web3.hostnames.get(identifier, \*, zone_identifier) -> DistributedWebHostname ### IPFSUniversalPaths @@ -2617,13 +2601,13 @@ Methods: Types: ```python -from cloudflare.types.web3.hostnames.ipfs_universal_paths import DwebConfigContentListDetails +from cloudflare.types.web3.hostnames.ipfs_universal_paths import DistributedWebConfigContentList ``` Methods: -- client.web3.hostnames.ipfs_universal_paths.content_lists.update(identifier, \*, zone_identifier, \*\*params) -> DwebConfigContentListDetails -- client.web3.hostnames.ipfs_universal_paths.content_lists.get(identifier, \*, zone_identifier) -> DwebConfigContentListDetails +- client.web3.hostnames.ipfs_universal_paths.content_lists.update(identifier, \*, zone_identifier, \*\*params) -> DistributedWebConfigContentList +- client.web3.hostnames.ipfs_universal_paths.content_lists.get(identifier, \*, zone_identifier) -> DistributedWebConfigContentList ##### Entries @@ -2631,7 +2615,7 @@ Types: ```python from cloudflare.types.web3.hostnames.ipfs_universal_paths.content_lists import ( - DwebConfigContentListEntry, + DistributedWebConfigContentListEntry, EntryListResponse, EntryDeleteResponse, ) @@ -2639,11 +2623,11 @@ from cloudflare.types.web3.hostnames.ipfs_universal_paths.content_lists import ( Methods: -- client.web3.hostnames.ipfs_universal_paths.content_lists.entries.create(identifier, \*, zone_identifier, \*\*params) -> DwebConfigContentListEntry -- client.web3.hostnames.ipfs_universal_paths.content_lists.entries.update(content_list_entry_identifier, \*, zone_identifier, identifier, \*\*params) -> DwebConfigContentListEntry +- client.web3.hostnames.ipfs_universal_paths.content_lists.entries.create(identifier, \*, zone_identifier, \*\*params) -> DistributedWebConfigContentListEntry +- client.web3.hostnames.ipfs_universal_paths.content_lists.entries.update(content_list_entry_identifier, \*, zone_identifier, identifier, \*\*params) -> DistributedWebConfigContentListEntry - client.web3.hostnames.ipfs_universal_paths.content_lists.entries.list(identifier, \*, zone_identifier) -> Optional - client.web3.hostnames.ipfs_universal_paths.content_lists.entries.delete(content_list_entry_identifier, \*, zone_identifier, identifier) -> Optional -- client.web3.hostnames.ipfs_universal_paths.content_lists.entries.get(content_list_entry_identifier, \*, zone_identifier, identifier) -> DwebConfigContentListEntry +- client.web3.hostnames.ipfs_universal_paths.content_lists.entries.get(content_list_entry_identifier, \*, zone_identifier, identifier) -> DistributedWebConfigContentListEntry # Workers @@ -2679,7 +2663,7 @@ Methods: Types: ```python -from cloudflare.types.workers.scripts import WorkersSchemasBinding, BindingGetResponse +from cloudflare.types.workers.scripts import WorkersBinding, BindingGetResponse ``` Methods: @@ -2757,7 +2741,7 @@ Types: ```python from cloudflare.types.workers import ( - WorkersFilters, + WorkersFilter, FilterCreateResponse, FilterListResponse, FilterDeleteResponse, @@ -2767,7 +2751,7 @@ from cloudflare.types.workers import ( Methods: - client.workers.filters.create(\*, zone_id, \*\*params) -> Optional -- client.workers.filters.update(filter_id, \*, zone_id, \*\*params) -> WorkersFilters +- client.workers.filters.update(filter_id, \*, zone_id, \*\*params) -> WorkersFilter - client.workers.filters.list(\*, zone_id) -> FilterListResponse - client.workers.filters.delete(filter_id, \*, zone_id) -> Optional @@ -2777,7 +2761,7 @@ Types: ```python from cloudflare.types.workers import ( - WorkersRoutes, + WorkersRoute, RouteCreateResponse, RouteListResponse, RouteDeleteResponse, @@ -2787,10 +2771,10 @@ from cloudflare.types.workers import ( Methods: - client.workers.routes.create(\*, zone_id, \*\*params) -> RouteCreateResponse -- client.workers.routes.update(route_id, \*, zone_id, \*\*params) -> WorkersRoutes +- client.workers.routes.update(route_id, \*, zone_id, \*\*params) -> WorkersRoute - client.workers.routes.list(\*, zone_id) -> RouteListResponse - client.workers.routes.delete(route_id, \*, zone_id) -> RouteDeleteResponse -- client.workers.routes.get(route_id, \*, zone_id) -> WorkersRoutes +- client.workers.routes.get(route_id, \*, zone_id) -> WorkersRoute ## AccountSettings @@ -2962,7 +2946,7 @@ Methods: Types: ```python -from cloudflare.types.durable_objects import WorkersNamespace, NamespaceListResponse +from cloudflare.types.durable_objects import DurableObjectNamespace, NamespaceListResponse ``` Methods: @@ -2974,12 +2958,12 @@ Methods: Types: ```python -from cloudflare.types.durable_objects.namespaces import WorkersObject +from cloudflare.types.durable_objects.namespaces import DurableObject ``` Methods: -- client.durable_objects.namespaces.objects.list(id, \*, account_id, \*\*params) -> SyncCursorLimitPagination[WorkersObject] +- client.durable_objects.namespaces.objects.list(id, \*, account_id, \*\*params) -> SyncCursorLimitPagination[DurableObject] # Queues @@ -2987,9 +2971,9 @@ Types: ```python from cloudflare.types import ( - WorkersQueue, - WorkersQueueCreated, - WorkersQueueUpdated, + Queue, + QueueCreated, + QueueUpdated, QueueCreateResponse, QueueUpdateResponse, QueueListResponse, @@ -3032,9 +3016,9 @@ Types: ```python from cloudflare.types.queues import ( - WorkersConsumer, - WorkersConsumerCreated, - WorkersConsumerUpdated, + QueueConsumer, + QueueConsumerCreated, + QueueConsumerUpdated, MessageAckResponse, MessagePullResponse, ) @@ -3063,29 +3047,29 @@ Methods: Types: ```python -from cloudflare.types import PageShieldGetZoneSettings, PageShieldUpdateZoneSettings +from cloudflare.types import PageShieldSetting, PageShieldUpdateResponse ``` Methods: -- client.page_shield.update(\*, zone_id, \*\*params) -> PageShieldUpdateZoneSettings -- client.page_shield.get(\*, zone_id) -> PageShieldGetZoneSettings +- client.page_shield.update(\*, zone_id, \*\*params) -> PageShieldUpdateResponse +- client.page_shield.get(\*, zone_id) -> PageShieldSetting ## Policies Types: ```python -from cloudflare.types.page_shield import PageShieldPageshieldPolicy, PolicyListResponse +from cloudflare.types.page_shield import PageShieldPolicy, PolicyListResponse ``` Methods: -- client.page_shield.policies.create(\*, zone_id, \*\*params) -> PageShieldPageshieldPolicy -- client.page_shield.policies.update(policy_id, \*, zone_id, \*\*params) -> PageShieldPageshieldPolicy +- client.page_shield.policies.create(\*, zone_id, \*\*params) -> PageShieldPolicy +- client.page_shield.policies.update(policy_id, \*, zone_id, \*\*params) -> PageShieldPolicy - client.page_shield.policies.list(\*, zone_id) -> Optional - client.page_shield.policies.delete(policy_id, \*, zone_id) -> None -- client.page_shield.policies.get(policy_id, \*, zone_id) -> PageShieldPageshieldPolicy +- client.page_shield.policies.get(policy_id, \*, zone_id) -> PageShieldPolicy ## Connections @@ -3489,16 +3473,16 @@ Methods: Types: ```python -from cloudflare.types.images import ImagesImage, V1ListResponse, V1DeleteResponse +from cloudflare.types.images import Image, V1ListResponse, V1DeleteResponse ``` Methods: -- client.images.v1.create(\*, account_id, \*\*params) -> ImagesImage +- client.images.v1.create(\*, account_id, \*\*params) -> Image - client.images.v1.list(\*, account_id, \*\*params) -> SyncV4PagePagination[V1ListResponse] - client.images.v1.delete(image_id, \*, account_id) -> V1DeleteResponse -- client.images.v1.edit(image_id, \*, account_id, \*\*params) -> ImagesImage -- client.images.v1.get(image_id, \*, account_id) -> ImagesImage +- client.images.v1.edit(image_id, \*, account_id, \*\*params) -> Image +- client.images.v1.get(image_id, \*, account_id) -> Image ### Keys @@ -3739,7 +3723,7 @@ Methods: Types: ```python -from cloudflare.types.intel import IntelSinkholesSinkholeItem, SinkholeListResponse +from cloudflare.types.intel import IntelSinkholeItem, SinkholeListResponse ``` Methods: @@ -3967,80 +3951,73 @@ Methods: Types: ```python -from cloudflare.types.magic_network_monitoring import MagicVisibilityMNMConfig +from cloudflare.types.magic_network_monitoring import MagicNetworkMonitoringConfig ``` Methods: -- client.magic_network_monitoring.configs.create(\*, account_id) -> MagicVisibilityMNMConfig -- client.magic_network_monitoring.configs.update(\*, account_id) -> MagicVisibilityMNMConfig -- client.magic_network_monitoring.configs.delete(\*, account_id) -> MagicVisibilityMNMConfig -- client.magic_network_monitoring.configs.edit(\*, account_id) -> MagicVisibilityMNMConfig -- client.magic_network_monitoring.configs.get(\*, account_id) -> MagicVisibilityMNMConfig +- client.magic_network_monitoring.configs.create(\*, account_id) -> MagicNetworkMonitoringConfig +- client.magic_network_monitoring.configs.update(\*, account_id) -> MagicNetworkMonitoringConfig +- client.magic_network_monitoring.configs.delete(\*, account_id) -> MagicNetworkMonitoringConfig +- client.magic_network_monitoring.configs.edit(\*, account_id) -> MagicNetworkMonitoringConfig +- client.magic_network_monitoring.configs.get(\*, account_id) -> MagicNetworkMonitoringConfig ### Full Methods: -- client.magic_network_monitoring.configs.full.get(\*, account_id) -> MagicVisibilityMNMConfig +- client.magic_network_monitoring.configs.full.get(\*, account_id) -> MagicNetworkMonitoringConfig ## Rules Types: ```python -from cloudflare.types.magic_network_monitoring import MagicVisibilityMNMRule, RuleListResponse +from cloudflare.types.magic_network_monitoring import MagicNetworkMonitoringRule, RuleListResponse ``` Methods: -- client.magic_network_monitoring.rules.create(\*, account_id) -> Optional -- client.magic_network_monitoring.rules.update(\*, account_id) -> Optional +- client.magic_network_monitoring.rules.create(\*, account_id) -> Optional +- client.magic_network_monitoring.rules.update(\*, account_id) -> Optional - client.magic_network_monitoring.rules.list(\*, account_id) -> Optional -- client.magic_network_monitoring.rules.delete(rule_id, \*, account_id) -> Optional -- client.magic_network_monitoring.rules.edit(rule_id, \*, account_id) -> Optional -- client.magic_network_monitoring.rules.get(rule_id, \*, account_id) -> Optional +- client.magic_network_monitoring.rules.delete(rule_id, \*, account_id) -> Optional +- client.magic_network_monitoring.rules.edit(rule_id, \*, account_id) -> Optional +- client.magic_network_monitoring.rules.get(rule_id, \*, account_id) -> Optional ### Advertisements Types: ```python -from cloudflare.types.magic_network_monitoring.rules import MagicVisibilityMNMRuleAdvertisable +from cloudflare.types.magic_network_monitoring.rules import MagicNetworkMonitoringRuleAdvertisable ``` Methods: -- client.magic_network_monitoring.rules.advertisements.edit(rule_id, \*, account_id) -> Optional +- client.magic_network_monitoring.rules.advertisements.edit(rule_id, \*, account_id) -> Optional # MTLSCertificates Types: ```python -from cloudflare.types import ( - TLSCertificatesAndHostnamesCertificateObjectPost, - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, - MTLSCertificateListResponse, -) +from cloudflare.types import MTLSCertificate, MTLSCertificateUpdate, MTLSCertificateListResponse ``` Methods: -- client.mtls_certificates.create(\*, account_id, \*\*params) -> TLSCertificatesAndHostnamesCertificateObjectPost +- client.mtls_certificates.create(\*, account_id, \*\*params) -> MTLSCertificateUpdate - client.mtls_certificates.list(\*, account_id) -> Optional -- client.mtls_certificates.delete(mtls_certificate_id, \*, account_id) -> TLSCertificatesAndHostnamesComponentsSchemasCertificateObject -- client.mtls_certificates.get(mtls_certificate_id, \*, account_id) -> TLSCertificatesAndHostnamesComponentsSchemasCertificateObject +- client.mtls_certificates.delete(mtls_certificate_id, \*, account_id) -> MTLSCertificate +- client.mtls_certificates.get(mtls_certificate_id, \*, account_id) -> MTLSCertificate ## Associations Types: ```python -from cloudflare.types.mtls_certificates import ( - TLSCertificatesAndHostnamesAssociationObject, - AssociationGetResponse, -) +from cloudflare.types.mtls_certificates import MTLSCertificateAsssociation, AssociationGetResponse ``` Methods: @@ -4170,7 +4147,7 @@ Types: ```python from cloudflare.types.registrar import ( - RegistrarAPIDomains, + RegistrarDomains, DomainUpdateResponse, DomainListResponse, DomainGetResponse, @@ -4190,7 +4167,7 @@ Methods: Types: ```python -from cloudflare.types.request_tracers import RequestTracerTrace, TraceCreateResponse +from cloudflare.types.request_tracers import RequestTrace, TraceCreateResponse ``` Methods: @@ -4284,18 +4261,14 @@ Methods: Types: ```python -from cloudflare.types.stream import ( - StreamAdditionalAudio, - AudioTrackDeleteResponse, - AudioTrackGetResponse, -) +from cloudflare.types.stream import StreamAudio, AudioTrackDeleteResponse, AudioTrackGetResponse ``` Methods: - client.stream.audio_tracks.delete(audio_identifier, \*, account_id, identifier) -> AudioTrackDeleteResponse -- client.stream.audio_tracks.copy(identifier, \*, account_id, \*\*params) -> StreamAdditionalAudio -- client.stream.audio_tracks.edit(audio_identifier, \*, account_id, identifier, \*\*params) -> StreamAdditionalAudio +- client.stream.audio_tracks.copy(identifier, \*, account_id, \*\*params) -> StreamAudio +- client.stream.audio_tracks.edit(audio_identifier, \*, account_id, identifier, \*\*params) -> StreamAudio - client.stream.audio_tracks.get(identifier, \*, account_id) -> AudioTrackGetResponse ## Videos @@ -4515,7 +4488,7 @@ Types: ```python from cloudflare.types.alerting.destinations import ( - AaaPagerduty, + AlertingPagerduty, PagerdutyCreateResponse, PagerdutyDeleteResponse, PagerdutyGetResponse, @@ -4536,7 +4509,7 @@ Types: ```python from cloudflare.types.alerting.destinations import ( - AaaWebhooks, + AlertingWebhooks, WebhookCreateResponse, WebhookUpdateResponse, WebhookListResponse, @@ -4550,19 +4523,19 @@ Methods: - client.alerting.destinations.webhooks.update(webhook_id, \*, account_id, \*\*params) -> WebhookUpdateResponse - client.alerting.destinations.webhooks.list(\*, account_id) -> Optional - client.alerting.destinations.webhooks.delete(webhook_id, \*, account_id) -> Optional -- client.alerting.destinations.webhooks.get(webhook_id, \*, account_id) -> AaaWebhooks +- client.alerting.destinations.webhooks.get(webhook_id, \*, account_id) -> AlertingWebhooks ## History Types: ```python -from cloudflare.types.alerting import AaaHistory +from cloudflare.types.alerting import AlertingHistory ``` Methods: -- client.alerting.history.list(\*, account_id, \*\*params) -> SyncV4PagePaginationArray[AaaHistory] +- client.alerting.history.list(\*, account_id, \*\*params) -> SyncV4PagePaginationArray[AlertingHistory] ## Policies @@ -4570,7 +4543,7 @@ Types: ```python from cloudflare.types.alerting import ( - AaaPolicies, + AlertingPolicies, PolicyCreateResponse, PolicyUpdateResponse, PolicyListResponse, @@ -4584,7 +4557,7 @@ Methods: - client.alerting.policies.update(policy_id, \*, account_id, \*\*params) -> PolicyUpdateResponse - client.alerting.policies.list(\*, account_id) -> Optional - client.alerting.policies.delete(policy_id, \*, account_id) -> Optional -- client.alerting.policies.get(policy_id, \*, account_id) -> AaaPolicies +- client.alerting.policies.get(policy_id, \*, account_id) -> AlertingPolicies # D1 @@ -4694,14 +4667,16 @@ Methods: Types: ```python -from cloudflare.types.workers_for_platforms.dispatch.namespaces import WorkersNamespaceScript +from cloudflare.types.workers_for_platforms.dispatch.namespaces import ( + WorkersForPlatformsNamespaceScript, +) ``` Methods: - client.workers_for_platforms.dispatch.namespaces.scripts.update(script_name, \*, account_id, dispatch_namespace, \*\*params) -> WorkersScript - client.workers_for_platforms.dispatch.namespaces.scripts.delete(script_name, \*, account_id, dispatch_namespace, \*\*params) -> None -- client.workers_for_platforms.dispatch.namespaces.scripts.get(script_name, \*, account_id, dispatch_namespace) -> WorkersNamespaceScript +- client.workers_for_platforms.dispatch.namespaces.scripts.get(script_name, \*, account_id, dispatch_namespace) -> WorkersForPlatformsNamespaceScript ##### Content @@ -4745,7 +4720,7 @@ Methods: Types: ```python -from cloudflare.types.zero_trust import TeamsDevicesDevices, DeviceListResponse, DeviceGetResponse +from cloudflare.types.zero_trust import ZeroTrustDevices, DeviceListResponse, DeviceGetResponse ``` Methods: @@ -4759,7 +4734,7 @@ Types: ```python from cloudflare.types.zero_trust.devices import ( - TeamsDevicesDeviceDEXTestSchemasHTTP, + DEXTestSchemasHTTP, DEXTestListResponse, DEXTestDeleteResponse, ) @@ -4767,11 +4742,11 @@ from cloudflare.types.zero_trust.devices import ( Methods: -- client.zero_trust.devices.dex_tests.create(\*, account_id, \*\*params) -> Optional -- client.zero_trust.devices.dex_tests.update(dex_test_id, \*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.dex_tests.create(\*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.dex_tests.update(dex_test_id, \*, account_id, \*\*params) -> Optional - client.zero_trust.devices.dex_tests.list(\*, account_id) -> Optional - client.zero_trust.devices.dex_tests.delete(dex_test_id, \*, account_id) -> Optional -- client.zero_trust.devices.dex_tests.get(dex_test_id, \*, account_id) -> Optional +- client.zero_trust.devices.dex_tests.get(dex_test_id, \*, account_id) -> Optional ### Networks @@ -4779,7 +4754,7 @@ Types: ```python from cloudflare.types.zero_trust.devices import ( - TeamsDevicesDeviceManagedNetworks, + DeviceManagedNetworks, NetworkListResponse, NetworkDeleteResponse, ) @@ -4787,11 +4762,11 @@ from cloudflare.types.zero_trust.devices import ( Methods: -- client.zero_trust.devices.networks.create(\*, account_id, \*\*params) -> Optional -- client.zero_trust.devices.networks.update(network_id, \*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.networks.create(\*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.networks.update(network_id, \*, account_id, \*\*params) -> Optional - client.zero_trust.devices.networks.list(\*, account_id) -> Optional - client.zero_trust.devices.networks.delete(network_id, \*, account_id) -> Optional -- client.zero_trust.devices.networks.get(network_id, \*, account_id) -> Optional +- client.zero_trust.devices.networks.get(network_id, \*, account_id) -> Optional ### Policies @@ -4799,7 +4774,7 @@ Types: ```python from cloudflare.types.zero_trust.devices import ( - TeamsDevicesDeviceSettingsPolicy, + DevicesDeviceSettingsPolicy, PolicyListResponse, PolicyDeleteResponse, ) @@ -4807,11 +4782,11 @@ from cloudflare.types.zero_trust.devices import ( Methods: -- client.zero_trust.devices.policies.create(\*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.policies.create(\*, account_id, \*\*params) -> Optional - client.zero_trust.devices.policies.list(\*, account_id) -> Optional - client.zero_trust.devices.policies.delete(policy_id, \*, account_id) -> Optional -- client.zero_trust.devices.policies.edit(policy_id, \*, account_id, \*\*params) -> Optional -- client.zero_trust.devices.policies.get(policy_id, \*, account_id) -> Optional +- client.zero_trust.devices.policies.edit(policy_id, \*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.policies.get(policy_id, \*, account_id) -> Optional #### DefaultPolicy @@ -4831,7 +4806,7 @@ Types: ```python from cloudflare.types.zero_trust.devices.policies import ( - TeamsDevicesSplitTunnel, + DevicesSplitTunnel, ExcludeUpdateResponse, ExcludeListResponse, ExcludeGetResponse, @@ -4850,7 +4825,7 @@ Types: ```python from cloudflare.types.zero_trust.devices.policies import ( - TeamsDevicesFallbackDomain, + DevicesFallbackDomain, FallbackDomainUpdateResponse, FallbackDomainListResponse, FallbackDomainGetResponse, @@ -4869,7 +4844,7 @@ Types: ```python from cloudflare.types.zero_trust.devices.policies import ( - TeamsDevicesSplitTunnelInclude, + DevicesSplitTunnelInclude, IncludeUpdateResponse, IncludeListResponse, IncludeGetResponse, @@ -4888,7 +4863,7 @@ Types: ```python from cloudflare.types.zero_trust.devices import ( - TeamsDevicesDevicePostureRules, + DevicePostureRules, PostureListResponse, PostureDeleteResponse, ) @@ -4896,11 +4871,11 @@ from cloudflare.types.zero_trust.devices import ( Methods: -- client.zero_trust.devices.posture.create(\*, account_id, \*\*params) -> Optional -- client.zero_trust.devices.posture.update(rule_id, \*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.posture.create(\*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.posture.update(rule_id, \*, account_id, \*\*params) -> Optional - client.zero_trust.devices.posture.list(\*, account_id) -> Optional - client.zero_trust.devices.posture.delete(rule_id, \*, account_id) -> Optional -- client.zero_trust.devices.posture.get(rule_id, \*, account_id) -> Optional +- client.zero_trust.devices.posture.get(rule_id, \*, account_id) -> Optional #### Integrations @@ -4908,7 +4883,7 @@ Types: ```python from cloudflare.types.zero_trust.devices.posture import ( - TeamsDevicesDevicePostureIntegrations, + DevicePostureIntegrations, IntegrationListResponse, IntegrationDeleteResponse, ) @@ -4916,11 +4891,11 @@ from cloudflare.types.zero_trust.devices.posture import ( Methods: -- client.zero_trust.devices.posture.integrations.create(\*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.posture.integrations.create(\*, account_id, \*\*params) -> Optional - client.zero_trust.devices.posture.integrations.list(\*, account_id) -> Optional - client.zero_trust.devices.posture.integrations.delete(integration_id, \*, account_id) -> Optional -- client.zero_trust.devices.posture.integrations.edit(integration_id, \*, account_id, \*\*params) -> Optional -- client.zero_trust.devices.posture.integrations.get(integration_id, \*, account_id) -> Optional +- client.zero_trust.devices.posture.integrations.edit(integration_id, \*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.posture.integrations.get(integration_id, \*, account_id) -> Optional ### Revoke @@ -4939,13 +4914,13 @@ Methods: Types: ```python -from cloudflare.types.zero_trust.devices import TeamsDevicesZeroTrustAccountDeviceSettings +from cloudflare.types.zero_trust.devices import ZeroTrustAccountDeviceSettings ``` Methods: -- client.zero_trust.devices.settings.update(\*, account_id, \*\*params) -> Optional -- client.zero_trust.devices.settings.list(\*, account_id) -> Optional +- client.zero_trust.devices.settings.update(\*, account_id, \*\*params) -> Optional +- client.zero_trust.devices.settings.list(\*, account_id) -> Optional ### Unrevoke @@ -4977,7 +4952,7 @@ Types: ```python from cloudflare.types.zero_trust import ( - AccessIdentityProviders, + ZeroTrustIdentityProviders, IdentityProviderListResponse, IdentityProviderDeleteResponse, ) @@ -4985,25 +4960,25 @@ from cloudflare.types.zero_trust import ( Methods: -- client.zero_trust.identity_providers.create(\*, account_id, zone_id, \*\*params) -> AccessIdentityProviders -- client.zero_trust.identity_providers.update(uuid, \*, account_id, zone_id, \*\*params) -> AccessIdentityProviders +- client.zero_trust.identity_providers.create(\*, account_id, zone_id, \*\*params) -> ZeroTrustIdentityProviders +- client.zero_trust.identity_providers.update(uuid, \*, account_id, zone_id, \*\*params) -> ZeroTrustIdentityProviders - client.zero_trust.identity_providers.list(\*, account_id, zone_id) -> Optional - client.zero_trust.identity_providers.delete(uuid, \*, account_id, zone_id) -> IdentityProviderDeleteResponse -- client.zero_trust.identity_providers.get(uuid, \*, account_id, zone_id) -> AccessIdentityProviders +- client.zero_trust.identity_providers.get(uuid, \*, account_id, zone_id) -> ZeroTrustIdentityProviders ## Organizations Types: ```python -from cloudflare.types.zero_trust import AccessOrganizations, OrganizationRevokeUsersResponse +from cloudflare.types.zero_trust import ZeroTrustOrganizations, OrganizationRevokeUsersResponse ``` Methods: -- client.zero_trust.organizations.create(\*, account_id, zone_id, \*\*params) -> AccessOrganizations -- client.zero_trust.organizations.update(\*, account_id, zone_id, \*\*params) -> AccessOrganizations -- client.zero_trust.organizations.list(\*, account_id, zone_id) -> AccessOrganizations +- client.zero_trust.organizations.create(\*, account_id, zone_id, \*\*params) -> ZeroTrustOrganizations +- client.zero_trust.organizations.update(\*, account_id, zone_id, \*\*params) -> ZeroTrustOrganizations +- client.zero_trust.organizations.list(\*, account_id, zone_id) -> ZeroTrustOrganizations - client.zero_trust.organizations.revoke_users(\*, account_id, zone_id, \*\*params) -> Optional ## Seats @@ -5011,7 +4986,7 @@ Methods: Types: ```python -from cloudflare.types.zero_trust import AccessSeats, SeatEditResponse +from cloudflare.types.zero_trust import ZeroTrustSeats, SeatEditResponse ``` Methods: @@ -5026,7 +5001,7 @@ Types: ```python from cloudflare.types.zero_trust.access import ( - AccessApps, + ZeroTrustApps, ApplicationListResponse, ApplicationDeleteResponse, ApplicationRevokeTokensResponse, @@ -5035,11 +5010,11 @@ from cloudflare.types.zero_trust.access import ( Methods: -- client.zero_trust.access.applications.create(\*, account_id, zone_id, \*\*params) -> AccessApps -- client.zero_trust.access.applications.update(app_id, \*, account_id, zone_id, \*\*params) -> AccessApps +- client.zero_trust.access.applications.create(\*, account_id, zone_id, \*\*params) -> ZeroTrustApps +- client.zero_trust.access.applications.update(app_id, \*, account_id, zone_id, \*\*params) -> ZeroTrustApps - client.zero_trust.access.applications.list(\*, account_id, zone_id) -> Optional - client.zero_trust.access.applications.delete(app_id, \*, account_id, zone_id) -> ApplicationDeleteResponse -- client.zero_trust.access.applications.get(app_id, \*, account_id, zone_id) -> AccessApps +- client.zero_trust.access.applications.get(app_id, \*, account_id, zone_id) -> ZeroTrustApps - client.zero_trust.access.applications.revoke_tokens(app_id, \*, account_id, zone_id) -> object #### CAs @@ -5048,7 +5023,7 @@ Types: ```python from cloudflare.types.zero_trust.access.applications import ( - AccessCA, + ZeroTrustCA, CACreateResponse, CAListResponse, CADeleteResponse, @@ -5081,7 +5056,7 @@ Types: ```python from cloudflare.types.zero_trust.access.applications import ( - AccessPolicies, + ZeroTrustPolicies, PolicyListResponse, PolicyDeleteResponse, ) @@ -5089,11 +5064,11 @@ from cloudflare.types.zero_trust.access.applications import ( Methods: -- client.zero_trust.access.applications.policies.create(uuid, \*, account_id, zone_id, \*\*params) -> AccessPolicies -- client.zero_trust.access.applications.policies.update(uuid, \*, uuid1, account_id, zone_id, \*\*params) -> AccessPolicies +- client.zero_trust.access.applications.policies.create(uuid, \*, account_id, zone_id, \*\*params) -> ZeroTrustPolicies +- client.zero_trust.access.applications.policies.update(uuid, \*, uuid1, account_id, zone_id, \*\*params) -> ZeroTrustPolicies - client.zero_trust.access.applications.policies.list(uuid, \*, account_id, zone_id) -> Optional - client.zero_trust.access.applications.policies.delete(uuid, \*, uuid1, account_id, zone_id) -> PolicyDeleteResponse -- client.zero_trust.access.applications.policies.get(uuid, \*, uuid1, account_id, zone_id) -> AccessPolicies +- client.zero_trust.access.applications.policies.get(uuid, \*, uuid1, account_id, zone_id) -> ZeroTrustPolicies ### Certificates @@ -5101,7 +5076,7 @@ Types: ```python from cloudflare.types.zero_trust.access import ( - AccessCertificates, + ZeroTrustCertificates, CertificateListResponse, CertificateDeleteResponse, ) @@ -5109,11 +5084,11 @@ from cloudflare.types.zero_trust.access import ( Methods: -- client.zero_trust.access.certificates.create(\*, account_id, zone_id, \*\*params) -> AccessCertificates -- client.zero_trust.access.certificates.update(uuid, \*, account_id, zone_id, \*\*params) -> AccessCertificates +- client.zero_trust.access.certificates.create(\*, account_id, zone_id, \*\*params) -> ZeroTrustCertificates +- client.zero_trust.access.certificates.update(uuid, \*, account_id, zone_id, \*\*params) -> ZeroTrustCertificates - client.zero_trust.access.certificates.list(\*, account_id, zone_id) -> Optional - client.zero_trust.access.certificates.delete(uuid, \*, account_id, zone_id) -> CertificateDeleteResponse -- client.zero_trust.access.certificates.get(uuid, \*, account_id, zone_id) -> AccessCertificates +- client.zero_trust.access.certificates.get(uuid, \*, account_id, zone_id) -> ZeroTrustCertificates #### Settings @@ -5121,7 +5096,7 @@ Types: ```python from cloudflare.types.zero_trust.access.certificates import ( - AccessSettings, + ZeroTrustSettings, SettingUpdateResponse, SettingGetResponse, ) @@ -5137,16 +5112,20 @@ Methods: Types: ```python -from cloudflare.types.zero_trust.access import AccessGroups, GroupListResponse, GroupDeleteResponse +from cloudflare.types.zero_trust.access import ( + ZeroTrustGroups, + GroupListResponse, + GroupDeleteResponse, +) ``` Methods: -- client.zero_trust.access.groups.create(\*, account_id, zone_id, \*\*params) -> AccessGroups -- client.zero_trust.access.groups.update(uuid, \*, account_id, zone_id, \*\*params) -> AccessGroups +- client.zero_trust.access.groups.create(\*, account_id, zone_id, \*\*params) -> ZeroTrustGroups +- client.zero_trust.access.groups.update(uuid, \*, account_id, zone_id, \*\*params) -> ZeroTrustGroups - client.zero_trust.access.groups.list(\*, account_id, zone_id) -> Optional - client.zero_trust.access.groups.delete(uuid, \*, account_id, zone_id) -> GroupDeleteResponse -- client.zero_trust.access.groups.get(uuid, \*, account_id, zone_id) -> AccessGroups +- client.zero_trust.access.groups.get(uuid, \*, account_id, zone_id) -> ZeroTrustGroups ### ServiceTokens @@ -5154,7 +5133,7 @@ Types: ```python from cloudflare.types.zero_trust.access import ( - AccessServiceTokens, + ZeroTrustServiceTokens, ServiceTokenCreateResponse, ServiceTokenListResponse, ServiceTokenRotateResponse, @@ -5164,10 +5143,10 @@ from cloudflare.types.zero_trust.access import ( Methods: - client.zero_trust.access.service_tokens.create(\*, account_id, zone_id, \*\*params) -> ServiceTokenCreateResponse -- client.zero_trust.access.service_tokens.update(uuid, \*, account_id, zone_id, \*\*params) -> AccessServiceTokens +- client.zero_trust.access.service_tokens.update(uuid, \*, account_id, zone_id, \*\*params) -> ZeroTrustServiceTokens - client.zero_trust.access.service_tokens.list(\*, account_id, zone_id) -> Optional -- client.zero_trust.access.service_tokens.delete(uuid, \*, account_id, zone_id) -> AccessServiceTokens -- client.zero_trust.access.service_tokens.refresh(uuid, \*, identifier) -> AccessServiceTokens +- client.zero_trust.access.service_tokens.delete(uuid, \*, account_id, zone_id) -> ZeroTrustServiceTokens +- client.zero_trust.access.service_tokens.refresh(uuid, \*, identifier) -> ZeroTrustServiceTokens - client.zero_trust.access.service_tokens.rotate(uuid, \*, identifier) -> ServiceTokenRotateResponse ### Bookmarks @@ -5176,7 +5155,7 @@ Types: ```python from cloudflare.types.zero_trust.access import ( - AccessBookmarks, + ZeroTrustBookmarks, BookmarkListResponse, BookmarkDeleteResponse, ) @@ -5184,11 +5163,11 @@ from cloudflare.types.zero_trust.access import ( Methods: -- client.zero_trust.access.bookmarks.create(uuid, \*, identifier) -> AccessBookmarks -- client.zero_trust.access.bookmarks.update(uuid, \*, identifier) -> AccessBookmarks +- client.zero_trust.access.bookmarks.create(uuid, \*, identifier) -> ZeroTrustBookmarks +- client.zero_trust.access.bookmarks.update(uuid, \*, identifier) -> ZeroTrustBookmarks - client.zero_trust.access.bookmarks.list(identifier) -> Optional - client.zero_trust.access.bookmarks.delete(uuid, \*, identifier) -> BookmarkDeleteResponse -- client.zero_trust.access.bookmarks.get(uuid, \*, identifier) -> AccessBookmarks +- client.zero_trust.access.bookmarks.get(uuid, \*, identifier) -> ZeroTrustBookmarks ### Keys @@ -5211,7 +5190,10 @@ Methods: Types: ```python -from cloudflare.types.zero_trust.access.logs import AccessAccessRequests, AccessRequestListResponse +from cloudflare.types.zero_trust.access.logs import ( + ZeroTrustAccessRequests, + AccessRequestListResponse, +) ``` Methods: @@ -5223,7 +5205,7 @@ Methods: Types: ```python -from cloudflare.types.zero_trust.access import AccessUsers, UserListResponse +from cloudflare.types.zero_trust.access import ZeroTrustUsers, UserListResponse ``` Methods: @@ -5251,12 +5233,12 @@ Methods: Types: ```python -from cloudflare.types.zero_trust.access.users import AccessIdentity +from cloudflare.types.zero_trust.access.users import ZeroTrustIdentity ``` Methods: -- client.zero_trust.access.users.last_seen_identity.get(id, \*, identifier) -> AccessIdentity +- client.zero_trust.access.users.last_seen_identity.get(id, \*, identifier) -> ZeroTrustIdentity #### FailedLogins @@ -5276,8 +5258,8 @@ Types: ```python from cloudflare.types.zero_trust.access import ( - AccessCustomPage, - AccessCustomPageWithoutHTML, + ZeroTrustCustomPage, + ZeroTrustCustomPageWithoutHTML, CustomPageListResponse, CustomPageDeleteResponse, ) @@ -5285,27 +5267,27 @@ from cloudflare.types.zero_trust.access import ( Methods: -- client.zero_trust.access.custom_pages.create(identifier, \*\*params) -> AccessCustomPageWithoutHTML -- client.zero_trust.access.custom_pages.update(uuid, \*, identifier, \*\*params) -> AccessCustomPageWithoutHTML +- client.zero_trust.access.custom_pages.create(identifier, \*\*params) -> ZeroTrustCustomPageWithoutHTML +- client.zero_trust.access.custom_pages.update(uuid, \*, identifier, \*\*params) -> ZeroTrustCustomPageWithoutHTML - client.zero_trust.access.custom_pages.list(identifier) -> Optional - client.zero_trust.access.custom_pages.delete(uuid, \*, identifier) -> CustomPageDeleteResponse -- client.zero_trust.access.custom_pages.get(uuid, \*, identifier) -> AccessCustomPage +- client.zero_trust.access.custom_pages.get(uuid, \*, identifier) -> ZeroTrustCustomPage ### Tags Types: ```python -from cloudflare.types.zero_trust.access import AccessTag, TagListResponse, TagDeleteResponse +from cloudflare.types.zero_trust.access import ZeroTrustTag, TagListResponse, TagDeleteResponse ``` Methods: -- client.zero_trust.access.tags.create(identifier, \*\*params) -> AccessTag -- client.zero_trust.access.tags.update(tag_name, \*, identifier, \*\*params) -> AccessTag +- client.zero_trust.access.tags.create(identifier, \*\*params) -> ZeroTrustTag +- client.zero_trust.access.tags.update(tag_name, \*, identifier, \*\*params) -> ZeroTrustTag - client.zero_trust.access.tags.list(identifier) -> Optional - client.zero_trust.access.tags.delete(name, \*, identifier) -> TagDeleteResponse -- client.zero_trust.access.tags.get(name, \*, identifier) -> AccessTag +- client.zero_trust.access.tags.get(name, \*, identifier) -> ZeroTrustTag ## DEX diff --git a/src/cloudflare/_client.py b/src/cloudflare/_client.py index 34eb39d0832..dfb824979f7 100644 --- a/src/cloudflare/_client.py +++ b/src/cloudflare/_client.py @@ -67,7 +67,7 @@ class Cloudflare(SyncAPIClient): custom_hostnames: resources.CustomHostnames custom_nameservers: resources.CustomNameservers dns: resources.DNS - dnssec: resources.DNSSEC + dnssec: resources.DNSSECResource email_routing: resources.EmailRouting filters: resources.Filters firewall: resources.Firewall @@ -220,7 +220,7 @@ def __init__( self.custom_hostnames = resources.CustomHostnames(self) self.custom_nameservers = resources.CustomNameservers(self) self.dns = resources.DNS(self) - self.dnssec = resources.DNSSEC(self) + self.dnssec = resources.DNSSECResource(self) self.email_routing = resources.EmailRouting(self) self.filters = resources.Filters(self) self.firewall = resources.Firewall(self) @@ -478,7 +478,7 @@ class AsyncCloudflare(AsyncAPIClient): custom_hostnames: resources.AsyncCustomHostnames custom_nameservers: resources.AsyncCustomNameservers dns: resources.AsyncDNS - dnssec: resources.AsyncDNSSEC + dnssec: resources.AsyncDNSSECResource email_routing: resources.AsyncEmailRouting filters: resources.AsyncFilters firewall: resources.AsyncFirewall @@ -631,7 +631,7 @@ def __init__( self.custom_hostnames = resources.AsyncCustomHostnames(self) self.custom_nameservers = resources.AsyncCustomNameservers(self) self.dns = resources.AsyncDNS(self) - self.dnssec = resources.AsyncDNSSEC(self) + self.dnssec = resources.AsyncDNSSECResource(self) self.email_routing = resources.AsyncEmailRouting(self) self.filters = resources.AsyncFilters(self) self.firewall = resources.AsyncFirewall(self) @@ -890,7 +890,7 @@ def __init__(self, client: Cloudflare) -> None: self.custom_hostnames = resources.CustomHostnamesWithRawResponse(client.custom_hostnames) self.custom_nameservers = resources.CustomNameserversWithRawResponse(client.custom_nameservers) self.dns = resources.DNSWithRawResponse(client.dns) - self.dnssec = resources.DNSSECWithRawResponse(client.dnssec) + self.dnssec = resources.DNSSECResourceWithRawResponse(client.dnssec) self.email_routing = resources.EmailRoutingWithRawResponse(client.email_routing) self.filters = resources.FiltersWithRawResponse(client.filters) self.firewall = resources.FirewallWithRawResponse(client.firewall) @@ -978,7 +978,7 @@ def __init__(self, client: AsyncCloudflare) -> None: self.custom_hostnames = resources.AsyncCustomHostnamesWithRawResponse(client.custom_hostnames) self.custom_nameservers = resources.AsyncCustomNameserversWithRawResponse(client.custom_nameservers) self.dns = resources.AsyncDNSWithRawResponse(client.dns) - self.dnssec = resources.AsyncDNSSECWithRawResponse(client.dnssec) + self.dnssec = resources.AsyncDNSSECResourceWithRawResponse(client.dnssec) self.email_routing = resources.AsyncEmailRoutingWithRawResponse(client.email_routing) self.filters = resources.AsyncFiltersWithRawResponse(client.filters) self.firewall = resources.AsyncFirewallWithRawResponse(client.firewall) @@ -1068,7 +1068,7 @@ def __init__(self, client: Cloudflare) -> None: self.custom_hostnames = resources.CustomHostnamesWithStreamingResponse(client.custom_hostnames) self.custom_nameservers = resources.CustomNameserversWithStreamingResponse(client.custom_nameservers) self.dns = resources.DNSWithStreamingResponse(client.dns) - self.dnssec = resources.DNSSECWithStreamingResponse(client.dnssec) + self.dnssec = resources.DNSSECResourceWithStreamingResponse(client.dnssec) self.email_routing = resources.EmailRoutingWithStreamingResponse(client.email_routing) self.filters = resources.FiltersWithStreamingResponse(client.filters) self.firewall = resources.FirewallWithStreamingResponse(client.firewall) @@ -1160,7 +1160,7 @@ def __init__(self, client: AsyncCloudflare) -> None: self.custom_hostnames = resources.AsyncCustomHostnamesWithStreamingResponse(client.custom_hostnames) self.custom_nameservers = resources.AsyncCustomNameserversWithStreamingResponse(client.custom_nameservers) self.dns = resources.AsyncDNSWithStreamingResponse(client.dns) - self.dnssec = resources.AsyncDNSSECWithStreamingResponse(client.dnssec) + self.dnssec = resources.AsyncDNSSECResourceWithStreamingResponse(client.dnssec) self.email_routing = resources.AsyncEmailRoutingWithStreamingResponse(client.email_routing) self.filters = resources.AsyncFiltersWithStreamingResponse(client.filters) self.firewall = resources.AsyncFirewallWithStreamingResponse(client.firewall) diff --git a/src/cloudflare/resources/__init__.py b/src/cloudflare/resources/__init__.py index 13721178d1d..e9596573a34 100644 --- a/src/cloudflare/resources/__init__.py +++ b/src/cloudflare/resources/__init__.py @@ -177,12 +177,12 @@ AsyncZonesWithStreamingResponse, ) from .dnssec import ( - DNSSEC, - AsyncDNSSEC, - DNSSECWithRawResponse, - AsyncDNSSECWithRawResponse, - DNSSECWithStreamingResponse, - AsyncDNSSECWithStreamingResponse, + DNSSECResource, + AsyncDNSSECResource, + DNSSECResourceWithRawResponse, + AsyncDNSSECResourceWithRawResponse, + DNSSECResourceWithStreamingResponse, + AsyncDNSSECResourceWithStreamingResponse, ) from .images import ( Images, @@ -762,12 +762,12 @@ "AsyncDNSWithRawResponse", "DNSWithStreamingResponse", "AsyncDNSWithStreamingResponse", - "DNSSEC", - "AsyncDNSSEC", - "DNSSECWithRawResponse", - "AsyncDNSSECWithRawResponse", - "DNSSECWithStreamingResponse", - "AsyncDNSSECWithStreamingResponse", + "DNSSECResource", + "AsyncDNSSECResource", + "DNSSECResourceWithRawResponse", + "AsyncDNSSECResourceWithRawResponse", + "DNSSECResourceWithStreamingResponse", + "AsyncDNSSECResourceWithStreamingResponse", "EmailRouting", "AsyncEmailRouting", "EmailRoutingWithRawResponse", diff --git a/src/cloudflare/resources/alerting/destinations/webhooks.py b/src/cloudflare/resources/alerting/destinations/webhooks.py index 3d187f66856..62567e627bb 100644 --- a/src/cloudflare/resources/alerting/destinations/webhooks.py +++ b/src/cloudflare/resources/alerting/destinations/webhooks.py @@ -24,7 +24,7 @@ make_request_options, ) from ....types.alerting.destinations import ( - AaaWebhooks, + AlertingWebhooks, WebhookListResponse, WebhookCreateResponse, WebhookDeleteResponse, @@ -267,7 +267,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AaaWebhooks: + ) -> AlertingWebhooks: """ Get details for a single webhooks destination. @@ -297,7 +297,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AaaWebhooks], ResultWrapper[AaaWebhooks]), + cast_to=cast(Type[AlertingWebhooks], ResultWrapper[AlertingWebhooks]), ) @@ -532,7 +532,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AaaWebhooks: + ) -> AlertingWebhooks: """ Get details for a single webhooks destination. @@ -562,7 +562,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AaaWebhooks], ResultWrapper[AaaWebhooks]), + cast_to=cast(Type[AlertingWebhooks], ResultWrapper[AlertingWebhooks]), ) diff --git a/src/cloudflare/resources/alerting/history.py b/src/cloudflare/resources/alerting/history.py index 9ca93d35575..9d7bfbb9b2b 100644 --- a/src/cloudflare/resources/alerting/history.py +++ b/src/cloudflare/resources/alerting/history.py @@ -22,7 +22,7 @@ AsyncPaginator, make_request_options, ) -from ...types.alerting import AaaHistory, history_list_params +from ...types.alerting import AlertingHistory, history_list_params __all__ = ["History", "AsyncHistory"] @@ -50,7 +50,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[AaaHistory]: + ) -> SyncV4PagePaginationArray[AlertingHistory]: """Gets a list of history records for notifications sent to an account. The records @@ -82,7 +82,7 @@ def list( raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") return self._get_api_list( f"/accounts/{account_id}/alerting/v3/history", - page=SyncV4PagePaginationArray[AaaHistory], + page=SyncV4PagePaginationArray[AlertingHistory], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -98,7 +98,7 @@ def list( history_list_params.HistoryListParams, ), ), - model=AaaHistory, + model=AlertingHistory, ) @@ -125,7 +125,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[AaaHistory, AsyncV4PagePaginationArray[AaaHistory]]: + ) -> AsyncPaginator[AlertingHistory, AsyncV4PagePaginationArray[AlertingHistory]]: """Gets a list of history records for notifications sent to an account. The records @@ -157,7 +157,7 @@ def list( raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") return self._get_api_list( f"/accounts/{account_id}/alerting/v3/history", - page=AsyncV4PagePaginationArray[AaaHistory], + page=AsyncV4PagePaginationArray[AlertingHistory], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -173,7 +173,7 @@ def list( history_list_params.HistoryListParams, ), ), - model=AaaHistory, + model=AlertingHistory, ) diff --git a/src/cloudflare/resources/alerting/policies.py b/src/cloudflare/resources/alerting/policies.py index 2c6b735855c..434a862f31c 100644 --- a/src/cloudflare/resources/alerting/policies.py +++ b/src/cloudflare/resources/alerting/policies.py @@ -25,7 +25,7 @@ make_request_options, ) from ...types.alerting import ( - AaaPolicies, + AlertingPolicies, PolicyListResponse, PolicyCreateResponse, PolicyDeleteResponse, @@ -409,7 +409,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AaaPolicies: + ) -> AlertingPolicies: """ Get details for a single policy. @@ -439,7 +439,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AaaPolicies], ResultWrapper[AaaPolicies]), + cast_to=cast(Type[AlertingPolicies], ResultWrapper[AlertingPolicies]), ) @@ -815,7 +815,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AaaPolicies: + ) -> AlertingPolicies: """ Get details for a single policy. @@ -845,7 +845,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AaaPolicies], ResultWrapper[AaaPolicies]), + cast_to=cast(Type[AlertingPolicies], ResultWrapper[AlertingPolicies]), ) diff --git a/src/cloudflare/resources/certificate_authorities/hostname_associations.py b/src/cloudflare/resources/certificate_authorities/hostname_associations.py index cf1a30e097f..87331116d12 100644 --- a/src/cloudflare/resources/certificate_authorities/hostname_associations.py +++ b/src/cloudflare/resources/certificate_authorities/hostname_associations.py @@ -24,7 +24,7 @@ make_request_options, ) from ...types.certificate_authorities import ( - TLSCertificatesAndHostnamesHostnameAssociation, + TLSHostnameAssociation, hostname_association_get_params, hostname_association_update_params, ) @@ -53,7 +53,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesHostnameAssociation: + ) -> TLSHostnameAssociation: """ Replace Hostname Associations @@ -90,10 +90,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesHostnameAssociation], - ResultWrapper[TLSCertificatesAndHostnamesHostnameAssociation], - ), + cast_to=cast(Type[TLSHostnameAssociation], ResultWrapper[TLSHostnameAssociation]), ) def get( @@ -107,7 +104,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesHostnameAssociation: + ) -> TLSHostnameAssociation: """ List Hostname Associations @@ -141,10 +138,7 @@ def get( ), post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesHostnameAssociation], - ResultWrapper[TLSCertificatesAndHostnamesHostnameAssociation], - ), + cast_to=cast(Type[TLSHostnameAssociation], ResultWrapper[TLSHostnameAssociation]), ) @@ -169,7 +163,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesHostnameAssociation: + ) -> TLSHostnameAssociation: """ Replace Hostname Associations @@ -206,10 +200,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesHostnameAssociation], - ResultWrapper[TLSCertificatesAndHostnamesHostnameAssociation], - ), + cast_to=cast(Type[TLSHostnameAssociation], ResultWrapper[TLSHostnameAssociation]), ) async def get( @@ -223,7 +214,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesHostnameAssociation: + ) -> TLSHostnameAssociation: """ List Hostname Associations @@ -257,10 +248,7 @@ async def get( ), post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesHostnameAssociation], - ResultWrapper[TLSCertificatesAndHostnamesHostnameAssociation], - ), + cast_to=cast(Type[TLSHostnameAssociation], ResultWrapper[TLSHostnameAssociation]), ) diff --git a/src/cloudflare/resources/client_certificates.py b/src/cloudflare/resources/client_certificates.py index d1554410856..bf6f2cbdef4 100644 --- a/src/cloudflare/resources/client_certificates.py +++ b/src/cloudflare/resources/client_certificates.py @@ -7,11 +7,7 @@ import httpx -from ..types import ( - TLSCertificatesAndHostnamesClientCertificate, - client_certificate_list_params, - client_certificate_create_params, -) +from ..types import ClientCertificate, client_certificate_list_params, client_certificate_create_params from .._types import NOT_GIVEN, Body, Query, Headers, NotGiven from .._utils import ( maybe_transform, @@ -56,7 +52,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesClientCertificate: + ) -> ClientCertificate: """ Create a new API Shield mTLS Client Certificate @@ -93,10 +89,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesClientCertificate], - ResultWrapper[TLSCertificatesAndHostnamesClientCertificate], - ), + cast_to=cast(Type[ClientCertificate], ResultWrapper[ClientCertificate]), ) def list( @@ -115,7 +108,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate]: + ) -> SyncV4PagePaginationArray[ClientCertificate]: """ List all of your Zone's API Shield mTLS Client Certificates by Status and/or using Pagination @@ -145,7 +138,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_id` but received {zone_id!r}") return self._get_api_list( f"/zones/{zone_id}/client_certificates", - page=SyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], + page=SyncV4PagePaginationArray[ClientCertificate], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -162,7 +155,7 @@ def list( client_certificate_list_params.ClientCertificateListParams, ), ), - model=TLSCertificatesAndHostnamesClientCertificate, + model=ClientCertificate, ) def delete( @@ -176,7 +169,7 @@ def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesClientCertificate: + ) -> ClientCertificate: """ Set a API Shield mTLS Client Certificate to pending_revocation status for processing to revoked status. @@ -209,10 +202,7 @@ def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesClientCertificate], - ResultWrapper[TLSCertificatesAndHostnamesClientCertificate], - ), + cast_to=cast(Type[ClientCertificate], ResultWrapper[ClientCertificate]), ) def edit( @@ -226,7 +216,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesClientCertificate: + ) -> ClientCertificate: """ If a API Shield mTLS Client Certificate is in a pending_revocation state, you may reactivate it with this endpoint. @@ -259,10 +249,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesClientCertificate], - ResultWrapper[TLSCertificatesAndHostnamesClientCertificate], - ), + cast_to=cast(Type[ClientCertificate], ResultWrapper[ClientCertificate]), ) def get( @@ -276,7 +263,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesClientCertificate: + ) -> ClientCertificate: """ Get Details for a single mTLS API Shield Client Certificate @@ -308,10 +295,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesClientCertificate], - ResultWrapper[TLSCertificatesAndHostnamesClientCertificate], - ), + cast_to=cast(Type[ClientCertificate], ResultWrapper[ClientCertificate]), ) @@ -336,7 +320,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesClientCertificate: + ) -> ClientCertificate: """ Create a new API Shield mTLS Client Certificate @@ -373,10 +357,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesClientCertificate], - ResultWrapper[TLSCertificatesAndHostnamesClientCertificate], - ), + cast_to=cast(Type[ClientCertificate], ResultWrapper[ClientCertificate]), ) def list( @@ -395,10 +376,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[ - TLSCertificatesAndHostnamesClientCertificate, - AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], - ]: + ) -> AsyncPaginator[ClientCertificate, AsyncV4PagePaginationArray[ClientCertificate]]: """ List all of your Zone's API Shield mTLS Client Certificates by Status and/or using Pagination @@ -428,7 +406,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_id` but received {zone_id!r}") return self._get_api_list( f"/zones/{zone_id}/client_certificates", - page=AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], + page=AsyncV4PagePaginationArray[ClientCertificate], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -445,7 +423,7 @@ def list( client_certificate_list_params.ClientCertificateListParams, ), ), - model=TLSCertificatesAndHostnamesClientCertificate, + model=ClientCertificate, ) async def delete( @@ -459,7 +437,7 @@ async def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesClientCertificate: + ) -> ClientCertificate: """ Set a API Shield mTLS Client Certificate to pending_revocation status for processing to revoked status. @@ -492,10 +470,7 @@ async def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesClientCertificate], - ResultWrapper[TLSCertificatesAndHostnamesClientCertificate], - ), + cast_to=cast(Type[ClientCertificate], ResultWrapper[ClientCertificate]), ) async def edit( @@ -509,7 +484,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesClientCertificate: + ) -> ClientCertificate: """ If a API Shield mTLS Client Certificate is in a pending_revocation state, you may reactivate it with this endpoint. @@ -542,10 +517,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesClientCertificate], - ResultWrapper[TLSCertificatesAndHostnamesClientCertificate], - ), + cast_to=cast(Type[ClientCertificate], ResultWrapper[ClientCertificate]), ) async def get( @@ -559,7 +531,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesClientCertificate: + ) -> ClientCertificate: """ Get Details for a single mTLS API Shield Client Certificate @@ -591,10 +563,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesClientCertificate], - ResultWrapper[TLSCertificatesAndHostnamesClientCertificate], - ), + cast_to=cast(Type[ClientCertificate], ResultWrapper[ClientCertificate]), ) diff --git a/src/cloudflare/resources/custom_certificates/custom_certificates.py b/src/cloudflare/resources/custom_certificates/custom_certificates.py index 85304b76f3f..b6a7d4ab90c 100644 --- a/src/cloudflare/resources/custom_certificates/custom_certificates.py +++ b/src/cloudflare/resources/custom_certificates/custom_certificates.py @@ -8,11 +8,11 @@ import httpx from ...types import ( + CustomCertificate, CustomCertificateGetResponse, CustomCertificateEditResponse, CustomCertificateCreateResponse, CustomCertificateDeleteResponse, - TLSCertificatesAndHostnamesCustomCertificate, custom_certificate_edit_params, custom_certificate_list_params, custom_certificate_create_params, @@ -165,7 +165,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate]: + ) -> SyncV4PagePaginationArray[CustomCertificate]: """List, search, and filter all of your custom SSL certificates. The higher @@ -193,7 +193,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_id` but received {zone_id!r}") return self._get_api_list( f"/zones/{zone_id}/custom_certificates", - page=SyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], + page=SyncV4PagePaginationArray[CustomCertificate], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -208,7 +208,7 @@ def list( custom_certificate_list_params.CustomCertificateListParams, ), ), - model=TLSCertificatesAndHostnamesCustomCertificate, + model=CustomCertificate, ) def delete( @@ -522,10 +522,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[ - TLSCertificatesAndHostnamesCustomCertificate, - AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], - ]: + ) -> AsyncPaginator[CustomCertificate, AsyncV4PagePaginationArray[CustomCertificate]]: """List, search, and filter all of your custom SSL certificates. The higher @@ -553,7 +550,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_id` but received {zone_id!r}") return self._get_api_list( f"/zones/{zone_id}/custom_certificates", - page=AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], + page=AsyncV4PagePaginationArray[CustomCertificate], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -568,7 +565,7 @@ def list( custom_certificate_list_params.CustomCertificateListParams, ), ), - model=TLSCertificatesAndHostnamesCustomCertificate, + model=CustomCertificate, ) async def delete( diff --git a/src/cloudflare/resources/custom_nameservers.py b/src/cloudflare/resources/custom_nameservers.py index 0ca1090e3c7..bf8e7e65e67 100644 --- a/src/cloudflare/resources/custom_nameservers.py +++ b/src/cloudflare/resources/custom_nameservers.py @@ -7,8 +7,8 @@ import httpx from ..types import ( + CustomNameserver, CustomNameserverGetResponse, - DNSCustomNameserversCustomNS, CustomNameserverDeleteResponse, CustomNameserverVerifyResponse, CustomNameserverAvailabiltyResponse, @@ -56,7 +56,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSCustomNameserversCustomNS: + ) -> CustomNameserver: """ Add Account Custom Nameserver @@ -93,7 +93,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSCustomNameserversCustomNS], ResultWrapper[DNSCustomNameserversCustomNS]), + cast_to=cast(Type[CustomNameserver], ResultWrapper[CustomNameserver]), ) def delete( @@ -286,7 +286,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSCustomNameserversCustomNS: + ) -> CustomNameserver: """ Add Account Custom Nameserver @@ -323,7 +323,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSCustomNameserversCustomNS], ResultWrapper[DNSCustomNameserversCustomNS]), + cast_to=cast(Type[CustomNameserver], ResultWrapper[CustomNameserver]), ) async def delete( diff --git a/src/cloudflare/resources/dns/analytics/reports/bytimes.py b/src/cloudflare/resources/dns/analytics/reports/bytimes.py index eb3865f2a64..7e04d625393 100644 --- a/src/cloudflare/resources/dns/analytics/reports/bytimes.py +++ b/src/cloudflare/resources/dns/analytics/reports/bytimes.py @@ -25,7 +25,7 @@ from ....._base_client import ( make_request_options, ) -from .....types.dns.analytics.reports import DNSDNSAnalyticsAPIReportBytime, bytime_get_params +from .....types.dns.analytics.reports import DNSAnalyticsReportByTime, bytime_get_params __all__ = ["Bytimes", "AsyncBytimes"] @@ -58,7 +58,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSDNSAnalyticsAPIReportBytime: + ) -> DNSAnalyticsReportByTime: """ Retrieves a list of aggregate metrics grouped by time interval. @@ -118,7 +118,7 @@ def get( ), post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSDNSAnalyticsAPIReportBytime], ResultWrapper[DNSDNSAnalyticsAPIReportBytime]), + cast_to=cast(Type[DNSAnalyticsReportByTime], ResultWrapper[DNSAnalyticsReportByTime]), ) @@ -150,7 +150,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSDNSAnalyticsAPIReportBytime: + ) -> DNSAnalyticsReportByTime: """ Retrieves a list of aggregate metrics grouped by time interval. @@ -210,7 +210,7 @@ async def get( ), post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSDNSAnalyticsAPIReportBytime], ResultWrapper[DNSDNSAnalyticsAPIReportBytime]), + cast_to=cast(Type[DNSAnalyticsReportByTime], ResultWrapper[DNSAnalyticsReportByTime]), ) diff --git a/src/cloudflare/resources/dns/analytics/reports/reports.py b/src/cloudflare/resources/dns/analytics/reports/reports.py index c3c6429a258..0a1f0f1716c 100644 --- a/src/cloudflare/resources/dns/analytics/reports/reports.py +++ b/src/cloudflare/resources/dns/analytics/reports/reports.py @@ -32,7 +32,7 @@ from ....._base_client import ( make_request_options, ) -from .....types.dns.analytics import DNSDNSAnalyticsAPIReport, report_get_params +from .....types.dns.analytics import DNSAnalyticsReport, report_get_params __all__ = ["Reports", "AsyncReports"] @@ -67,7 +67,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSDNSAnalyticsAPIReport: + ) -> DNSAnalyticsReport: """ Retrieves a list of summarised aggregate metrics over a given time period. @@ -124,7 +124,7 @@ def get( ), post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSDNSAnalyticsAPIReport], ResultWrapper[DNSDNSAnalyticsAPIReport]), + cast_to=cast(Type[DNSAnalyticsReport], ResultWrapper[DNSAnalyticsReport]), ) @@ -158,7 +158,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSDNSAnalyticsAPIReport: + ) -> DNSAnalyticsReport: """ Retrieves a list of summarised aggregate metrics over a given time period. @@ -215,7 +215,7 @@ async def get( ), post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSDNSAnalyticsAPIReport], ResultWrapper[DNSDNSAnalyticsAPIReport]), + cast_to=cast(Type[DNSAnalyticsReport], ResultWrapper[DNSAnalyticsReport]), ) diff --git a/src/cloudflare/resources/dns/firewall/analytics/reports/bytimes.py b/src/cloudflare/resources/dns/firewall/analytics/reports/bytimes.py index 49da0f978c8..a86961c5b7b 100644 --- a/src/cloudflare/resources/dns/firewall/analytics/reports/bytimes.py +++ b/src/cloudflare/resources/dns/firewall/analytics/reports/bytimes.py @@ -25,7 +25,7 @@ from ......_base_client import ( make_request_options, ) -from ......types.dns.analytics.reports import DNSDNSAnalyticsAPIReportBytime +from ......types.dns.analytics.reports import DNSAnalyticsReportByTime from ......types.dns.firewall.analytics.reports import bytime_get_params __all__ = ["Bytimes", "AsyncBytimes"] @@ -60,7 +60,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSDNSAnalyticsAPIReportBytime: + ) -> DNSAnalyticsReportByTime: """ Retrieves a list of aggregate metrics grouped by time interval. @@ -124,7 +124,7 @@ def get( ), post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSDNSAnalyticsAPIReportBytime], ResultWrapper[DNSDNSAnalyticsAPIReportBytime]), + cast_to=cast(Type[DNSAnalyticsReportByTime], ResultWrapper[DNSAnalyticsReportByTime]), ) @@ -157,7 +157,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSDNSAnalyticsAPIReportBytime: + ) -> DNSAnalyticsReportByTime: """ Retrieves a list of aggregate metrics grouped by time interval. @@ -221,7 +221,7 @@ async def get( ), post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSDNSAnalyticsAPIReportBytime], ResultWrapper[DNSDNSAnalyticsAPIReportBytime]), + cast_to=cast(Type[DNSAnalyticsReportByTime], ResultWrapper[DNSAnalyticsReportByTime]), ) diff --git a/src/cloudflare/resources/dns/firewall/analytics/reports/reports.py b/src/cloudflare/resources/dns/firewall/analytics/reports/reports.py index 91b41572e94..e21dbc531ac 100644 --- a/src/cloudflare/resources/dns/firewall/analytics/reports/reports.py +++ b/src/cloudflare/resources/dns/firewall/analytics/reports/reports.py @@ -32,7 +32,7 @@ from ......_base_client import ( make_request_options, ) -from ......types.dns.analytics import DNSDNSAnalyticsAPIReport +from ......types.dns.analytics import DNSAnalyticsReport from ......types.dns.firewall.analytics import report_get_params __all__ = ["Reports", "AsyncReports"] @@ -69,7 +69,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSDNSAnalyticsAPIReport: + ) -> DNSAnalyticsReport: """ Retrieves a list of summarised aggregate metrics over a given time period. @@ -130,7 +130,7 @@ def get( ), post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSDNSAnalyticsAPIReport], ResultWrapper[DNSDNSAnalyticsAPIReport]), + cast_to=cast(Type[DNSAnalyticsReport], ResultWrapper[DNSAnalyticsReport]), ) @@ -165,7 +165,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSDNSAnalyticsAPIReport: + ) -> DNSAnalyticsReport: """ Retrieves a list of summarised aggregate metrics over a given time period. @@ -226,7 +226,7 @@ async def get( ), post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSDNSAnalyticsAPIReport], ResultWrapper[DNSDNSAnalyticsAPIReport]), + cast_to=cast(Type[DNSAnalyticsReport], ResultWrapper[DNSAnalyticsReport]), ) diff --git a/src/cloudflare/resources/dns/firewall/firewall.py b/src/cloudflare/resources/dns/firewall/firewall.py index 4071da419ee..009cbc6681d 100644 --- a/src/cloudflare/resources/dns/firewall/firewall.py +++ b/src/cloudflare/resources/dns/firewall/firewall.py @@ -29,7 +29,7 @@ ) from ...._wrappers import ResultWrapper from ....types.dns import ( - DNSFirewallDNSFirewall, + DNSFirewall, FirewallDeleteResponse, firewall_edit_params, firewall_list_params, @@ -79,7 +79,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSFirewallDNSFirewall: + ) -> DNSFirewall: """ Create a configured DNS Firewall Cluster. @@ -143,7 +143,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSFirewallDNSFirewall], ResultWrapper[DNSFirewallDNSFirewall]), + cast_to=cast(Type[DNSFirewall], ResultWrapper[DNSFirewall]), ) def list( @@ -158,7 +158,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[DNSFirewallDNSFirewall]: + ) -> SyncV4PagePaginationArray[DNSFirewall]: """ List configured DNS Firewall clusters for an account. @@ -181,7 +181,7 @@ def list( raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") return self._get_api_list( f"/accounts/{account_id}/dns_firewall", - page=SyncV4PagePaginationArray[DNSFirewallDNSFirewall], + page=SyncV4PagePaginationArray[DNSFirewall], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -195,7 +195,7 @@ def list( firewall_list_params.FirewallListParams, ), ), - model=DNSFirewallDNSFirewall, + model=DNSFirewall, ) def delete( @@ -265,7 +265,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSFirewallDNSFirewall: + ) -> DNSFirewall: """ Modify a DNS Firewall Cluster configuration. @@ -334,7 +334,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSFirewallDNSFirewall], ResultWrapper[DNSFirewallDNSFirewall]), + cast_to=cast(Type[DNSFirewall], ResultWrapper[DNSFirewall]), ) def get( @@ -348,7 +348,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSFirewallDNSFirewall: + ) -> DNSFirewall: """ Show a single configured DNS Firewall cluster for an account. @@ -378,7 +378,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSFirewallDNSFirewall], ResultWrapper[DNSFirewallDNSFirewall]), + cast_to=cast(Type[DNSFirewall], ResultWrapper[DNSFirewall]), ) @@ -416,7 +416,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSFirewallDNSFirewall: + ) -> DNSFirewall: """ Create a configured DNS Firewall Cluster. @@ -480,7 +480,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSFirewallDNSFirewall], ResultWrapper[DNSFirewallDNSFirewall]), + cast_to=cast(Type[DNSFirewall], ResultWrapper[DNSFirewall]), ) def list( @@ -495,7 +495,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[DNSFirewallDNSFirewall, AsyncV4PagePaginationArray[DNSFirewallDNSFirewall]]: + ) -> AsyncPaginator[DNSFirewall, AsyncV4PagePaginationArray[DNSFirewall]]: """ List configured DNS Firewall clusters for an account. @@ -518,7 +518,7 @@ def list( raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") return self._get_api_list( f"/accounts/{account_id}/dns_firewall", - page=AsyncV4PagePaginationArray[DNSFirewallDNSFirewall], + page=AsyncV4PagePaginationArray[DNSFirewall], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -532,7 +532,7 @@ def list( firewall_list_params.FirewallListParams, ), ), - model=DNSFirewallDNSFirewall, + model=DNSFirewall, ) async def delete( @@ -602,7 +602,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSFirewallDNSFirewall: + ) -> DNSFirewall: """ Modify a DNS Firewall Cluster configuration. @@ -671,7 +671,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSFirewallDNSFirewall], ResultWrapper[DNSFirewallDNSFirewall]), + cast_to=cast(Type[DNSFirewall], ResultWrapper[DNSFirewall]), ) async def get( @@ -685,7 +685,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSFirewallDNSFirewall: + ) -> DNSFirewall: """ Show a single configured DNS Firewall cluster for an account. @@ -715,7 +715,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSFirewallDNSFirewall], ResultWrapper[DNSFirewallDNSFirewall]), + cast_to=cast(Type[DNSFirewall], ResultWrapper[DNSFirewall]), ) diff --git a/src/cloudflare/resources/dnssec.py b/src/cloudflare/resources/dnssec.py index 34ec1894380..c8799dab26a 100644 --- a/src/cloudflare/resources/dnssec.py +++ b/src/cloudflare/resources/dnssec.py @@ -7,7 +7,7 @@ import httpx -from ..types import DNSSECDNSSEC, DNSSECDeleteResponse, dnssec_edit_params +from ..types import DNSSEC, DNSSECDeleteResponse, dnssec_edit_params from .._types import NOT_GIVEN, Body, Query, Headers, NotGiven from .._utils import ( maybe_transform, @@ -26,17 +26,17 @@ make_request_options, ) -__all__ = ["DNSSEC", "AsyncDNSSEC"] +__all__ = ["DNSSECResource", "AsyncDNSSECResource"] -class DNSSEC(SyncAPIResource): +class DNSSECResource(SyncAPIResource): @cached_property - def with_raw_response(self) -> DNSSECWithRawResponse: - return DNSSECWithRawResponse(self) + def with_raw_response(self) -> DNSSECResourceWithRawResponse: + return DNSSECResourceWithRawResponse(self) @cached_property - def with_streaming_response(self) -> DNSSECWithStreamingResponse: - return DNSSECWithStreamingResponse(self) + def with_streaming_response(self) -> DNSSECResourceWithStreamingResponse: + return DNSSECResourceWithStreamingResponse(self) def delete( self, @@ -95,7 +95,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSSECDNSSEC: + ) -> DNSSEC: """ Enable or disable DNSSEC. @@ -148,7 +148,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSSECDNSSEC], ResultWrapper[DNSSECDNSSEC]), + cast_to=cast(Type[DNSSEC], ResultWrapper[DNSSEC]), ) def get( @@ -161,7 +161,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSSECDNSSEC: + ) -> DNSSEC: """ Details about DNSSEC status and configuration. @@ -187,18 +187,18 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSSECDNSSEC], ResultWrapper[DNSSECDNSSEC]), + cast_to=cast(Type[DNSSEC], ResultWrapper[DNSSEC]), ) -class AsyncDNSSEC(AsyncAPIResource): +class AsyncDNSSECResource(AsyncAPIResource): @cached_property - def with_raw_response(self) -> AsyncDNSSECWithRawResponse: - return AsyncDNSSECWithRawResponse(self) + def with_raw_response(self) -> AsyncDNSSECResourceWithRawResponse: + return AsyncDNSSECResourceWithRawResponse(self) @cached_property - def with_streaming_response(self) -> AsyncDNSSECWithStreamingResponse: - return AsyncDNSSECWithStreamingResponse(self) + def with_streaming_response(self) -> AsyncDNSSECResourceWithStreamingResponse: + return AsyncDNSSECResourceWithStreamingResponse(self) async def delete( self, @@ -257,7 +257,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSSECDNSSEC: + ) -> DNSSEC: """ Enable or disable DNSSEC. @@ -310,7 +310,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSSECDNSSEC], ResultWrapper[DNSSECDNSSEC]), + cast_to=cast(Type[DNSSEC], ResultWrapper[DNSSEC]), ) async def get( @@ -323,7 +323,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DNSSECDNSSEC: + ) -> DNSSEC: """ Details about DNSSEC status and configuration. @@ -349,12 +349,12 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DNSSECDNSSEC], ResultWrapper[DNSSECDNSSEC]), + cast_to=cast(Type[DNSSEC], ResultWrapper[DNSSEC]), ) -class DNSSECWithRawResponse: - def __init__(self, dnssec: DNSSEC) -> None: +class DNSSECResourceWithRawResponse: + def __init__(self, dnssec: DNSSECResource) -> None: self._dnssec = dnssec self.delete = to_raw_response_wrapper( @@ -368,8 +368,8 @@ def __init__(self, dnssec: DNSSEC) -> None: ) -class AsyncDNSSECWithRawResponse: - def __init__(self, dnssec: AsyncDNSSEC) -> None: +class AsyncDNSSECResourceWithRawResponse: + def __init__(self, dnssec: AsyncDNSSECResource) -> None: self._dnssec = dnssec self.delete = async_to_raw_response_wrapper( @@ -383,8 +383,8 @@ def __init__(self, dnssec: AsyncDNSSEC) -> None: ) -class DNSSECWithStreamingResponse: - def __init__(self, dnssec: DNSSEC) -> None: +class DNSSECResourceWithStreamingResponse: + def __init__(self, dnssec: DNSSECResource) -> None: self._dnssec = dnssec self.delete = to_streamed_response_wrapper( @@ -398,8 +398,8 @@ def __init__(self, dnssec: DNSSEC) -> None: ) -class AsyncDNSSECWithStreamingResponse: - def __init__(self, dnssec: AsyncDNSSEC) -> None: +class AsyncDNSSECResourceWithStreamingResponse: + def __init__(self, dnssec: AsyncDNSSECResource) -> None: self._dnssec = dnssec self.delete = async_to_streamed_response_wrapper( diff --git a/src/cloudflare/resources/durable_objects/namespaces/objects.py b/src/cloudflare/resources/durable_objects/namespaces/objects.py index 38ccfca148e..721e40b19d4 100644 --- a/src/cloudflare/resources/durable_objects/namespaces/objects.py +++ b/src/cloudflare/resources/durable_objects/namespaces/objects.py @@ -19,7 +19,7 @@ AsyncPaginator, make_request_options, ) -from ....types.durable_objects.namespaces import WorkersObject, object_list_params +from ....types.durable_objects.namespaces import DurableObject, object_list_params __all__ = ["Objects", "AsyncObjects"] @@ -46,7 +46,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncCursorLimitPagination[WorkersObject]: + ) -> SyncCursorLimitPagination[DurableObject]: """ Returns the Durable Objects in a given namespace. @@ -76,7 +76,7 @@ def list( raise ValueError(f"Expected a non-empty value for `id` but received {id!r}") return self._get_api_list( f"/accounts/{account_id}/workers/durable_objects/namespaces/{id}/objects", - page=SyncCursorLimitPagination[WorkersObject], + page=SyncCursorLimitPagination[DurableObject], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -90,7 +90,7 @@ def list( object_list_params.ObjectListParams, ), ), - model=WorkersObject, + model=DurableObject, ) @@ -116,7 +116,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[WorkersObject, AsyncCursorLimitPagination[WorkersObject]]: + ) -> AsyncPaginator[DurableObject, AsyncCursorLimitPagination[DurableObject]]: """ Returns the Durable Objects in a given namespace. @@ -146,7 +146,7 @@ def list( raise ValueError(f"Expected a non-empty value for `id` but received {id!r}") return self._get_api_list( f"/accounts/{account_id}/workers/durable_objects/namespaces/{id}/objects", - page=AsyncCursorLimitPagination[WorkersObject], + page=AsyncCursorLimitPagination[DurableObject], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -160,7 +160,7 @@ def list( object_list_params.ObjectListParams, ), ), - model=WorkersObject, + model=DurableObject, ) diff --git a/src/cloudflare/resources/filters.py b/src/cloudflare/resources/filters.py index bcc5384c86e..2f1348e4137 100644 --- a/src/cloudflare/resources/filters.py +++ b/src/cloudflare/resources/filters.py @@ -7,7 +7,7 @@ import httpx from ..types import ( - LegacyJhsFilter, + FirewallFilter, FilterCreateResponse, filter_list_params, filter_create_params, @@ -98,7 +98,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilter]: + ) -> Optional[FirewallFilter]: """ Updates an existing filter. @@ -129,7 +129,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilter]], ResultWrapper[LegacyJhsFilter]), + cast_to=cast(Type[Optional[FirewallFilter]], ResultWrapper[FirewallFilter]), ) def list( @@ -148,7 +148,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[LegacyJhsFilter]: + ) -> SyncV4PagePaginationArray[FirewallFilter]: """Fetches filters in a zone. You can filter the results using several optional @@ -181,7 +181,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_identifier` but received {zone_identifier!r}") return self._get_api_list( f"/zones/{zone_identifier}/filters", - page=SyncV4PagePaginationArray[LegacyJhsFilter], + page=SyncV4PagePaginationArray[FirewallFilter], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -199,7 +199,7 @@ def list( filter_list_params.FilterListParams, ), ), - model=LegacyJhsFilter, + model=FirewallFilter, ) def delete( @@ -213,7 +213,7 @@ def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilter]: + ) -> Optional[FirewallFilter]: """ Deletes an existing filter. @@ -243,7 +243,7 @@ def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilter]], ResultWrapper[LegacyJhsFilter]), + cast_to=cast(Type[Optional[FirewallFilter]], ResultWrapper[FirewallFilter]), ) def get( @@ -257,7 +257,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilter]: + ) -> Optional[FirewallFilter]: """ Fetches the details of a filter. @@ -287,7 +287,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilter]], ResultWrapper[LegacyJhsFilter]), + cast_to=cast(Type[Optional[FirewallFilter]], ResultWrapper[FirewallFilter]), ) @@ -353,7 +353,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilter]: + ) -> Optional[FirewallFilter]: """ Updates an existing filter. @@ -384,7 +384,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilter]], ResultWrapper[LegacyJhsFilter]), + cast_to=cast(Type[Optional[FirewallFilter]], ResultWrapper[FirewallFilter]), ) def list( @@ -403,7 +403,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[LegacyJhsFilter, AsyncV4PagePaginationArray[LegacyJhsFilter]]: + ) -> AsyncPaginator[FirewallFilter, AsyncV4PagePaginationArray[FirewallFilter]]: """Fetches filters in a zone. You can filter the results using several optional @@ -436,7 +436,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_identifier` but received {zone_identifier!r}") return self._get_api_list( f"/zones/{zone_identifier}/filters", - page=AsyncV4PagePaginationArray[LegacyJhsFilter], + page=AsyncV4PagePaginationArray[FirewallFilter], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -454,7 +454,7 @@ def list( filter_list_params.FilterListParams, ), ), - model=LegacyJhsFilter, + model=FirewallFilter, ) async def delete( @@ -468,7 +468,7 @@ async def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilter]: + ) -> Optional[FirewallFilter]: """ Deletes an existing filter. @@ -498,7 +498,7 @@ async def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilter]], ResultWrapper[LegacyJhsFilter]), + cast_to=cast(Type[Optional[FirewallFilter]], ResultWrapper[FirewallFilter]), ) async def get( @@ -512,7 +512,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilter]: + ) -> Optional[FirewallFilter]: """ Fetches the details of a filter. @@ -542,7 +542,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilter]], ResultWrapper[LegacyJhsFilter]), + cast_to=cast(Type[Optional[FirewallFilter]], ResultWrapper[FirewallFilter]), ) diff --git a/src/cloudflare/resources/firewall/lockdowns.py b/src/cloudflare/resources/firewall/lockdowns.py index 88f5e1ee6ae..f3600c66241 100644 --- a/src/cloudflare/resources/firewall/lockdowns.py +++ b/src/cloudflare/resources/firewall/lockdowns.py @@ -26,7 +26,7 @@ make_request_options, ) from ...types.firewall import ( - LegacyJhsZonelockdown, + FirewallZoneLockdown, LockdownDeleteResponse, lockdown_list_params, lockdown_create_params, @@ -56,7 +56,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsZonelockdown]: + ) -> Optional[FirewallZoneLockdown]: """ Creates a new Zone Lockdown rule. @@ -83,7 +83,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsZonelockdown]], ResultWrapper[LegacyJhsZonelockdown]), + cast_to=cast(Type[Optional[FirewallZoneLockdown]], ResultWrapper[FirewallZoneLockdown]), ) def update( @@ -98,7 +98,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsZonelockdown]: + ) -> Optional[FirewallZoneLockdown]: """ Updates an existing Zone Lockdown rule. @@ -129,7 +129,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsZonelockdown]], ResultWrapper[LegacyJhsZonelockdown]), + cast_to=cast(Type[Optional[FirewallZoneLockdown]], ResultWrapper[FirewallZoneLockdown]), ) def list( @@ -151,7 +151,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[LegacyJhsZonelockdown]: + ) -> SyncV4PagePaginationArray[FirewallZoneLockdown]: """Fetches Zone Lockdown rules. You can filter the results using several optional @@ -193,7 +193,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_identifier` but received {zone_identifier!r}") return self._get_api_list( f"/zones/{zone_identifier}/firewall/lockdowns", - page=SyncV4PagePaginationArray[LegacyJhsZonelockdown], + page=SyncV4PagePaginationArray[FirewallZoneLockdown], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -214,7 +214,7 @@ def list( lockdown_list_params.LockdownListParams, ), ), - model=LegacyJhsZonelockdown, + model=FirewallZoneLockdown, ) def delete( @@ -272,7 +272,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsZonelockdown]: + ) -> Optional[FirewallZoneLockdown]: """ Fetches the details of a Zone Lockdown rule. @@ -302,7 +302,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsZonelockdown]], ResultWrapper[LegacyJhsZonelockdown]), + cast_to=cast(Type[Optional[FirewallZoneLockdown]], ResultWrapper[FirewallZoneLockdown]), ) @@ -326,7 +326,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsZonelockdown]: + ) -> Optional[FirewallZoneLockdown]: """ Creates a new Zone Lockdown rule. @@ -353,7 +353,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsZonelockdown]], ResultWrapper[LegacyJhsZonelockdown]), + cast_to=cast(Type[Optional[FirewallZoneLockdown]], ResultWrapper[FirewallZoneLockdown]), ) async def update( @@ -368,7 +368,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsZonelockdown]: + ) -> Optional[FirewallZoneLockdown]: """ Updates an existing Zone Lockdown rule. @@ -399,7 +399,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsZonelockdown]], ResultWrapper[LegacyJhsZonelockdown]), + cast_to=cast(Type[Optional[FirewallZoneLockdown]], ResultWrapper[FirewallZoneLockdown]), ) def list( @@ -421,7 +421,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[LegacyJhsZonelockdown, AsyncV4PagePaginationArray[LegacyJhsZonelockdown]]: + ) -> AsyncPaginator[FirewallZoneLockdown, AsyncV4PagePaginationArray[FirewallZoneLockdown]]: """Fetches Zone Lockdown rules. You can filter the results using several optional @@ -463,7 +463,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_identifier` but received {zone_identifier!r}") return self._get_api_list( f"/zones/{zone_identifier}/firewall/lockdowns", - page=AsyncV4PagePaginationArray[LegacyJhsZonelockdown], + page=AsyncV4PagePaginationArray[FirewallZoneLockdown], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -484,7 +484,7 @@ def list( lockdown_list_params.LockdownListParams, ), ), - model=LegacyJhsZonelockdown, + model=FirewallZoneLockdown, ) async def delete( @@ -542,7 +542,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsZonelockdown]: + ) -> Optional[FirewallZoneLockdown]: """ Fetches the details of a Zone Lockdown rule. @@ -572,7 +572,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsZonelockdown]], ResultWrapper[LegacyJhsZonelockdown]), + cast_to=cast(Type[Optional[FirewallZoneLockdown]], ResultWrapper[FirewallZoneLockdown]), ) diff --git a/src/cloudflare/resources/firewall/rules.py b/src/cloudflare/resources/firewall/rules.py index c19ccaebb96..899df1780bd 100644 --- a/src/cloudflare/resources/firewall/rules.py +++ b/src/cloudflare/resources/firewall/rules.py @@ -27,8 +27,8 @@ ) from ...types.firewall import ( RuleEditResponse, + FirewallFilterRule, RuleCreateResponse, - LegacyJhsFilterRule, rule_edit_params, rule_list_params, rule_create_params, @@ -101,7 +101,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilterRule]: + ) -> Optional[FirewallFilterRule]: """ Updates an existing firewall rule. @@ -132,7 +132,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilterRule]], ResultWrapper[LegacyJhsFilterRule]), + cast_to=cast(Type[Optional[FirewallFilterRule]], ResultWrapper[FirewallFilterRule]), ) def list( @@ -150,7 +150,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[LegacyJhsFilterRule]: + ) -> SyncV4PagePaginationArray[FirewallFilterRule]: """Fetches firewall rules in a zone. You can filter the results using several @@ -181,7 +181,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_identifier` but received {zone_identifier!r}") return self._get_api_list( f"/zones/{zone_identifier}/firewall/rules", - page=SyncV4PagePaginationArray[LegacyJhsFilterRule], + page=SyncV4PagePaginationArray[FirewallFilterRule], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -198,7 +198,7 @@ def list( rule_list_params.RuleListParams, ), ), - model=LegacyJhsFilterRule, + model=FirewallFilterRule, ) def delete( @@ -213,7 +213,7 @@ def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilterRule]: + ) -> Optional[FirewallFilterRule]: """ Deletes an existing firewall rule. @@ -249,7 +249,7 @@ def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilterRule]], ResultWrapper[LegacyJhsFilterRule]), + cast_to=cast(Type[Optional[FirewallFilterRule]], ResultWrapper[FirewallFilterRule]), ) def edit( @@ -309,7 +309,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilterRule]: + ) -> Optional[FirewallFilterRule]: """ Fetches the details of a firewall rule. @@ -339,7 +339,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilterRule]], ResultWrapper[LegacyJhsFilterRule]), + cast_to=cast(Type[Optional[FirewallFilterRule]], ResultWrapper[FirewallFilterRule]), ) @@ -405,7 +405,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilterRule]: + ) -> Optional[FirewallFilterRule]: """ Updates an existing firewall rule. @@ -436,7 +436,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilterRule]], ResultWrapper[LegacyJhsFilterRule]), + cast_to=cast(Type[Optional[FirewallFilterRule]], ResultWrapper[FirewallFilterRule]), ) def list( @@ -454,7 +454,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[LegacyJhsFilterRule, AsyncV4PagePaginationArray[LegacyJhsFilterRule]]: + ) -> AsyncPaginator[FirewallFilterRule, AsyncV4PagePaginationArray[FirewallFilterRule]]: """Fetches firewall rules in a zone. You can filter the results using several @@ -485,7 +485,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_identifier` but received {zone_identifier!r}") return self._get_api_list( f"/zones/{zone_identifier}/firewall/rules", - page=AsyncV4PagePaginationArray[LegacyJhsFilterRule], + page=AsyncV4PagePaginationArray[FirewallFilterRule], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -502,7 +502,7 @@ def list( rule_list_params.RuleListParams, ), ), - model=LegacyJhsFilterRule, + model=FirewallFilterRule, ) async def delete( @@ -517,7 +517,7 @@ async def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilterRule]: + ) -> Optional[FirewallFilterRule]: """ Deletes an existing firewall rule. @@ -553,7 +553,7 @@ async def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilterRule]], ResultWrapper[LegacyJhsFilterRule]), + cast_to=cast(Type[Optional[FirewallFilterRule]], ResultWrapper[FirewallFilterRule]), ) async def edit( @@ -613,7 +613,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsFilterRule]: + ) -> Optional[FirewallFilterRule]: """ Fetches the details of a firewall rule. @@ -643,7 +643,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsFilterRule]], ResultWrapper[LegacyJhsFilterRule]), + cast_to=cast(Type[Optional[FirewallFilterRule]], ResultWrapper[FirewallFilterRule]), ) diff --git a/src/cloudflare/resources/firewall/waf/overrides.py b/src/cloudflare/resources/firewall/waf/overrides.py index 65e8336f52a..d6dceea4f8b 100644 --- a/src/cloudflare/resources/firewall/waf/overrides.py +++ b/src/cloudflare/resources/firewall/waf/overrides.py @@ -26,7 +26,7 @@ make_request_options, ) from ....types.firewall.waf import ( - LegacyJhsOverride, + WAFOverride, OverrideDeleteResponse, override_list_params, override_create_params, @@ -56,7 +56,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsOverride]: + ) -> Optional[WAFOverride]: """ Creates a URI-based WAF override for a zone. @@ -86,7 +86,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsOverride]], ResultWrapper[LegacyJhsOverride]), + cast_to=cast(Type[Optional[WAFOverride]], ResultWrapper[WAFOverride]), ) def update( @@ -101,7 +101,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsOverride]: + ) -> Optional[WAFOverride]: """ Updates an existing URI-based WAF override. @@ -135,7 +135,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsOverride]], ResultWrapper[LegacyJhsOverride]), + cast_to=cast(Type[Optional[WAFOverride]], ResultWrapper[WAFOverride]), ) def list( @@ -150,7 +150,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[LegacyJhsOverride]: + ) -> SyncV4PagePaginationArray[WAFOverride]: """ Fetches the URI-based WAF overrides in a zone. @@ -176,7 +176,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_identifier` but received {zone_identifier!r}") return self._get_api_list( f"/zones/{zone_identifier}/firewall/waf/overrides", - page=SyncV4PagePaginationArray[LegacyJhsOverride], + page=SyncV4PagePaginationArray[WAFOverride], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -190,7 +190,7 @@ def list( override_list_params.OverrideListParams, ), ), - model=LegacyJhsOverride, + model=WAFOverride, ) def delete( @@ -251,7 +251,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsOverride]: + ) -> Optional[WAFOverride]: """ Fetches the details of a URI-based WAF override. @@ -284,7 +284,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsOverride]], ResultWrapper[LegacyJhsOverride]), + cast_to=cast(Type[Optional[WAFOverride]], ResultWrapper[WAFOverride]), ) @@ -308,7 +308,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsOverride]: + ) -> Optional[WAFOverride]: """ Creates a URI-based WAF override for a zone. @@ -338,7 +338,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsOverride]], ResultWrapper[LegacyJhsOverride]), + cast_to=cast(Type[Optional[WAFOverride]], ResultWrapper[WAFOverride]), ) async def update( @@ -353,7 +353,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsOverride]: + ) -> Optional[WAFOverride]: """ Updates an existing URI-based WAF override. @@ -387,7 +387,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsOverride]], ResultWrapper[LegacyJhsOverride]), + cast_to=cast(Type[Optional[WAFOverride]], ResultWrapper[WAFOverride]), ) def list( @@ -402,7 +402,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[LegacyJhsOverride, AsyncV4PagePaginationArray[LegacyJhsOverride]]: + ) -> AsyncPaginator[WAFOverride, AsyncV4PagePaginationArray[WAFOverride]]: """ Fetches the URI-based WAF overrides in a zone. @@ -428,7 +428,7 @@ def list( raise ValueError(f"Expected a non-empty value for `zone_identifier` but received {zone_identifier!r}") return self._get_api_list( f"/zones/{zone_identifier}/firewall/waf/overrides", - page=AsyncV4PagePaginationArray[LegacyJhsOverride], + page=AsyncV4PagePaginationArray[WAFOverride], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -442,7 +442,7 @@ def list( override_list_params.OverrideListParams, ), ), - model=LegacyJhsOverride, + model=WAFOverride, ) async def delete( @@ -503,7 +503,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsOverride]: + ) -> Optional[WAFOverride]: """ Fetches the details of a URI-based WAF override. @@ -536,7 +536,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsOverride]], ResultWrapper[LegacyJhsOverride]), + cast_to=cast(Type[Optional[WAFOverride]], ResultWrapper[WAFOverride]), ) diff --git a/src/cloudflare/resources/firewall/waf/packages/groups.py b/src/cloudflare/resources/firewall/waf/packages/groups.py index e88635c71b7..2cf9cf75c11 100644 --- a/src/cloudflare/resources/firewall/waf/packages/groups.py +++ b/src/cloudflare/resources/firewall/waf/packages/groups.py @@ -29,7 +29,7 @@ from .....types.firewall.waf.packages import ( GroupGetResponse, GroupEditResponse, - WAFManagedRulesSchemasGroup, + WAFManagedRulesGroup, group_edit_params, group_list_params, ) @@ -63,7 +63,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[WAFManagedRulesSchemasGroup]: + ) -> SyncV4PagePaginationArray[WAFManagedRulesGroup]: """ Fetches the WAF rule groups in a WAF package. @@ -103,7 +103,7 @@ def list( raise ValueError(f"Expected a non-empty value for `package_id` but received {package_id!r}") return self._get_api_list( f"/zones/{zone_id}/firewall/waf/packages/{package_id}/groups", - page=SyncV4PagePaginationArray[WAFManagedRulesSchemasGroup], + page=SyncV4PagePaginationArray[WAFManagedRulesGroup], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -121,7 +121,7 @@ def list( group_list_params.GroupListParams, ), ), - model=WAFManagedRulesSchemasGroup, + model=WAFManagedRulesGroup, ) def edit( @@ -272,7 +272,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[WAFManagedRulesSchemasGroup, AsyncV4PagePaginationArray[WAFManagedRulesSchemasGroup]]: + ) -> AsyncPaginator[WAFManagedRulesGroup, AsyncV4PagePaginationArray[WAFManagedRulesGroup]]: """ Fetches the WAF rule groups in a WAF package. @@ -312,7 +312,7 @@ def list( raise ValueError(f"Expected a non-empty value for `package_id` but received {package_id!r}") return self._get_api_list( f"/zones/{zone_id}/firewall/waf/packages/{package_id}/groups", - page=AsyncV4PagePaginationArray[WAFManagedRulesSchemasGroup], + page=AsyncV4PagePaginationArray[WAFManagedRulesGroup], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -330,7 +330,7 @@ def list( group_list_params.GroupListParams, ), ), - model=WAFManagedRulesSchemasGroup, + model=WAFManagedRulesGroup, ) async def edit( diff --git a/src/cloudflare/resources/healthchecks/healthchecks.py b/src/cloudflare/resources/healthchecks/healthchecks.py index 8c7b6640746..113f89b83eb 100644 --- a/src/cloudflare/resources/healthchecks/healthchecks.py +++ b/src/cloudflare/resources/healthchecks/healthchecks.py @@ -8,8 +8,8 @@ import httpx from ...types import ( + Healthcheck, HealthcheckListResponse, - HealthchecksHealthchecks, HealthcheckDeleteResponse, healthcheck_edit_params, healthcheck_create_params, @@ -100,7 +100,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Create a new health check. @@ -178,7 +178,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) def update( @@ -225,7 +225,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Update a configured health check. @@ -307,7 +307,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) def list( @@ -437,7 +437,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Patch a configured health check. @@ -519,7 +519,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) def get( @@ -533,7 +533,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Fetch a single configured health check. @@ -563,7 +563,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) @@ -623,7 +623,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Create a new health check. @@ -701,7 +701,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) async def update( @@ -748,7 +748,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Update a configured health check. @@ -830,7 +830,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) async def list( @@ -960,7 +960,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Patch a configured health check. @@ -1042,7 +1042,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) async def get( @@ -1056,7 +1056,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Fetch a single configured health check. @@ -1086,7 +1086,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) diff --git a/src/cloudflare/resources/healthchecks/previews.py b/src/cloudflare/resources/healthchecks/previews.py index a7350c837ec..376b0e5a5ae 100644 --- a/src/cloudflare/resources/healthchecks/previews.py +++ b/src/cloudflare/resources/healthchecks/previews.py @@ -7,7 +7,7 @@ import httpx -from ...types import HealthchecksHealthchecks +from ...types import Healthcheck from ..._types import NOT_GIVEN, Body, Query, Headers, NotGiven from ..._utils import ( maybe_transform, @@ -82,7 +82,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Create a new preview health check. @@ -160,7 +160,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) def delete( @@ -218,7 +218,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Fetch a single configured health check preview. @@ -248,7 +248,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) @@ -304,7 +304,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Create a new preview health check. @@ -382,7 +382,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) async def delete( @@ -440,7 +440,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> HealthchecksHealthchecks: + ) -> Healthcheck: """ Fetch a single configured health check preview. @@ -470,7 +470,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[HealthchecksHealthchecks], ResultWrapper[HealthchecksHealthchecks]), + cast_to=cast(Type[Healthcheck], ResultWrapper[Healthcheck]), ) diff --git a/src/cloudflare/resources/images/v1/v1.py b/src/cloudflare/resources/images/v1/v1.py index 966f1ef0c82..14e662717ec 100644 --- a/src/cloudflare/resources/images/v1/v1.py +++ b/src/cloudflare/resources/images/v1/v1.py @@ -58,14 +58,7 @@ AsyncPaginator, make_request_options, ) -from ....types.images import ( - ImagesImage, - V1ListResponse, - V1DeleteResponse, - v1_edit_params, - v1_list_params, - v1_create_params, -) +from ....types.images import Image, V1ListResponse, V1DeleteResponse, v1_edit_params, v1_list_params, v1_create_params __all__ = ["V1", "AsyncV1"] @@ -107,7 +100,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ImagesImage: + ) -> Image: """ Upload an image with up to 10 Megabytes using a single HTTP POST (multipart/form-data) request. An image can be uploaded by sending an image file @@ -140,7 +133,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ImagesImage: + ) -> Image: """ Upload an image with up to 10 Megabytes using a single HTTP POST (multipart/form-data) request. An image can be uploaded by sending an image file @@ -174,7 +167,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ImagesImage: + ) -> Image: if not account_id: raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") return self._post( @@ -193,7 +186,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[ImagesImage], ResultWrapper[ImagesImage]), + cast_to=cast(Type[Image], ResultWrapper[Image]), ) def list( @@ -314,7 +307,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ImagesImage: + ) -> Image: """Update image access control. On access control change, all copies of the image @@ -360,7 +353,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[ImagesImage], ResultWrapper[ImagesImage]), + cast_to=cast(Type[Image], ResultWrapper[Image]), ) def get( @@ -374,7 +367,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ImagesImage: + ) -> Image: """ Fetch details for a single image. @@ -404,7 +397,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[ImagesImage], ResultWrapper[ImagesImage]), + cast_to=cast(Type[Image], ResultWrapper[Image]), ) @@ -445,7 +438,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ImagesImage: + ) -> Image: """ Upload an image with up to 10 Megabytes using a single HTTP POST (multipart/form-data) request. An image can be uploaded by sending an image file @@ -478,7 +471,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ImagesImage: + ) -> Image: """ Upload an image with up to 10 Megabytes using a single HTTP POST (multipart/form-data) request. An image can be uploaded by sending an image file @@ -512,7 +505,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ImagesImage: + ) -> Image: if not account_id: raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") return await self._post( @@ -531,7 +524,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[ImagesImage], ResultWrapper[ImagesImage]), + cast_to=cast(Type[Image], ResultWrapper[Image]), ) def list( @@ -652,7 +645,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ImagesImage: + ) -> Image: """Update image access control. On access control change, all copies of the image @@ -698,7 +691,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[ImagesImage], ResultWrapper[ImagesImage]), + cast_to=cast(Type[Image], ResultWrapper[Image]), ) async def get( @@ -712,7 +705,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ImagesImage: + ) -> Image: """ Fetch details for a single image. @@ -742,7 +735,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[ImagesImage], ResultWrapper[ImagesImage]), + cast_to=cast(Type[Image], ResultWrapper[Image]), ) diff --git a/src/cloudflare/resources/keyless_certificates.py b/src/cloudflare/resources/keyless_certificates.py index d561877e556..6fa50f619f8 100644 --- a/src/cloudflare/resources/keyless_certificates.py +++ b/src/cloudflare/resources/keyless_certificates.py @@ -8,8 +8,8 @@ import httpx from ..types import ( + KeylessCertificateHostname, KeylessCertificateListResponse, - TLSCertificatesAndHostnamesBase, KeylessCertificateDeleteResponse, keyless_certificate_edit_params, keyless_certificate_create_params, @@ -60,7 +60,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesBase: + ) -> KeylessCertificateHostname: """ Create Keyless SSL Configuration @@ -113,7 +113,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[TLSCertificatesAndHostnamesBase], ResultWrapper[TLSCertificatesAndHostnamesBase]), + cast_to=cast(Type[KeylessCertificateHostname], ResultWrapper[KeylessCertificateHostname]), ) def list( @@ -217,7 +217,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesBase: + ) -> KeylessCertificateHostname: """This will update attributes of a Keyless SSL. Consists of one or more of the @@ -272,7 +272,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[TLSCertificatesAndHostnamesBase], ResultWrapper[TLSCertificatesAndHostnamesBase]), + cast_to=cast(Type[KeylessCertificateHostname], ResultWrapper[KeylessCertificateHostname]), ) def get( @@ -286,7 +286,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesBase: + ) -> KeylessCertificateHostname: """ Get details for one Keyless SSL configuration. @@ -318,7 +318,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[TLSCertificatesAndHostnamesBase], ResultWrapper[TLSCertificatesAndHostnamesBase]), + cast_to=cast(Type[KeylessCertificateHostname], ResultWrapper[KeylessCertificateHostname]), ) @@ -347,7 +347,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesBase: + ) -> KeylessCertificateHostname: """ Create Keyless SSL Configuration @@ -400,7 +400,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[TLSCertificatesAndHostnamesBase], ResultWrapper[TLSCertificatesAndHostnamesBase]), + cast_to=cast(Type[KeylessCertificateHostname], ResultWrapper[KeylessCertificateHostname]), ) async def list( @@ -504,7 +504,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesBase: + ) -> KeylessCertificateHostname: """This will update attributes of a Keyless SSL. Consists of one or more of the @@ -559,7 +559,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[TLSCertificatesAndHostnamesBase], ResultWrapper[TLSCertificatesAndHostnamesBase]), + cast_to=cast(Type[KeylessCertificateHostname], ResultWrapper[KeylessCertificateHostname]), ) async def get( @@ -573,7 +573,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesBase: + ) -> KeylessCertificateHostname: """ Get details for one Keyless SSL configuration. @@ -605,7 +605,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[TLSCertificatesAndHostnamesBase], ResultWrapper[TLSCertificatesAndHostnamesBase]), + cast_to=cast(Type[KeylessCertificateHostname], ResultWrapper[KeylessCertificateHostname]), ) diff --git a/src/cloudflare/resources/load_balancers/previews.py b/src/cloudflare/resources/load_balancers/previews.py index d1000157f0e..06267b7e36a 100644 --- a/src/cloudflare/resources/load_balancers/previews.py +++ b/src/cloudflare/resources/load_balancers/previews.py @@ -19,7 +19,7 @@ from ..._base_client import ( make_request_options, ) -from ...types.user.load_balancers import LoadBalancingPreviewResult +from ...types.user.load_balancers import LoadBalancingPreview __all__ = ["Previews", "AsyncPreviews"] @@ -44,7 +44,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> LoadBalancingPreviewResult: + ) -> LoadBalancingPreview: """ Get the result of a previous preview operation using the provided preview_id. @@ -72,7 +72,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[LoadBalancingPreviewResult], ResultWrapper[LoadBalancingPreviewResult]), + cast_to=cast(Type[LoadBalancingPreview], ResultWrapper[LoadBalancingPreview]), ) @@ -96,7 +96,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> LoadBalancingPreviewResult: + ) -> LoadBalancingPreview: """ Get the result of a previous preview operation using the provided preview_id. @@ -124,7 +124,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[LoadBalancingPreviewResult], ResultWrapper[LoadBalancingPreviewResult]), + cast_to=cast(Type[LoadBalancingPreview], ResultWrapper[LoadBalancingPreview]), ) diff --git a/src/cloudflare/resources/logpush/edge.py b/src/cloudflare/resources/logpush/edge.py index f5d3152481b..6d7d106f081 100644 --- a/src/cloudflare/resources/logpush/edge.py +++ b/src/cloudflare/resources/logpush/edge.py @@ -23,7 +23,7 @@ from ..._base_client import ( make_request_options, ) -from ...types.logpush import EdgeGetResponse, LogpushInstantLogsJob, edge_create_params +from ...types.logpush import EdgeGetResponse, InstantLogpushJob, edge_create_params __all__ = ["Edge", "AsyncEdge"] @@ -50,7 +50,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogpushInstantLogsJob]: + ) -> Optional[InstantLogpushJob]: """ Creates a new Instant Logs job for a zone. @@ -92,7 +92,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogpushInstantLogsJob]], ResultWrapper[LogpushInstantLogsJob]), + cast_to=cast(Type[Optional[InstantLogpushJob]], ResultWrapper[InstantLogpushJob]), ) def get( @@ -157,7 +157,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogpushInstantLogsJob]: + ) -> Optional[InstantLogpushJob]: """ Creates a new Instant Logs job for a zone. @@ -199,7 +199,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogpushInstantLogsJob]], ResultWrapper[LogpushInstantLogsJob]), + cast_to=cast(Type[Optional[InstantLogpushJob]], ResultWrapper[InstantLogpushJob]), ) async def get( diff --git a/src/cloudflare/resources/logpush/jobs.py b/src/cloudflare/resources/logpush/jobs.py index 3b915b4c181..56f3a10d613 100644 --- a/src/cloudflare/resources/logpush/jobs.py +++ b/src/cloudflare/resources/logpush/jobs.py @@ -25,7 +25,7 @@ make_request_options, ) from ...types.logpush import JobListResponse, JobDeleteResponse, job_create_params, job_update_params -from ...types.logpush.datasets import LogpushLogpushJob +from ...types.logpush.datasets import LogpushJob __all__ = ["Jobs", "AsyncJobs"] @@ -58,7 +58,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogpushLogpushJob]: + ) -> Optional[LogpushJob]: """ Creates a new Logpush job for an account or zone. @@ -139,7 +139,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogpushLogpushJob]], ResultWrapper[LogpushLogpushJob]), + cast_to=cast(Type[Optional[LogpushJob]], ResultWrapper[LogpushJob]), ) def update( @@ -160,7 +160,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogpushLogpushJob]: + ) -> Optional[LogpushJob]: """ Updates a Logpush job. @@ -235,7 +235,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogpushLogpushJob]], ResultWrapper[LogpushLogpushJob]), + cast_to=cast(Type[Optional[LogpushJob]], ResultWrapper[LogpushJob]), ) def list( @@ -368,7 +368,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogpushLogpushJob]: + ) -> Optional[LogpushJob]: """ Gets the details of a Logpush job. @@ -411,7 +411,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogpushLogpushJob]], ResultWrapper[LogpushLogpushJob]), + cast_to=cast(Type[Optional[LogpushJob]], ResultWrapper[LogpushJob]), ) @@ -443,7 +443,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogpushLogpushJob]: + ) -> Optional[LogpushJob]: """ Creates a new Logpush job for an account or zone. @@ -524,7 +524,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogpushLogpushJob]], ResultWrapper[LogpushLogpushJob]), + cast_to=cast(Type[Optional[LogpushJob]], ResultWrapper[LogpushJob]), ) async def update( @@ -545,7 +545,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogpushLogpushJob]: + ) -> Optional[LogpushJob]: """ Updates a Logpush job. @@ -620,7 +620,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogpushLogpushJob]], ResultWrapper[LogpushLogpushJob]), + cast_to=cast(Type[Optional[LogpushJob]], ResultWrapper[LogpushJob]), ) async def list( @@ -753,7 +753,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogpushLogpushJob]: + ) -> Optional[LogpushJob]: """ Gets the details of a Logpush job. @@ -796,7 +796,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogpushLogpushJob]], ResultWrapper[LogpushLogpushJob]), + cast_to=cast(Type[Optional[LogpushJob]], ResultWrapper[LogpushJob]), ) diff --git a/src/cloudflare/resources/logs/control/cmb/config.py b/src/cloudflare/resources/logs/control/cmb/config.py index 368b7072259..bc6f02732b6 100644 --- a/src/cloudflare/resources/logs/control/cmb/config.py +++ b/src/cloudflare/resources/logs/control/cmb/config.py @@ -23,7 +23,7 @@ from ....._base_client import ( make_request_options, ) -from .....types.logs.control.cmb import LogcontrolCmbConfig, ConfigDeleteResponse, config_create_params +from .....types.logs.control.cmb import CmbConfig, ConfigDeleteResponse, config_create_params __all__ = ["Config", "AsyncConfig"] @@ -48,7 +48,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogcontrolCmbConfig]: + ) -> Optional[CmbConfig]: """ Updates CMB config. @@ -77,7 +77,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogcontrolCmbConfig]], ResultWrapper[LogcontrolCmbConfig]), + cast_to=cast(Type[Optional[CmbConfig]], ResultWrapper[CmbConfig]), ) def delete( @@ -134,7 +134,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogcontrolCmbConfig]: + ) -> Optional[CmbConfig]: """ Gets CMB config. @@ -160,7 +160,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogcontrolCmbConfig]], ResultWrapper[LogcontrolCmbConfig]), + cast_to=cast(Type[Optional[CmbConfig]], ResultWrapper[CmbConfig]), ) @@ -184,7 +184,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogcontrolCmbConfig]: + ) -> Optional[CmbConfig]: """ Updates CMB config. @@ -213,7 +213,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogcontrolCmbConfig]], ResultWrapper[LogcontrolCmbConfig]), + cast_to=cast(Type[Optional[CmbConfig]], ResultWrapper[CmbConfig]), ) async def delete( @@ -270,7 +270,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LogcontrolCmbConfig]: + ) -> Optional[CmbConfig]: """ Gets CMB config. @@ -296,7 +296,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LogcontrolCmbConfig]], ResultWrapper[LogcontrolCmbConfig]), + cast_to=cast(Type[Optional[CmbConfig]], ResultWrapper[CmbConfig]), ) diff --git a/src/cloudflare/resources/magic_network_monitoring/configs/configs.py b/src/cloudflare/resources/magic_network_monitoring/configs/configs.py index a48cd2b441c..6d2f1e9761d 100644 --- a/src/cloudflare/resources/magic_network_monitoring/configs/configs.py +++ b/src/cloudflare/resources/magic_network_monitoring/configs/configs.py @@ -27,7 +27,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.magic_network_monitoring import MagicVisibilityMNMConfig +from ....types.magic_network_monitoring import MagicNetworkMonitoringConfig __all__ = ["Configs", "AsyncConfigs"] @@ -55,7 +55,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Create a new network monitoring configuration. @@ -79,7 +79,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) def update( @@ -92,7 +92,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Update an existing network monitoring configuration, requires the entire configuration to be updated at once. @@ -117,7 +117,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) def delete( @@ -130,7 +130,7 @@ def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Delete an existing network monitoring configuration. @@ -154,7 +154,7 @@ def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) def edit( @@ -167,7 +167,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Update fields in an existing network monitoring configuration. @@ -191,7 +191,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) def get( @@ -204,7 +204,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Lists default sampling and router IPs for account. @@ -228,7 +228,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) @@ -255,7 +255,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Create a new network monitoring configuration. @@ -279,7 +279,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) async def update( @@ -292,7 +292,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Update an existing network monitoring configuration, requires the entire configuration to be updated at once. @@ -317,7 +317,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) async def delete( @@ -330,7 +330,7 @@ async def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Delete an existing network monitoring configuration. @@ -354,7 +354,7 @@ async def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) async def edit( @@ -367,7 +367,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Update fields in an existing network monitoring configuration. @@ -391,7 +391,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) async def get( @@ -404,7 +404,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Lists default sampling and router IPs for account. @@ -428,7 +428,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) diff --git a/src/cloudflare/resources/magic_network_monitoring/configs/full.py b/src/cloudflare/resources/magic_network_monitoring/configs/full.py index 987c7648410..14f0d1a6dde 100644 --- a/src/cloudflare/resources/magic_network_monitoring/configs/full.py +++ b/src/cloudflare/resources/magic_network_monitoring/configs/full.py @@ -19,7 +19,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.magic_network_monitoring import MagicVisibilityMNMConfig +from ....types.magic_network_monitoring import MagicNetworkMonitoringConfig __all__ = ["Full", "AsyncFull"] @@ -43,7 +43,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Lists default sampling, router IPs, and rules for account. @@ -67,7 +67,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) @@ -90,7 +90,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> MagicVisibilityMNMConfig: + ) -> MagicNetworkMonitoringConfig: """ Lists default sampling, router IPs, and rules for account. @@ -114,7 +114,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[MagicVisibilityMNMConfig], ResultWrapper[MagicVisibilityMNMConfig]), + cast_to=cast(Type[MagicNetworkMonitoringConfig], ResultWrapper[MagicNetworkMonitoringConfig]), ) diff --git a/src/cloudflare/resources/magic_network_monitoring/rules/advertisements.py b/src/cloudflare/resources/magic_network_monitoring/rules/advertisements.py index 885f5729edc..a3257fb7f14 100644 --- a/src/cloudflare/resources/magic_network_monitoring/rules/advertisements.py +++ b/src/cloudflare/resources/magic_network_monitoring/rules/advertisements.py @@ -19,7 +19,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.magic_network_monitoring.rules import MagicVisibilityMNMRuleAdvertisable +from ....types.magic_network_monitoring.rules import MagicNetworkMonitoringRuleAdvertisable __all__ = ["Advertisements", "AsyncAdvertisements"] @@ -44,7 +44,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRuleAdvertisable]: + ) -> Optional[MagicNetworkMonitoringRuleAdvertisable]: """ Update advertisement for rule. @@ -71,7 +71,8 @@ def edit( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Type[Optional[MagicVisibilityMNMRuleAdvertisable]], ResultWrapper[MagicVisibilityMNMRuleAdvertisable] + Type[Optional[MagicNetworkMonitoringRuleAdvertisable]], + ResultWrapper[MagicNetworkMonitoringRuleAdvertisable], ), ) @@ -96,7 +97,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRuleAdvertisable]: + ) -> Optional[MagicNetworkMonitoringRuleAdvertisable]: """ Update advertisement for rule. @@ -123,7 +124,8 @@ async def edit( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Type[Optional[MagicVisibilityMNMRuleAdvertisable]], ResultWrapper[MagicVisibilityMNMRuleAdvertisable] + Type[Optional[MagicNetworkMonitoringRuleAdvertisable]], + ResultWrapper[MagicNetworkMonitoringRuleAdvertisable], ), ) diff --git a/src/cloudflare/resources/magic_network_monitoring/rules/rules.py b/src/cloudflare/resources/magic_network_monitoring/rules/rules.py index 9b868e59894..e1888cd6b18 100644 --- a/src/cloudflare/resources/magic_network_monitoring/rules/rules.py +++ b/src/cloudflare/resources/magic_network_monitoring/rules/rules.py @@ -27,7 +27,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.magic_network_monitoring import RuleListResponse, MagicVisibilityMNMRule +from ....types.magic_network_monitoring import RuleListResponse, MagicNetworkMonitoringRule __all__ = ["Rules", "AsyncRules"] @@ -55,7 +55,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRule]: + ) -> Optional[MagicNetworkMonitoringRule]: """Create network monitoring rules for account. Currently only supports creating a @@ -81,7 +81,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[MagicVisibilityMNMRule]], ResultWrapper[MagicVisibilityMNMRule]), + cast_to=cast(Type[Optional[MagicNetworkMonitoringRule]], ResultWrapper[MagicNetworkMonitoringRule]), ) def update( @@ -94,7 +94,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRule]: + ) -> Optional[MagicNetworkMonitoringRule]: """ Update network monitoring rules for account. @@ -118,7 +118,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[MagicVisibilityMNMRule]], ResultWrapper[MagicVisibilityMNMRule]), + cast_to=cast(Type[Optional[MagicNetworkMonitoringRule]], ResultWrapper[MagicNetworkMonitoringRule]), ) def list( @@ -169,7 +169,7 @@ def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRule]: + ) -> Optional[MagicNetworkMonitoringRule]: """ Delete a network monitoring rule for account. @@ -195,7 +195,7 @@ def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[MagicVisibilityMNMRule]], ResultWrapper[MagicVisibilityMNMRule]), + cast_to=cast(Type[Optional[MagicNetworkMonitoringRule]], ResultWrapper[MagicNetworkMonitoringRule]), ) def edit( @@ -209,7 +209,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRule]: + ) -> Optional[MagicNetworkMonitoringRule]: """ Update a network monitoring rule for account. @@ -235,7 +235,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[MagicVisibilityMNMRule]], ResultWrapper[MagicVisibilityMNMRule]), + cast_to=cast(Type[Optional[MagicNetworkMonitoringRule]], ResultWrapper[MagicNetworkMonitoringRule]), ) def get( @@ -249,7 +249,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRule]: + ) -> Optional[MagicNetworkMonitoringRule]: """ List a single network monitoring rule for account. @@ -275,7 +275,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[MagicVisibilityMNMRule]], ResultWrapper[MagicVisibilityMNMRule]), + cast_to=cast(Type[Optional[MagicNetworkMonitoringRule]], ResultWrapper[MagicNetworkMonitoringRule]), ) @@ -302,7 +302,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRule]: + ) -> Optional[MagicNetworkMonitoringRule]: """Create network monitoring rules for account. Currently only supports creating a @@ -328,7 +328,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[MagicVisibilityMNMRule]], ResultWrapper[MagicVisibilityMNMRule]), + cast_to=cast(Type[Optional[MagicNetworkMonitoringRule]], ResultWrapper[MagicNetworkMonitoringRule]), ) async def update( @@ -341,7 +341,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRule]: + ) -> Optional[MagicNetworkMonitoringRule]: """ Update network monitoring rules for account. @@ -365,7 +365,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[MagicVisibilityMNMRule]], ResultWrapper[MagicVisibilityMNMRule]), + cast_to=cast(Type[Optional[MagicNetworkMonitoringRule]], ResultWrapper[MagicNetworkMonitoringRule]), ) async def list( @@ -416,7 +416,7 @@ async def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRule]: + ) -> Optional[MagicNetworkMonitoringRule]: """ Delete a network monitoring rule for account. @@ -442,7 +442,7 @@ async def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[MagicVisibilityMNMRule]], ResultWrapper[MagicVisibilityMNMRule]), + cast_to=cast(Type[Optional[MagicNetworkMonitoringRule]], ResultWrapper[MagicNetworkMonitoringRule]), ) async def edit( @@ -456,7 +456,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRule]: + ) -> Optional[MagicNetworkMonitoringRule]: """ Update a network monitoring rule for account. @@ -482,7 +482,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[MagicVisibilityMNMRule]], ResultWrapper[MagicVisibilityMNMRule]), + cast_to=cast(Type[Optional[MagicNetworkMonitoringRule]], ResultWrapper[MagicNetworkMonitoringRule]), ) async def get( @@ -496,7 +496,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[MagicVisibilityMNMRule]: + ) -> Optional[MagicNetworkMonitoringRule]: """ List a single network monitoring rule for account. @@ -522,7 +522,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[MagicVisibilityMNMRule]], ResultWrapper[MagicVisibilityMNMRule]), + cast_to=cast(Type[Optional[MagicNetworkMonitoringRule]], ResultWrapper[MagicNetworkMonitoringRule]), ) diff --git a/src/cloudflare/resources/mtls_certificates/mtls_certificates.py b/src/cloudflare/resources/mtls_certificates/mtls_certificates.py index d75071c65a6..0b04602dfd9 100644 --- a/src/cloudflare/resources/mtls_certificates/mtls_certificates.py +++ b/src/cloudflare/resources/mtls_certificates/mtls_certificates.py @@ -7,9 +7,9 @@ import httpx from ...types import ( + MTLSCertificate, + MTLSCertificateUpdate, MTLSCertificateListResponse, - TLSCertificatesAndHostnamesCertificateObjectPost, - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate_create_params, ) from ..._types import NOT_GIVEN, Body, Query, Headers, NotGiven @@ -68,7 +68,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesCertificateObjectPost: + ) -> MTLSCertificateUpdate: """ Upload a certificate that you want to use with mTLS-enabled Cloudflare services. @@ -111,10 +111,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesCertificateObjectPost], - ResultWrapper[TLSCertificatesAndHostnamesCertificateObjectPost], - ), + cast_to=cast(Type[MTLSCertificateUpdate], ResultWrapper[MTLSCertificateUpdate]), ) def list( @@ -167,7 +164,7 @@ def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesComponentsSchemasCertificateObject: + ) -> MTLSCertificate: """ Deletes the mTLS certificate unless the certificate is in use by one or more Cloudflare services. @@ -200,10 +197,7 @@ def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesComponentsSchemasCertificateObject], - ResultWrapper[TLSCertificatesAndHostnamesComponentsSchemasCertificateObject], - ), + cast_to=cast(Type[MTLSCertificate], ResultWrapper[MTLSCertificate]), ) def get( @@ -217,7 +211,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesComponentsSchemasCertificateObject: + ) -> MTLSCertificate: """ Fetches a single mTLS certificate. @@ -249,10 +243,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesComponentsSchemasCertificateObject], - ResultWrapper[TLSCertificatesAndHostnamesComponentsSchemasCertificateObject], - ), + cast_to=cast(Type[MTLSCertificate], ResultWrapper[MTLSCertificate]), ) @@ -283,7 +274,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesCertificateObjectPost: + ) -> MTLSCertificateUpdate: """ Upload a certificate that you want to use with mTLS-enabled Cloudflare services. @@ -326,10 +317,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesCertificateObjectPost], - ResultWrapper[TLSCertificatesAndHostnamesCertificateObjectPost], - ), + cast_to=cast(Type[MTLSCertificateUpdate], ResultWrapper[MTLSCertificateUpdate]), ) async def list( @@ -382,7 +370,7 @@ async def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesComponentsSchemasCertificateObject: + ) -> MTLSCertificate: """ Deletes the mTLS certificate unless the certificate is in use by one or more Cloudflare services. @@ -415,10 +403,7 @@ async def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesComponentsSchemasCertificateObject], - ResultWrapper[TLSCertificatesAndHostnamesComponentsSchemasCertificateObject], - ), + cast_to=cast(Type[MTLSCertificate], ResultWrapper[MTLSCertificate]), ) async def get( @@ -432,7 +417,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesComponentsSchemasCertificateObject: + ) -> MTLSCertificate: """ Fetches a single mTLS certificate. @@ -464,10 +449,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesComponentsSchemasCertificateObject], - ResultWrapper[TLSCertificatesAndHostnamesComponentsSchemasCertificateObject], - ), + cast_to=cast(Type[MTLSCertificate], ResultWrapper[MTLSCertificate]), ) diff --git a/src/cloudflare/resources/origin_tls_client_auth/hostnames/certificates.py b/src/cloudflare/resources/origin_tls_client_auth/hostnames/certificates.py index ee2fd407e19..840dd2147a0 100644 --- a/src/cloudflare/resources/origin_tls_client_auth/hostnames/certificates.py +++ b/src/cloudflare/resources/origin_tls_client_auth/hostnames/certificates.py @@ -25,7 +25,7 @@ ) from ....types.origin_tls_client_auth.hostnames import ( CertificateListResponse, - TLSCertificatesAndHostnamesSchemasCertificateObject, + OriginTLSClientCertificate, certificate_create_params, ) @@ -53,7 +53,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesSchemasCertificateObject: + ) -> OriginTLSClientCertificate: """Upload a certificate to be used for client authentication on a hostname. 10 @@ -92,10 +92,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesSchemasCertificateObject], - ResultWrapper[TLSCertificatesAndHostnamesSchemasCertificateObject], - ), + cast_to=cast(Type[OriginTLSClientCertificate], ResultWrapper[OriginTLSClientCertificate]), ) def list( @@ -148,7 +145,7 @@ def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesSchemasCertificateObject: + ) -> OriginTLSClientCertificate: """ Delete Hostname Client Certificate @@ -178,10 +175,7 @@ def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesSchemasCertificateObject], - ResultWrapper[TLSCertificatesAndHostnamesSchemasCertificateObject], - ), + cast_to=cast(Type[OriginTLSClientCertificate], ResultWrapper[OriginTLSClientCertificate]), ) def get( @@ -195,7 +189,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesSchemasCertificateObject: + ) -> OriginTLSClientCertificate: """ Get the certificate by ID to be used for client authentication on a hostname. @@ -225,10 +219,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesSchemasCertificateObject], - ResultWrapper[TLSCertificatesAndHostnamesSchemasCertificateObject], - ), + cast_to=cast(Type[OriginTLSClientCertificate], ResultWrapper[OriginTLSClientCertificate]), ) @@ -253,7 +244,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesSchemasCertificateObject: + ) -> OriginTLSClientCertificate: """Upload a certificate to be used for client authentication on a hostname. 10 @@ -292,10 +283,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesSchemasCertificateObject], - ResultWrapper[TLSCertificatesAndHostnamesSchemasCertificateObject], - ), + cast_to=cast(Type[OriginTLSClientCertificate], ResultWrapper[OriginTLSClientCertificate]), ) async def list( @@ -348,7 +336,7 @@ async def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesSchemasCertificateObject: + ) -> OriginTLSClientCertificate: """ Delete Hostname Client Certificate @@ -378,10 +366,7 @@ async def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesSchemasCertificateObject], - ResultWrapper[TLSCertificatesAndHostnamesSchemasCertificateObject], - ), + cast_to=cast(Type[OriginTLSClientCertificate], ResultWrapper[OriginTLSClientCertificate]), ) async def get( @@ -395,7 +380,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesSchemasCertificateObject: + ) -> OriginTLSClientCertificate: """ Get the certificate by ID to be used for client authentication on a hostname. @@ -425,10 +410,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesSchemasCertificateObject], - ResultWrapper[TLSCertificatesAndHostnamesSchemasCertificateObject], - ), + cast_to=cast(Type[OriginTLSClientCertificate], ResultWrapper[OriginTLSClientCertificate]), ) diff --git a/src/cloudflare/resources/origin_tls_client_auth/hostnames/hostnames.py b/src/cloudflare/resources/origin_tls_client_auth/hostnames/hostnames.py index 3ad78e8d631..2ebc5bf3915 100644 --- a/src/cloudflare/resources/origin_tls_client_auth/hostnames/hostnames.py +++ b/src/cloudflare/resources/origin_tls_client_auth/hostnames/hostnames.py @@ -33,7 +33,7 @@ ) from ....types.origin_tls_client_auth import ( HostnameUpdateResponse, - TLSCertificatesAndHostnamesHostnameCertidObject, + OriginTLSClientCertificateID, hostname_update_params, ) @@ -109,7 +109,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesHostnameCertidObject: + ) -> OriginTLSClientCertificateID: """ Get the Hostname Status for Client Authentication @@ -140,10 +140,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesHostnameCertidObject], - ResultWrapper[TLSCertificatesAndHostnamesHostnameCertidObject], - ), + cast_to=cast(Type[OriginTLSClientCertificateID], ResultWrapper[OriginTLSClientCertificateID]), ) @@ -216,7 +213,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesHostnameCertidObject: + ) -> OriginTLSClientCertificateID: """ Get the Hostname Status for Client Authentication @@ -247,10 +244,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesHostnameCertidObject], - ResultWrapper[TLSCertificatesAndHostnamesHostnameCertidObject], - ), + cast_to=cast(Type[OriginTLSClientCertificateID], ResultWrapper[OriginTLSClientCertificateID]), ) diff --git a/src/cloudflare/resources/page_shield/page_shield.py b/src/cloudflare/resources/page_shield/page_shield.py index 90585101a8f..4c0d32b9133 100644 --- a/src/cloudflare/resources/page_shield/page_shield.py +++ b/src/cloudflare/resources/page_shield/page_shield.py @@ -6,7 +6,7 @@ import httpx -from ...types import PageShieldGetZoneSettings, PageShieldUpdateZoneSettings, page_shield_update_params +from ...types import PageShieldSetting, PageShieldUpdateResponse, page_shield_update_params from .scripts import ( Scripts, AsyncScripts, @@ -86,7 +86,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> PageShieldUpdateZoneSettings: + ) -> PageShieldUpdateResponse: """ Updates Page Shield settings. @@ -127,7 +127,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[PageShieldUpdateZoneSettings], ResultWrapper[PageShieldUpdateZoneSettings]), + cast_to=cast(Type[PageShieldUpdateResponse], ResultWrapper[PageShieldUpdateResponse]), ) def get( @@ -140,7 +140,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> PageShieldGetZoneSettings: + ) -> PageShieldSetting: """ Fetches the Page Shield settings. @@ -166,7 +166,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[PageShieldGetZoneSettings], ResultWrapper[PageShieldGetZoneSettings]), + cast_to=cast(Type[PageShieldSetting], ResultWrapper[PageShieldSetting]), ) @@ -204,7 +204,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> PageShieldUpdateZoneSettings: + ) -> PageShieldUpdateResponse: """ Updates Page Shield settings. @@ -245,7 +245,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[PageShieldUpdateZoneSettings], ResultWrapper[PageShieldUpdateZoneSettings]), + cast_to=cast(Type[PageShieldUpdateResponse], ResultWrapper[PageShieldUpdateResponse]), ) async def get( @@ -258,7 +258,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> PageShieldGetZoneSettings: + ) -> PageShieldSetting: """ Fetches the Page Shield settings. @@ -284,7 +284,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[PageShieldGetZoneSettings], ResultWrapper[PageShieldGetZoneSettings]), + cast_to=cast(Type[PageShieldSetting], ResultWrapper[PageShieldSetting]), ) diff --git a/src/cloudflare/resources/page_shield/policies.py b/src/cloudflare/resources/page_shield/policies.py index 5f5e5244888..626e619f8ac 100644 --- a/src/cloudflare/resources/page_shield/policies.py +++ b/src/cloudflare/resources/page_shield/policies.py @@ -24,12 +24,7 @@ from ..._base_client import ( make_request_options, ) -from ...types.page_shield import ( - PolicyListResponse, - PageShieldPageshieldPolicy, - policy_create_params, - policy_update_params, -) +from ...types.page_shield import PageShieldPolicy, PolicyListResponse, policy_create_params, policy_update_params __all__ = ["Policies", "AsyncPolicies"] @@ -58,7 +53,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> PageShieldPageshieldPolicy: + ) -> PageShieldPolicy: """ Create a Page Shield policy. @@ -101,7 +96,7 @@ def create( options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, extra_body=extra_body, timeout=timeout ), - cast_to=PageShieldPageshieldPolicy, + cast_to=PageShieldPolicy, ) def update( @@ -120,7 +115,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> PageShieldPageshieldPolicy: + ) -> PageShieldPolicy: """ Update a Page Shield policy by ID. @@ -167,7 +162,7 @@ def update( options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, extra_body=extra_body, timeout=timeout ), - cast_to=PageShieldPageshieldPolicy, + cast_to=PageShieldPolicy, ) def list( @@ -261,7 +256,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> PageShieldPageshieldPolicy: + ) -> PageShieldPolicy: """ Fetches a Page Shield policy by ID. @@ -287,7 +282,7 @@ def get( options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, extra_body=extra_body, timeout=timeout ), - cast_to=PageShieldPageshieldPolicy, + cast_to=PageShieldPolicy, ) @@ -315,7 +310,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> PageShieldPageshieldPolicy: + ) -> PageShieldPolicy: """ Create a Page Shield policy. @@ -358,7 +353,7 @@ async def create( options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, extra_body=extra_body, timeout=timeout ), - cast_to=PageShieldPageshieldPolicy, + cast_to=PageShieldPolicy, ) async def update( @@ -377,7 +372,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> PageShieldPageshieldPolicy: + ) -> PageShieldPolicy: """ Update a Page Shield policy by ID. @@ -424,7 +419,7 @@ async def update( options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, extra_body=extra_body, timeout=timeout ), - cast_to=PageShieldPageshieldPolicy, + cast_to=PageShieldPolicy, ) async def list( @@ -518,7 +513,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> PageShieldPageshieldPolicy: + ) -> PageShieldPolicy: """ Fetches a Page Shield policy by ID. @@ -544,7 +539,7 @@ async def get( options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, extra_body=extra_body, timeout=timeout ), - cast_to=PageShieldPageshieldPolicy, + cast_to=PageShieldPolicy, ) diff --git a/src/cloudflare/resources/pagerules/settings.py b/src/cloudflare/resources/pagerules/settings.py index 8e904e12da4..d78d2708c42 100644 --- a/src/cloudflare/resources/pagerules/settings.py +++ b/src/cloudflare/resources/pagerules/settings.py @@ -19,7 +19,7 @@ from ..._base_client import ( make_request_options, ) -from ...types.pagerules import ZonesSettings +from ...types.pagerules import ZonePageruleSettings __all__ = ["Settings", "AsyncSettings"] @@ -43,7 +43,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ZonesSettings: + ) -> ZonePageruleSettings: """ Returns a list of settings (and their details) that Page Rules can apply to matching requests. @@ -70,7 +70,7 @@ def list( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[ZonesSettings], ResultWrapper[ZonesSettings]), + cast_to=cast(Type[ZonePageruleSettings], ResultWrapper[ZonePageruleSettings]), ) @@ -93,7 +93,7 @@ async def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> ZonesSettings: + ) -> ZonePageruleSettings: """ Returns a list of settings (and their details) that Page Rules can apply to matching requests. @@ -120,7 +120,7 @@ async def list( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[ZonesSettings], ResultWrapper[ZonesSettings]), + cast_to=cast(Type[ZonePageruleSettings], ResultWrapper[ZonePageruleSettings]), ) diff --git a/src/cloudflare/resources/plans.py b/src/cloudflare/resources/plans.py index d29e72ed769..f6ed7bc0e42 100644 --- a/src/cloudflare/resources/plans.py +++ b/src/cloudflare/resources/plans.py @@ -6,7 +6,7 @@ import httpx -from ..types import PlanListResponse, BillSubsAPIAvailableRatePlan +from ..types import PlanListResponse, AvailableRatePlan from .._types import NOT_GIVEN, Body, Query, Headers, NotGiven from .._compat import cached_property from .._resource import SyncAPIResource, AsyncAPIResource @@ -83,7 +83,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> BillSubsAPIAvailableRatePlan: + ) -> AvailableRatePlan: """ Details of the available plan that the zone can subscribe to. @@ -113,7 +113,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[BillSubsAPIAvailableRatePlan], ResultWrapper[BillSubsAPIAvailableRatePlan]), + cast_to=cast(Type[AvailableRatePlan], ResultWrapper[AvailableRatePlan]), ) @@ -176,7 +176,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> BillSubsAPIAvailableRatePlan: + ) -> AvailableRatePlan: """ Details of the available plan that the zone can subscribe to. @@ -206,7 +206,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[BillSubsAPIAvailableRatePlan], ResultWrapper[BillSubsAPIAvailableRatePlan]), + cast_to=cast(Type[AvailableRatePlan], ResultWrapper[AvailableRatePlan]), ) diff --git a/src/cloudflare/resources/ssl/universal/settings.py b/src/cloudflare/resources/ssl/universal/settings.py index 36de0618329..c81ede1c479 100644 --- a/src/cloudflare/resources/ssl/universal/settings.py +++ b/src/cloudflare/resources/ssl/universal/settings.py @@ -23,7 +23,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.ssl.universal import TLSCertificatesAndHostnamesUniversal, setting_edit_params +from ....types.ssl.universal import UniversalSSLSettings, setting_edit_params __all__ = ["Settings", "AsyncSettings"] @@ -48,7 +48,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesUniversal: + ) -> UniversalSSLSettings: """ Patch Universal SSL Settings for a Zone. @@ -101,9 +101,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesUniversal], ResultWrapper[TLSCertificatesAndHostnamesUniversal] - ), + cast_to=cast(Type[UniversalSSLSettings], ResultWrapper[UniversalSSLSettings]), ) def get( @@ -116,7 +114,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesUniversal: + ) -> UniversalSSLSettings: """ Get Universal SSL Settings for a Zone. @@ -142,9 +140,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesUniversal], ResultWrapper[TLSCertificatesAndHostnamesUniversal] - ), + cast_to=cast(Type[UniversalSSLSettings], ResultWrapper[UniversalSSLSettings]), ) @@ -168,7 +164,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesUniversal: + ) -> UniversalSSLSettings: """ Patch Universal SSL Settings for a Zone. @@ -221,9 +217,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesUniversal], ResultWrapper[TLSCertificatesAndHostnamesUniversal] - ), + cast_to=cast(Type[UniversalSSLSettings], ResultWrapper[UniversalSSLSettings]), ) async def get( @@ -236,7 +230,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> TLSCertificatesAndHostnamesUniversal: + ) -> UniversalSSLSettings: """ Get Universal SSL Settings for a Zone. @@ -262,9 +256,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[TLSCertificatesAndHostnamesUniversal], ResultWrapper[TLSCertificatesAndHostnamesUniversal] - ), + cast_to=cast(Type[UniversalSSLSettings], ResultWrapper[UniversalSSLSettings]), ) diff --git a/src/cloudflare/resources/stream/audio_tracks.py b/src/cloudflare/resources/stream/audio_tracks.py index 44c8c6646a1..3ac3d43c20d 100644 --- a/src/cloudflare/resources/stream/audio_tracks.py +++ b/src/cloudflare/resources/stream/audio_tracks.py @@ -24,8 +24,8 @@ make_request_options, ) from ...types.stream import ( + StreamAudio, AudioTrackGetResponse, - StreamAdditionalAudio, AudioTrackDeleteResponse, audio_track_copy_params, audio_track_edit_params, @@ -112,7 +112,7 @@ def copy( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> StreamAdditionalAudio: + ) -> StreamAudio: """ Adds an additional audio track to a video using the provided audio track URL. @@ -156,7 +156,7 @@ def copy( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[StreamAdditionalAudio], ResultWrapper[StreamAdditionalAudio]), + cast_to=cast(Type[StreamAudio], ResultWrapper[StreamAudio]), ) def edit( @@ -173,7 +173,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> StreamAdditionalAudio: + ) -> StreamAudio: """Edits additional audio tracks on a video. Editing the default status of an audio @@ -222,7 +222,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[StreamAdditionalAudio], ResultWrapper[StreamAdditionalAudio]), + cast_to=cast(Type[StreamAudio], ResultWrapper[StreamAudio]), ) def get( @@ -350,7 +350,7 @@ async def copy( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> StreamAdditionalAudio: + ) -> StreamAudio: """ Adds an additional audio track to a video using the provided audio track URL. @@ -394,7 +394,7 @@ async def copy( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[StreamAdditionalAudio], ResultWrapper[StreamAdditionalAudio]), + cast_to=cast(Type[StreamAudio], ResultWrapper[StreamAudio]), ) async def edit( @@ -411,7 +411,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> StreamAdditionalAudio: + ) -> StreamAudio: """Edits additional audio tracks on a video. Editing the default status of an audio @@ -460,7 +460,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[StreamAdditionalAudio], ResultWrapper[StreamAdditionalAudio]), + cast_to=cast(Type[StreamAudio], ResultWrapper[StreamAudio]), ) async def get( diff --git a/src/cloudflare/resources/user/firewall/access_rules.py b/src/cloudflare/resources/user/firewall/access_rules.py index 8a6c4c17d29..762b30cfa70 100644 --- a/src/cloudflare/resources/user/firewall/access_rules.py +++ b/src/cloudflare/resources/user/firewall/access_rules.py @@ -27,7 +27,7 @@ make_request_options, ) from ....types.user.firewall import ( - LegacyJhsRule, + FirewallRule, AccessRuleDeleteResponse, access_rule_edit_params, access_rule_list_params, @@ -58,7 +58,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsRule]: + ) -> Optional[FirewallRule]: """ Creates a new IP Access rule for all zones owned by the current user. @@ -97,7 +97,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsRule]], ResultWrapper[LegacyJhsRule]), + cast_to=cast(Type[Optional[FirewallRule]], ResultWrapper[FirewallRule]), ) def list( @@ -115,7 +115,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[LegacyJhsRule]: + ) -> SyncV4PagePaginationArray[FirewallRule]: """Fetches IP Access rules of the user. You can filter the results using several @@ -140,7 +140,7 @@ def list( """ return self._get_api_list( "/user/firewall/access_rules/rules", - page=SyncV4PagePaginationArray[LegacyJhsRule], + page=SyncV4PagePaginationArray[FirewallRule], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -158,7 +158,7 @@ def list( access_rule_list_params.AccessRuleListParams, ), ), - model=LegacyJhsRule, + model=FirewallRule, ) def delete( @@ -214,7 +214,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsRule]: + ) -> Optional[FirewallRule]: """Updates an IP Access rule defined at the user level. You can only update the @@ -253,7 +253,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsRule]], ResultWrapper[LegacyJhsRule]), + cast_to=cast(Type[Optional[FirewallRule]], ResultWrapper[FirewallRule]), ) @@ -278,7 +278,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsRule]: + ) -> Optional[FirewallRule]: """ Creates a new IP Access rule for all zones owned by the current user. @@ -317,7 +317,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsRule]], ResultWrapper[LegacyJhsRule]), + cast_to=cast(Type[Optional[FirewallRule]], ResultWrapper[FirewallRule]), ) def list( @@ -335,7 +335,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[LegacyJhsRule, AsyncV4PagePaginationArray[LegacyJhsRule]]: + ) -> AsyncPaginator[FirewallRule, AsyncV4PagePaginationArray[FirewallRule]]: """Fetches IP Access rules of the user. You can filter the results using several @@ -360,7 +360,7 @@ def list( """ return self._get_api_list( "/user/firewall/access_rules/rules", - page=AsyncV4PagePaginationArray[LegacyJhsRule], + page=AsyncV4PagePaginationArray[FirewallRule], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -378,7 +378,7 @@ def list( access_rule_list_params.AccessRuleListParams, ), ), - model=LegacyJhsRule, + model=FirewallRule, ) async def delete( @@ -434,7 +434,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[LegacyJhsRule]: + ) -> Optional[FirewallRule]: """Updates an IP Access rule defined at the user level. You can only update the @@ -473,7 +473,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[LegacyJhsRule]], ResultWrapper[LegacyJhsRule]), + cast_to=cast(Type[Optional[FirewallRule]], ResultWrapper[FirewallRule]), ) diff --git a/src/cloudflare/resources/user/load_balancers/preview.py b/src/cloudflare/resources/user/load_balancers/preview.py index 859f9e7c8e5..ded8823d74b 100644 --- a/src/cloudflare/resources/user/load_balancers/preview.py +++ b/src/cloudflare/resources/user/load_balancers/preview.py @@ -19,7 +19,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.user.load_balancers import LoadBalancingPreviewResult +from ....types.user.load_balancers import LoadBalancingPreview __all__ = ["Preview", "AsyncPreview"] @@ -43,7 +43,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> LoadBalancingPreviewResult: + ) -> LoadBalancingPreview: """ Get the result of a previous preview operation using the provided preview_id. @@ -67,7 +67,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[LoadBalancingPreviewResult], ResultWrapper[LoadBalancingPreviewResult]), + cast_to=cast(Type[LoadBalancingPreview], ResultWrapper[LoadBalancingPreview]), ) @@ -90,7 +90,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> LoadBalancingPreviewResult: + ) -> LoadBalancingPreview: """ Get the result of a previous preview operation using the provided preview_id. @@ -114,7 +114,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[LoadBalancingPreviewResult], ResultWrapper[LoadBalancingPreviewResult]), + cast_to=cast(Type[LoadBalancingPreview], ResultWrapper[LoadBalancingPreview]), ) diff --git a/src/cloudflare/resources/user/organizations.py b/src/cloudflare/resources/user/organizations.py index 97ce0a41c27..1e3d17f1184 100644 --- a/src/cloudflare/resources/user/organizations.py +++ b/src/cloudflare/resources/user/organizations.py @@ -19,7 +19,7 @@ ) from ..._wrappers import ResultWrapper from ...pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray -from ...types.user import IamOrganization, OrganizationGetResponse, OrganizationDeleteResponse, organization_list_params +from ...types.user import Organization, OrganizationGetResponse, OrganizationDeleteResponse, organization_list_params from ..._base_client import ( AsyncPaginator, make_request_options, @@ -53,7 +53,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> SyncV4PagePaginationArray[IamOrganization]: + ) -> SyncV4PagePaginationArray[Organization]: """ Lists organizations the user is associated with. @@ -82,7 +82,7 @@ def list( """ return self._get_api_list( "/user/organizations", - page=SyncV4PagePaginationArray[IamOrganization], + page=SyncV4PagePaginationArray[Organization], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -101,7 +101,7 @@ def list( organization_list_params.OrganizationListParams, ), ), - model=IamOrganization, + model=Organization, ) def delete( @@ -209,7 +209,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AsyncPaginator[IamOrganization, AsyncV4PagePaginationArray[IamOrganization]]: + ) -> AsyncPaginator[Organization, AsyncV4PagePaginationArray[Organization]]: """ Lists organizations the user is associated with. @@ -238,7 +238,7 @@ def list( """ return self._get_api_list( "/user/organizations", - page=AsyncV4PagePaginationArray[IamOrganization], + page=AsyncV4PagePaginationArray[Organization], options=make_request_options( extra_headers=extra_headers, extra_query=extra_query, @@ -257,7 +257,7 @@ def list( organization_list_params.OrganizationListParams, ), ), - model=IamOrganization, + model=Organization, ) async def delete( diff --git a/src/cloudflare/resources/waiting_rooms/events/details.py b/src/cloudflare/resources/waiting_rooms/events/details.py index 9cfcbd76f2e..9cdb0fc0c8b 100644 --- a/src/cloudflare/resources/waiting_rooms/events/details.py +++ b/src/cloudflare/resources/waiting_rooms/events/details.py @@ -19,7 +19,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.waiting_rooms.events import WaitingroomEventDetailsResult +from ....types.waiting_rooms.events import WaitingroomEventDetails __all__ = ["Details", "AsyncDetails"] @@ -45,7 +45,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomEventDetailsResult: + ) -> WaitingroomEventDetails: """Previews an event's configuration as if it was active. Inherited fields from the @@ -77,7 +77,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomEventDetailsResult], ResultWrapper[WaitingroomEventDetailsResult]), + cast_to=cast(Type[WaitingroomEventDetails], ResultWrapper[WaitingroomEventDetails]), ) @@ -102,7 +102,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomEventDetailsResult: + ) -> WaitingroomEventDetails: """Previews an event's configuration as if it was active. Inherited fields from the @@ -134,7 +134,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomEventDetailsResult], ResultWrapper[WaitingroomEventDetailsResult]), + cast_to=cast(Type[WaitingroomEventDetails], ResultWrapper[WaitingroomEventDetails]), ) diff --git a/src/cloudflare/resources/waiting_rooms/events/events.py b/src/cloudflare/resources/waiting_rooms/events/events.py index 705e4ab4eb0..0f506aa3801 100644 --- a/src/cloudflare/resources/waiting_rooms/events/events.py +++ b/src/cloudflare/resources/waiting_rooms/events/events.py @@ -32,9 +32,9 @@ make_request_options, ) from ....types.waiting_rooms import ( + WaitingroomEvent, EventListResponse, EventDeleteResponse, - WaitingroomEventResult, event_edit_params, event_create_params, event_update_params, @@ -80,7 +80,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomEventResult: + ) -> WaitingroomEvent: """Only available for the Waiting Room Advanced subscription. Creates an event for @@ -177,7 +177,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomEventResult], ResultWrapper[WaitingroomEventResult]), + cast_to=cast(Type[WaitingroomEvent], ResultWrapper[WaitingroomEvent]), ) def update( @@ -205,7 +205,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomEventResult: + ) -> WaitingroomEvent: """ Updates a configured event for a waiting room. @@ -298,7 +298,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomEventResult], ResultWrapper[WaitingroomEventResult]), + cast_to=cast(Type[WaitingroomEvent], ResultWrapper[WaitingroomEvent]), ) def list( @@ -413,7 +413,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomEventResult: + ) -> WaitingroomEvent: """ Patches a configured event for a waiting room. @@ -506,7 +506,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomEventResult], ResultWrapper[WaitingroomEventResult]), + cast_to=cast(Type[WaitingroomEvent], ResultWrapper[WaitingroomEvent]), ) def get( @@ -521,7 +521,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomEventResult: + ) -> WaitingroomEvent: """ Fetches a single configured event for a waiting room. @@ -551,7 +551,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomEventResult], ResultWrapper[WaitingroomEventResult]), + cast_to=cast(Type[WaitingroomEvent], ResultWrapper[WaitingroomEvent]), ) @@ -592,7 +592,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomEventResult: + ) -> WaitingroomEvent: """Only available for the Waiting Room Advanced subscription. Creates an event for @@ -689,7 +689,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomEventResult], ResultWrapper[WaitingroomEventResult]), + cast_to=cast(Type[WaitingroomEvent], ResultWrapper[WaitingroomEvent]), ) async def update( @@ -717,7 +717,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomEventResult: + ) -> WaitingroomEvent: """ Updates a configured event for a waiting room. @@ -810,7 +810,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomEventResult], ResultWrapper[WaitingroomEventResult]), + cast_to=cast(Type[WaitingroomEvent], ResultWrapper[WaitingroomEvent]), ) async def list( @@ -925,7 +925,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomEventResult: + ) -> WaitingroomEvent: """ Patches a configured event for a waiting room. @@ -1018,7 +1018,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomEventResult], ResultWrapper[WaitingroomEventResult]), + cast_to=cast(Type[WaitingroomEvent], ResultWrapper[WaitingroomEvent]), ) async def get( @@ -1033,7 +1033,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomEventResult: + ) -> WaitingroomEvent: """ Fetches a single configured event for a waiting room. @@ -1063,7 +1063,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomEventResult], ResultWrapper[WaitingroomEventResult]), + cast_to=cast(Type[WaitingroomEvent], ResultWrapper[WaitingroomEvent]), ) diff --git a/src/cloudflare/resources/waiting_rooms/waiting_rooms.py b/src/cloudflare/resources/waiting_rooms/waiting_rooms.py index 213c648f1a2..ff2bb29295e 100644 --- a/src/cloudflare/resources/waiting_rooms/waiting_rooms.py +++ b/src/cloudflare/resources/waiting_rooms/waiting_rooms.py @@ -32,7 +32,7 @@ AsyncEventsWithStreamingResponse, ) from ...types import ( - WaitingroomWaitingroom, + WaitingRoom, WaitingRoomListResponse, WaitingRoomDeleteResponse, waiting_room_edit_params, @@ -153,7 +153,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomWaitingroom: + ) -> WaitingRoom: """ Creates a new waiting room. @@ -458,7 +458,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomWaitingroom], ResultWrapper[WaitingroomWaitingroom]), + cast_to=cast(Type[WaitingRoom], ResultWrapper[WaitingRoom]), ) def update( @@ -509,7 +509,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomWaitingroom: + ) -> WaitingRoom: """ Updates a configured waiting room. @@ -816,7 +816,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomWaitingroom], ResultWrapper[WaitingroomWaitingroom]), + cast_to=cast(Type[WaitingRoom], ResultWrapper[WaitingRoom]), ) def list( @@ -948,7 +948,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomWaitingroom: + ) -> WaitingRoom: """ Patches a configured waiting room. @@ -1255,7 +1255,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomWaitingroom], ResultWrapper[WaitingroomWaitingroom]), + cast_to=cast(Type[WaitingRoom], ResultWrapper[WaitingRoom]), ) def get( @@ -1269,7 +1269,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomWaitingroom: + ) -> WaitingRoom: """ Fetches a single configured waiting room. @@ -1297,7 +1297,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomWaitingroom], ResultWrapper[WaitingroomWaitingroom]), + cast_to=cast(Type[WaitingRoom], ResultWrapper[WaitingRoom]), ) @@ -1377,7 +1377,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomWaitingroom: + ) -> WaitingRoom: """ Creates a new waiting room. @@ -1682,7 +1682,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomWaitingroom], ResultWrapper[WaitingroomWaitingroom]), + cast_to=cast(Type[WaitingRoom], ResultWrapper[WaitingRoom]), ) async def update( @@ -1733,7 +1733,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomWaitingroom: + ) -> WaitingRoom: """ Updates a configured waiting room. @@ -2040,7 +2040,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomWaitingroom], ResultWrapper[WaitingroomWaitingroom]), + cast_to=cast(Type[WaitingRoom], ResultWrapper[WaitingRoom]), ) async def list( @@ -2172,7 +2172,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomWaitingroom: + ) -> WaitingRoom: """ Patches a configured waiting room. @@ -2479,7 +2479,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomWaitingroom], ResultWrapper[WaitingroomWaitingroom]), + cast_to=cast(Type[WaitingRoom], ResultWrapper[WaitingRoom]), ) async def get( @@ -2493,7 +2493,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WaitingroomWaitingroom: + ) -> WaitingRoom: """ Fetches a single configured waiting room. @@ -2521,7 +2521,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WaitingroomWaitingroom], ResultWrapper[WaitingroomWaitingroom]), + cast_to=cast(Type[WaitingRoom], ResultWrapper[WaitingRoom]), ) diff --git a/src/cloudflare/resources/web3/hostnames/hostnames.py b/src/cloudflare/resources/web3/hostnames/hostnames.py index b50b1398a70..9473bfe6c9d 100644 --- a/src/cloudflare/resources/web3/hostnames/hostnames.py +++ b/src/cloudflare/resources/web3/hostnames/hostnames.py @@ -23,7 +23,7 @@ from ...._wrappers import ResultWrapper from ....types.web3 import ( HostnameListResponse, - DwebConfigWeb3Hostname, + DistributedWebHostname, HostnameDeleteResponse, hostname_edit_params, hostname_create_params, @@ -70,7 +70,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigWeb3Hostname: + ) -> DistributedWebHostname: """ Create Web3 Hostname @@ -110,7 +110,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigWeb3Hostname], ResultWrapper[DwebConfigWeb3Hostname]), + cast_to=cast(Type[DistributedWebHostname], ResultWrapper[DistributedWebHostname]), ) def list( @@ -209,7 +209,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigWeb3Hostname: + ) -> DistributedWebHostname: """ Edit Web3 Hostname @@ -250,7 +250,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigWeb3Hostname], ResultWrapper[DwebConfigWeb3Hostname]), + cast_to=cast(Type[DistributedWebHostname], ResultWrapper[DistributedWebHostname]), ) def get( @@ -264,7 +264,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigWeb3Hostname: + ) -> DistributedWebHostname: """ Web3 Hostname Details @@ -294,7 +294,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigWeb3Hostname], ResultWrapper[DwebConfigWeb3Hostname]), + cast_to=cast(Type[DistributedWebHostname], ResultWrapper[DistributedWebHostname]), ) @@ -324,7 +324,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigWeb3Hostname: + ) -> DistributedWebHostname: """ Create Web3 Hostname @@ -364,7 +364,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigWeb3Hostname], ResultWrapper[DwebConfigWeb3Hostname]), + cast_to=cast(Type[DistributedWebHostname], ResultWrapper[DistributedWebHostname]), ) async def list( @@ -463,7 +463,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigWeb3Hostname: + ) -> DistributedWebHostname: """ Edit Web3 Hostname @@ -504,7 +504,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigWeb3Hostname], ResultWrapper[DwebConfigWeb3Hostname]), + cast_to=cast(Type[DistributedWebHostname], ResultWrapper[DistributedWebHostname]), ) async def get( @@ -518,7 +518,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigWeb3Hostname: + ) -> DistributedWebHostname: """ Web3 Hostname Details @@ -548,7 +548,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigWeb3Hostname], ResultWrapper[DwebConfigWeb3Hostname]), + cast_to=cast(Type[DistributedWebHostname], ResultWrapper[DistributedWebHostname]), ) diff --git a/src/cloudflare/resources/web3/hostnames/ipfs_universal_paths/content_lists/content_lists.py b/src/cloudflare/resources/web3/hostnames/ipfs_universal_paths/content_lists/content_lists.py index 4b7e437e1ae..c3119b5683d 100644 --- a/src/cloudflare/resources/web3/hostnames/ipfs_universal_paths/content_lists/content_lists.py +++ b/src/cloudflare/resources/web3/hostnames/ipfs_universal_paths/content_lists/content_lists.py @@ -32,8 +32,8 @@ from ......_base_client import ( make_request_options, ) -from ......types.web3.hostnames.ipfs_universal_paths import DwebConfigContentListDetails, content_list_update_params -from ......types.web3.hostnames.ipfs_universal_paths.content_lists import DwebConfigContentListEntryParam +from ......types.web3.hostnames.ipfs_universal_paths import DistributedWebConfigContentList, content_list_update_params +from ......types.web3.hostnames.ipfs_universal_paths.content_lists import DistributedWebConfigContentListEntryParam __all__ = ["ContentLists", "AsyncContentLists"] @@ -57,14 +57,14 @@ def update( *, zone_identifier: str, action: Literal["block"], - entries: Iterable[DwebConfigContentListEntryParam], + entries: Iterable[DistributedWebConfigContentListEntryParam], # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigContentListDetails: + ) -> DistributedWebConfigContentList: """ Update IPFS Universal Path Gateway Content List @@ -105,7 +105,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigContentListDetails], ResultWrapper[DwebConfigContentListDetails]), + cast_to=cast(Type[DistributedWebConfigContentList], ResultWrapper[DistributedWebConfigContentList]), ) def get( @@ -119,7 +119,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigContentListDetails: + ) -> DistributedWebConfigContentList: """ IPFS Universal Path Gateway Content List Details @@ -149,7 +149,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigContentListDetails], ResultWrapper[DwebConfigContentListDetails]), + cast_to=cast(Type[DistributedWebConfigContentList], ResultWrapper[DistributedWebConfigContentList]), ) @@ -172,14 +172,14 @@ async def update( *, zone_identifier: str, action: Literal["block"], - entries: Iterable[DwebConfigContentListEntryParam], + entries: Iterable[DistributedWebConfigContentListEntryParam], # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigContentListDetails: + ) -> DistributedWebConfigContentList: """ Update IPFS Universal Path Gateway Content List @@ -220,7 +220,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigContentListDetails], ResultWrapper[DwebConfigContentListDetails]), + cast_to=cast(Type[DistributedWebConfigContentList], ResultWrapper[DistributedWebConfigContentList]), ) async def get( @@ -234,7 +234,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigContentListDetails: + ) -> DistributedWebConfigContentList: """ IPFS Universal Path Gateway Content List Details @@ -264,7 +264,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigContentListDetails], ResultWrapper[DwebConfigContentListDetails]), + cast_to=cast(Type[DistributedWebConfigContentList], ResultWrapper[DistributedWebConfigContentList]), ) diff --git a/src/cloudflare/resources/web3/hostnames/ipfs_universal_paths/content_lists/entries.py b/src/cloudflare/resources/web3/hostnames/ipfs_universal_paths/content_lists/entries.py index 4c135417cc9..5c3b41f76dd 100644 --- a/src/cloudflare/resources/web3/hostnames/ipfs_universal_paths/content_lists/entries.py +++ b/src/cloudflare/resources/web3/hostnames/ipfs_universal_paths/content_lists/entries.py @@ -27,7 +27,7 @@ from ......types.web3.hostnames.ipfs_universal_paths.content_lists import ( EntryListResponse, EntryDeleteResponse, - DwebConfigContentListEntry, + DistributedWebConfigContentListEntry, entry_create_params, entry_update_params, ) @@ -58,7 +58,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigContentListEntry: + ) -> DistributedWebConfigContentListEntry: """ Create IPFS Universal Path Gateway Content List Entry @@ -102,7 +102,9 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigContentListEntry], ResultWrapper[DwebConfigContentListEntry]), + cast_to=cast( + Type[DistributedWebConfigContentListEntry], ResultWrapper[DistributedWebConfigContentListEntry] + ), ) def update( @@ -120,7 +122,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigContentListEntry: + ) -> DistributedWebConfigContentListEntry: """ Edit IPFS Universal Path Gateway Content List Entry @@ -170,7 +172,9 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigContentListEntry], ResultWrapper[DwebConfigContentListEntry]), + cast_to=cast( + Type[DistributedWebConfigContentListEntry], ResultWrapper[DistributedWebConfigContentListEntry] + ), ) def list( @@ -280,7 +284,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigContentListEntry: + ) -> DistributedWebConfigContentListEntry: """ IPFS Universal Path Gateway Content List Entry Details @@ -316,7 +320,9 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigContentListEntry], ResultWrapper[DwebConfigContentListEntry]), + cast_to=cast( + Type[DistributedWebConfigContentListEntry], ResultWrapper[DistributedWebConfigContentListEntry] + ), ) @@ -343,7 +349,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigContentListEntry: + ) -> DistributedWebConfigContentListEntry: """ Create IPFS Universal Path Gateway Content List Entry @@ -387,7 +393,9 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigContentListEntry], ResultWrapper[DwebConfigContentListEntry]), + cast_to=cast( + Type[DistributedWebConfigContentListEntry], ResultWrapper[DistributedWebConfigContentListEntry] + ), ) async def update( @@ -405,7 +413,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigContentListEntry: + ) -> DistributedWebConfigContentListEntry: """ Edit IPFS Universal Path Gateway Content List Entry @@ -455,7 +463,9 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigContentListEntry], ResultWrapper[DwebConfigContentListEntry]), + cast_to=cast( + Type[DistributedWebConfigContentListEntry], ResultWrapper[DistributedWebConfigContentListEntry] + ), ) async def list( @@ -565,7 +575,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> DwebConfigContentListEntry: + ) -> DistributedWebConfigContentListEntry: """ IPFS Universal Path Gateway Content List Entry Details @@ -601,7 +611,9 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[DwebConfigContentListEntry], ResultWrapper[DwebConfigContentListEntry]), + cast_to=cast( + Type[DistributedWebConfigContentListEntry], ResultWrapper[DistributedWebConfigContentListEntry] + ), ) diff --git a/src/cloudflare/resources/workers/filters.py b/src/cloudflare/resources/workers/filters.py index 07ea8ea8ee7..ab63f0f0627 100644 --- a/src/cloudflare/resources/workers/filters.py +++ b/src/cloudflare/resources/workers/filters.py @@ -24,7 +24,7 @@ make_request_options, ) from ...types.workers import ( - WorkersFilters, + WorkersFilter, FilterListResponse, FilterCreateResponse, FilterDeleteResponse, @@ -105,7 +105,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WorkersFilters: + ) -> WorkersFilter: """ Update Filter @@ -142,7 +142,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WorkersFilters], ResultWrapper[WorkersFilters]), + cast_to=cast(Type[WorkersFilter], ResultWrapper[WorkersFilter]), ) def list( @@ -299,7 +299,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WorkersFilters: + ) -> WorkersFilter: """ Update Filter @@ -336,7 +336,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WorkersFilters], ResultWrapper[WorkersFilters]), + cast_to=cast(Type[WorkersFilter], ResultWrapper[WorkersFilter]), ) async def list( diff --git a/src/cloudflare/resources/workers/routes.py b/src/cloudflare/resources/workers/routes.py index c54301e8b1a..3231926ebed 100644 --- a/src/cloudflare/resources/workers/routes.py +++ b/src/cloudflare/resources/workers/routes.py @@ -24,7 +24,7 @@ make_request_options, ) from ...types.workers import ( - WorkersRoutes, + WorkersRoute, RouteListResponse, RouteCreateResponse, RouteDeleteResponse, @@ -112,7 +112,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WorkersRoutes: + ) -> WorkersRoute: """ Updates the URL pattern or Worker associated with a route. @@ -151,7 +151,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WorkersRoutes], ResultWrapper[WorkersRoutes]), + cast_to=cast(Type[WorkersRoute], ResultWrapper[WorkersRoute]), ) def list( @@ -253,7 +253,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WorkersRoutes: + ) -> WorkersRoute: """ Returns information about a route, including URL pattern and Worker. @@ -283,7 +283,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WorkersRoutes], ResultWrapper[WorkersRoutes]), + cast_to=cast(Type[WorkersRoute], ResultWrapper[WorkersRoute]), ) @@ -364,7 +364,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WorkersRoutes: + ) -> WorkersRoute: """ Updates the URL pattern or Worker associated with a route. @@ -403,7 +403,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WorkersRoutes], ResultWrapper[WorkersRoutes]), + cast_to=cast(Type[WorkersRoute], ResultWrapper[WorkersRoute]), ) async def list( @@ -505,7 +505,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WorkersRoutes: + ) -> WorkersRoute: """ Returns information about a route, including URL pattern and Worker. @@ -535,7 +535,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WorkersRoutes], ResultWrapper[WorkersRoutes]), + cast_to=cast(Type[WorkersRoute], ResultWrapper[WorkersRoute]), ) diff --git a/src/cloudflare/resources/workers_for_platforms/dispatch/namespaces/scripts/scripts.py b/src/cloudflare/resources/workers_for_platforms/dispatch/namespaces/scripts/scripts.py index 085440bfc01..98e0600546d 100644 --- a/src/cloudflare/resources/workers_for_platforms/dispatch/namespaces/scripts/scripts.py +++ b/src/cloudflare/resources/workers_for_platforms/dispatch/namespaces/scripts/scripts.py @@ -50,7 +50,7 @@ ) from ......types.workers import WorkersScript from ......types.workers_for_platforms.dispatch.namespaces import ( - WorkersNamespaceScript, + WorkersForPlatformsNamespaceScript, script_delete_params, script_update_params, ) @@ -271,7 +271,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WorkersNamespaceScript: + ) -> WorkersForPlatformsNamespaceScript: """ Fetch information about a script uploaded to a Workers for Platforms namespace. @@ -305,7 +305,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WorkersNamespaceScript], ResultWrapper[WorkersNamespaceScript]), + cast_to=cast(Type[WorkersForPlatformsNamespaceScript], ResultWrapper[WorkersForPlatformsNamespaceScript]), ) @@ -522,7 +522,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> WorkersNamespaceScript: + ) -> WorkersForPlatformsNamespaceScript: """ Fetch information about a script uploaded to a Workers for Platforms namespace. @@ -556,7 +556,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[WorkersNamespaceScript], ResultWrapper[WorkersNamespaceScript]), + cast_to=cast(Type[WorkersForPlatformsNamespaceScript], ResultWrapper[WorkersForPlatformsNamespaceScript]), ) diff --git a/src/cloudflare/resources/zero_trust/access/applications/applications.py b/src/cloudflare/resources/zero_trust/access/applications/applications.py index c0cbaa87422..e2069c027d2 100644 --- a/src/cloudflare/resources/zero_trust/access/applications/applications.py +++ b/src/cloudflare/resources/zero_trust/access/applications/applications.py @@ -49,7 +49,7 @@ AsyncUserPolicyChecksWithStreamingResponse, ) from .....types.zero_trust.access import ( - AccessApps, + ZeroTrustApps, ApplicationListResponse, ApplicationDeleteResponse, application_create_params, @@ -114,7 +114,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -212,7 +212,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -284,7 +284,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -395,7 +395,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -488,7 +488,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -535,7 +535,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -582,7 +582,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -631,7 +631,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -697,7 +697,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: if not account_id: raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") if not zone_id: @@ -714,7 +714,7 @@ def create( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessApps, + ZeroTrustApps, self._post( f"/{account_or_zone}/{account_or_zone_id}/access/apps", body=maybe_transform( @@ -753,7 +753,7 @@ def create( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessApps] + Any, ResultWrapper[ZeroTrustApps] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -793,7 +793,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -894,7 +894,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -969,7 +969,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -1083,7 +1083,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -1179,7 +1179,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -1229,7 +1229,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -1279,7 +1279,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -1331,7 +1331,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -1400,7 +1400,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: if not account_id: raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") if not zone_id: @@ -1417,7 +1417,7 @@ def update( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessApps, + ZeroTrustApps, self._put( f"/{account_or_zone}/{account_or_zone_id}/access/apps/{app_id}", body=maybe_transform( @@ -1456,7 +1456,7 @@ def update( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessApps] + Any, ResultWrapper[ZeroTrustApps] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -1586,7 +1586,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Fetches information about an Access application. @@ -1621,7 +1621,7 @@ def get( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessApps, + ZeroTrustApps, self._get( f"/{account_or_zone}/{account_or_zone_id}/access/apps/{app_id}", options=make_request_options( @@ -1632,7 +1632,7 @@ def get( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessApps] + Any, ResultWrapper[ZeroTrustApps] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -1751,7 +1751,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -1849,7 +1849,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -1921,7 +1921,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -2032,7 +2032,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -2125,7 +2125,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -2172,7 +2172,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -2219,7 +2219,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -2268,7 +2268,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Adds a new application to Access. @@ -2334,7 +2334,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: if not account_id: raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") if not zone_id: @@ -2351,7 +2351,7 @@ async def create( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessApps, + ZeroTrustApps, await self._post( f"/{account_or_zone}/{account_or_zone_id}/access/apps", body=await async_maybe_transform( @@ -2390,7 +2390,7 @@ async def create( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessApps] + Any, ResultWrapper[ZeroTrustApps] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -2430,7 +2430,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -2531,7 +2531,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -2606,7 +2606,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -2720,7 +2720,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -2816,7 +2816,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -2866,7 +2866,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -2916,7 +2916,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -2968,7 +2968,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Updates an Access application. @@ -3037,7 +3037,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: if not account_id: raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") if not zone_id: @@ -3054,7 +3054,7 @@ async def update( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessApps, + ZeroTrustApps, await self._put( f"/{account_or_zone}/{account_or_zone_id}/access/apps/{app_id}", body=await async_maybe_transform( @@ -3093,7 +3093,7 @@ async def update( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessApps] + Any, ResultWrapper[ZeroTrustApps] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -3223,7 +3223,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessApps: + ) -> ZeroTrustApps: """ Fetches information about an Access application. @@ -3258,7 +3258,7 @@ async def get( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessApps, + ZeroTrustApps, await self._get( f"/{account_or_zone}/{account_or_zone_id}/access/apps/{app_id}", options=make_request_options( @@ -3269,7 +3269,7 @@ async def get( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessApps] + Any, ResultWrapper[ZeroTrustApps] ), # Union types cannot be passed in as arguments in the type system ), ) diff --git a/src/cloudflare/resources/zero_trust/access/applications/policies.py b/src/cloudflare/resources/zero_trust/access/applications/policies.py index 6f95bb14f44..1b96d6d8493 100644 --- a/src/cloudflare/resources/zero_trust/access/applications/policies.py +++ b/src/cloudflare/resources/zero_trust/access/applications/policies.py @@ -25,7 +25,7 @@ make_request_options, ) from .....types.zero_trust.access.applications import ( - AccessPolicies, + ZeroTrustPolicies, PolicyListResponse, PolicyDeleteResponse, policy_create_params, @@ -68,7 +68,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessPolicies: + ) -> ZeroTrustPolicies: """ Create a new Access policy for an application. @@ -162,7 +162,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessPolicies], ResultWrapper[AccessPolicies]), + cast_to=cast(Type[ZeroTrustPolicies], ResultWrapper[ZeroTrustPolicies]), ) def update( @@ -190,7 +190,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessPolicies: + ) -> ZeroTrustPolicies: """ Update a configured Access policy. @@ -288,7 +288,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessPolicies], ResultWrapper[AccessPolicies]), + cast_to=cast(Type[ZeroTrustPolicies], ResultWrapper[ZeroTrustPolicies]), ) def list( @@ -429,7 +429,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessPolicies: + ) -> ZeroTrustPolicies: """ Fetches a single Access policy. @@ -478,7 +478,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessPolicies], ResultWrapper[AccessPolicies]), + cast_to=cast(Type[ZeroTrustPolicies], ResultWrapper[ZeroTrustPolicies]), ) @@ -515,7 +515,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessPolicies: + ) -> ZeroTrustPolicies: """ Create a new Access policy for an application. @@ -609,7 +609,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessPolicies], ResultWrapper[AccessPolicies]), + cast_to=cast(Type[ZeroTrustPolicies], ResultWrapper[ZeroTrustPolicies]), ) async def update( @@ -637,7 +637,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessPolicies: + ) -> ZeroTrustPolicies: """ Update a configured Access policy. @@ -735,7 +735,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessPolicies], ResultWrapper[AccessPolicies]), + cast_to=cast(Type[ZeroTrustPolicies], ResultWrapper[ZeroTrustPolicies]), ) async def list( @@ -876,7 +876,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessPolicies: + ) -> ZeroTrustPolicies: """ Fetches a single Access policy. @@ -925,7 +925,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessPolicies], ResultWrapper[AccessPolicies]), + cast_to=cast(Type[ZeroTrustPolicies], ResultWrapper[ZeroTrustPolicies]), ) diff --git a/src/cloudflare/resources/zero_trust/access/bookmarks.py b/src/cloudflare/resources/zero_trust/access/bookmarks.py index fbb03946096..488fc78f779 100644 --- a/src/cloudflare/resources/zero_trust/access/bookmarks.py +++ b/src/cloudflare/resources/zero_trust/access/bookmarks.py @@ -19,7 +19,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zero_trust.access import AccessBookmarks, BookmarkListResponse, BookmarkDeleteResponse +from ....types.zero_trust.access import ZeroTrustBookmarks, BookmarkListResponse, BookmarkDeleteResponse __all__ = ["Bookmarks", "AsyncBookmarks"] @@ -44,7 +44,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessBookmarks: + ) -> ZeroTrustBookmarks: """ Create a new Bookmark application. @@ -72,7 +72,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessBookmarks], ResultWrapper[AccessBookmarks]), + cast_to=cast(Type[ZeroTrustBookmarks], ResultWrapper[ZeroTrustBookmarks]), ) def update( @@ -86,7 +86,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessBookmarks: + ) -> ZeroTrustBookmarks: """ Updates a configured Bookmark application. @@ -114,7 +114,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessBookmarks], ResultWrapper[AccessBookmarks]), + cast_to=cast(Type[ZeroTrustBookmarks], ResultWrapper[ZeroTrustBookmarks]), ) def list( @@ -207,7 +207,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessBookmarks: + ) -> ZeroTrustBookmarks: """ Fetches a single Bookmark application. @@ -235,7 +235,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessBookmarks], ResultWrapper[AccessBookmarks]), + cast_to=cast(Type[ZeroTrustBookmarks], ResultWrapper[ZeroTrustBookmarks]), ) @@ -259,7 +259,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessBookmarks: + ) -> ZeroTrustBookmarks: """ Create a new Bookmark application. @@ -287,7 +287,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessBookmarks], ResultWrapper[AccessBookmarks]), + cast_to=cast(Type[ZeroTrustBookmarks], ResultWrapper[ZeroTrustBookmarks]), ) async def update( @@ -301,7 +301,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessBookmarks: + ) -> ZeroTrustBookmarks: """ Updates a configured Bookmark application. @@ -329,7 +329,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessBookmarks], ResultWrapper[AccessBookmarks]), + cast_to=cast(Type[ZeroTrustBookmarks], ResultWrapper[ZeroTrustBookmarks]), ) async def list( @@ -422,7 +422,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessBookmarks: + ) -> ZeroTrustBookmarks: """ Fetches a single Bookmark application. @@ -450,7 +450,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessBookmarks], ResultWrapper[AccessBookmarks]), + cast_to=cast(Type[ZeroTrustBookmarks], ResultWrapper[ZeroTrustBookmarks]), ) diff --git a/src/cloudflare/resources/zero_trust/access/certificates/certificates.py b/src/cloudflare/resources/zero_trust/access/certificates/certificates.py index b230e139adc..c356a526d8f 100644 --- a/src/cloudflare/resources/zero_trust/access/certificates/certificates.py +++ b/src/cloudflare/resources/zero_trust/access/certificates/certificates.py @@ -32,7 +32,7 @@ make_request_options, ) from .....types.zero_trust.access import ( - AccessCertificates, + ZeroTrustCertificates, CertificateListResponse, CertificateDeleteResponse, certificate_create_params, @@ -69,7 +69,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCertificates: + ) -> ZeroTrustCertificates: """ Adds a new mTLS root certificate to Access. @@ -124,7 +124,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCertificates], ResultWrapper[AccessCertificates]), + cast_to=cast(Type[ZeroTrustCertificates], ResultWrapper[ZeroTrustCertificates]), ) def update( @@ -141,7 +141,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCertificates: + ) -> ZeroTrustCertificates: """ Updates a configured mTLS certificate. @@ -197,7 +197,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCertificates], ResultWrapper[AccessCertificates]), + cast_to=cast(Type[ZeroTrustCertificates], ResultWrapper[ZeroTrustCertificates]), ) def list( @@ -327,7 +327,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCertificates: + ) -> ZeroTrustCertificates: """ Fetches a single mTLS certificate. @@ -372,7 +372,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCertificates], ResultWrapper[AccessCertificates]), + cast_to=cast(Type[ZeroTrustCertificates], ResultWrapper[ZeroTrustCertificates]), ) @@ -403,7 +403,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCertificates: + ) -> ZeroTrustCertificates: """ Adds a new mTLS root certificate to Access. @@ -458,7 +458,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCertificates], ResultWrapper[AccessCertificates]), + cast_to=cast(Type[ZeroTrustCertificates], ResultWrapper[ZeroTrustCertificates]), ) async def update( @@ -475,7 +475,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCertificates: + ) -> ZeroTrustCertificates: """ Updates a configured mTLS certificate. @@ -531,7 +531,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCertificates], ResultWrapper[AccessCertificates]), + cast_to=cast(Type[ZeroTrustCertificates], ResultWrapper[ZeroTrustCertificates]), ) async def list( @@ -661,7 +661,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCertificates: + ) -> ZeroTrustCertificates: """ Fetches a single mTLS certificate. @@ -706,7 +706,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCertificates], ResultWrapper[AccessCertificates]), + cast_to=cast(Type[ZeroTrustCertificates], ResultWrapper[ZeroTrustCertificates]), ) diff --git a/src/cloudflare/resources/zero_trust/access/certificates/settings.py b/src/cloudflare/resources/zero_trust/access/certificates/settings.py index 0b63fa9cf6c..a526bed3ef1 100644 --- a/src/cloudflare/resources/zero_trust/access/certificates/settings.py +++ b/src/cloudflare/resources/zero_trust/access/certificates/settings.py @@ -25,8 +25,8 @@ ) from .....types.zero_trust.access.certificates import ( SettingGetResponse, - AccessSettingsParam, SettingUpdateResponse, + ZeroTrustSettingsParam, setting_update_params, ) @@ -45,7 +45,7 @@ def with_streaming_response(self) -> SettingsWithStreamingResponse: def update( self, *, - settings: Iterable[AccessSettingsParam], + settings: Iterable[ZeroTrustSettingsParam], account_id: str | NotGiven = NOT_GIVEN, zone_id: str | NotGiven = NOT_GIVEN, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. @@ -167,7 +167,7 @@ def with_streaming_response(self) -> AsyncSettingsWithStreamingResponse: async def update( self, *, - settings: Iterable[AccessSettingsParam], + settings: Iterable[ZeroTrustSettingsParam], account_id: str | NotGiven = NOT_GIVEN, zone_id: str | NotGiven = NOT_GIVEN, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. diff --git a/src/cloudflare/resources/zero_trust/access/custom_pages.py b/src/cloudflare/resources/zero_trust/access/custom_pages.py index c8a807c8d28..e5d50209dac 100644 --- a/src/cloudflare/resources/zero_trust/access/custom_pages.py +++ b/src/cloudflare/resources/zero_trust/access/custom_pages.py @@ -25,10 +25,10 @@ make_request_options, ) from ....types.zero_trust.access import ( - AccessCustomPage, + ZeroTrustCustomPage, CustomPageListResponse, CustomPageDeleteResponse, - AccessCustomPageWithoutHTML, + ZeroTrustCustomPageWithoutHTML, custom_page_create_params, custom_page_update_params, ) @@ -59,7 +59,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCustomPageWithoutHTML: + ) -> ZeroTrustCustomPageWithoutHTML: """ Create a custom page @@ -102,7 +102,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCustomPageWithoutHTML], ResultWrapper[AccessCustomPageWithoutHTML]), + cast_to=cast(Type[ZeroTrustCustomPageWithoutHTML], ResultWrapper[ZeroTrustCustomPageWithoutHTML]), ) def update( @@ -120,7 +120,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCustomPageWithoutHTML: + ) -> ZeroTrustCustomPageWithoutHTML: """ Update a custom page @@ -167,7 +167,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCustomPageWithoutHTML], ResultWrapper[AccessCustomPageWithoutHTML]), + cast_to=cast(Type[ZeroTrustCustomPageWithoutHTML], ResultWrapper[ZeroTrustCustomPageWithoutHTML]), ) def list( @@ -264,7 +264,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCustomPage: + ) -> ZeroTrustCustomPage: """ Fetches a custom page and also returns its HTML. @@ -294,7 +294,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCustomPage], ResultWrapper[AccessCustomPage]), + cast_to=cast(Type[ZeroTrustCustomPage], ResultWrapper[ZeroTrustCustomPage]), ) @@ -321,7 +321,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCustomPageWithoutHTML: + ) -> ZeroTrustCustomPageWithoutHTML: """ Create a custom page @@ -364,7 +364,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCustomPageWithoutHTML], ResultWrapper[AccessCustomPageWithoutHTML]), + cast_to=cast(Type[ZeroTrustCustomPageWithoutHTML], ResultWrapper[ZeroTrustCustomPageWithoutHTML]), ) async def update( @@ -382,7 +382,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCustomPageWithoutHTML: + ) -> ZeroTrustCustomPageWithoutHTML: """ Update a custom page @@ -429,7 +429,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCustomPageWithoutHTML], ResultWrapper[AccessCustomPageWithoutHTML]), + cast_to=cast(Type[ZeroTrustCustomPageWithoutHTML], ResultWrapper[ZeroTrustCustomPageWithoutHTML]), ) async def list( @@ -526,7 +526,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessCustomPage: + ) -> ZeroTrustCustomPage: """ Fetches a custom page and also returns its HTML. @@ -556,7 +556,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessCustomPage], ResultWrapper[AccessCustomPage]), + cast_to=cast(Type[ZeroTrustCustomPage], ResultWrapper[ZeroTrustCustomPage]), ) diff --git a/src/cloudflare/resources/zero_trust/access/groups.py b/src/cloudflare/resources/zero_trust/access/groups.py index a1665becab0..250aa7914f5 100644 --- a/src/cloudflare/resources/zero_trust/access/groups.py +++ b/src/cloudflare/resources/zero_trust/access/groups.py @@ -24,7 +24,7 @@ make_request_options, ) from ....types.zero_trust.access import ( - AccessGroups, + ZeroTrustGroups, GroupListResponse, GroupDeleteResponse, group_create_params, @@ -59,7 +59,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessGroups: + ) -> ZeroTrustGroups: """ Creates a new Access group. @@ -123,7 +123,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessGroups], ResultWrapper[AccessGroups]), + cast_to=cast(Type[ZeroTrustGroups], ResultWrapper[ZeroTrustGroups]), ) def update( @@ -143,7 +143,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessGroups: + ) -> ZeroTrustGroups: """ Updates a configured Access group. @@ -211,7 +211,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessGroups], ResultWrapper[AccessGroups]), + cast_to=cast(Type[ZeroTrustGroups], ResultWrapper[ZeroTrustGroups]), ) def list( @@ -341,7 +341,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessGroups: + ) -> ZeroTrustGroups: """ Fetches a single Access group. @@ -386,7 +386,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessGroups], ResultWrapper[AccessGroups]), + cast_to=cast(Type[ZeroTrustGroups], ResultWrapper[ZeroTrustGroups]), ) @@ -415,7 +415,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessGroups: + ) -> ZeroTrustGroups: """ Creates a new Access group. @@ -479,7 +479,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessGroups], ResultWrapper[AccessGroups]), + cast_to=cast(Type[ZeroTrustGroups], ResultWrapper[ZeroTrustGroups]), ) async def update( @@ -499,7 +499,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessGroups: + ) -> ZeroTrustGroups: """ Updates a configured Access group. @@ -567,7 +567,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessGroups], ResultWrapper[AccessGroups]), + cast_to=cast(Type[ZeroTrustGroups], ResultWrapper[ZeroTrustGroups]), ) async def list( @@ -697,7 +697,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessGroups: + ) -> ZeroTrustGroups: """ Fetches a single Access group. @@ -742,7 +742,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessGroups], ResultWrapper[AccessGroups]), + cast_to=cast(Type[ZeroTrustGroups], ResultWrapper[ZeroTrustGroups]), ) diff --git a/src/cloudflare/resources/zero_trust/access/service_tokens.py b/src/cloudflare/resources/zero_trust/access/service_tokens.py index 2cbc6169fed..f318849caa8 100644 --- a/src/cloudflare/resources/zero_trust/access/service_tokens.py +++ b/src/cloudflare/resources/zero_trust/access/service_tokens.py @@ -24,7 +24,7 @@ make_request_options, ) from ....types.zero_trust.access import ( - AccessServiceTokens, + ZeroTrustServiceTokens, ServiceTokenListResponse, ServiceTokenCreateResponse, ServiceTokenRotateResponse, @@ -131,7 +131,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessServiceTokens: + ) -> ZeroTrustServiceTokens: """ Updates a configured service token. @@ -189,7 +189,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessServiceTokens], ResultWrapper[AccessServiceTokens]), + cast_to=cast(Type[ZeroTrustServiceTokens], ResultWrapper[ZeroTrustServiceTokens]), ) def list( @@ -259,7 +259,7 @@ def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessServiceTokens: + ) -> ZeroTrustServiceTokens: """ Deletes a service token. @@ -304,7 +304,7 @@ def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessServiceTokens], ResultWrapper[AccessServiceTokens]), + cast_to=cast(Type[ZeroTrustServiceTokens], ResultWrapper[ZeroTrustServiceTokens]), ) def refresh( @@ -318,7 +318,7 @@ def refresh( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessServiceTokens: + ) -> ZeroTrustServiceTokens: """ Refreshes the expiration of a service token. @@ -348,7 +348,7 @@ def refresh( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessServiceTokens], ResultWrapper[AccessServiceTokens]), + cast_to=cast(Type[ZeroTrustServiceTokens], ResultWrapper[ZeroTrustServiceTokens]), ) def rotate( @@ -492,7 +492,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessServiceTokens: + ) -> ZeroTrustServiceTokens: """ Updates a configured service token. @@ -550,7 +550,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessServiceTokens], ResultWrapper[AccessServiceTokens]), + cast_to=cast(Type[ZeroTrustServiceTokens], ResultWrapper[ZeroTrustServiceTokens]), ) async def list( @@ -620,7 +620,7 @@ async def delete( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessServiceTokens: + ) -> ZeroTrustServiceTokens: """ Deletes a service token. @@ -665,7 +665,7 @@ async def delete( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessServiceTokens], ResultWrapper[AccessServiceTokens]), + cast_to=cast(Type[ZeroTrustServiceTokens], ResultWrapper[ZeroTrustServiceTokens]), ) async def refresh( @@ -679,7 +679,7 @@ async def refresh( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessServiceTokens: + ) -> ZeroTrustServiceTokens: """ Refreshes the expiration of a service token. @@ -709,7 +709,7 @@ async def refresh( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessServiceTokens], ResultWrapper[AccessServiceTokens]), + cast_to=cast(Type[ZeroTrustServiceTokens], ResultWrapper[ZeroTrustServiceTokens]), ) async def rotate( diff --git a/src/cloudflare/resources/zero_trust/access/tags.py b/src/cloudflare/resources/zero_trust/access/tags.py index 670925a4efc..57cd3bb4b25 100644 --- a/src/cloudflare/resources/zero_trust/access/tags.py +++ b/src/cloudflare/resources/zero_trust/access/tags.py @@ -24,7 +24,7 @@ make_request_options, ) from ....types.zero_trust.access import ( - AccessTag, + ZeroTrustTag, TagListResponse, TagDeleteResponse, tag_create_params, @@ -54,7 +54,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessTag: + ) -> ZeroTrustTag: """ Create a tag @@ -83,7 +83,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessTag], ResultWrapper[AccessTag]), + cast_to=cast(Type[ZeroTrustTag], ResultWrapper[ZeroTrustTag]), ) def update( @@ -98,7 +98,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessTag: + ) -> ZeroTrustTag: """ Update a tag @@ -131,7 +131,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessTag], ResultWrapper[AccessTag]), + cast_to=cast(Type[ZeroTrustTag], ResultWrapper[ZeroTrustTag]), ) def list( @@ -228,7 +228,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessTag: + ) -> ZeroTrustTag: """ Get a tag @@ -258,7 +258,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessTag], ResultWrapper[AccessTag]), + cast_to=cast(Type[ZeroTrustTag], ResultWrapper[ZeroTrustTag]), ) @@ -282,7 +282,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessTag: + ) -> ZeroTrustTag: """ Create a tag @@ -311,7 +311,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessTag], ResultWrapper[AccessTag]), + cast_to=cast(Type[ZeroTrustTag], ResultWrapper[ZeroTrustTag]), ) async def update( @@ -326,7 +326,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessTag: + ) -> ZeroTrustTag: """ Update a tag @@ -359,7 +359,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessTag], ResultWrapper[AccessTag]), + cast_to=cast(Type[ZeroTrustTag], ResultWrapper[ZeroTrustTag]), ) async def list( @@ -456,7 +456,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessTag: + ) -> ZeroTrustTag: """ Get a tag @@ -486,7 +486,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessTag], ResultWrapper[AccessTag]), + cast_to=cast(Type[ZeroTrustTag], ResultWrapper[ZeroTrustTag]), ) diff --git a/src/cloudflare/resources/zero_trust/access/users/last_seen_identity.py b/src/cloudflare/resources/zero_trust/access/users/last_seen_identity.py index 3934032e777..851f87f1182 100644 --- a/src/cloudflare/resources/zero_trust/access/users/last_seen_identity.py +++ b/src/cloudflare/resources/zero_trust/access/users/last_seen_identity.py @@ -19,7 +19,7 @@ from ....._base_client import ( make_request_options, ) -from .....types.zero_trust.access.users import AccessIdentity +from .....types.zero_trust.access.users import ZeroTrustIdentity __all__ = ["LastSeenIdentity", "AsyncLastSeenIdentity"] @@ -44,7 +44,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentity: + ) -> ZeroTrustIdentity: """ Get last seen identity for a single user. @@ -74,7 +74,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessIdentity], ResultWrapper[AccessIdentity]), + cast_to=cast(Type[ZeroTrustIdentity], ResultWrapper[ZeroTrustIdentity]), ) @@ -98,7 +98,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentity: + ) -> ZeroTrustIdentity: """ Get last seen identity for a single user. @@ -128,7 +128,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessIdentity], ResultWrapper[AccessIdentity]), + cast_to=cast(Type[ZeroTrustIdentity], ResultWrapper[ZeroTrustIdentity]), ) diff --git a/src/cloudflare/resources/zero_trust/devices/dex_tests.py b/src/cloudflare/resources/zero_trust/devices/dex_tests.py index 40d4c19999b..50735d5de84 100644 --- a/src/cloudflare/resources/zero_trust/devices/dex_tests.py +++ b/src/cloudflare/resources/zero_trust/devices/dex_tests.py @@ -24,9 +24,9 @@ make_request_options, ) from ....types.zero_trust.devices import ( + DEXTestSchemasHTTP, DEXTestListResponse, DEXTestDeleteResponse, - TeamsDevicesDeviceDEXTestSchemasHTTP, dex_test_create_params, dex_test_update_params, ) @@ -58,7 +58,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]: + ) -> Optional[DEXTestSchemasHTTP]: """ Create a DEX test. @@ -103,10 +103,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]], - ResultWrapper[TeamsDevicesDeviceDEXTestSchemasHTTP], - ), + cast_to=cast(Type[Optional[DEXTestSchemasHTTP]], ResultWrapper[DEXTestSchemasHTTP]), ) def update( @@ -125,7 +122,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]: + ) -> Optional[DEXTestSchemasHTTP]: """ Update a DEX test. @@ -174,10 +171,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]], - ResultWrapper[TeamsDevicesDeviceDEXTestSchemasHTTP], - ), + cast_to=cast(Type[Optional[DEXTestSchemasHTTP]], ResultWrapper[DEXTestSchemasHTTP]), ) def list( @@ -272,7 +266,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]: + ) -> Optional[DEXTestSchemasHTTP]: """ Fetch a single DEX test. @@ -300,10 +294,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]], - ResultWrapper[TeamsDevicesDeviceDEXTestSchemasHTTP], - ), + cast_to=cast(Type[Optional[DEXTestSchemasHTTP]], ResultWrapper[DEXTestSchemasHTTP]), ) @@ -331,7 +322,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]: + ) -> Optional[DEXTestSchemasHTTP]: """ Create a DEX test. @@ -376,10 +367,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]], - ResultWrapper[TeamsDevicesDeviceDEXTestSchemasHTTP], - ), + cast_to=cast(Type[Optional[DEXTestSchemasHTTP]], ResultWrapper[DEXTestSchemasHTTP]), ) async def update( @@ -398,7 +386,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]: + ) -> Optional[DEXTestSchemasHTTP]: """ Update a DEX test. @@ -447,10 +435,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]], - ResultWrapper[TeamsDevicesDeviceDEXTestSchemasHTTP], - ), + cast_to=cast(Type[Optional[DEXTestSchemasHTTP]], ResultWrapper[DEXTestSchemasHTTP]), ) async def list( @@ -545,7 +530,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]: + ) -> Optional[DEXTestSchemasHTTP]: """ Fetch a single DEX test. @@ -573,10 +558,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceDEXTestSchemasHTTP]], - ResultWrapper[TeamsDevicesDeviceDEXTestSchemasHTTP], - ), + cast_to=cast(Type[Optional[DEXTestSchemasHTTP]], ResultWrapper[DEXTestSchemasHTTP]), ) diff --git a/src/cloudflare/resources/zero_trust/devices/networks.py b/src/cloudflare/resources/zero_trust/devices/networks.py index a8f2a12f426..4666e1cd3ba 100644 --- a/src/cloudflare/resources/zero_trust/devices/networks.py +++ b/src/cloudflare/resources/zero_trust/devices/networks.py @@ -26,8 +26,8 @@ ) from ....types.zero_trust.devices import ( NetworkListResponse, + DeviceManagedNetworks, NetworkDeleteResponse, - TeamsDevicesDeviceManagedNetworks, network_create_params, network_update_params, ) @@ -57,7 +57,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceManagedNetworks]: + ) -> Optional[DeviceManagedNetworks]: """ Creates a new device managed network. @@ -96,9 +96,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceManagedNetworks]], ResultWrapper[TeamsDevicesDeviceManagedNetworks] - ), + cast_to=cast(Type[Optional[DeviceManagedNetworks]], ResultWrapper[DeviceManagedNetworks]), ) def update( @@ -115,7 +113,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceManagedNetworks]: + ) -> Optional[DeviceManagedNetworks]: """ Updates a configured device managed network. @@ -158,9 +156,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceManagedNetworks]], ResultWrapper[TeamsDevicesDeviceManagedNetworks] - ), + cast_to=cast(Type[Optional[DeviceManagedNetworks]], ResultWrapper[DeviceManagedNetworks]), ) def list( @@ -254,7 +250,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceManagedNetworks]: + ) -> Optional[DeviceManagedNetworks]: """ Fetches details for a single managed network. @@ -282,9 +278,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceManagedNetworks]], ResultWrapper[TeamsDevicesDeviceManagedNetworks] - ), + cast_to=cast(Type[Optional[DeviceManagedNetworks]], ResultWrapper[DeviceManagedNetworks]), ) @@ -310,7 +304,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceManagedNetworks]: + ) -> Optional[DeviceManagedNetworks]: """ Creates a new device managed network. @@ -349,9 +343,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceManagedNetworks]], ResultWrapper[TeamsDevicesDeviceManagedNetworks] - ), + cast_to=cast(Type[Optional[DeviceManagedNetworks]], ResultWrapper[DeviceManagedNetworks]), ) async def update( @@ -368,7 +360,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceManagedNetworks]: + ) -> Optional[DeviceManagedNetworks]: """ Updates a configured device managed network. @@ -411,9 +403,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceManagedNetworks]], ResultWrapper[TeamsDevicesDeviceManagedNetworks] - ), + cast_to=cast(Type[Optional[DeviceManagedNetworks]], ResultWrapper[DeviceManagedNetworks]), ) async def list( @@ -507,7 +497,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceManagedNetworks]: + ) -> Optional[DeviceManagedNetworks]: """ Fetches details for a single managed network. @@ -535,9 +525,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceManagedNetworks]], ResultWrapper[TeamsDevicesDeviceManagedNetworks] - ), + cast_to=cast(Type[Optional[DeviceManagedNetworks]], ResultWrapper[DeviceManagedNetworks]), ) diff --git a/src/cloudflare/resources/zero_trust/devices/policies/excludes.py b/src/cloudflare/resources/zero_trust/devices/policies/excludes.py index 7b66b83e1d3..cc9d47f8db6 100644 --- a/src/cloudflare/resources/zero_trust/devices/policies/excludes.py +++ b/src/cloudflare/resources/zero_trust/devices/policies/excludes.py @@ -27,7 +27,7 @@ ExcludeGetResponse, ExcludeListResponse, ExcludeUpdateResponse, - TeamsDevicesSplitTunnelParam, + DevicesSplitTunnelParam, exclude_update_params, ) @@ -47,7 +47,7 @@ def update( self, *, account_id: str, - body: Iterable[TeamsDevicesSplitTunnelParam], + body: Iterable[DevicesSplitTunnelParam], # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, @@ -176,7 +176,7 @@ async def update( self, *, account_id: str, - body: Iterable[TeamsDevicesSplitTunnelParam], + body: Iterable[DevicesSplitTunnelParam], # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, diff --git a/src/cloudflare/resources/zero_trust/devices/policies/fallback_domains.py b/src/cloudflare/resources/zero_trust/devices/policies/fallback_domains.py index b00314179e2..3984767e2d7 100644 --- a/src/cloudflare/resources/zero_trust/devices/policies/fallback_domains.py +++ b/src/cloudflare/resources/zero_trust/devices/policies/fallback_domains.py @@ -25,9 +25,9 @@ ) from .....types.zero_trust.devices.policies import ( FallbackDomainGetResponse, + DevicesFallbackDomainParam, FallbackDomainListResponse, FallbackDomainUpdateResponse, - TeamsDevicesFallbackDomainParam, fallback_domain_update_params, ) @@ -48,7 +48,7 @@ def update( policy_id: str, *, account_id: str, - body: Iterable[TeamsDevicesFallbackDomainParam], + body: Iterable[DevicesFallbackDomainParam], # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, @@ -188,7 +188,7 @@ async def update( policy_id: str, *, account_id: str, - body: Iterable[TeamsDevicesFallbackDomainParam], + body: Iterable[DevicesFallbackDomainParam], # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, diff --git a/src/cloudflare/resources/zero_trust/devices/policies/includes.py b/src/cloudflare/resources/zero_trust/devices/policies/includes.py index e9d565e140b..d04eaa8f338 100644 --- a/src/cloudflare/resources/zero_trust/devices/policies/includes.py +++ b/src/cloudflare/resources/zero_trust/devices/policies/includes.py @@ -27,7 +27,7 @@ IncludeGetResponse, IncludeListResponse, IncludeUpdateResponse, - TeamsDevicesSplitTunnelIncludeParam, + DevicesSplitTunnelIncludeParam, include_update_params, ) @@ -47,7 +47,7 @@ def update( self, *, account_id: str, - body: Iterable[TeamsDevicesSplitTunnelIncludeParam], + body: Iterable[DevicesSplitTunnelIncludeParam], # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, @@ -176,7 +176,7 @@ async def update( self, *, account_id: str, - body: Iterable[TeamsDevicesSplitTunnelIncludeParam], + body: Iterable[DevicesSplitTunnelIncludeParam], # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, diff --git a/src/cloudflare/resources/zero_trust/devices/policies/policies.py b/src/cloudflare/resources/zero_trust/devices/policies/policies.py index e1b1e2574a4..7a2ad9f251f 100644 --- a/src/cloudflare/resources/zero_trust/devices/policies/policies.py +++ b/src/cloudflare/resources/zero_trust/devices/policies/policies.py @@ -58,7 +58,7 @@ from .....types.zero_trust.devices import ( PolicyListResponse, PolicyDeleteResponse, - TeamsDevicesDeviceSettingsPolicy, + DevicesDeviceSettingsPolicy, policy_edit_params, policy_create_params, ) @@ -118,7 +118,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceSettingsPolicy]: + ) -> Optional[DevicesDeviceSettingsPolicy]: """ Creates a device settings profile to be applied to certain devices matching the criteria. @@ -205,9 +205,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceSettingsPolicy]], ResultWrapper[TeamsDevicesDeviceSettingsPolicy] - ), + cast_to=cast(Type[Optional[DevicesDeviceSettingsPolicy]], ResultWrapper[DevicesDeviceSettingsPolicy]), ) def list( @@ -316,7 +314,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceSettingsPolicy]: + ) -> Optional[DevicesDeviceSettingsPolicy]: """ Updates a configured device settings profile. @@ -396,9 +394,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceSettingsPolicy]], ResultWrapper[TeamsDevicesDeviceSettingsPolicy] - ), + cast_to=cast(Type[Optional[DevicesDeviceSettingsPolicy]], ResultWrapper[DevicesDeviceSettingsPolicy]), ) def get( @@ -412,7 +408,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceSettingsPolicy]: + ) -> Optional[DevicesDeviceSettingsPolicy]: """ Fetches a device settings profile by ID. @@ -440,9 +436,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceSettingsPolicy]], ResultWrapper[TeamsDevicesDeviceSettingsPolicy] - ), + cast_to=cast(Type[Optional[DevicesDeviceSettingsPolicy]], ResultWrapper[DevicesDeviceSettingsPolicy]), ) @@ -498,7 +492,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceSettingsPolicy]: + ) -> Optional[DevicesDeviceSettingsPolicy]: """ Creates a device settings profile to be applied to certain devices matching the criteria. @@ -585,9 +579,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceSettingsPolicy]], ResultWrapper[TeamsDevicesDeviceSettingsPolicy] - ), + cast_to=cast(Type[Optional[DevicesDeviceSettingsPolicy]], ResultWrapper[DevicesDeviceSettingsPolicy]), ) async def list( @@ -696,7 +688,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceSettingsPolicy]: + ) -> Optional[DevicesDeviceSettingsPolicy]: """ Updates a configured device settings profile. @@ -776,9 +768,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceSettingsPolicy]], ResultWrapper[TeamsDevicesDeviceSettingsPolicy] - ), + cast_to=cast(Type[Optional[DevicesDeviceSettingsPolicy]], ResultWrapper[DevicesDeviceSettingsPolicy]), ) async def get( @@ -792,7 +782,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDeviceSettingsPolicy]: + ) -> Optional[DevicesDeviceSettingsPolicy]: """ Fetches a device settings profile by ID. @@ -820,9 +810,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDeviceSettingsPolicy]], ResultWrapper[TeamsDevicesDeviceSettingsPolicy] - ), + cast_to=cast(Type[Optional[DevicesDeviceSettingsPolicy]], ResultWrapper[DevicesDeviceSettingsPolicy]), ) diff --git a/src/cloudflare/resources/zero_trust/devices/posture/integrations.py b/src/cloudflare/resources/zero_trust/devices/posture/integrations.py index 14694ffaf70..829193dfa63 100644 --- a/src/cloudflare/resources/zero_trust/devices/posture/integrations.py +++ b/src/cloudflare/resources/zero_trust/devices/posture/integrations.py @@ -26,8 +26,8 @@ ) from .....types.zero_trust.devices.posture import ( IntegrationListResponse, + DevicePostureIntegrations, IntegrationDeleteResponse, - TeamsDevicesDevicePostureIntegrations, integration_edit_params, integration_create_params, ) @@ -58,7 +58,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureIntegrations]: + ) -> Optional[DevicePostureIntegrations]: """ Create a new device posture integration. @@ -100,10 +100,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDevicePostureIntegrations]], - ResultWrapper[TeamsDevicesDevicePostureIntegrations], - ), + cast_to=cast(Type[Optional[DevicePostureIntegrations]], ResultWrapper[DevicePostureIntegrations]), ) def list( @@ -206,7 +203,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureIntegrations]: + ) -> Optional[DevicePostureIntegrations]: """ Updates a configured device posture integration. @@ -252,10 +249,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDevicePostureIntegrations]], - ResultWrapper[TeamsDevicesDevicePostureIntegrations], - ), + cast_to=cast(Type[Optional[DevicePostureIntegrations]], ResultWrapper[DevicePostureIntegrations]), ) def get( @@ -269,7 +263,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureIntegrations]: + ) -> Optional[DevicePostureIntegrations]: """ Fetches details for a single device posture integration. @@ -297,10 +291,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDevicePostureIntegrations]], - ResultWrapper[TeamsDevicesDevicePostureIntegrations], - ), + cast_to=cast(Type[Optional[DevicePostureIntegrations]], ResultWrapper[DevicePostureIntegrations]), ) @@ -327,7 +318,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureIntegrations]: + ) -> Optional[DevicePostureIntegrations]: """ Create a new device posture integration. @@ -369,10 +360,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDevicePostureIntegrations]], - ResultWrapper[TeamsDevicesDevicePostureIntegrations], - ), + cast_to=cast(Type[Optional[DevicePostureIntegrations]], ResultWrapper[DevicePostureIntegrations]), ) async def list( @@ -475,7 +463,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureIntegrations]: + ) -> Optional[DevicePostureIntegrations]: """ Updates a configured device posture integration. @@ -521,10 +509,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDevicePostureIntegrations]], - ResultWrapper[TeamsDevicesDevicePostureIntegrations], - ), + cast_to=cast(Type[Optional[DevicePostureIntegrations]], ResultWrapper[DevicePostureIntegrations]), ) async def get( @@ -538,7 +523,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureIntegrations]: + ) -> Optional[DevicePostureIntegrations]: """ Fetches details for a single device posture integration. @@ -566,10 +551,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesDevicePostureIntegrations]], - ResultWrapper[TeamsDevicesDevicePostureIntegrations], - ), + cast_to=cast(Type[Optional[DevicePostureIntegrations]], ResultWrapper[DevicePostureIntegrations]), ) diff --git a/src/cloudflare/resources/zero_trust/devices/posture/posture.py b/src/cloudflare/resources/zero_trust/devices/posture/posture.py index bc330745789..07d0f53e101 100644 --- a/src/cloudflare/resources/zero_trust/devices/posture/posture.py +++ b/src/cloudflare/resources/zero_trust/devices/posture/posture.py @@ -33,9 +33,9 @@ make_request_options, ) from .....types.zero_trust.devices import ( + DevicePostureRules, PostureListResponse, PostureDeleteResponse, - TeamsDevicesDevicePostureRules, posture_create_params, posture_update_params, ) @@ -93,7 +93,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureRules]: + ) -> Optional[DevicePostureRules]: """ Creates a new device posture rule. @@ -145,7 +145,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[TeamsDevicesDevicePostureRules]], ResultWrapper[TeamsDevicesDevicePostureRules]), + cast_to=cast(Type[Optional[DevicePostureRules]], ResultWrapper[DevicePostureRules]), ) def update( @@ -186,7 +186,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureRules]: + ) -> Optional[DevicePostureRules]: """ Updates a device posture rule. @@ -242,7 +242,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[TeamsDevicesDevicePostureRules]], ResultWrapper[TeamsDevicesDevicePostureRules]), + cast_to=cast(Type[Optional[DevicePostureRules]], ResultWrapper[DevicePostureRules]), ) def list( @@ -335,7 +335,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureRules]: + ) -> Optional[DevicePostureRules]: """ Fetches a single device posture rule. @@ -363,7 +363,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[TeamsDevicesDevicePostureRules]], ResultWrapper[TeamsDevicesDevicePostureRules]), + cast_to=cast(Type[Optional[DevicePostureRules]], ResultWrapper[DevicePostureRules]), ) @@ -417,7 +417,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureRules]: + ) -> Optional[DevicePostureRules]: """ Creates a new device posture rule. @@ -469,7 +469,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[TeamsDevicesDevicePostureRules]], ResultWrapper[TeamsDevicesDevicePostureRules]), + cast_to=cast(Type[Optional[DevicePostureRules]], ResultWrapper[DevicePostureRules]), ) async def update( @@ -510,7 +510,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureRules]: + ) -> Optional[DevicePostureRules]: """ Updates a device posture rule. @@ -566,7 +566,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[TeamsDevicesDevicePostureRules]], ResultWrapper[TeamsDevicesDevicePostureRules]), + cast_to=cast(Type[Optional[DevicePostureRules]], ResultWrapper[DevicePostureRules]), ) async def list( @@ -659,7 +659,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesDevicePostureRules]: + ) -> Optional[DevicePostureRules]: """ Fetches a single device posture rule. @@ -687,7 +687,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[TeamsDevicesDevicePostureRules]], ResultWrapper[TeamsDevicesDevicePostureRules]), + cast_to=cast(Type[Optional[DevicePostureRules]], ResultWrapper[DevicePostureRules]), ) diff --git a/src/cloudflare/resources/zero_trust/devices/settings.py b/src/cloudflare/resources/zero_trust/devices/settings.py index 1651f7a55dd..8fb8a01800d 100644 --- a/src/cloudflare/resources/zero_trust/devices/settings.py +++ b/src/cloudflare/resources/zero_trust/devices/settings.py @@ -23,7 +23,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zero_trust.devices import TeamsDevicesZeroTrustAccountDeviceSettings, setting_update_params +from ....types.zero_trust.devices import ZeroTrustAccountDeviceSettings, setting_update_params __all__ = ["Settings", "AsyncSettings"] @@ -51,7 +51,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesZeroTrustAccountDeviceSettings]: + ) -> Optional[ZeroTrustAccountDeviceSettings]: """ Updates the current device settings for a Zero Trust account. @@ -92,10 +92,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesZeroTrustAccountDeviceSettings]], - ResultWrapper[TeamsDevicesZeroTrustAccountDeviceSettings], - ), + cast_to=cast(Type[Optional[ZeroTrustAccountDeviceSettings]], ResultWrapper[ZeroTrustAccountDeviceSettings]), ) def list( @@ -108,7 +105,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesZeroTrustAccountDeviceSettings]: + ) -> Optional[ZeroTrustAccountDeviceSettings]: """ Describes the current device settings for a Zero Trust account. @@ -132,10 +129,7 @@ def list( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesZeroTrustAccountDeviceSettings]], - ResultWrapper[TeamsDevicesZeroTrustAccountDeviceSettings], - ), + cast_to=cast(Type[Optional[ZeroTrustAccountDeviceSettings]], ResultWrapper[ZeroTrustAccountDeviceSettings]), ) @@ -162,7 +156,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesZeroTrustAccountDeviceSettings]: + ) -> Optional[ZeroTrustAccountDeviceSettings]: """ Updates the current device settings for a Zero Trust account. @@ -203,10 +197,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesZeroTrustAccountDeviceSettings]], - ResultWrapper[TeamsDevicesZeroTrustAccountDeviceSettings], - ), + cast_to=cast(Type[Optional[ZeroTrustAccountDeviceSettings]], ResultWrapper[ZeroTrustAccountDeviceSettings]), ) async def list( @@ -219,7 +210,7 @@ async def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[TeamsDevicesZeroTrustAccountDeviceSettings]: + ) -> Optional[ZeroTrustAccountDeviceSettings]: """ Describes the current device settings for a Zero Trust account. @@ -243,10 +234,7 @@ async def list( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast( - Type[Optional[TeamsDevicesZeroTrustAccountDeviceSettings]], - ResultWrapper[TeamsDevicesZeroTrustAccountDeviceSettings], - ), + cast_to=cast(Type[Optional[ZeroTrustAccountDeviceSettings]], ResultWrapper[ZeroTrustAccountDeviceSettings]), ) diff --git a/src/cloudflare/resources/zero_trust/identity_providers.py b/src/cloudflare/resources/zero_trust/identity_providers.py index e8719f6a7a2..f24db0e102f 100644 --- a/src/cloudflare/resources/zero_trust/identity_providers.py +++ b/src/cloudflare/resources/zero_trust/identity_providers.py @@ -26,7 +26,7 @@ make_request_options, ) from ...types.zero_trust import ( - AccessIdentityProviders, + ZeroTrustIdentityProviders, IdentityProviderListResponse, IdentityProviderDeleteResponse, identity_provider_create_params, @@ -76,7 +76,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -139,7 +139,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -202,7 +202,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -265,7 +265,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -328,7 +328,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -391,7 +391,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -454,7 +454,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -517,7 +517,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -580,7 +580,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -643,7 +643,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -706,7 +706,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -769,7 +769,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -832,7 +832,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -895,7 +895,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -983,7 +983,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: if not account_id: raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") if not zone_id: @@ -1000,7 +1000,7 @@ def create( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessIdentityProviders, + ZeroTrustIdentityProviders, self._post( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers", body=maybe_transform( @@ -1020,7 +1020,7 @@ def create( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessIdentityProviders] + Any, ResultWrapper[ZeroTrustIdentityProviders] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -1057,7 +1057,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1123,7 +1123,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1189,7 +1189,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1255,7 +1255,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1321,7 +1321,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1387,7 +1387,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1453,7 +1453,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1519,7 +1519,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1585,7 +1585,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1651,7 +1651,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1717,7 +1717,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1783,7 +1783,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1849,7 +1849,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -1915,7 +1915,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -2006,7 +2006,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: if not uuid: raise ValueError(f"Expected a non-empty value for `uuid` but received {uuid!r}") if not account_id: @@ -2025,7 +2025,7 @@ def update( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessIdentityProviders, + ZeroTrustIdentityProviders, self._put( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", body=maybe_transform( @@ -2045,7 +2045,7 @@ def update( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessIdentityProviders] + Any, ResultWrapper[ZeroTrustIdentityProviders] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -2177,7 +2177,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Fetches a configured identity provider. @@ -2214,7 +2214,7 @@ def get( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessIdentityProviders, + ZeroTrustIdentityProviders, self._get( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", options=make_request_options( @@ -2225,7 +2225,7 @@ def get( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessIdentityProviders] + Any, ResultWrapper[ZeroTrustIdentityProviders] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -2271,7 +2271,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2334,7 +2334,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2397,7 +2397,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2460,7 +2460,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2523,7 +2523,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2586,7 +2586,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2649,7 +2649,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2712,7 +2712,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2775,7 +2775,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2838,7 +2838,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2901,7 +2901,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -2964,7 +2964,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -3027,7 +3027,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -3090,7 +3090,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Adds a new identity provider to Access. @@ -3178,7 +3178,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: if not account_id: raise ValueError(f"Expected a non-empty value for `account_id` but received {account_id!r}") if not zone_id: @@ -3195,7 +3195,7 @@ async def create( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessIdentityProviders, + ZeroTrustIdentityProviders, await self._post( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers", body=await async_maybe_transform( @@ -3215,7 +3215,7 @@ async def create( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessIdentityProviders] + Any, ResultWrapper[ZeroTrustIdentityProviders] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -3252,7 +3252,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3318,7 +3318,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3384,7 +3384,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3450,7 +3450,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3516,7 +3516,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3582,7 +3582,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3648,7 +3648,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3714,7 +3714,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3780,7 +3780,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3846,7 +3846,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3912,7 +3912,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -3978,7 +3978,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -4044,7 +4044,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -4110,7 +4110,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Updates a configured identity provider. @@ -4201,7 +4201,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: if not uuid: raise ValueError(f"Expected a non-empty value for `uuid` but received {uuid!r}") if not account_id: @@ -4220,7 +4220,7 @@ async def update( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessIdentityProviders, + ZeroTrustIdentityProviders, await self._put( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", body=await async_maybe_transform( @@ -4240,7 +4240,7 @@ async def update( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessIdentityProviders] + Any, ResultWrapper[ZeroTrustIdentityProviders] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -4372,7 +4372,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessIdentityProviders: + ) -> ZeroTrustIdentityProviders: """ Fetches a configured identity provider. @@ -4409,7 +4409,7 @@ async def get( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - AccessIdentityProviders, + ZeroTrustIdentityProviders, await self._get( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", options=make_request_options( @@ -4420,7 +4420,7 @@ async def get( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Any, ResultWrapper[AccessIdentityProviders] + Any, ResultWrapper[ZeroTrustIdentityProviders] ), # Union types cannot be passed in as arguments in the type system ), ) diff --git a/src/cloudflare/resources/zero_trust/organizations.py b/src/cloudflare/resources/zero_trust/organizations.py index 8c7c370ca26..97ed2e833a3 100644 --- a/src/cloudflare/resources/zero_trust/organizations.py +++ b/src/cloudflare/resources/zero_trust/organizations.py @@ -24,7 +24,7 @@ make_request_options, ) from ...types.zero_trust import ( - AccessOrganizations, + ZeroTrustOrganizations, OrganizationRevokeUsersResponse, organization_create_params, organization_update_params, @@ -64,7 +64,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessOrganizations: + ) -> ZeroTrustOrganizations: """ Sets up a Zero Trust organization for your account or zone. @@ -147,7 +147,7 @@ def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessOrganizations], ResultWrapper[AccessOrganizations]), + cast_to=cast(Type[ZeroTrustOrganizations], ResultWrapper[ZeroTrustOrganizations]), ) def update( @@ -172,7 +172,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessOrganizations: + ) -> ZeroTrustOrganizations: """ Updates the configuration for your Zero Trust organization. @@ -256,7 +256,7 @@ def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessOrganizations], ResultWrapper[AccessOrganizations]), + cast_to=cast(Type[ZeroTrustOrganizations], ResultWrapper[ZeroTrustOrganizations]), ) def list( @@ -270,7 +270,7 @@ def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessOrganizations: + ) -> ZeroTrustOrganizations: """ Returns the configuration for your Zero Trust organization. @@ -311,7 +311,7 @@ def list( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessOrganizations], ResultWrapper[AccessOrganizations]), + cast_to=cast(Type[ZeroTrustOrganizations], ResultWrapper[ZeroTrustOrganizations]), ) def revoke_users( @@ -406,7 +406,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessOrganizations: + ) -> ZeroTrustOrganizations: """ Sets up a Zero Trust organization for your account or zone. @@ -489,7 +489,7 @@ async def create( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessOrganizations], ResultWrapper[AccessOrganizations]), + cast_to=cast(Type[ZeroTrustOrganizations], ResultWrapper[ZeroTrustOrganizations]), ) async def update( @@ -514,7 +514,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessOrganizations: + ) -> ZeroTrustOrganizations: """ Updates the configuration for your Zero Trust organization. @@ -598,7 +598,7 @@ async def update( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessOrganizations], ResultWrapper[AccessOrganizations]), + cast_to=cast(Type[ZeroTrustOrganizations], ResultWrapper[ZeroTrustOrganizations]), ) async def list( @@ -612,7 +612,7 @@ async def list( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> AccessOrganizations: + ) -> ZeroTrustOrganizations: """ Returns the configuration for your Zero Trust organization. @@ -653,7 +653,7 @@ async def list( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[AccessOrganizations], ResultWrapper[AccessOrganizations]), + cast_to=cast(Type[ZeroTrustOrganizations], ResultWrapper[ZeroTrustOrganizations]), ) async def revoke_users( diff --git a/src/cloudflare/resources/zones/settings/advanced_ddos.py b/src/cloudflare/resources/zones/settings/advanced_ddos.py index 49b34129d39..132ee89a02b 100644 --- a/src/cloudflare/resources/zones/settings/advanced_ddos.py +++ b/src/cloudflare/resources/zones/settings/advanced_ddos.py @@ -19,7 +19,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesAdvancedDDOS +from ....types.zones.settings import ZoneSettingAdvancedDDOS __all__ = ["AdvancedDDOS", "AsyncAdvancedDDOS"] @@ -43,7 +43,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAdvancedDDOS]: + ) -> Optional[ZoneSettingAdvancedDDOS]: """ Advanced protection from Distributed Denial of Service (DDoS) attacks on your website. This is an uneditable value that is 'on' in the case of Business and @@ -71,7 +71,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAdvancedDDOS]], ResultWrapper[ZonesAdvancedDDOS]), + cast_to=cast(Type[Optional[ZoneSettingAdvancedDDOS]], ResultWrapper[ZoneSettingAdvancedDDOS]), ) @@ -94,7 +94,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAdvancedDDOS]: + ) -> Optional[ZoneSettingAdvancedDDOS]: """ Advanced protection from Distributed Denial of Service (DDoS) attacks on your website. This is an uneditable value that is 'on' in the case of Business and @@ -122,7 +122,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAdvancedDDOS]], ResultWrapper[ZonesAdvancedDDOS]), + cast_to=cast(Type[Optional[ZoneSettingAdvancedDDOS]], ResultWrapper[ZoneSettingAdvancedDDOS]), ) diff --git a/src/cloudflare/resources/zones/settings/always_online.py b/src/cloudflare/resources/zones/settings/always_online.py index 858a3f969f7..83205d34902 100644 --- a/src/cloudflare/resources/zones/settings/always_online.py +++ b/src/cloudflare/resources/zones/settings/always_online.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesAlwaysOnline, always_online_edit_params +from ....types.zones.settings import ZoneSettingAlwaysOnline, always_online_edit_params __all__ = ["AlwaysOnline", "AsyncAlwaysOnline"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAlwaysOnline]: + ) -> Optional[ZoneSettingAlwaysOnline]: """ When enabled, Cloudflare serves limited copies of web pages available from the [Internet Archive's Wayback Machine](https://archive.org/web/) if your server is @@ -82,7 +82,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAlwaysOnline]], ResultWrapper[ZonesAlwaysOnline]), + cast_to=cast(Type[Optional[ZoneSettingAlwaysOnline]], ResultWrapper[ZoneSettingAlwaysOnline]), ) def get( @@ -95,7 +95,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAlwaysOnline]: + ) -> Optional[ZoneSettingAlwaysOnline]: """ When enabled, Cloudflare serves limited copies of web pages available from the [Internet Archive's Wayback Machine](https://archive.org/web/) if your server is @@ -125,7 +125,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAlwaysOnline]], ResultWrapper[ZonesAlwaysOnline]), + cast_to=cast(Type[Optional[ZoneSettingAlwaysOnline]], ResultWrapper[ZoneSettingAlwaysOnline]), ) @@ -149,7 +149,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAlwaysOnline]: + ) -> Optional[ZoneSettingAlwaysOnline]: """ When enabled, Cloudflare serves limited copies of web pages available from the [Internet Archive's Wayback Machine](https://archive.org/web/) if your server is @@ -182,7 +182,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAlwaysOnline]], ResultWrapper[ZonesAlwaysOnline]), + cast_to=cast(Type[Optional[ZoneSettingAlwaysOnline]], ResultWrapper[ZoneSettingAlwaysOnline]), ) async def get( @@ -195,7 +195,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAlwaysOnline]: + ) -> Optional[ZoneSettingAlwaysOnline]: """ When enabled, Cloudflare serves limited copies of web pages available from the [Internet Archive's Wayback Machine](https://archive.org/web/) if your server is @@ -225,7 +225,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAlwaysOnline]], ResultWrapper[ZonesAlwaysOnline]), + cast_to=cast(Type[Optional[ZoneSettingAlwaysOnline]], ResultWrapper[ZoneSettingAlwaysOnline]), ) diff --git a/src/cloudflare/resources/zones/settings/always_use_https.py b/src/cloudflare/resources/zones/settings/always_use_https.py index 15a89b7c7d2..e0f3523f82d 100644 --- a/src/cloudflare/resources/zones/settings/always_use_https.py +++ b/src/cloudflare/resources/zones/settings/always_use_https.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesAlwaysUseHTTPS, always_use_https_edit_params +from ....types.zones.settings import ZoneSettingAlwaysUseHTTPS, always_use_https_edit_params __all__ = ["AlwaysUseHTTPS", "AsyncAlwaysUseHTTPS"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAlwaysUseHTTPS]: + ) -> Optional[ZoneSettingAlwaysUseHTTPS]: """ Reply to all requests for URLs that use "http" with a 301 redirect to the equivalent "https" URL. If you only want to redirect for a subset of requests, @@ -80,7 +80,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAlwaysUseHTTPS]], ResultWrapper[ZonesAlwaysUseHTTPS]), + cast_to=cast(Type[Optional[ZoneSettingAlwaysUseHTTPS]], ResultWrapper[ZoneSettingAlwaysUseHTTPS]), ) def get( @@ -93,7 +93,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAlwaysUseHTTPS]: + ) -> Optional[ZoneSettingAlwaysUseHTTPS]: """ Reply to all requests for URLs that use "http" with a 301 redirect to the equivalent "https" URL. If you only want to redirect for a subset of requests, @@ -121,7 +121,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAlwaysUseHTTPS]], ResultWrapper[ZonesAlwaysUseHTTPS]), + cast_to=cast(Type[Optional[ZoneSettingAlwaysUseHTTPS]], ResultWrapper[ZoneSettingAlwaysUseHTTPS]), ) @@ -145,7 +145,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAlwaysUseHTTPS]: + ) -> Optional[ZoneSettingAlwaysUseHTTPS]: """ Reply to all requests for URLs that use "http" with a 301 redirect to the equivalent "https" URL. If you only want to redirect for a subset of requests, @@ -176,7 +176,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAlwaysUseHTTPS]], ResultWrapper[ZonesAlwaysUseHTTPS]), + cast_to=cast(Type[Optional[ZoneSettingAlwaysUseHTTPS]], ResultWrapper[ZoneSettingAlwaysUseHTTPS]), ) async def get( @@ -189,7 +189,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAlwaysUseHTTPS]: + ) -> Optional[ZoneSettingAlwaysUseHTTPS]: """ Reply to all requests for URLs that use "http" with a 301 redirect to the equivalent "https" URL. If you only want to redirect for a subset of requests, @@ -217,7 +217,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAlwaysUseHTTPS]], ResultWrapper[ZonesAlwaysUseHTTPS]), + cast_to=cast(Type[Optional[ZoneSettingAlwaysUseHTTPS]], ResultWrapper[ZoneSettingAlwaysUseHTTPS]), ) diff --git a/src/cloudflare/resources/zones/settings/automatic_https_rewrites.py b/src/cloudflare/resources/zones/settings/automatic_https_rewrites.py index dddc5bf4b01..2950a699243 100644 --- a/src/cloudflare/resources/zones/settings/automatic_https_rewrites.py +++ b/src/cloudflare/resources/zones/settings/automatic_https_rewrites.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesAutomaticHTTPSRewrites, automatic_https_rewrite_edit_params +from ....types.zones.settings import ZoneSettingAutomaticHTTPSRewrites, automatic_https_rewrite_edit_params __all__ = ["AutomaticHTTPSRewrites", "AsyncAutomaticHTTPSRewrites"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAutomaticHTTPSRewrites]: + ) -> Optional[ZoneSettingAutomaticHTTPSRewrites]: """ Enable the Automatic HTTPS Rewrites feature for this zone. @@ -79,7 +79,9 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAutomaticHTTPSRewrites]], ResultWrapper[ZonesAutomaticHTTPSRewrites]), + cast_to=cast( + Type[Optional[ZoneSettingAutomaticHTTPSRewrites]], ResultWrapper[ZoneSettingAutomaticHTTPSRewrites] + ), ) def get( @@ -92,7 +94,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAutomaticHTTPSRewrites]: + ) -> Optional[ZoneSettingAutomaticHTTPSRewrites]: """ Enable the Automatic HTTPS Rewrites feature for this zone. @@ -118,7 +120,9 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAutomaticHTTPSRewrites]], ResultWrapper[ZonesAutomaticHTTPSRewrites]), + cast_to=cast( + Type[Optional[ZoneSettingAutomaticHTTPSRewrites]], ResultWrapper[ZoneSettingAutomaticHTTPSRewrites] + ), ) @@ -142,7 +146,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAutomaticHTTPSRewrites]: + ) -> Optional[ZoneSettingAutomaticHTTPSRewrites]: """ Enable the Automatic HTTPS Rewrites feature for this zone. @@ -174,7 +178,9 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAutomaticHTTPSRewrites]], ResultWrapper[ZonesAutomaticHTTPSRewrites]), + cast_to=cast( + Type[Optional[ZoneSettingAutomaticHTTPSRewrites]], ResultWrapper[ZoneSettingAutomaticHTTPSRewrites] + ), ) async def get( @@ -187,7 +193,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAutomaticHTTPSRewrites]: + ) -> Optional[ZoneSettingAutomaticHTTPSRewrites]: """ Enable the Automatic HTTPS Rewrites feature for this zone. @@ -213,7 +219,9 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesAutomaticHTTPSRewrites]], ResultWrapper[ZonesAutomaticHTTPSRewrites]), + cast_to=cast( + Type[Optional[ZoneSettingAutomaticHTTPSRewrites]], ResultWrapper[ZoneSettingAutomaticHTTPSRewrites] + ), ) diff --git a/src/cloudflare/resources/zones/settings/automatic_platform_optimization.py b/src/cloudflare/resources/zones/settings/automatic_platform_optimization.py index 7beb3a942ea..c8f97509389 100644 --- a/src/cloudflare/resources/zones/settings/automatic_platform_optimization.py +++ b/src/cloudflare/resources/zones/settings/automatic_platform_optimization.py @@ -24,8 +24,8 @@ make_request_options, ) from ....types.zones.settings import ( - ZonesAutomaticPlatformOptimization, - ZonesAutomaticPlatformOptimizationParam, + ZoneSettingAutomaticPlatformOptimization, + ZoneSettingAutomaticPlatformOptimizationParam, automatic_platform_optimization_edit_params, ) @@ -45,14 +45,14 @@ def edit( self, *, zone_id: str, - value: ZonesAutomaticPlatformOptimizationParam, + value: ZoneSettingAutomaticPlatformOptimizationParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAutomaticPlatformOptimization]: + ) -> Optional[ZoneSettingAutomaticPlatformOptimization]: """ [Automatic Platform Optimization for WordPress](https://developers.cloudflare.com/automatic-platform-optimization/) serves your WordPress site from Cloudflare's edge network and caches third-party @@ -84,7 +84,8 @@ def edit( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Type[Optional[ZonesAutomaticPlatformOptimization]], ResultWrapper[ZonesAutomaticPlatformOptimization] + Type[Optional[ZoneSettingAutomaticPlatformOptimization]], + ResultWrapper[ZoneSettingAutomaticPlatformOptimization], ), ) @@ -98,7 +99,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAutomaticPlatformOptimization]: + ) -> Optional[ZoneSettingAutomaticPlatformOptimization]: """ [Automatic Platform Optimization for WordPress](https://developers.cloudflare.com/automatic-platform-optimization/) serves your WordPress site from Cloudflare's edge network and caches third-party @@ -127,7 +128,8 @@ def get( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Type[Optional[ZonesAutomaticPlatformOptimization]], ResultWrapper[ZonesAutomaticPlatformOptimization] + Type[Optional[ZoneSettingAutomaticPlatformOptimization]], + ResultWrapper[ZoneSettingAutomaticPlatformOptimization], ), ) @@ -145,14 +147,14 @@ async def edit( self, *, zone_id: str, - value: ZonesAutomaticPlatformOptimizationParam, + value: ZoneSettingAutomaticPlatformOptimizationParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAutomaticPlatformOptimization]: + ) -> Optional[ZoneSettingAutomaticPlatformOptimization]: """ [Automatic Platform Optimization for WordPress](https://developers.cloudflare.com/automatic-platform-optimization/) serves your WordPress site from Cloudflare's edge network and caches third-party @@ -184,7 +186,8 @@ async def edit( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Type[Optional[ZonesAutomaticPlatformOptimization]], ResultWrapper[ZonesAutomaticPlatformOptimization] + Type[Optional[ZoneSettingAutomaticPlatformOptimization]], + ResultWrapper[ZoneSettingAutomaticPlatformOptimization], ), ) @@ -198,7 +201,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesAutomaticPlatformOptimization]: + ) -> Optional[ZoneSettingAutomaticPlatformOptimization]: """ [Automatic Platform Optimization for WordPress](https://developers.cloudflare.com/automatic-platform-optimization/) serves your WordPress site from Cloudflare's edge network and caches third-party @@ -227,7 +230,8 @@ async def get( post_parser=ResultWrapper._unwrapper, ), cast_to=cast( - Type[Optional[ZonesAutomaticPlatformOptimization]], ResultWrapper[ZonesAutomaticPlatformOptimization] + Type[Optional[ZoneSettingAutomaticPlatformOptimization]], + ResultWrapper[ZoneSettingAutomaticPlatformOptimization], ), ) diff --git a/src/cloudflare/resources/zones/settings/brotli.py b/src/cloudflare/resources/zones/settings/brotli.py index fc2680af244..3c9d6bb215e 100644 --- a/src/cloudflare/resources/zones/settings/brotli.py +++ b/src/cloudflare/resources/zones/settings/brotli.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesBrotli, brotli_edit_params +from ....types.zones.settings import ZoneSettingBrotli, brotli_edit_params __all__ = ["Brotli", "AsyncBrotli"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrotli]: + ) -> Optional[ZoneSettingBrotli]: """ When the client requesting an asset supports the Brotli compression algorithm, Cloudflare will serve a Brotli compressed version of the asset. @@ -79,7 +79,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrotli]], ResultWrapper[ZonesBrotli]), + cast_to=cast(Type[Optional[ZoneSettingBrotli]], ResultWrapper[ZoneSettingBrotli]), ) def get( @@ -92,7 +92,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrotli]: + ) -> Optional[ZoneSettingBrotli]: """ When the client requesting an asset supports the Brotli compression algorithm, Cloudflare will serve a Brotli compressed version of the asset. @@ -119,7 +119,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrotli]], ResultWrapper[ZonesBrotli]), + cast_to=cast(Type[Optional[ZoneSettingBrotli]], ResultWrapper[ZoneSettingBrotli]), ) @@ -143,7 +143,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrotli]: + ) -> Optional[ZoneSettingBrotli]: """ When the client requesting an asset supports the Brotli compression algorithm, Cloudflare will serve a Brotli compressed version of the asset. @@ -173,7 +173,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrotli]], ResultWrapper[ZonesBrotli]), + cast_to=cast(Type[Optional[ZoneSettingBrotli]], ResultWrapper[ZoneSettingBrotli]), ) async def get( @@ -186,7 +186,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrotli]: + ) -> Optional[ZoneSettingBrotli]: """ When the client requesting an asset supports the Brotli compression algorithm, Cloudflare will serve a Brotli compressed version of the asset. @@ -213,7 +213,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrotli]], ResultWrapper[ZonesBrotli]), + cast_to=cast(Type[Optional[ZoneSettingBrotli]], ResultWrapper[ZoneSettingBrotli]), ) diff --git a/src/cloudflare/resources/zones/settings/browser_cache_ttl.py b/src/cloudflare/resources/zones/settings/browser_cache_ttl.py index 80720154239..ffa3a59e1b2 100644 --- a/src/cloudflare/resources/zones/settings/browser_cache_ttl.py +++ b/src/cloudflare/resources/zones/settings/browser_cache_ttl.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesBrowserCacheTTL, browser_cache_ttl_edit_params +from ....types.zones.settings import ZoneSettingBrowserCacheTTL, browser_cache_ttl_edit_params __all__ = ["BrowserCacheTTL", "AsyncBrowserCacheTTL"] @@ -78,7 +78,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrowserCacheTTL]: + ) -> Optional[ZoneSettingBrowserCacheTTL]: """ Browser Cache TTL (in seconds) specifies how long Cloudflare-cached resources will remain on your visitors' computers. Cloudflare will honor any larger times @@ -111,7 +111,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrowserCacheTTL]], ResultWrapper[ZonesBrowserCacheTTL]), + cast_to=cast(Type[Optional[ZoneSettingBrowserCacheTTL]], ResultWrapper[ZoneSettingBrowserCacheTTL]), ) def get( @@ -124,7 +124,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrowserCacheTTL]: + ) -> Optional[ZoneSettingBrowserCacheTTL]: """ Browser Cache TTL (in seconds) specifies how long Cloudflare-cached resources will remain on your visitors' computers. Cloudflare will honor any larger times @@ -153,7 +153,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrowserCacheTTL]], ResultWrapper[ZonesBrowserCacheTTL]), + cast_to=cast(Type[Optional[ZoneSettingBrowserCacheTTL]], ResultWrapper[ZoneSettingBrowserCacheTTL]), ) @@ -206,7 +206,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrowserCacheTTL]: + ) -> Optional[ZoneSettingBrowserCacheTTL]: """ Browser Cache TTL (in seconds) specifies how long Cloudflare-cached resources will remain on your visitors' computers. Cloudflare will honor any larger times @@ -239,7 +239,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrowserCacheTTL]], ResultWrapper[ZonesBrowserCacheTTL]), + cast_to=cast(Type[Optional[ZoneSettingBrowserCacheTTL]], ResultWrapper[ZoneSettingBrowserCacheTTL]), ) async def get( @@ -252,7 +252,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrowserCacheTTL]: + ) -> Optional[ZoneSettingBrowserCacheTTL]: """ Browser Cache TTL (in seconds) specifies how long Cloudflare-cached resources will remain on your visitors' computers. Cloudflare will honor any larger times @@ -281,7 +281,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrowserCacheTTL]], ResultWrapper[ZonesBrowserCacheTTL]), + cast_to=cast(Type[Optional[ZoneSettingBrowserCacheTTL]], ResultWrapper[ZoneSettingBrowserCacheTTL]), ) diff --git a/src/cloudflare/resources/zones/settings/browser_check.py b/src/cloudflare/resources/zones/settings/browser_check.py index e14711a6a70..ab4b6e9e7ec 100644 --- a/src/cloudflare/resources/zones/settings/browser_check.py +++ b/src/cloudflare/resources/zones/settings/browser_check.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesBrowserCheck, browser_check_edit_params +from ....types.zones.settings import ZoneSettingBrowserCheck, browser_check_edit_params __all__ = ["BrowserCheck", "AsyncBrowserCheck"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrowserCheck]: + ) -> Optional[ZoneSettingBrowserCheck]: """ Browser Integrity Check is similar to Bad Behavior and looks for common HTTP headers abused most commonly by spammers and denies access to your page. It will @@ -82,7 +82,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrowserCheck]], ResultWrapper[ZonesBrowserCheck]), + cast_to=cast(Type[Optional[ZoneSettingBrowserCheck]], ResultWrapper[ZoneSettingBrowserCheck]), ) def get( @@ -95,7 +95,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrowserCheck]: + ) -> Optional[ZoneSettingBrowserCheck]: """ Browser Integrity Check is similar to Bad Behavior and looks for common HTTP headers abused most commonly by spammers and denies access to your page. It will @@ -125,7 +125,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrowserCheck]], ResultWrapper[ZonesBrowserCheck]), + cast_to=cast(Type[Optional[ZoneSettingBrowserCheck]], ResultWrapper[ZoneSettingBrowserCheck]), ) @@ -149,7 +149,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrowserCheck]: + ) -> Optional[ZoneSettingBrowserCheck]: """ Browser Integrity Check is similar to Bad Behavior and looks for common HTTP headers abused most commonly by spammers and denies access to your page. It will @@ -182,7 +182,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrowserCheck]], ResultWrapper[ZonesBrowserCheck]), + cast_to=cast(Type[Optional[ZoneSettingBrowserCheck]], ResultWrapper[ZoneSettingBrowserCheck]), ) async def get( @@ -195,7 +195,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBrowserCheck]: + ) -> Optional[ZoneSettingBrowserCheck]: """ Browser Integrity Check is similar to Bad Behavior and looks for common HTTP headers abused most commonly by spammers and denies access to your page. It will @@ -225,7 +225,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBrowserCheck]], ResultWrapper[ZonesBrowserCheck]), + cast_to=cast(Type[Optional[ZoneSettingBrowserCheck]], ResultWrapper[ZoneSettingBrowserCheck]), ) diff --git a/src/cloudflare/resources/zones/settings/cache_level.py b/src/cloudflare/resources/zones/settings/cache_level.py index f4ecda6669d..eeff2a8091d 100644 --- a/src/cloudflare/resources/zones/settings/cache_level.py +++ b/src/cloudflare/resources/zones/settings/cache_level.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesCacheLevel, cache_level_edit_params +from ....types.zones.settings import ZoneSettingCacheLevel, cache_level_edit_params __all__ = ["CacheLevel", "AsyncCacheLevel"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesCacheLevel]: + ) -> Optional[ZoneSettingCacheLevel]: """Cache Level functions based off the setting level. The basic setting will cache @@ -83,7 +83,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesCacheLevel]], ResultWrapper[ZonesCacheLevel]), + cast_to=cast(Type[Optional[ZoneSettingCacheLevel]], ResultWrapper[ZoneSettingCacheLevel]), ) def get( @@ -96,7 +96,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesCacheLevel]: + ) -> Optional[ZoneSettingCacheLevel]: """Cache Level functions based off the setting level. The basic setting will cache @@ -127,7 +127,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesCacheLevel]], ResultWrapper[ZonesCacheLevel]), + cast_to=cast(Type[Optional[ZoneSettingCacheLevel]], ResultWrapper[ZoneSettingCacheLevel]), ) @@ -151,7 +151,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesCacheLevel]: + ) -> Optional[ZoneSettingCacheLevel]: """Cache Level functions based off the setting level. The basic setting will cache @@ -185,7 +185,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesCacheLevel]], ResultWrapper[ZonesCacheLevel]), + cast_to=cast(Type[Optional[ZoneSettingCacheLevel]], ResultWrapper[ZoneSettingCacheLevel]), ) async def get( @@ -198,7 +198,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesCacheLevel]: + ) -> Optional[ZoneSettingCacheLevel]: """Cache Level functions based off the setting level. The basic setting will cache @@ -229,7 +229,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesCacheLevel]], ResultWrapper[ZonesCacheLevel]), + cast_to=cast(Type[Optional[ZoneSettingCacheLevel]], ResultWrapper[ZoneSettingCacheLevel]), ) diff --git a/src/cloudflare/resources/zones/settings/challenge_ttl.py b/src/cloudflare/resources/zones/settings/challenge_ttl.py index 39791c9eac1..b1c812074f9 100644 --- a/src/cloudflare/resources/zones/settings/challenge_ttl.py +++ b/src/cloudflare/resources/zones/settings/challenge_ttl.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesChallengeTTL, challenge_ttl_edit_params +from ....types.zones.settings import ZoneSettingChallengeTTL, challenge_ttl_edit_params __all__ = ["ChallengeTTL", "AsyncChallengeTTL"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesChallengeTTL]: + ) -> Optional[ZoneSettingChallengeTTL]: """ Specify how long a visitor is allowed access to your site after successfully completing a challenge (such as a CAPTCHA). After the TTL has expired the @@ -82,7 +82,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesChallengeTTL]], ResultWrapper[ZonesChallengeTTL]), + cast_to=cast(Type[Optional[ZoneSettingChallengeTTL]], ResultWrapper[ZoneSettingChallengeTTL]), ) def get( @@ -95,7 +95,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesChallengeTTL]: + ) -> Optional[ZoneSettingChallengeTTL]: """ Specify how long a visitor is allowed access to your site after successfully completing a challenge (such as a CAPTCHA). After the TTL has expired the @@ -125,7 +125,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesChallengeTTL]], ResultWrapper[ZonesChallengeTTL]), + cast_to=cast(Type[Optional[ZoneSettingChallengeTTL]], ResultWrapper[ZoneSettingChallengeTTL]), ) @@ -149,7 +149,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesChallengeTTL]: + ) -> Optional[ZoneSettingChallengeTTL]: """ Specify how long a visitor is allowed access to your site after successfully completing a challenge (such as a CAPTCHA). After the TTL has expired the @@ -182,7 +182,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesChallengeTTL]], ResultWrapper[ZonesChallengeTTL]), + cast_to=cast(Type[Optional[ZoneSettingChallengeTTL]], ResultWrapper[ZoneSettingChallengeTTL]), ) async def get( @@ -195,7 +195,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesChallengeTTL]: + ) -> Optional[ZoneSettingChallengeTTL]: """ Specify how long a visitor is allowed access to your site after successfully completing a challenge (such as a CAPTCHA). After the TTL has expired the @@ -225,7 +225,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesChallengeTTL]], ResultWrapper[ZonesChallengeTTL]), + cast_to=cast(Type[Optional[ZoneSettingChallengeTTL]], ResultWrapper[ZoneSettingChallengeTTL]), ) diff --git a/src/cloudflare/resources/zones/settings/ciphers.py b/src/cloudflare/resources/zones/settings/ciphers.py index 3c89a124667..7a3ae57a9c6 100644 --- a/src/cloudflare/resources/zones/settings/ciphers.py +++ b/src/cloudflare/resources/zones/settings/ciphers.py @@ -23,7 +23,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesCiphers, cipher_edit_params +from ....types.zones.settings import ZoneSettingCiphers, cipher_edit_params __all__ = ["Ciphers", "AsyncCiphers"] @@ -48,7 +48,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesCiphers]: + ) -> Optional[ZoneSettingCiphers]: """ Changes ciphers setting. @@ -77,7 +77,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesCiphers]], ResultWrapper[ZonesCiphers]), + cast_to=cast(Type[Optional[ZoneSettingCiphers]], ResultWrapper[ZoneSettingCiphers]), ) def get( @@ -90,7 +90,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesCiphers]: + ) -> Optional[ZoneSettingCiphers]: """ Gets ciphers setting. @@ -116,7 +116,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesCiphers]], ResultWrapper[ZonesCiphers]), + cast_to=cast(Type[Optional[ZoneSettingCiphers]], ResultWrapper[ZoneSettingCiphers]), ) @@ -140,7 +140,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesCiphers]: + ) -> Optional[ZoneSettingCiphers]: """ Changes ciphers setting. @@ -169,7 +169,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesCiphers]], ResultWrapper[ZonesCiphers]), + cast_to=cast(Type[Optional[ZoneSettingCiphers]], ResultWrapper[ZoneSettingCiphers]), ) async def get( @@ -182,7 +182,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesCiphers]: + ) -> Optional[ZoneSettingCiphers]: """ Gets ciphers setting. @@ -208,7 +208,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesCiphers]], ResultWrapper[ZonesCiphers]), + cast_to=cast(Type[Optional[ZoneSettingCiphers]], ResultWrapper[ZoneSettingCiphers]), ) diff --git a/src/cloudflare/resources/zones/settings/development_mode.py b/src/cloudflare/resources/zones/settings/development_mode.py index 0e7a2d532c6..a79b455bbb2 100644 --- a/src/cloudflare/resources/zones/settings/development_mode.py +++ b/src/cloudflare/resources/zones/settings/development_mode.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesDevelopmentMode, development_mode_edit_params +from ....types.zones.settings import ZoneSettingDevelopmentMode, development_mode_edit_params __all__ = ["DevelopmentMode", "AsyncDevelopmentMode"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesDevelopmentMode]: + ) -> Optional[ZoneSettingDevelopmentMode]: """ Development Mode temporarily allows you to enter development mode for your websites if you need to make changes to your site. This will bypass Cloudflare's @@ -83,7 +83,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesDevelopmentMode]], ResultWrapper[ZonesDevelopmentMode]), + cast_to=cast(Type[Optional[ZoneSettingDevelopmentMode]], ResultWrapper[ZoneSettingDevelopmentMode]), ) def get( @@ -96,7 +96,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesDevelopmentMode]: + ) -> Optional[ZoneSettingDevelopmentMode]: """ Development Mode temporarily allows you to enter development mode for your websites if you need to make changes to your site. This will bypass Cloudflare's @@ -127,7 +127,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesDevelopmentMode]], ResultWrapper[ZonesDevelopmentMode]), + cast_to=cast(Type[Optional[ZoneSettingDevelopmentMode]], ResultWrapper[ZoneSettingDevelopmentMode]), ) @@ -151,7 +151,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesDevelopmentMode]: + ) -> Optional[ZoneSettingDevelopmentMode]: """ Development Mode temporarily allows you to enter development mode for your websites if you need to make changes to your site. This will bypass Cloudflare's @@ -185,7 +185,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesDevelopmentMode]], ResultWrapper[ZonesDevelopmentMode]), + cast_to=cast(Type[Optional[ZoneSettingDevelopmentMode]], ResultWrapper[ZoneSettingDevelopmentMode]), ) async def get( @@ -198,7 +198,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesDevelopmentMode]: + ) -> Optional[ZoneSettingDevelopmentMode]: """ Development Mode temporarily allows you to enter development mode for your websites if you need to make changes to your site. This will bypass Cloudflare's @@ -229,7 +229,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesDevelopmentMode]], ResultWrapper[ZonesDevelopmentMode]), + cast_to=cast(Type[Optional[ZoneSettingDevelopmentMode]], ResultWrapper[ZoneSettingDevelopmentMode]), ) diff --git a/src/cloudflare/resources/zones/settings/early_hints.py b/src/cloudflare/resources/zones/settings/early_hints.py index 9324bebd6c1..d4b971bdf17 100644 --- a/src/cloudflare/resources/zones/settings/early_hints.py +++ b/src/cloudflare/resources/zones/settings/early_hints.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesEarlyHints, early_hint_edit_params +from ....types.zones.settings import ZoneSettingEarlyHints, early_hint_edit_params __all__ = ["EarlyHints", "AsyncEarlyHints"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesEarlyHints]: + ) -> Optional[ZoneSettingEarlyHints]: """ When enabled, Cloudflare will attempt to speed up overall page loads by serving `103` responses with `Link` headers from the final response. Refer to @@ -81,7 +81,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesEarlyHints]], ResultWrapper[ZonesEarlyHints]), + cast_to=cast(Type[Optional[ZoneSettingEarlyHints]], ResultWrapper[ZoneSettingEarlyHints]), ) def get( @@ -94,7 +94,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesEarlyHints]: + ) -> Optional[ZoneSettingEarlyHints]: """ When enabled, Cloudflare will attempt to speed up overall page loads by serving `103` responses with `Link` headers from the final response. Refer to @@ -123,7 +123,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesEarlyHints]], ResultWrapper[ZonesEarlyHints]), + cast_to=cast(Type[Optional[ZoneSettingEarlyHints]], ResultWrapper[ZoneSettingEarlyHints]), ) @@ -147,7 +147,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesEarlyHints]: + ) -> Optional[ZoneSettingEarlyHints]: """ When enabled, Cloudflare will attempt to speed up overall page loads by serving `103` responses with `Link` headers from the final response. Refer to @@ -179,7 +179,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesEarlyHints]], ResultWrapper[ZonesEarlyHints]), + cast_to=cast(Type[Optional[ZoneSettingEarlyHints]], ResultWrapper[ZoneSettingEarlyHints]), ) async def get( @@ -192,7 +192,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesEarlyHints]: + ) -> Optional[ZoneSettingEarlyHints]: """ When enabled, Cloudflare will attempt to speed up overall page loads by serving `103` responses with `Link` headers from the final response. Refer to @@ -221,7 +221,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesEarlyHints]], ResultWrapper[ZonesEarlyHints]), + cast_to=cast(Type[Optional[ZoneSettingEarlyHints]], ResultWrapper[ZoneSettingEarlyHints]), ) diff --git a/src/cloudflare/resources/zones/settings/email_obfuscation.py b/src/cloudflare/resources/zones/settings/email_obfuscation.py index 2fa4945f3b9..2e544bb44af 100644 --- a/src/cloudflare/resources/zones/settings/email_obfuscation.py +++ b/src/cloudflare/resources/zones/settings/email_obfuscation.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesEmailObfuscation, email_obfuscation_edit_params +from ....types.zones.settings import ZoneSettingEmailObfuscation, email_obfuscation_edit_params __all__ = ["EmailObfuscation", "AsyncEmailObfuscation"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesEmailObfuscation]: + ) -> Optional[ZoneSettingEmailObfuscation]: """ Encrypt email adresses on your web page from bots, while keeping them visible to humans. (https://support.cloudflare.com/hc/en-us/articles/200170016). @@ -79,7 +79,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesEmailObfuscation]], ResultWrapper[ZonesEmailObfuscation]), + cast_to=cast(Type[Optional[ZoneSettingEmailObfuscation]], ResultWrapper[ZoneSettingEmailObfuscation]), ) def get( @@ -92,7 +92,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesEmailObfuscation]: + ) -> Optional[ZoneSettingEmailObfuscation]: """ Encrypt email adresses on your web page from bots, while keeping them visible to humans. (https://support.cloudflare.com/hc/en-us/articles/200170016). @@ -119,7 +119,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesEmailObfuscation]], ResultWrapper[ZonesEmailObfuscation]), + cast_to=cast(Type[Optional[ZoneSettingEmailObfuscation]], ResultWrapper[ZoneSettingEmailObfuscation]), ) @@ -143,7 +143,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesEmailObfuscation]: + ) -> Optional[ZoneSettingEmailObfuscation]: """ Encrypt email adresses on your web page from bots, while keeping them visible to humans. (https://support.cloudflare.com/hc/en-us/articles/200170016). @@ -175,7 +175,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesEmailObfuscation]], ResultWrapper[ZonesEmailObfuscation]), + cast_to=cast(Type[Optional[ZoneSettingEmailObfuscation]], ResultWrapper[ZoneSettingEmailObfuscation]), ) async def get( @@ -188,7 +188,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesEmailObfuscation]: + ) -> Optional[ZoneSettingEmailObfuscation]: """ Encrypt email adresses on your web page from bots, while keeping them visible to humans. (https://support.cloudflare.com/hc/en-us/articles/200170016). @@ -215,7 +215,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesEmailObfuscation]], ResultWrapper[ZonesEmailObfuscation]), + cast_to=cast(Type[Optional[ZoneSettingEmailObfuscation]], ResultWrapper[ZoneSettingEmailObfuscation]), ) diff --git a/src/cloudflare/resources/zones/settings/font_settings.py b/src/cloudflare/resources/zones/settings/font_settings.py index a014ba5ea49..301bb27d686 100644 --- a/src/cloudflare/resources/zones/settings/font_settings.py +++ b/src/cloudflare/resources/zones/settings/font_settings.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import SpeedCloudflareFonts, font_setting_edit_params +from ....types.zones.settings import ZoneSettingFonts, font_setting_edit_params __all__ = ["FontSettings", "AsyncFontSettings"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[SpeedCloudflareFonts]: + ) -> Optional[ZoneSettingFonts]: """Enhance your website's font delivery with Cloudflare Fonts. Deliver Google @@ -81,7 +81,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[SpeedCloudflareFonts]], ResultWrapper[SpeedCloudflareFonts]), + cast_to=cast(Type[Optional[ZoneSettingFonts]], ResultWrapper[ZoneSettingFonts]), ) def get( @@ -94,7 +94,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[SpeedCloudflareFonts]: + ) -> Optional[ZoneSettingFonts]: """Enhance your website's font delivery with Cloudflare Fonts. Deliver Google @@ -123,7 +123,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[SpeedCloudflareFonts]], ResultWrapper[SpeedCloudflareFonts]), + cast_to=cast(Type[Optional[ZoneSettingFonts]], ResultWrapper[ZoneSettingFonts]), ) @@ -147,7 +147,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[SpeedCloudflareFonts]: + ) -> Optional[ZoneSettingFonts]: """Enhance your website's font delivery with Cloudflare Fonts. Deliver Google @@ -179,7 +179,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[SpeedCloudflareFonts]], ResultWrapper[SpeedCloudflareFonts]), + cast_to=cast(Type[Optional[ZoneSettingFonts]], ResultWrapper[ZoneSettingFonts]), ) async def get( @@ -192,7 +192,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[SpeedCloudflareFonts]: + ) -> Optional[ZoneSettingFonts]: """Enhance your website's font delivery with Cloudflare Fonts. Deliver Google @@ -221,7 +221,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[SpeedCloudflareFonts]], ResultWrapper[SpeedCloudflareFonts]), + cast_to=cast(Type[Optional[ZoneSettingFonts]], ResultWrapper[ZoneSettingFonts]), ) diff --git a/src/cloudflare/resources/zones/settings/h2_prioritization.py b/src/cloudflare/resources/zones/settings/h2_prioritization.py index fa2fac902a1..6b571b0dcd1 100644 --- a/src/cloudflare/resources/zones/settings/h2_prioritization.py +++ b/src/cloudflare/resources/zones/settings/h2_prioritization.py @@ -23,7 +23,11 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesH2Prioritization, ZonesH2PrioritizationParam, h2_prioritization_edit_params +from ....types.zones.settings import ( + ZoneSettingH2Prioritization, + ZoneSettingH2PrioritizationParam, + h2_prioritization_edit_params, +) __all__ = ["H2Prioritization", "AsyncH2Prioritization"] @@ -41,14 +45,14 @@ def edit( self, *, zone_id: str, - value: ZonesH2PrioritizationParam, + value: ZoneSettingH2PrioritizationParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesH2Prioritization]: + ) -> Optional[ZoneSettingH2Prioritization]: """ Gets HTTP/2 Edge Prioritization setting. @@ -79,7 +83,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesH2Prioritization]], ResultWrapper[ZonesH2Prioritization]), + cast_to=cast(Type[Optional[ZoneSettingH2Prioritization]], ResultWrapper[ZoneSettingH2Prioritization]), ) def get( @@ -92,7 +96,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesH2Prioritization]: + ) -> Optional[ZoneSettingH2Prioritization]: """ Gets HTTP/2 Edge Prioritization setting. @@ -118,7 +122,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesH2Prioritization]], ResultWrapper[ZonesH2Prioritization]), + cast_to=cast(Type[Optional[ZoneSettingH2Prioritization]], ResultWrapper[ZoneSettingH2Prioritization]), ) @@ -135,14 +139,14 @@ async def edit( self, *, zone_id: str, - value: ZonesH2PrioritizationParam, + value: ZoneSettingH2PrioritizationParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesH2Prioritization]: + ) -> Optional[ZoneSettingH2Prioritization]: """ Gets HTTP/2 Edge Prioritization setting. @@ -175,7 +179,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesH2Prioritization]], ResultWrapper[ZonesH2Prioritization]), + cast_to=cast(Type[Optional[ZoneSettingH2Prioritization]], ResultWrapper[ZoneSettingH2Prioritization]), ) async def get( @@ -188,7 +192,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesH2Prioritization]: + ) -> Optional[ZoneSettingH2Prioritization]: """ Gets HTTP/2 Edge Prioritization setting. @@ -214,7 +218,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesH2Prioritization]], ResultWrapper[ZonesH2Prioritization]), + cast_to=cast(Type[Optional[ZoneSettingH2Prioritization]], ResultWrapper[ZoneSettingH2Prioritization]), ) diff --git a/src/cloudflare/resources/zones/settings/hotlink_protection.py b/src/cloudflare/resources/zones/settings/hotlink_protection.py index 031cefeab45..aa71c4eb57b 100644 --- a/src/cloudflare/resources/zones/settings/hotlink_protection.py +++ b/src/cloudflare/resources/zones/settings/hotlink_protection.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesHotlinkProtection, hotlink_protection_edit_params +from ....types.zones.settings import ZoneSettingHotlinkProtection, hotlink_protection_edit_params __all__ = ["HotlinkProtection", "AsyncHotlinkProtection"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHotlinkProtection]: + ) -> Optional[ZoneSettingHotlinkProtection]: """ When enabled, the Hotlink Protection option ensures that other sites cannot suck up your bandwidth by building pages that use images hosted on your site. Anytime @@ -84,7 +84,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHotlinkProtection]], ResultWrapper[ZonesHotlinkProtection]), + cast_to=cast(Type[Optional[ZoneSettingHotlinkProtection]], ResultWrapper[ZoneSettingHotlinkProtection]), ) def get( @@ -97,7 +97,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHotlinkProtection]: + ) -> Optional[ZoneSettingHotlinkProtection]: """ When enabled, the Hotlink Protection option ensures that other sites cannot suck up your bandwidth by building pages that use images hosted on your site. Anytime @@ -129,7 +129,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHotlinkProtection]], ResultWrapper[ZonesHotlinkProtection]), + cast_to=cast(Type[Optional[ZoneSettingHotlinkProtection]], ResultWrapper[ZoneSettingHotlinkProtection]), ) @@ -153,7 +153,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHotlinkProtection]: + ) -> Optional[ZoneSettingHotlinkProtection]: """ When enabled, the Hotlink Protection option ensures that other sites cannot suck up your bandwidth by building pages that use images hosted on your site. Anytime @@ -190,7 +190,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHotlinkProtection]], ResultWrapper[ZonesHotlinkProtection]), + cast_to=cast(Type[Optional[ZoneSettingHotlinkProtection]], ResultWrapper[ZoneSettingHotlinkProtection]), ) async def get( @@ -203,7 +203,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHotlinkProtection]: + ) -> Optional[ZoneSettingHotlinkProtection]: """ When enabled, the Hotlink Protection option ensures that other sites cannot suck up your bandwidth by building pages that use images hosted on your site. Anytime @@ -235,7 +235,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHotlinkProtection]], ResultWrapper[ZonesHotlinkProtection]), + cast_to=cast(Type[Optional[ZoneSettingHotlinkProtection]], ResultWrapper[ZoneSettingHotlinkProtection]), ) diff --git a/src/cloudflare/resources/zones/settings/http2.py b/src/cloudflare/resources/zones/settings/http2.py index 1f598816f74..0fd5bd4100d 100644 --- a/src/cloudflare/resources/zones/settings/http2.py +++ b/src/cloudflare/resources/zones/settings/http2.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesHTTP2, http2_edit_params +from ....types.zones.settings import ZoneSettingHTTP2, http2_edit_params __all__ = ["HTTP2", "AsyncHTTP2"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHTTP2]: + ) -> Optional[ZoneSettingHTTP2]: """ Value of the HTTP2 setting. @@ -78,7 +78,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHTTP2]], ResultWrapper[ZonesHTTP2]), + cast_to=cast(Type[Optional[ZoneSettingHTTP2]], ResultWrapper[ZoneSettingHTTP2]), ) def get( @@ -91,7 +91,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHTTP2]: + ) -> Optional[ZoneSettingHTTP2]: """ Value of the HTTP2 setting. @@ -117,7 +117,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHTTP2]], ResultWrapper[ZonesHTTP2]), + cast_to=cast(Type[Optional[ZoneSettingHTTP2]], ResultWrapper[ZoneSettingHTTP2]), ) @@ -141,7 +141,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHTTP2]: + ) -> Optional[ZoneSettingHTTP2]: """ Value of the HTTP2 setting. @@ -170,7 +170,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHTTP2]], ResultWrapper[ZonesHTTP2]), + cast_to=cast(Type[Optional[ZoneSettingHTTP2]], ResultWrapper[ZoneSettingHTTP2]), ) async def get( @@ -183,7 +183,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHTTP2]: + ) -> Optional[ZoneSettingHTTP2]: """ Value of the HTTP2 setting. @@ -209,7 +209,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHTTP2]], ResultWrapper[ZonesHTTP2]), + cast_to=cast(Type[Optional[ZoneSettingHTTP2]], ResultWrapper[ZoneSettingHTTP2]), ) diff --git a/src/cloudflare/resources/zones/settings/http3.py b/src/cloudflare/resources/zones/settings/http3.py index eadc6cb11a2..3ce7c57c1eb 100644 --- a/src/cloudflare/resources/zones/settings/http3.py +++ b/src/cloudflare/resources/zones/settings/http3.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesHTTP3, http3_edit_params +from ....types.zones.settings import ZoneSettingHTTP3, http3_edit_params __all__ = ["HTTP3", "AsyncHTTP3"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHTTP3]: + ) -> Optional[ZoneSettingHTTP3]: """ Value of the HTTP3 setting. @@ -78,7 +78,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHTTP3]], ResultWrapper[ZonesHTTP3]), + cast_to=cast(Type[Optional[ZoneSettingHTTP3]], ResultWrapper[ZoneSettingHTTP3]), ) def get( @@ -91,7 +91,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHTTP3]: + ) -> Optional[ZoneSettingHTTP3]: """ Value of the HTTP3 setting. @@ -117,7 +117,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHTTP3]], ResultWrapper[ZonesHTTP3]), + cast_to=cast(Type[Optional[ZoneSettingHTTP3]], ResultWrapper[ZoneSettingHTTP3]), ) @@ -141,7 +141,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHTTP3]: + ) -> Optional[ZoneSettingHTTP3]: """ Value of the HTTP3 setting. @@ -170,7 +170,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHTTP3]], ResultWrapper[ZonesHTTP3]), + cast_to=cast(Type[Optional[ZoneSettingHTTP3]], ResultWrapper[ZoneSettingHTTP3]), ) async def get( @@ -183,7 +183,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesHTTP3]: + ) -> Optional[ZoneSettingHTTP3]: """ Value of the HTTP3 setting. @@ -209,7 +209,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesHTTP3]], ResultWrapper[ZonesHTTP3]), + cast_to=cast(Type[Optional[ZoneSettingHTTP3]], ResultWrapper[ZoneSettingHTTP3]), ) diff --git a/src/cloudflare/resources/zones/settings/image_resizing.py b/src/cloudflare/resources/zones/settings/image_resizing.py index 5997bf0a050..3b3a9f888c3 100644 --- a/src/cloudflare/resources/zones/settings/image_resizing.py +++ b/src/cloudflare/resources/zones/settings/image_resizing.py @@ -23,7 +23,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesImageResizing, ZonesImageResizingParam, image_resizing_edit_params +from ....types.zones.settings import ZoneSettingImageResizing, ZoneSettingImageResizingParam, image_resizing_edit_params __all__ = ["ImageResizing", "AsyncImageResizing"] @@ -41,14 +41,14 @@ def edit( self, *, zone_id: str, - value: ZonesImageResizingParam, + value: ZoneSettingImageResizingParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesImageResizing]: + ) -> Optional[ZoneSettingImageResizing]: """ Image Resizing provides on-demand resizing, conversion and optimisation for images served through Cloudflare's network. Refer to the @@ -83,7 +83,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesImageResizing]], ResultWrapper[ZonesImageResizing]), + cast_to=cast(Type[Optional[ZoneSettingImageResizing]], ResultWrapper[ZoneSettingImageResizing]), ) def get( @@ -96,7 +96,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesImageResizing]: + ) -> Optional[ZoneSettingImageResizing]: """ Image Resizing provides on-demand resizing, conversion and optimisation for images served through Cloudflare's network. Refer to the @@ -125,7 +125,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesImageResizing]], ResultWrapper[ZonesImageResizing]), + cast_to=cast(Type[Optional[ZoneSettingImageResizing]], ResultWrapper[ZoneSettingImageResizing]), ) @@ -142,14 +142,14 @@ async def edit( self, *, zone_id: str, - value: ZonesImageResizingParam, + value: ZoneSettingImageResizingParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesImageResizing]: + ) -> Optional[ZoneSettingImageResizing]: """ Image Resizing provides on-demand resizing, conversion and optimisation for images served through Cloudflare's network. Refer to the @@ -184,7 +184,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesImageResizing]], ResultWrapper[ZonesImageResizing]), + cast_to=cast(Type[Optional[ZoneSettingImageResizing]], ResultWrapper[ZoneSettingImageResizing]), ) async def get( @@ -197,7 +197,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesImageResizing]: + ) -> Optional[ZoneSettingImageResizing]: """ Image Resizing provides on-demand resizing, conversion and optimisation for images served through Cloudflare's network. Refer to the @@ -226,7 +226,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesImageResizing]], ResultWrapper[ZonesImageResizing]), + cast_to=cast(Type[Optional[ZoneSettingImageResizing]], ResultWrapper[ZoneSettingImageResizing]), ) diff --git a/src/cloudflare/resources/zones/settings/ip_geolocation.py b/src/cloudflare/resources/zones/settings/ip_geolocation.py index 0c94d359ae0..8a14a19702a 100644 --- a/src/cloudflare/resources/zones/settings/ip_geolocation.py +++ b/src/cloudflare/resources/zones/settings/ip_geolocation.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesIPGeolocation, ip_geolocation_edit_params +from ....types.zones.settings import ZoneSettingIPGeolocation, ip_geolocation_edit_params __all__ = ["IPGeolocation", "AsyncIPGeolocation"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesIPGeolocation]: + ) -> Optional[ZoneSettingIPGeolocation]: """ Enable IP Geolocation to have Cloudflare geolocate visitors to your website and pass the country code to you. @@ -80,7 +80,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesIPGeolocation]], ResultWrapper[ZonesIPGeolocation]), + cast_to=cast(Type[Optional[ZoneSettingIPGeolocation]], ResultWrapper[ZoneSettingIPGeolocation]), ) def get( @@ -93,7 +93,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesIPGeolocation]: + ) -> Optional[ZoneSettingIPGeolocation]: """ Enable IP Geolocation to have Cloudflare geolocate visitors to your website and pass the country code to you. @@ -121,7 +121,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesIPGeolocation]], ResultWrapper[ZonesIPGeolocation]), + cast_to=cast(Type[Optional[ZoneSettingIPGeolocation]], ResultWrapper[ZoneSettingIPGeolocation]), ) @@ -145,7 +145,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesIPGeolocation]: + ) -> Optional[ZoneSettingIPGeolocation]: """ Enable IP Geolocation to have Cloudflare geolocate visitors to your website and pass the country code to you. @@ -176,7 +176,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesIPGeolocation]], ResultWrapper[ZonesIPGeolocation]), + cast_to=cast(Type[Optional[ZoneSettingIPGeolocation]], ResultWrapper[ZoneSettingIPGeolocation]), ) async def get( @@ -189,7 +189,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesIPGeolocation]: + ) -> Optional[ZoneSettingIPGeolocation]: """ Enable IP Geolocation to have Cloudflare geolocate visitors to your website and pass the country code to you. @@ -217,7 +217,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesIPGeolocation]], ResultWrapper[ZonesIPGeolocation]), + cast_to=cast(Type[Optional[ZoneSettingIPGeolocation]], ResultWrapper[ZoneSettingIPGeolocation]), ) diff --git a/src/cloudflare/resources/zones/settings/ipv6.py b/src/cloudflare/resources/zones/settings/ipv6.py index 8cd71522937..f9284b5731d 100644 --- a/src/cloudflare/resources/zones/settings/ipv6.py +++ b/src/cloudflare/resources/zones/settings/ipv6.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesIPV6, ipv6_edit_params +from ....types.zones.settings import ZoneSettingIPV6, ipv6_edit_params __all__ = ["IPV6", "AsyncIPV6"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesIPV6]: + ) -> Optional[ZoneSettingIPV6]: """ Enable IPv6 on all subdomains that are Cloudflare enabled. (https://support.cloudflare.com/hc/en-us/articles/200168586). @@ -79,7 +79,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesIPV6]], ResultWrapper[ZonesIPV6]), + cast_to=cast(Type[Optional[ZoneSettingIPV6]], ResultWrapper[ZoneSettingIPV6]), ) def get( @@ -92,7 +92,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesIPV6]: + ) -> Optional[ZoneSettingIPV6]: """ Enable IPv6 on all subdomains that are Cloudflare enabled. (https://support.cloudflare.com/hc/en-us/articles/200168586). @@ -119,7 +119,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesIPV6]], ResultWrapper[ZonesIPV6]), + cast_to=cast(Type[Optional[ZoneSettingIPV6]], ResultWrapper[ZoneSettingIPV6]), ) @@ -143,7 +143,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesIPV6]: + ) -> Optional[ZoneSettingIPV6]: """ Enable IPv6 on all subdomains that are Cloudflare enabled. (https://support.cloudflare.com/hc/en-us/articles/200168586). @@ -173,7 +173,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesIPV6]], ResultWrapper[ZonesIPV6]), + cast_to=cast(Type[Optional[ZoneSettingIPV6]], ResultWrapper[ZoneSettingIPV6]), ) async def get( @@ -186,7 +186,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesIPV6]: + ) -> Optional[ZoneSettingIPV6]: """ Enable IPv6 on all subdomains that are Cloudflare enabled. (https://support.cloudflare.com/hc/en-us/articles/200168586). @@ -213,7 +213,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesIPV6]], ResultWrapper[ZonesIPV6]), + cast_to=cast(Type[Optional[ZoneSettingIPV6]], ResultWrapper[ZoneSettingIPV6]), ) diff --git a/src/cloudflare/resources/zones/settings/min_tls_version.py b/src/cloudflare/resources/zones/settings/min_tls_version.py index bbd5bfb1b55..bbddcecee43 100644 --- a/src/cloudflare/resources/zones/settings/min_tls_version.py +++ b/src/cloudflare/resources/zones/settings/min_tls_version.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesMinTLSVersion, min_tls_version_edit_params +from ....types.zones.settings import ZoneSettingMinTLSVersion, min_tls_version_edit_params __all__ = ["MinTLSVersion", "AsyncMinTLSVersion"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMinTLSVersion]: + ) -> Optional[ZoneSettingMinTLSVersion]: """ Changes Minimum TLS Version setting. @@ -78,7 +78,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMinTLSVersion]], ResultWrapper[ZonesMinTLSVersion]), + cast_to=cast(Type[Optional[ZoneSettingMinTLSVersion]], ResultWrapper[ZoneSettingMinTLSVersion]), ) def get( @@ -91,7 +91,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMinTLSVersion]: + ) -> Optional[ZoneSettingMinTLSVersion]: """ Gets Minimum TLS Version setting. @@ -117,7 +117,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMinTLSVersion]], ResultWrapper[ZonesMinTLSVersion]), + cast_to=cast(Type[Optional[ZoneSettingMinTLSVersion]], ResultWrapper[ZoneSettingMinTLSVersion]), ) @@ -141,7 +141,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMinTLSVersion]: + ) -> Optional[ZoneSettingMinTLSVersion]: """ Changes Minimum TLS Version setting. @@ -170,7 +170,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMinTLSVersion]], ResultWrapper[ZonesMinTLSVersion]), + cast_to=cast(Type[Optional[ZoneSettingMinTLSVersion]], ResultWrapper[ZoneSettingMinTLSVersion]), ) async def get( @@ -183,7 +183,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMinTLSVersion]: + ) -> Optional[ZoneSettingMinTLSVersion]: """ Gets Minimum TLS Version setting. @@ -209,7 +209,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMinTLSVersion]], ResultWrapper[ZonesMinTLSVersion]), + cast_to=cast(Type[Optional[ZoneSettingMinTLSVersion]], ResultWrapper[ZoneSettingMinTLSVersion]), ) diff --git a/src/cloudflare/resources/zones/settings/minify.py b/src/cloudflare/resources/zones/settings/minify.py index 56a0df5b161..c6c627305e3 100644 --- a/src/cloudflare/resources/zones/settings/minify.py +++ b/src/cloudflare/resources/zones/settings/minify.py @@ -23,7 +23,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesMinify, minify_edit_params +from ....types.zones.settings import ZoneSettingMinify, minify_edit_params __all__ = ["Minify", "AsyncMinify"] @@ -48,7 +48,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMinify]: + ) -> Optional[ZoneSettingMinify]: """Automatically minify certain assets for your website. Refer to @@ -80,7 +80,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMinify]], ResultWrapper[ZonesMinify]), + cast_to=cast(Type[Optional[ZoneSettingMinify]], ResultWrapper[ZoneSettingMinify]), ) def get( @@ -93,7 +93,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMinify]: + ) -> Optional[ZoneSettingMinify]: """Automatically minify certain assets for your website. Refer to @@ -122,7 +122,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMinify]], ResultWrapper[ZonesMinify]), + cast_to=cast(Type[Optional[ZoneSettingMinify]], ResultWrapper[ZoneSettingMinify]), ) @@ -146,7 +146,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMinify]: + ) -> Optional[ZoneSettingMinify]: """Automatically minify certain assets for your website. Refer to @@ -178,7 +178,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMinify]], ResultWrapper[ZonesMinify]), + cast_to=cast(Type[Optional[ZoneSettingMinify]], ResultWrapper[ZoneSettingMinify]), ) async def get( @@ -191,7 +191,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMinify]: + ) -> Optional[ZoneSettingMinify]: """Automatically minify certain assets for your website. Refer to @@ -220,7 +220,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMinify]], ResultWrapper[ZonesMinify]), + cast_to=cast(Type[Optional[ZoneSettingMinify]], ResultWrapper[ZoneSettingMinify]), ) diff --git a/src/cloudflare/resources/zones/settings/mirage.py b/src/cloudflare/resources/zones/settings/mirage.py index e9cc9bc6620..adb93b4163a 100644 --- a/src/cloudflare/resources/zones/settings/mirage.py +++ b/src/cloudflare/resources/zones/settings/mirage.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesMirage, mirage_edit_params +from ....types.zones.settings import ZoneSettingMirage, mirage_edit_params __all__ = ["Mirage", "AsyncMirage"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMirage]: + ) -> Optional[ZoneSettingMirage]: """ Automatically optimize image loading for website visitors on mobile devices. Refer to our @@ -81,7 +81,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMirage]], ResultWrapper[ZonesMirage]), + cast_to=cast(Type[Optional[ZoneSettingMirage]], ResultWrapper[ZoneSettingMirage]), ) def get( @@ -94,7 +94,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMirage]: + ) -> Optional[ZoneSettingMirage]: """ Automatically optimize image loading for website visitors on mobile devices. Refer to our @@ -123,7 +123,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMirage]], ResultWrapper[ZonesMirage]), + cast_to=cast(Type[Optional[ZoneSettingMirage]], ResultWrapper[ZoneSettingMirage]), ) @@ -147,7 +147,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMirage]: + ) -> Optional[ZoneSettingMirage]: """ Automatically optimize image loading for website visitors on mobile devices. Refer to our @@ -179,7 +179,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMirage]], ResultWrapper[ZonesMirage]), + cast_to=cast(Type[Optional[ZoneSettingMirage]], ResultWrapper[ZoneSettingMirage]), ) async def get( @@ -192,7 +192,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMirage]: + ) -> Optional[ZoneSettingMirage]: """ Automatically optimize image loading for website visitors on mobile devices. Refer to our @@ -221,7 +221,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMirage]], ResultWrapper[ZonesMirage]), + cast_to=cast(Type[Optional[ZoneSettingMirage]], ResultWrapper[ZoneSettingMirage]), ) diff --git a/src/cloudflare/resources/zones/settings/mobile_redirect.py b/src/cloudflare/resources/zones/settings/mobile_redirect.py index b96a963172c..f02b392efff 100644 --- a/src/cloudflare/resources/zones/settings/mobile_redirect.py +++ b/src/cloudflare/resources/zones/settings/mobile_redirect.py @@ -23,7 +23,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesMobileRedirect, mobile_redirect_edit_params +from ....types.zones.settings import ZoneSettingMobileRedirect, mobile_redirect_edit_params __all__ = ["MobileRedirect", "AsyncMobileRedirect"] @@ -48,7 +48,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMobileRedirect]: + ) -> Optional[ZoneSettingMobileRedirect]: """ Automatically redirect visitors on mobile devices to a mobile-optimized subdomain. Refer to @@ -80,7 +80,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMobileRedirect]], ResultWrapper[ZonesMobileRedirect]), + cast_to=cast(Type[Optional[ZoneSettingMobileRedirect]], ResultWrapper[ZoneSettingMobileRedirect]), ) def get( @@ -93,7 +93,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMobileRedirect]: + ) -> Optional[ZoneSettingMobileRedirect]: """ Automatically redirect visitors on mobile devices to a mobile-optimized subdomain. Refer to @@ -122,7 +122,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMobileRedirect]], ResultWrapper[ZonesMobileRedirect]), + cast_to=cast(Type[Optional[ZoneSettingMobileRedirect]], ResultWrapper[ZoneSettingMobileRedirect]), ) @@ -146,7 +146,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMobileRedirect]: + ) -> Optional[ZoneSettingMobileRedirect]: """ Automatically redirect visitors on mobile devices to a mobile-optimized subdomain. Refer to @@ -178,7 +178,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMobileRedirect]], ResultWrapper[ZonesMobileRedirect]), + cast_to=cast(Type[Optional[ZoneSettingMobileRedirect]], ResultWrapper[ZoneSettingMobileRedirect]), ) async def get( @@ -191,7 +191,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesMobileRedirect]: + ) -> Optional[ZoneSettingMobileRedirect]: """ Automatically redirect visitors on mobile devices to a mobile-optimized subdomain. Refer to @@ -220,7 +220,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesMobileRedirect]], ResultWrapper[ZonesMobileRedirect]), + cast_to=cast(Type[Optional[ZoneSettingMobileRedirect]], ResultWrapper[ZoneSettingMobileRedirect]), ) diff --git a/src/cloudflare/resources/zones/settings/nel.py b/src/cloudflare/resources/zones/settings/nel.py index 60fde343c6e..a258ecdf639 100644 --- a/src/cloudflare/resources/zones/settings/nel.py +++ b/src/cloudflare/resources/zones/settings/nel.py @@ -23,7 +23,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesNEL, ZonesNELParam, nel_edit_params +from ....types.zones.settings import ZoneSettingNEL, ZoneSettingNELParam, nel_edit_params __all__ = ["NEL", "AsyncNEL"] @@ -41,14 +41,14 @@ def edit( self, *, zone_id: str, - value: ZonesNELParam, + value: ZoneSettingNELParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesNEL]: + ) -> Optional[ZoneSettingNEL]: """ Automatically optimize image loading for website visitors on mobile devices. Refer to our [blog post](http://blog.cloudflare.com/nel-solving-mobile-speed) @@ -79,7 +79,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesNEL]], ResultWrapper[ZonesNEL]), + cast_to=cast(Type[Optional[ZoneSettingNEL]], ResultWrapper[ZoneSettingNEL]), ) def get( @@ -92,7 +92,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesNEL]: + ) -> Optional[ZoneSettingNEL]: """Enable Network Error Logging reporting on your zone. (Beta) @@ -119,7 +119,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesNEL]], ResultWrapper[ZonesNEL]), + cast_to=cast(Type[Optional[ZoneSettingNEL]], ResultWrapper[ZoneSettingNEL]), ) @@ -136,14 +136,14 @@ async def edit( self, *, zone_id: str, - value: ZonesNELParam, + value: ZoneSettingNELParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesNEL]: + ) -> Optional[ZoneSettingNEL]: """ Automatically optimize image loading for website visitors on mobile devices. Refer to our [blog post](http://blog.cloudflare.com/nel-solving-mobile-speed) @@ -174,7 +174,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesNEL]], ResultWrapper[ZonesNEL]), + cast_to=cast(Type[Optional[ZoneSettingNEL]], ResultWrapper[ZoneSettingNEL]), ) async def get( @@ -187,7 +187,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesNEL]: + ) -> Optional[ZoneSettingNEL]: """Enable Network Error Logging reporting on your zone. (Beta) @@ -214,7 +214,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesNEL]], ResultWrapper[ZonesNEL]), + cast_to=cast(Type[Optional[ZoneSettingNEL]], ResultWrapper[ZoneSettingNEL]), ) diff --git a/src/cloudflare/resources/zones/settings/opportunistic_encryption.py b/src/cloudflare/resources/zones/settings/opportunistic_encryption.py index 75363b46b4a..bccb494ce3c 100644 --- a/src/cloudflare/resources/zones/settings/opportunistic_encryption.py +++ b/src/cloudflare/resources/zones/settings/opportunistic_encryption.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesOpportunisticEncryption, opportunistic_encryption_edit_params +from ....types.zones.settings import ZoneSettingOpportunisticEncryption, opportunistic_encryption_edit_params __all__ = ["OpportunisticEncryption", "AsyncOpportunisticEncryption"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOpportunisticEncryption]: + ) -> Optional[ZoneSettingOpportunisticEncryption]: """ Changes Opportunistic Encryption setting. @@ -81,7 +81,9 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOpportunisticEncryption]], ResultWrapper[ZonesOpportunisticEncryption]), + cast_to=cast( + Type[Optional[ZoneSettingOpportunisticEncryption]], ResultWrapper[ZoneSettingOpportunisticEncryption] + ), ) def get( @@ -94,7 +96,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOpportunisticEncryption]: + ) -> Optional[ZoneSettingOpportunisticEncryption]: """ Gets Opportunistic Encryption setting. @@ -120,7 +122,9 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOpportunisticEncryption]], ResultWrapper[ZonesOpportunisticEncryption]), + cast_to=cast( + Type[Optional[ZoneSettingOpportunisticEncryption]], ResultWrapper[ZoneSettingOpportunisticEncryption] + ), ) @@ -144,7 +148,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOpportunisticEncryption]: + ) -> Optional[ZoneSettingOpportunisticEncryption]: """ Changes Opportunistic Encryption setting. @@ -176,7 +180,9 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOpportunisticEncryption]], ResultWrapper[ZonesOpportunisticEncryption]), + cast_to=cast( + Type[Optional[ZoneSettingOpportunisticEncryption]], ResultWrapper[ZoneSettingOpportunisticEncryption] + ), ) async def get( @@ -189,7 +195,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOpportunisticEncryption]: + ) -> Optional[ZoneSettingOpportunisticEncryption]: """ Gets Opportunistic Encryption setting. @@ -215,7 +221,9 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOpportunisticEncryption]], ResultWrapper[ZonesOpportunisticEncryption]), + cast_to=cast( + Type[Optional[ZoneSettingOpportunisticEncryption]], ResultWrapper[ZoneSettingOpportunisticEncryption] + ), ) diff --git a/src/cloudflare/resources/zones/settings/opportunistic_onion.py b/src/cloudflare/resources/zones/settings/opportunistic_onion.py index 0574063f078..b7aac17aec4 100644 --- a/src/cloudflare/resources/zones/settings/opportunistic_onion.py +++ b/src/cloudflare/resources/zones/settings/opportunistic_onion.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesOpportunisticOnion, opportunistic_onion_edit_params +from ....types.zones.settings import ZoneSettingOpportunisticOnion, opportunistic_onion_edit_params __all__ = ["OpportunisticOnion", "AsyncOpportunisticOnion"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOpportunisticOnion]: + ) -> Optional[ZoneSettingOpportunisticOnion]: """ Add an Alt-Svc header to all legitimate requests from Tor, allowing the connection to use our onion services instead of exit nodes. @@ -80,7 +80,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOpportunisticOnion]], ResultWrapper[ZonesOpportunisticOnion]), + cast_to=cast(Type[Optional[ZoneSettingOpportunisticOnion]], ResultWrapper[ZoneSettingOpportunisticOnion]), ) def get( @@ -93,7 +93,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOpportunisticOnion]: + ) -> Optional[ZoneSettingOpportunisticOnion]: """ Add an Alt-Svc header to all legitimate requests from Tor, allowing the connection to use our onion services instead of exit nodes. @@ -120,7 +120,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOpportunisticOnion]], ResultWrapper[ZonesOpportunisticOnion]), + cast_to=cast(Type[Optional[ZoneSettingOpportunisticOnion]], ResultWrapper[ZoneSettingOpportunisticOnion]), ) @@ -144,7 +144,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOpportunisticOnion]: + ) -> Optional[ZoneSettingOpportunisticOnion]: """ Add an Alt-Svc header to all legitimate requests from Tor, allowing the connection to use our onion services instead of exit nodes. @@ -177,7 +177,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOpportunisticOnion]], ResultWrapper[ZonesOpportunisticOnion]), + cast_to=cast(Type[Optional[ZoneSettingOpportunisticOnion]], ResultWrapper[ZoneSettingOpportunisticOnion]), ) async def get( @@ -190,7 +190,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOpportunisticOnion]: + ) -> Optional[ZoneSettingOpportunisticOnion]: """ Add an Alt-Svc header to all legitimate requests from Tor, allowing the connection to use our onion services instead of exit nodes. @@ -217,7 +217,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOpportunisticOnion]], ResultWrapper[ZonesOpportunisticOnion]), + cast_to=cast(Type[Optional[ZoneSettingOpportunisticOnion]], ResultWrapper[ZoneSettingOpportunisticOnion]), ) diff --git a/src/cloudflare/resources/zones/settings/orange_to_orange.py b/src/cloudflare/resources/zones/settings/orange_to_orange.py index 8be3931f792..305f070cad6 100644 --- a/src/cloudflare/resources/zones/settings/orange_to_orange.py +++ b/src/cloudflare/resources/zones/settings/orange_to_orange.py @@ -23,7 +23,11 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesOrangeToOrange, ZonesOrangeToOrangeParam, orange_to_orange_edit_params +from ....types.zones.settings import ( + ZoneSettingOrangeToOrange, + ZoneSettingOrangeToOrangeParam, + orange_to_orange_edit_params, +) __all__ = ["OrangeToOrange", "AsyncOrangeToOrange"] @@ -41,14 +45,14 @@ def edit( self, *, zone_id: str, - value: ZonesOrangeToOrangeParam, + value: ZoneSettingOrangeToOrangeParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOrangeToOrange]: + ) -> Optional[ZoneSettingOrangeToOrange]: """ Orange to Orange (O2O) allows zones on Cloudflare to CNAME to other zones also on Cloudflare. @@ -79,7 +83,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOrangeToOrange]], ResultWrapper[ZonesOrangeToOrange]), + cast_to=cast(Type[Optional[ZoneSettingOrangeToOrange]], ResultWrapper[ZoneSettingOrangeToOrange]), ) def get( @@ -92,7 +96,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOrangeToOrange]: + ) -> Optional[ZoneSettingOrangeToOrange]: """ Orange to Orange (O2O) allows zones on Cloudflare to CNAME to other zones also on Cloudflare. @@ -119,7 +123,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOrangeToOrange]], ResultWrapper[ZonesOrangeToOrange]), + cast_to=cast(Type[Optional[ZoneSettingOrangeToOrange]], ResultWrapper[ZoneSettingOrangeToOrange]), ) @@ -136,14 +140,14 @@ async def edit( self, *, zone_id: str, - value: ZonesOrangeToOrangeParam, + value: ZoneSettingOrangeToOrangeParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOrangeToOrange]: + ) -> Optional[ZoneSettingOrangeToOrange]: """ Orange to Orange (O2O) allows zones on Cloudflare to CNAME to other zones also on Cloudflare. @@ -174,7 +178,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOrangeToOrange]], ResultWrapper[ZonesOrangeToOrange]), + cast_to=cast(Type[Optional[ZoneSettingOrangeToOrange]], ResultWrapper[ZoneSettingOrangeToOrange]), ) async def get( @@ -187,7 +191,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOrangeToOrange]: + ) -> Optional[ZoneSettingOrangeToOrange]: """ Orange to Orange (O2O) allows zones on Cloudflare to CNAME to other zones also on Cloudflare. @@ -214,7 +218,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOrangeToOrange]], ResultWrapper[ZonesOrangeToOrange]), + cast_to=cast(Type[Optional[ZoneSettingOrangeToOrange]], ResultWrapper[ZoneSettingOrangeToOrange]), ) diff --git a/src/cloudflare/resources/zones/settings/origin_error_page_pass_thru.py b/src/cloudflare/resources/zones/settings/origin_error_page_pass_thru.py index d49494cfd19..3253bc91a55 100644 --- a/src/cloudflare/resources/zones/settings/origin_error_page_pass_thru.py +++ b/src/cloudflare/resources/zones/settings/origin_error_page_pass_thru.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesOriginErrorPagePassThru, origin_error_page_pass_thru_edit_params +from ....types.zones.settings import ZoneSettingOriginErrorPagePassThru, origin_error_page_pass_thru_edit_params __all__ = ["OriginErrorPagePassThru", "AsyncOriginErrorPagePassThru"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOriginErrorPagePassThru]: + ) -> Optional[ZoneSettingOriginErrorPagePassThru]: """ Cloudflare will proxy customer error pages on any 502,504 errors on origin server instead of showing a default Cloudflare error page. This does not apply @@ -82,7 +82,9 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOriginErrorPagePassThru]], ResultWrapper[ZonesOriginErrorPagePassThru]), + cast_to=cast( + Type[Optional[ZoneSettingOriginErrorPagePassThru]], ResultWrapper[ZoneSettingOriginErrorPagePassThru] + ), ) def get( @@ -95,7 +97,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOriginErrorPagePassThru]: + ) -> Optional[ZoneSettingOriginErrorPagePassThru]: """ Cloudflare will proxy customer error pages on any 502,504 errors on origin server instead of showing a default Cloudflare error page. This does not apply @@ -123,7 +125,9 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOriginErrorPagePassThru]], ResultWrapper[ZonesOriginErrorPagePassThru]), + cast_to=cast( + Type[Optional[ZoneSettingOriginErrorPagePassThru]], ResultWrapper[ZoneSettingOriginErrorPagePassThru] + ), ) @@ -147,7 +151,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOriginErrorPagePassThru]: + ) -> Optional[ZoneSettingOriginErrorPagePassThru]: """ Cloudflare will proxy customer error pages on any 502,504 errors on origin server instead of showing a default Cloudflare error page. This does not apply @@ -180,7 +184,9 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOriginErrorPagePassThru]], ResultWrapper[ZonesOriginErrorPagePassThru]), + cast_to=cast( + Type[Optional[ZoneSettingOriginErrorPagePassThru]], ResultWrapper[ZoneSettingOriginErrorPagePassThru] + ), ) async def get( @@ -193,7 +199,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesOriginErrorPagePassThru]: + ) -> Optional[ZoneSettingOriginErrorPagePassThru]: """ Cloudflare will proxy customer error pages on any 502,504 errors on origin server instead of showing a default Cloudflare error page. This does not apply @@ -221,7 +227,9 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesOriginErrorPagePassThru]], ResultWrapper[ZonesOriginErrorPagePassThru]), + cast_to=cast( + Type[Optional[ZoneSettingOriginErrorPagePassThru]], ResultWrapper[ZoneSettingOriginErrorPagePassThru] + ), ) diff --git a/src/cloudflare/resources/zones/settings/polish.py b/src/cloudflare/resources/zones/settings/polish.py index 6737f8912d6..90d2b75fd7a 100644 --- a/src/cloudflare/resources/zones/settings/polish.py +++ b/src/cloudflare/resources/zones/settings/polish.py @@ -23,7 +23,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesPolish, ZonesPolishParam, polish_edit_params +from ....types.zones.settings import ZoneSettingPolish, ZoneSettingPolishParam, polish_edit_params __all__ = ["Polish", "AsyncPolish"] @@ -41,14 +41,14 @@ def edit( self, *, zone_id: str, - value: ZonesPolishParam, + value: ZoneSettingPolishParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPolish]: + ) -> Optional[ZoneSettingPolish]: """ Automatically optimize image loading for website visitors on mobile devices. Refer to our [blog post](http://blog.cloudflare.com/polish-solving-mobile-speed) @@ -84,7 +84,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPolish]], ResultWrapper[ZonesPolish]), + cast_to=cast(Type[Optional[ZoneSettingPolish]], ResultWrapper[ZoneSettingPolish]), ) def get( @@ -97,7 +97,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPolish]: + ) -> Optional[ZoneSettingPolish]: """ Automatically optimize image loading for website visitors on mobile devices. Refer to our [blog post](http://blog.cloudflare.com/polish-solving-mobile-speed) @@ -125,7 +125,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPolish]], ResultWrapper[ZonesPolish]), + cast_to=cast(Type[Optional[ZoneSettingPolish]], ResultWrapper[ZoneSettingPolish]), ) @@ -142,14 +142,14 @@ async def edit( self, *, zone_id: str, - value: ZonesPolishParam, + value: ZoneSettingPolishParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPolish]: + ) -> Optional[ZoneSettingPolish]: """ Automatically optimize image loading for website visitors on mobile devices. Refer to our [blog post](http://blog.cloudflare.com/polish-solving-mobile-speed) @@ -185,7 +185,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPolish]], ResultWrapper[ZonesPolish]), + cast_to=cast(Type[Optional[ZoneSettingPolish]], ResultWrapper[ZoneSettingPolish]), ) async def get( @@ -198,7 +198,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPolish]: + ) -> Optional[ZoneSettingPolish]: """ Automatically optimize image loading for website visitors on mobile devices. Refer to our [blog post](http://blog.cloudflare.com/polish-solving-mobile-speed) @@ -226,7 +226,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPolish]], ResultWrapper[ZonesPolish]), + cast_to=cast(Type[Optional[ZoneSettingPolish]], ResultWrapper[ZoneSettingPolish]), ) diff --git a/src/cloudflare/resources/zones/settings/prefetch_preload.py b/src/cloudflare/resources/zones/settings/prefetch_preload.py index e10ff64b5d3..bff8a11f510 100644 --- a/src/cloudflare/resources/zones/settings/prefetch_preload.py +++ b/src/cloudflare/resources/zones/settings/prefetch_preload.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesPrefetchPreload, prefetch_preload_edit_params +from ....types.zones.settings import ZoneSettingPrefetchPreload, prefetch_preload_edit_params __all__ = ["PrefetchPreload", "AsyncPrefetchPreload"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPrefetchPreload]: + ) -> Optional[ZoneSettingPrefetchPreload]: """ Cloudflare will prefetch any URLs that are included in the response headers. This is limited to Enterprise Zones. @@ -79,7 +79,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPrefetchPreload]], ResultWrapper[ZonesPrefetchPreload]), + cast_to=cast(Type[Optional[ZoneSettingPrefetchPreload]], ResultWrapper[ZoneSettingPrefetchPreload]), ) def get( @@ -92,7 +92,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPrefetchPreload]: + ) -> Optional[ZoneSettingPrefetchPreload]: """ Cloudflare will prefetch any URLs that are included in the response headers. This is limited to Enterprise Zones. @@ -119,7 +119,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPrefetchPreload]], ResultWrapper[ZonesPrefetchPreload]), + cast_to=cast(Type[Optional[ZoneSettingPrefetchPreload]], ResultWrapper[ZoneSettingPrefetchPreload]), ) @@ -143,7 +143,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPrefetchPreload]: + ) -> Optional[ZoneSettingPrefetchPreload]: """ Cloudflare will prefetch any URLs that are included in the response headers. This is limited to Enterprise Zones. @@ -173,7 +173,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPrefetchPreload]], ResultWrapper[ZonesPrefetchPreload]), + cast_to=cast(Type[Optional[ZoneSettingPrefetchPreload]], ResultWrapper[ZoneSettingPrefetchPreload]), ) async def get( @@ -186,7 +186,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPrefetchPreload]: + ) -> Optional[ZoneSettingPrefetchPreload]: """ Cloudflare will prefetch any URLs that are included in the response headers. This is limited to Enterprise Zones. @@ -213,7 +213,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPrefetchPreload]], ResultWrapper[ZonesPrefetchPreload]), + cast_to=cast(Type[Optional[ZoneSettingPrefetchPreload]], ResultWrapper[ZoneSettingPrefetchPreload]), ) diff --git a/src/cloudflare/resources/zones/settings/proxy_read_timeout.py b/src/cloudflare/resources/zones/settings/proxy_read_timeout.py index 1e615776fad..4fd41b55eca 100644 --- a/src/cloudflare/resources/zones/settings/proxy_read_timeout.py +++ b/src/cloudflare/resources/zones/settings/proxy_read_timeout.py @@ -23,7 +23,11 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesProxyReadTimeout, ZonesProxyReadTimeoutParam, proxy_read_timeout_edit_params +from ....types.zones.settings import ( + ZoneSettingProxyReadTimeout, + ZoneSettingProxyReadTimeoutParam, + proxy_read_timeout_edit_params, +) __all__ = ["ProxyReadTimeout", "AsyncProxyReadTimeout"] @@ -41,14 +45,14 @@ def edit( self, *, zone_id: str, - value: ZonesProxyReadTimeoutParam, + value: ZoneSettingProxyReadTimeoutParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesProxyReadTimeout]: + ) -> Optional[ZoneSettingProxyReadTimeout]: """ Maximum time between two read operations from origin. @@ -77,7 +81,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesProxyReadTimeout]], ResultWrapper[ZonesProxyReadTimeout]), + cast_to=cast(Type[Optional[ZoneSettingProxyReadTimeout]], ResultWrapper[ZoneSettingProxyReadTimeout]), ) def get( @@ -90,7 +94,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesProxyReadTimeout]: + ) -> Optional[ZoneSettingProxyReadTimeout]: """ Maximum time between two read operations from origin. @@ -116,7 +120,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesProxyReadTimeout]], ResultWrapper[ZonesProxyReadTimeout]), + cast_to=cast(Type[Optional[ZoneSettingProxyReadTimeout]], ResultWrapper[ZoneSettingProxyReadTimeout]), ) @@ -133,14 +137,14 @@ async def edit( self, *, zone_id: str, - value: ZonesProxyReadTimeoutParam, + value: ZoneSettingProxyReadTimeoutParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesProxyReadTimeout]: + ) -> Optional[ZoneSettingProxyReadTimeout]: """ Maximum time between two read operations from origin. @@ -171,7 +175,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesProxyReadTimeout]], ResultWrapper[ZonesProxyReadTimeout]), + cast_to=cast(Type[Optional[ZoneSettingProxyReadTimeout]], ResultWrapper[ZoneSettingProxyReadTimeout]), ) async def get( @@ -184,7 +188,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesProxyReadTimeout]: + ) -> Optional[ZoneSettingProxyReadTimeout]: """ Maximum time between two read operations from origin. @@ -210,7 +214,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesProxyReadTimeout]], ResultWrapper[ZonesProxyReadTimeout]), + cast_to=cast(Type[Optional[ZoneSettingProxyReadTimeout]], ResultWrapper[ZoneSettingProxyReadTimeout]), ) diff --git a/src/cloudflare/resources/zones/settings/pseudo_ipv4.py b/src/cloudflare/resources/zones/settings/pseudo_ipv4.py index ec1e9c924dc..ab49ee30256 100644 --- a/src/cloudflare/resources/zones/settings/pseudo_ipv4.py +++ b/src/cloudflare/resources/zones/settings/pseudo_ipv4.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesPseudoIPV4, pseudo_ipv4_edit_params +from ....types.zones.settings import ZoneSettingPseudoIPV4, pseudo_ipv4_edit_params __all__ = ["PseudoIPV4", "AsyncPseudoIPV4"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPseudoIPV4]: + ) -> Optional[ZoneSettingPseudoIPV4]: """ Value of the Pseudo IPv4 setting. @@ -78,7 +78,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPseudoIPV4]], ResultWrapper[ZonesPseudoIPV4]), + cast_to=cast(Type[Optional[ZoneSettingPseudoIPV4]], ResultWrapper[ZoneSettingPseudoIPV4]), ) def get( @@ -91,7 +91,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPseudoIPV4]: + ) -> Optional[ZoneSettingPseudoIPV4]: """ Value of the Pseudo IPv4 setting. @@ -117,7 +117,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPseudoIPV4]], ResultWrapper[ZonesPseudoIPV4]), + cast_to=cast(Type[Optional[ZoneSettingPseudoIPV4]], ResultWrapper[ZoneSettingPseudoIPV4]), ) @@ -141,7 +141,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPseudoIPV4]: + ) -> Optional[ZoneSettingPseudoIPV4]: """ Value of the Pseudo IPv4 setting. @@ -170,7 +170,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPseudoIPV4]], ResultWrapper[ZonesPseudoIPV4]), + cast_to=cast(Type[Optional[ZoneSettingPseudoIPV4]], ResultWrapper[ZoneSettingPseudoIPV4]), ) async def get( @@ -183,7 +183,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesPseudoIPV4]: + ) -> Optional[ZoneSettingPseudoIPV4]: """ Value of the Pseudo IPv4 setting. @@ -209,7 +209,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesPseudoIPV4]], ResultWrapper[ZonesPseudoIPV4]), + cast_to=cast(Type[Optional[ZoneSettingPseudoIPV4]], ResultWrapper[ZoneSettingPseudoIPV4]), ) diff --git a/src/cloudflare/resources/zones/settings/response_buffering.py b/src/cloudflare/resources/zones/settings/response_buffering.py index a24e08c8aa4..041eb425af5 100644 --- a/src/cloudflare/resources/zones/settings/response_buffering.py +++ b/src/cloudflare/resources/zones/settings/response_buffering.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesBuffering, response_buffering_edit_params +from ....types.zones.settings import ZoneSettingBuffering, response_buffering_edit_params __all__ = ["ResponseBuffering", "AsyncResponseBuffering"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBuffering]: + ) -> Optional[ZoneSettingBuffering]: """Enables or disables buffering of responses from the proxied server. Cloudflare @@ -82,7 +82,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBuffering]], ResultWrapper[ZonesBuffering]), + cast_to=cast(Type[Optional[ZoneSettingBuffering]], ResultWrapper[ZoneSettingBuffering]), ) def get( @@ -95,7 +95,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBuffering]: + ) -> Optional[ZoneSettingBuffering]: """Enables or disables buffering of responses from the proxied server. Cloudflare @@ -125,7 +125,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBuffering]], ResultWrapper[ZonesBuffering]), + cast_to=cast(Type[Optional[ZoneSettingBuffering]], ResultWrapper[ZoneSettingBuffering]), ) @@ -149,7 +149,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBuffering]: + ) -> Optional[ZoneSettingBuffering]: """Enables or disables buffering of responses from the proxied server. Cloudflare @@ -184,7 +184,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBuffering]], ResultWrapper[ZonesBuffering]), + cast_to=cast(Type[Optional[ZoneSettingBuffering]], ResultWrapper[ZoneSettingBuffering]), ) async def get( @@ -197,7 +197,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesBuffering]: + ) -> Optional[ZoneSettingBuffering]: """Enables or disables buffering of responses from the proxied server. Cloudflare @@ -227,7 +227,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesBuffering]], ResultWrapper[ZonesBuffering]), + cast_to=cast(Type[Optional[ZoneSettingBuffering]], ResultWrapper[ZoneSettingBuffering]), ) diff --git a/src/cloudflare/resources/zones/settings/rocket_loader.py b/src/cloudflare/resources/zones/settings/rocket_loader.py index 1fdfd09ec30..73b5ddadd6c 100644 --- a/src/cloudflare/resources/zones/settings/rocket_loader.py +++ b/src/cloudflare/resources/zones/settings/rocket_loader.py @@ -23,7 +23,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesRocketLoader, ZonesRocketLoaderParam, rocket_loader_edit_params +from ....types.zones.settings import ZoneSettingRocketLoader, ZoneSettingRocketLoaderParam, rocket_loader_edit_params __all__ = ["RocketLoader", "AsyncRocketLoader"] @@ -41,14 +41,14 @@ def edit( self, *, zone_id: str, - value: ZonesRocketLoaderParam, + value: ZoneSettingRocketLoaderParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesRocketLoader]: + ) -> Optional[ZoneSettingRocketLoader]: """ Rocket Loader is a general-purpose asynchronous JavaScript optimisation that prioritises rendering your content while loading your site's Javascript @@ -95,7 +95,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesRocketLoader]], ResultWrapper[ZonesRocketLoader]), + cast_to=cast(Type[Optional[ZoneSettingRocketLoader]], ResultWrapper[ZoneSettingRocketLoader]), ) def get( @@ -108,7 +108,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesRocketLoader]: + ) -> Optional[ZoneSettingRocketLoader]: """ Rocket Loader is a general-purpose asynchronous JavaScript optimisation that prioritises rendering your content while loading your site's Javascript @@ -143,7 +143,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesRocketLoader]], ResultWrapper[ZonesRocketLoader]), + cast_to=cast(Type[Optional[ZoneSettingRocketLoader]], ResultWrapper[ZoneSettingRocketLoader]), ) @@ -160,14 +160,14 @@ async def edit( self, *, zone_id: str, - value: ZonesRocketLoaderParam, + value: ZoneSettingRocketLoaderParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesRocketLoader]: + ) -> Optional[ZoneSettingRocketLoader]: """ Rocket Loader is a general-purpose asynchronous JavaScript optimisation that prioritises rendering your content while loading your site's Javascript @@ -214,7 +214,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesRocketLoader]], ResultWrapper[ZonesRocketLoader]), + cast_to=cast(Type[Optional[ZoneSettingRocketLoader]], ResultWrapper[ZoneSettingRocketLoader]), ) async def get( @@ -227,7 +227,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesRocketLoader]: + ) -> Optional[ZoneSettingRocketLoader]: """ Rocket Loader is a general-purpose asynchronous JavaScript optimisation that prioritises rendering your content while loading your site's Javascript @@ -262,7 +262,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesRocketLoader]], ResultWrapper[ZonesRocketLoader]), + cast_to=cast(Type[Optional[ZoneSettingRocketLoader]], ResultWrapper[ZoneSettingRocketLoader]), ) diff --git a/src/cloudflare/resources/zones/settings/security_headers.py b/src/cloudflare/resources/zones/settings/security_headers.py index 60af7822510..88fcd7d0bab 100644 --- a/src/cloudflare/resources/zones/settings/security_headers.py +++ b/src/cloudflare/resources/zones/settings/security_headers.py @@ -23,7 +23,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesSecurityHeader, security_header_edit_params +from ....types.zones.settings import ZoneSettingSecurityHeader, security_header_edit_params __all__ = ["SecurityHeaders", "AsyncSecurityHeaders"] @@ -48,7 +48,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSecurityHeader]: + ) -> Optional[ZoneSettingSecurityHeader]: """ Cloudflare security header for a zone. @@ -75,7 +75,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSecurityHeader]], ResultWrapper[ZonesSecurityHeader]), + cast_to=cast(Type[Optional[ZoneSettingSecurityHeader]], ResultWrapper[ZoneSettingSecurityHeader]), ) def get( @@ -88,7 +88,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSecurityHeader]: + ) -> Optional[ZoneSettingSecurityHeader]: """ Cloudflare security header for a zone. @@ -114,7 +114,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSecurityHeader]], ResultWrapper[ZonesSecurityHeader]), + cast_to=cast(Type[Optional[ZoneSettingSecurityHeader]], ResultWrapper[ZoneSettingSecurityHeader]), ) @@ -138,7 +138,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSecurityHeader]: + ) -> Optional[ZoneSettingSecurityHeader]: """ Cloudflare security header for a zone. @@ -165,7 +165,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSecurityHeader]], ResultWrapper[ZonesSecurityHeader]), + cast_to=cast(Type[Optional[ZoneSettingSecurityHeader]], ResultWrapper[ZoneSettingSecurityHeader]), ) async def get( @@ -178,7 +178,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSecurityHeader]: + ) -> Optional[ZoneSettingSecurityHeader]: """ Cloudflare security header for a zone. @@ -204,7 +204,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSecurityHeader]], ResultWrapper[ZonesSecurityHeader]), + cast_to=cast(Type[Optional[ZoneSettingSecurityHeader]], ResultWrapper[ZoneSettingSecurityHeader]), ) diff --git a/src/cloudflare/resources/zones/settings/security_level.py b/src/cloudflare/resources/zones/settings/security_level.py index 6e0ad7e646e..a5d0c78ed39 100644 --- a/src/cloudflare/resources/zones/settings/security_level.py +++ b/src/cloudflare/resources/zones/settings/security_level.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesSecurityLevel, security_level_edit_params +from ....types.zones.settings import ZoneSettingSecurityLevel, security_level_edit_params __all__ = ["SecurityLevel", "AsyncSecurityLevel"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSecurityLevel]: + ) -> Optional[ZoneSettingSecurityLevel]: """ Choose the appropriate security profile for your website, which will automatically adjust each of the security settings. If you choose to customize @@ -81,7 +81,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSecurityLevel]], ResultWrapper[ZonesSecurityLevel]), + cast_to=cast(Type[Optional[ZoneSettingSecurityLevel]], ResultWrapper[ZoneSettingSecurityLevel]), ) def get( @@ -94,7 +94,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSecurityLevel]: + ) -> Optional[ZoneSettingSecurityLevel]: """ Choose the appropriate security profile for your website, which will automatically adjust each of the security settings. If you choose to customize @@ -123,7 +123,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSecurityLevel]], ResultWrapper[ZonesSecurityLevel]), + cast_to=cast(Type[Optional[ZoneSettingSecurityLevel]], ResultWrapper[ZoneSettingSecurityLevel]), ) @@ -147,7 +147,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSecurityLevel]: + ) -> Optional[ZoneSettingSecurityLevel]: """ Choose the appropriate security profile for your website, which will automatically adjust each of the security settings. If you choose to customize @@ -179,7 +179,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSecurityLevel]], ResultWrapper[ZonesSecurityLevel]), + cast_to=cast(Type[Optional[ZoneSettingSecurityLevel]], ResultWrapper[ZoneSettingSecurityLevel]), ) async def get( @@ -192,7 +192,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSecurityLevel]: + ) -> Optional[ZoneSettingSecurityLevel]: """ Choose the appropriate security profile for your website, which will automatically adjust each of the security settings. If you choose to customize @@ -221,7 +221,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSecurityLevel]], ResultWrapper[ZonesSecurityLevel]), + cast_to=cast(Type[Optional[ZoneSettingSecurityLevel]], ResultWrapper[ZoneSettingSecurityLevel]), ) diff --git a/src/cloudflare/resources/zones/settings/server_side_excludes.py b/src/cloudflare/resources/zones/settings/server_side_excludes.py index f5e9f271cdc..27502785358 100644 --- a/src/cloudflare/resources/zones/settings/server_side_excludes.py +++ b/src/cloudflare/resources/zones/settings/server_side_excludes.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesServerSideExclude, server_side_exclude_edit_params +from ....types.zones.settings import ZoneSettingServerSideExclude, server_side_exclude_edit_params __all__ = ["ServerSideExcludes", "AsyncServerSideExcludes"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesServerSideExclude]: + ) -> Optional[ZoneSettingServerSideExclude]: """ If there is sensitive content on your website that you want visible to real visitors, but that you want to hide from suspicious visitors, all you have to do @@ -88,7 +88,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesServerSideExclude]], ResultWrapper[ZonesServerSideExclude]), + cast_to=cast(Type[Optional[ZoneSettingServerSideExclude]], ResultWrapper[ZoneSettingServerSideExclude]), ) def get( @@ -101,7 +101,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesServerSideExclude]: + ) -> Optional[ZoneSettingServerSideExclude]: """ If there is sensitive content on your website that you want visible to real visitors, but that you want to hide from suspicious visitors, all you have to do @@ -137,7 +137,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesServerSideExclude]], ResultWrapper[ZonesServerSideExclude]), + cast_to=cast(Type[Optional[ZoneSettingServerSideExclude]], ResultWrapper[ZoneSettingServerSideExclude]), ) @@ -161,7 +161,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesServerSideExclude]: + ) -> Optional[ZoneSettingServerSideExclude]: """ If there is sensitive content on your website that you want visible to real visitors, but that you want to hide from suspicious visitors, all you have to do @@ -202,7 +202,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesServerSideExclude]], ResultWrapper[ZonesServerSideExclude]), + cast_to=cast(Type[Optional[ZoneSettingServerSideExclude]], ResultWrapper[ZoneSettingServerSideExclude]), ) async def get( @@ -215,7 +215,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesServerSideExclude]: + ) -> Optional[ZoneSettingServerSideExclude]: """ If there is sensitive content on your website that you want visible to real visitors, but that you want to hide from suspicious visitors, all you have to do @@ -251,7 +251,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesServerSideExclude]], ResultWrapper[ZonesServerSideExclude]), + cast_to=cast(Type[Optional[ZoneSettingServerSideExclude]], ResultWrapper[ZoneSettingServerSideExclude]), ) diff --git a/src/cloudflare/resources/zones/settings/sort_query_string_for_cache.py b/src/cloudflare/resources/zones/settings/sort_query_string_for_cache.py index 677bccc7c81..cfb80498265 100644 --- a/src/cloudflare/resources/zones/settings/sort_query_string_for_cache.py +++ b/src/cloudflare/resources/zones/settings/sort_query_string_for_cache.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesSortQueryStringForCache, sort_query_string_for_cache_edit_params +from ....types.zones.settings import ZoneSettingSortQueryStringForCache, sort_query_string_for_cache_edit_params __all__ = ["SortQueryStringForCache", "AsyncSortQueryStringForCache"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSortQueryStringForCache]: + ) -> Optional[ZoneSettingSortQueryStringForCache]: """ Cloudflare will treat files with the same query strings as the same file in cache, regardless of the order of the query strings. This is limited to @@ -82,7 +82,9 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSortQueryStringForCache]], ResultWrapper[ZonesSortQueryStringForCache]), + cast_to=cast( + Type[Optional[ZoneSettingSortQueryStringForCache]], ResultWrapper[ZoneSettingSortQueryStringForCache] + ), ) def get( @@ -95,7 +97,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSortQueryStringForCache]: + ) -> Optional[ZoneSettingSortQueryStringForCache]: """ Cloudflare will treat files with the same query strings as the same file in cache, regardless of the order of the query strings. This is limited to @@ -123,7 +125,9 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSortQueryStringForCache]], ResultWrapper[ZonesSortQueryStringForCache]), + cast_to=cast( + Type[Optional[ZoneSettingSortQueryStringForCache]], ResultWrapper[ZoneSettingSortQueryStringForCache] + ), ) @@ -147,7 +151,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSortQueryStringForCache]: + ) -> Optional[ZoneSettingSortQueryStringForCache]: """ Cloudflare will treat files with the same query strings as the same file in cache, regardless of the order of the query strings. This is limited to @@ -180,7 +184,9 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSortQueryStringForCache]], ResultWrapper[ZonesSortQueryStringForCache]), + cast_to=cast( + Type[Optional[ZoneSettingSortQueryStringForCache]], ResultWrapper[ZoneSettingSortQueryStringForCache] + ), ) async def get( @@ -193,7 +199,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSortQueryStringForCache]: + ) -> Optional[ZoneSettingSortQueryStringForCache]: """ Cloudflare will treat files with the same query strings as the same file in cache, regardless of the order of the query strings. This is limited to @@ -221,7 +227,9 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSortQueryStringForCache]], ResultWrapper[ZonesSortQueryStringForCache]), + cast_to=cast( + Type[Optional[ZoneSettingSortQueryStringForCache]], ResultWrapper[ZoneSettingSortQueryStringForCache] + ), ) diff --git a/src/cloudflare/resources/zones/settings/ssl.py b/src/cloudflare/resources/zones/settings/ssl.py index c08cfe7797e..56c95e74fea 100644 --- a/src/cloudflare/resources/zones/settings/ssl.py +++ b/src/cloudflare/resources/zones/settings/ssl.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesSSL, ssl_edit_params +from ....types.zones.settings import ZoneSettingSSL, ssl_edit_params __all__ = ["SSL", "AsyncSSL"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSSL]: + ) -> Optional[ZoneSettingSSL]: """ SSL encrypts your visitor's connection and safeguards credit card numbers and other personal data to and from your website. SSL can take up to 5 minutes to @@ -93,7 +93,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSSL]], ResultWrapper[ZonesSSL]), + cast_to=cast(Type[Optional[ZoneSettingSSL]], ResultWrapper[ZoneSettingSSL]), ) def get( @@ -106,7 +106,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSSL]: + ) -> Optional[ZoneSettingSSL]: """ SSL encrypts your visitor's connection and safeguards credit card numbers and other personal data to and from your website. SSL can take up to 5 minutes to @@ -147,7 +147,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSSL]], ResultWrapper[ZonesSSL]), + cast_to=cast(Type[Optional[ZoneSettingSSL]], ResultWrapper[ZoneSettingSSL]), ) @@ -171,7 +171,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSSL]: + ) -> Optional[ZoneSettingSSL]: """ SSL encrypts your visitor's connection and safeguards credit card numbers and other personal data to and from your website. SSL can take up to 5 minutes to @@ -215,7 +215,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSSL]], ResultWrapper[ZonesSSL]), + cast_to=cast(Type[Optional[ZoneSettingSSL]], ResultWrapper[ZoneSettingSSL]), ) async def get( @@ -228,7 +228,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSSL]: + ) -> Optional[ZoneSettingSSL]: """ SSL encrypts your visitor's connection and safeguards credit card numbers and other personal data to and from your website. SSL can take up to 5 minutes to @@ -269,7 +269,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSSL]], ResultWrapper[ZonesSSL]), + cast_to=cast(Type[Optional[ZoneSettingSSL]], ResultWrapper[ZoneSettingSSL]), ) diff --git a/src/cloudflare/resources/zones/settings/ssl_recommender.py b/src/cloudflare/resources/zones/settings/ssl_recommender.py index 8bf548423b3..8ec9470c556 100644 --- a/src/cloudflare/resources/zones/settings/ssl_recommender.py +++ b/src/cloudflare/resources/zones/settings/ssl_recommender.py @@ -23,7 +23,11 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesSSLRecommender, ZonesSSLRecommenderParam, ssl_recommender_edit_params +from ....types.zones.settings import ( + ZoneSettingSSLRecommender, + ZoneSettingSSLRecommenderParam, + ssl_recommender_edit_params, +) __all__ = ["SSLRecommender", "AsyncSSLRecommender"] @@ -41,14 +45,14 @@ def edit( self, *, zone_id: str, - value: ZonesSSLRecommenderParam, + value: ZoneSettingSSLRecommenderParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSSLRecommender]: + ) -> Optional[ZoneSettingSSLRecommender]: """ Enrollment in the SSL/TLS Recommender service which tries to detect and recommend (by sending periodic emails) the most secure SSL/TLS setting your @@ -81,7 +85,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSSLRecommender]], ResultWrapper[ZonesSSLRecommender]), + cast_to=cast(Type[Optional[ZoneSettingSSLRecommender]], ResultWrapper[ZoneSettingSSLRecommender]), ) def get( @@ -94,7 +98,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSSLRecommender]: + ) -> Optional[ZoneSettingSSLRecommender]: """ Enrollment in the SSL/TLS Recommender service which tries to detect and recommend (by sending periodic emails) the most secure SSL/TLS setting your @@ -122,7 +126,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSSLRecommender]], ResultWrapper[ZonesSSLRecommender]), + cast_to=cast(Type[Optional[ZoneSettingSSLRecommender]], ResultWrapper[ZoneSettingSSLRecommender]), ) @@ -139,14 +143,14 @@ async def edit( self, *, zone_id: str, - value: ZonesSSLRecommenderParam, + value: ZoneSettingSSLRecommenderParam, # Use the following arguments if you need to pass additional parameters to the API that aren't available via kwargs. # The extra values given here take precedence over values defined on the client or passed to this method. extra_headers: Headers | None = None, extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSSLRecommender]: + ) -> Optional[ZoneSettingSSLRecommender]: """ Enrollment in the SSL/TLS Recommender service which tries to detect and recommend (by sending periodic emails) the most secure SSL/TLS setting your @@ -179,7 +183,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSSLRecommender]], ResultWrapper[ZonesSSLRecommender]), + cast_to=cast(Type[Optional[ZoneSettingSSLRecommender]], ResultWrapper[ZoneSettingSSLRecommender]), ) async def get( @@ -192,7 +196,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesSSLRecommender]: + ) -> Optional[ZoneSettingSSLRecommender]: """ Enrollment in the SSL/TLS Recommender service which tries to detect and recommend (by sending periodic emails) the most secure SSL/TLS setting your @@ -220,7 +224,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesSSLRecommender]], ResultWrapper[ZonesSSLRecommender]), + cast_to=cast(Type[Optional[ZoneSettingSSLRecommender]], ResultWrapper[ZoneSettingSSLRecommender]), ) diff --git a/src/cloudflare/resources/zones/settings/tls_1_3.py b/src/cloudflare/resources/zones/settings/tls_1_3.py index d5b3a53ce57..c928cb1581a 100644 --- a/src/cloudflare/resources/zones/settings/tls_1_3.py +++ b/src/cloudflare/resources/zones/settings/tls_1_3.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesTLS1_3, tls_1_3_edit_params +from ....types.zones.settings import ZoneSettingTLS1_3, tls_1_3_edit_params __all__ = ["TLS1_3", "AsyncTLS1_3"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTLS1_3]: + ) -> Optional[ZoneSettingTLS1_3]: """ Changes TLS 1.3 setting. @@ -79,7 +79,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTLS1_3]], ResultWrapper[ZonesTLS1_3]), + cast_to=cast(Type[Optional[ZoneSettingTLS1_3]], ResultWrapper[ZoneSettingTLS1_3]), ) def get( @@ -92,7 +92,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTLS1_3]: + ) -> Optional[ZoneSettingTLS1_3]: """ Gets TLS 1.3 setting enabled for a zone. @@ -118,7 +118,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTLS1_3]], ResultWrapper[ZonesTLS1_3]), + cast_to=cast(Type[Optional[ZoneSettingTLS1_3]], ResultWrapper[ZoneSettingTLS1_3]), ) @@ -142,7 +142,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTLS1_3]: + ) -> Optional[ZoneSettingTLS1_3]: """ Changes TLS 1.3 setting. @@ -172,7 +172,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTLS1_3]], ResultWrapper[ZonesTLS1_3]), + cast_to=cast(Type[Optional[ZoneSettingTLS1_3]], ResultWrapper[ZoneSettingTLS1_3]), ) async def get( @@ -185,7 +185,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTLS1_3]: + ) -> Optional[ZoneSettingTLS1_3]: """ Gets TLS 1.3 setting enabled for a zone. @@ -211,7 +211,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTLS1_3]], ResultWrapper[ZonesTLS1_3]), + cast_to=cast(Type[Optional[ZoneSettingTLS1_3]], ResultWrapper[ZoneSettingTLS1_3]), ) diff --git a/src/cloudflare/resources/zones/settings/tls_client_auth.py b/src/cloudflare/resources/zones/settings/tls_client_auth.py index 3a7f051793a..e54e66bebe8 100644 --- a/src/cloudflare/resources/zones/settings/tls_client_auth.py +++ b/src/cloudflare/resources/zones/settings/tls_client_auth.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesTLSClientAuth, tls_client_auth_edit_params +from ....types.zones.settings import ZoneSettingTLSClientAuth, tls_client_auth_edit_params __all__ = ["TLSClientAuth", "AsyncTLSClientAuth"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTLSClientAuth]: + ) -> Optional[ZoneSettingTLSClientAuth]: """ TLS Client Auth requires Cloudflare to connect to your origin server using a client certificate (Enterprise Only). @@ -79,7 +79,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTLSClientAuth]], ResultWrapper[ZonesTLSClientAuth]), + cast_to=cast(Type[Optional[ZoneSettingTLSClientAuth]], ResultWrapper[ZoneSettingTLSClientAuth]), ) def get( @@ -92,7 +92,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTLSClientAuth]: + ) -> Optional[ZoneSettingTLSClientAuth]: """ TLS Client Auth requires Cloudflare to connect to your origin server using a client certificate (Enterprise Only). @@ -119,7 +119,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTLSClientAuth]], ResultWrapper[ZonesTLSClientAuth]), + cast_to=cast(Type[Optional[ZoneSettingTLSClientAuth]], ResultWrapper[ZoneSettingTLSClientAuth]), ) @@ -143,7 +143,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTLSClientAuth]: + ) -> Optional[ZoneSettingTLSClientAuth]: """ TLS Client Auth requires Cloudflare to connect to your origin server using a client certificate (Enterprise Only). @@ -173,7 +173,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTLSClientAuth]], ResultWrapper[ZonesTLSClientAuth]), + cast_to=cast(Type[Optional[ZoneSettingTLSClientAuth]], ResultWrapper[ZoneSettingTLSClientAuth]), ) async def get( @@ -186,7 +186,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTLSClientAuth]: + ) -> Optional[ZoneSettingTLSClientAuth]: """ TLS Client Auth requires Cloudflare to connect to your origin server using a client certificate (Enterprise Only). @@ -213,7 +213,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTLSClientAuth]], ResultWrapper[ZonesTLSClientAuth]), + cast_to=cast(Type[Optional[ZoneSettingTLSClientAuth]], ResultWrapper[ZoneSettingTLSClientAuth]), ) diff --git a/src/cloudflare/resources/zones/settings/true_client_ip_header.py b/src/cloudflare/resources/zones/settings/true_client_ip_header.py index aa2f197f54e..20b9b22963d 100644 --- a/src/cloudflare/resources/zones/settings/true_client_ip_header.py +++ b/src/cloudflare/resources/zones/settings/true_client_ip_header.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesTrueClientIPHeader, true_client_ip_header_edit_params +from ....types.zones.settings import ZoneSettingTrueClientIPHeader, true_client_ip_header_edit_params __all__ = ["TrueClientIPHeader", "AsyncTrueClientIPHeader"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTrueClientIPHeader]: + ) -> Optional[ZoneSettingTrueClientIPHeader]: """ Allows customer to continue to use True Client IP (Akamai feature) in the headers we send to the origin. This is limited to Enterprise Zones. @@ -79,7 +79,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTrueClientIPHeader]], ResultWrapper[ZonesTrueClientIPHeader]), + cast_to=cast(Type[Optional[ZoneSettingTrueClientIPHeader]], ResultWrapper[ZoneSettingTrueClientIPHeader]), ) def get( @@ -92,7 +92,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTrueClientIPHeader]: + ) -> Optional[ZoneSettingTrueClientIPHeader]: """ Allows customer to continue to use True Client IP (Akamai feature) in the headers we send to the origin. This is limited to Enterprise Zones. @@ -119,7 +119,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTrueClientIPHeader]], ResultWrapper[ZonesTrueClientIPHeader]), + cast_to=cast(Type[Optional[ZoneSettingTrueClientIPHeader]], ResultWrapper[ZoneSettingTrueClientIPHeader]), ) @@ -143,7 +143,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTrueClientIPHeader]: + ) -> Optional[ZoneSettingTrueClientIPHeader]: """ Allows customer to continue to use True Client IP (Akamai feature) in the headers we send to the origin. This is limited to Enterprise Zones. @@ -175,7 +175,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTrueClientIPHeader]], ResultWrapper[ZonesTrueClientIPHeader]), + cast_to=cast(Type[Optional[ZoneSettingTrueClientIPHeader]], ResultWrapper[ZoneSettingTrueClientIPHeader]), ) async def get( @@ -188,7 +188,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesTrueClientIPHeader]: + ) -> Optional[ZoneSettingTrueClientIPHeader]: """ Allows customer to continue to use True Client IP (Akamai feature) in the headers we send to the origin. This is limited to Enterprise Zones. @@ -215,7 +215,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesTrueClientIPHeader]], ResultWrapper[ZonesTrueClientIPHeader]), + cast_to=cast(Type[Optional[ZoneSettingTrueClientIPHeader]], ResultWrapper[ZoneSettingTrueClientIPHeader]), ) diff --git a/src/cloudflare/resources/zones/settings/waf.py b/src/cloudflare/resources/zones/settings/waf.py index 68097b84f36..542ffe9f82e 100644 --- a/src/cloudflare/resources/zones/settings/waf.py +++ b/src/cloudflare/resources/zones/settings/waf.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesWAF, waf_edit_params +from ....types.zones.settings import ZoneSettingWAF, waf_edit_params __all__ = ["WAF", "AsyncWAF"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWAF]: + ) -> Optional[ZoneSettingWAF]: """The WAF examines HTTP requests to your website. It inspects both GET and POST @@ -88,7 +88,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWAF]], ResultWrapper[ZonesWAF]), + cast_to=cast(Type[Optional[ZoneSettingWAF]], ResultWrapper[ZoneSettingWAF]), ) def get( @@ -101,7 +101,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWAF]: + ) -> Optional[ZoneSettingWAF]: """The WAF examines HTTP requests to your website. It inspects both GET and POST @@ -137,7 +137,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWAF]], ResultWrapper[ZonesWAF]), + cast_to=cast(Type[Optional[ZoneSettingWAF]], ResultWrapper[ZoneSettingWAF]), ) @@ -161,7 +161,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWAF]: + ) -> Optional[ZoneSettingWAF]: """The WAF examines HTTP requests to your website. It inspects both GET and POST @@ -200,7 +200,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWAF]], ResultWrapper[ZonesWAF]), + cast_to=cast(Type[Optional[ZoneSettingWAF]], ResultWrapper[ZoneSettingWAF]), ) async def get( @@ -213,7 +213,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWAF]: + ) -> Optional[ZoneSettingWAF]: """The WAF examines HTTP requests to your website. It inspects both GET and POST @@ -249,7 +249,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWAF]], ResultWrapper[ZonesWAF]), + cast_to=cast(Type[Optional[ZoneSettingWAF]], ResultWrapper[ZoneSettingWAF]), ) diff --git a/src/cloudflare/resources/zones/settings/webp.py b/src/cloudflare/resources/zones/settings/webp.py index fa6411e35e4..78ec7612555 100644 --- a/src/cloudflare/resources/zones/settings/webp.py +++ b/src/cloudflare/resources/zones/settings/webp.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesWebP, webp_edit_params +from ....types.zones.settings import ZoneSettingWebP, webp_edit_params __all__ = ["WebP", "AsyncWebP"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWebP]: + ) -> Optional[ZoneSettingWebP]: """ When the client requesting the image supports the WebP image codec, and WebP offers a performance advantage over the original image format, Cloudflare will @@ -80,7 +80,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWebP]], ResultWrapper[ZonesWebP]), + cast_to=cast(Type[Optional[ZoneSettingWebP]], ResultWrapper[ZoneSettingWebP]), ) def get( @@ -93,7 +93,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWebP]: + ) -> Optional[ZoneSettingWebP]: """ When the client requesting the image supports the WebP image codec, and WebP offers a performance advantage over the original image format, Cloudflare will @@ -121,7 +121,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWebP]], ResultWrapper[ZonesWebP]), + cast_to=cast(Type[Optional[ZoneSettingWebP]], ResultWrapper[ZoneSettingWebP]), ) @@ -145,7 +145,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWebP]: + ) -> Optional[ZoneSettingWebP]: """ When the client requesting the image supports the WebP image codec, and WebP offers a performance advantage over the original image format, Cloudflare will @@ -176,7 +176,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWebP]], ResultWrapper[ZonesWebP]), + cast_to=cast(Type[Optional[ZoneSettingWebP]], ResultWrapper[ZoneSettingWebP]), ) async def get( @@ -189,7 +189,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWebP]: + ) -> Optional[ZoneSettingWebP]: """ When the client requesting the image supports the WebP image codec, and WebP offers a performance advantage over the original image format, Cloudflare will @@ -217,7 +217,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWebP]], ResultWrapper[ZonesWebP]), + cast_to=cast(Type[Optional[ZoneSettingWebP]], ResultWrapper[ZoneSettingWebP]), ) diff --git a/src/cloudflare/resources/zones/settings/websocket.py b/src/cloudflare/resources/zones/settings/websocket.py index 1798467fca7..68b4940c9fd 100644 --- a/src/cloudflare/resources/zones/settings/websocket.py +++ b/src/cloudflare/resources/zones/settings/websocket.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import ZonesWebsockets, websocket_edit_params +from ....types.zones.settings import ZoneSettingWebsockets, websocket_edit_params __all__ = ["Websocket", "AsyncWebsocket"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWebsockets]: + ) -> Optional[ZoneSettingWebsockets]: """Changes Websockets setting. For more information about Websockets, please refer @@ -81,7 +81,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWebsockets]], ResultWrapper[ZonesWebsockets]), + cast_to=cast(Type[Optional[ZoneSettingWebsockets]], ResultWrapper[ZoneSettingWebsockets]), ) def get( @@ -94,7 +94,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWebsockets]: + ) -> Optional[ZoneSettingWebsockets]: """Gets Websockets setting. For more information about Websockets, please refer to @@ -122,7 +122,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWebsockets]], ResultWrapper[ZonesWebsockets]), + cast_to=cast(Type[Optional[ZoneSettingWebsockets]], ResultWrapper[ZoneSettingWebsockets]), ) @@ -146,7 +146,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWebsockets]: + ) -> Optional[ZoneSettingWebsockets]: """Changes Websockets setting. For more information about Websockets, please refer @@ -178,7 +178,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWebsockets]], ResultWrapper[ZonesWebsockets]), + cast_to=cast(Type[Optional[ZoneSettingWebsockets]], ResultWrapper[ZoneSettingWebsockets]), ) async def get( @@ -191,7 +191,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[ZonesWebsockets]: + ) -> Optional[ZoneSettingWebsockets]: """Gets Websockets setting. For more information about Websockets, please refer to @@ -219,7 +219,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[ZonesWebsockets]], ResultWrapper[ZonesWebsockets]), + cast_to=cast(Type[Optional[ZoneSettingWebsockets]], ResultWrapper[ZoneSettingWebsockets]), ) diff --git a/src/cloudflare/resources/zones/settings/zero_rtt.py b/src/cloudflare/resources/zones/settings/zero_rtt.py index 069a81a55d4..9f47865ed16 100644 --- a/src/cloudflare/resources/zones/settings/zero_rtt.py +++ b/src/cloudflare/resources/zones/settings/zero_rtt.py @@ -24,7 +24,7 @@ from ...._base_client import ( make_request_options, ) -from ....types.zones.settings import Zones0rtt, zero_rtt_edit_params +from ....types.zones.settings import ZoneSetting0rtt, zero_rtt_edit_params __all__ = ["ZeroRTT", "AsyncZeroRTT"] @@ -49,7 +49,7 @@ def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[Zones0rtt]: + ) -> Optional[ZoneSetting0rtt]: """ Changes the 0-RTT session resumption setting. @@ -78,7 +78,7 @@ def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[Zones0rtt]], ResultWrapper[Zones0rtt]), + cast_to=cast(Type[Optional[ZoneSetting0rtt]], ResultWrapper[ZoneSetting0rtt]), ) def get( @@ -91,7 +91,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[Zones0rtt]: + ) -> Optional[ZoneSetting0rtt]: """ Gets 0-RTT session resumption setting. @@ -117,7 +117,7 @@ def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[Zones0rtt]], ResultWrapper[Zones0rtt]), + cast_to=cast(Type[Optional[ZoneSetting0rtt]], ResultWrapper[ZoneSetting0rtt]), ) @@ -141,7 +141,7 @@ async def edit( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[Zones0rtt]: + ) -> Optional[ZoneSetting0rtt]: """ Changes the 0-RTT session resumption setting. @@ -170,7 +170,7 @@ async def edit( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[Zones0rtt]], ResultWrapper[Zones0rtt]), + cast_to=cast(Type[Optional[ZoneSetting0rtt]], ResultWrapper[ZoneSetting0rtt]), ) async def get( @@ -183,7 +183,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[Zones0rtt]: + ) -> Optional[ZoneSetting0rtt]: """ Gets 0-RTT session resumption setting. @@ -209,7 +209,7 @@ async def get( timeout=timeout, post_parser=ResultWrapper._unwrapper, ), - cast_to=cast(Type[Optional[Zones0rtt]], ResultWrapper[Zones0rtt]), + cast_to=cast(Type[Optional[ZoneSetting0rtt]], ResultWrapper[ZoneSetting0rtt]), ) diff --git a/src/cloudflare/types/__init__.py b/src/cloudflare/types/__init__.py index 302dcfb7a30..743bd7b3600 100644 --- a/src/cloudflare/types/__init__.py +++ b/src/cloudflare/types/__init__.py @@ -4,22 +4,26 @@ from .ips import IPs as IPs from .zone import Zone as Zone +from .dnssec import DNSSEC as DNSSEC from .shared import ErrorData as ErrorData from .account import Account as Account from .snippet import Snippet as Snippet from .calls_app import CallsApp as CallsApp from .membership import Membership as Membership +from .healthcheck import Healthcheck as Healthcheck from .jdcloud_ips import JDCloudIPs as JDCloudIPs -from .dnssec_dnssec import DNSSECDNSSEC as DNSSECDNSSEC +from .waiting_room import WaitingRoom as WaitingRoom from .load_balancer import LoadBalancer as LoadBalancer from .stream_videos import StreamVideos as StreamVideos from .ip_list_params import IPListParams as IPListParams -from .zones_page_rule import ZonesPageRule as ZonesPageRule +from .zones_pagerule import ZonesPagerule as ZonesPagerule +from .firewall_filter import FirewallFilter as FirewallFilter from .ip_list_response import IPListResponse as IPListResponse +from .mtls_certificate import MTLSCertificate as MTLSCertificate from .user_edit_params import UserEditParams as UserEditParams from .zone_edit_params import ZoneEditParams as ZoneEditParams from .zone_list_params import ZoneListParams as ZoneListParams -from .legacy_jhs_filter import LegacyJhsFilter as LegacyJhsFilter +from .custom_nameserver import CustomNameserver as CustomNameserver from .observatory_trend import ObservatoryTrend as ObservatoryTrend from .pcap_get_response import PCAPGetResponse as PCAPGetResponse from .user_get_response import UserGetResponse as UserGetResponse @@ -27,6 +31,8 @@ from .call_create_params import CallCreateParams as CallCreateParams from .call_list_response import CallListResponse as CallListResponse from .call_update_params import CallUpdateParams as CallUpdateParams +from .client_certificate import ClientCertificate as ClientCertificate +from .custom_certificate import CustomCertificate as CustomCertificate from .dnssec_edit_params import DNSSECEditParams as DNSSECEditParams from .filter_list_params import FilterListParams as FilterListParams from .pcap_create_params import PCAPCreateParams as PCAPCreateParams @@ -37,6 +43,8 @@ from .user_edit_response import UserEditResponse as UserEditResponse from .zone_create_params import ZoneCreateParams as ZoneCreateParams from .account_list_params import AccountListParams as AccountListParams +from .available_rate_plan import AvailableRatePlan as AvailableRatePlan +from .page_shield_setting import PageShieldSetting as PageShieldSetting from .queue_create_params import QueueCreateParams as QueueCreateParams from .queue_list_response import QueueListResponse as QueueListResponse from .queue_update_params import QueueUpdateParams as QueueUpdateParams @@ -79,10 +87,10 @@ from .healthcheck_edit_params import HealthcheckEditParams as HealthcheckEditParams from .intel_phishing_url_info import IntelPhishingURLInfo as IntelPhishingURLInfo from .membership_get_response import MembershipGetResponse as MembershipGetResponse +from .mtls_certificate_update import MTLSCertificateUpdate as MTLSCertificateUpdate from .rate_limit_get_response import RateLimitGetResponse as RateLimitGetResponse from .snippet_delete_response import SnippetDeleteResponse as SnippetDeleteResponse from .url_scanner_scan_params import URLScannerScanParams as URLScannerScanParams -from .waitingroom_waitingroom import WaitingroomWaitingroom as WaitingroomWaitingroom from .membership_update_params import MembershipUpdateParams as MembershipUpdateParams from .pagerule_create_response import PageruleCreateResponse as PageruleCreateResponse from .pagerule_delete_response import PageruleDeleteResponse as PageruleDeleteResponse @@ -95,7 +103,6 @@ from .healthcheck_create_params import HealthcheckCreateParams as HealthcheckCreateParams from .healthcheck_list_response import HealthcheckListResponse as HealthcheckListResponse from .healthcheck_update_params import HealthcheckUpdateParams as HealthcheckUpdateParams -from .healthchecks_healthchecks import HealthchecksHealthchecks as HealthchecksHealthchecks from .intel_phishing_url_submit import IntelPhishingURLSubmit as IntelPhishingURLSubmit from .load_balancer_edit_params import LoadBalancerEditParams as LoadBalancerEditParams from .page_shield_update_params import PageShieldUpdateParams as PageShieldUpdateParams @@ -125,9 +132,11 @@ from .load_balancer_create_params import LoadBalancerCreateParams as LoadBalancerCreateParams from .load_balancer_list_response import LoadBalancerListResponse as LoadBalancerListResponse from .load_balancer_update_params import LoadBalancerUpdateParams as LoadBalancerUpdateParams +from .page_shield_update_response import PageShieldUpdateResponse as PageShieldUpdateResponse from .warp_connector_get_response import WARPConnectorGetResponse as WARPConnectorGetResponse from .bot_management_update_params import BotManagementUpdateParams as BotManagementUpdateParams from .custom_hostname_get_response import CustomHostnameGetResponse as CustomHostnameGetResponse +from .keyless_certificate_hostname import KeylessCertificateHostname as KeylessCertificateHostname from .managed_header_edit_response import ManagedHeaderEditResponse as ManagedHeaderEditResponse from .managed_header_list_response import ManagedHeaderListResponse as ManagedHeaderListResponse from .subscription_create_response import SubscriptionCreateResponse as SubscriptionCreateResponse @@ -143,7 +152,6 @@ from .custom_hostname_list_response import CustomHostnameListResponse as CustomHostnameListResponse from .email_routing_enable_response import EmailRoutingEnableResponse as EmailRoutingEnableResponse from .load_balancer_delete_response import LoadBalancerDeleteResponse as LoadBalancerDeleteResponse -from .page_shield_get_zone_settings import PageShieldGetZoneSettings as PageShieldGetZoneSettings from .warp_connector_token_response import WARPConnectorTokenResponse as WARPConnectorTokenResponse from .bot_management_update_response import BotManagementUpdateResponse as BotManagementUpdateResponse from .brand_protection_submit_params import BrandProtectionSubmitParams as BrandProtectionSubmitParams @@ -167,9 +175,6 @@ from .client_certificate_create_params import ClientCertificateCreateParams as ClientCertificateCreateParams from .custom_certificate_create_params import CustomCertificateCreateParams as CustomCertificateCreateParams from .custom_certificate_edit_response import CustomCertificateEditResponse as CustomCertificateEditResponse -from .dns_custom_nameservers_custom_ns import DNSCustomNameserversCustomNS as DNSCustomNameserversCustomNS -from .page_shield_update_zone_settings import PageShieldUpdateZoneSettings as PageShieldUpdateZoneSettings -from .bill_subs_api_available_rate_plan import BillSubsAPIAvailableRatePlan as BillSubsAPIAvailableRatePlan from .custom_nameserver_delete_response import CustomNameserverDeleteResponse as CustomNameserverDeleteResponse from .custom_nameserver_verify_response import CustomNameserverVerifyResponse as CustomNameserverVerifyResponse from .keyless_certificate_create_params import KeylessCertificateCreateParams as KeylessCertificateCreateParams @@ -182,7 +187,6 @@ from .origin_ca_certificate_create_params import OriginCACertificateCreateParams as OriginCACertificateCreateParams from .origin_ca_certificate_list_response import OriginCACertificateListResponse as OriginCACertificateListResponse from .origin_tls_client_auth_get_response import OriginTLSClientAuthGetResponse as OriginTLSClientAuthGetResponse -from .tls_certificates_and_hostnames_base import TLSCertificatesAndHostnamesBase as TLSCertificatesAndHostnamesBase from .origin_tls_client_auth_create_params import OriginTLSClientAuthCreateParams as OriginTLSClientAuthCreateParams from .origin_tls_client_auth_list_response import OriginTLSClientAuthListResponse as OriginTLSClientAuthListResponse from .origin_ca_certificate_create_response import ( @@ -209,15 +213,3 @@ from .origin_post_quantum_encryption_update_response import ( OriginPostQuantumEncryptionUpdateResponse as OriginPostQuantumEncryptionUpdateResponse, ) -from .tls_certificates_and_hostnames_client_certificate import ( - TLSCertificatesAndHostnamesClientCertificate as TLSCertificatesAndHostnamesClientCertificate, -) -from .tls_certificates_and_hostnames_custom_certificate import ( - TLSCertificatesAndHostnamesCustomCertificate as TLSCertificatesAndHostnamesCustomCertificate, -) -from .tls_certificates_and_hostnames_certificate_object_post import ( - TLSCertificatesAndHostnamesCertificateObjectPost as TLSCertificatesAndHostnamesCertificateObjectPost, -) -from .tls_certificates_and_hostnames_components_schemas_certificate_object import ( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject as TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, -) diff --git a/src/cloudflare/types/accounts/__init__.py b/src/cloudflare/types/accounts/__init__.py index 8674692aa7b..f642f617512 100644 --- a/src/cloudflare/types/accounts/__init__.py +++ b/src/cloudflare/types/accounts/__init__.py @@ -2,8 +2,8 @@ from __future__ import annotations +from .role import Role as Role from .account_member import AccountMember as AccountMember -from .iam_schemas_role import IamSchemasRole as IamSchemasRole from .role_get_response import RoleGetResponse as RoleGetResponse from .member_list_params import MemberListParams as MemberListParams from .role_list_response import RoleListResponse as RoleListResponse diff --git a/src/cloudflare/types/accounts/member_list_response.py b/src/cloudflare/types/accounts/member_list_response.py index fb7db5a437e..26182b74f97 100644 --- a/src/cloudflare/types/accounts/member_list_response.py +++ b/src/cloudflare/types/accounts/member_list_response.py @@ -3,8 +3,8 @@ from typing import List, Optional from typing_extensions import Literal +from .role import Role from ..._models import BaseModel -from .iam_schemas_role import IamSchemasRole __all__ = ["MemberListResponse"] @@ -19,7 +19,7 @@ class MemberListResponse(BaseModel): name: Optional[str] = None """Member Name.""" - roles: List[IamSchemasRole] + roles: List[Role] """Roles assigned to this Member.""" status: Literal["accepted", "invited"] diff --git a/src/cloudflare/types/accounts/iam_schemas_role.py b/src/cloudflare/types/accounts/role.py similarity index 85% rename from src/cloudflare/types/accounts/iam_schemas_role.py rename to src/cloudflare/types/accounts/role.py index acfedb98647..85afa978780 100644 --- a/src/cloudflare/types/accounts/iam_schemas_role.py +++ b/src/cloudflare/types/accounts/role.py @@ -4,10 +4,10 @@ from ..._models import BaseModel -__all__ = ["IamSchemasRole"] +__all__ = ["Role"] -class IamSchemasRole(BaseModel): +class Role(BaseModel): id: str """Role identifier tag.""" diff --git a/src/cloudflare/types/accounts/role_list_response.py b/src/cloudflare/types/accounts/role_list_response.py index 63883bc2a80..d68445c0957 100644 --- a/src/cloudflare/types/accounts/role_list_response.py +++ b/src/cloudflare/types/accounts/role_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .iam_schemas_role import IamSchemasRole +from .role import Role __all__ = ["RoleListResponse"] -RoleListResponse = List[IamSchemasRole] +RoleListResponse = List[Role] diff --git a/src/cloudflare/types/alerting/__init__.py b/src/cloudflare/types/alerting/__init__.py index bd56e8344fa..130bbca1356 100644 --- a/src/cloudflare/types/alerting/__init__.py +++ b/src/cloudflare/types/alerting/__init__.py @@ -2,8 +2,8 @@ from __future__ import annotations -from .aaa_history import AaaHistory as AaaHistory -from .aaa_policies import AaaPolicies as AaaPolicies +from .alerting_history import AlertingHistory as AlertingHistory +from .alerting_policies import AlertingPolicies as AlertingPolicies from .history_list_params import HistoryListParams as HistoryListParams from .policy_create_params import PolicyCreateParams as PolicyCreateParams from .policy_list_response import PolicyListResponse as PolicyListResponse diff --git a/src/cloudflare/types/alerting/aaa_history.py b/src/cloudflare/types/alerting/alerting_history.py similarity index 94% rename from src/cloudflare/types/alerting/aaa_history.py rename to src/cloudflare/types/alerting/alerting_history.py index 18dcdceb3eb..ad3d675fe48 100644 --- a/src/cloudflare/types/alerting/aaa_history.py +++ b/src/cloudflare/types/alerting/alerting_history.py @@ -6,10 +6,10 @@ from ..._models import BaseModel -__all__ = ["AaaHistory"] +__all__ = ["AlertingHistory"] -class AaaHistory(BaseModel): +class AlertingHistory(BaseModel): id: Optional[str] = None """UUID""" diff --git a/src/cloudflare/types/alerting/aaa_policies.py b/src/cloudflare/types/alerting/alerting_policies.py similarity index 98% rename from src/cloudflare/types/alerting/aaa_policies.py rename to src/cloudflare/types/alerting/alerting_policies.py index 90947862783..8c2ed617e3b 100644 --- a/src/cloudflare/types/alerting/aaa_policies.py +++ b/src/cloudflare/types/alerting/alerting_policies.py @@ -6,7 +6,7 @@ from ..._models import BaseModel -__all__ = ["AaaPolicies", "Filters", "Mechanisms"] +__all__ = ["AlertingPolicies", "Filters", "Mechanisms"] class Filters(BaseModel): @@ -145,7 +145,7 @@ class Mechanisms(BaseModel): """UUID""" -class AaaPolicies(BaseModel): +class AlertingPolicies(BaseModel): id: Optional[str] = None """The unique identifier of a notification policy""" diff --git a/src/cloudflare/types/alerting/destinations/__init__.py b/src/cloudflare/types/alerting/destinations/__init__.py index ee53ed8c79f..ec704abb4c0 100644 --- a/src/cloudflare/types/alerting/destinations/__init__.py +++ b/src/cloudflare/types/alerting/destinations/__init__.py @@ -2,8 +2,8 @@ from __future__ import annotations -from .aaa_webhooks import AaaWebhooks as AaaWebhooks -from .aaa_pagerduty import AaaPagerduty as AaaPagerduty +from .alerting_webhooks import AlertingWebhooks as AlertingWebhooks +from .alerting_pagerduty import AlertingPagerduty as AlertingPagerduty from .eligible_get_response import EligibleGetResponse as EligibleGetResponse from .webhook_create_params import WebhookCreateParams as WebhookCreateParams from .webhook_list_response import WebhookListResponse as WebhookListResponse diff --git a/src/cloudflare/types/alerting/destinations/aaa_pagerduty.py b/src/cloudflare/types/alerting/destinations/alerting_pagerduty.py similarity index 80% rename from src/cloudflare/types/alerting/destinations/aaa_pagerduty.py rename to src/cloudflare/types/alerting/destinations/alerting_pagerduty.py index 86f14c88d4c..bf3e2bed281 100644 --- a/src/cloudflare/types/alerting/destinations/aaa_pagerduty.py +++ b/src/cloudflare/types/alerting/destinations/alerting_pagerduty.py @@ -4,10 +4,10 @@ from ...._models import BaseModel -__all__ = ["AaaPagerduty"] +__all__ = ["AlertingPagerduty"] -class AaaPagerduty(BaseModel): +class AlertingPagerduty(BaseModel): id: Optional[str] = None """UUID""" diff --git a/src/cloudflare/types/alerting/destinations/aaa_webhooks.py b/src/cloudflare/types/alerting/destinations/alerting_webhooks.py similarity index 95% rename from src/cloudflare/types/alerting/destinations/aaa_webhooks.py rename to src/cloudflare/types/alerting/destinations/alerting_webhooks.py index 94ab6e5b9d6..a2dc5b27d59 100644 --- a/src/cloudflare/types/alerting/destinations/aaa_webhooks.py +++ b/src/cloudflare/types/alerting/destinations/alerting_webhooks.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["AaaWebhooks"] +__all__ = ["AlertingWebhooks"] -class AaaWebhooks(BaseModel): +class AlertingWebhooks(BaseModel): id: Optional[str] = None """The unique identifier of a webhook""" diff --git a/src/cloudflare/types/alerting/destinations/pagerduty_get_response.py b/src/cloudflare/types/alerting/destinations/pagerduty_get_response.py index e34ca54e35d..8069af80584 100644 --- a/src/cloudflare/types/alerting/destinations/pagerduty_get_response.py +++ b/src/cloudflare/types/alerting/destinations/pagerduty_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .aaa_pagerduty import AaaPagerduty +from .alerting_pagerduty import AlertingPagerduty __all__ = ["PagerdutyGetResponse"] -PagerdutyGetResponse = List[AaaPagerduty] +PagerdutyGetResponse = List[AlertingPagerduty] diff --git a/src/cloudflare/types/alerting/destinations/webhook_list_response.py b/src/cloudflare/types/alerting/destinations/webhook_list_response.py index 2a9c5ca2918..fbab0b11b17 100644 --- a/src/cloudflare/types/alerting/destinations/webhook_list_response.py +++ b/src/cloudflare/types/alerting/destinations/webhook_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .aaa_webhooks import AaaWebhooks +from .alerting_webhooks import AlertingWebhooks __all__ = ["WebhookListResponse"] -WebhookListResponse = List[AaaWebhooks] +WebhookListResponse = List[AlertingWebhooks] diff --git a/src/cloudflare/types/alerting/policy_list_response.py b/src/cloudflare/types/alerting/policy_list_response.py index dcd6c951453..ed8d3284838 100644 --- a/src/cloudflare/types/alerting/policy_list_response.py +++ b/src/cloudflare/types/alerting/policy_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .aaa_policies import AaaPolicies +from .alerting_policies import AlertingPolicies __all__ = ["PolicyListResponse"] -PolicyListResponse = List[AaaPolicies] +PolicyListResponse = List[AlertingPolicies] diff --git a/src/cloudflare/types/bill_subs_api_available_rate_plan.py b/src/cloudflare/types/available_rate_plan.py similarity index 92% rename from src/cloudflare/types/bill_subs_api_available_rate_plan.py rename to src/cloudflare/types/available_rate_plan.py index df2d1623c0b..be2c65e3f7c 100644 --- a/src/cloudflare/types/bill_subs_api_available_rate_plan.py +++ b/src/cloudflare/types/available_rate_plan.py @@ -5,10 +5,10 @@ from .._models import BaseModel -__all__ = ["BillSubsAPIAvailableRatePlan"] +__all__ = ["AvailableRatePlan"] -class BillSubsAPIAvailableRatePlan(BaseModel): +class AvailableRatePlan(BaseModel): id: Optional[str] = None """Identifier""" diff --git a/src/cloudflare/types/certificate_authorities/__init__.py b/src/cloudflare/types/certificate_authorities/__init__.py index 8e6c6e03bbe..9f248f2ad9b 100644 --- a/src/cloudflare/types/certificate_authorities/__init__.py +++ b/src/cloudflare/types/certificate_authorities/__init__.py @@ -2,8 +2,6 @@ from __future__ import annotations +from .tls_hostname_association import TLSHostnameAssociation as TLSHostnameAssociation from .hostname_association_get_params import HostnameAssociationGetParams as HostnameAssociationGetParams from .hostname_association_update_params import HostnameAssociationUpdateParams as HostnameAssociationUpdateParams -from .tls_certificates_and_hostnames_hostname_association import ( - TLSCertificatesAndHostnamesHostnameAssociation as TLSCertificatesAndHostnamesHostnameAssociation, -) diff --git a/src/cloudflare/types/certificate_authorities/tls_certificates_and_hostnames_hostname_association.py b/src/cloudflare/types/certificate_authorities/tls_hostname_association.py similarity index 78% rename from src/cloudflare/types/certificate_authorities/tls_certificates_and_hostnames_hostname_association.py rename to src/cloudflare/types/certificate_authorities/tls_hostname_association.py index 94ccbe31cf3..ab1a832cb65 100644 --- a/src/cloudflare/types/certificate_authorities/tls_certificates_and_hostnames_hostname_association.py +++ b/src/cloudflare/types/certificate_authorities/tls_hostname_association.py @@ -4,10 +4,10 @@ from ..._models import BaseModel -__all__ = ["TLSCertificatesAndHostnamesHostnameAssociation"] +__all__ = ["TLSHostnameAssociation"] -class TLSCertificatesAndHostnamesHostnameAssociation(BaseModel): +class TLSHostnameAssociation(BaseModel): hostnames: Optional[List[str]] = None mtls_certificate_id: Optional[str] = None diff --git a/src/cloudflare/types/tls_certificates_and_hostnames_client_certificate.py b/src/cloudflare/types/client_certificate.py similarity index 93% rename from src/cloudflare/types/tls_certificates_and_hostnames_client_certificate.py rename to src/cloudflare/types/client_certificate.py index 8cd3df5182f..3bdc1070a2e 100644 --- a/src/cloudflare/types/tls_certificates_and_hostnames_client_certificate.py +++ b/src/cloudflare/types/client_certificate.py @@ -5,7 +5,7 @@ from .._models import BaseModel -__all__ = ["TLSCertificatesAndHostnamesClientCertificate", "CertificateAuthority"] +__all__ = ["ClientCertificate", "CertificateAuthority"] class CertificateAuthority(BaseModel): @@ -14,7 +14,7 @@ class CertificateAuthority(BaseModel): name: Optional[str] = None -class TLSCertificatesAndHostnamesClientCertificate(BaseModel): +class ClientCertificate(BaseModel): id: Optional[str] = None """Identifier""" diff --git a/src/cloudflare/types/tls_certificates_and_hostnames_custom_certificate.py b/src/cloudflare/types/custom_certificate.py similarity index 90% rename from src/cloudflare/types/tls_certificates_and_hostnames_custom_certificate.py rename to src/cloudflare/types/custom_certificate.py index 37dc121954d..ec5edeb63a9 100644 --- a/src/cloudflare/types/tls_certificates_and_hostnames_custom_certificate.py +++ b/src/cloudflare/types/custom_certificate.py @@ -5,16 +5,16 @@ from typing_extensions import Literal from .._models import BaseModel -from .tls_certificates_and_hostnames_base import TLSCertificatesAndHostnamesBase +from .keyless_certificate_hostname import KeylessCertificateHostname -__all__ = ["TLSCertificatesAndHostnamesCustomCertificate", "GeoRestrictions"] +__all__ = ["CustomCertificate", "GeoRestrictions"] class GeoRestrictions(BaseModel): label: Optional[Literal["us", "eu", "highest_security"]] = None -class TLSCertificatesAndHostnamesCustomCertificate(BaseModel): +class CustomCertificate(BaseModel): id: str """Identifier""" @@ -68,7 +68,7 @@ class TLSCertificatesAndHostnamesCustomCertificate(BaseModel): for optimal performance. """ - keyless_server: Optional[TLSCertificatesAndHostnamesBase] = None + keyless_server: Optional[KeylessCertificateHostname] = None policy: Optional[str] = None """ diff --git a/src/cloudflare/types/custom_certificates/prioritize_update_response.py b/src/cloudflare/types/custom_certificates/prioritize_update_response.py index 7952e0979c5..e2c917ce3ee 100644 --- a/src/cloudflare/types/custom_certificates/prioritize_update_response.py +++ b/src/cloudflare/types/custom_certificates/prioritize_update_response.py @@ -2,8 +2,8 @@ from typing import List -from ..tls_certificates_and_hostnames_custom_certificate import TLSCertificatesAndHostnamesCustomCertificate +from ..custom_certificate import CustomCertificate __all__ = ["PrioritizeUpdateResponse"] -PrioritizeUpdateResponse = List[TLSCertificatesAndHostnamesCustomCertificate] +PrioritizeUpdateResponse = List[CustomCertificate] diff --git a/src/cloudflare/types/dns_custom_nameservers_custom_ns.py b/src/cloudflare/types/custom_nameserver.py similarity index 88% rename from src/cloudflare/types/dns_custom_nameservers_custom_ns.py rename to src/cloudflare/types/custom_nameserver.py index e1a8568c276..9f2a309d04d 100644 --- a/src/cloudflare/types/dns_custom_nameservers_custom_ns.py +++ b/src/cloudflare/types/custom_nameserver.py @@ -5,7 +5,7 @@ from .._models import BaseModel -__all__ = ["DNSCustomNameserversCustomNS", "DNSRecord"] +__all__ = ["CustomNameserver", "DNSRecord"] class DNSRecord(BaseModel): @@ -16,7 +16,7 @@ class DNSRecord(BaseModel): """DNS record contents (an IPv4 or IPv6 address).""" -class DNSCustomNameserversCustomNS(BaseModel): +class CustomNameserver(BaseModel): dns_records: List[DNSRecord] """A and AAAA records associated with the nameserver.""" diff --git a/src/cloudflare/types/custom_nameserver_get_response.py b/src/cloudflare/types/custom_nameserver_get_response.py index 4c67176277e..52cccf43186 100644 --- a/src/cloudflare/types/custom_nameserver_get_response.py +++ b/src/cloudflare/types/custom_nameserver_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .dns_custom_nameservers_custom_ns import DNSCustomNameserversCustomNS +from .custom_nameserver import CustomNameserver __all__ = ["CustomNameserverGetResponse"] -CustomNameserverGetResponse = List[DNSCustomNameserversCustomNS] +CustomNameserverGetResponse = List[CustomNameserver] diff --git a/src/cloudflare/types/custom_nameserver_verify_response.py b/src/cloudflare/types/custom_nameserver_verify_response.py index b85117ec38d..2397a7bb05a 100644 --- a/src/cloudflare/types/custom_nameserver_verify_response.py +++ b/src/cloudflare/types/custom_nameserver_verify_response.py @@ -2,8 +2,8 @@ from typing import List -from .dns_custom_nameservers_custom_ns import DNSCustomNameserversCustomNS +from .custom_nameserver import CustomNameserver __all__ = ["CustomNameserverVerifyResponse"] -CustomNameserverVerifyResponse = List[DNSCustomNameserversCustomNS] +CustomNameserverVerifyResponse = List[CustomNameserver] diff --git a/src/cloudflare/types/dns/__init__.py b/src/cloudflare/types/dns/__init__.py index 05f3f8ddc0b..a73c010f685 100644 --- a/src/cloudflare/types/dns/__init__.py +++ b/src/cloudflare/types/dns/__init__.py @@ -3,6 +3,7 @@ from __future__ import annotations from .dns_record import DNSRecord as DNSRecord +from .dns_firewall import DNSFirewall as DNSFirewall from .record_edit_params import RecordEditParams as RecordEditParams from .record_list_params import RecordListParams as RecordListParams from .firewall_edit_params import FirewallEditParams as FirewallEditParams @@ -16,4 +17,3 @@ from .record_export_response import RecordExportResponse as RecordExportResponse from .record_import_response import RecordImportResponse as RecordImportResponse from .firewall_delete_response import FirewallDeleteResponse as FirewallDeleteResponse -from .dns_firewall_dns_firewall import DNSFirewallDNSFirewall as DNSFirewallDNSFirewall diff --git a/src/cloudflare/types/dns/analytics/__init__.py b/src/cloudflare/types/dns/analytics/__init__.py index a8e1c2d94e4..c738816d7fd 100644 --- a/src/cloudflare/types/dns/analytics/__init__.py +++ b/src/cloudflare/types/dns/analytics/__init__.py @@ -3,4 +3,4 @@ from __future__ import annotations from .report_get_params import ReportGetParams as ReportGetParams -from .dns_dns_analytics_api_report import DNSDNSAnalyticsAPIReport as DNSDNSAnalyticsAPIReport +from .dns_analytics_report import DNSAnalyticsReport as DNSAnalyticsReport diff --git a/src/cloudflare/types/dns/analytics/dns_dns_analytics_api_report.py b/src/cloudflare/types/dns/analytics/dns_analytics_report.py similarity index 95% rename from src/cloudflare/types/dns/analytics/dns_dns_analytics_api_report.py rename to src/cloudflare/types/dns/analytics/dns_analytics_report.py index 17e9ca38361..2dfde2775d2 100644 --- a/src/cloudflare/types/dns/analytics/dns_dns_analytics_api_report.py +++ b/src/cloudflare/types/dns/analytics/dns_analytics_report.py @@ -5,7 +5,7 @@ from ...._models import BaseModel -__all__ = ["DNSDNSAnalyticsAPIReport", "Data", "Query"] +__all__ = ["DNSAnalyticsReport", "Data", "Query"] class Data(BaseModel): @@ -45,7 +45,7 @@ class Query(BaseModel): """ -class DNSDNSAnalyticsAPIReport(BaseModel): +class DNSAnalyticsReport(BaseModel): data: List[Data] """Array with one row per combination of dimension values.""" diff --git a/src/cloudflare/types/dns/analytics/reports/__init__.py b/src/cloudflare/types/dns/analytics/reports/__init__.py index 8d0bea62f39..96ec042fabd 100644 --- a/src/cloudflare/types/dns/analytics/reports/__init__.py +++ b/src/cloudflare/types/dns/analytics/reports/__init__.py @@ -3,4 +3,4 @@ from __future__ import annotations from .bytime_get_params import BytimeGetParams as BytimeGetParams -from .dns_dns_analytics_api_report_bytime import DNSDNSAnalyticsAPIReportBytime as DNSDNSAnalyticsAPIReportBytime +from .dns_analytics_report_by_time import DNSAnalyticsReportByTime as DNSAnalyticsReportByTime diff --git a/src/cloudflare/types/dns/analytics/reports/dns_dns_analytics_api_report_bytime.py b/src/cloudflare/types/dns/analytics/reports/dns_analytics_report_by_time.py similarity index 95% rename from src/cloudflare/types/dns/analytics/reports/dns_dns_analytics_api_report_bytime.py rename to src/cloudflare/types/dns/analytics/reports/dns_analytics_report_by_time.py index 003873123d1..460a19f5ffe 100644 --- a/src/cloudflare/types/dns/analytics/reports/dns_dns_analytics_api_report_bytime.py +++ b/src/cloudflare/types/dns/analytics/reports/dns_analytics_report_by_time.py @@ -6,7 +6,7 @@ from ....._models import BaseModel -__all__ = ["DNSDNSAnalyticsAPIReportBytime", "Data", "Query"] +__all__ = ["DNSAnalyticsReportByTime", "Data", "Query"] class Data(BaseModel): @@ -52,7 +52,7 @@ class Query(BaseModel): """ -class DNSDNSAnalyticsAPIReportBytime(BaseModel): +class DNSAnalyticsReportByTime(BaseModel): data: List[Data] """Array with one row per combination of dimension values.""" diff --git a/src/cloudflare/types/dns/dns_firewall_dns_firewall.py b/src/cloudflare/types/dns/dns_firewall.py similarity index 94% rename from src/cloudflare/types/dns/dns_firewall_dns_firewall.py rename to src/cloudflare/types/dns/dns_firewall.py index 6babeda31fe..0b537b38884 100644 --- a/src/cloudflare/types/dns/dns_firewall_dns_firewall.py +++ b/src/cloudflare/types/dns/dns_firewall.py @@ -5,7 +5,7 @@ from ..._models import BaseModel -__all__ = ["DNSFirewallDNSFirewall", "AttackMitigation"] +__all__ = ["DNSFirewall", "AttackMitigation"] class AttackMitigation(BaseModel): @@ -22,7 +22,7 @@ class AttackMitigation(BaseModel): """Only mitigate attacks when upstream servers seem unhealthy.""" -class DNSFirewallDNSFirewall(BaseModel): +class DNSFirewall(BaseModel): id: str """Identifier""" diff --git a/src/cloudflare/types/dnssec_dnssec.py b/src/cloudflare/types/dnssec.py similarity index 97% rename from src/cloudflare/types/dnssec_dnssec.py rename to src/cloudflare/types/dnssec.py index f1bef9078d5..ae9788e6527 100644 --- a/src/cloudflare/types/dnssec_dnssec.py +++ b/src/cloudflare/types/dnssec.py @@ -6,10 +6,10 @@ from .._models import BaseModel -__all__ = ["DNSSECDNSSEC"] +__all__ = ["DNSSEC"] -class DNSSECDNSSEC(BaseModel): +class DNSSEC(BaseModel): algorithm: Optional[str] = None """Algorithm key code.""" diff --git a/src/cloudflare/types/durable_objects/__init__.py b/src/cloudflare/types/durable_objects/__init__.py index e2e349d9c2d..c300a66b56d 100644 --- a/src/cloudflare/types/durable_objects/__init__.py +++ b/src/cloudflare/types/durable_objects/__init__.py @@ -2,5 +2,5 @@ from __future__ import annotations -from .workers_namespace import WorkersNamespace as WorkersNamespace from .namespace_list_response import NamespaceListResponse as NamespaceListResponse +from .durable_object_namespace import DurableObjectNamespace as DurableObjectNamespace diff --git a/src/cloudflare/types/durable_objects/workers_namespace.py b/src/cloudflare/types/durable_objects/durable_object_namespace.py similarity index 82% rename from src/cloudflare/types/durable_objects/workers_namespace.py rename to src/cloudflare/types/durable_objects/durable_object_namespace.py index 520c9349706..689a67b66f6 100644 --- a/src/cloudflare/types/durable_objects/workers_namespace.py +++ b/src/cloudflare/types/durable_objects/durable_object_namespace.py @@ -6,10 +6,10 @@ from ..._models import BaseModel -__all__ = ["WorkersNamespace"] +__all__ = ["DurableObjectNamespace"] -class WorkersNamespace(BaseModel): +class DurableObjectNamespace(BaseModel): id: Optional[object] = None class_: Optional[object] = FieldInfo(alias="class", default=None) diff --git a/src/cloudflare/types/durable_objects/namespace_list_response.py b/src/cloudflare/types/durable_objects/namespace_list_response.py index f72ff4ec5f8..970cab661cd 100644 --- a/src/cloudflare/types/durable_objects/namespace_list_response.py +++ b/src/cloudflare/types/durable_objects/namespace_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .workers_namespace import WorkersNamespace +from .durable_object_namespace import DurableObjectNamespace __all__ = ["NamespaceListResponse"] -NamespaceListResponse = List[WorkersNamespace] +NamespaceListResponse = List[DurableObjectNamespace] diff --git a/src/cloudflare/types/durable_objects/namespaces/__init__.py b/src/cloudflare/types/durable_objects/namespaces/__init__.py index ea45479d443..0ea3e44562e 100644 --- a/src/cloudflare/types/durable_objects/namespaces/__init__.py +++ b/src/cloudflare/types/durable_objects/namespaces/__init__.py @@ -2,5 +2,5 @@ from __future__ import annotations -from .workers_object import WorkersObject as WorkersObject +from .durable_object import DurableObject as DurableObject from .object_list_params import ObjectListParams as ObjectListParams diff --git a/src/cloudflare/types/durable_objects/namespaces/workers_object.py b/src/cloudflare/types/durable_objects/namespaces/durable_object.py similarity index 86% rename from src/cloudflare/types/durable_objects/namespaces/workers_object.py rename to src/cloudflare/types/durable_objects/namespaces/durable_object.py index a50033e6490..53c1bead7fd 100644 --- a/src/cloudflare/types/durable_objects/namespaces/workers_object.py +++ b/src/cloudflare/types/durable_objects/namespaces/durable_object.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["WorkersObject"] +__all__ = ["DurableObject"] -class WorkersObject(BaseModel): +class DurableObject(BaseModel): id: Optional[str] = None """ID of the Durable Object.""" diff --git a/src/cloudflare/types/filter_create_response.py b/src/cloudflare/types/filter_create_response.py index 418c1c556a0..410ac59aed1 100644 --- a/src/cloudflare/types/filter_create_response.py +++ b/src/cloudflare/types/filter_create_response.py @@ -2,8 +2,8 @@ from typing import List -from .legacy_jhs_filter import LegacyJhsFilter +from .firewall_filter import FirewallFilter __all__ = ["FilterCreateResponse"] -FilterCreateResponse = List[LegacyJhsFilter] +FilterCreateResponse = List[FirewallFilter] diff --git a/src/cloudflare/types/firewall/__init__.py b/src/cloudflare/types/firewall/__init__.py index 0f04d2499f1..59a280461ab 100644 --- a/src/cloudflare/types/firewall/__init__.py +++ b/src/cloudflare/types/firewall/__init__.py @@ -9,18 +9,18 @@ from .rule_edit_response import RuleEditResponse as RuleEditResponse from .rule_update_params import RuleUpdateParams as RuleUpdateParams from .ua_rule_list_params import UARuleListParams as UARuleListParams +from .firewall_filter_rule import FirewallFilterRule as FirewallFilterRule from .lockdown_list_params import LockdownListParams as LockdownListParams from .rule_create_response import RuleCreateResponse as RuleCreateResponse from .ua_rule_get_response import UARuleGetResponse as UARuleGetResponse from .ua_rule_create_params import UARuleCreateParams as UARuleCreateParams from .ua_rule_list_response import UARuleListResponse as UARuleListResponse from .ua_rule_update_params import UARuleUpdateParams as UARuleUpdateParams -from .legacy_jhs_filter_rule import LegacyJhsFilterRule as LegacyJhsFilterRule +from .firewall_zone_lockdown import FirewallZoneLockdown as FirewallZoneLockdown from .lockdown_create_params import LockdownCreateParams as LockdownCreateParams from .lockdown_update_params import LockdownUpdateParams as LockdownUpdateParams from .access_rule_edit_params import AccessRuleEditParams as AccessRuleEditParams from .access_rule_list_params import AccessRuleListParams as AccessRuleListParams -from .legacy_jhs_zonelockdown import LegacyJhsZonelockdown as LegacyJhsZonelockdown from .ua_rule_create_response import UARuleCreateResponse as UARuleCreateResponse from .ua_rule_delete_response import UARuleDeleteResponse as UARuleDeleteResponse from .ua_rule_update_response import UARuleUpdateResponse as UARuleUpdateResponse diff --git a/src/cloudflare/types/firewall/legacy_jhs_filter_rule.py b/src/cloudflare/types/firewall/firewall_filter_rule.py similarity index 87% rename from src/cloudflare/types/firewall/legacy_jhs_filter_rule.py rename to src/cloudflare/types/firewall/firewall_filter_rule.py index d76a4d5f90a..6c08cb85929 100644 --- a/src/cloudflare/types/firewall/legacy_jhs_filter_rule.py +++ b/src/cloudflare/types/firewall/firewall_filter_rule.py @@ -4,9 +4,9 @@ from typing_extensions import Literal from ..._models import BaseModel -from ..legacy_jhs_filter import LegacyJhsFilter +from ..firewall_filter import FirewallFilter -__all__ = ["LegacyJhsFilterRule", "Filter", "FilterLegacyJhsDeletedFilter"] +__all__ = ["FirewallFilterRule", "Filter", "FilterLegacyJhsDeletedFilter"] class FilterLegacyJhsDeletedFilter(BaseModel): @@ -17,10 +17,10 @@ class FilterLegacyJhsDeletedFilter(BaseModel): """When true, indicates that the firewall rule was deleted.""" -Filter = Union[LegacyJhsFilter, FilterLegacyJhsDeletedFilter] +Filter = Union[FirewallFilter, FilterLegacyJhsDeletedFilter] -class LegacyJhsFilterRule(BaseModel): +class FirewallFilterRule(BaseModel): id: Optional[str] = None """The unique identifier of the firewall rule.""" diff --git a/src/cloudflare/types/firewall/legacy_jhs_zonelockdown.py b/src/cloudflare/types/firewall/firewall_zone_lockdown.py similarity index 96% rename from src/cloudflare/types/firewall/legacy_jhs_zonelockdown.py rename to src/cloudflare/types/firewall/firewall_zone_lockdown.py index c2c7df4c7f0..0beb83e03fa 100644 --- a/src/cloudflare/types/firewall/legacy_jhs_zonelockdown.py +++ b/src/cloudflare/types/firewall/firewall_zone_lockdown.py @@ -7,7 +7,7 @@ from ..._models import BaseModel __all__ = [ - "LegacyJhsZonelockdown", + "FirewallZoneLockdown", "Configurations", "ConfigurationsLegacyJhsSchemasIPConfiguration", "ConfigurationsLegacyJhsSchemasCIDRConfiguration", @@ -44,7 +44,7 @@ class ConfigurationsLegacyJhsSchemasCIDRConfiguration(BaseModel): Configurations = Union[ConfigurationsLegacyJhsSchemasIPConfiguration, ConfigurationsLegacyJhsSchemasCIDRConfiguration] -class LegacyJhsZonelockdown(BaseModel): +class FirewallZoneLockdown(BaseModel): id: str """The unique identifier of the Zone Lockdown rule.""" diff --git a/src/cloudflare/types/firewall/rule_create_response.py b/src/cloudflare/types/firewall/rule_create_response.py index 247c85c5b03..78a21420c26 100644 --- a/src/cloudflare/types/firewall/rule_create_response.py +++ b/src/cloudflare/types/firewall/rule_create_response.py @@ -2,8 +2,8 @@ from typing import List -from .legacy_jhs_filter_rule import LegacyJhsFilterRule +from .firewall_filter_rule import FirewallFilterRule __all__ = ["RuleCreateResponse"] -RuleCreateResponse = List[LegacyJhsFilterRule] +RuleCreateResponse = List[FirewallFilterRule] diff --git a/src/cloudflare/types/firewall/rule_edit_response.py b/src/cloudflare/types/firewall/rule_edit_response.py index e0a51282571..7fbd5ba92a9 100644 --- a/src/cloudflare/types/firewall/rule_edit_response.py +++ b/src/cloudflare/types/firewall/rule_edit_response.py @@ -2,8 +2,8 @@ from typing import List -from .legacy_jhs_filter_rule import LegacyJhsFilterRule +from .firewall_filter_rule import FirewallFilterRule __all__ = ["RuleEditResponse"] -RuleEditResponse = List[LegacyJhsFilterRule] +RuleEditResponse = List[FirewallFilterRule] diff --git a/src/cloudflare/types/firewall/waf/__init__.py b/src/cloudflare/types/firewall/waf/__init__.py index d0f3fe43e51..7e819835b14 100644 --- a/src/cloudflare/types/firewall/waf/__init__.py +++ b/src/cloudflare/types/firewall/waf/__init__.py @@ -2,7 +2,7 @@ from __future__ import annotations -from .legacy_jhs_override import LegacyJhsOverride as LegacyJhsOverride +from .waf_override import WAFOverride as WAFOverride from .package_list_params import PackageListParams as PackageListParams from .override_list_params import OverrideListParams as OverrideListParams from .package_get_response import PackageGetResponse as PackageGetResponse diff --git a/src/cloudflare/types/firewall/waf/packages/__init__.py b/src/cloudflare/types/firewall/waf/packages/__init__.py index 847b16ef5c6..91cbd984b75 100644 --- a/src/cloudflare/types/firewall/waf/packages/__init__.py +++ b/src/cloudflare/types/firewall/waf/packages/__init__.py @@ -11,4 +11,4 @@ from .rule_edit_response import RuleEditResponse as RuleEditResponse from .group_edit_response import GroupEditResponse as GroupEditResponse from .waf_managed_rules_rule import WAFManagedRulesRule as WAFManagedRulesRule -from .waf_managed_rules_schemas_group import WAFManagedRulesSchemasGroup as WAFManagedRulesSchemasGroup +from .waf_managed_rules_group import WAFManagedRulesGroup as WAFManagedRulesGroup diff --git a/src/cloudflare/types/firewall/waf/packages/waf_managed_rules_schemas_group.py b/src/cloudflare/types/firewall/waf/packages/waf_managed_rules_group.py similarity index 92% rename from src/cloudflare/types/firewall/waf/packages/waf_managed_rules_schemas_group.py rename to src/cloudflare/types/firewall/waf/packages/waf_managed_rules_group.py index 5fdecc2a323..66b01dffd10 100644 --- a/src/cloudflare/types/firewall/waf/packages/waf_managed_rules_schemas_group.py +++ b/src/cloudflare/types/firewall/waf/packages/waf_managed_rules_group.py @@ -5,10 +5,10 @@ from ....._models import BaseModel -__all__ = ["WAFManagedRulesSchemasGroup"] +__all__ = ["WAFManagedRulesGroup"] -class WAFManagedRulesSchemasGroup(BaseModel): +class WAFManagedRulesGroup(BaseModel): id: str """The unique identifier of the rule group.""" diff --git a/src/cloudflare/types/firewall/waf/legacy_jhs_override.py b/src/cloudflare/types/firewall/waf/waf_override.py similarity index 96% rename from src/cloudflare/types/firewall/waf/legacy_jhs_override.py rename to src/cloudflare/types/firewall/waf/waf_override.py index 6d5208e8f02..528ee51f3b4 100644 --- a/src/cloudflare/types/firewall/waf/legacy_jhs_override.py +++ b/src/cloudflare/types/firewall/waf/waf_override.py @@ -5,7 +5,7 @@ from ...._models import BaseModel -__all__ = ["LegacyJhsOverride", "RewriteAction"] +__all__ = ["WAFOverride", "RewriteAction"] class RewriteAction(BaseModel): @@ -22,7 +22,7 @@ class RewriteAction(BaseModel): simulate: Optional[str] = None -class LegacyJhsOverride(BaseModel): +class WAFOverride(BaseModel): id: Optional[str] = None """The unique identifier of the WAF override.""" diff --git a/src/cloudflare/types/legacy_jhs_filter.py b/src/cloudflare/types/firewall_filter.py similarity index 91% rename from src/cloudflare/types/legacy_jhs_filter.py rename to src/cloudflare/types/firewall_filter.py index 4f0abe114da..5114c5f9346 100644 --- a/src/cloudflare/types/legacy_jhs_filter.py +++ b/src/cloudflare/types/firewall_filter.py @@ -4,10 +4,10 @@ from .._models import BaseModel -__all__ = ["LegacyJhsFilter"] +__all__ = ["FirewallFilter"] -class LegacyJhsFilter(BaseModel): +class FirewallFilter(BaseModel): id: Optional[str] = None """The unique identifier of the filter.""" diff --git a/src/cloudflare/types/healthchecks_healthchecks.py b/src/cloudflare/types/healthcheck.py similarity index 97% rename from src/cloudflare/types/healthchecks_healthchecks.py rename to src/cloudflare/types/healthcheck.py index e7b80ce0dfd..6ababd4f7c4 100644 --- a/src/cloudflare/types/healthchecks_healthchecks.py +++ b/src/cloudflare/types/healthcheck.py @@ -6,7 +6,7 @@ from .._models import BaseModel -__all__ = ["HealthchecksHealthchecks", "HTTPConfig", "TcpConfig"] +__all__ = ["Healthcheck", "HTTPConfig", "TcpConfig"] class HTTPConfig(BaseModel): @@ -57,7 +57,7 @@ class TcpConfig(BaseModel): """Port number to connect to for the health check. Defaults to 80.""" -class HealthchecksHealthchecks(BaseModel): +class Healthcheck(BaseModel): id: Optional[str] = None """Identifier""" diff --git a/src/cloudflare/types/healthcheck_list_response.py b/src/cloudflare/types/healthcheck_list_response.py index d2bd7b377c0..1c5907a04b9 100644 --- a/src/cloudflare/types/healthcheck_list_response.py +++ b/src/cloudflare/types/healthcheck_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .healthchecks_healthchecks import HealthchecksHealthchecks +from .healthcheck import Healthcheck __all__ = ["HealthcheckListResponse"] -HealthcheckListResponse = List[HealthchecksHealthchecks] +HealthcheckListResponse = List[Healthcheck] diff --git a/src/cloudflare/types/images/__init__.py b/src/cloudflare/types/images/__init__.py index 9b9dcc7e1a0..82bb5061aac 100644 --- a/src/cloudflare/types/images/__init__.py +++ b/src/cloudflare/types/images/__init__.py @@ -2,7 +2,7 @@ from __future__ import annotations -from .images_image import ImagesImage as ImagesImage +from .image import Image as Image from .v1_edit_params import V1EditParams as V1EditParams from .v1_list_params import V1ListParams as V1ListParams from .v2_list_params import V2ListParams as V2ListParams diff --git a/src/cloudflare/types/images/images_image.py b/src/cloudflare/types/images/image.py similarity index 94% rename from src/cloudflare/types/images/images_image.py rename to src/cloudflare/types/images/image.py index 2b455a5245a..9be5724c4f0 100644 --- a/src/cloudflare/types/images/images_image.py +++ b/src/cloudflare/types/images/image.py @@ -7,10 +7,10 @@ from ..._models import BaseModel -__all__ = ["ImagesImage"] +__all__ = ["Image"] -class ImagesImage(BaseModel): +class Image(BaseModel): id: Optional[str] = None """Image unique identifier.""" diff --git a/src/cloudflare/types/images/v1_list_response.py b/src/cloudflare/types/images/v1_list_response.py index db798f0791f..249b4c9523d 100644 --- a/src/cloudflare/types/images/v1_list_response.py +++ b/src/cloudflare/types/images/v1_list_response.py @@ -3,8 +3,8 @@ from typing import List, Optional from typing_extensions import Literal +from .image import Image from ..._models import BaseModel -from .images_image import ImagesImage __all__ = ["V1ListResponse", "Error", "Message", "Result"] @@ -22,7 +22,7 @@ class Message(BaseModel): class Result(BaseModel): - images: Optional[List[ImagesImage]] = None + images: Optional[List[Image]] = None class V1ListResponse(BaseModel): diff --git a/src/cloudflare/types/images/v2_list_response.py b/src/cloudflare/types/images/v2_list_response.py index 9f4f4e23576..9a6cc5e22c0 100644 --- a/src/cloudflare/types/images/v2_list_response.py +++ b/src/cloudflare/types/images/v2_list_response.py @@ -2,8 +2,8 @@ from typing import List, Optional +from .image import Image from ..._models import BaseModel -from .images_image import ImagesImage __all__ = ["V2ListResponse"] @@ -15,4 +15,4 @@ class V2ListResponse(BaseModel): Passed as a query param when requesting List V2 api endpoint. """ - images: Optional[List[ImagesImage]] = None + images: Optional[List[Image]] = None diff --git a/src/cloudflare/types/intel/__init__.py b/src/cloudflare/types/intel/__init__.py index 617ad899335..3749dbb5139 100644 --- a/src/cloudflare/types/intel/__init__.py +++ b/src/cloudflare/types/intel/__init__.py @@ -12,6 +12,7 @@ from .intel_schemas_ip import IntelSchemasIP as IntelSchemasIP from .whois_get_params import WhoisGetParams as WhoisGetParams from .domain_get_params import DomainGetParams as DomainGetParams +from .intel_sinkhole_item import IntelSinkholeItem as IntelSinkholeItem from .intel_domain_history import IntelDomainHistory as IntelDomainHistory from .ip_list_get_response import IPListGetResponse as IPListGetResponse from .sinkhole_list_response import SinkholeListResponse as SinkholeListResponse @@ -23,7 +24,6 @@ from .indicator_feed_data_response import IndicatorFeedDataResponse as IndicatorFeedDataResponse from .indicator_feed_list_response import IndicatorFeedListResponse as IndicatorFeedListResponse from .indicator_feed_update_params import IndicatorFeedUpdateParams as IndicatorFeedUpdateParams -from .intel_sinkholes_sinkhole_item import IntelSinkholesSinkholeItem as IntelSinkholesSinkholeItem from .indicator_feed_create_response import IndicatorFeedCreateResponse as IndicatorFeedCreateResponse from .indicator_feed_update_response import IndicatorFeedUpdateResponse as IndicatorFeedUpdateResponse from .miscategorization_create_params import MiscategorizationCreateParams as MiscategorizationCreateParams diff --git a/src/cloudflare/types/intel/intel_sinkholes_sinkhole_item.py b/src/cloudflare/types/intel/intel_sinkhole_item.py similarity index 90% rename from src/cloudflare/types/intel/intel_sinkholes_sinkhole_item.py rename to src/cloudflare/types/intel/intel_sinkhole_item.py index ca758a310b9..98ddc704596 100644 --- a/src/cloudflare/types/intel/intel_sinkholes_sinkhole_item.py +++ b/src/cloudflare/types/intel/intel_sinkhole_item.py @@ -5,10 +5,10 @@ from ..._models import BaseModel -__all__ = ["IntelSinkholesSinkholeItem"] +__all__ = ["IntelSinkholeItem"] -class IntelSinkholesSinkholeItem(BaseModel): +class IntelSinkholeItem(BaseModel): id: Optional[int] = None """The unique identifier for the sinkhole""" diff --git a/src/cloudflare/types/intel/sinkhole_list_response.py b/src/cloudflare/types/intel/sinkhole_list_response.py index 1de11685875..f6032dcc8a5 100644 --- a/src/cloudflare/types/intel/sinkhole_list_response.py +++ b/src/cloudflare/types/intel/sinkhole_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .intel_sinkholes_sinkhole_item import IntelSinkholesSinkholeItem +from .intel_sinkhole_item import IntelSinkholeItem __all__ = ["SinkholeListResponse"] -SinkholeListResponse = List[IntelSinkholesSinkholeItem] +SinkholeListResponse = List[IntelSinkholeItem] diff --git a/src/cloudflare/types/tls_certificates_and_hostnames_base.py b/src/cloudflare/types/keyless_certificate_hostname.py similarity index 92% rename from src/cloudflare/types/tls_certificates_and_hostnames_base.py rename to src/cloudflare/types/keyless_certificate_hostname.py index e42099bac96..588c0e76e5a 100644 --- a/src/cloudflare/types/tls_certificates_and_hostnames_base.py +++ b/src/cloudflare/types/keyless_certificate_hostname.py @@ -6,7 +6,7 @@ from .._models import BaseModel -__all__ = ["TLSCertificatesAndHostnamesBase", "Tunnel"] +__all__ = ["KeylessCertificateHostname", "Tunnel"] class Tunnel(BaseModel): @@ -17,7 +17,7 @@ class Tunnel(BaseModel): """Cloudflare Tunnel Virtual Network ID""" -class TLSCertificatesAndHostnamesBase(BaseModel): +class KeylessCertificateHostname(BaseModel): id: str """Keyless certificate identifier tag.""" diff --git a/src/cloudflare/types/keyless_certificate_list_response.py b/src/cloudflare/types/keyless_certificate_list_response.py index b96ec4ee789..d2830796083 100644 --- a/src/cloudflare/types/keyless_certificate_list_response.py +++ b/src/cloudflare/types/keyless_certificate_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .tls_certificates_and_hostnames_base import TLSCertificatesAndHostnamesBase +from .keyless_certificate_hostname import KeylessCertificateHostname __all__ = ["KeylessCertificateListResponse"] -KeylessCertificateListResponse = List[TLSCertificatesAndHostnamesBase] +KeylessCertificateListResponse = List[KeylessCertificateHostname] diff --git a/src/cloudflare/types/logpush/__init__.py b/src/cloudflare/types/logpush/__init__.py index 088cd1af0f1..9e659c00d63 100644 --- a/src/cloudflare/types/logpush/__init__.py +++ b/src/cloudflare/types/logpush/__init__.py @@ -7,10 +7,10 @@ from .job_list_response import JobListResponse as JobListResponse from .job_update_params import JobUpdateParams as JobUpdateParams from .edge_create_params import EdgeCreateParams as EdgeCreateParams +from .instant_logpush_job import InstantLogpushJob as InstantLogpushJob from .job_delete_response import JobDeleteResponse as JobDeleteResponse from .validate_origin_params import ValidateOriginParams as ValidateOriginParams from .ownership_create_params import OwnershipCreateParams as OwnershipCreateParams -from .logpush_instant_logs_job import LogpushInstantLogsJob as LogpushInstantLogsJob from .validate_origin_response import ValidateOriginResponse as ValidateOriginResponse from .ownership_create_response import OwnershipCreateResponse as OwnershipCreateResponse from .ownership_validate_params import OwnershipValidateParams as OwnershipValidateParams diff --git a/src/cloudflare/types/logpush/datasets/__init__.py b/src/cloudflare/types/logpush/datasets/__init__.py index ddb417833d8..10c20406e0b 100644 --- a/src/cloudflare/types/logpush/datasets/__init__.py +++ b/src/cloudflare/types/logpush/datasets/__init__.py @@ -2,5 +2,5 @@ from __future__ import annotations +from .logpush_job import LogpushJob as LogpushJob from .job_get_response import JobGetResponse as JobGetResponse -from .logpush_logpush_job import LogpushLogpushJob as LogpushLogpushJob diff --git a/src/cloudflare/types/logpush/datasets/job_get_response.py b/src/cloudflare/types/logpush/datasets/job_get_response.py index 603fda62783..c95c7edd4a7 100644 --- a/src/cloudflare/types/logpush/datasets/job_get_response.py +++ b/src/cloudflare/types/logpush/datasets/job_get_response.py @@ -2,8 +2,8 @@ from typing import List, Optional -from .logpush_logpush_job import LogpushLogpushJob +from .logpush_job import LogpushJob __all__ = ["JobGetResponse"] -JobGetResponse = List[Optional[LogpushLogpushJob]] +JobGetResponse = List[Optional[LogpushJob]] diff --git a/src/cloudflare/types/logpush/datasets/logpush_logpush_job.py b/src/cloudflare/types/logpush/datasets/logpush_job.py similarity index 98% rename from src/cloudflare/types/logpush/datasets/logpush_logpush_job.py rename to src/cloudflare/types/logpush/datasets/logpush_job.py index 8f9a73c2756..4693a27c56d 100644 --- a/src/cloudflare/types/logpush/datasets/logpush_logpush_job.py +++ b/src/cloudflare/types/logpush/datasets/logpush_job.py @@ -8,7 +8,7 @@ from ...._models import BaseModel -__all__ = ["LogpushLogpushJob", "OutputOptions"] +__all__ = ["LogpushJob", "OutputOptions"] class OutputOptions(BaseModel): @@ -73,7 +73,7 @@ class OutputOptions(BaseModel): """ -class LogpushLogpushJob(BaseModel): +class LogpushJob(BaseModel): id: Optional[int] = None """Unique id of the job.""" diff --git a/src/cloudflare/types/logpush/edge_get_response.py b/src/cloudflare/types/logpush/edge_get_response.py index da2fa36b44f..b7f061196c9 100644 --- a/src/cloudflare/types/logpush/edge_get_response.py +++ b/src/cloudflare/types/logpush/edge_get_response.py @@ -2,8 +2,8 @@ from typing import List, Optional -from .logpush_instant_logs_job import LogpushInstantLogsJob +from .instant_logpush_job import InstantLogpushJob __all__ = ["EdgeGetResponse"] -EdgeGetResponse = List[Optional[LogpushInstantLogsJob]] +EdgeGetResponse = List[Optional[InstantLogpushJob]] diff --git a/src/cloudflare/types/logpush/logpush_instant_logs_job.py b/src/cloudflare/types/logpush/instant_logpush_job.py similarity index 90% rename from src/cloudflare/types/logpush/logpush_instant_logs_job.py rename to src/cloudflare/types/logpush/instant_logpush_job.py index 446c5055718..42396966abd 100644 --- a/src/cloudflare/types/logpush/logpush_instant_logs_job.py +++ b/src/cloudflare/types/logpush/instant_logpush_job.py @@ -4,10 +4,10 @@ from ..._models import BaseModel -__all__ = ["LogpushInstantLogsJob"] +__all__ = ["InstantLogpushJob"] -class LogpushInstantLogsJob(BaseModel): +class InstantLogpushJob(BaseModel): destination_conf: Optional[str] = None """Unique WebSocket address that will receive messages from Cloudflare’s edge.""" diff --git a/src/cloudflare/types/logpush/job_list_response.py b/src/cloudflare/types/logpush/job_list_response.py index 9874f6b70e3..e30f65b2620 100644 --- a/src/cloudflare/types/logpush/job_list_response.py +++ b/src/cloudflare/types/logpush/job_list_response.py @@ -2,8 +2,8 @@ from typing import List, Optional -from .datasets import LogpushLogpushJob +from .datasets import LogpushJob __all__ = ["JobListResponse"] -JobListResponse = List[Optional[LogpushLogpushJob]] +JobListResponse = List[Optional[LogpushJob]] diff --git a/src/cloudflare/types/logs/control/cmb/__init__.py b/src/cloudflare/types/logs/control/cmb/__init__.py index 73109235d4b..1cfbc76cf33 100644 --- a/src/cloudflare/types/logs/control/cmb/__init__.py +++ b/src/cloudflare/types/logs/control/cmb/__init__.py @@ -2,6 +2,6 @@ from __future__ import annotations +from .cmb_config import CmbConfig as CmbConfig from .config_create_params import ConfigCreateParams as ConfigCreateParams -from .logcontrol_cmb_config import LogcontrolCmbConfig as LogcontrolCmbConfig from .config_delete_response import ConfigDeleteResponse as ConfigDeleteResponse diff --git a/src/cloudflare/types/logs/control/cmb/logcontrol_cmb_config.py b/src/cloudflare/types/logs/control/cmb/cmb_config.py similarity index 76% rename from src/cloudflare/types/logs/control/cmb/logcontrol_cmb_config.py rename to src/cloudflare/types/logs/control/cmb/cmb_config.py index 317f24fd393..cf1f90f7437 100644 --- a/src/cloudflare/types/logs/control/cmb/logcontrol_cmb_config.py +++ b/src/cloudflare/types/logs/control/cmb/cmb_config.py @@ -4,9 +4,9 @@ from ....._models import BaseModel -__all__ = ["LogcontrolCmbConfig"] +__all__ = ["CmbConfig"] -class LogcontrolCmbConfig(BaseModel): +class CmbConfig(BaseModel): regions: Optional[str] = None """Comma-separated list of regions.""" diff --git a/src/cloudflare/types/magic_network_monitoring/__init__.py b/src/cloudflare/types/magic_network_monitoring/__init__.py index 855cef74221..1cef197ce1b 100644 --- a/src/cloudflare/types/magic_network_monitoring/__init__.py +++ b/src/cloudflare/types/magic_network_monitoring/__init__.py @@ -3,5 +3,5 @@ from __future__ import annotations from .rule_list_response import RuleListResponse as RuleListResponse -from .magic_visibility_mnm_rule import MagicVisibilityMNMRule as MagicVisibilityMNMRule -from .magic_visibility_mnm_config import MagicVisibilityMNMConfig as MagicVisibilityMNMConfig +from .magic_network_monitoring_rule import MagicNetworkMonitoringRule as MagicNetworkMonitoringRule +from .magic_network_monitoring_config import MagicNetworkMonitoringConfig as MagicNetworkMonitoringConfig diff --git a/src/cloudflare/types/magic_network_monitoring/magic_visibility_mnm_config.py b/src/cloudflare/types/magic_network_monitoring/magic_network_monitoring_config.py similarity index 81% rename from src/cloudflare/types/magic_network_monitoring/magic_visibility_mnm_config.py rename to src/cloudflare/types/magic_network_monitoring/magic_network_monitoring_config.py index 3e0c2dd03b1..a4ca28cadd3 100644 --- a/src/cloudflare/types/magic_network_monitoring/magic_visibility_mnm_config.py +++ b/src/cloudflare/types/magic_network_monitoring/magic_network_monitoring_config.py @@ -4,10 +4,10 @@ from ..._models import BaseModel -__all__ = ["MagicVisibilityMNMConfig"] +__all__ = ["MagicNetworkMonitoringConfig"] -class MagicVisibilityMNMConfig(BaseModel): +class MagicNetworkMonitoringConfig(BaseModel): default_sampling: float """Fallback sampling rate of flow messages being sent in packets per second. diff --git a/src/cloudflare/types/magic_network_monitoring/magic_visibility_mnm_rule.py b/src/cloudflare/types/magic_network_monitoring/magic_network_monitoring_rule.py similarity index 94% rename from src/cloudflare/types/magic_network_monitoring/magic_visibility_mnm_rule.py rename to src/cloudflare/types/magic_network_monitoring/magic_network_monitoring_rule.py index 16ec2c47ae0..8421ef7df0d 100644 --- a/src/cloudflare/types/magic_network_monitoring/magic_visibility_mnm_rule.py +++ b/src/cloudflare/types/magic_network_monitoring/magic_network_monitoring_rule.py @@ -4,10 +4,10 @@ from ..._models import BaseModel -__all__ = ["MagicVisibilityMNMRule"] +__all__ = ["MagicNetworkMonitoringRule"] -class MagicVisibilityMNMRule(BaseModel): +class MagicNetworkMonitoringRule(BaseModel): automatic_advertisement: Optional[bool] = None """ Toggle on if you would like Cloudflare to automatically advertise the IP diff --git a/src/cloudflare/types/magic_network_monitoring/rule_list_response.py b/src/cloudflare/types/magic_network_monitoring/rule_list_response.py index 26b9278a876..29929a92adc 100644 --- a/src/cloudflare/types/magic_network_monitoring/rule_list_response.py +++ b/src/cloudflare/types/magic_network_monitoring/rule_list_response.py @@ -2,8 +2,8 @@ from typing import List, Optional -from .magic_visibility_mnm_rule import MagicVisibilityMNMRule +from .magic_network_monitoring_rule import MagicNetworkMonitoringRule __all__ = ["RuleListResponse"] -RuleListResponse = List[Optional[MagicVisibilityMNMRule]] +RuleListResponse = List[Optional[MagicNetworkMonitoringRule]] diff --git a/src/cloudflare/types/magic_network_monitoring/rules/__init__.py b/src/cloudflare/types/magic_network_monitoring/rules/__init__.py index 23421e7b707..32939a9af6e 100644 --- a/src/cloudflare/types/magic_network_monitoring/rules/__init__.py +++ b/src/cloudflare/types/magic_network_monitoring/rules/__init__.py @@ -2,6 +2,6 @@ from __future__ import annotations -from .magic_visibility_mnm_rule_advertisable import ( - MagicVisibilityMNMRuleAdvertisable as MagicVisibilityMNMRuleAdvertisable, +from .magic_network_monitoring_rule_advertisable import ( + MagicNetworkMonitoringRuleAdvertisable as MagicNetworkMonitoringRuleAdvertisable, ) diff --git a/src/cloudflare/types/magic_network_monitoring/rules/magic_visibility_mnm_rule_advertisable.py b/src/cloudflare/types/magic_network_monitoring/rules/magic_network_monitoring_rule_advertisable.py similarity index 79% rename from src/cloudflare/types/magic_network_monitoring/rules/magic_visibility_mnm_rule_advertisable.py rename to src/cloudflare/types/magic_network_monitoring/rules/magic_network_monitoring_rule_advertisable.py index bfb67487939..c672e0dbe6d 100644 --- a/src/cloudflare/types/magic_network_monitoring/rules/magic_visibility_mnm_rule_advertisable.py +++ b/src/cloudflare/types/magic_network_monitoring/rules/magic_network_monitoring_rule_advertisable.py @@ -4,10 +4,10 @@ from ...._models import BaseModel -__all__ = ["MagicVisibilityMNMRuleAdvertisable"] +__all__ = ["MagicNetworkMonitoringRuleAdvertisable"] -class MagicVisibilityMNMRuleAdvertisable(BaseModel): +class MagicNetworkMonitoringRuleAdvertisable(BaseModel): automatic_advertisement: Optional[bool] = None """ Toggle on if you would like Cloudflare to automatically advertise the IP diff --git a/src/cloudflare/types/tls_certificates_and_hostnames_components_schemas_certificate_object.py b/src/cloudflare/types/mtls_certificate.py similarity index 86% rename from src/cloudflare/types/tls_certificates_and_hostnames_components_schemas_certificate_object.py rename to src/cloudflare/types/mtls_certificate.py index cf331cc0dce..c710efe811b 100644 --- a/src/cloudflare/types/tls_certificates_and_hostnames_components_schemas_certificate_object.py +++ b/src/cloudflare/types/mtls_certificate.py @@ -5,10 +5,10 @@ from .._models import BaseModel -__all__ = ["TLSCertificatesAndHostnamesComponentsSchemasCertificateObject"] +__all__ = ["MTLSCertificate"] -class TLSCertificatesAndHostnamesComponentsSchemasCertificateObject(BaseModel): +class MTLSCertificate(BaseModel): id: Optional[str] = None """Identifier""" diff --git a/src/cloudflare/types/mtls_certificate_list_response.py b/src/cloudflare/types/mtls_certificate_list_response.py index afd0bcc6497..a4dc4610fd2 100644 --- a/src/cloudflare/types/mtls_certificate_list_response.py +++ b/src/cloudflare/types/mtls_certificate_list_response.py @@ -2,10 +2,8 @@ from typing import List -from .tls_certificates_and_hostnames_components_schemas_certificate_object import ( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, -) +from .mtls_certificate import MTLSCertificate __all__ = ["MTLSCertificateListResponse"] -MTLSCertificateListResponse = List[TLSCertificatesAndHostnamesComponentsSchemasCertificateObject] +MTLSCertificateListResponse = List[MTLSCertificate] diff --git a/src/cloudflare/types/tls_certificates_and_hostnames_certificate_object_post.py b/src/cloudflare/types/mtls_certificate_update.py similarity index 89% rename from src/cloudflare/types/tls_certificates_and_hostnames_certificate_object_post.py rename to src/cloudflare/types/mtls_certificate_update.py index 8c8f953bac3..47561988572 100644 --- a/src/cloudflare/types/tls_certificates_and_hostnames_certificate_object_post.py +++ b/src/cloudflare/types/mtls_certificate_update.py @@ -5,10 +5,10 @@ from .._models import BaseModel -__all__ = ["TLSCertificatesAndHostnamesCertificateObjectPost"] +__all__ = ["MTLSCertificateUpdate"] -class TLSCertificatesAndHostnamesCertificateObjectPost(BaseModel): +class MTLSCertificateUpdate(BaseModel): id: Optional[str] = None """Identifier""" diff --git a/src/cloudflare/types/mtls_certificates/__init__.py b/src/cloudflare/types/mtls_certificates/__init__.py index 502ec1e94b4..7ccb696e0db 100644 --- a/src/cloudflare/types/mtls_certificates/__init__.py +++ b/src/cloudflare/types/mtls_certificates/__init__.py @@ -3,6 +3,4 @@ from __future__ import annotations from .association_get_response import AssociationGetResponse as AssociationGetResponse -from .tls_certificates_and_hostnames_association_object import ( - TLSCertificatesAndHostnamesAssociationObject as TLSCertificatesAndHostnamesAssociationObject, -) +from .mtls_certificate_asssociation import MTLSCertificateAsssociation as MTLSCertificateAsssociation diff --git a/src/cloudflare/types/mtls_certificates/association_get_response.py b/src/cloudflare/types/mtls_certificates/association_get_response.py index e2fb0059427..c2b31a396fe 100644 --- a/src/cloudflare/types/mtls_certificates/association_get_response.py +++ b/src/cloudflare/types/mtls_certificates/association_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .tls_certificates_and_hostnames_association_object import TLSCertificatesAndHostnamesAssociationObject +from .mtls_certificate_asssociation import MTLSCertificateAsssociation __all__ = ["AssociationGetResponse"] -AssociationGetResponse = List[TLSCertificatesAndHostnamesAssociationObject] +AssociationGetResponse = List[MTLSCertificateAsssociation] diff --git a/src/cloudflare/types/mtls_certificates/tls_certificates_and_hostnames_association_object.py b/src/cloudflare/types/mtls_certificates/mtls_certificate_asssociation.py similarity index 72% rename from src/cloudflare/types/mtls_certificates/tls_certificates_and_hostnames_association_object.py rename to src/cloudflare/types/mtls_certificates/mtls_certificate_asssociation.py index 970ce3449af..80f6c8444a8 100644 --- a/src/cloudflare/types/mtls_certificates/tls_certificates_and_hostnames_association_object.py +++ b/src/cloudflare/types/mtls_certificates/mtls_certificate_asssociation.py @@ -4,10 +4,10 @@ from ..._models import BaseModel -__all__ = ["TLSCertificatesAndHostnamesAssociationObject"] +__all__ = ["MTLSCertificateAsssociation"] -class TLSCertificatesAndHostnamesAssociationObject(BaseModel): +class MTLSCertificateAsssociation(BaseModel): service: Optional[str] = None """The service using the certificate.""" diff --git a/src/cloudflare/types/origin_tls_client_auth/__init__.py b/src/cloudflare/types/origin_tls_client_auth/__init__.py index 5b4bdef2db5..18468c84971 100644 --- a/src/cloudflare/types/origin_tls_client_auth/__init__.py +++ b/src/cloudflare/types/origin_tls_client_auth/__init__.py @@ -7,6 +7,4 @@ from .hostname_update_params import HostnameUpdateParams as HostnameUpdateParams from .setting_update_response import SettingUpdateResponse as SettingUpdateResponse from .hostname_update_response import HostnameUpdateResponse as HostnameUpdateResponse -from .tls_certificates_and_hostnames_hostname_certid_object import ( - TLSCertificatesAndHostnamesHostnameCertidObject as TLSCertificatesAndHostnamesHostnameCertidObject, -) +from .origin_tls_client_certificate_id import OriginTLSClientCertificateID as OriginTLSClientCertificateID diff --git a/src/cloudflare/types/origin_tls_client_auth/hostname_update_response.py b/src/cloudflare/types/origin_tls_client_auth/hostname_update_response.py index 58f6decdb25..f2bcb7c8e29 100644 --- a/src/cloudflare/types/origin_tls_client_auth/hostname_update_response.py +++ b/src/cloudflare/types/origin_tls_client_auth/hostname_update_response.py @@ -2,8 +2,8 @@ from typing import List -from .tls_certificates_and_hostnames_hostname_certid_object import TLSCertificatesAndHostnamesHostnameCertidObject +from .origin_tls_client_certificate_id import OriginTLSClientCertificateID __all__ = ["HostnameUpdateResponse"] -HostnameUpdateResponse = List[TLSCertificatesAndHostnamesHostnameCertidObject] +HostnameUpdateResponse = List[OriginTLSClientCertificateID] diff --git a/src/cloudflare/types/origin_tls_client_auth/hostnames/__init__.py b/src/cloudflare/types/origin_tls_client_auth/hostnames/__init__.py index 9f9f6e1c8e1..11cf99a6c82 100644 --- a/src/cloudflare/types/origin_tls_client_auth/hostnames/__init__.py +++ b/src/cloudflare/types/origin_tls_client_auth/hostnames/__init__.py @@ -4,6 +4,4 @@ from .certificate_create_params import CertificateCreateParams as CertificateCreateParams from .certificate_list_response import CertificateListResponse as CertificateListResponse -from .tls_certificates_and_hostnames_schemas_certificate_object import ( - TLSCertificatesAndHostnamesSchemasCertificateObject as TLSCertificatesAndHostnamesSchemasCertificateObject, -) +from .origin_tls_client_certificate import OriginTLSClientCertificate as OriginTLSClientCertificate diff --git a/src/cloudflare/types/origin_tls_client_auth/hostnames/certificate_list_response.py b/src/cloudflare/types/origin_tls_client_auth/hostnames/certificate_list_response.py index 03cfd670af8..5dcb437b4d6 100644 --- a/src/cloudflare/types/origin_tls_client_auth/hostnames/certificate_list_response.py +++ b/src/cloudflare/types/origin_tls_client_auth/hostnames/certificate_list_response.py @@ -2,8 +2,8 @@ from typing import List -from ..tls_certificates_and_hostnames_hostname_certid_object import TLSCertificatesAndHostnamesHostnameCertidObject +from ..origin_tls_client_certificate_id import OriginTLSClientCertificateID __all__ = ["CertificateListResponse"] -CertificateListResponse = List[TLSCertificatesAndHostnamesHostnameCertidObject] +CertificateListResponse = List[OriginTLSClientCertificateID] diff --git a/src/cloudflare/types/origin_tls_client_auth/hostnames/tls_certificates_and_hostnames_schemas_certificate_object.py b/src/cloudflare/types/origin_tls_client_auth/hostnames/origin_tls_client_certificate.py similarity index 89% rename from src/cloudflare/types/origin_tls_client_auth/hostnames/tls_certificates_and_hostnames_schemas_certificate_object.py rename to src/cloudflare/types/origin_tls_client_auth/hostnames/origin_tls_client_certificate.py index 47dad3fdb9e..da2f2cdabd2 100644 --- a/src/cloudflare/types/origin_tls_client_auth/hostnames/tls_certificates_and_hostnames_schemas_certificate_object.py +++ b/src/cloudflare/types/origin_tls_client_auth/hostnames/origin_tls_client_certificate.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["TLSCertificatesAndHostnamesSchemasCertificateObject"] +__all__ = ["OriginTLSClientCertificate"] -class TLSCertificatesAndHostnamesSchemasCertificateObject(BaseModel): +class OriginTLSClientCertificate(BaseModel): id: Optional[str] = None """Identifier""" diff --git a/src/cloudflare/types/origin_tls_client_auth/tls_certificates_and_hostnames_hostname_certid_object.py b/src/cloudflare/types/origin_tls_client_auth/origin_tls_client_certificate_id.py similarity index 94% rename from src/cloudflare/types/origin_tls_client_auth/tls_certificates_and_hostnames_hostname_certid_object.py rename to src/cloudflare/types/origin_tls_client_auth/origin_tls_client_certificate_id.py index 151ddbcaeb0..192cccdcc2c 100644 --- a/src/cloudflare/types/origin_tls_client_auth/tls_certificates_and_hostnames_hostname_certid_object.py +++ b/src/cloudflare/types/origin_tls_client_auth/origin_tls_client_certificate_id.py @@ -6,10 +6,10 @@ from ..._models import BaseModel -__all__ = ["TLSCertificatesAndHostnamesHostnameCertidObject"] +__all__ = ["OriginTLSClientCertificateID"] -class TLSCertificatesAndHostnamesHostnameCertidObject(BaseModel): +class OriginTLSClientCertificateID(BaseModel): cert_id: Optional[str] = None """Identifier""" diff --git a/src/cloudflare/types/page_shield/__init__.py b/src/cloudflare/types/page_shield/__init__.py index c009f2ca0ea..ecd67c57457 100644 --- a/src/cloudflare/types/page_shield/__init__.py +++ b/src/cloudflare/types/page_shield/__init__.py @@ -2,6 +2,7 @@ from __future__ import annotations +from .page_shield_policy import PageShieldPolicy as PageShieldPolicy from .page_shield_script import PageShieldScript as PageShieldScript from .script_list_params import ScriptListParams as ScriptListParams from .script_get_response import ScriptGetResponse as ScriptGetResponse @@ -12,4 +13,3 @@ from .connection_list_params import ConnectionListParams as ConnectionListParams from .page_shield_connection import PageShieldConnection as PageShieldConnection from .connection_list_response import ConnectionListResponse as ConnectionListResponse -from .page_shield_pageshield_policy import PageShieldPageshieldPolicy as PageShieldPageshieldPolicy diff --git a/src/cloudflare/types/page_shield/page_shield_pageshield_policy.py b/src/cloudflare/types/page_shield/page_shield_policy.py similarity index 89% rename from src/cloudflare/types/page_shield/page_shield_pageshield_policy.py rename to src/cloudflare/types/page_shield/page_shield_policy.py index 5c021cce924..fccbaf01403 100644 --- a/src/cloudflare/types/page_shield/page_shield_pageshield_policy.py +++ b/src/cloudflare/types/page_shield/page_shield_policy.py @@ -5,10 +5,10 @@ from ..._models import BaseModel -__all__ = ["PageShieldPageshieldPolicy"] +__all__ = ["PageShieldPolicy"] -class PageShieldPageshieldPolicy(BaseModel): +class PageShieldPolicy(BaseModel): id: Optional[str] = None """The ID of the policy""" diff --git a/src/cloudflare/types/page_shield/policy_list_response.py b/src/cloudflare/types/page_shield/policy_list_response.py index 0d91d61f032..ba303df61e0 100644 --- a/src/cloudflare/types/page_shield/policy_list_response.py +++ b/src/cloudflare/types/page_shield/policy_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .page_shield_pageshield_policy import PageShieldPageshieldPolicy +from .page_shield_policy import PageShieldPolicy __all__ = ["PolicyListResponse"] -PolicyListResponse = List[PageShieldPageshieldPolicy] +PolicyListResponse = List[PageShieldPolicy] diff --git a/src/cloudflare/types/page_shield_get_zone_settings.py b/src/cloudflare/types/page_shield_setting.py similarity index 88% rename from src/cloudflare/types/page_shield_get_zone_settings.py rename to src/cloudflare/types/page_shield_setting.py index 1c42b40e350..4fd8f319791 100644 --- a/src/cloudflare/types/page_shield_get_zone_settings.py +++ b/src/cloudflare/types/page_shield_setting.py @@ -4,10 +4,10 @@ from .._models import BaseModel -__all__ = ["PageShieldGetZoneSettings"] +__all__ = ["PageShieldSetting"] -class PageShieldGetZoneSettings(BaseModel): +class PageShieldSetting(BaseModel): enabled: Optional[bool] = None """When true, indicates that Page Shield is enabled.""" diff --git a/src/cloudflare/types/page_shield_update_zone_settings.py b/src/cloudflare/types/page_shield_update_response.py similarity index 88% rename from src/cloudflare/types/page_shield_update_zone_settings.py rename to src/cloudflare/types/page_shield_update_response.py index 035dc8e8d4c..02a8f02ce62 100644 --- a/src/cloudflare/types/page_shield_update_zone_settings.py +++ b/src/cloudflare/types/page_shield_update_response.py @@ -4,10 +4,10 @@ from .._models import BaseModel -__all__ = ["PageShieldUpdateZoneSettings"] +__all__ = ["PageShieldUpdateResponse"] -class PageShieldUpdateZoneSettings(BaseModel): +class PageShieldUpdateResponse(BaseModel): enabled: Optional[bool] = None """When true, indicates that Page Shield is enabled.""" diff --git a/src/cloudflare/types/pagerule_list_response.py b/src/cloudflare/types/pagerule_list_response.py index 85f08a4081a..f4d462fc10e 100644 --- a/src/cloudflare/types/pagerule_list_response.py +++ b/src/cloudflare/types/pagerule_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .zones_page_rule import ZonesPageRule +from .zones_pagerule import ZonesPagerule __all__ = ["PageruleListResponse"] -PageruleListResponse = List[ZonesPageRule] +PageruleListResponse = List[ZonesPagerule] diff --git a/src/cloudflare/types/pagerules/__init__.py b/src/cloudflare/types/pagerules/__init__.py index 120e6e155df..b6c34e2640a 100644 --- a/src/cloudflare/types/pagerules/__init__.py +++ b/src/cloudflare/types/pagerules/__init__.py @@ -2,4 +2,4 @@ from __future__ import annotations -from .zones_settings import ZonesSettings as ZonesSettings +from .zone_pagerule_settings import ZonePageruleSettings as ZonePageruleSettings diff --git a/src/cloudflare/types/pagerules/zones_settings.py b/src/cloudflare/types/pagerules/zone_pagerule_settings.py similarity index 61% rename from src/cloudflare/types/pagerules/zones_settings.py rename to src/cloudflare/types/pagerules/zone_pagerule_settings.py index 458e68a653e..d7c22fbd6ed 100644 --- a/src/cloudflare/types/pagerules/zones_settings.py +++ b/src/cloudflare/types/pagerules/zone_pagerule_settings.py @@ -2,6 +2,6 @@ from typing import List -__all__ = ["ZonesSettings"] +__all__ = ["ZonePageruleSettings"] -ZonesSettings = List[object] +ZonePageruleSettings = List[object] diff --git a/src/cloudflare/types/plan_list_response.py b/src/cloudflare/types/plan_list_response.py index 349d1a5843c..0b3bfce127b 100644 --- a/src/cloudflare/types/plan_list_response.py +++ b/src/cloudflare/types/plan_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .bill_subs_api_available_rate_plan import BillSubsAPIAvailableRatePlan +from .available_rate_plan import AvailableRatePlan __all__ = ["PlanListResponse"] -PlanListResponse = List[BillSubsAPIAvailableRatePlan] +PlanListResponse = List[AvailableRatePlan] diff --git a/src/cloudflare/types/request_tracers/__init__.py b/src/cloudflare/types/request_tracers/__init__.py index fb3abea3227..27e1d8c7f50 100644 --- a/src/cloudflare/types/request_tracers/__init__.py +++ b/src/cloudflare/types/request_tracers/__init__.py @@ -2,6 +2,6 @@ from __future__ import annotations +from .request_trace import RequestTrace as RequestTrace from .trace_create_params import TraceCreateParams as TraceCreateParams -from .request_tracer_trace import RequestTracerTrace as RequestTracerTrace from .trace_create_response import TraceCreateResponse as TraceCreateResponse diff --git a/src/cloudflare/types/request_tracers/request_tracer_trace.py b/src/cloudflare/types/request_tracers/request_trace.py similarity index 78% rename from src/cloudflare/types/request_tracers/request_tracer_trace.py rename to src/cloudflare/types/request_tracers/request_trace.py index e98038cc66d..e93324669fa 100644 --- a/src/cloudflare/types/request_tracers/request_tracer_trace.py +++ b/src/cloudflare/types/request_tracers/request_trace.py @@ -7,10 +7,10 @@ from ..._compat import PYDANTIC_V2 from ..._models import BaseModel -__all__ = ["RequestTracerTrace", "RequestTracerTraceItem"] +__all__ = ["RequestTrace", "RequestTraceItem"] -class RequestTracerTraceItem(BaseModel): +class RequestTraceItem(BaseModel): action: Optional[str] = None """If step type is rule, then action performed by this rule""" @@ -35,15 +35,15 @@ class RequestTracerTraceItem(BaseModel): step_name: Optional[str] = None """Tracing step identifying name""" - trace: Optional[RequestTracerTrace] = None + trace: Optional[RequestTrace] = None type: Optional[str] = None """Tracing step type""" -RequestTracerTrace = List[RequestTracerTraceItem] +RequestTrace = List[RequestTraceItem] if PYDANTIC_V2: - RequestTracerTraceItem.model_rebuild() + RequestTraceItem.model_rebuild() else: - RequestTracerTraceItem.update_forward_refs() # type: ignore + RequestTraceItem.update_forward_refs() # type: ignore diff --git a/src/cloudflare/types/request_tracers/trace_create_response.py b/src/cloudflare/types/request_tracers/trace_create_response.py index 2738569266b..95f03348589 100644 --- a/src/cloudflare/types/request_tracers/trace_create_response.py +++ b/src/cloudflare/types/request_tracers/trace_create_response.py @@ -14,10 +14,10 @@ class TraceCreateResponse(BaseModel): status_code: Optional[int] = None """HTTP Status code of zone response""" - trace: Optional["RequestTracerTrace"] = None + trace: Optional["RequestTrace"] = None -from .request_tracer_trace import RequestTracerTrace +from .request_trace import RequestTrace if PYDANTIC_V2: TraceCreateResponse.model_rebuild() diff --git a/src/cloudflare/types/secondary_dns/__init__.py b/src/cloudflare/types/secondary_dns/__init__.py index e944c03733c..69b24dee5eb 100644 --- a/src/cloudflare/types/secondary_dns/__init__.py +++ b/src/cloudflare/types/secondary_dns/__init__.py @@ -15,6 +15,7 @@ from .tsig_list_response import TSIGListResponse as TSIGListResponse from .tsig_update_params import TSIGUpdateParams as TSIGUpdateParams from .acl_delete_response import ACLDeleteResponse as ACLDeleteResponse +from .secondary_dns_force import SecondaryDNSForce as SecondaryDNSForce from .peer_delete_response import PeerDeleteResponse as PeerDeleteResponse from .tsig_delete_response import TSIGDeleteResponse as TSIGDeleteResponse from .incoming_get_response import IncomingGetResponse as IncomingGetResponse @@ -29,9 +30,5 @@ from .outgoing_create_response import OutgoingCreateResponse as OutgoingCreateResponse from .outgoing_delete_response import OutgoingDeleteResponse as OutgoingDeleteResponse from .outgoing_update_response import OutgoingUpdateResponse as OutgoingUpdateResponse -from .secondary_dns_force_result import SecondaryDNSForceResult as SecondaryDNSForceResult -from .secondary_dns_schemas_force_result import SecondaryDNSSchemasForceResult as SecondaryDNSSchemasForceResult -from .secondary_dns_enable_transfer_result import SecondaryDNSEnableTransferResult as SecondaryDNSEnableTransferResult -from .secondary_dns_disable_transfer_result import ( - SecondaryDNSDisableTransferResult as SecondaryDNSDisableTransferResult, -) +from .secondary_dns_enable_transfer import SecondaryDNSEnableTransfer as SecondaryDNSEnableTransfer +from .secondary_dns_disable_transfer import SecondaryDNSDisableTransfer as SecondaryDNSDisableTransfer diff --git a/src/cloudflare/types/secondary_dns/secondary_dns_schemas_force_result.py b/src/cloudflare/types/secondary_dns/secondary_dns_disable_transfer.py similarity index 52% rename from src/cloudflare/types/secondary_dns/secondary_dns_schemas_force_result.py rename to src/cloudflare/types/secondary_dns/secondary_dns_disable_transfer.py index 5d3c0aa114b..cca54ddc05b 100644 --- a/src/cloudflare/types/secondary_dns/secondary_dns_schemas_force_result.py +++ b/src/cloudflare/types/secondary_dns/secondary_dns_disable_transfer.py @@ -1,6 +1,6 @@ # File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. -__all__ = ["SecondaryDNSSchemasForceResult"] +__all__ = ["SecondaryDNSDisableTransfer"] -SecondaryDNSSchemasForceResult = str +SecondaryDNSDisableTransfer = str diff --git a/src/cloudflare/types/secondary_dns/secondary_dns_disable_transfer_result.py b/src/cloudflare/types/secondary_dns/secondary_dns_disable_transfer_result.py deleted file mode 100644 index adb8f8a4bc6..00000000000 --- a/src/cloudflare/types/secondary_dns/secondary_dns_disable_transfer_result.py +++ /dev/null @@ -1,6 +0,0 @@ -# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. - - -__all__ = ["SecondaryDNSDisableTransferResult"] - -SecondaryDNSDisableTransferResult = str diff --git a/src/cloudflare/types/secondary_dns/secondary_dns_enable_transfer.py b/src/cloudflare/types/secondary_dns/secondary_dns_enable_transfer.py new file mode 100644 index 00000000000..2faf7d71613 --- /dev/null +++ b/src/cloudflare/types/secondary_dns/secondary_dns_enable_transfer.py @@ -0,0 +1,6 @@ +# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. + + +__all__ = ["SecondaryDNSEnableTransfer"] + +SecondaryDNSEnableTransfer = str diff --git a/src/cloudflare/types/secondary_dns/secondary_dns_enable_transfer_result.py b/src/cloudflare/types/secondary_dns/secondary_dns_enable_transfer_result.py deleted file mode 100644 index 9032ba4697f..00000000000 --- a/src/cloudflare/types/secondary_dns/secondary_dns_enable_transfer_result.py +++ /dev/null @@ -1,6 +0,0 @@ -# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. - - -__all__ = ["SecondaryDNSEnableTransferResult"] - -SecondaryDNSEnableTransferResult = str diff --git a/src/cloudflare/types/secondary_dns/secondary_dns_force_result.py b/src/cloudflare/types/secondary_dns/secondary_dns_force.py similarity index 56% rename from src/cloudflare/types/secondary_dns/secondary_dns_force_result.py rename to src/cloudflare/types/secondary_dns/secondary_dns_force.py index ad1aae99d47..7b693b2feb6 100644 --- a/src/cloudflare/types/secondary_dns/secondary_dns_force_result.py +++ b/src/cloudflare/types/secondary_dns/secondary_dns_force.py @@ -1,6 +1,6 @@ # File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. -__all__ = ["SecondaryDNSForceResult"] +__all__ = ["SecondaryDNSForce"] -SecondaryDNSForceResult = str +SecondaryDNSForce = str diff --git a/src/cloudflare/types/ssl/__init__.py b/src/cloudflare/types/ssl/__init__.py index f9008ea8aaa..1d4a5253625 100644 --- a/src/cloudflare/types/ssl/__init__.py +++ b/src/cloudflare/types/ssl/__init__.py @@ -5,6 +5,7 @@ from .analyze_create_params import AnalyzeCreateParams as AnalyzeCreateParams from .analyze_create_response import AnalyzeCreateResponse as AnalyzeCreateResponse from .verification_get_params import VerificationGetParams as VerificationGetParams +from .tls_verification_setting import TLSVerificationSetting as TLSVerificationSetting from .verification_edit_params import VerificationEditParams as VerificationEditParams from .verification_get_response import VerificationGetResponse as VerificationGetResponse from .verification_edit_response import VerificationEditResponse as VerificationEditResponse @@ -14,6 +15,3 @@ from .certificate_pack_edit_response import CertificatePackEditResponse as CertificatePackEditResponse from .certificate_pack_list_response import CertificatePackListResponse as CertificatePackListResponse from .certificate_pack_delete_response import CertificatePackDeleteResponse as CertificatePackDeleteResponse -from .tls_certificates_and_hostnames_verification import ( - TLSCertificatesAndHostnamesVerification as TLSCertificatesAndHostnamesVerification, -) diff --git a/src/cloudflare/types/ssl/tls_certificates_and_hostnames_verification.py b/src/cloudflare/types/ssl/tls_verification_setting.py similarity index 91% rename from src/cloudflare/types/ssl/tls_certificates_and_hostnames_verification.py rename to src/cloudflare/types/ssl/tls_verification_setting.py index 4dbdc403dd1..0435f6f6e22 100644 --- a/src/cloudflare/types/ssl/tls_certificates_and_hostnames_verification.py +++ b/src/cloudflare/types/ssl/tls_verification_setting.py @@ -5,7 +5,7 @@ from ..._models import BaseModel -__all__ = ["TLSCertificatesAndHostnamesVerification", "VerificationInfo"] +__all__ = ["TLSVerificationSetting", "VerificationInfo"] class VerificationInfo(BaseModel): @@ -16,7 +16,7 @@ class VerificationInfo(BaseModel): """Target of CNAME record.""" -class TLSCertificatesAndHostnamesVerification(BaseModel): +class TLSVerificationSetting(BaseModel): certificate_status: Literal[ "initializing", "authorizing", "active", "expired", "issuing", "timing_out", "pending_deployment" ] diff --git a/src/cloudflare/types/ssl/universal/__init__.py b/src/cloudflare/types/ssl/universal/__init__.py index 87806a7971e..5fd261ecd39 100644 --- a/src/cloudflare/types/ssl/universal/__init__.py +++ b/src/cloudflare/types/ssl/universal/__init__.py @@ -3,6 +3,4 @@ from __future__ import annotations from .setting_edit_params import SettingEditParams as SettingEditParams -from .tls_certificates_and_hostnames_universal import ( - TLSCertificatesAndHostnamesUniversal as TLSCertificatesAndHostnamesUniversal, -) +from .universal_ssl_settings import UniversalSSLSettings as UniversalSSLSettings diff --git a/src/cloudflare/types/ssl/universal/tls_certificates_and_hostnames_universal.py b/src/cloudflare/types/ssl/universal/universal_ssl_settings.py similarity index 93% rename from src/cloudflare/types/ssl/universal/tls_certificates_and_hostnames_universal.py rename to src/cloudflare/types/ssl/universal/universal_ssl_settings.py index 4c5936bf13b..c75187758c4 100644 --- a/src/cloudflare/types/ssl/universal/tls_certificates_and_hostnames_universal.py +++ b/src/cloudflare/types/ssl/universal/universal_ssl_settings.py @@ -4,10 +4,10 @@ from ...._models import BaseModel -__all__ = ["TLSCertificatesAndHostnamesUniversal"] +__all__ = ["UniversalSSLSettings"] -class TLSCertificatesAndHostnamesUniversal(BaseModel): +class UniversalSSLSettings(BaseModel): enabled: Optional[bool] = None """ Disabling Universal SSL removes any currently active Universal SSL certificates diff --git a/src/cloudflare/types/ssl/verification_get_response.py b/src/cloudflare/types/ssl/verification_get_response.py index 2276ae5f47a..7d6fe83cab4 100644 --- a/src/cloudflare/types/ssl/verification_get_response.py +++ b/src/cloudflare/types/ssl/verification_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .tls_certificates_and_hostnames_verification import TLSCertificatesAndHostnamesVerification +from .tls_verification_setting import TLSVerificationSetting __all__ = ["VerificationGetResponse"] -VerificationGetResponse = List[TLSCertificatesAndHostnamesVerification] +VerificationGetResponse = List[TLSVerificationSetting] diff --git a/src/cloudflare/types/stream/__init__.py b/src/cloudflare/types/stream/__init__.py index 6ad163c5b72..532bacd0826 100644 --- a/src/cloudflare/types/stream/__init__.py +++ b/src/cloudflare/types/stream/__init__.py @@ -3,6 +3,7 @@ from __future__ import annotations from .stream_keys import StreamKeys as StreamKeys +from .stream_audio import StreamAudio as StreamAudio from .stream_captions import StreamCaptions as StreamCaptions from .stream_clipping import StreamClipping as StreamClipping from .key_get_response import KeyGetResponse as KeyGetResponse @@ -25,7 +26,6 @@ from .audio_track_edit_params import AudioTrackEditParams as AudioTrackEditParams from .caption_delete_response import CaptionDeleteResponse as CaptionDeleteResponse from .caption_update_response import CaptionUpdateResponse as CaptionUpdateResponse -from .stream_additional_audio import StreamAdditionalAudio as StreamAdditionalAudio from .watermark_create_params import WatermarkCreateParams as WatermarkCreateParams from .watermark_list_response import WatermarkListResponse as WatermarkListResponse from .webhook_delete_response import WebhookDeleteResponse as WebhookDeleteResponse diff --git a/src/cloudflare/types/stream/audio_track_get_response.py b/src/cloudflare/types/stream/audio_track_get_response.py index c5bc3ec83ef..893a4995463 100644 --- a/src/cloudflare/types/stream/audio_track_get_response.py +++ b/src/cloudflare/types/stream/audio_track_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .stream_additional_audio import StreamAdditionalAudio +from .stream_audio import StreamAudio __all__ = ["AudioTrackGetResponse"] -AudioTrackGetResponse = List[StreamAdditionalAudio] +AudioTrackGetResponse = List[StreamAudio] diff --git a/src/cloudflare/types/stream/stream_additional_audio.py b/src/cloudflare/types/stream/stream_audio.py similarity index 89% rename from src/cloudflare/types/stream/stream_additional_audio.py rename to src/cloudflare/types/stream/stream_audio.py index 44b4406e9df..2b90d9a8d8e 100644 --- a/src/cloudflare/types/stream/stream_additional_audio.py +++ b/src/cloudflare/types/stream/stream_audio.py @@ -5,10 +5,10 @@ from ..._models import BaseModel -__all__ = ["StreamAdditionalAudio"] +__all__ = ["StreamAudio"] -class StreamAdditionalAudio(BaseModel): +class StreamAudio(BaseModel): default: Optional[bool] = None """Denotes whether the audio track will be played by default in a player.""" diff --git a/src/cloudflare/types/user/__init__.py b/src/cloudflare/types/user/__init__.py index a87afe5461e..5281439e432 100644 --- a/src/cloudflare/types/user/__init__.py +++ b/src/cloudflare/types/user/__init__.py @@ -3,7 +3,7 @@ from __future__ import annotations from .user import User as User -from .iam_organization import IamOrganization as IamOrganization +from .organization import Organization as Organization from .token_list_params import TokenListParams as TokenListParams from .invite_edit_params import InviteEditParams as InviteEditParams from .token_get_response import TokenGetResponse as TokenGetResponse diff --git a/src/cloudflare/types/user/billing/__init__.py b/src/cloudflare/types/user/billing/__init__.py index 8731b17ffc5..e8ddc3e1d28 100644 --- a/src/cloudflare/types/user/billing/__init__.py +++ b/src/cloudflare/types/user/billing/__init__.py @@ -2,7 +2,7 @@ from __future__ import annotations +from .billing_history import BillingHistory as BillingHistory from .history_get_params import HistoryGetParams as HistoryGetParams from .history_get_response import HistoryGetResponse as HistoryGetResponse from .profile_get_response import ProfileGetResponse as ProfileGetResponse -from .bill_subs_api_billing_history import BillSubsAPIBillingHistory as BillSubsAPIBillingHistory diff --git a/src/cloudflare/types/user/billing/bill_subs_api_billing_history.py b/src/cloudflare/types/user/billing/billing_history.py similarity index 88% rename from src/cloudflare/types/user/billing/bill_subs_api_billing_history.py rename to src/cloudflare/types/user/billing/billing_history.py index c1976d68d7e..443be2603c1 100644 --- a/src/cloudflare/types/user/billing/bill_subs_api_billing_history.py +++ b/src/cloudflare/types/user/billing/billing_history.py @@ -5,14 +5,14 @@ from ...._models import BaseModel -__all__ = ["BillSubsAPIBillingHistory", "Zone"] +__all__ = ["BillingHistory", "Zone"] class Zone(BaseModel): name: Optional[object] = None -class BillSubsAPIBillingHistory(BaseModel): +class BillingHistory(BaseModel): id: str """Billing item identifier tag.""" diff --git a/src/cloudflare/types/user/billing/history_get_response.py b/src/cloudflare/types/user/billing/history_get_response.py index 3c0233009c9..a3679cab400 100644 --- a/src/cloudflare/types/user/billing/history_get_response.py +++ b/src/cloudflare/types/user/billing/history_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .bill_subs_api_billing_history import BillSubsAPIBillingHistory +from .billing_history import BillingHistory __all__ = ["HistoryGetResponse"] -HistoryGetResponse = List[BillSubsAPIBillingHistory] +HistoryGetResponse = List[BillingHistory] diff --git a/src/cloudflare/types/user/firewall/__init__.py b/src/cloudflare/types/user/firewall/__init__.py index 2cc2bd128e3..252757e1979 100644 --- a/src/cloudflare/types/user/firewall/__init__.py +++ b/src/cloudflare/types/user/firewall/__init__.py @@ -2,7 +2,7 @@ from __future__ import annotations -from .legacy_jhs_rule import LegacyJhsRule as LegacyJhsRule +from .firewall_rule import FirewallRule as FirewallRule from .access_rule_edit_params import AccessRuleEditParams as AccessRuleEditParams from .access_rule_list_params import AccessRuleListParams as AccessRuleListParams from .access_rule_create_params import AccessRuleCreateParams as AccessRuleCreateParams diff --git a/src/cloudflare/types/user/firewall/legacy_jhs_rule.py b/src/cloudflare/types/user/firewall/firewall_rule.py similarity index 98% rename from src/cloudflare/types/user/firewall/legacy_jhs_rule.py rename to src/cloudflare/types/user/firewall/firewall_rule.py index 3e8efabdb07..f7bc7e5f602 100644 --- a/src/cloudflare/types/user/firewall/legacy_jhs_rule.py +++ b/src/cloudflare/types/user/firewall/firewall_rule.py @@ -7,7 +7,7 @@ from ...._models import BaseModel __all__ = [ - "LegacyJhsRule", + "FirewallRule", "Configuration", "ConfigurationLegacyJhsIPConfiguration", "ConfigurationLegacyJhsIPV6Configuration", @@ -94,7 +94,7 @@ class ConfigurationLegacyJhsCountryConfiguration(BaseModel): ] -class LegacyJhsRule(BaseModel): +class FirewallRule(BaseModel): id: str """The unique identifier of the IP Access rule.""" diff --git a/src/cloudflare/types/user/invite_list_response.py b/src/cloudflare/types/user/invite_list_response.py index aa13fb6c0fb..338d0f09636 100644 --- a/src/cloudflare/types/user/invite_list_response.py +++ b/src/cloudflare/types/user/invite_list_response.py @@ -5,7 +5,7 @@ from typing_extensions import Literal from ..._models import BaseModel -from ..accounts import IamSchemasRole +from ..accounts import Role __all__ = ["InviteListResponse", "InviteListResponseItem"] @@ -35,7 +35,7 @@ class InviteListResponseItem(BaseModel): organization_name: Optional[str] = None """Organization name.""" - roles: Optional[List[IamSchemasRole]] = None + roles: Optional[List[Role]] = None """Roles to be assigned to this user.""" status: Optional[Literal["pending", "accepted", "rejected", "expired"]] = None diff --git a/src/cloudflare/types/user/load_balancers/__init__.py b/src/cloudflare/types/user/load_balancers/__init__.py index a6e39d9c4ba..650c5b7f348 100644 --- a/src/cloudflare/types/user/load_balancers/__init__.py +++ b/src/cloudflare/types/user/load_balancers/__init__.py @@ -17,9 +17,9 @@ from .monitor_update_params import MonitorUpdateParams as MonitorUpdateParams from .pool_preview_response import PoolPreviewResponse as PoolPreviewResponse from .load_balancing_monitor import LoadBalancingMonitor as LoadBalancingMonitor +from .load_balancing_preview import LoadBalancingPreview as LoadBalancingPreview from .monitor_preview_params import MonitorPreviewParams as MonitorPreviewParams from .monitor_delete_response import MonitorDeleteResponse as MonitorDeleteResponse from .monitor_preview_response import MonitorPreviewResponse as MonitorPreviewResponse from .pool_references_response import PoolReferencesResponse as PoolReferencesResponse from .monitor_references_response import MonitorReferencesResponse as MonitorReferencesResponse -from .load_balancing_preview_result import LoadBalancingPreviewResult as LoadBalancingPreviewResult diff --git a/src/cloudflare/types/user/load_balancers/load_balancing_preview.py b/src/cloudflare/types/user/load_balancers/load_balancing_preview.py new file mode 100644 index 00000000000..6ab9378796f --- /dev/null +++ b/src/cloudflare/types/user/load_balancers/load_balancing_preview.py @@ -0,0 +1,30 @@ +# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. + +from typing import Dict, List, Optional + +from ...._models import BaseModel + +__all__ = [ + "LoadBalancingPreview", + "LoadBalancingPreviewItem", + "LoadBalancingPreviewItemOriginLoadBalancingPreviewItemOriginItem", +] + + +class LoadBalancingPreviewItemOriginLoadBalancingPreviewItemOriginItem(BaseModel): + failure_reason: Optional[str] = None + + healthy: Optional[bool] = None + + response_code: Optional[float] = None + + rtt: Optional[str] = None + + +class LoadBalancingPreviewItem(BaseModel): + healthy: Optional[bool] = None + + origins: Optional[List[Dict[str, LoadBalancingPreviewItemOriginLoadBalancingPreviewItemOriginItem]]] = None + + +LoadBalancingPreview = Dict[str, LoadBalancingPreviewItem] diff --git a/src/cloudflare/types/user/load_balancers/load_balancing_preview_result.py b/src/cloudflare/types/user/load_balancers/load_balancing_preview_result.py deleted file mode 100644 index 36b9caff1f9..00000000000 --- a/src/cloudflare/types/user/load_balancers/load_balancing_preview_result.py +++ /dev/null @@ -1,32 +0,0 @@ -# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. - -from typing import Dict, List, Optional - -from ...._models import BaseModel - -__all__ = [ - "LoadBalancingPreviewResult", - "LoadBalancingPreviewResultItem", - "LoadBalancingPreviewResultItemOriginLoadBalancingPreviewResultItemOriginItem", -] - - -class LoadBalancingPreviewResultItemOriginLoadBalancingPreviewResultItemOriginItem(BaseModel): - failure_reason: Optional[str] = None - - healthy: Optional[bool] = None - - response_code: Optional[float] = None - - rtt: Optional[str] = None - - -class LoadBalancingPreviewResultItem(BaseModel): - healthy: Optional[bool] = None - - origins: Optional[ - List[Dict[str, LoadBalancingPreviewResultItemOriginLoadBalancingPreviewResultItemOriginItem]] - ] = None - - -LoadBalancingPreviewResult = Dict[str, LoadBalancingPreviewResultItem] diff --git a/src/cloudflare/types/user/iam_organization.py b/src/cloudflare/types/user/organization.py similarity index 91% rename from src/cloudflare/types/user/iam_organization.py rename to src/cloudflare/types/user/organization.py index 1b19119847e..bd59f71e4b1 100644 --- a/src/cloudflare/types/user/iam_organization.py +++ b/src/cloudflare/types/user/organization.py @@ -5,10 +5,10 @@ from ..._models import BaseModel -__all__ = ["IamOrganization"] +__all__ = ["Organization"] -class IamOrganization(BaseModel): +class Organization(BaseModel): id: Optional[str] = None """Identifier""" diff --git a/src/cloudflare/types/user/token_create_response.py b/src/cloudflare/types/user/token_create_response.py index ad048da9a38..45701a4c3f1 100644 --- a/src/cloudflare/types/user/token_create_response.py +++ b/src/cloudflare/types/user/token_create_response.py @@ -2,12 +2,12 @@ from typing import Optional -from .tokens import IamValue +from .tokens import TokenValue from ..._models import BaseModel __all__ = ["TokenCreateResponse"] class TokenCreateResponse(BaseModel): - value: Optional[IamValue] = None + value: Optional[TokenValue] = None """The token value.""" diff --git a/src/cloudflare/types/user/tokens/__init__.py b/src/cloudflare/types/user/tokens/__init__.py index 2a774675112..e8c83a2d8f5 100644 --- a/src/cloudflare/types/user/tokens/__init__.py +++ b/src/cloudflare/types/user/tokens/__init__.py @@ -2,6 +2,6 @@ from __future__ import annotations -from .iam_value import IamValue as IamValue +from .token_value import TokenValue as TokenValue from .value_update_params import ValueUpdateParams as ValueUpdateParams from .permission_group_list_response import PermissionGroupListResponse as PermissionGroupListResponse diff --git a/src/cloudflare/types/user/tokens/iam_value.py b/src/cloudflare/types/user/tokens/token_value.py similarity index 67% rename from src/cloudflare/types/user/tokens/iam_value.py rename to src/cloudflare/types/user/tokens/token_value.py index ddfef5ce2fd..8087bf31b1e 100644 --- a/src/cloudflare/types/user/tokens/iam_value.py +++ b/src/cloudflare/types/user/tokens/token_value.py @@ -1,6 +1,6 @@ # File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. -__all__ = ["IamValue"] +__all__ = ["TokenValue"] -IamValue = str +TokenValue = str diff --git a/src/cloudflare/types/waitingroom_waitingroom.py b/src/cloudflare/types/waiting_room.py similarity index 99% rename from src/cloudflare/types/waitingroom_waitingroom.py rename to src/cloudflare/types/waiting_room.py index 536b83b7bd6..7c45f1f0099 100644 --- a/src/cloudflare/types/waitingroom_waitingroom.py +++ b/src/cloudflare/types/waiting_room.py @@ -6,7 +6,7 @@ from .._models import BaseModel -__all__ = ["WaitingroomWaitingroom", "AdditionalRoute", "CookieAttributes"] +__all__ = ["WaitingRoom", "AdditionalRoute", "CookieAttributes"] class AdditionalRoute(BaseModel): @@ -45,7 +45,7 @@ class CookieAttributes(BaseModel): """ -class WaitingroomWaitingroom(BaseModel): +class WaitingRoom(BaseModel): id: Optional[str] = None additional_routes: Optional[List[AdditionalRoute]] = None diff --git a/src/cloudflare/types/waiting_room_list_response.py b/src/cloudflare/types/waiting_room_list_response.py index daa10e8d86e..45a85780e8a 100644 --- a/src/cloudflare/types/waiting_room_list_response.py +++ b/src/cloudflare/types/waiting_room_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .waitingroom_waitingroom import WaitingroomWaitingroom +from .waiting_room import WaitingRoom __all__ = ["WaitingRoomListResponse"] -WaitingRoomListResponse = List[WaitingroomWaitingroom] +WaitingRoomListResponse = List[WaitingRoom] diff --git a/src/cloudflare/types/waiting_rooms/__init__.py b/src/cloudflare/types/waiting_rooms/__init__.py index 72609c243c3..0175c121a21 100644 --- a/src/cloudflare/types/waiting_rooms/__init__.py +++ b/src/cloudflare/types/waiting_rooms/__init__.py @@ -3,7 +3,9 @@ from __future__ import annotations from .rule_edit_params import RuleEditParams as RuleEditParams +from .waitingroom_rule import WaitingroomRule as WaitingroomRule from .event_edit_params import EventEditParams as EventEditParams +from .waitingroom_event import WaitingroomEvent as WaitingroomEvent from .rule_create_params import RuleCreateParams as RuleCreateParams from .rule_edit_response import RuleEditResponse as RuleEditResponse from .rule_list_response import RuleListResponse as RuleListResponse @@ -23,5 +25,3 @@ from .setting_edit_response import SettingEditResponse as SettingEditResponse from .setting_update_params import SettingUpdateParams as SettingUpdateParams from .setting_update_response import SettingUpdateResponse as SettingUpdateResponse -from .waitingroom_rule_result import WaitingroomRuleResult as WaitingroomRuleResult -from .waitingroom_event_result import WaitingroomEventResult as WaitingroomEventResult diff --git a/src/cloudflare/types/waiting_rooms/event_list_response.py b/src/cloudflare/types/waiting_rooms/event_list_response.py index 19f8c01b4d9..1aae0ee87eb 100644 --- a/src/cloudflare/types/waiting_rooms/event_list_response.py +++ b/src/cloudflare/types/waiting_rooms/event_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .waitingroom_event_result import WaitingroomEventResult +from .waitingroom_event import WaitingroomEvent __all__ = ["EventListResponse"] -EventListResponse = List[WaitingroomEventResult] +EventListResponse = List[WaitingroomEvent] diff --git a/src/cloudflare/types/waiting_rooms/events/__init__.py b/src/cloudflare/types/waiting_rooms/events/__init__.py index fbada12d976..cbaf1d11ff9 100644 --- a/src/cloudflare/types/waiting_rooms/events/__init__.py +++ b/src/cloudflare/types/waiting_rooms/events/__init__.py @@ -2,4 +2,4 @@ from __future__ import annotations -from .waitingroom_event_details_result import WaitingroomEventDetailsResult as WaitingroomEventDetailsResult +from .waitingroom_event_details import WaitingroomEventDetails as WaitingroomEventDetails diff --git a/src/cloudflare/types/waiting_rooms/events/waitingroom_event_details_result.py b/src/cloudflare/types/waiting_rooms/events/waitingroom_event_details.py similarity index 95% rename from src/cloudflare/types/waiting_rooms/events/waitingroom_event_details_result.py rename to src/cloudflare/types/waiting_rooms/events/waitingroom_event_details.py index 4ddc57b358b..c366a49bc46 100644 --- a/src/cloudflare/types/waiting_rooms/events/waitingroom_event_details_result.py +++ b/src/cloudflare/types/waiting_rooms/events/waitingroom_event_details.py @@ -5,10 +5,10 @@ from ...._models import BaseModel -__all__ = ["WaitingroomEventDetailsResult"] +__all__ = ["WaitingroomEventDetails"] -class WaitingroomEventDetailsResult(BaseModel): +class WaitingroomEventDetails(BaseModel): id: Optional[str] = None created_on: Optional[datetime] = None diff --git a/src/cloudflare/types/waiting_rooms/rule_create_response.py b/src/cloudflare/types/waiting_rooms/rule_create_response.py index 1fbe888f362..0b669b7e5da 100644 --- a/src/cloudflare/types/waiting_rooms/rule_create_response.py +++ b/src/cloudflare/types/waiting_rooms/rule_create_response.py @@ -2,8 +2,8 @@ from typing import List -from .waitingroom_rule_result import WaitingroomRuleResult +from .waitingroom_rule import WaitingroomRule __all__ = ["RuleCreateResponse"] -RuleCreateResponse = List[WaitingroomRuleResult] +RuleCreateResponse = List[WaitingroomRule] diff --git a/src/cloudflare/types/waiting_rooms/rule_delete_response.py b/src/cloudflare/types/waiting_rooms/rule_delete_response.py index 2cdef8d6daa..6c5de05a3fe 100644 --- a/src/cloudflare/types/waiting_rooms/rule_delete_response.py +++ b/src/cloudflare/types/waiting_rooms/rule_delete_response.py @@ -2,8 +2,8 @@ from typing import List -from .waitingroom_rule_result import WaitingroomRuleResult +from .waitingroom_rule import WaitingroomRule __all__ = ["RuleDeleteResponse"] -RuleDeleteResponse = List[WaitingroomRuleResult] +RuleDeleteResponse = List[WaitingroomRule] diff --git a/src/cloudflare/types/waiting_rooms/rule_edit_response.py b/src/cloudflare/types/waiting_rooms/rule_edit_response.py index fb87c112337..326fed99592 100644 --- a/src/cloudflare/types/waiting_rooms/rule_edit_response.py +++ b/src/cloudflare/types/waiting_rooms/rule_edit_response.py @@ -2,8 +2,8 @@ from typing import List -from .waitingroom_rule_result import WaitingroomRuleResult +from .waitingroom_rule import WaitingroomRule __all__ = ["RuleEditResponse"] -RuleEditResponse = List[WaitingroomRuleResult] +RuleEditResponse = List[WaitingroomRule] diff --git a/src/cloudflare/types/waiting_rooms/rule_list_response.py b/src/cloudflare/types/waiting_rooms/rule_list_response.py index fbe306759ac..7b1cf806b3b 100644 --- a/src/cloudflare/types/waiting_rooms/rule_list_response.py +++ b/src/cloudflare/types/waiting_rooms/rule_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .waitingroom_rule_result import WaitingroomRuleResult +from .waitingroom_rule import WaitingroomRule __all__ = ["RuleListResponse"] -RuleListResponse = List[WaitingroomRuleResult] +RuleListResponse = List[WaitingroomRule] diff --git a/src/cloudflare/types/waiting_rooms/rule_update_response.py b/src/cloudflare/types/waiting_rooms/rule_update_response.py index b16c2f6ba48..e3fb52ec9c0 100644 --- a/src/cloudflare/types/waiting_rooms/rule_update_response.py +++ b/src/cloudflare/types/waiting_rooms/rule_update_response.py @@ -2,8 +2,8 @@ from typing import List -from .waitingroom_rule_result import WaitingroomRuleResult +from .waitingroom_rule import WaitingroomRule __all__ = ["RuleUpdateResponse"] -RuleUpdateResponse = List[WaitingroomRuleResult] +RuleUpdateResponse = List[WaitingroomRule] diff --git a/src/cloudflare/types/waiting_rooms/waitingroom_event_result.py b/src/cloudflare/types/waiting_rooms/waitingroom_event.py similarity index 97% rename from src/cloudflare/types/waiting_rooms/waitingroom_event_result.py rename to src/cloudflare/types/waiting_rooms/waitingroom_event.py index bcd88b2ccbd..d44568e4b15 100644 --- a/src/cloudflare/types/waiting_rooms/waitingroom_event_result.py +++ b/src/cloudflare/types/waiting_rooms/waitingroom_event.py @@ -5,10 +5,10 @@ from ..._models import BaseModel -__all__ = ["WaitingroomEventResult"] +__all__ = ["WaitingroomEvent"] -class WaitingroomEventResult(BaseModel): +class WaitingroomEvent(BaseModel): id: Optional[str] = None created_on: Optional[datetime] = None diff --git a/src/cloudflare/types/waiting_rooms/waitingroom_rule_result.py b/src/cloudflare/types/waiting_rooms/waitingroom_rule.py similarity index 91% rename from src/cloudflare/types/waiting_rooms/waitingroom_rule_result.py rename to src/cloudflare/types/waiting_rooms/waitingroom_rule.py index 0109a1424e3..1d5a191aad7 100644 --- a/src/cloudflare/types/waiting_rooms/waitingroom_rule_result.py +++ b/src/cloudflare/types/waiting_rooms/waitingroom_rule.py @@ -6,10 +6,10 @@ from ..._models import BaseModel -__all__ = ["WaitingroomRuleResult"] +__all__ = ["WaitingroomRule"] -class WaitingroomRuleResult(BaseModel): +class WaitingroomRule(BaseModel): id: Optional[str] = None """The ID of the rule.""" diff --git a/src/cloudflare/types/web3/__init__.py b/src/cloudflare/types/web3/__init__.py index 82a69ca2b59..4e579bfc0e9 100644 --- a/src/cloudflare/types/web3/__init__.py +++ b/src/cloudflare/types/web3/__init__.py @@ -5,5 +5,5 @@ from .hostname_edit_params import HostnameEditParams as HostnameEditParams from .hostname_create_params import HostnameCreateParams as HostnameCreateParams from .hostname_list_response import HostnameListResponse as HostnameListResponse +from .distributed_web_hostname import DistributedWebHostname as DistributedWebHostname from .hostname_delete_response import HostnameDeleteResponse as HostnameDeleteResponse -from .dweb_config_web3_hostname import DwebConfigWeb3Hostname as DwebConfigWeb3Hostname diff --git a/src/cloudflare/types/web3/dweb_config_web3_hostname.py b/src/cloudflare/types/web3/distributed_web_hostname.py similarity index 91% rename from src/cloudflare/types/web3/dweb_config_web3_hostname.py rename to src/cloudflare/types/web3/distributed_web_hostname.py index 200263b8f0c..b52e645215e 100644 --- a/src/cloudflare/types/web3/dweb_config_web3_hostname.py +++ b/src/cloudflare/types/web3/distributed_web_hostname.py @@ -6,10 +6,10 @@ from ..._models import BaseModel -__all__ = ["DwebConfigWeb3Hostname"] +__all__ = ["DistributedWebHostname"] -class DwebConfigWeb3Hostname(BaseModel): +class DistributedWebHostname(BaseModel): id: Optional[str] = None """Identifier""" diff --git a/src/cloudflare/types/web3/hostname_list_response.py b/src/cloudflare/types/web3/hostname_list_response.py index 83939e454b6..37188d53ac7 100644 --- a/src/cloudflare/types/web3/hostname_list_response.py +++ b/src/cloudflare/types/web3/hostname_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .dweb_config_web3_hostname import DwebConfigWeb3Hostname +from .distributed_web_hostname import DistributedWebHostname __all__ = ["HostnameListResponse"] -HostnameListResponse = List[DwebConfigWeb3Hostname] +HostnameListResponse = List[DistributedWebHostname] diff --git a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/__init__.py b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/__init__.py index d16e7c88bdf..d04e7354b66 100644 --- a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/__init__.py +++ b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/__init__.py @@ -3,4 +3,4 @@ from __future__ import annotations from .content_list_update_params import ContentListUpdateParams as ContentListUpdateParams -from .dweb_config_content_list_details import DwebConfigContentListDetails as DwebConfigContentListDetails +from .distributed_web_config_content_list import DistributedWebConfigContentList as DistributedWebConfigContentList diff --git a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_list_update_params.py b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_list_update_params.py index d54f4145807..3f3fa96834b 100644 --- a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_list_update_params.py +++ b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_list_update_params.py @@ -5,7 +5,7 @@ from typing import Iterable from typing_extensions import Literal, Required, TypedDict -from .content_lists import DwebConfigContentListEntryParam +from .content_lists import DistributedWebConfigContentListEntryParam __all__ = ["ContentListUpdateParams"] @@ -17,5 +17,5 @@ class ContentListUpdateParams(TypedDict, total=False): action: Required[Literal["block"]] """Behavior of the content list.""" - entries: Required[Iterable[DwebConfigContentListEntryParam]] + entries: Required[Iterable[DistributedWebConfigContentListEntryParam]] """Content list entries.""" diff --git a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/__init__.py b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/__init__.py index be10086a01f..45265480334 100644 --- a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/__init__.py +++ b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/__init__.py @@ -6,5 +6,9 @@ from .entry_list_response import EntryListResponse as EntryListResponse from .entry_update_params import EntryUpdateParams as EntryUpdateParams from .entry_delete_response import EntryDeleteResponse as EntryDeleteResponse -from .dweb_config_content_list_entry import DwebConfigContentListEntry as DwebConfigContentListEntry -from .dweb_config_content_list_entry_param import DwebConfigContentListEntryParam as DwebConfigContentListEntryParam +from .distributed_web_config_content_list_entry import ( + DistributedWebConfigContentListEntry as DistributedWebConfigContentListEntry, +) +from .distributed_web_config_content_list_entry_param import ( + DistributedWebConfigContentListEntryParam as DistributedWebConfigContentListEntryParam, +) diff --git a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/dweb_config_content_list_entry.py b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/distributed_web_config_content_list_entry.py similarity index 86% rename from src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/dweb_config_content_list_entry.py rename to src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/distributed_web_config_content_list_entry.py index 5f98311bb1d..c5fce5cb602 100644 --- a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/dweb_config_content_list_entry.py +++ b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/distributed_web_config_content_list_entry.py @@ -6,10 +6,10 @@ from ......_models import BaseModel -__all__ = ["DwebConfigContentListEntry"] +__all__ = ["DistributedWebConfigContentListEntry"] -class DwebConfigContentListEntry(BaseModel): +class DistributedWebConfigContentListEntry(BaseModel): id: Optional[str] = None """Identifier""" diff --git a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/dweb_config_content_list_entry_param.py b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/distributed_web_config_content_list_entry_param.py similarity index 76% rename from src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/dweb_config_content_list_entry_param.py rename to src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/distributed_web_config_content_list_entry_param.py index 998f0c4b478..807e005c31a 100644 --- a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/dweb_config_content_list_entry_param.py +++ b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/distributed_web_config_content_list_entry_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, TypedDict -__all__ = ["DwebConfigContentListEntryParam"] +__all__ = ["DistributedWebConfigContentListEntryParam"] -class DwebConfigContentListEntryParam(TypedDict, total=False): +class DistributedWebConfigContentListEntryParam(TypedDict, total=False): content: str """CID or content path of content to block.""" diff --git a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/entry_list_response.py b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/entry_list_response.py index 3ee9cb52b02..d7b9953cb39 100644 --- a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/entry_list_response.py +++ b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/content_lists/entry_list_response.py @@ -3,11 +3,11 @@ from typing import List, Optional from ......_models import BaseModel -from .dweb_config_content_list_entry import DwebConfigContentListEntry +from .distributed_web_config_content_list_entry import DistributedWebConfigContentListEntry __all__ = ["EntryListResponse"] class EntryListResponse(BaseModel): - entries: Optional[List[DwebConfigContentListEntry]] = None + entries: Optional[List[DistributedWebConfigContentListEntry]] = None """Content list entries.""" diff --git a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/dweb_config_content_list_details.py b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/distributed_web_config_content_list.py similarity index 74% rename from src/cloudflare/types/web3/hostnames/ipfs_universal_paths/dweb_config_content_list_details.py rename to src/cloudflare/types/web3/hostnames/ipfs_universal_paths/distributed_web_config_content_list.py index f342aec144c..8151db7cbce 100644 --- a/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/dweb_config_content_list_details.py +++ b/src/cloudflare/types/web3/hostnames/ipfs_universal_paths/distributed_web_config_content_list.py @@ -5,9 +5,9 @@ from ....._models import BaseModel -__all__ = ["DwebConfigContentListDetails"] +__all__ = ["DistributedWebConfigContentList"] -class DwebConfigContentListDetails(BaseModel): +class DistributedWebConfigContentList(BaseModel): action: Optional[Literal["block"]] = None """Behavior of the content list.""" diff --git a/src/cloudflare/types/workers/__init__.py b/src/cloudflare/types/workers/__init__.py index 1a8ac730f71..48267c12bb4 100644 --- a/src/cloudflare/types/workers/__init__.py +++ b/src/cloudflare/types/workers/__init__.py @@ -3,11 +3,11 @@ from __future__ import annotations from .ai_run_params import AIRunParams as AIRunParams +from .workers_route import WorkersRoute as WorkersRoute from .workers_domain import WorkersDomain as WorkersDomain -from .workers_routes import WorkersRoutes as WorkersRoutes +from .workers_filter import WorkersFilter as WorkersFilter from .workers_script import WorkersScript as WorkersScript from .ai_run_response import AIRunResponse as AIRunResponse -from .workers_filters import WorkersFilters as WorkersFilters from .domain_list_params import DomainListParams as DomainListParams from .route_create_params import RouteCreateParams as RouteCreateParams from .route_list_response import RouteListResponse as RouteListResponse diff --git a/src/cloudflare/types/workers/filter_list_response.py b/src/cloudflare/types/workers/filter_list_response.py index 318bfb24e34..e01ef8e5a05 100644 --- a/src/cloudflare/types/workers/filter_list_response.py +++ b/src/cloudflare/types/workers/filter_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .workers_filters import WorkersFilters +from .workers_filter import WorkersFilter __all__ = ["FilterListResponse"] -FilterListResponse = List[WorkersFilters] +FilterListResponse = List[WorkersFilter] diff --git a/src/cloudflare/types/workers/route_list_response.py b/src/cloudflare/types/workers/route_list_response.py index f34910d9fd1..0c238e3bfff 100644 --- a/src/cloudflare/types/workers/route_list_response.py +++ b/src/cloudflare/types/workers/route_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .workers_routes import WorkersRoutes +from .workers_route import WorkersRoute __all__ = ["RouteListResponse"] -RouteListResponse = List[WorkersRoutes] +RouteListResponse = List[WorkersRoute] diff --git a/src/cloudflare/types/workers/scripts/__init__.py b/src/cloudflare/types/workers/scripts/__init__.py index 34546806ebb..cff0ed258aa 100644 --- a/src/cloudflare/types/workers/scripts/__init__.py +++ b/src/cloudflare/types/workers/scripts/__init__.py @@ -2,6 +2,7 @@ from __future__ import annotations +from .workers_binding import WorkersBinding as WorkersBinding from .tail_get_response import TailGetResponse as TailGetResponse from .setting_edit_params import SettingEditParams as SettingEditParams from .binding_get_response import BindingGetResponse as BindingGetResponse @@ -12,7 +13,6 @@ from .schedule_get_response import ScheduleGetResponse as ScheduleGetResponse from .setting_edit_response import SettingEditResponse as SettingEditResponse from .schedule_update_params import ScheduleUpdateParams as ScheduleUpdateParams -from .workers_schemas_binding import WorkersSchemasBinding as WorkersSchemasBinding from .schedule_update_response import ScheduleUpdateResponse as ScheduleUpdateResponse from .usage_model_get_response import UsageModelGetResponse as UsageModelGetResponse from .usage_model_update_params import UsageModelUpdateParams as UsageModelUpdateParams diff --git a/src/cloudflare/types/workers/scripts/binding_get_response.py b/src/cloudflare/types/workers/scripts/binding_get_response.py index 6dc77ce61b0..92532801f20 100644 --- a/src/cloudflare/types/workers/scripts/binding_get_response.py +++ b/src/cloudflare/types/workers/scripts/binding_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .workers_schemas_binding import WorkersSchemasBinding +from .workers_binding import WorkersBinding __all__ = ["BindingGetResponse"] -BindingGetResponse = List[WorkersSchemasBinding] +BindingGetResponse = List[WorkersBinding] diff --git a/src/cloudflare/types/workers/scripts/workers_schemas_binding.py b/src/cloudflare/types/workers/scripts/workers_binding.py similarity index 78% rename from src/cloudflare/types/workers/scripts/workers_schemas_binding.py rename to src/cloudflare/types/workers/scripts/workers_binding.py index 5ccc786c84b..f14b3ffbd68 100644 --- a/src/cloudflare/types/workers/scripts/workers_schemas_binding.py +++ b/src/cloudflare/types/workers/scripts/workers_binding.py @@ -5,7 +5,7 @@ from ...._models import BaseModel -__all__ = ["WorkersSchemasBinding", "WorkersKVNamespaceBinding", "WorkersWasmModuleBinding"] +__all__ = ["WorkersBinding", "WorkersKVNamespaceBinding", "WorkersWasmModuleBinding"] class WorkersKVNamespaceBinding(BaseModel): @@ -27,4 +27,4 @@ class WorkersWasmModuleBinding(BaseModel): """The class of resource that the binding provides.""" -WorkersSchemasBinding = Union[WorkersKVNamespaceBinding, WorkersWasmModuleBinding] +WorkersBinding = Union[WorkersKVNamespaceBinding, WorkersWasmModuleBinding] diff --git a/src/cloudflare/types/workers/workers_filters.py b/src/cloudflare/types/workers/workers_filter.py similarity index 75% rename from src/cloudflare/types/workers/workers_filters.py rename to src/cloudflare/types/workers/workers_filter.py index c007324c792..9d2862df88c 100644 --- a/src/cloudflare/types/workers/workers_filters.py +++ b/src/cloudflare/types/workers/workers_filter.py @@ -2,10 +2,10 @@ from ..._models import BaseModel -__all__ = ["WorkersFilters"] +__all__ = ["WorkersFilter"] -class WorkersFilters(BaseModel): +class WorkersFilter(BaseModel): id: str """Identifier""" diff --git a/src/cloudflare/types/workers/workers_routes.py b/src/cloudflare/types/workers/workers_route.py similarity index 81% rename from src/cloudflare/types/workers/workers_routes.py rename to src/cloudflare/types/workers/workers_route.py index 3b33cf0d6b3..85b33f5124c 100644 --- a/src/cloudflare/types/workers/workers_routes.py +++ b/src/cloudflare/types/workers/workers_route.py @@ -2,10 +2,10 @@ from ..._models import BaseModel -__all__ = ["WorkersRoutes"] +__all__ = ["WorkersRoute"] -class WorkersRoutes(BaseModel): +class WorkersRoute(BaseModel): id: str """Identifier""" diff --git a/src/cloudflare/types/workers_for_platforms/dispatch/namespaces/__init__.py b/src/cloudflare/types/workers_for_platforms/dispatch/namespaces/__init__.py index 7e1b5b4a22a..e80f466f64f 100644 --- a/src/cloudflare/types/workers_for_platforms/dispatch/namespaces/__init__.py +++ b/src/cloudflare/types/workers_for_platforms/dispatch/namespaces/__init__.py @@ -4,4 +4,6 @@ from .script_delete_params import ScriptDeleteParams as ScriptDeleteParams from .script_update_params import ScriptUpdateParams as ScriptUpdateParams -from .workers_namespace_script import WorkersNamespaceScript as WorkersNamespaceScript +from .workers_for_platforms_namespace_script import ( + WorkersForPlatformsNamespaceScript as WorkersForPlatformsNamespaceScript, +) diff --git a/src/cloudflare/types/workers_for_platforms/dispatch/namespaces/workers_namespace_script.py b/src/cloudflare/types/workers_for_platforms/dispatch/namespaces/workers_for_platforms_namespace_script.py similarity index 84% rename from src/cloudflare/types/workers_for_platforms/dispatch/namespaces/workers_namespace_script.py rename to src/cloudflare/types/workers_for_platforms/dispatch/namespaces/workers_for_platforms_namespace_script.py index e14b023f9e0..0b9fcd58016 100644 --- a/src/cloudflare/types/workers_for_platforms/dispatch/namespaces/workers_namespace_script.py +++ b/src/cloudflare/types/workers_for_platforms/dispatch/namespaces/workers_for_platforms_namespace_script.py @@ -6,10 +6,10 @@ from ....workers import WorkersScript from ....._models import BaseModel -__all__ = ["WorkersNamespaceScript"] +__all__ = ["WorkersForPlatformsNamespaceScript"] -class WorkersNamespaceScript(BaseModel): +class WorkersForPlatformsNamespaceScript(BaseModel): created_on: Optional[datetime] = None """When the script was created.""" diff --git a/src/cloudflare/types/zero_trust/__init__.py b/src/cloudflare/types/zero_trust/__init__.py index 5fea2a58132..ee029326e27 100644 --- a/src/cloudflare/types/zero_trust/__init__.py +++ b/src/cloudflare/types/zero_trust/__init__.py @@ -2,25 +2,25 @@ from __future__ import annotations -from .access_seats import AccessSeats as AccessSeats from .seat_edit_params import SeatEditParams as SeatEditParams +from .zero_trust_seats import ZeroTrustSeats as ZeroTrustSeats from .seat_edit_response import SeatEditResponse as SeatEditResponse from .tunnel_argo_tunnel import TunnelArgoTunnel as TunnelArgoTunnel from .tunnel_edit_params import TunnelEditParams as TunnelEditParams from .tunnel_list_params import TunnelListParams as TunnelListParams +from .zero_trust_devices import ZeroTrustDevices as ZeroTrustDevices from .device_get_response import DeviceGetResponse as DeviceGetResponse -from .access_organizations import AccessOrganizations as AccessOrganizations from .device_list_response import DeviceListResponse as DeviceListResponse from .tunnel_create_params import TunnelCreateParams as TunnelCreateParams from .tunnel_delete_params import TunnelDeleteParams as TunnelDeleteParams from .tunnel_edit_response import TunnelEditResponse as TunnelEditResponse from .tunnel_list_response import TunnelListResponse as TunnelListResponse from .gateway_list_response import GatewayListResponse as GatewayListResponse -from .teams_devices_devices import TeamsDevicesDevices as TeamsDevicesDevices from .gateway_create_response import GatewayCreateResponse as GatewayCreateResponse -from .access_identity_providers import AccessIdentityProviders as AccessIdentityProviders +from .zero_trust_organizations import ZeroTrustOrganizations as ZeroTrustOrganizations from .organization_create_params import OrganizationCreateParams as OrganizationCreateParams from .organization_update_params import OrganizationUpdateParams as OrganizationUpdateParams +from .zero_trust_identity_providers import ZeroTrustIdentityProviders as ZeroTrustIdentityProviders from .identity_provider_create_params import IdentityProviderCreateParams as IdentityProviderCreateParams from .identity_provider_list_response import IdentityProviderListResponse as IdentityProviderListResponse from .identity_provider_update_params import IdentityProviderUpdateParams as IdentityProviderUpdateParams diff --git a/src/cloudflare/types/zero_trust/access/__init__.py b/src/cloudflare/types/zero_trust/access/__init__.py index dea6ed1be1a..7f01f1a80df 100644 --- a/src/cloudflare/types/zero_trust/access/__init__.py +++ b/src/cloudflare/types/zero_trust/access/__init__.py @@ -2,28 +2,27 @@ from __future__ import annotations -from .access_tag import AccessTag as AccessTag -from .access_apps import AccessApps as AccessApps -from .access_users import AccessUsers as AccessUsers -from .access_groups import AccessGroups as AccessGroups -from .access_bookmarks import AccessBookmarks as AccessBookmarks +from .zero_trust_tag import ZeroTrustTag as ZeroTrustTag +from .zero_trust_apps import ZeroTrustApps as ZeroTrustApps from .key_get_response import KeyGetResponse as KeyGetResponse +from .zero_trust_users import ZeroTrustUsers as ZeroTrustUsers from .key_update_params import KeyUpdateParams as KeyUpdateParams from .tag_create_params import TagCreateParams as TagCreateParams from .tag_list_response import TagListResponse as TagListResponse from .tag_update_params import TagUpdateParams as TagUpdateParams -from .access_custom_page import AccessCustomPage as AccessCustomPage +from .zero_trust_groups import ZeroTrustGroups as ZeroTrustGroups from .user_list_response import UserListResponse as UserListResponse -from .access_certificates import AccessCertificates as AccessCertificates from .group_create_params import GroupCreateParams as GroupCreateParams from .group_list_response import GroupListResponse as GroupListResponse from .group_update_params import GroupUpdateParams as GroupUpdateParams from .key_rotate_response import KeyRotateResponse as KeyRotateResponse from .key_update_response import KeyUpdateResponse as KeyUpdateResponse from .tag_delete_response import TagDeleteResponse as TagDeleteResponse -from .access_service_tokens import AccessServiceTokens as AccessServiceTokens +from .zero_trust_bookmarks import ZeroTrustBookmarks as ZeroTrustBookmarks from .group_delete_response import GroupDeleteResponse as GroupDeleteResponse from .bookmark_list_response import BookmarkListResponse as BookmarkListResponse +from .zero_trust_custom_page import ZeroTrustCustomPage as ZeroTrustCustomPage +from .zero_trust_certificates import ZeroTrustCertificates as ZeroTrustCertificates from .bookmark_delete_response import BookmarkDeleteResponse as BookmarkDeleteResponse from .application_create_params import ApplicationCreateParams as ApplicationCreateParams from .application_list_response import ApplicationListResponse as ApplicationListResponse @@ -34,6 +33,7 @@ from .custom_page_create_params import CustomPageCreateParams as CustomPageCreateParams from .custom_page_list_response import CustomPageListResponse as CustomPageListResponse from .custom_page_update_params import CustomPageUpdateParams as CustomPageUpdateParams +from .zero_trust_service_tokens import ZeroTrustServiceTokens as ZeroTrustServiceTokens from .application_delete_response import ApplicationDeleteResponse as ApplicationDeleteResponse from .certificate_delete_response import CertificateDeleteResponse as CertificateDeleteResponse from .custom_page_delete_response import CustomPageDeleteResponse as CustomPageDeleteResponse @@ -42,4 +42,4 @@ from .service_token_update_params import ServiceTokenUpdateParams as ServiceTokenUpdateParams from .service_token_create_response import ServiceTokenCreateResponse as ServiceTokenCreateResponse from .service_token_rotate_response import ServiceTokenRotateResponse as ServiceTokenRotateResponse -from .access_custom_page_without_html import AccessCustomPageWithoutHTML as AccessCustomPageWithoutHTML +from .zero_trust_custom_page_without_html import ZeroTrustCustomPageWithoutHTML as ZeroTrustCustomPageWithoutHTML diff --git a/src/cloudflare/types/zero_trust/access/application_list_response.py b/src/cloudflare/types/zero_trust/access/application_list_response.py index 7df1894f21e..910868ea87c 100644 --- a/src/cloudflare/types/zero_trust/access/application_list_response.py +++ b/src/cloudflare/types/zero_trust/access/application_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_apps import AccessApps +from .zero_trust_apps import ZeroTrustApps __all__ = ["ApplicationListResponse"] -ApplicationListResponse = List[AccessApps] +ApplicationListResponse = List[ZeroTrustApps] diff --git a/src/cloudflare/types/zero_trust/access/applications/__init__.py b/src/cloudflare/types/zero_trust/access/applications/__init__.py index 2271b1d1f0a..a4ca1c2cdb4 100644 --- a/src/cloudflare/types/zero_trust/access/applications/__init__.py +++ b/src/cloudflare/types/zero_trust/access/applications/__init__.py @@ -2,12 +2,12 @@ from __future__ import annotations -from .access_ca import AccessCA as AccessCA -from .access_policies import AccessPolicies as AccessPolicies +from .zero_trust_ca import ZeroTrustCA as ZeroTrustCA from .ca_get_response import CAGetResponse as CAGetResponse from .ca_list_response import CAListResponse as CAListResponse from .ca_create_response import CACreateResponse as CACreateResponse from .ca_delete_response import CADeleteResponse as CADeleteResponse +from .zero_trust_policies import ZeroTrustPolicies as ZeroTrustPolicies from .policy_create_params import PolicyCreateParams as PolicyCreateParams from .policy_list_response import PolicyListResponse as PolicyListResponse from .policy_update_params import PolicyUpdateParams as PolicyUpdateParams diff --git a/src/cloudflare/types/zero_trust/access/applications/ca_list_response.py b/src/cloudflare/types/zero_trust/access/applications/ca_list_response.py index a0e37efd9cb..9c1eb6e62bc 100644 --- a/src/cloudflare/types/zero_trust/access/applications/ca_list_response.py +++ b/src/cloudflare/types/zero_trust/access/applications/ca_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_ca import AccessCA +from .zero_trust_ca import ZeroTrustCA __all__ = ["CAListResponse"] -CAListResponse = List[AccessCA] +CAListResponse = List[ZeroTrustCA] diff --git a/src/cloudflare/types/zero_trust/access/applications/policy_list_response.py b/src/cloudflare/types/zero_trust/access/applications/policy_list_response.py index 63e1b835286..8413c1af279 100644 --- a/src/cloudflare/types/zero_trust/access/applications/policy_list_response.py +++ b/src/cloudflare/types/zero_trust/access/applications/policy_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_policies import AccessPolicies +from .zero_trust_policies import ZeroTrustPolicies __all__ = ["PolicyListResponse"] -PolicyListResponse = List[AccessPolicies] +PolicyListResponse = List[ZeroTrustPolicies] diff --git a/src/cloudflare/types/zero_trust/access/applications/access_ca.py b/src/cloudflare/types/zero_trust/access/applications/zero_trust_ca.py similarity index 88% rename from src/cloudflare/types/zero_trust/access/applications/access_ca.py rename to src/cloudflare/types/zero_trust/access/applications/zero_trust_ca.py index 249bc64a2df..ab676fbdc23 100644 --- a/src/cloudflare/types/zero_trust/access/applications/access_ca.py +++ b/src/cloudflare/types/zero_trust/access/applications/zero_trust_ca.py @@ -4,10 +4,10 @@ from ....._models import BaseModel -__all__ = ["AccessCA"] +__all__ = ["ZeroTrustCA"] -class AccessCA(BaseModel): +class ZeroTrustCA(BaseModel): id: Optional[str] = None """The ID of the CA.""" diff --git a/src/cloudflare/types/zero_trust/access/applications/access_policies.py b/src/cloudflare/types/zero_trust/access/applications/zero_trust_policies.py similarity index 99% rename from src/cloudflare/types/zero_trust/access/applications/access_policies.py rename to src/cloudflare/types/zero_trust/access/applications/zero_trust_policies.py index 12c88668269..ff50f127132 100644 --- a/src/cloudflare/types/zero_trust/access/applications/access_policies.py +++ b/src/cloudflare/types/zero_trust/access/applications/zero_trust_policies.py @@ -9,7 +9,7 @@ from ....._models import BaseModel __all__ = [ - "AccessPolicies", + "ZeroTrustPolicies", "ApprovalGroup", "Exclude", "ExcludeAccessEmailRule", @@ -745,7 +745,7 @@ class RequireAccessDevicePostureRule(BaseModel): ] -class AccessPolicies(BaseModel): +class ZeroTrustPolicies(BaseModel): id: Optional[str] = None """UUID""" diff --git a/src/cloudflare/types/zero_trust/access/bookmark_list_response.py b/src/cloudflare/types/zero_trust/access/bookmark_list_response.py index 0b0603c5b7f..50bdaeafc83 100644 --- a/src/cloudflare/types/zero_trust/access/bookmark_list_response.py +++ b/src/cloudflare/types/zero_trust/access/bookmark_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_bookmarks import AccessBookmarks +from .zero_trust_bookmarks import ZeroTrustBookmarks __all__ = ["BookmarkListResponse"] -BookmarkListResponse = List[AccessBookmarks] +BookmarkListResponse = List[ZeroTrustBookmarks] diff --git a/src/cloudflare/types/zero_trust/access/certificate_list_response.py b/src/cloudflare/types/zero_trust/access/certificate_list_response.py index 2af2ca789fe..4366d11dd0b 100644 --- a/src/cloudflare/types/zero_trust/access/certificate_list_response.py +++ b/src/cloudflare/types/zero_trust/access/certificate_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_certificates import AccessCertificates +from .zero_trust_certificates import ZeroTrustCertificates __all__ = ["CertificateListResponse"] -CertificateListResponse = List[AccessCertificates] +CertificateListResponse = List[ZeroTrustCertificates] diff --git a/src/cloudflare/types/zero_trust/access/certificates/__init__.py b/src/cloudflare/types/zero_trust/access/certificates/__init__.py index 6ddb639a7f7..24e86cca8a5 100644 --- a/src/cloudflare/types/zero_trust/access/certificates/__init__.py +++ b/src/cloudflare/types/zero_trust/access/certificates/__init__.py @@ -2,8 +2,8 @@ from __future__ import annotations -from .access_settings import AccessSettings as AccessSettings +from .zero_trust_settings import ZeroTrustSettings as ZeroTrustSettings from .setting_get_response import SettingGetResponse as SettingGetResponse -from .access_settings_param import AccessSettingsParam as AccessSettingsParam from .setting_update_params import SettingUpdateParams as SettingUpdateParams from .setting_update_response import SettingUpdateResponse as SettingUpdateResponse +from .zero_trust_settings_param import ZeroTrustSettingsParam as ZeroTrustSettingsParam diff --git a/src/cloudflare/types/zero_trust/access/certificates/setting_get_response.py b/src/cloudflare/types/zero_trust/access/certificates/setting_get_response.py index dab55db879f..ff1630df053 100644 --- a/src/cloudflare/types/zero_trust/access/certificates/setting_get_response.py +++ b/src/cloudflare/types/zero_trust/access/certificates/setting_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_settings import AccessSettings +from .zero_trust_settings import ZeroTrustSettings __all__ = ["SettingGetResponse"] -SettingGetResponse = List[AccessSettings] +SettingGetResponse = List[ZeroTrustSettings] diff --git a/src/cloudflare/types/zero_trust/access/certificates/setting_update_params.py b/src/cloudflare/types/zero_trust/access/certificates/setting_update_params.py index 058e03f2112..47e314677b8 100644 --- a/src/cloudflare/types/zero_trust/access/certificates/setting_update_params.py +++ b/src/cloudflare/types/zero_trust/access/certificates/setting_update_params.py @@ -5,13 +5,13 @@ from typing import Iterable from typing_extensions import Required, TypedDict -from .access_settings_param import AccessSettingsParam +from .zero_trust_settings_param import ZeroTrustSettingsParam __all__ = ["SettingUpdateParams"] class SettingUpdateParams(TypedDict, total=False): - settings: Required[Iterable[AccessSettingsParam]] + settings: Required[Iterable[ZeroTrustSettingsParam]] account_id: str """The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.""" diff --git a/src/cloudflare/types/zero_trust/access/certificates/setting_update_response.py b/src/cloudflare/types/zero_trust/access/certificates/setting_update_response.py index 211bdb95b6e..c13e095df93 100644 --- a/src/cloudflare/types/zero_trust/access/certificates/setting_update_response.py +++ b/src/cloudflare/types/zero_trust/access/certificates/setting_update_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_settings import AccessSettings +from .zero_trust_settings import ZeroTrustSettings __all__ = ["SettingUpdateResponse"] -SettingUpdateResponse = List[AccessSettings] +SettingUpdateResponse = List[ZeroTrustSettings] diff --git a/src/cloudflare/types/zero_trust/access/certificates/access_settings.py b/src/cloudflare/types/zero_trust/access/certificates/zero_trust_settings.py similarity index 90% rename from src/cloudflare/types/zero_trust/access/certificates/access_settings.py rename to src/cloudflare/types/zero_trust/access/certificates/zero_trust_settings.py index d47c4191b09..76f7bf04f6a 100644 --- a/src/cloudflare/types/zero_trust/access/certificates/access_settings.py +++ b/src/cloudflare/types/zero_trust/access/certificates/zero_trust_settings.py @@ -2,10 +2,10 @@ from ....._models import BaseModel -__all__ = ["AccessSettings"] +__all__ = ["ZeroTrustSettings"] -class AccessSettings(BaseModel): +class ZeroTrustSettings(BaseModel): china_network: bool """Request client certificates for this hostname in China. diff --git a/src/cloudflare/types/zero_trust/access/certificates/access_settings_param.py b/src/cloudflare/types/zero_trust/access/certificates/zero_trust_settings_param.py similarity index 88% rename from src/cloudflare/types/zero_trust/access/certificates/access_settings_param.py rename to src/cloudflare/types/zero_trust/access/certificates/zero_trust_settings_param.py index baaa389ded8..c435a987681 100644 --- a/src/cloudflare/types/zero_trust/access/certificates/access_settings_param.py +++ b/src/cloudflare/types/zero_trust/access/certificates/zero_trust_settings_param.py @@ -4,10 +4,10 @@ from typing_extensions import Required, TypedDict -__all__ = ["AccessSettingsParam"] +__all__ = ["ZeroTrustSettingsParam"] -class AccessSettingsParam(TypedDict, total=False): +class ZeroTrustSettingsParam(TypedDict, total=False): china_network: Required[bool] """Request client certificates for this hostname in China. diff --git a/src/cloudflare/types/zero_trust/access/custom_page_list_response.py b/src/cloudflare/types/zero_trust/access/custom_page_list_response.py index 1916ec53e64..2f7128ef608 100644 --- a/src/cloudflare/types/zero_trust/access/custom_page_list_response.py +++ b/src/cloudflare/types/zero_trust/access/custom_page_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_custom_page_without_html import AccessCustomPageWithoutHTML +from .zero_trust_custom_page_without_html import ZeroTrustCustomPageWithoutHTML __all__ = ["CustomPageListResponse"] -CustomPageListResponse = List[AccessCustomPageWithoutHTML] +CustomPageListResponse = List[ZeroTrustCustomPageWithoutHTML] diff --git a/src/cloudflare/types/zero_trust/access/group_list_response.py b/src/cloudflare/types/zero_trust/access/group_list_response.py index 843d41e50f7..75d9ddeea05 100644 --- a/src/cloudflare/types/zero_trust/access/group_list_response.py +++ b/src/cloudflare/types/zero_trust/access/group_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_groups import AccessGroups +from .zero_trust_groups import ZeroTrustGroups __all__ = ["GroupListResponse"] -GroupListResponse = List[AccessGroups] +GroupListResponse = List[ZeroTrustGroups] diff --git a/src/cloudflare/types/zero_trust/access/logs/__init__.py b/src/cloudflare/types/zero_trust/access/logs/__init__.py index 0bcd61f9486..3877a88828f 100644 --- a/src/cloudflare/types/zero_trust/access/logs/__init__.py +++ b/src/cloudflare/types/zero_trust/access/logs/__init__.py @@ -2,5 +2,5 @@ from __future__ import annotations -from .access_access_requests import AccessAccessRequests as AccessAccessRequests +from .zero_trust_access_requests import ZeroTrustAccessRequests as ZeroTrustAccessRequests from .access_request_list_response import AccessRequestListResponse as AccessRequestListResponse diff --git a/src/cloudflare/types/zero_trust/access/logs/access_request_list_response.py b/src/cloudflare/types/zero_trust/access/logs/access_request_list_response.py index 131ad38b0b7..698535e88d5 100644 --- a/src/cloudflare/types/zero_trust/access/logs/access_request_list_response.py +++ b/src/cloudflare/types/zero_trust/access/logs/access_request_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_access_requests import AccessAccessRequests +from .zero_trust_access_requests import ZeroTrustAccessRequests __all__ = ["AccessRequestListResponse"] -AccessRequestListResponse = List[AccessAccessRequests] +AccessRequestListResponse = List[ZeroTrustAccessRequests] diff --git a/src/cloudflare/types/zero_trust/access/logs/access_access_requests.py b/src/cloudflare/types/zero_trust/access/logs/zero_trust_access_requests.py similarity index 92% rename from src/cloudflare/types/zero_trust/access/logs/access_access_requests.py rename to src/cloudflare/types/zero_trust/access/logs/zero_trust_access_requests.py index 2bd62237d42..f3467107fc2 100644 --- a/src/cloudflare/types/zero_trust/access/logs/access_access_requests.py +++ b/src/cloudflare/types/zero_trust/access/logs/zero_trust_access_requests.py @@ -7,10 +7,10 @@ from ....._models import BaseModel -__all__ = ["AccessAccessRequests"] +__all__ = ["ZeroTrustAccessRequests"] -class AccessAccessRequests(BaseModel): +class ZeroTrustAccessRequests(BaseModel): action: Optional[str] = None """The event that occurred, such as a login attempt.""" diff --git a/src/cloudflare/types/zero_trust/access/service_token_list_response.py b/src/cloudflare/types/zero_trust/access/service_token_list_response.py index 074e0dafdf4..ec616ff266b 100644 --- a/src/cloudflare/types/zero_trust/access/service_token_list_response.py +++ b/src/cloudflare/types/zero_trust/access/service_token_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_service_tokens import AccessServiceTokens +from .zero_trust_service_tokens import ZeroTrustServiceTokens __all__ = ["ServiceTokenListResponse"] -ServiceTokenListResponse = List[AccessServiceTokens] +ServiceTokenListResponse = List[ZeroTrustServiceTokens] diff --git a/src/cloudflare/types/zero_trust/access/tag_list_response.py b/src/cloudflare/types/zero_trust/access/tag_list_response.py index 4a505781d40..727b975fce5 100644 --- a/src/cloudflare/types/zero_trust/access/tag_list_response.py +++ b/src/cloudflare/types/zero_trust/access/tag_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_tag import AccessTag +from .zero_trust_tag import ZeroTrustTag __all__ = ["TagListResponse"] -TagListResponse = List[AccessTag] +TagListResponse = List[ZeroTrustTag] diff --git a/src/cloudflare/types/zero_trust/access/user_list_response.py b/src/cloudflare/types/zero_trust/access/user_list_response.py index f3388c0c938..255083b287b 100644 --- a/src/cloudflare/types/zero_trust/access/user_list_response.py +++ b/src/cloudflare/types/zero_trust/access/user_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_users import AccessUsers +from .zero_trust_users import ZeroTrustUsers __all__ = ["UserListResponse"] -UserListResponse = List[AccessUsers] +UserListResponse = List[ZeroTrustUsers] diff --git a/src/cloudflare/types/zero_trust/access/users/__init__.py b/src/cloudflare/types/zero_trust/access/users/__init__.py index 4927319efba..5d2c3738998 100644 --- a/src/cloudflare/types/zero_trust/access/users/__init__.py +++ b/src/cloudflare/types/zero_trust/access/users/__init__.py @@ -2,7 +2,7 @@ from __future__ import annotations -from .access_identity import AccessIdentity as AccessIdentity +from .zero_trust_identity import ZeroTrustIdentity as ZeroTrustIdentity from .failed_login_list_response import FailedLoginListResponse as FailedLoginListResponse from .active_session_get_response import ActiveSessionGetResponse as ActiveSessionGetResponse from .active_session_list_response import ActiveSessionListResponse as ActiveSessionListResponse diff --git a/src/cloudflare/types/zero_trust/access/users/access_identity.py b/src/cloudflare/types/zero_trust/access/users/zero_trust_identity.py similarity index 92% rename from src/cloudflare/types/zero_trust/access/users/access_identity.py rename to src/cloudflare/types/zero_trust/access/users/zero_trust_identity.py index 52d88843015..8411f8fe6dd 100644 --- a/src/cloudflare/types/zero_trust/access/users/access_identity.py +++ b/src/cloudflare/types/zero_trust/access/users/zero_trust_identity.py @@ -6,7 +6,7 @@ from ....._models import BaseModel -__all__ = ["AccessIdentity", "DeviceSessions", "DevicePosture", "DevicePostureCheck", "Geo", "IDP", "MTLSAuth"] +__all__ = ["ZeroTrustIdentity", "DeviceSessions", "DevicePosture", "DevicePostureCheck", "Geo", "IDP", "MTLSAuth"] class DeviceSessions(BaseModel): @@ -61,7 +61,7 @@ class MTLSAuth(BaseModel): cert_serial: Optional[str] = None -class AccessIdentity(BaseModel): +class ZeroTrustIdentity(BaseModel): account_id: Optional[str] = None auth_status: Optional[str] = None diff --git a/src/cloudflare/types/zero_trust/access/access_apps.py b/src/cloudflare/types/zero_trust/access/zero_trust_apps.py similarity index 99% rename from src/cloudflare/types/zero_trust/access/access_apps.py rename to src/cloudflare/types/zero_trust/access/zero_trust_apps.py index 80c738b59a7..b0160e4ce25 100644 --- a/src/cloudflare/types/zero_trust/access/access_apps.py +++ b/src/cloudflare/types/zero_trust/access/zero_trust_apps.py @@ -7,7 +7,7 @@ from ...._models import BaseModel __all__ = [ - "AccessApps", + "ZeroTrustApps", "SelfHostedApplication", "SelfHostedApplicationCorsHeaders", "SaaSApplication", @@ -827,7 +827,7 @@ class BookmarkApplication(BaseModel): updated_at: Optional[datetime] = None -AccessApps = Union[ +ZeroTrustApps = Union[ SelfHostedApplication, SaaSApplication, BrowserSSHApplication, diff --git a/src/cloudflare/types/zero_trust/access/access_bookmarks.py b/src/cloudflare/types/zero_trust/access/zero_trust_bookmarks.py similarity index 91% rename from src/cloudflare/types/zero_trust/access/access_bookmarks.py rename to src/cloudflare/types/zero_trust/access/zero_trust_bookmarks.py index d648d178647..4d760428841 100644 --- a/src/cloudflare/types/zero_trust/access/access_bookmarks.py +++ b/src/cloudflare/types/zero_trust/access/zero_trust_bookmarks.py @@ -5,10 +5,10 @@ from ...._models import BaseModel -__all__ = ["AccessBookmarks"] +__all__ = ["ZeroTrustBookmarks"] -class AccessBookmarks(BaseModel): +class ZeroTrustBookmarks(BaseModel): id: Optional[object] = None """The unique identifier for the Bookmark application.""" diff --git a/src/cloudflare/types/zero_trust/access/access_certificates.py b/src/cloudflare/types/zero_trust/access/zero_trust_certificates.py similarity index 90% rename from src/cloudflare/types/zero_trust/access/access_certificates.py rename to src/cloudflare/types/zero_trust/access/zero_trust_certificates.py index 49f5b5729c9..94eeacc0530 100644 --- a/src/cloudflare/types/zero_trust/access/access_certificates.py +++ b/src/cloudflare/types/zero_trust/access/zero_trust_certificates.py @@ -5,10 +5,10 @@ from ...._models import BaseModel -__all__ = ["AccessCertificates"] +__all__ = ["ZeroTrustCertificates"] -class AccessCertificates(BaseModel): +class ZeroTrustCertificates(BaseModel): id: Optional[object] = None """The ID of the application that will use this certificate.""" diff --git a/src/cloudflare/types/zero_trust/access/access_custom_page.py b/src/cloudflare/types/zero_trust/access/zero_trust_custom_page.py similarity index 89% rename from src/cloudflare/types/zero_trust/access/access_custom_page.py rename to src/cloudflare/types/zero_trust/access/zero_trust_custom_page.py index 4b7b0ab4688..cb9da69fd4b 100644 --- a/src/cloudflare/types/zero_trust/access/access_custom_page.py +++ b/src/cloudflare/types/zero_trust/access/zero_trust_custom_page.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["AccessCustomPage"] +__all__ = ["ZeroTrustCustomPage"] -class AccessCustomPage(BaseModel): +class ZeroTrustCustomPage(BaseModel): custom_html: str """Custom page HTML.""" diff --git a/src/cloudflare/types/zero_trust/access/access_custom_page_without_html.py b/src/cloudflare/types/zero_trust/access/zero_trust_custom_page_without_html.py similarity index 85% rename from src/cloudflare/types/zero_trust/access/access_custom_page_without_html.py rename to src/cloudflare/types/zero_trust/access/zero_trust_custom_page_without_html.py index b64e460a9aa..3bd6d73efa2 100644 --- a/src/cloudflare/types/zero_trust/access/access_custom_page_without_html.py +++ b/src/cloudflare/types/zero_trust/access/zero_trust_custom_page_without_html.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["AccessCustomPageWithoutHTML"] +__all__ = ["ZeroTrustCustomPageWithoutHTML"] -class AccessCustomPageWithoutHTML(BaseModel): +class ZeroTrustCustomPageWithoutHTML(BaseModel): name: str """Custom page name.""" diff --git a/src/cloudflare/types/zero_trust/access/access_groups.py b/src/cloudflare/types/zero_trust/access/zero_trust_groups.py similarity index 99% rename from src/cloudflare/types/zero_trust/access/access_groups.py rename to src/cloudflare/types/zero_trust/access/zero_trust_groups.py index 17883bcbb58..f7cde2ccddb 100644 --- a/src/cloudflare/types/zero_trust/access/access_groups.py +++ b/src/cloudflare/types/zero_trust/access/zero_trust_groups.py @@ -8,7 +8,7 @@ from ...._models import BaseModel __all__ = [ - "AccessGroups", + "ZeroTrustGroups", "Exclude", "ExcludeAccessEmailRule", "ExcludeAccessEmailRuleEmail", @@ -974,7 +974,7 @@ class RequireAccessDevicePostureRule(BaseModel): ] -class AccessGroups(BaseModel): +class ZeroTrustGroups(BaseModel): id: Optional[str] = None """UUID""" diff --git a/src/cloudflare/types/zero_trust/access/access_service_tokens.py b/src/cloudflare/types/zero_trust/access/zero_trust_service_tokens.py similarity index 91% rename from src/cloudflare/types/zero_trust/access/access_service_tokens.py rename to src/cloudflare/types/zero_trust/access/zero_trust_service_tokens.py index 5b2eb82df57..7a521c84758 100644 --- a/src/cloudflare/types/zero_trust/access/access_service_tokens.py +++ b/src/cloudflare/types/zero_trust/access/zero_trust_service_tokens.py @@ -5,10 +5,10 @@ from ...._models import BaseModel -__all__ = ["AccessServiceTokens"] +__all__ = ["ZeroTrustServiceTokens"] -class AccessServiceTokens(BaseModel): +class ZeroTrustServiceTokens(BaseModel): id: Optional[object] = None """The ID of the service token.""" diff --git a/src/cloudflare/types/zero_trust/access/access_tag.py b/src/cloudflare/types/zero_trust/access/zero_trust_tag.py similarity index 87% rename from src/cloudflare/types/zero_trust/access/access_tag.py rename to src/cloudflare/types/zero_trust/access/zero_trust_tag.py index e5de0f5a2dd..0c6838a56ae 100644 --- a/src/cloudflare/types/zero_trust/access/access_tag.py +++ b/src/cloudflare/types/zero_trust/access/zero_trust_tag.py @@ -5,10 +5,10 @@ from ...._models import BaseModel -__all__ = ["AccessTag"] +__all__ = ["ZeroTrustTag"] -class AccessTag(BaseModel): +class ZeroTrustTag(BaseModel): name: str """The name of the tag""" diff --git a/src/cloudflare/types/zero_trust/access/access_users.py b/src/cloudflare/types/zero_trust/access/zero_trust_users.py similarity index 94% rename from src/cloudflare/types/zero_trust/access/access_users.py rename to src/cloudflare/types/zero_trust/access/zero_trust_users.py index 77d28273de7..dc771a52d92 100644 --- a/src/cloudflare/types/zero_trust/access/access_users.py +++ b/src/cloudflare/types/zero_trust/access/zero_trust_users.py @@ -5,10 +5,10 @@ from ...._models import BaseModel -__all__ = ["AccessUsers"] +__all__ = ["ZeroTrustUsers"] -class AccessUsers(BaseModel): +class ZeroTrustUsers(BaseModel): id: Optional[str] = None """UUID""" diff --git a/src/cloudflare/types/zero_trust/device_list_response.py b/src/cloudflare/types/zero_trust/device_list_response.py index 401849a0f91..6d4470567bd 100644 --- a/src/cloudflare/types/zero_trust/device_list_response.py +++ b/src/cloudflare/types/zero_trust/device_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_devices import TeamsDevicesDevices +from .zero_trust_devices import ZeroTrustDevices __all__ = ["DeviceListResponse"] -DeviceListResponse = List[TeamsDevicesDevices] +DeviceListResponse = List[ZeroTrustDevices] diff --git a/src/cloudflare/types/zero_trust/devices/__init__.py b/src/cloudflare/types/zero_trust/devices/__init__.py index dafac0cab78..e2c73206405 100644 --- a/src/cloudflare/types/zero_trust/devices/__init__.py +++ b/src/cloudflare/types/zero_trust/devices/__init__.py @@ -3,9 +3,11 @@ from __future__ import annotations from .policy_edit_params import PolicyEditParams as PolicyEditParams +from .device_posture_rules import DevicePostureRules as DevicePostureRules from .policy_create_params import PolicyCreateParams as PolicyCreateParams from .policy_list_response import PolicyListResponse as PolicyListResponse from .revoke_create_params import RevokeCreateParams as RevokeCreateParams +from .dex_test_schemas_http import DEXTestSchemasHTTP as DEXTestSchemasHTTP from .network_create_params import NetworkCreateParams as NetworkCreateParams from .network_list_response import NetworkListResponse as NetworkListResponse from .network_update_params import NetworkUpdateParams as NetworkUpdateParams @@ -19,19 +21,11 @@ from .policy_delete_response import PolicyDeleteResponse as PolicyDeleteResponse from .revoke_create_response import RevokeCreateResponse as RevokeCreateResponse from .unrevoke_create_params import UnrevokeCreateParams as UnrevokeCreateParams +from .device_managed_networks import DeviceManagedNetworks as DeviceManagedNetworks from .network_delete_response import NetworkDeleteResponse as NetworkDeleteResponse from .posture_delete_response import PostureDeleteResponse as PostureDeleteResponse from .dex_test_delete_response import DEXTestDeleteResponse as DEXTestDeleteResponse from .unrevoke_create_response import UnrevokeCreateResponse as UnrevokeCreateResponse from .override_code_list_response import OverrideCodeListResponse as OverrideCodeListResponse -from .teams_devices_device_posture_rules import TeamsDevicesDevicePostureRules as TeamsDevicesDevicePostureRules -from .teams_devices_device_settings_policy import TeamsDevicesDeviceSettingsPolicy as TeamsDevicesDeviceSettingsPolicy -from .teams_devices_device_managed_networks import ( - TeamsDevicesDeviceManagedNetworks as TeamsDevicesDeviceManagedNetworks, -) -from .teams_devices_device_dex_test_schemas_http import ( - TeamsDevicesDeviceDEXTestSchemasHTTP as TeamsDevicesDeviceDEXTestSchemasHTTP, -) -from .teams_devices_zero_trust_account_device_settings import ( - TeamsDevicesZeroTrustAccountDeviceSettings as TeamsDevicesZeroTrustAccountDeviceSettings, -) +from .devices_device_settings_policy import DevicesDeviceSettingsPolicy as DevicesDeviceSettingsPolicy +from .zero_trust_account_device_settings import ZeroTrustAccountDeviceSettings as ZeroTrustAccountDeviceSettings diff --git a/src/cloudflare/types/zero_trust/devices/teams_devices_device_managed_networks.py b/src/cloudflare/types/zero_trust/devices/device_managed_networks.py similarity index 90% rename from src/cloudflare/types/zero_trust/devices/teams_devices_device_managed_networks.py rename to src/cloudflare/types/zero_trust/devices/device_managed_networks.py index f16e421d16b..b0d21f88d0b 100644 --- a/src/cloudflare/types/zero_trust/devices/teams_devices_device_managed_networks.py +++ b/src/cloudflare/types/zero_trust/devices/device_managed_networks.py @@ -5,7 +5,7 @@ from ...._models import BaseModel -__all__ = ["TeamsDevicesDeviceManagedNetworks", "Config"] +__all__ = ["DeviceManagedNetworks", "Config"] class Config(BaseModel): @@ -23,7 +23,7 @@ class Config(BaseModel): """ -class TeamsDevicesDeviceManagedNetworks(BaseModel): +class DeviceManagedNetworks(BaseModel): config: Optional[Config] = None """ The configuration object containing information for the WARP client to detect diff --git a/src/cloudflare/types/zero_trust/devices/teams_devices_device_posture_rules.py b/src/cloudflare/types/zero_trust/devices/device_posture_rules.py similarity index 99% rename from src/cloudflare/types/zero_trust/devices/teams_devices_device_posture_rules.py rename to src/cloudflare/types/zero_trust/devices/device_posture_rules.py index 4fa55f8a6ed..0ec5ff47a90 100644 --- a/src/cloudflare/types/zero_trust/devices/teams_devices_device_posture_rules.py +++ b/src/cloudflare/types/zero_trust/devices/device_posture_rules.py @@ -8,7 +8,7 @@ from ...._models import BaseModel __all__ = [ - "TeamsDevicesDevicePostureRules", + "DevicePostureRules", "Input", "InputTeamsDevicesFileInputRequest", "InputTeamsDevicesUniqueClientIDInputRequest", @@ -273,7 +273,7 @@ class Match(BaseModel): platform: Optional[Literal["windows", "mac", "linux", "android", "ios"]] = None -class TeamsDevicesDevicePostureRules(BaseModel): +class DevicePostureRules(BaseModel): id: Optional[str] = None """API UUID.""" diff --git a/src/cloudflare/types/zero_trust/devices/teams_devices_device_settings_policy.py b/src/cloudflare/types/zero_trust/devices/devices_device_settings_policy.py similarity index 87% rename from src/cloudflare/types/zero_trust/devices/teams_devices_device_settings_policy.py rename to src/cloudflare/types/zero_trust/devices/devices_device_settings_policy.py index 1d853b73687..ddad4b60b9d 100644 --- a/src/cloudflare/types/zero_trust/devices/teams_devices_device_settings_policy.py +++ b/src/cloudflare/types/zero_trust/devices/devices_device_settings_policy.py @@ -2,10 +2,10 @@ from typing import List, Optional -from .policies import TeamsDevicesSplitTunnel, TeamsDevicesFallbackDomain, TeamsDevicesSplitTunnelInclude +from .policies import DevicesSplitTunnel, DevicesFallbackDomain, DevicesSplitTunnelInclude from ...._models import BaseModel -__all__ = ["TeamsDevicesDeviceSettingsPolicy", "ServiceModeV2"] +__all__ = ["DevicesDeviceSettingsPolicy", "ServiceModeV2"] class ServiceModeV2(BaseModel): @@ -16,7 +16,7 @@ class ServiceModeV2(BaseModel): """The port number when used with proxy mode.""" -class TeamsDevicesDeviceSettingsPolicy(BaseModel): +class DevicesDeviceSettingsPolicy(BaseModel): allow_mode_switch: Optional[bool] = None """Whether to allow the user to switch WARP between modes.""" @@ -51,16 +51,16 @@ class TeamsDevicesDeviceSettingsPolicy(BaseModel): enabled: Optional[bool] = None """Whether the policy will be applied to matching devices.""" - exclude: Optional[List[TeamsDevicesSplitTunnel]] = None + exclude: Optional[List[DevicesSplitTunnel]] = None exclude_office_ips: Optional[bool] = None """Whether to add Microsoft IPs to Split Tunnel exclusions.""" - fallback_domains: Optional[List[TeamsDevicesFallbackDomain]] = None + fallback_domains: Optional[List[DevicesFallbackDomain]] = None gateway_unique_id: Optional[str] = None - include: Optional[List[TeamsDevicesSplitTunnelInclude]] = None + include: Optional[List[DevicesSplitTunnelInclude]] = None lan_allow_minutes: Optional[float] = None """The amount of time in minutes a user is allowed access to their LAN. diff --git a/src/cloudflare/types/zero_trust/devices/dex_test_delete_response.py b/src/cloudflare/types/zero_trust/devices/dex_test_delete_response.py index 701b388b105..66f2f3fbb27 100644 --- a/src/cloudflare/types/zero_trust/devices/dex_test_delete_response.py +++ b/src/cloudflare/types/zero_trust/devices/dex_test_delete_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_device_dex_test_schemas_http import TeamsDevicesDeviceDEXTestSchemasHTTP +from .dex_test_schemas_http import DEXTestSchemasHTTP __all__ = ["DEXTestDeleteResponse"] -DEXTestDeleteResponse = List[TeamsDevicesDeviceDEXTestSchemasHTTP] +DEXTestDeleteResponse = List[DEXTestSchemasHTTP] diff --git a/src/cloudflare/types/zero_trust/devices/dex_test_list_response.py b/src/cloudflare/types/zero_trust/devices/dex_test_list_response.py index 81ce5b5e914..2dc36bc019f 100644 --- a/src/cloudflare/types/zero_trust/devices/dex_test_list_response.py +++ b/src/cloudflare/types/zero_trust/devices/dex_test_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_device_dex_test_schemas_http import TeamsDevicesDeviceDEXTestSchemasHTTP +from .dex_test_schemas_http import DEXTestSchemasHTTP __all__ = ["DEXTestListResponse"] -DEXTestListResponse = List[TeamsDevicesDeviceDEXTestSchemasHTTP] +DEXTestListResponse = List[DEXTestSchemasHTTP] diff --git a/src/cloudflare/types/zero_trust/devices/teams_devices_device_dex_test_schemas_http.py b/src/cloudflare/types/zero_trust/devices/dex_test_schemas_http.py similarity index 87% rename from src/cloudflare/types/zero_trust/devices/teams_devices_device_dex_test_schemas_http.py rename to src/cloudflare/types/zero_trust/devices/dex_test_schemas_http.py index cb7dafa7a30..263ec67f9b3 100644 --- a/src/cloudflare/types/zero_trust/devices/teams_devices_device_dex_test_schemas_http.py +++ b/src/cloudflare/types/zero_trust/devices/dex_test_schemas_http.py @@ -4,7 +4,7 @@ from ...._models import BaseModel -__all__ = ["TeamsDevicesDeviceDEXTestSchemasHTTP", "Data"] +__all__ = ["DEXTestSchemasHTTP", "Data"] class Data(BaseModel): @@ -18,7 +18,7 @@ class Data(BaseModel): """The HTTP request method type.""" -class TeamsDevicesDeviceDEXTestSchemasHTTP(BaseModel): +class DEXTestSchemasHTTP(BaseModel): data: Data """ The configuration object which contains the details for the WARP client to diff --git a/src/cloudflare/types/zero_trust/devices/network_delete_response.py b/src/cloudflare/types/zero_trust/devices/network_delete_response.py index c7026fb9996..33c32453dee 100644 --- a/src/cloudflare/types/zero_trust/devices/network_delete_response.py +++ b/src/cloudflare/types/zero_trust/devices/network_delete_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_device_managed_networks import TeamsDevicesDeviceManagedNetworks +from .device_managed_networks import DeviceManagedNetworks __all__ = ["NetworkDeleteResponse"] -NetworkDeleteResponse = List[TeamsDevicesDeviceManagedNetworks] +NetworkDeleteResponse = List[DeviceManagedNetworks] diff --git a/src/cloudflare/types/zero_trust/devices/network_list_response.py b/src/cloudflare/types/zero_trust/devices/network_list_response.py index c9bbce9212f..6a6ace56b12 100644 --- a/src/cloudflare/types/zero_trust/devices/network_list_response.py +++ b/src/cloudflare/types/zero_trust/devices/network_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_device_managed_networks import TeamsDevicesDeviceManagedNetworks +from .device_managed_networks import DeviceManagedNetworks __all__ = ["NetworkListResponse"] -NetworkListResponse = List[TeamsDevicesDeviceManagedNetworks] +NetworkListResponse = List[DeviceManagedNetworks] diff --git a/src/cloudflare/types/zero_trust/devices/policies/__init__.py b/src/cloudflare/types/zero_trust/devices/policies/__init__.py index 3f04ad2fb26..36cd5be2b66 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/__init__.py +++ b/src/cloudflare/types/zero_trust/devices/policies/__init__.py @@ -2,24 +2,22 @@ from __future__ import annotations +from .devices_split_tunnel import DevicesSplitTunnel as DevicesSplitTunnel from .exclude_get_response import ExcludeGetResponse as ExcludeGetResponse from .include_get_response import IncludeGetResponse as IncludeGetResponse from .exclude_list_response import ExcludeListResponse as ExcludeListResponse from .exclude_update_params import ExcludeUpdateParams as ExcludeUpdateParams from .include_list_response import IncludeListResponse as IncludeListResponse from .include_update_params import IncludeUpdateParams as IncludeUpdateParams +from .devices_fallback_domain import DevicesFallbackDomain as DevicesFallbackDomain from .exclude_update_response import ExcludeUpdateResponse as ExcludeUpdateResponse from .include_update_response import IncludeUpdateResponse as IncludeUpdateResponse -from .teams_devices_split_tunnel import TeamsDevicesSplitTunnel as TeamsDevicesSplitTunnel +from .devices_split_tunnel_param import DevicesSplitTunnelParam as DevicesSplitTunnelParam from .default_policy_get_response import DefaultPolicyGetResponse as DefaultPolicyGetResponse +from .devices_split_tunnel_include import DevicesSplitTunnelInclude as DevicesSplitTunnelInclude from .fallback_domain_get_response import FallbackDomainGetResponse as FallbackDomainGetResponse +from .devices_fallback_domain_param import DevicesFallbackDomainParam as DevicesFallbackDomainParam from .fallback_domain_list_response import FallbackDomainListResponse as FallbackDomainListResponse from .fallback_domain_update_params import FallbackDomainUpdateParams as FallbackDomainUpdateParams -from .teams_devices_fallback_domain import TeamsDevicesFallbackDomain as TeamsDevicesFallbackDomain from .fallback_domain_update_response import FallbackDomainUpdateResponse as FallbackDomainUpdateResponse -from .teams_devices_split_tunnel_param import TeamsDevicesSplitTunnelParam as TeamsDevicesSplitTunnelParam -from .teams_devices_split_tunnel_include import TeamsDevicesSplitTunnelInclude as TeamsDevicesSplitTunnelInclude -from .teams_devices_fallback_domain_param import TeamsDevicesFallbackDomainParam as TeamsDevicesFallbackDomainParam -from .teams_devices_split_tunnel_include_param import ( - TeamsDevicesSplitTunnelIncludeParam as TeamsDevicesSplitTunnelIncludeParam, -) +from .devices_split_tunnel_include_param import DevicesSplitTunnelIncludeParam as DevicesSplitTunnelIncludeParam diff --git a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_fallback_domain.py b/src/cloudflare/types/zero_trust/devices/policies/devices_fallback_domain.py similarity index 84% rename from src/cloudflare/types/zero_trust/devices/policies/teams_devices_fallback_domain.py rename to src/cloudflare/types/zero_trust/devices/policies/devices_fallback_domain.py index 9a9bd16535d..b8779327e4f 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_fallback_domain.py +++ b/src/cloudflare/types/zero_trust/devices/policies/devices_fallback_domain.py @@ -4,10 +4,10 @@ from ....._models import BaseModel -__all__ = ["TeamsDevicesFallbackDomain"] +__all__ = ["DevicesFallbackDomain"] -class TeamsDevicesFallbackDomain(BaseModel): +class DevicesFallbackDomain(BaseModel): suffix: str """The domain suffix to match when resolving locally.""" diff --git a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_fallback_domain_param.py b/src/cloudflare/types/zero_trust/devices/policies/devices_fallback_domain_param.py similarity index 81% rename from src/cloudflare/types/zero_trust/devices/policies/teams_devices_fallback_domain_param.py rename to src/cloudflare/types/zero_trust/devices/policies/devices_fallback_domain_param.py index ec5b2eea447..41f28722cb5 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_fallback_domain_param.py +++ b/src/cloudflare/types/zero_trust/devices/policies/devices_fallback_domain_param.py @@ -5,10 +5,10 @@ from typing import Iterable from typing_extensions import Required, TypedDict -__all__ = ["TeamsDevicesFallbackDomainParam"] +__all__ = ["DevicesFallbackDomainParam"] -class TeamsDevicesFallbackDomainParam(TypedDict, total=False): +class DevicesFallbackDomainParam(TypedDict, total=False): suffix: Required[str] """The domain suffix to match when resolving locally.""" diff --git a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel.py b/src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel.py similarity index 87% rename from src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel.py rename to src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel.py index 8cff7f46b93..6644d40583c 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel.py +++ b/src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel.py @@ -4,10 +4,10 @@ from ....._models import BaseModel -__all__ = ["TeamsDevicesSplitTunnel"] +__all__ = ["DevicesSplitTunnel"] -class TeamsDevicesSplitTunnel(BaseModel): +class DevicesSplitTunnel(BaseModel): address: str """The address in CIDR format to exclude from the tunnel. diff --git a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel_include.py b/src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel_include.py similarity index 85% rename from src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel_include.py rename to src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel_include.py index 7dc7506ba33..c067eafb1ad 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel_include.py +++ b/src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel_include.py @@ -4,10 +4,10 @@ from ....._models import BaseModel -__all__ = ["TeamsDevicesSplitTunnelInclude"] +__all__ = ["DevicesSplitTunnelInclude"] -class TeamsDevicesSplitTunnelInclude(BaseModel): +class DevicesSplitTunnelInclude(BaseModel): address: str """The address in CIDR format to include in the tunnel. diff --git a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel_include_param.py b/src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel_include_param.py similarity index 82% rename from src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel_include_param.py rename to src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel_include_param.py index 7d1a3f3fa79..85707e7270e 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel_include_param.py +++ b/src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel_include_param.py @@ -4,10 +4,10 @@ from typing_extensions import Required, TypedDict -__all__ = ["TeamsDevicesSplitTunnelIncludeParam"] +__all__ = ["DevicesSplitTunnelIncludeParam"] -class TeamsDevicesSplitTunnelIncludeParam(TypedDict, total=False): +class DevicesSplitTunnelIncludeParam(TypedDict, total=False): address: Required[str] """The address in CIDR format to include in the tunnel. diff --git a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel_param.py b/src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel_param.py similarity index 84% rename from src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel_param.py rename to src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel_param.py index fde0bc9fd41..4e506e978fa 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/teams_devices_split_tunnel_param.py +++ b/src/cloudflare/types/zero_trust/devices/policies/devices_split_tunnel_param.py @@ -4,10 +4,10 @@ from typing_extensions import Required, TypedDict -__all__ = ["TeamsDevicesSplitTunnelParam"] +__all__ = ["DevicesSplitTunnelParam"] -class TeamsDevicesSplitTunnelParam(TypedDict, total=False): +class DevicesSplitTunnelParam(TypedDict, total=False): address: Required[str] """The address in CIDR format to exclude from the tunnel. diff --git a/src/cloudflare/types/zero_trust/devices/policies/exclude_get_response.py b/src/cloudflare/types/zero_trust/devices/policies/exclude_get_response.py index 02f93a0567f..824f866d464 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/exclude_get_response.py +++ b/src/cloudflare/types/zero_trust/devices/policies/exclude_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_split_tunnel import TeamsDevicesSplitTunnel +from .devices_split_tunnel import DevicesSplitTunnel __all__ = ["ExcludeGetResponse"] -ExcludeGetResponse = List[TeamsDevicesSplitTunnel] +ExcludeGetResponse = List[DevicesSplitTunnel] diff --git a/src/cloudflare/types/zero_trust/devices/policies/exclude_list_response.py b/src/cloudflare/types/zero_trust/devices/policies/exclude_list_response.py index 61ad1411ddf..b8ed64891e5 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/exclude_list_response.py +++ b/src/cloudflare/types/zero_trust/devices/policies/exclude_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_split_tunnel import TeamsDevicesSplitTunnel +from .devices_split_tunnel import DevicesSplitTunnel __all__ = ["ExcludeListResponse"] -ExcludeListResponse = List[TeamsDevicesSplitTunnel] +ExcludeListResponse = List[DevicesSplitTunnel] diff --git a/src/cloudflare/types/zero_trust/devices/policies/exclude_update_params.py b/src/cloudflare/types/zero_trust/devices/policies/exclude_update_params.py index 2c703b1137e..41121b97c0a 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/exclude_update_params.py +++ b/src/cloudflare/types/zero_trust/devices/policies/exclude_update_params.py @@ -5,7 +5,7 @@ from typing import Iterable from typing_extensions import Required, TypedDict -from .teams_devices_split_tunnel_param import TeamsDevicesSplitTunnelParam +from .devices_split_tunnel_param import DevicesSplitTunnelParam __all__ = ["ExcludeUpdateParams"] @@ -13,4 +13,4 @@ class ExcludeUpdateParams(TypedDict, total=False): account_id: Required[str] - body: Required[Iterable[TeamsDevicesSplitTunnelParam]] + body: Required[Iterable[DevicesSplitTunnelParam]] diff --git a/src/cloudflare/types/zero_trust/devices/policies/exclude_update_response.py b/src/cloudflare/types/zero_trust/devices/policies/exclude_update_response.py index 6bae4cc0fa1..4aa7da541dd 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/exclude_update_response.py +++ b/src/cloudflare/types/zero_trust/devices/policies/exclude_update_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_split_tunnel import TeamsDevicesSplitTunnel +from .devices_split_tunnel import DevicesSplitTunnel __all__ = ["ExcludeUpdateResponse"] -ExcludeUpdateResponse = List[TeamsDevicesSplitTunnel] +ExcludeUpdateResponse = List[DevicesSplitTunnel] diff --git a/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_get_response.py b/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_get_response.py index e597089ae33..d71cd600688 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_get_response.py +++ b/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_fallback_domain import TeamsDevicesFallbackDomain +from .devices_fallback_domain import DevicesFallbackDomain __all__ = ["FallbackDomainGetResponse"] -FallbackDomainGetResponse = List[TeamsDevicesFallbackDomain] +FallbackDomainGetResponse = List[DevicesFallbackDomain] diff --git a/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_list_response.py b/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_list_response.py index 9e10153c984..3a33387f983 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_list_response.py +++ b/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_fallback_domain import TeamsDevicesFallbackDomain +from .devices_fallback_domain import DevicesFallbackDomain __all__ = ["FallbackDomainListResponse"] -FallbackDomainListResponse = List[TeamsDevicesFallbackDomain] +FallbackDomainListResponse = List[DevicesFallbackDomain] diff --git a/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_update_params.py b/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_update_params.py index 19aa5690387..acd8bbb0eb9 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_update_params.py +++ b/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_update_params.py @@ -5,7 +5,7 @@ from typing import Iterable from typing_extensions import Required, TypedDict -from .teams_devices_fallback_domain_param import TeamsDevicesFallbackDomainParam +from .devices_fallback_domain_param import DevicesFallbackDomainParam __all__ = ["FallbackDomainUpdateParams"] @@ -13,4 +13,4 @@ class FallbackDomainUpdateParams(TypedDict, total=False): account_id: Required[str] - body: Required[Iterable[TeamsDevicesFallbackDomainParam]] + body: Required[Iterable[DevicesFallbackDomainParam]] diff --git a/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_update_response.py b/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_update_response.py index 695c7088fd0..3b2c8e5b25b 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_update_response.py +++ b/src/cloudflare/types/zero_trust/devices/policies/fallback_domain_update_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_fallback_domain import TeamsDevicesFallbackDomain +from .devices_fallback_domain import DevicesFallbackDomain __all__ = ["FallbackDomainUpdateResponse"] -FallbackDomainUpdateResponse = List[TeamsDevicesFallbackDomain] +FallbackDomainUpdateResponse = List[DevicesFallbackDomain] diff --git a/src/cloudflare/types/zero_trust/devices/policies/include_get_response.py b/src/cloudflare/types/zero_trust/devices/policies/include_get_response.py index a81ab8e94a0..d7d9f61e972 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/include_get_response.py +++ b/src/cloudflare/types/zero_trust/devices/policies/include_get_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_split_tunnel_include import TeamsDevicesSplitTunnelInclude +from .devices_split_tunnel_include import DevicesSplitTunnelInclude __all__ = ["IncludeGetResponse"] -IncludeGetResponse = List[TeamsDevicesSplitTunnelInclude] +IncludeGetResponse = List[DevicesSplitTunnelInclude] diff --git a/src/cloudflare/types/zero_trust/devices/policies/include_list_response.py b/src/cloudflare/types/zero_trust/devices/policies/include_list_response.py index 5f289a0f2b5..4173afcf096 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/include_list_response.py +++ b/src/cloudflare/types/zero_trust/devices/policies/include_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_split_tunnel_include import TeamsDevicesSplitTunnelInclude +from .devices_split_tunnel_include import DevicesSplitTunnelInclude __all__ = ["IncludeListResponse"] -IncludeListResponse = List[TeamsDevicesSplitTunnelInclude] +IncludeListResponse = List[DevicesSplitTunnelInclude] diff --git a/src/cloudflare/types/zero_trust/devices/policies/include_update_params.py b/src/cloudflare/types/zero_trust/devices/policies/include_update_params.py index e8f92c7a40b..467152a8553 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/include_update_params.py +++ b/src/cloudflare/types/zero_trust/devices/policies/include_update_params.py @@ -5,7 +5,7 @@ from typing import Iterable from typing_extensions import Required, TypedDict -from .teams_devices_split_tunnel_include_param import TeamsDevicesSplitTunnelIncludeParam +from .devices_split_tunnel_include_param import DevicesSplitTunnelIncludeParam __all__ = ["IncludeUpdateParams"] @@ -13,4 +13,4 @@ class IncludeUpdateParams(TypedDict, total=False): account_id: Required[str] - body: Required[Iterable[TeamsDevicesSplitTunnelIncludeParam]] + body: Required[Iterable[DevicesSplitTunnelIncludeParam]] diff --git a/src/cloudflare/types/zero_trust/devices/policies/include_update_response.py b/src/cloudflare/types/zero_trust/devices/policies/include_update_response.py index 9da805f88b7..18529735936 100644 --- a/src/cloudflare/types/zero_trust/devices/policies/include_update_response.py +++ b/src/cloudflare/types/zero_trust/devices/policies/include_update_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_split_tunnel_include import TeamsDevicesSplitTunnelInclude +from .devices_split_tunnel_include import DevicesSplitTunnelInclude __all__ = ["IncludeUpdateResponse"] -IncludeUpdateResponse = List[TeamsDevicesSplitTunnelInclude] +IncludeUpdateResponse = List[DevicesSplitTunnelInclude] diff --git a/src/cloudflare/types/zero_trust/devices/policy_delete_response.py b/src/cloudflare/types/zero_trust/devices/policy_delete_response.py index 3f13d045b3a..aecbb1e54ca 100644 --- a/src/cloudflare/types/zero_trust/devices/policy_delete_response.py +++ b/src/cloudflare/types/zero_trust/devices/policy_delete_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_device_settings_policy import TeamsDevicesDeviceSettingsPolicy +from .devices_device_settings_policy import DevicesDeviceSettingsPolicy __all__ = ["PolicyDeleteResponse"] -PolicyDeleteResponse = List[TeamsDevicesDeviceSettingsPolicy] +PolicyDeleteResponse = List[DevicesDeviceSettingsPolicy] diff --git a/src/cloudflare/types/zero_trust/devices/policy_list_response.py b/src/cloudflare/types/zero_trust/devices/policy_list_response.py index 5b0672c19be..95cadbca13b 100644 --- a/src/cloudflare/types/zero_trust/devices/policy_list_response.py +++ b/src/cloudflare/types/zero_trust/devices/policy_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_device_settings_policy import TeamsDevicesDeviceSettingsPolicy +from .devices_device_settings_policy import DevicesDeviceSettingsPolicy __all__ = ["PolicyListResponse"] -PolicyListResponse = List[TeamsDevicesDeviceSettingsPolicy] +PolicyListResponse = List[DevicesDeviceSettingsPolicy] diff --git a/src/cloudflare/types/zero_trust/devices/posture/__init__.py b/src/cloudflare/types/zero_trust/devices/posture/__init__.py index 7ea8b62708a..666d6d134b2 100644 --- a/src/cloudflare/types/zero_trust/devices/posture/__init__.py +++ b/src/cloudflare/types/zero_trust/devices/posture/__init__.py @@ -5,7 +5,5 @@ from .integration_edit_params import IntegrationEditParams as IntegrationEditParams from .integration_create_params import IntegrationCreateParams as IntegrationCreateParams from .integration_list_response import IntegrationListResponse as IntegrationListResponse +from .device_posture_integrations import DevicePostureIntegrations as DevicePostureIntegrations from .integration_delete_response import IntegrationDeleteResponse as IntegrationDeleteResponse -from .teams_devices_device_posture_integrations import ( - TeamsDevicesDevicePostureIntegrations as TeamsDevicesDevicePostureIntegrations, -) diff --git a/src/cloudflare/types/zero_trust/devices/posture/teams_devices_device_posture_integrations.py b/src/cloudflare/types/zero_trust/devices/posture/device_posture_integrations.py similarity index 90% rename from src/cloudflare/types/zero_trust/devices/posture/teams_devices_device_posture_integrations.py rename to src/cloudflare/types/zero_trust/devices/posture/device_posture_integrations.py index d2d51d460a7..7728e3f5d05 100644 --- a/src/cloudflare/types/zero_trust/devices/posture/teams_devices_device_posture_integrations.py +++ b/src/cloudflare/types/zero_trust/devices/posture/device_posture_integrations.py @@ -5,7 +5,7 @@ from ....._models import BaseModel -__all__ = ["TeamsDevicesDevicePostureIntegrations", "Config"] +__all__ = ["DevicePostureIntegrations", "Config"] class Config(BaseModel): @@ -19,7 +19,7 @@ class Config(BaseModel): """The Workspace One client ID provided in the Workspace One Admin Dashboard.""" -class TeamsDevicesDevicePostureIntegrations(BaseModel): +class DevicePostureIntegrations(BaseModel): id: Optional[str] = None """API UUID.""" diff --git a/src/cloudflare/types/zero_trust/devices/posture/integration_list_response.py b/src/cloudflare/types/zero_trust/devices/posture/integration_list_response.py index 81d229cb6ce..ffbb8633862 100644 --- a/src/cloudflare/types/zero_trust/devices/posture/integration_list_response.py +++ b/src/cloudflare/types/zero_trust/devices/posture/integration_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_device_posture_integrations import TeamsDevicesDevicePostureIntegrations +from .device_posture_integrations import DevicePostureIntegrations __all__ = ["IntegrationListResponse"] -IntegrationListResponse = List[TeamsDevicesDevicePostureIntegrations] +IntegrationListResponse = List[DevicePostureIntegrations] diff --git a/src/cloudflare/types/zero_trust/devices/posture_list_response.py b/src/cloudflare/types/zero_trust/devices/posture_list_response.py index 8870231ff02..c183e9cd3e9 100644 --- a/src/cloudflare/types/zero_trust/devices/posture_list_response.py +++ b/src/cloudflare/types/zero_trust/devices/posture_list_response.py @@ -2,8 +2,8 @@ from typing import List -from .teams_devices_device_posture_rules import TeamsDevicesDevicePostureRules +from .device_posture_rules import DevicePostureRules __all__ = ["PostureListResponse"] -PostureListResponse = List[TeamsDevicesDevicePostureRules] +PostureListResponse = List[DevicePostureRules] diff --git a/src/cloudflare/types/zero_trust/devices/teams_devices_zero_trust_account_device_settings.py b/src/cloudflare/types/zero_trust/devices/zero_trust_account_device_settings.py similarity index 83% rename from src/cloudflare/types/zero_trust/devices/teams_devices_zero_trust_account_device_settings.py rename to src/cloudflare/types/zero_trust/devices/zero_trust_account_device_settings.py index 86acc185cca..17535b12e09 100644 --- a/src/cloudflare/types/zero_trust/devices/teams_devices_zero_trust_account_device_settings.py +++ b/src/cloudflare/types/zero_trust/devices/zero_trust_account_device_settings.py @@ -4,10 +4,10 @@ from ...._models import BaseModel -__all__ = ["TeamsDevicesZeroTrustAccountDeviceSettings"] +__all__ = ["ZeroTrustAccountDeviceSettings"] -class TeamsDevicesZeroTrustAccountDeviceSettings(BaseModel): +class ZeroTrustAccountDeviceSettings(BaseModel): gateway_proxy_enabled: Optional[bool] = None """Enable gateway proxy filtering on TCP.""" diff --git a/src/cloudflare/types/zero_trust/seat_edit_response.py b/src/cloudflare/types/zero_trust/seat_edit_response.py index db48a8979ac..17305d6920b 100644 --- a/src/cloudflare/types/zero_trust/seat_edit_response.py +++ b/src/cloudflare/types/zero_trust/seat_edit_response.py @@ -2,8 +2,8 @@ from typing import List -from .access_seats import AccessSeats +from .zero_trust_seats import ZeroTrustSeats __all__ = ["SeatEditResponse"] -SeatEditResponse = List[AccessSeats] +SeatEditResponse = List[ZeroTrustSeats] diff --git a/src/cloudflare/types/zero_trust/teams_devices_devices.py b/src/cloudflare/types/zero_trust/zero_trust_devices.py similarity index 96% rename from src/cloudflare/types/zero_trust/teams_devices_devices.py rename to src/cloudflare/types/zero_trust/zero_trust_devices.py index 62ff1c77a1c..1be55deab17 100644 --- a/src/cloudflare/types/zero_trust/teams_devices_devices.py +++ b/src/cloudflare/types/zero_trust/zero_trust_devices.py @@ -6,7 +6,7 @@ from ..._models import BaseModel -__all__ = ["TeamsDevicesDevices", "User"] +__all__ = ["ZeroTrustDevices", "User"] class User(BaseModel): @@ -20,7 +20,7 @@ class User(BaseModel): """The enrolled device user's name.""" -class TeamsDevicesDevices(BaseModel): +class ZeroTrustDevices(BaseModel): id: Optional[str] = None """Device ID.""" diff --git a/src/cloudflare/types/zero_trust/access_identity_providers.py b/src/cloudflare/types/zero_trust/zero_trust_identity_providers.py similarity index 99% rename from src/cloudflare/types/zero_trust/access_identity_providers.py rename to src/cloudflare/types/zero_trust/zero_trust_identity_providers.py index 5b727ae3de0..d4d22daa810 100644 --- a/src/cloudflare/types/zero_trust/access_identity_providers.py +++ b/src/cloudflare/types/zero_trust/zero_trust_identity_providers.py @@ -6,7 +6,7 @@ from ..._models import BaseModel __all__ = [ - "AccessIdentityProviders", + "ZeroTrustIdentityProviders", "AccessAzureAd", "AccessAzureAdConfig", "AccessAzureAdScimConfig", @@ -1341,7 +1341,7 @@ class AccessOnetimepin(BaseModel): """ -AccessIdentityProviders = Union[ +ZeroTrustIdentityProviders = Union[ AccessAzureAd, AccessCentrify, AccessFacebook, diff --git a/src/cloudflare/types/zero_trust/access_organizations.py b/src/cloudflare/types/zero_trust/zero_trust_organizations.py similarity index 96% rename from src/cloudflare/types/zero_trust/access_organizations.py rename to src/cloudflare/types/zero_trust/zero_trust_organizations.py index c86b03926b2..b0bb2210663 100644 --- a/src/cloudflare/types/zero_trust/access_organizations.py +++ b/src/cloudflare/types/zero_trust/zero_trust_organizations.py @@ -5,7 +5,7 @@ from ..._models import BaseModel -__all__ = ["AccessOrganizations", "CustomPages", "LoginDesign"] +__all__ = ["ZeroTrustOrganizations", "CustomPages", "LoginDesign"] class CustomPages(BaseModel): @@ -36,7 +36,7 @@ class LoginDesign(BaseModel): """The text color on your login page.""" -class AccessOrganizations(BaseModel): +class ZeroTrustOrganizations(BaseModel): allow_authenticate_via_warp: Optional[bool] = None """ When set to true, users can authenticate via WARP for any application in your diff --git a/src/cloudflare/types/zero_trust/access_seats.py b/src/cloudflare/types/zero_trust/zero_trust_seats.py similarity index 88% rename from src/cloudflare/types/zero_trust/access_seats.py rename to src/cloudflare/types/zero_trust/zero_trust_seats.py index 31a8a89bebb..0800a49be50 100644 --- a/src/cloudflare/types/zero_trust/access_seats.py +++ b/src/cloudflare/types/zero_trust/zero_trust_seats.py @@ -5,10 +5,10 @@ from ..._models import BaseModel -__all__ = ["AccessSeats"] +__all__ = ["ZeroTrustSeats"] -class AccessSeats(BaseModel): +class ZeroTrustSeats(BaseModel): access_seat: Optional[bool] = None """True if the seat is part of Access.""" diff --git a/src/cloudflare/types/zones/setting_edit_params.py b/src/cloudflare/types/zones/setting_edit_params.py index 0631453703c..48337d7b449 100644 --- a/src/cloudflare/types/zones/setting_edit_params.py +++ b/src/cloudflare/types/zones/setting_edit_params.py @@ -6,55 +6,55 @@ from typing_extensions import Literal, Required, TypedDict from .settings import ( - ZonesNELParam, - ZonesSSLParam, - ZonesWAFParam, - Zones0rttParam, - ZonesIPV6Param, - ZonesWebPParam, - ZonesHTTP2Param, - ZonesHTTP3Param, - ZonesBrotliParam, - ZonesMinifyParam, - ZonesMirageParam, - ZonesPolishParam, - ZonesTLS1_3Param, - ZonesCiphersParam, - ZonesBufferingParam, - ZonesCacheLevelParam, - ZonesEarlyHintsParam, - ZonesPseudoIPV4Param, - ZonesWebsocketsParam, - ZonesAdvancedDDOSParam, - ZonesAlwaysOnlineParam, - ZonesBrowserCheckParam, - ZonesChallengeTTLParam, - ZonesRocketLoaderParam, - ZonesImageResizingParam, - ZonesIPGeolocationParam, - ZonesMinTLSVersionParam, - ZonesSecurityLevelParam, - ZonesTLSClientAuthParam, - ZonesAlwaysUseHTTPSParam, - ZonesMobileRedirectParam, - ZonesOrangeToOrangeParam, - ZonesSecurityHeaderParam, - ZonesSSLRecommenderParam, - ZonesBrowserCacheTTLParam, - ZonesDevelopmentModeParam, - ZonesPrefetchPreloadParam, - ZonesEmailObfuscationParam, - ZonesH2PrioritizationParam, - ZonesProxyReadTimeoutParam, - ZonesHotlinkProtectionParam, - ZonesServerSideExcludeParam, - ZonesOpportunisticOnionParam, - ZonesTrueClientIPHeaderParam, - ZonesAutomaticHTTPSRewritesParam, - ZonesOpportunisticEncryptionParam, - ZonesOriginErrorPagePassThruParam, - ZonesSortQueryStringForCacheParam, - ZonesAutomaticPlatformOptimizationParam, + ZoneSettingNELParam, + ZoneSettingSSLParam, + ZoneSettingWAFParam, + ZoneSetting0rttParam, + ZoneSettingIPV6Param, + ZoneSettingWebPParam, + ZoneSettingHTTP2Param, + ZoneSettingHTTP3Param, + ZoneSettingBrotliParam, + ZoneSettingMinifyParam, + ZoneSettingMirageParam, + ZoneSettingPolishParam, + ZoneSettingTLS1_3Param, + ZoneSettingCiphersParam, + ZoneSettingBufferingParam, + ZoneSettingCacheLevelParam, + ZoneSettingEarlyHintsParam, + ZoneSettingPseudoIPV4Param, + ZoneSettingWebsocketsParam, + ZoneSettingAdvancedDDOSParam, + ZoneSettingAlwaysOnlineParam, + ZoneSettingBrowserCheckParam, + ZoneSettingChallengeTTLParam, + ZoneSettingRocketLoaderParam, + ZoneSettingImageResizingParam, + ZoneSettingIPGeolocationParam, + ZoneSettingMinTLSVersionParam, + ZoneSettingSecurityLevelParam, + ZoneSettingTLSClientAuthParam, + ZoneSettingAlwaysUseHTTPSParam, + ZoneSettingMobileRedirectParam, + ZoneSettingOrangeToOrangeParam, + ZoneSettingSecurityHeaderParam, + ZoneSettingSSLRecommenderParam, + ZoneSettingBrowserCacheTTLParam, + ZoneSettingDevelopmentModeParam, + ZoneSettingPrefetchPreloadParam, + ZoneSettingEmailObfuscationParam, + ZoneSettingH2PrioritizationParam, + ZoneSettingProxyReadTimeoutParam, + ZoneSettingHotlinkProtectionParam, + ZoneSettingServerSideExcludeParam, + ZoneSettingOpportunisticOnionParam, + ZoneSettingTrueClientIPHeaderParam, + ZoneSettingAutomaticHTTPSRewritesParam, + ZoneSettingOpportunisticEncryptionParam, + ZoneSettingOriginErrorPagePassThruParam, + ZoneSettingSortQueryStringForCacheParam, + ZoneSettingAutomaticPlatformOptimizationParam, ) __all__ = [ @@ -129,7 +129,7 @@ class ItemZonesSchemasAutomaticPlatformOptimization(TypedDict, total=False): id: Required[Literal["automatic_platform_optimization"]] """ID of the zone setting.""" - value: Required[ZonesAutomaticPlatformOptimizationParam] + value: Required[ZoneSettingAutomaticPlatformOptimizationParam] """Current value of the zone setting.""" @@ -150,58 +150,58 @@ class ItemZonesTLS1_2Only(TypedDict, total=False): Item = Union[ - Zones0rttParam, - ZonesAdvancedDDOSParam, - ZonesAlwaysOnlineParam, - ZonesAlwaysUseHTTPSParam, - ZonesAutomaticHTTPSRewritesParam, - ZonesBrotliParam, - ZonesBrowserCacheTTLParam, - ZonesBrowserCheckParam, - ZonesCacheLevelParam, - ZonesChallengeTTLParam, - ZonesCiphersParam, + ZoneSetting0rttParam, + ZoneSettingAdvancedDDOSParam, + ZoneSettingAlwaysOnlineParam, + ZoneSettingAlwaysUseHTTPSParam, + ZoneSettingAutomaticHTTPSRewritesParam, + ZoneSettingBrotliParam, + ZoneSettingBrowserCacheTTLParam, + ZoneSettingBrowserCheckParam, + ZoneSettingCacheLevelParam, + ZoneSettingChallengeTTLParam, + ZoneSettingCiphersParam, ItemZonesCNAMEFlattening, - ZonesDevelopmentModeParam, - ZonesEarlyHintsParam, + ZoneSettingDevelopmentModeParam, + ZoneSettingEarlyHintsParam, ItemZonesEdgeCacheTTL, - ZonesEmailObfuscationParam, - ZonesH2PrioritizationParam, - ZonesHotlinkProtectionParam, - ZonesHTTP2Param, - ZonesHTTP3Param, - ZonesImageResizingParam, - ZonesIPGeolocationParam, - ZonesIPV6Param, + ZoneSettingEmailObfuscationParam, + ZoneSettingH2PrioritizationParam, + ZoneSettingHotlinkProtectionParam, + ZoneSettingHTTP2Param, + ZoneSettingHTTP3Param, + ZoneSettingImageResizingParam, + ZoneSettingIPGeolocationParam, + ZoneSettingIPV6Param, ItemZonesMaxUpload, - ZonesMinTLSVersionParam, - ZonesMinifyParam, - ZonesMirageParam, - ZonesMobileRedirectParam, - ZonesNELParam, - ZonesOpportunisticEncryptionParam, - ZonesOpportunisticOnionParam, - ZonesOrangeToOrangeParam, - ZonesOriginErrorPagePassThruParam, - ZonesPolishParam, - ZonesPrefetchPreloadParam, - ZonesProxyReadTimeoutParam, - ZonesPseudoIPV4Param, - ZonesBufferingParam, - ZonesRocketLoaderParam, + ZoneSettingMinTLSVersionParam, + ZoneSettingMinifyParam, + ZoneSettingMirageParam, + ZoneSettingMobileRedirectParam, + ZoneSettingNELParam, + ZoneSettingOpportunisticEncryptionParam, + ZoneSettingOpportunisticOnionParam, + ZoneSettingOrangeToOrangeParam, + ZoneSettingOriginErrorPagePassThruParam, + ZoneSettingPolishParam, + ZoneSettingPrefetchPreloadParam, + ZoneSettingProxyReadTimeoutParam, + ZoneSettingPseudoIPV4Param, + ZoneSettingBufferingParam, + ZoneSettingRocketLoaderParam, ItemZonesSchemasAutomaticPlatformOptimization, - ZonesSecurityHeaderParam, - ZonesSecurityLevelParam, - ZonesServerSideExcludeParam, + ZoneSettingSecurityHeaderParam, + ZoneSettingSecurityLevelParam, + ZoneSettingServerSideExcludeParam, ItemZonesSha1Support, - ZonesSortQueryStringForCacheParam, - ZonesSSLParam, - ZonesSSLRecommenderParam, + ZoneSettingSortQueryStringForCacheParam, + ZoneSettingSSLParam, + ZoneSettingSSLRecommenderParam, ItemZonesTLS1_2Only, - ZonesTLS1_3Param, - ZonesTLSClientAuthParam, - ZonesTrueClientIPHeaderParam, - ZonesWAFParam, - ZonesWebPParam, - ZonesWebsocketsParam, + ZoneSettingTLS1_3Param, + ZoneSettingTLSClientAuthParam, + ZoneSettingTrueClientIPHeaderParam, + ZoneSettingWAFParam, + ZoneSettingWebPParam, + ZoneSettingWebsocketsParam, ] diff --git a/src/cloudflare/types/zones/setting_edit_response.py b/src/cloudflare/types/zones/setting_edit_response.py index d510b3accc0..b2935263c54 100644 --- a/src/cloudflare/types/zones/setting_edit_response.py +++ b/src/cloudflare/types/zones/setting_edit_response.py @@ -5,55 +5,55 @@ from typing_extensions import Literal from .settings import ( - ZonesNEL, - ZonesSSL, - ZonesWAF, - Zones0rtt, - ZonesIPV6, - ZonesWebP, - ZonesHTTP2, - ZonesHTTP3, - ZonesBrotli, - ZonesMinify, - ZonesMirage, - ZonesPolish, - ZonesTLS1_3, - ZonesCiphers, - ZonesBuffering, - ZonesCacheLevel, - ZonesEarlyHints, - ZonesPseudoIPV4, - ZonesWebsockets, - ZonesAdvancedDDOS, - ZonesAlwaysOnline, - ZonesBrowserCheck, - ZonesChallengeTTL, - ZonesRocketLoader, - ZonesImageResizing, - ZonesIPGeolocation, - ZonesMinTLSVersion, - ZonesSecurityLevel, - ZonesTLSClientAuth, - ZonesAlwaysUseHTTPS, - ZonesMobileRedirect, - ZonesOrangeToOrange, - ZonesSecurityHeader, - ZonesSSLRecommender, - ZonesBrowserCacheTTL, - ZonesDevelopmentMode, - ZonesPrefetchPreload, - ZonesEmailObfuscation, - ZonesH2Prioritization, - ZonesProxyReadTimeout, - ZonesHotlinkProtection, - ZonesServerSideExclude, - ZonesOpportunisticOnion, - ZonesTrueClientIPHeader, - ZonesAutomaticHTTPSRewrites, - ZonesOpportunisticEncryption, - ZonesOriginErrorPagePassThru, - ZonesSortQueryStringForCache, - ZonesAutomaticPlatformOptimization, + ZoneSettingNEL, + ZoneSettingSSL, + ZoneSettingWAF, + ZoneSetting0rtt, + ZoneSettingIPV6, + ZoneSettingWebP, + ZoneSettingHTTP2, + ZoneSettingHTTP3, + ZoneSettingBrotli, + ZoneSettingMinify, + ZoneSettingMirage, + ZoneSettingPolish, + ZoneSettingTLS1_3, + ZoneSettingCiphers, + ZoneSettingBuffering, + ZoneSettingCacheLevel, + ZoneSettingEarlyHints, + ZoneSettingPseudoIPV4, + ZoneSettingWebsockets, + ZoneSettingAdvancedDDOS, + ZoneSettingAlwaysOnline, + ZoneSettingBrowserCheck, + ZoneSettingChallengeTTL, + ZoneSettingRocketLoader, + ZoneSettingImageResizing, + ZoneSettingIPGeolocation, + ZoneSettingMinTLSVersion, + ZoneSettingSecurityLevel, + ZoneSettingTLSClientAuth, + ZoneSettingAlwaysUseHTTPS, + ZoneSettingMobileRedirect, + ZoneSettingOrangeToOrange, + ZoneSettingSecurityHeader, + ZoneSettingSSLRecommender, + ZoneSettingBrowserCacheTTL, + ZoneSettingDevelopmentMode, + ZoneSettingPrefetchPreload, + ZoneSettingEmailObfuscation, + ZoneSettingH2Prioritization, + ZoneSettingProxyReadTimeout, + ZoneSettingHotlinkProtection, + ZoneSettingServerSideExclude, + ZoneSettingOpportunisticOnion, + ZoneSettingTrueClientIPHeader, + ZoneSettingAutomaticHTTPSRewrites, + ZoneSettingOpportunisticEncryption, + ZoneSettingOriginErrorPagePassThru, + ZoneSettingSortQueryStringForCache, + ZoneSettingAutomaticPlatformOptimization, ) from ..._models import BaseModel @@ -146,7 +146,7 @@ class SettingEditResponseItemZonesSchemasAutomaticPlatformOptimization(BaseModel id: Literal["automatic_platform_optimization"] """ID of the zone setting.""" - value: ZonesAutomaticPlatformOptimization + value: ZoneSettingAutomaticPlatformOptimization """Current value of the zone setting.""" editable: Optional[Literal[True, False]] = None @@ -194,60 +194,60 @@ class SettingEditResponseItemZonesTLS1_2Only(BaseModel): SettingEditResponseItem = Union[ - Zones0rtt, - ZonesAdvancedDDOS, - ZonesAlwaysOnline, - ZonesAlwaysUseHTTPS, - ZonesAutomaticHTTPSRewrites, - ZonesBrotli, - ZonesBrowserCacheTTL, - ZonesBrowserCheck, - ZonesCacheLevel, - ZonesChallengeTTL, - ZonesCiphers, + ZoneSetting0rtt, + ZoneSettingAdvancedDDOS, + ZoneSettingAlwaysOnline, + ZoneSettingAlwaysUseHTTPS, + ZoneSettingAutomaticHTTPSRewrites, + ZoneSettingBrotli, + ZoneSettingBrowserCacheTTL, + ZoneSettingBrowserCheck, + ZoneSettingCacheLevel, + ZoneSettingChallengeTTL, + ZoneSettingCiphers, SettingEditResponseItemZonesCNAMEFlattening, - ZonesDevelopmentMode, - ZonesEarlyHints, + ZoneSettingDevelopmentMode, + ZoneSettingEarlyHints, SettingEditResponseItemZonesEdgeCacheTTL, - ZonesEmailObfuscation, - ZonesH2Prioritization, - ZonesHotlinkProtection, - ZonesHTTP2, - ZonesHTTP3, - ZonesImageResizing, - ZonesIPGeolocation, - ZonesIPV6, + ZoneSettingEmailObfuscation, + ZoneSettingH2Prioritization, + ZoneSettingHotlinkProtection, + ZoneSettingHTTP2, + ZoneSettingHTTP3, + ZoneSettingImageResizing, + ZoneSettingIPGeolocation, + ZoneSettingIPV6, SettingEditResponseItemZonesMaxUpload, - ZonesMinTLSVersion, - ZonesMinify, - ZonesMirage, - ZonesMobileRedirect, - ZonesNEL, - ZonesOpportunisticEncryption, - ZonesOpportunisticOnion, - ZonesOrangeToOrange, - ZonesOriginErrorPagePassThru, - ZonesPolish, - ZonesPrefetchPreload, - ZonesProxyReadTimeout, - ZonesPseudoIPV4, - ZonesBuffering, - ZonesRocketLoader, + ZoneSettingMinTLSVersion, + ZoneSettingMinify, + ZoneSettingMirage, + ZoneSettingMobileRedirect, + ZoneSettingNEL, + ZoneSettingOpportunisticEncryption, + ZoneSettingOpportunisticOnion, + ZoneSettingOrangeToOrange, + ZoneSettingOriginErrorPagePassThru, + ZoneSettingPolish, + ZoneSettingPrefetchPreload, + ZoneSettingProxyReadTimeout, + ZoneSettingPseudoIPV4, + ZoneSettingBuffering, + ZoneSettingRocketLoader, SettingEditResponseItemZonesSchemasAutomaticPlatformOptimization, - ZonesSecurityHeader, - ZonesSecurityLevel, - ZonesServerSideExclude, + ZoneSettingSecurityHeader, + ZoneSettingSecurityLevel, + ZoneSettingServerSideExclude, SettingEditResponseItemZonesSha1Support, - ZonesSortQueryStringForCache, - ZonesSSL, - ZonesSSLRecommender, + ZoneSettingSortQueryStringForCache, + ZoneSettingSSL, + ZoneSettingSSLRecommender, SettingEditResponseItemZonesTLS1_2Only, - ZonesTLS1_3, - ZonesTLSClientAuth, - ZonesTrueClientIPHeader, - ZonesWAF, - ZonesWebP, - ZonesWebsockets, + ZoneSettingTLS1_3, + ZoneSettingTLSClientAuth, + ZoneSettingTrueClientIPHeader, + ZoneSettingWAF, + ZoneSettingWebP, + ZoneSettingWebsockets, ] SettingEditResponse = List[SettingEditResponseItem] diff --git a/src/cloudflare/types/zones/setting_get_response.py b/src/cloudflare/types/zones/setting_get_response.py index 7dbd0072e8f..24a19873b63 100644 --- a/src/cloudflare/types/zones/setting_get_response.py +++ b/src/cloudflare/types/zones/setting_get_response.py @@ -5,55 +5,55 @@ from typing_extensions import Literal from .settings import ( - ZonesNEL, - ZonesSSL, - ZonesWAF, - Zones0rtt, - ZonesIPV6, - ZonesWebP, - ZonesHTTP2, - ZonesHTTP3, - ZonesBrotli, - ZonesMinify, - ZonesMirage, - ZonesPolish, - ZonesTLS1_3, - ZonesCiphers, - ZonesBuffering, - ZonesCacheLevel, - ZonesEarlyHints, - ZonesPseudoIPV4, - ZonesWebsockets, - ZonesAdvancedDDOS, - ZonesAlwaysOnline, - ZonesBrowserCheck, - ZonesChallengeTTL, - ZonesRocketLoader, - ZonesImageResizing, - ZonesIPGeolocation, - ZonesMinTLSVersion, - ZonesSecurityLevel, - ZonesTLSClientAuth, - ZonesAlwaysUseHTTPS, - ZonesMobileRedirect, - ZonesOrangeToOrange, - ZonesSecurityHeader, - ZonesSSLRecommender, - ZonesBrowserCacheTTL, - ZonesDevelopmentMode, - ZonesPrefetchPreload, - ZonesEmailObfuscation, - ZonesH2Prioritization, - ZonesProxyReadTimeout, - ZonesHotlinkProtection, - ZonesServerSideExclude, - ZonesOpportunisticOnion, - ZonesTrueClientIPHeader, - ZonesAutomaticHTTPSRewrites, - ZonesOpportunisticEncryption, - ZonesOriginErrorPagePassThru, - ZonesSortQueryStringForCache, - ZonesAutomaticPlatformOptimization, + ZoneSettingNEL, + ZoneSettingSSL, + ZoneSettingWAF, + ZoneSetting0rtt, + ZoneSettingIPV6, + ZoneSettingWebP, + ZoneSettingHTTP2, + ZoneSettingHTTP3, + ZoneSettingBrotli, + ZoneSettingMinify, + ZoneSettingMirage, + ZoneSettingPolish, + ZoneSettingTLS1_3, + ZoneSettingCiphers, + ZoneSettingBuffering, + ZoneSettingCacheLevel, + ZoneSettingEarlyHints, + ZoneSettingPseudoIPV4, + ZoneSettingWebsockets, + ZoneSettingAdvancedDDOS, + ZoneSettingAlwaysOnline, + ZoneSettingBrowserCheck, + ZoneSettingChallengeTTL, + ZoneSettingRocketLoader, + ZoneSettingImageResizing, + ZoneSettingIPGeolocation, + ZoneSettingMinTLSVersion, + ZoneSettingSecurityLevel, + ZoneSettingTLSClientAuth, + ZoneSettingAlwaysUseHTTPS, + ZoneSettingMobileRedirect, + ZoneSettingOrangeToOrange, + ZoneSettingSecurityHeader, + ZoneSettingSSLRecommender, + ZoneSettingBrowserCacheTTL, + ZoneSettingDevelopmentMode, + ZoneSettingPrefetchPreload, + ZoneSettingEmailObfuscation, + ZoneSettingH2Prioritization, + ZoneSettingProxyReadTimeout, + ZoneSettingHotlinkProtection, + ZoneSettingServerSideExclude, + ZoneSettingOpportunisticOnion, + ZoneSettingTrueClientIPHeader, + ZoneSettingAutomaticHTTPSRewrites, + ZoneSettingOpportunisticEncryption, + ZoneSettingOriginErrorPagePassThru, + ZoneSettingSortQueryStringForCache, + ZoneSettingAutomaticPlatformOptimization, ) from ..._models import BaseModel @@ -146,7 +146,7 @@ class SettingGetResponseItemZonesSchemasAutomaticPlatformOptimization(BaseModel) id: Literal["automatic_platform_optimization"] """ID of the zone setting.""" - value: ZonesAutomaticPlatformOptimization + value: ZoneSettingAutomaticPlatformOptimization """Current value of the zone setting.""" editable: Optional[Literal[True, False]] = None @@ -194,60 +194,60 @@ class SettingGetResponseItemZonesTLS1_2Only(BaseModel): SettingGetResponseItem = Union[ - Zones0rtt, - ZonesAdvancedDDOS, - ZonesAlwaysOnline, - ZonesAlwaysUseHTTPS, - ZonesAutomaticHTTPSRewrites, - ZonesBrotli, - ZonesBrowserCacheTTL, - ZonesBrowserCheck, - ZonesCacheLevel, - ZonesChallengeTTL, - ZonesCiphers, + ZoneSetting0rtt, + ZoneSettingAdvancedDDOS, + ZoneSettingAlwaysOnline, + ZoneSettingAlwaysUseHTTPS, + ZoneSettingAutomaticHTTPSRewrites, + ZoneSettingBrotli, + ZoneSettingBrowserCacheTTL, + ZoneSettingBrowserCheck, + ZoneSettingCacheLevel, + ZoneSettingChallengeTTL, + ZoneSettingCiphers, SettingGetResponseItemZonesCNAMEFlattening, - ZonesDevelopmentMode, - ZonesEarlyHints, + ZoneSettingDevelopmentMode, + ZoneSettingEarlyHints, SettingGetResponseItemZonesEdgeCacheTTL, - ZonesEmailObfuscation, - ZonesH2Prioritization, - ZonesHotlinkProtection, - ZonesHTTP2, - ZonesHTTP3, - ZonesImageResizing, - ZonesIPGeolocation, - ZonesIPV6, + ZoneSettingEmailObfuscation, + ZoneSettingH2Prioritization, + ZoneSettingHotlinkProtection, + ZoneSettingHTTP2, + ZoneSettingHTTP3, + ZoneSettingImageResizing, + ZoneSettingIPGeolocation, + ZoneSettingIPV6, SettingGetResponseItemZonesMaxUpload, - ZonesMinTLSVersion, - ZonesMinify, - ZonesMirage, - ZonesMobileRedirect, - ZonesNEL, - ZonesOpportunisticEncryption, - ZonesOpportunisticOnion, - ZonesOrangeToOrange, - ZonesOriginErrorPagePassThru, - ZonesPolish, - ZonesPrefetchPreload, - ZonesProxyReadTimeout, - ZonesPseudoIPV4, - ZonesBuffering, - ZonesRocketLoader, + ZoneSettingMinTLSVersion, + ZoneSettingMinify, + ZoneSettingMirage, + ZoneSettingMobileRedirect, + ZoneSettingNEL, + ZoneSettingOpportunisticEncryption, + ZoneSettingOpportunisticOnion, + ZoneSettingOrangeToOrange, + ZoneSettingOriginErrorPagePassThru, + ZoneSettingPolish, + ZoneSettingPrefetchPreload, + ZoneSettingProxyReadTimeout, + ZoneSettingPseudoIPV4, + ZoneSettingBuffering, + ZoneSettingRocketLoader, SettingGetResponseItemZonesSchemasAutomaticPlatformOptimization, - ZonesSecurityHeader, - ZonesSecurityLevel, - ZonesServerSideExclude, + ZoneSettingSecurityHeader, + ZoneSettingSecurityLevel, + ZoneSettingServerSideExclude, SettingGetResponseItemZonesSha1Support, - ZonesSortQueryStringForCache, - ZonesSSL, - ZonesSSLRecommender, + ZoneSettingSortQueryStringForCache, + ZoneSettingSSL, + ZoneSettingSSLRecommender, SettingGetResponseItemZonesTLS1_2Only, - ZonesTLS1_3, - ZonesTLSClientAuth, - ZonesTrueClientIPHeader, - ZonesWAF, - ZonesWebP, - ZonesWebsockets, + ZoneSettingTLS1_3, + ZoneSettingTLSClientAuth, + ZoneSettingTrueClientIPHeader, + ZoneSettingWAF, + ZoneSettingWebP, + ZoneSettingWebsockets, ] SettingGetResponse = List[SettingGetResponseItem] diff --git a/src/cloudflare/types/zones/settings/__init__.py b/src/cloudflare/types/zones/settings/__init__.py index 36b465364e7..8fb435e00d7 100644 --- a/src/cloudflare/types/zones/settings/__init__.py +++ b/src/cloudflare/types/zones/settings/__init__.py @@ -2,152 +2,154 @@ from __future__ import annotations -from .zones_nel import ZonesNEL as ZonesNEL -from .zones_ssl import ZonesSSL as ZonesSSL -from .zones_waf import ZonesWAF as ZonesWAF -from .zones_0rtt import Zones0rtt as Zones0rtt -from .zones_ipv6 import ZonesIPV6 as ZonesIPV6 -from .zones_webp import ZonesWebP as ZonesWebP -from .zones_http2 import ZonesHTTP2 as ZonesHTTP2 -from .zones_http3 import ZonesHTTP3 as ZonesHTTP3 -from .zones_brotli import ZonesBrotli as ZonesBrotli -from .zones_minify import ZonesMinify as ZonesMinify -from .zones_mirage import ZonesMirage as ZonesMirage -from .zones_polish import ZonesPolish as ZonesPolish -from .zones_ciphers import ZonesCiphers as ZonesCiphers -from .zones_tls_1_3 import ZonesTLS1_3 as ZonesTLS1_3 from .nel_edit_params import NELEditParams as NELEditParams from .ssl_edit_params import SSLEditParams as SSLEditParams from .waf_edit_params import WAFEditParams as WAFEditParams -from .zones_buffering import ZonesBuffering as ZonesBuffering -from .zones_nel_param import ZonesNELParam as ZonesNELParam -from .zones_ssl_param import ZonesSSLParam as ZonesSSLParam -from .zones_waf_param import ZonesWAFParam as ZonesWAFParam from .ipv6_edit_params import IPV6EditParams as IPV6EditParams from .webp_edit_params import WebPEditParams as WebPEditParams -from .zones_0rtt_param import Zones0rttParam as Zones0rttParam -from .zones_ipv6_param import ZonesIPV6Param as ZonesIPV6Param -from .zones_webp_param import ZonesWebPParam as ZonesWebPParam -from .zones_websockets import ZonesWebsockets as ZonesWebsockets +from .zone_setting_nel import ZoneSettingNEL as ZoneSettingNEL +from .zone_setting_ssl import ZoneSettingSSL as ZoneSettingSSL +from .zone_setting_waf import ZoneSettingWAF as ZoneSettingWAF from .http2_edit_params import HTTP2EditParams as HTTP2EditParams from .http3_edit_params import HTTP3EditParams as HTTP3EditParams -from .zones_cache_level import ZonesCacheLevel as ZonesCacheLevel -from .zones_early_hints import ZonesEarlyHints as ZonesEarlyHints -from .zones_http2_param import ZonesHTTP2Param as ZonesHTTP2Param -from .zones_http3_param import ZonesHTTP3Param as ZonesHTTP3Param -from .zones_pseudo_ipv4 import ZonesPseudoIPV4 as ZonesPseudoIPV4 +from .zone_setting_0rtt import ZoneSetting0rtt as ZoneSetting0rtt +from .zone_setting_ipv6 import ZoneSettingIPV6 as ZoneSettingIPV6 +from .zone_setting_webp import ZoneSettingWebP as ZoneSettingWebP from .brotli_edit_params import BrotliEditParams as BrotliEditParams from .cipher_edit_params import CipherEditParams as CipherEditParams from .minify_edit_params import MinifyEditParams as MinifyEditParams from .mirage_edit_params import MirageEditParams as MirageEditParams from .polish_edit_params import PolishEditParams as PolishEditParams -from .zones_brotli_param import ZonesBrotliParam as ZonesBrotliParam -from .zones_minify_param import ZonesMinifyParam as ZonesMinifyParam -from .zones_mirage_param import ZonesMirageParam as ZonesMirageParam -from .zones_polish_param import ZonesPolishParam as ZonesPolishParam +from .zone_setting_fonts import ZoneSettingFonts as ZoneSettingFonts +from .zone_setting_http2 import ZoneSettingHTTP2 as ZoneSettingHTTP2 +from .zone_setting_http3 import ZoneSettingHTTP3 as ZoneSettingHTTP3 from .tls_1_3_edit_params import TLS1_3EditParams as TLS1_3EditParams -from .zones_advanced_ddos import ZonesAdvancedDDOS as ZonesAdvancedDDOS -from .zones_always_online import ZonesAlwaysOnline as ZonesAlwaysOnline -from .zones_browser_check import ZonesBrowserCheck as ZonesBrowserCheck -from .zones_challenge_ttl import ZonesChallengeTTL as ZonesChallengeTTL -from .zones_ciphers_param import ZonesCiphersParam as ZonesCiphersParam -from .zones_rocket_loader import ZonesRocketLoader as ZonesRocketLoader -from .zones_tls_1_3_param import ZonesTLS1_3Param as ZonesTLS1_3Param +from .zone_setting_brotli import ZoneSettingBrotli as ZoneSettingBrotli +from .zone_setting_minify import ZoneSettingMinify as ZoneSettingMinify +from .zone_setting_mirage import ZoneSettingMirage as ZoneSettingMirage +from .zone_setting_polish import ZoneSettingPolish as ZoneSettingPolish from .zero_rtt_edit_params import ZeroRTTEditParams as ZeroRTTEditParams -from .zones_image_resizing import ZonesImageResizing as ZonesImageResizing -from .zones_ip_geolocation import ZonesIPGeolocation as ZonesIPGeolocation -from .zones_security_level import ZonesSecurityLevel as ZonesSecurityLevel +from .zone_setting_ciphers import ZoneSettingCiphers as ZoneSettingCiphers +from .zone_setting_tls_1_3 import ZoneSettingTLS1_3 as ZoneSettingTLS1_3 from .websocket_edit_params import WebsocketEditParams as WebsocketEditParams -from .zones_buffering_param import ZonesBufferingParam as ZonesBufferingParam -from .zones_min_tls_version import ZonesMinTLSVersion as ZonesMinTLSVersion -from .zones_mobile_redirect import ZonesMobileRedirect as ZonesMobileRedirect -from .zones_security_header import ZonesSecurityHeader as ZonesSecurityHeader -from .zones_ssl_recommender import ZonesSSLRecommender as ZonesSSLRecommender -from .zones_tls_client_auth import ZonesTLSClientAuth as ZonesTLSClientAuth from .early_hint_edit_params import EarlyHintEditParams as EarlyHintEditParams -from .speed_cloudflare_fonts import SpeedCloudflareFonts as SpeedCloudflareFonts -from .zones_always_use_https import ZonesAlwaysUseHTTPS as ZonesAlwaysUseHTTPS -from .zones_development_mode import ZonesDevelopmentMode as ZonesDevelopmentMode -from .zones_orange_to_orange import ZonesOrangeToOrange as ZonesOrangeToOrange -from .zones_prefetch_preload import ZonesPrefetchPreload as ZonesPrefetchPreload -from .zones_websockets_param import ZonesWebsocketsParam as ZonesWebsocketsParam +from .zone_setting_buffering import ZoneSettingBuffering as ZoneSettingBuffering +from .zone_setting_nel_param import ZoneSettingNELParam as ZoneSettingNELParam +from .zone_setting_ssl_param import ZoneSettingSSLParam as ZoneSettingSSLParam +from .zone_setting_waf_param import ZoneSettingWAFParam as ZoneSettingWAFParam from .cache_level_edit_params import CacheLevelEditParams as CacheLevelEditParams from .pseudo_ipv4_edit_params import PseudoIPV4EditParams as PseudoIPV4EditParams -from .zones_browser_cache_ttl import ZonesBrowserCacheTTL as ZonesBrowserCacheTTL -from .zones_cache_level_param import ZonesCacheLevelParam as ZonesCacheLevelParam -from .zones_early_hints_param import ZonesEarlyHintsParam as ZonesEarlyHintsParam -from .zones_email_obfuscation import ZonesEmailObfuscation as ZonesEmailObfuscation -from .zones_h2_prioritization import ZonesH2Prioritization as ZonesH2Prioritization -from .zones_pseudo_ipv4_param import ZonesPseudoIPV4Param as ZonesPseudoIPV4Param +from .zone_setting_0rtt_param import ZoneSetting0rttParam as ZoneSetting0rttParam +from .zone_setting_ipv6_param import ZoneSettingIPV6Param as ZoneSettingIPV6Param +from .zone_setting_webp_param import ZoneSettingWebPParam as ZoneSettingWebPParam +from .zone_setting_websockets import ZoneSettingWebsockets as ZoneSettingWebsockets from .font_setting_edit_params import FontSettingEditParams as FontSettingEditParams -from .zones_hotlink_protection import ZonesHotlinkProtection as ZonesHotlinkProtection -from .zones_proxy_read_timeout import ZonesProxyReadTimeout as ZonesProxyReadTimeout +from .zone_setting_cache_level import ZoneSettingCacheLevel as ZoneSettingCacheLevel +from .zone_setting_early_hints import ZoneSettingEarlyHints as ZoneSettingEarlyHints +from .zone_setting_http2_param import ZoneSettingHTTP2Param as ZoneSettingHTTP2Param +from .zone_setting_http3_param import ZoneSettingHTTP3Param as ZoneSettingHTTP3Param +from .zone_setting_pseudo_ipv4 import ZoneSettingPseudoIPV4 as ZoneSettingPseudoIPV4 from .always_online_edit_params import AlwaysOnlineEditParams as AlwaysOnlineEditParams from .browser_check_edit_params import BrowserCheckEditParams as BrowserCheckEditParams from .challenge_ttl_edit_params import ChallengeTTLEditParams as ChallengeTTLEditParams from .rocket_loader_edit_params import RocketLoaderEditParams as RocketLoaderEditParams -from .zones_advanced_ddos_param import ZonesAdvancedDDOSParam as ZonesAdvancedDDOSParam -from .zones_always_online_param import ZonesAlwaysOnlineParam as ZonesAlwaysOnlineParam -from .zones_browser_check_param import ZonesBrowserCheckParam as ZonesBrowserCheckParam -from .zones_challenge_ttl_param import ZonesChallengeTTLParam as ZonesChallengeTTLParam -from .zones_opportunistic_onion import ZonesOpportunisticOnion as ZonesOpportunisticOnion -from .zones_rocket_loader_param import ZonesRocketLoaderParam as ZonesRocketLoaderParam -from .zones_server_side_exclude import ZonesServerSideExclude as ZonesServerSideExclude +from .zone_setting_brotli_param import ZoneSettingBrotliParam as ZoneSettingBrotliParam +from .zone_setting_minify_param import ZoneSettingMinifyParam as ZoneSettingMinifyParam +from .zone_setting_mirage_param import ZoneSettingMirageParam as ZoneSettingMirageParam +from .zone_setting_polish_param import ZoneSettingPolishParam as ZoneSettingPolishParam from .image_resizing_edit_params import ImageResizingEditParams as ImageResizingEditParams from .ip_geolocation_edit_params import IPGeolocationEditParams as IPGeolocationEditParams from .security_level_edit_params import SecurityLevelEditParams as SecurityLevelEditParams -from .zones_image_resizing_param import ZonesImageResizingParam as ZonesImageResizingParam -from .zones_ip_geolocation_param import ZonesIPGeolocationParam as ZonesIPGeolocationParam -from .zones_security_level_param import ZonesSecurityLevelParam as ZonesSecurityLevelParam +from .zone_setting_advanced_ddos import ZoneSettingAdvancedDDOS as ZoneSettingAdvancedDDOS +from .zone_setting_always_online import ZoneSettingAlwaysOnline as ZoneSettingAlwaysOnline +from .zone_setting_browser_check import ZoneSettingBrowserCheck as ZoneSettingBrowserCheck +from .zone_setting_challenge_ttl import ZoneSettingChallengeTTL as ZoneSettingChallengeTTL +from .zone_setting_ciphers_param import ZoneSettingCiphersParam as ZoneSettingCiphersParam +from .zone_setting_rocket_loader import ZoneSettingRocketLoader as ZoneSettingRocketLoader +from .zone_setting_tls_1_3_param import ZoneSettingTLS1_3Param as ZoneSettingTLS1_3Param from .min_tls_version_edit_params import MinTLSVersionEditParams as MinTLSVersionEditParams from .mobile_redirect_edit_params import MobileRedirectEditParams as MobileRedirectEditParams from .security_header_edit_params import SecurityHeaderEditParams as SecurityHeaderEditParams from .ssl_recommender_edit_params import SSLRecommenderEditParams as SSLRecommenderEditParams from .tls_client_auth_edit_params import TLSClientAuthEditParams as TLSClientAuthEditParams -from .zones_min_tls_version_param import ZonesMinTLSVersionParam as ZonesMinTLSVersionParam -from .zones_mobile_redirect_param import ZonesMobileRedirectParam as ZonesMobileRedirectParam -from .zones_security_header_param import ZonesSecurityHeaderParam as ZonesSecurityHeaderParam -from .zones_ssl_recommender_param import ZonesSSLRecommenderParam as ZonesSSLRecommenderParam -from .zones_tls_client_auth_param import ZonesTLSClientAuthParam as ZonesTLSClientAuthParam -from .zones_true_client_ip_header import ZonesTrueClientIPHeader as ZonesTrueClientIPHeader +from .zone_setting_image_resizing import ZoneSettingImageResizing as ZoneSettingImageResizing +from .zone_setting_ip_geolocation import ZoneSettingIPGeolocation as ZoneSettingIPGeolocation +from .zone_setting_security_level import ZoneSettingSecurityLevel as ZoneSettingSecurityLevel from .always_use_https_edit_params import AlwaysUseHTTPSEditParams as AlwaysUseHTTPSEditParams from .development_mode_edit_params import DevelopmentModeEditParams as DevelopmentModeEditParams from .orange_to_orange_edit_params import OrangeToOrangeEditParams as OrangeToOrangeEditParams from .prefetch_preload_edit_params import PrefetchPreloadEditParams as PrefetchPreloadEditParams -from .zones_always_use_https_param import ZonesAlwaysUseHTTPSParam as ZonesAlwaysUseHTTPSParam -from .zones_development_mode_param import ZonesDevelopmentModeParam as ZonesDevelopmentModeParam -from .zones_orange_to_orange_param import ZonesOrangeToOrangeParam as ZonesOrangeToOrangeParam -from .zones_prefetch_preload_param import ZonesPrefetchPreloadParam as ZonesPrefetchPreloadParam +from .zone_setting_buffering_param import ZoneSettingBufferingParam as ZoneSettingBufferingParam +from .zone_setting_min_tls_version import ZoneSettingMinTLSVersion as ZoneSettingMinTLSVersion +from .zone_setting_mobile_redirect import ZoneSettingMobileRedirect as ZoneSettingMobileRedirect +from .zone_setting_security_header import ZoneSettingSecurityHeader as ZoneSettingSecurityHeader +from .zone_setting_ssl_recommender import ZoneSettingSSLRecommender as ZoneSettingSSLRecommender +from .zone_setting_tls_client_auth import ZoneSettingTLSClientAuth as ZoneSettingTLSClientAuth from .browser_cache_ttl_edit_params import BrowserCacheTTLEditParams as BrowserCacheTTLEditParams from .email_obfuscation_edit_params import EmailObfuscationEditParams as EmailObfuscationEditParams from .h2_prioritization_edit_params import H2PrioritizationEditParams as H2PrioritizationEditParams -from .zones_browser_cache_ttl_param import ZonesBrowserCacheTTLParam as ZonesBrowserCacheTTLParam -from .zones_email_obfuscation_param import ZonesEmailObfuscationParam as ZonesEmailObfuscationParam -from .zones_h2_prioritization_param import ZonesH2PrioritizationParam as ZonesH2PrioritizationParam +from .zone_setting_always_use_https import ZoneSettingAlwaysUseHTTPS as ZoneSettingAlwaysUseHTTPS +from .zone_setting_development_mode import ZoneSettingDevelopmentMode as ZoneSettingDevelopmentMode +from .zone_setting_orange_to_orange import ZoneSettingOrangeToOrange as ZoneSettingOrangeToOrange +from .zone_setting_prefetch_preload import ZoneSettingPrefetchPreload as ZoneSettingPrefetchPreload +from .zone_setting_websockets_param import ZoneSettingWebsocketsParam as ZoneSettingWebsocketsParam from .hotlink_protection_edit_params import HotlinkProtectionEditParams as HotlinkProtectionEditParams from .proxy_read_timeout_edit_params import ProxyReadTimeoutEditParams as ProxyReadTimeoutEditParams from .response_buffering_edit_params import ResponseBufferingEditParams as ResponseBufferingEditParams -from .zones_automatic_https_rewrites import ZonesAutomaticHTTPSRewrites as ZonesAutomaticHTTPSRewrites -from .zones_hotlink_protection_param import ZonesHotlinkProtectionParam as ZonesHotlinkProtectionParam -from .zones_opportunistic_encryption import ZonesOpportunisticEncryption as ZonesOpportunisticEncryption -from .zones_proxy_read_timeout_param import ZonesProxyReadTimeoutParam as ZonesProxyReadTimeoutParam +from .zone_setting_browser_cache_ttl import ZoneSettingBrowserCacheTTL as ZoneSettingBrowserCacheTTL +from .zone_setting_cache_level_param import ZoneSettingCacheLevelParam as ZoneSettingCacheLevelParam +from .zone_setting_early_hints_param import ZoneSettingEarlyHintsParam as ZoneSettingEarlyHintsParam +from .zone_setting_email_obfuscation import ZoneSettingEmailObfuscation as ZoneSettingEmailObfuscation +from .zone_setting_h2_prioritization import ZoneSettingH2Prioritization as ZoneSettingH2Prioritization +from .zone_setting_pseudo_ipv4_param import ZoneSettingPseudoIPV4Param as ZoneSettingPseudoIPV4Param from .opportunistic_onion_edit_params import OpportunisticOnionEditParams as OpportunisticOnionEditParams from .server_side_exclude_edit_params import ServerSideExcludeEditParams as ServerSideExcludeEditParams -from .zones_opportunistic_onion_param import ZonesOpportunisticOnionParam as ZonesOpportunisticOnionParam -from .zones_server_side_exclude_param import ZonesServerSideExcludeParam as ZonesServerSideExcludeParam +from .zone_setting_hotlink_protection import ZoneSettingHotlinkProtection as ZoneSettingHotlinkProtection +from .zone_setting_proxy_read_timeout import ZoneSettingProxyReadTimeout as ZoneSettingProxyReadTimeout +from .zone_setting_advanced_ddos_param import ZoneSettingAdvancedDDOSParam as ZoneSettingAdvancedDDOSParam +from .zone_setting_always_online_param import ZoneSettingAlwaysOnlineParam as ZoneSettingAlwaysOnlineParam +from .zone_setting_browser_check_param import ZoneSettingBrowserCheckParam as ZoneSettingBrowserCheckParam +from .zone_setting_challenge_ttl_param import ZoneSettingChallengeTTLParam as ZoneSettingChallengeTTLParam +from .zone_setting_opportunistic_onion import ZoneSettingOpportunisticOnion as ZoneSettingOpportunisticOnion +from .zone_setting_rocket_loader_param import ZoneSettingRocketLoaderParam as ZoneSettingRocketLoaderParam +from .zone_setting_server_side_exclude import ZoneSettingServerSideExclude as ZoneSettingServerSideExclude from .true_client_ip_header_edit_params import TrueClientIPHeaderEditParams as TrueClientIPHeaderEditParams -from .zones_origin_error_page_pass_thru import ZonesOriginErrorPagePassThru as ZonesOriginErrorPagePassThru -from .zones_sort_query_string_for_cache import ZonesSortQueryStringForCache as ZonesSortQueryStringForCache -from .zones_true_client_ip_header_param import ZonesTrueClientIPHeaderParam as ZonesTrueClientIPHeaderParam +from .zone_setting_image_resizing_param import ZoneSettingImageResizingParam as ZoneSettingImageResizingParam +from .zone_setting_ip_geolocation_param import ZoneSettingIPGeolocationParam as ZoneSettingIPGeolocationParam +from .zone_setting_security_level_param import ZoneSettingSecurityLevelParam as ZoneSettingSecurityLevelParam +from .zone_setting_min_tls_version_param import ZoneSettingMinTLSVersionParam as ZoneSettingMinTLSVersionParam +from .zone_setting_mobile_redirect_param import ZoneSettingMobileRedirectParam as ZoneSettingMobileRedirectParam +from .zone_setting_security_header_param import ZoneSettingSecurityHeaderParam as ZoneSettingSecurityHeaderParam +from .zone_setting_ssl_recommender_param import ZoneSettingSSLRecommenderParam as ZoneSettingSSLRecommenderParam +from .zone_setting_tls_client_auth_param import ZoneSettingTLSClientAuthParam as ZoneSettingTLSClientAuthParam +from .zone_setting_true_client_ip_header import ZoneSettingTrueClientIPHeader as ZoneSettingTrueClientIPHeader from .automatic_https_rewrite_edit_params import AutomaticHTTPSRewriteEditParams as AutomaticHTTPSRewriteEditParams from .origin_max_http_version_edit_params import OriginMaxHTTPVersionEditParams as OriginMaxHTTPVersionEditParams +from .zone_setting_always_use_https_param import ZoneSettingAlwaysUseHTTPSParam as ZoneSettingAlwaysUseHTTPSParam +from .zone_setting_development_mode_param import ZoneSettingDevelopmentModeParam as ZoneSettingDevelopmentModeParam +from .zone_setting_orange_to_orange_param import ZoneSettingOrangeToOrangeParam as ZoneSettingOrangeToOrangeParam +from .zone_setting_prefetch_preload_param import ZoneSettingPrefetchPreloadParam as ZoneSettingPrefetchPreloadParam from .opportunistic_encryption_edit_params import OpportunisticEncryptionEditParams as OpportunisticEncryptionEditParams from .origin_max_http_version_get_response import OriginMaxHTTPVersionGetResponse as OriginMaxHTTPVersionGetResponse -from .zones_automatic_https_rewrites_param import ZonesAutomaticHTTPSRewritesParam as ZonesAutomaticHTTPSRewritesParam -from .zones_opportunistic_encryption_param import ZonesOpportunisticEncryptionParam as ZonesOpportunisticEncryptionParam +from .zone_setting_browser_cache_ttl_param import ZoneSettingBrowserCacheTTLParam as ZoneSettingBrowserCacheTTLParam +from .zone_setting_email_obfuscation_param import ZoneSettingEmailObfuscationParam as ZoneSettingEmailObfuscationParam +from .zone_setting_h2_prioritization_param import ZoneSettingH2PrioritizationParam as ZoneSettingH2PrioritizationParam from .origin_max_http_version_edit_response import OriginMaxHTTPVersionEditResponse as OriginMaxHTTPVersionEditResponse -from .zones_automatic_platform_optimization import ( - ZonesAutomaticPlatformOptimization as ZonesAutomaticPlatformOptimization, +from .zone_setting_automatic_https_rewrites import ( + ZoneSettingAutomaticHTTPSRewrites as ZoneSettingAutomaticHTTPSRewrites, +) +from .zone_setting_hotlink_protection_param import ( + ZoneSettingHotlinkProtectionParam as ZoneSettingHotlinkProtectionParam, +) +from .zone_setting_opportunistic_encryption import ( + ZoneSettingOpportunisticEncryption as ZoneSettingOpportunisticEncryption, +) +from .zone_setting_proxy_read_timeout_param import ZoneSettingProxyReadTimeoutParam as ZoneSettingProxyReadTimeoutParam +from .zone_setting_opportunistic_onion_param import ( + ZoneSettingOpportunisticOnionParam as ZoneSettingOpportunisticOnionParam, +) +from .zone_setting_server_side_exclude_param import ( + ZoneSettingServerSideExcludeParam as ZoneSettingServerSideExcludeParam, ) from .origin_error_page_pass_thru_edit_params import ( OriginErrorPagePassThruEditParams as OriginErrorPagePassThruEditParams, @@ -155,15 +157,33 @@ from .sort_query_string_for_cache_edit_params import ( SortQueryStringForCacheEditParams as SortQueryStringForCacheEditParams, ) -from .zones_origin_error_page_pass_thru_param import ( - ZonesOriginErrorPagePassThruParam as ZonesOriginErrorPagePassThruParam, +from .zone_setting_origin_error_page_pass_thru import ( + ZoneSettingOriginErrorPagePassThru as ZoneSettingOriginErrorPagePassThru, +) +from .zone_setting_sort_query_string_for_cache import ( + ZoneSettingSortQueryStringForCache as ZoneSettingSortQueryStringForCache, ) -from .zones_sort_query_string_for_cache_param import ( - ZonesSortQueryStringForCacheParam as ZonesSortQueryStringForCacheParam, +from .zone_setting_true_client_ip_header_param import ( + ZoneSettingTrueClientIPHeaderParam as ZoneSettingTrueClientIPHeaderParam, ) from .automatic_platform_optimization_edit_params import ( AutomaticPlatformOptimizationEditParams as AutomaticPlatformOptimizationEditParams, ) -from .zones_automatic_platform_optimization_param import ( - ZonesAutomaticPlatformOptimizationParam as ZonesAutomaticPlatformOptimizationParam, +from .zone_setting_automatic_https_rewrites_param import ( + ZoneSettingAutomaticHTTPSRewritesParam as ZoneSettingAutomaticHTTPSRewritesParam, +) +from .zone_setting_opportunistic_encryption_param import ( + ZoneSettingOpportunisticEncryptionParam as ZoneSettingOpportunisticEncryptionParam, +) +from .zone_setting_automatic_platform_optimization import ( + ZoneSettingAutomaticPlatformOptimization as ZoneSettingAutomaticPlatformOptimization, +) +from .zone_setting_origin_error_page_pass_thru_param import ( + ZoneSettingOriginErrorPagePassThruParam as ZoneSettingOriginErrorPagePassThruParam, +) +from .zone_setting_sort_query_string_for_cache_param import ( + ZoneSettingSortQueryStringForCacheParam as ZoneSettingSortQueryStringForCacheParam, +) +from .zone_setting_automatic_platform_optimization_param import ( + ZoneSettingAutomaticPlatformOptimizationParam as ZoneSettingAutomaticPlatformOptimizationParam, ) diff --git a/src/cloudflare/types/zones/settings/automatic_platform_optimization_edit_params.py b/src/cloudflare/types/zones/settings/automatic_platform_optimization_edit_params.py index d2cd26cda07..e7e7da4514e 100644 --- a/src/cloudflare/types/zones/settings/automatic_platform_optimization_edit_params.py +++ b/src/cloudflare/types/zones/settings/automatic_platform_optimization_edit_params.py @@ -4,7 +4,7 @@ from typing_extensions import Required, TypedDict -from .zones_automatic_platform_optimization_param import ZonesAutomaticPlatformOptimizationParam +from .zone_setting_automatic_platform_optimization_param import ZoneSettingAutomaticPlatformOptimizationParam __all__ = ["AutomaticPlatformOptimizationEditParams"] @@ -13,4 +13,4 @@ class AutomaticPlatformOptimizationEditParams(TypedDict, total=False): zone_id: Required[str] """Identifier""" - value: Required[ZonesAutomaticPlatformOptimizationParam] + value: Required[ZoneSettingAutomaticPlatformOptimizationParam] diff --git a/src/cloudflare/types/zones/settings/h2_prioritization_edit_params.py b/src/cloudflare/types/zones/settings/h2_prioritization_edit_params.py index 9164369178a..ac5feb84511 100644 --- a/src/cloudflare/types/zones/settings/h2_prioritization_edit_params.py +++ b/src/cloudflare/types/zones/settings/h2_prioritization_edit_params.py @@ -4,7 +4,7 @@ from typing_extensions import Required, TypedDict -from .zones_h2_prioritization_param import ZonesH2PrioritizationParam +from .zone_setting_h2_prioritization_param import ZoneSettingH2PrioritizationParam __all__ = ["H2PrioritizationEditParams"] @@ -13,7 +13,7 @@ class H2PrioritizationEditParams(TypedDict, total=False): zone_id: Required[str] """Identifier""" - value: Required[ZonesH2PrioritizationParam] + value: Required[ZoneSettingH2PrioritizationParam] """ HTTP/2 Edge Prioritization optimises the delivery of resources served through HTTP/2 to improve page load performance. It also supports fine control of diff --git a/src/cloudflare/types/zones/settings/image_resizing_edit_params.py b/src/cloudflare/types/zones/settings/image_resizing_edit_params.py index e7c7a72b762..f36d9285cd3 100644 --- a/src/cloudflare/types/zones/settings/image_resizing_edit_params.py +++ b/src/cloudflare/types/zones/settings/image_resizing_edit_params.py @@ -4,7 +4,7 @@ from typing_extensions import Required, TypedDict -from .zones_image_resizing_param import ZonesImageResizingParam +from .zone_setting_image_resizing_param import ZoneSettingImageResizingParam __all__ = ["ImageResizingEditParams"] @@ -13,7 +13,7 @@ class ImageResizingEditParams(TypedDict, total=False): zone_id: Required[str] """Identifier""" - value: Required[ZonesImageResizingParam] + value: Required[ZoneSettingImageResizingParam] """ Image Resizing provides on-demand resizing, conversion and optimisation for images served through Cloudflare's network. Refer to the diff --git a/src/cloudflare/types/zones/settings/nel_edit_params.py b/src/cloudflare/types/zones/settings/nel_edit_params.py index 7c70c02c129..1043d489c22 100644 --- a/src/cloudflare/types/zones/settings/nel_edit_params.py +++ b/src/cloudflare/types/zones/settings/nel_edit_params.py @@ -4,7 +4,7 @@ from typing_extensions import Required, TypedDict -from .zones_nel_param import ZonesNELParam +from .zone_setting_nel_param import ZoneSettingNELParam __all__ = ["NELEditParams"] @@ -13,5 +13,5 @@ class NELEditParams(TypedDict, total=False): zone_id: Required[str] """Identifier""" - value: Required[ZonesNELParam] + value: Required[ZoneSettingNELParam] """Enable Network Error Logging reporting on your zone. (Beta)""" diff --git a/src/cloudflare/types/zones/settings/orange_to_orange_edit_params.py b/src/cloudflare/types/zones/settings/orange_to_orange_edit_params.py index 08b4c6791de..5758995a76e 100644 --- a/src/cloudflare/types/zones/settings/orange_to_orange_edit_params.py +++ b/src/cloudflare/types/zones/settings/orange_to_orange_edit_params.py @@ -4,7 +4,7 @@ from typing_extensions import Required, TypedDict -from .zones_orange_to_orange_param import ZonesOrangeToOrangeParam +from .zone_setting_orange_to_orange_param import ZoneSettingOrangeToOrangeParam __all__ = ["OrangeToOrangeEditParams"] @@ -13,7 +13,7 @@ class OrangeToOrangeEditParams(TypedDict, total=False): zone_id: Required[str] """Identifier""" - value: Required[ZonesOrangeToOrangeParam] + value: Required[ZoneSettingOrangeToOrangeParam] """ Orange to Orange (O2O) allows zones on Cloudflare to CNAME to other zones also on Cloudflare. diff --git a/src/cloudflare/types/zones/settings/polish_edit_params.py b/src/cloudflare/types/zones/settings/polish_edit_params.py index dde5500407e..4612df87efa 100644 --- a/src/cloudflare/types/zones/settings/polish_edit_params.py +++ b/src/cloudflare/types/zones/settings/polish_edit_params.py @@ -4,7 +4,7 @@ from typing_extensions import Required, TypedDict -from .zones_polish_param import ZonesPolishParam +from .zone_setting_polish_param import ZoneSettingPolishParam __all__ = ["PolishEditParams"] @@ -13,7 +13,7 @@ class PolishEditParams(TypedDict, total=False): zone_id: Required[str] """Identifier""" - value: Required[ZonesPolishParam] + value: Required[ZoneSettingPolishParam] """Removes metadata and compresses your images for faster page load times. Basic (Lossless): Reduce the size of PNG, JPEG, and GIF files - no impact on diff --git a/src/cloudflare/types/zones/settings/proxy_read_timeout_edit_params.py b/src/cloudflare/types/zones/settings/proxy_read_timeout_edit_params.py index 886d1231c7e..a01e1c1c05f 100644 --- a/src/cloudflare/types/zones/settings/proxy_read_timeout_edit_params.py +++ b/src/cloudflare/types/zones/settings/proxy_read_timeout_edit_params.py @@ -4,7 +4,7 @@ from typing_extensions import Required, TypedDict -from .zones_proxy_read_timeout_param import ZonesProxyReadTimeoutParam +from .zone_setting_proxy_read_timeout_param import ZoneSettingProxyReadTimeoutParam __all__ = ["ProxyReadTimeoutEditParams"] @@ -13,5 +13,5 @@ class ProxyReadTimeoutEditParams(TypedDict, total=False): zone_id: Required[str] """Identifier""" - value: Required[ZonesProxyReadTimeoutParam] + value: Required[ZoneSettingProxyReadTimeoutParam] """Maximum time between two read operations from origin.""" diff --git a/src/cloudflare/types/zones/settings/rocket_loader_edit_params.py b/src/cloudflare/types/zones/settings/rocket_loader_edit_params.py index a47fb96b020..a1ac846330c 100644 --- a/src/cloudflare/types/zones/settings/rocket_loader_edit_params.py +++ b/src/cloudflare/types/zones/settings/rocket_loader_edit_params.py @@ -4,7 +4,7 @@ from typing_extensions import Required, TypedDict -from .zones_rocket_loader_param import ZonesRocketLoaderParam +from .zone_setting_rocket_loader_param import ZoneSettingRocketLoaderParam __all__ = ["RocketLoaderEditParams"] @@ -13,7 +13,7 @@ class RocketLoaderEditParams(TypedDict, total=False): zone_id: Required[str] """Identifier""" - value: Required[ZonesRocketLoaderParam] + value: Required[ZoneSettingRocketLoaderParam] """ Rocket Loader is a general-purpose asynchronous JavaScript optimisation that prioritises rendering your content while loading your site's Javascript diff --git a/src/cloudflare/types/zones/settings/ssl_recommender_edit_params.py b/src/cloudflare/types/zones/settings/ssl_recommender_edit_params.py index 5c85f3cc1fb..f2db5469144 100644 --- a/src/cloudflare/types/zones/settings/ssl_recommender_edit_params.py +++ b/src/cloudflare/types/zones/settings/ssl_recommender_edit_params.py @@ -4,7 +4,7 @@ from typing_extensions import Required, TypedDict -from .zones_ssl_recommender_param import ZonesSSLRecommenderParam +from .zone_setting_ssl_recommender_param import ZoneSettingSSLRecommenderParam __all__ = ["SSLRecommenderEditParams"] @@ -13,7 +13,7 @@ class SSLRecommenderEditParams(TypedDict, total=False): zone_id: Required[str] """Identifier""" - value: Required[ZonesSSLRecommenderParam] + value: Required[ZoneSettingSSLRecommenderParam] """ Enrollment in the SSL/TLS Recommender service which tries to detect and recommend (by sending periodic emails) the most secure SSL/TLS setting your diff --git a/src/cloudflare/types/zones/settings/zones_0rtt.py b/src/cloudflare/types/zones/settings/zone_setting_0rtt.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_0rtt.py rename to src/cloudflare/types/zones/settings/zone_setting_0rtt.py index 9c0dede6121..dbe59f9b50b 100644 --- a/src/cloudflare/types/zones/settings/zones_0rtt.py +++ b/src/cloudflare/types/zones/settings/zone_setting_0rtt.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["Zones0rtt"] +__all__ = ["ZoneSetting0rtt"] -class Zones0rtt(BaseModel): +class ZoneSetting0rtt(BaseModel): id: Literal["0rtt"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_0rtt_param.py b/src/cloudflare/types/zones/settings/zone_setting_0rtt_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_0rtt_param.py rename to src/cloudflare/types/zones/settings/zone_setting_0rtt_param.py index 5b083d92941..784c92adabd 100644 --- a/src/cloudflare/types/zones/settings/zones_0rtt_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_0rtt_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["Zones0rttParam"] +__all__ = ["ZoneSetting0rttParam"] -class Zones0rttParam(TypedDict, total=False): +class ZoneSetting0rttParam(TypedDict, total=False): id: Required[Literal["0rtt"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_advanced_ddos.py b/src/cloudflare/types/zones/settings/zone_setting_advanced_ddos.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_advanced_ddos.py rename to src/cloudflare/types/zones/settings/zone_setting_advanced_ddos.py index 5ec5b5e7a17..aaebab81f32 100644 --- a/src/cloudflare/types/zones/settings/zones_advanced_ddos.py +++ b/src/cloudflare/types/zones/settings/zone_setting_advanced_ddos.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesAdvancedDDOS"] +__all__ = ["ZoneSettingAdvancedDDOS"] -class ZonesAdvancedDDOS(BaseModel): +class ZoneSettingAdvancedDDOS(BaseModel): id: Literal["advanced_ddos"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_advanced_ddos_param.py b/src/cloudflare/types/zones/settings/zone_setting_advanced_ddos_param.py similarity index 77% rename from src/cloudflare/types/zones/settings/zones_advanced_ddos_param.py rename to src/cloudflare/types/zones/settings/zone_setting_advanced_ddos_param.py index 7577bb1257f..d928f35a454 100644 --- a/src/cloudflare/types/zones/settings/zones_advanced_ddos_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_advanced_ddos_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesAdvancedDDOSParam"] +__all__ = ["ZoneSettingAdvancedDDOSParam"] -class ZonesAdvancedDDOSParam(TypedDict, total=False): +class ZoneSettingAdvancedDDOSParam(TypedDict, total=False): id: Required[Literal["advanced_ddos"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_always_online.py b/src/cloudflare/types/zones/settings/zone_setting_always_online.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_always_online.py rename to src/cloudflare/types/zones/settings/zone_setting_always_online.py index 69e0beb2ced..2fb96c5f808 100644 --- a/src/cloudflare/types/zones/settings/zones_always_online.py +++ b/src/cloudflare/types/zones/settings/zone_setting_always_online.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesAlwaysOnline"] +__all__ = ["ZoneSettingAlwaysOnline"] -class ZonesAlwaysOnline(BaseModel): +class ZoneSettingAlwaysOnline(BaseModel): id: Literal["always_online"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_always_online_param.py b/src/cloudflare/types/zones/settings/zone_setting_always_online_param.py similarity index 77% rename from src/cloudflare/types/zones/settings/zones_always_online_param.py rename to src/cloudflare/types/zones/settings/zone_setting_always_online_param.py index 426cadf7a86..3691306d0a2 100644 --- a/src/cloudflare/types/zones/settings/zones_always_online_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_always_online_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesAlwaysOnlineParam"] +__all__ = ["ZoneSettingAlwaysOnlineParam"] -class ZonesAlwaysOnlineParam(TypedDict, total=False): +class ZoneSettingAlwaysOnlineParam(TypedDict, total=False): id: Required[Literal["always_online"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_always_use_https.py b/src/cloudflare/types/zones/settings/zone_setting_always_use_https.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_always_use_https.py rename to src/cloudflare/types/zones/settings/zone_setting_always_use_https.py index 7d1ad7d29b9..500d331ab02 100644 --- a/src/cloudflare/types/zones/settings/zones_always_use_https.py +++ b/src/cloudflare/types/zones/settings/zone_setting_always_use_https.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesAlwaysUseHTTPS"] +__all__ = ["ZoneSettingAlwaysUseHTTPS"] -class ZonesAlwaysUseHTTPS(BaseModel): +class ZoneSettingAlwaysUseHTTPS(BaseModel): id: Literal["always_use_https"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_always_use_https_param.py b/src/cloudflare/types/zones/settings/zone_setting_always_use_https_param.py similarity index 76% rename from src/cloudflare/types/zones/settings/zones_always_use_https_param.py rename to src/cloudflare/types/zones/settings/zone_setting_always_use_https_param.py index 40b2bc45282..899c460b940 100644 --- a/src/cloudflare/types/zones/settings/zones_always_use_https_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_always_use_https_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesAlwaysUseHTTPSParam"] +__all__ = ["ZoneSettingAlwaysUseHTTPSParam"] -class ZonesAlwaysUseHTTPSParam(TypedDict, total=False): +class ZoneSettingAlwaysUseHTTPSParam(TypedDict, total=False): id: Required[Literal["always_use_https"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_automatic_https_rewrites.py b/src/cloudflare/types/zones/settings/zone_setting_automatic_https_rewrites.py similarity index 86% rename from src/cloudflare/types/zones/settings/zones_automatic_https_rewrites.py rename to src/cloudflare/types/zones/settings/zone_setting_automatic_https_rewrites.py index 65d7a67244e..c6b14fb8df4 100644 --- a/src/cloudflare/types/zones/settings/zones_automatic_https_rewrites.py +++ b/src/cloudflare/types/zones/settings/zone_setting_automatic_https_rewrites.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesAutomaticHTTPSRewrites"] +__all__ = ["ZoneSettingAutomaticHTTPSRewrites"] -class ZonesAutomaticHTTPSRewrites(BaseModel): +class ZoneSettingAutomaticHTTPSRewrites(BaseModel): id: Literal["automatic_https_rewrites"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_automatic_https_rewrites_param.py b/src/cloudflare/types/zones/settings/zone_setting_automatic_https_rewrites_param.py similarity index 74% rename from src/cloudflare/types/zones/settings/zones_automatic_https_rewrites_param.py rename to src/cloudflare/types/zones/settings/zone_setting_automatic_https_rewrites_param.py index 67d889ce6f2..dada4f53714 100644 --- a/src/cloudflare/types/zones/settings/zones_automatic_https_rewrites_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_automatic_https_rewrites_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesAutomaticHTTPSRewritesParam"] +__all__ = ["ZoneSettingAutomaticHTTPSRewritesParam"] -class ZonesAutomaticHTTPSRewritesParam(TypedDict, total=False): +class ZoneSettingAutomaticHTTPSRewritesParam(TypedDict, total=False): id: Required[Literal["automatic_https_rewrites"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_automatic_platform_optimization.py b/src/cloudflare/types/zones/settings/zone_setting_automatic_platform_optimization.py similarity index 89% rename from src/cloudflare/types/zones/settings/zones_automatic_platform_optimization.py rename to src/cloudflare/types/zones/settings/zone_setting_automatic_platform_optimization.py index 01bf45dadad..c36be435288 100644 --- a/src/cloudflare/types/zones/settings/zones_automatic_platform_optimization.py +++ b/src/cloudflare/types/zones/settings/zone_setting_automatic_platform_optimization.py @@ -4,10 +4,10 @@ from ...._models import BaseModel -__all__ = ["ZonesAutomaticPlatformOptimization"] +__all__ = ["ZoneSettingAutomaticPlatformOptimization"] -class ZonesAutomaticPlatformOptimization(BaseModel): +class ZoneSettingAutomaticPlatformOptimization(BaseModel): cache_by_device_type: bool """ Indicates whether or not diff --git a/src/cloudflare/types/zones/settings/zones_automatic_platform_optimization_param.py b/src/cloudflare/types/zones/settings/zone_setting_automatic_platform_optimization_param.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_automatic_platform_optimization_param.py rename to src/cloudflare/types/zones/settings/zone_setting_automatic_platform_optimization_param.py index 5299b7f026a..bcc686bc18d 100644 --- a/src/cloudflare/types/zones/settings/zones_automatic_platform_optimization_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_automatic_platform_optimization_param.py @@ -5,10 +5,10 @@ from typing import List from typing_extensions import Required, TypedDict -__all__ = ["ZonesAutomaticPlatformOptimizationParam"] +__all__ = ["ZoneSettingAutomaticPlatformOptimizationParam"] -class ZonesAutomaticPlatformOptimizationParam(TypedDict, total=False): +class ZoneSettingAutomaticPlatformOptimizationParam(TypedDict, total=False): cache_by_device_type: Required[bool] """ Indicates whether or not diff --git a/src/cloudflare/types/zones/settings/zones_brotli.py b/src/cloudflare/types/zones/settings/zone_setting_brotli.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_brotli.py rename to src/cloudflare/types/zones/settings/zone_setting_brotli.py index e7c8e8ec30c..6e9515ab6ef 100644 --- a/src/cloudflare/types/zones/settings/zones_brotli.py +++ b/src/cloudflare/types/zones/settings/zone_setting_brotli.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesBrotli"] +__all__ = ["ZoneSettingBrotli"] -class ZonesBrotli(BaseModel): +class ZoneSettingBrotli(BaseModel): id: Literal["brotli"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_brotli_param.py b/src/cloudflare/types/zones/settings/zone_setting_brotli_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_brotli_param.py rename to src/cloudflare/types/zones/settings/zone_setting_brotli_param.py index f969d95f43e..51031e0d3f5 100644 --- a/src/cloudflare/types/zones/settings/zones_brotli_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_brotli_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesBrotliParam"] +__all__ = ["ZoneSettingBrotliParam"] -class ZonesBrotliParam(TypedDict, total=False): +class ZoneSettingBrotliParam(TypedDict, total=False): id: Required[Literal["brotli"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_browser_cache_ttl.py b/src/cloudflare/types/zones/settings/zone_setting_browser_cache_ttl.py similarity index 92% rename from src/cloudflare/types/zones/settings/zones_browser_cache_ttl.py rename to src/cloudflare/types/zones/settings/zone_setting_browser_cache_ttl.py index 4ed37d4cbe2..6240c2511d7 100644 --- a/src/cloudflare/types/zones/settings/zones_browser_cache_ttl.py +++ b/src/cloudflare/types/zones/settings/zone_setting_browser_cache_ttl.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesBrowserCacheTTL"] +__all__ = ["ZoneSettingBrowserCacheTTL"] -class ZonesBrowserCacheTTL(BaseModel): +class ZoneSettingBrowserCacheTTL(BaseModel): id: Literal["browser_cache_ttl"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_browser_cache_ttl_param.py b/src/cloudflare/types/zones/settings/zone_setting_browser_cache_ttl_param.py similarity index 89% rename from src/cloudflare/types/zones/settings/zones_browser_cache_ttl_param.py rename to src/cloudflare/types/zones/settings/zone_setting_browser_cache_ttl_param.py index 0329f3c3a6c..e88cc4cc66a 100644 --- a/src/cloudflare/types/zones/settings/zones_browser_cache_ttl_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_browser_cache_ttl_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesBrowserCacheTTLParam"] +__all__ = ["ZoneSettingBrowserCacheTTLParam"] -class ZonesBrowserCacheTTLParam(TypedDict, total=False): +class ZoneSettingBrowserCacheTTLParam(TypedDict, total=False): id: Required[Literal["browser_cache_ttl"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_browser_check.py b/src/cloudflare/types/zones/settings/zone_setting_browser_check.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_browser_check.py rename to src/cloudflare/types/zones/settings/zone_setting_browser_check.py index c11d1fd72c3..b02ced91ce1 100644 --- a/src/cloudflare/types/zones/settings/zones_browser_check.py +++ b/src/cloudflare/types/zones/settings/zone_setting_browser_check.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesBrowserCheck"] +__all__ = ["ZoneSettingBrowserCheck"] -class ZonesBrowserCheck(BaseModel): +class ZoneSettingBrowserCheck(BaseModel): id: Literal["browser_check"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_browser_check_param.py b/src/cloudflare/types/zones/settings/zone_setting_browser_check_param.py similarity index 77% rename from src/cloudflare/types/zones/settings/zones_browser_check_param.py rename to src/cloudflare/types/zones/settings/zone_setting_browser_check_param.py index f86e1c56c96..5a6c5f3f209 100644 --- a/src/cloudflare/types/zones/settings/zones_browser_check_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_browser_check_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesBrowserCheckParam"] +__all__ = ["ZoneSettingBrowserCheckParam"] -class ZonesBrowserCheckParam(TypedDict, total=False): +class ZoneSettingBrowserCheckParam(TypedDict, total=False): id: Required[Literal["browser_check"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_buffering.py b/src/cloudflare/types/zones/settings/zone_setting_buffering.py similarity index 89% rename from src/cloudflare/types/zones/settings/zones_buffering.py rename to src/cloudflare/types/zones/settings/zone_setting_buffering.py index 91249cb1894..6f7ba2ca4ab 100644 --- a/src/cloudflare/types/zones/settings/zones_buffering.py +++ b/src/cloudflare/types/zones/settings/zone_setting_buffering.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesBuffering"] +__all__ = ["ZoneSettingBuffering"] -class ZonesBuffering(BaseModel): +class ZoneSettingBuffering(BaseModel): id: Literal["response_buffering"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_buffering_param.py b/src/cloudflare/types/zones/settings/zone_setting_buffering_param.py similarity index 78% rename from src/cloudflare/types/zones/settings/zones_buffering_param.py rename to src/cloudflare/types/zones/settings/zone_setting_buffering_param.py index 24396823911..17a385a19a4 100644 --- a/src/cloudflare/types/zones/settings/zones_buffering_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_buffering_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesBufferingParam"] +__all__ = ["ZoneSettingBufferingParam"] -class ZonesBufferingParam(TypedDict, total=False): +class ZoneSettingBufferingParam(TypedDict, total=False): id: Required[Literal["response_buffering"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_cache_level.py b/src/cloudflare/types/zones/settings/zone_setting_cache_level.py similarity index 89% rename from src/cloudflare/types/zones/settings/zones_cache_level.py rename to src/cloudflare/types/zones/settings/zone_setting_cache_level.py index 6d48f8edd4f..fd9f1bd0a14 100644 --- a/src/cloudflare/types/zones/settings/zones_cache_level.py +++ b/src/cloudflare/types/zones/settings/zone_setting_cache_level.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesCacheLevel"] +__all__ = ["ZoneSettingCacheLevel"] -class ZonesCacheLevel(BaseModel): +class ZoneSettingCacheLevel(BaseModel): id: Literal["cache_level"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_cache_level_param.py b/src/cloudflare/types/zones/settings/zone_setting_cache_level_param.py similarity index 78% rename from src/cloudflare/types/zones/settings/zones_cache_level_param.py rename to src/cloudflare/types/zones/settings/zone_setting_cache_level_param.py index 1f6fe4f1004..7261291c5cd 100644 --- a/src/cloudflare/types/zones/settings/zones_cache_level_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_cache_level_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesCacheLevelParam"] +__all__ = ["ZoneSettingCacheLevelParam"] -class ZonesCacheLevelParam(TypedDict, total=False): +class ZoneSettingCacheLevelParam(TypedDict, total=False): id: Required[Literal["cache_level"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_challenge_ttl.py b/src/cloudflare/types/zones/settings/zone_setting_challenge_ttl.py similarity index 89% rename from src/cloudflare/types/zones/settings/zones_challenge_ttl.py rename to src/cloudflare/types/zones/settings/zone_setting_challenge_ttl.py index 5c392dd4dc2..b803bef9eb8 100644 --- a/src/cloudflare/types/zones/settings/zones_challenge_ttl.py +++ b/src/cloudflare/types/zones/settings/zone_setting_challenge_ttl.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesChallengeTTL"] +__all__ = ["ZoneSettingChallengeTTL"] -class ZonesChallengeTTL(BaseModel): +class ZoneSettingChallengeTTL(BaseModel): id: Literal["challenge_ttl"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_challenge_ttl_param.py b/src/cloudflare/types/zones/settings/zone_setting_challenge_ttl_param.py similarity index 81% rename from src/cloudflare/types/zones/settings/zones_challenge_ttl_param.py rename to src/cloudflare/types/zones/settings/zone_setting_challenge_ttl_param.py index ff22be6c3a7..0c04152a21d 100644 --- a/src/cloudflare/types/zones/settings/zones_challenge_ttl_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_challenge_ttl_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesChallengeTTLParam"] +__all__ = ["ZoneSettingChallengeTTLParam"] -class ZonesChallengeTTLParam(TypedDict, total=False): +class ZoneSettingChallengeTTLParam(TypedDict, total=False): id: Required[Literal["challenge_ttl"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_ciphers.py b/src/cloudflare/types/zones/settings/zone_setting_ciphers.py similarity index 89% rename from src/cloudflare/types/zones/settings/zones_ciphers.py rename to src/cloudflare/types/zones/settings/zone_setting_ciphers.py index b95a21968cc..7c3d9c9f847 100644 --- a/src/cloudflare/types/zones/settings/zones_ciphers.py +++ b/src/cloudflare/types/zones/settings/zone_setting_ciphers.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesCiphers"] +__all__ = ["ZoneSettingCiphers"] -class ZonesCiphers(BaseModel): +class ZoneSettingCiphers(BaseModel): id: Literal["ciphers"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_ciphers_param.py b/src/cloudflare/types/zones/settings/zone_setting_ciphers_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_ciphers_param.py rename to src/cloudflare/types/zones/settings/zone_setting_ciphers_param.py index 75f252e20a8..4e2c4b1dc5c 100644 --- a/src/cloudflare/types/zones/settings/zones_ciphers_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_ciphers_param.py @@ -5,10 +5,10 @@ from typing import List from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesCiphersParam"] +__all__ = ["ZoneSettingCiphersParam"] -class ZonesCiphersParam(TypedDict, total=False): +class ZoneSettingCiphersParam(TypedDict, total=False): id: Required[Literal["ciphers"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_development_mode.py b/src/cloudflare/types/zones/settings/zone_setting_development_mode.py similarity index 91% rename from src/cloudflare/types/zones/settings/zones_development_mode.py rename to src/cloudflare/types/zones/settings/zone_setting_development_mode.py index 3677be06180..74e2376535d 100644 --- a/src/cloudflare/types/zones/settings/zones_development_mode.py +++ b/src/cloudflare/types/zones/settings/zone_setting_development_mode.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesDevelopmentMode"] +__all__ = ["ZoneSettingDevelopmentMode"] -class ZonesDevelopmentMode(BaseModel): +class ZoneSettingDevelopmentMode(BaseModel): id: Literal["development_mode"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_development_mode_param.py b/src/cloudflare/types/zones/settings/zone_setting_development_mode_param.py similarity index 76% rename from src/cloudflare/types/zones/settings/zones_development_mode_param.py rename to src/cloudflare/types/zones/settings/zone_setting_development_mode_param.py index 5ec93e3bf66..d19a68448db 100644 --- a/src/cloudflare/types/zones/settings/zones_development_mode_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_development_mode_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesDevelopmentModeParam"] +__all__ = ["ZoneSettingDevelopmentModeParam"] -class ZonesDevelopmentModeParam(TypedDict, total=False): +class ZoneSettingDevelopmentModeParam(TypedDict, total=False): id: Required[Literal["development_mode"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_early_hints.py b/src/cloudflare/types/zones/settings/zone_setting_early_hints.py similarity index 89% rename from src/cloudflare/types/zones/settings/zones_early_hints.py rename to src/cloudflare/types/zones/settings/zone_setting_early_hints.py index dbde84c5c51..81ec9c31569 100644 --- a/src/cloudflare/types/zones/settings/zones_early_hints.py +++ b/src/cloudflare/types/zones/settings/zone_setting_early_hints.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesEarlyHints"] +__all__ = ["ZoneSettingEarlyHints"] -class ZonesEarlyHints(BaseModel): +class ZoneSettingEarlyHints(BaseModel): id: Literal["early_hints"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_early_hints_param.py b/src/cloudflare/types/zones/settings/zone_setting_early_hints_param.py similarity index 77% rename from src/cloudflare/types/zones/settings/zones_early_hints_param.py rename to src/cloudflare/types/zones/settings/zone_setting_early_hints_param.py index 7eb1cb6f2d6..fef3800eda5 100644 --- a/src/cloudflare/types/zones/settings/zones_early_hints_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_early_hints_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesEarlyHintsParam"] +__all__ = ["ZoneSettingEarlyHintsParam"] -class ZonesEarlyHintsParam(TypedDict, total=False): +class ZoneSettingEarlyHintsParam(TypedDict, total=False): id: Required[Literal["early_hints"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_email_obfuscation.py b/src/cloudflare/types/zones/settings/zone_setting_email_obfuscation.py similarity index 87% rename from src/cloudflare/types/zones/settings/zones_email_obfuscation.py rename to src/cloudflare/types/zones/settings/zone_setting_email_obfuscation.py index 933ead7c01f..a30cea80c8f 100644 --- a/src/cloudflare/types/zones/settings/zones_email_obfuscation.py +++ b/src/cloudflare/types/zones/settings/zone_setting_email_obfuscation.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesEmailObfuscation"] +__all__ = ["ZoneSettingEmailObfuscation"] -class ZonesEmailObfuscation(BaseModel): +class ZoneSettingEmailObfuscation(BaseModel): id: Literal["email_obfuscation"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_email_obfuscation_param.py b/src/cloudflare/types/zones/settings/zone_setting_email_obfuscation_param.py similarity index 76% rename from src/cloudflare/types/zones/settings/zones_email_obfuscation_param.py rename to src/cloudflare/types/zones/settings/zone_setting_email_obfuscation_param.py index 61f4e1782ef..e8a3899b8ba 100644 --- a/src/cloudflare/types/zones/settings/zones_email_obfuscation_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_email_obfuscation_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesEmailObfuscationParam"] +__all__ = ["ZoneSettingEmailObfuscationParam"] -class ZonesEmailObfuscationParam(TypedDict, total=False): +class ZoneSettingEmailObfuscationParam(TypedDict, total=False): id: Required[Literal["email_obfuscation"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/speed_cloudflare_fonts.py b/src/cloudflare/types/zones/settings/zone_setting_fonts.py similarity index 89% rename from src/cloudflare/types/zones/settings/speed_cloudflare_fonts.py rename to src/cloudflare/types/zones/settings/zone_setting_fonts.py index f3eeac5c7fd..4463cc08a78 100644 --- a/src/cloudflare/types/zones/settings/speed_cloudflare_fonts.py +++ b/src/cloudflare/types/zones/settings/zone_setting_fonts.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["SpeedCloudflareFonts"] +__all__ = ["ZoneSettingFonts"] -class SpeedCloudflareFonts(BaseModel): +class ZoneSettingFonts(BaseModel): id: Literal["fonts"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_h2_prioritization.py b/src/cloudflare/types/zones/settings/zone_setting_h2_prioritization.py similarity index 87% rename from src/cloudflare/types/zones/settings/zones_h2_prioritization.py rename to src/cloudflare/types/zones/settings/zone_setting_h2_prioritization.py index 9c3e6dfade5..4c457096b37 100644 --- a/src/cloudflare/types/zones/settings/zones_h2_prioritization.py +++ b/src/cloudflare/types/zones/settings/zone_setting_h2_prioritization.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesH2Prioritization"] +__all__ = ["ZoneSettingH2Prioritization"] -class ZonesH2Prioritization(BaseModel): +class ZoneSettingH2Prioritization(BaseModel): id: Literal["h2_prioritization"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_h2_prioritization_param.py b/src/cloudflare/types/zones/settings/zone_setting_h2_prioritization_param.py similarity index 76% rename from src/cloudflare/types/zones/settings/zones_h2_prioritization_param.py rename to src/cloudflare/types/zones/settings/zone_setting_h2_prioritization_param.py index 7761b977355..5d20c404271 100644 --- a/src/cloudflare/types/zones/settings/zones_h2_prioritization_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_h2_prioritization_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesH2PrioritizationParam"] +__all__ = ["ZoneSettingH2PrioritizationParam"] -class ZonesH2PrioritizationParam(TypedDict, total=False): +class ZoneSettingH2PrioritizationParam(TypedDict, total=False): id: Required[Literal["h2_prioritization"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_hotlink_protection.py b/src/cloudflare/types/zones/settings/zone_setting_hotlink_protection.py similarity index 87% rename from src/cloudflare/types/zones/settings/zones_hotlink_protection.py rename to src/cloudflare/types/zones/settings/zone_setting_hotlink_protection.py index 7a3fa7e6158..1046ff6e793 100644 --- a/src/cloudflare/types/zones/settings/zones_hotlink_protection.py +++ b/src/cloudflare/types/zones/settings/zone_setting_hotlink_protection.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesHotlinkProtection"] +__all__ = ["ZoneSettingHotlinkProtection"] -class ZonesHotlinkProtection(BaseModel): +class ZoneSettingHotlinkProtection(BaseModel): id: Literal["hotlink_protection"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_hotlink_protection_param.py b/src/cloudflare/types/zones/settings/zone_setting_hotlink_protection_param.py similarity index 75% rename from src/cloudflare/types/zones/settings/zones_hotlink_protection_param.py rename to src/cloudflare/types/zones/settings/zone_setting_hotlink_protection_param.py index 18e020ee77d..72c5f4d95a3 100644 --- a/src/cloudflare/types/zones/settings/zones_hotlink_protection_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_hotlink_protection_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesHotlinkProtectionParam"] +__all__ = ["ZoneSettingHotlinkProtectionParam"] -class ZonesHotlinkProtectionParam(TypedDict, total=False): +class ZoneSettingHotlinkProtectionParam(TypedDict, total=False): id: Required[Literal["hotlink_protection"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_http2.py b/src/cloudflare/types/zones/settings/zone_setting_http2.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_http2.py rename to src/cloudflare/types/zones/settings/zone_setting_http2.py index fd0987f0d58..5a5de9d13e8 100644 --- a/src/cloudflare/types/zones/settings/zones_http2.py +++ b/src/cloudflare/types/zones/settings/zone_setting_http2.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesHTTP2"] +__all__ = ["ZoneSettingHTTP2"] -class ZonesHTTP2(BaseModel): +class ZoneSettingHTTP2(BaseModel): id: Literal["http2"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_http2_param.py b/src/cloudflare/types/zones/settings/zone_setting_http2_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_http2_param.py rename to src/cloudflare/types/zones/settings/zone_setting_http2_param.py index b628398267d..d50fcd3b769 100644 --- a/src/cloudflare/types/zones/settings/zones_http2_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_http2_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesHTTP2Param"] +__all__ = ["ZoneSettingHTTP2Param"] -class ZonesHTTP2Param(TypedDict, total=False): +class ZoneSettingHTTP2Param(TypedDict, total=False): id: Required[Literal["http2"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_http3.py b/src/cloudflare/types/zones/settings/zone_setting_http3.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_http3.py rename to src/cloudflare/types/zones/settings/zone_setting_http3.py index 780b43baa72..2de87134547 100644 --- a/src/cloudflare/types/zones/settings/zones_http3.py +++ b/src/cloudflare/types/zones/settings/zone_setting_http3.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesHTTP3"] +__all__ = ["ZoneSettingHTTP3"] -class ZonesHTTP3(BaseModel): +class ZoneSettingHTTP3(BaseModel): id: Literal["http3"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_http3_param.py b/src/cloudflare/types/zones/settings/zone_setting_http3_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_http3_param.py rename to src/cloudflare/types/zones/settings/zone_setting_http3_param.py index 1e8f4a27888..04c78da68c7 100644 --- a/src/cloudflare/types/zones/settings/zones_http3_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_http3_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesHTTP3Param"] +__all__ = ["ZoneSettingHTTP3Param"] -class ZonesHTTP3Param(TypedDict, total=False): +class ZoneSettingHTTP3Param(TypedDict, total=False): id: Required[Literal["http3"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_image_resizing.py b/src/cloudflare/types/zones/settings/zone_setting_image_resizing.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_image_resizing.py rename to src/cloudflare/types/zones/settings/zone_setting_image_resizing.py index a8e0650a6cf..1454491319c 100644 --- a/src/cloudflare/types/zones/settings/zones_image_resizing.py +++ b/src/cloudflare/types/zones/settings/zone_setting_image_resizing.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesImageResizing"] +__all__ = ["ZoneSettingImageResizing"] -class ZonesImageResizing(BaseModel): +class ZoneSettingImageResizing(BaseModel): id: Literal["image_resizing"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_image_resizing_param.py b/src/cloudflare/types/zones/settings/zone_setting_image_resizing_param.py similarity index 77% rename from src/cloudflare/types/zones/settings/zones_image_resizing_param.py rename to src/cloudflare/types/zones/settings/zone_setting_image_resizing_param.py index 0efd7071120..6de5628ebda 100644 --- a/src/cloudflare/types/zones/settings/zones_image_resizing_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_image_resizing_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesImageResizingParam"] +__all__ = ["ZoneSettingImageResizingParam"] -class ZonesImageResizingParam(TypedDict, total=False): +class ZoneSettingImageResizingParam(TypedDict, total=False): id: Required[Literal["image_resizing"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_ip_geolocation.py b/src/cloudflare/types/zones/settings/zone_setting_ip_geolocation.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_ip_geolocation.py rename to src/cloudflare/types/zones/settings/zone_setting_ip_geolocation.py index f8d11224270..f0d8e581b00 100644 --- a/src/cloudflare/types/zones/settings/zones_ip_geolocation.py +++ b/src/cloudflare/types/zones/settings/zone_setting_ip_geolocation.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesIPGeolocation"] +__all__ = ["ZoneSettingIPGeolocation"] -class ZonesIPGeolocation(BaseModel): +class ZoneSettingIPGeolocation(BaseModel): id: Literal["ip_geolocation"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_ip_geolocation_param.py b/src/cloudflare/types/zones/settings/zone_setting_ip_geolocation_param.py similarity index 76% rename from src/cloudflare/types/zones/settings/zones_ip_geolocation_param.py rename to src/cloudflare/types/zones/settings/zone_setting_ip_geolocation_param.py index 088f1583c3c..083c1db940e 100644 --- a/src/cloudflare/types/zones/settings/zones_ip_geolocation_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_ip_geolocation_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesIPGeolocationParam"] +__all__ = ["ZoneSettingIPGeolocationParam"] -class ZonesIPGeolocationParam(TypedDict, total=False): +class ZoneSettingIPGeolocationParam(TypedDict, total=False): id: Required[Literal["ip_geolocation"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_ipv6.py b/src/cloudflare/types/zones/settings/zone_setting_ipv6.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_ipv6.py rename to src/cloudflare/types/zones/settings/zone_setting_ipv6.py index a9ce8f4157d..a2cf8a358b4 100644 --- a/src/cloudflare/types/zones/settings/zones_ipv6.py +++ b/src/cloudflare/types/zones/settings/zone_setting_ipv6.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesIPV6"] +__all__ = ["ZoneSettingIPV6"] -class ZonesIPV6(BaseModel): +class ZoneSettingIPV6(BaseModel): id: Literal["ipv6"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_ipv6_param.py b/src/cloudflare/types/zones/settings/zone_setting_ipv6_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_ipv6_param.py rename to src/cloudflare/types/zones/settings/zone_setting_ipv6_param.py index 1afb5467e5f..4053b7bff06 100644 --- a/src/cloudflare/types/zones/settings/zones_ipv6_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_ipv6_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesIPV6Param"] +__all__ = ["ZoneSettingIPV6Param"] -class ZonesIPV6Param(TypedDict, total=False): +class ZoneSettingIPV6Param(TypedDict, total=False): id: Required[Literal["ipv6"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_min_tls_version.py b/src/cloudflare/types/zones/settings/zone_setting_min_tls_version.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_min_tls_version.py rename to src/cloudflare/types/zones/settings/zone_setting_min_tls_version.py index 5d62002bb33..67facc86e08 100644 --- a/src/cloudflare/types/zones/settings/zones_min_tls_version.py +++ b/src/cloudflare/types/zones/settings/zone_setting_min_tls_version.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesMinTLSVersion"] +__all__ = ["ZoneSettingMinTLSVersion"] -class ZonesMinTLSVersion(BaseModel): +class ZoneSettingMinTLSVersion(BaseModel): id: Literal["min_tls_version"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_min_tls_version_param.py b/src/cloudflare/types/zones/settings/zone_setting_min_tls_version_param.py similarity index 77% rename from src/cloudflare/types/zones/settings/zones_min_tls_version_param.py rename to src/cloudflare/types/zones/settings/zone_setting_min_tls_version_param.py index 8e7049348f2..e7cf1d38f71 100644 --- a/src/cloudflare/types/zones/settings/zones_min_tls_version_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_min_tls_version_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesMinTLSVersionParam"] +__all__ = ["ZoneSettingMinTLSVersionParam"] -class ZonesMinTLSVersionParam(TypedDict, total=False): +class ZoneSettingMinTLSVersionParam(TypedDict, total=False): id: Required[Literal["min_tls_version"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_minify.py b/src/cloudflare/types/zones/settings/zone_setting_minify.py similarity index 92% rename from src/cloudflare/types/zones/settings/zones_minify.py rename to src/cloudflare/types/zones/settings/zone_setting_minify.py index ff5e269a0a3..efb415b7712 100644 --- a/src/cloudflare/types/zones/settings/zones_minify.py +++ b/src/cloudflare/types/zones/settings/zone_setting_minify.py @@ -6,7 +6,7 @@ from ...._models import BaseModel -__all__ = ["ZonesMinify", "Value"] +__all__ = ["ZoneSettingMinify", "Value"] class Value(BaseModel): @@ -20,7 +20,7 @@ class Value(BaseModel): """Automatically minify all JavaScript files for your website.""" -class ZonesMinify(BaseModel): +class ZoneSettingMinify(BaseModel): id: Literal["minify"] """Zone setting identifier.""" diff --git a/src/cloudflare/types/zones/settings/zones_minify_param.py b/src/cloudflare/types/zones/settings/zone_setting_minify_param.py similarity index 86% rename from src/cloudflare/types/zones/settings/zones_minify_param.py rename to src/cloudflare/types/zones/settings/zone_setting_minify_param.py index 0479da834f8..f812a1d9ca4 100644 --- a/src/cloudflare/types/zones/settings/zones_minify_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_minify_param.py @@ -4,7 +4,7 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesMinifyParam", "Value"] +__all__ = ["ZoneSettingMinifyParam", "Value"] class Value(TypedDict, total=False): @@ -18,7 +18,7 @@ class Value(TypedDict, total=False): """Automatically minify all JavaScript files for your website.""" -class ZonesMinifyParam(TypedDict, total=False): +class ZoneSettingMinifyParam(TypedDict, total=False): id: Required[Literal["minify"]] """Zone setting identifier.""" diff --git a/src/cloudflare/types/zones/settings/zones_mirage.py b/src/cloudflare/types/zones/settings/zone_setting_mirage.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_mirage.py rename to src/cloudflare/types/zones/settings/zone_setting_mirage.py index d7b5f685ade..f6d62586f93 100644 --- a/src/cloudflare/types/zones/settings/zones_mirage.py +++ b/src/cloudflare/types/zones/settings/zone_setting_mirage.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesMirage"] +__all__ = ["ZoneSettingMirage"] -class ZonesMirage(BaseModel): +class ZoneSettingMirage(BaseModel): id: Literal["mirage"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_mirage_param.py b/src/cloudflare/types/zones/settings/zone_setting_mirage_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_mirage_param.py rename to src/cloudflare/types/zones/settings/zone_setting_mirage_param.py index 07d9e79bbc8..6a35c1a6510 100644 --- a/src/cloudflare/types/zones/settings/zones_mirage_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_mirage_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesMirageParam"] +__all__ = ["ZoneSettingMirageParam"] -class ZonesMirageParam(TypedDict, total=False): +class ZoneSettingMirageParam(TypedDict, total=False): id: Required[Literal["mirage"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_mobile_redirect.py b/src/cloudflare/types/zones/settings/zone_setting_mobile_redirect.py similarity index 92% rename from src/cloudflare/types/zones/settings/zones_mobile_redirect.py rename to src/cloudflare/types/zones/settings/zone_setting_mobile_redirect.py index 139582c7810..0e2823aa806 100644 --- a/src/cloudflare/types/zones/settings/zones_mobile_redirect.py +++ b/src/cloudflare/types/zones/settings/zone_setting_mobile_redirect.py @@ -6,7 +6,7 @@ from ...._models import BaseModel -__all__ = ["ZonesMobileRedirect", "Value"] +__all__ = ["ZoneSettingMobileRedirect", "Value"] class Value(BaseModel): @@ -26,7 +26,7 @@ class Value(BaseModel): """ -class ZonesMobileRedirect(BaseModel): +class ZoneSettingMobileRedirect(BaseModel): id: Literal["mobile_redirect"] """Identifier of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_mobile_redirect_param.py b/src/cloudflare/types/zones/settings/zone_setting_mobile_redirect_param.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_mobile_redirect_param.py rename to src/cloudflare/types/zones/settings/zone_setting_mobile_redirect_param.py index 4a7b0413803..dd412e92ad5 100644 --- a/src/cloudflare/types/zones/settings/zones_mobile_redirect_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_mobile_redirect_param.py @@ -5,7 +5,7 @@ from typing import Optional from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesMobileRedirectParam", "Value"] +__all__ = ["ZoneSettingMobileRedirectParam", "Value"] class Value(TypedDict, total=False): @@ -25,7 +25,7 @@ class Value(TypedDict, total=False): """ -class ZonesMobileRedirectParam(TypedDict, total=False): +class ZoneSettingMobileRedirectParam(TypedDict, total=False): id: Required[Literal["mobile_redirect"]] """Identifier of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_nel.py b/src/cloudflare/types/zones/settings/zone_setting_nel.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_nel.py rename to src/cloudflare/types/zones/settings/zone_setting_nel.py index de6ea5122c9..949c3684977 100644 --- a/src/cloudflare/types/zones/settings/zones_nel.py +++ b/src/cloudflare/types/zones/settings/zone_setting_nel.py @@ -6,14 +6,14 @@ from ...._models import BaseModel -__all__ = ["ZonesNEL", "Value"] +__all__ = ["ZoneSettingNEL", "Value"] class Value(BaseModel): enabled: Optional[bool] = None -class ZonesNEL(BaseModel): +class ZoneSettingNEL(BaseModel): id: Literal["nel"] """Zone setting identifier.""" diff --git a/src/cloudflare/types/zones/settings/zones_nel_param.py b/src/cloudflare/types/zones/settings/zone_setting_nel_param.py similarity index 80% rename from src/cloudflare/types/zones/settings/zones_nel_param.py rename to src/cloudflare/types/zones/settings/zone_setting_nel_param.py index 2ce99f4e797..863351497d8 100644 --- a/src/cloudflare/types/zones/settings/zones_nel_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_nel_param.py @@ -4,14 +4,14 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesNELParam", "Value"] +__all__ = ["ZoneSettingNELParam", "Value"] class Value(TypedDict, total=False): enabled: bool -class ZonesNELParam(TypedDict, total=False): +class ZoneSettingNELParam(TypedDict, total=False): id: Required[Literal["nel"]] """Zone setting identifier.""" diff --git a/src/cloudflare/types/zones/settings/zones_opportunistic_encryption.py b/src/cloudflare/types/zones/settings/zone_setting_opportunistic_encryption.py similarity index 86% rename from src/cloudflare/types/zones/settings/zones_opportunistic_encryption.py rename to src/cloudflare/types/zones/settings/zone_setting_opportunistic_encryption.py index 784988e5bea..2f3f067df9c 100644 --- a/src/cloudflare/types/zones/settings/zones_opportunistic_encryption.py +++ b/src/cloudflare/types/zones/settings/zone_setting_opportunistic_encryption.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesOpportunisticEncryption"] +__all__ = ["ZoneSettingOpportunisticEncryption"] -class ZonesOpportunisticEncryption(BaseModel): +class ZoneSettingOpportunisticEncryption(BaseModel): id: Literal["opportunistic_encryption"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_opportunistic_encryption_param.py b/src/cloudflare/types/zones/settings/zone_setting_opportunistic_encryption_param.py similarity index 74% rename from src/cloudflare/types/zones/settings/zones_opportunistic_encryption_param.py rename to src/cloudflare/types/zones/settings/zone_setting_opportunistic_encryption_param.py index 33a68571fc2..5d54e34433c 100644 --- a/src/cloudflare/types/zones/settings/zones_opportunistic_encryption_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_opportunistic_encryption_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesOpportunisticEncryptionParam"] +__all__ = ["ZoneSettingOpportunisticEncryptionParam"] -class ZonesOpportunisticEncryptionParam(TypedDict, total=False): +class ZoneSettingOpportunisticEncryptionParam(TypedDict, total=False): id: Required[Literal["opportunistic_encryption"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_opportunistic_onion.py b/src/cloudflare/types/zones/settings/zone_setting_opportunistic_onion.py similarity index 87% rename from src/cloudflare/types/zones/settings/zones_opportunistic_onion.py rename to src/cloudflare/types/zones/settings/zone_setting_opportunistic_onion.py index fa6f90dc006..224a12945cb 100644 --- a/src/cloudflare/types/zones/settings/zones_opportunistic_onion.py +++ b/src/cloudflare/types/zones/settings/zone_setting_opportunistic_onion.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesOpportunisticOnion"] +__all__ = ["ZoneSettingOpportunisticOnion"] -class ZonesOpportunisticOnion(BaseModel): +class ZoneSettingOpportunisticOnion(BaseModel): id: Literal["opportunistic_onion"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_opportunistic_onion_param.py b/src/cloudflare/types/zones/settings/zone_setting_opportunistic_onion_param.py similarity index 75% rename from src/cloudflare/types/zones/settings/zones_opportunistic_onion_param.py rename to src/cloudflare/types/zones/settings/zone_setting_opportunistic_onion_param.py index 01a208a4fde..4d20469de98 100644 --- a/src/cloudflare/types/zones/settings/zones_opportunistic_onion_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_opportunistic_onion_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesOpportunisticOnionParam"] +__all__ = ["ZoneSettingOpportunisticOnionParam"] -class ZonesOpportunisticOnionParam(TypedDict, total=False): +class ZoneSettingOpportunisticOnionParam(TypedDict, total=False): id: Required[Literal["opportunistic_onion"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_orange_to_orange.py b/src/cloudflare/types/zones/settings/zone_setting_orange_to_orange.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_orange_to_orange.py rename to src/cloudflare/types/zones/settings/zone_setting_orange_to_orange.py index 2ab0a43c88a..1f0912d04bd 100644 --- a/src/cloudflare/types/zones/settings/zones_orange_to_orange.py +++ b/src/cloudflare/types/zones/settings/zone_setting_orange_to_orange.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesOrangeToOrange"] +__all__ = ["ZoneSettingOrangeToOrange"] -class ZonesOrangeToOrange(BaseModel): +class ZoneSettingOrangeToOrange(BaseModel): id: Literal["orange_to_orange"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_orange_to_orange_param.py b/src/cloudflare/types/zones/settings/zone_setting_orange_to_orange_param.py similarity index 76% rename from src/cloudflare/types/zones/settings/zones_orange_to_orange_param.py rename to src/cloudflare/types/zones/settings/zone_setting_orange_to_orange_param.py index 17ebed4d031..4628db5b90d 100644 --- a/src/cloudflare/types/zones/settings/zones_orange_to_orange_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_orange_to_orange_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesOrangeToOrangeParam"] +__all__ = ["ZoneSettingOrangeToOrangeParam"] -class ZonesOrangeToOrangeParam(TypedDict, total=False): +class ZoneSettingOrangeToOrangeParam(TypedDict, total=False): id: Required[Literal["orange_to_orange"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_origin_error_page_pass_thru.py b/src/cloudflare/types/zones/settings/zone_setting_origin_error_page_pass_thru.py similarity index 86% rename from src/cloudflare/types/zones/settings/zones_origin_error_page_pass_thru.py rename to src/cloudflare/types/zones/settings/zone_setting_origin_error_page_pass_thru.py index 493909a31b6..47751d84e3a 100644 --- a/src/cloudflare/types/zones/settings/zones_origin_error_page_pass_thru.py +++ b/src/cloudflare/types/zones/settings/zone_setting_origin_error_page_pass_thru.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesOriginErrorPagePassThru"] +__all__ = ["ZoneSettingOriginErrorPagePassThru"] -class ZonesOriginErrorPagePassThru(BaseModel): +class ZoneSettingOriginErrorPagePassThru(BaseModel): id: Literal["origin_error_page_pass_thru"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_origin_error_page_pass_thru_param.py b/src/cloudflare/types/zones/settings/zone_setting_origin_error_page_pass_thru_param.py similarity index 74% rename from src/cloudflare/types/zones/settings/zones_origin_error_page_pass_thru_param.py rename to src/cloudflare/types/zones/settings/zone_setting_origin_error_page_pass_thru_param.py index bb10a5440df..b78f43e801a 100644 --- a/src/cloudflare/types/zones/settings/zones_origin_error_page_pass_thru_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_origin_error_page_pass_thru_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesOriginErrorPagePassThruParam"] +__all__ = ["ZoneSettingOriginErrorPagePassThruParam"] -class ZonesOriginErrorPagePassThruParam(TypedDict, total=False): +class ZoneSettingOriginErrorPagePassThruParam(TypedDict, total=False): id: Required[Literal["origin_error_page_pass_thru"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_polish.py b/src/cloudflare/types/zones/settings/zone_setting_polish.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_polish.py rename to src/cloudflare/types/zones/settings/zone_setting_polish.py index c774514fd7e..f3209e0bd7d 100644 --- a/src/cloudflare/types/zones/settings/zones_polish.py +++ b/src/cloudflare/types/zones/settings/zone_setting_polish.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesPolish"] +__all__ = ["ZoneSettingPolish"] -class ZonesPolish(BaseModel): +class ZoneSettingPolish(BaseModel): id: Literal["polish"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_polish_param.py b/src/cloudflare/types/zones/settings/zone_setting_polish_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_polish_param.py rename to src/cloudflare/types/zones/settings/zone_setting_polish_param.py index eea0a562af4..5b66bb60ac3 100644 --- a/src/cloudflare/types/zones/settings/zones_polish_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_polish_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesPolishParam"] +__all__ = ["ZoneSettingPolishParam"] -class ZonesPolishParam(TypedDict, total=False): +class ZoneSettingPolishParam(TypedDict, total=False): id: Required[Literal["polish"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_prefetch_preload.py b/src/cloudflare/types/zones/settings/zone_setting_prefetch_preload.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_prefetch_preload.py rename to src/cloudflare/types/zones/settings/zone_setting_prefetch_preload.py index 5d91d0ed562..a92fe806ecd 100644 --- a/src/cloudflare/types/zones/settings/zones_prefetch_preload.py +++ b/src/cloudflare/types/zones/settings/zone_setting_prefetch_preload.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesPrefetchPreload"] +__all__ = ["ZoneSettingPrefetchPreload"] -class ZonesPrefetchPreload(BaseModel): +class ZoneSettingPrefetchPreload(BaseModel): id: Literal["prefetch_preload"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_prefetch_preload_param.py b/src/cloudflare/types/zones/settings/zone_setting_prefetch_preload_param.py similarity index 76% rename from src/cloudflare/types/zones/settings/zones_prefetch_preload_param.py rename to src/cloudflare/types/zones/settings/zone_setting_prefetch_preload_param.py index 69df9d466e9..4588c815a34 100644 --- a/src/cloudflare/types/zones/settings/zones_prefetch_preload_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_prefetch_preload_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesPrefetchPreloadParam"] +__all__ = ["ZoneSettingPrefetchPreloadParam"] -class ZonesPrefetchPreloadParam(TypedDict, total=False): +class ZoneSettingPrefetchPreloadParam(TypedDict, total=False): id: Required[Literal["prefetch_preload"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_proxy_read_timeout.py b/src/cloudflare/types/zones/settings/zone_setting_proxy_read_timeout.py similarity index 87% rename from src/cloudflare/types/zones/settings/zones_proxy_read_timeout.py rename to src/cloudflare/types/zones/settings/zone_setting_proxy_read_timeout.py index a2b5bddb243..ab9f562a168 100644 --- a/src/cloudflare/types/zones/settings/zones_proxy_read_timeout.py +++ b/src/cloudflare/types/zones/settings/zone_setting_proxy_read_timeout.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesProxyReadTimeout"] +__all__ = ["ZoneSettingProxyReadTimeout"] -class ZonesProxyReadTimeout(BaseModel): +class ZoneSettingProxyReadTimeout(BaseModel): id: Literal["proxy_read_timeout"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_proxy_read_timeout_param.py b/src/cloudflare/types/zones/settings/zone_setting_proxy_read_timeout_param.py similarity index 75% rename from src/cloudflare/types/zones/settings/zones_proxy_read_timeout_param.py rename to src/cloudflare/types/zones/settings/zone_setting_proxy_read_timeout_param.py index 57eb6ca02e9..a555a87da22 100644 --- a/src/cloudflare/types/zones/settings/zones_proxy_read_timeout_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_proxy_read_timeout_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesProxyReadTimeoutParam"] +__all__ = ["ZoneSettingProxyReadTimeoutParam"] -class ZonesProxyReadTimeoutParam(TypedDict, total=False): +class ZoneSettingProxyReadTimeoutParam(TypedDict, total=False): id: Required[Literal["proxy_read_timeout"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_pseudo_ipv4.py b/src/cloudflare/types/zones/settings/zone_setting_pseudo_ipv4.py similarity index 89% rename from src/cloudflare/types/zones/settings/zones_pseudo_ipv4.py rename to src/cloudflare/types/zones/settings/zone_setting_pseudo_ipv4.py index 8ee14b2c64b..81e5172f55a 100644 --- a/src/cloudflare/types/zones/settings/zones_pseudo_ipv4.py +++ b/src/cloudflare/types/zones/settings/zone_setting_pseudo_ipv4.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesPseudoIPV4"] +__all__ = ["ZoneSettingPseudoIPV4"] -class ZonesPseudoIPV4(BaseModel): +class ZoneSettingPseudoIPV4(BaseModel): id: Literal["pseudo_ipv4"] """Value of the Pseudo IPv4 setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_pseudo_ipv4_param.py b/src/cloudflare/types/zones/settings/zone_setting_pseudo_ipv4_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_pseudo_ipv4_param.py rename to src/cloudflare/types/zones/settings/zone_setting_pseudo_ipv4_param.py index 79f6a2d4831..947aa8bfa5d 100644 --- a/src/cloudflare/types/zones/settings/zones_pseudo_ipv4_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_pseudo_ipv4_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesPseudoIPV4Param"] +__all__ = ["ZoneSettingPseudoIPV4Param"] -class ZonesPseudoIPV4Param(TypedDict, total=False): +class ZoneSettingPseudoIPV4Param(TypedDict, total=False): id: Required[Literal["pseudo_ipv4"]] """Value of the Pseudo IPv4 setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_rocket_loader.py b/src/cloudflare/types/zones/settings/zone_setting_rocket_loader.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_rocket_loader.py rename to src/cloudflare/types/zones/settings/zone_setting_rocket_loader.py index 192e1bd7487..4d0d5404a77 100644 --- a/src/cloudflare/types/zones/settings/zones_rocket_loader.py +++ b/src/cloudflare/types/zones/settings/zone_setting_rocket_loader.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesRocketLoader"] +__all__ = ["ZoneSettingRocketLoader"] -class ZonesRocketLoader(BaseModel): +class ZoneSettingRocketLoader(BaseModel): id: Literal["rocket_loader"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_rocket_loader_param.py b/src/cloudflare/types/zones/settings/zone_setting_rocket_loader_param.py similarity index 77% rename from src/cloudflare/types/zones/settings/zones_rocket_loader_param.py rename to src/cloudflare/types/zones/settings/zone_setting_rocket_loader_param.py index b228859c2f2..deed2713e41 100644 --- a/src/cloudflare/types/zones/settings/zones_rocket_loader_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_rocket_loader_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesRocketLoaderParam"] +__all__ = ["ZoneSettingRocketLoaderParam"] -class ZonesRocketLoaderParam(TypedDict, total=False): +class ZoneSettingRocketLoaderParam(TypedDict, total=False): id: Required[Literal["rocket_loader"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_security_header.py b/src/cloudflare/types/zones/settings/zone_setting_security_header.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_security_header.py rename to src/cloudflare/types/zones/settings/zone_setting_security_header.py index 8d2a1008ec2..5da19ea926a 100644 --- a/src/cloudflare/types/zones/settings/zones_security_header.py +++ b/src/cloudflare/types/zones/settings/zone_setting_security_header.py @@ -6,7 +6,7 @@ from ...._models import BaseModel -__all__ = ["ZonesSecurityHeader", "Value", "ValueStrictTransportSecurity"] +__all__ = ["ZoneSettingSecurityHeader", "Value", "ValueStrictTransportSecurity"] class ValueStrictTransportSecurity(BaseModel): @@ -28,7 +28,7 @@ class Value(BaseModel): """Strict Transport Security.""" -class ZonesSecurityHeader(BaseModel): +class ZoneSettingSecurityHeader(BaseModel): id: Literal["security_header"] """ID of the zone's security header.""" diff --git a/src/cloudflare/types/zones/settings/zones_security_header_param.py b/src/cloudflare/types/zones/settings/zone_setting_security_header_param.py similarity index 85% rename from src/cloudflare/types/zones/settings/zones_security_header_param.py rename to src/cloudflare/types/zones/settings/zone_setting_security_header_param.py index e915fcf9cd1..f3ae4d8ddfc 100644 --- a/src/cloudflare/types/zones/settings/zones_security_header_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_security_header_param.py @@ -4,7 +4,7 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesSecurityHeaderParam", "Value", "ValueStrictTransportSecurity"] +__all__ = ["ZoneSettingSecurityHeaderParam", "Value", "ValueStrictTransportSecurity"] class ValueStrictTransportSecurity(TypedDict, total=False): @@ -26,7 +26,7 @@ class Value(TypedDict, total=False): """Strict Transport Security.""" -class ZonesSecurityHeaderParam(TypedDict, total=False): +class ZoneSettingSecurityHeaderParam(TypedDict, total=False): id: Required[Literal["security_header"]] """ID of the zone's security header.""" diff --git a/src/cloudflare/types/zones/settings/zones_security_level.py b/src/cloudflare/types/zones/settings/zone_setting_security_level.py similarity index 89% rename from src/cloudflare/types/zones/settings/zones_security_level.py rename to src/cloudflare/types/zones/settings/zone_setting_security_level.py index 9fa92a34731..23079ae5b14 100644 --- a/src/cloudflare/types/zones/settings/zones_security_level.py +++ b/src/cloudflare/types/zones/settings/zone_setting_security_level.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesSecurityLevel"] +__all__ = ["ZoneSettingSecurityLevel"] -class ZonesSecurityLevel(BaseModel): +class ZoneSettingSecurityLevel(BaseModel): id: Literal["security_level"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_security_level_param.py b/src/cloudflare/types/zones/settings/zone_setting_security_level_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_security_level_param.py rename to src/cloudflare/types/zones/settings/zone_setting_security_level_param.py index e4388ef4b71..fae5fca9c08 100644 --- a/src/cloudflare/types/zones/settings/zones_security_level_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_security_level_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesSecurityLevelParam"] +__all__ = ["ZoneSettingSecurityLevelParam"] -class ZonesSecurityLevelParam(TypedDict, total=False): +class ZoneSettingSecurityLevelParam(TypedDict, total=False): id: Required[Literal["security_level"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_server_side_exclude.py b/src/cloudflare/types/zones/settings/zone_setting_server_side_exclude.py similarity index 87% rename from src/cloudflare/types/zones/settings/zones_server_side_exclude.py rename to src/cloudflare/types/zones/settings/zone_setting_server_side_exclude.py index aa58413d5a9..afcb204ae3d 100644 --- a/src/cloudflare/types/zones/settings/zones_server_side_exclude.py +++ b/src/cloudflare/types/zones/settings/zone_setting_server_side_exclude.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesServerSideExclude"] +__all__ = ["ZoneSettingServerSideExclude"] -class ZonesServerSideExclude(BaseModel): +class ZoneSettingServerSideExclude(BaseModel): id: Literal["server_side_exclude"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_server_side_exclude_param.py b/src/cloudflare/types/zones/settings/zone_setting_server_side_exclude_param.py similarity index 75% rename from src/cloudflare/types/zones/settings/zones_server_side_exclude_param.py rename to src/cloudflare/types/zones/settings/zone_setting_server_side_exclude_param.py index f80f793b883..6a95d138f5a 100644 --- a/src/cloudflare/types/zones/settings/zones_server_side_exclude_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_server_side_exclude_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesServerSideExcludeParam"] +__all__ = ["ZoneSettingServerSideExcludeParam"] -class ZonesServerSideExcludeParam(TypedDict, total=False): +class ZoneSettingServerSideExcludeParam(TypedDict, total=False): id: Required[Literal["server_side_exclude"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_sort_query_string_for_cache.py b/src/cloudflare/types/zones/settings/zone_setting_sort_query_string_for_cache.py similarity index 86% rename from src/cloudflare/types/zones/settings/zones_sort_query_string_for_cache.py rename to src/cloudflare/types/zones/settings/zone_setting_sort_query_string_for_cache.py index 219edc47940..cd70a12f554 100644 --- a/src/cloudflare/types/zones/settings/zones_sort_query_string_for_cache.py +++ b/src/cloudflare/types/zones/settings/zone_setting_sort_query_string_for_cache.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesSortQueryStringForCache"] +__all__ = ["ZoneSettingSortQueryStringForCache"] -class ZonesSortQueryStringForCache(BaseModel): +class ZoneSettingSortQueryStringForCache(BaseModel): id: Literal["sort_query_string_for_cache"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_sort_query_string_for_cache_param.py b/src/cloudflare/types/zones/settings/zone_setting_sort_query_string_for_cache_param.py similarity index 74% rename from src/cloudflare/types/zones/settings/zones_sort_query_string_for_cache_param.py rename to src/cloudflare/types/zones/settings/zone_setting_sort_query_string_for_cache_param.py index da0e7d9d768..212bdcdffb4 100644 --- a/src/cloudflare/types/zones/settings/zones_sort_query_string_for_cache_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_sort_query_string_for_cache_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesSortQueryStringForCacheParam"] +__all__ = ["ZoneSettingSortQueryStringForCacheParam"] -class ZonesSortQueryStringForCacheParam(TypedDict, total=False): +class ZoneSettingSortQueryStringForCacheParam(TypedDict, total=False): id: Required[Literal["sort_query_string_for_cache"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_ssl.py b/src/cloudflare/types/zones/settings/zone_setting_ssl.py similarity index 91% rename from src/cloudflare/types/zones/settings/zones_ssl.py rename to src/cloudflare/types/zones/settings/zone_setting_ssl.py index 1d68aae4728..59fde7f0bb3 100644 --- a/src/cloudflare/types/zones/settings/zones_ssl.py +++ b/src/cloudflare/types/zones/settings/zone_setting_ssl.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesSSL"] +__all__ = ["ZoneSettingSSL"] -class ZonesSSL(BaseModel): +class ZoneSettingSSL(BaseModel): id: Literal["ssl"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_ssl_param.py b/src/cloudflare/types/zones/settings/zone_setting_ssl_param.py similarity index 81% rename from src/cloudflare/types/zones/settings/zones_ssl_param.py rename to src/cloudflare/types/zones/settings/zone_setting_ssl_param.py index d8d92e96bc7..3737c7ee4c8 100644 --- a/src/cloudflare/types/zones/settings/zones_ssl_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_ssl_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesSSLParam"] +__all__ = ["ZoneSettingSSLParam"] -class ZonesSSLParam(TypedDict, total=False): +class ZoneSettingSSLParam(TypedDict, total=False): id: Required[Literal["ssl"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_ssl_recommender.py b/src/cloudflare/types/zones/settings/zone_setting_ssl_recommender.py similarity index 81% rename from src/cloudflare/types/zones/settings/zones_ssl_recommender.py rename to src/cloudflare/types/zones/settings/zone_setting_ssl_recommender.py index 70c02196f38..f6daa585189 100644 --- a/src/cloudflare/types/zones/settings/zones_ssl_recommender.py +++ b/src/cloudflare/types/zones/settings/zone_setting_ssl_recommender.py @@ -5,10 +5,10 @@ from ...._models import BaseModel -__all__ = ["ZonesSSLRecommender"] +__all__ = ["ZoneSettingSSLRecommender"] -class ZonesSSLRecommender(BaseModel): +class ZoneSettingSSLRecommender(BaseModel): id: Optional[Literal["ssl_recommender"]] = None """Enrollment value for SSL/TLS Recommender.""" diff --git a/src/cloudflare/types/zones/settings/zones_ssl_recommender_param.py b/src/cloudflare/types/zones/settings/zone_setting_ssl_recommender_param.py similarity index 75% rename from src/cloudflare/types/zones/settings/zones_ssl_recommender_param.py rename to src/cloudflare/types/zones/settings/zone_setting_ssl_recommender_param.py index c0d083b35cd..7be93660ca4 100644 --- a/src/cloudflare/types/zones/settings/zones_ssl_recommender_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_ssl_recommender_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, TypedDict -__all__ = ["ZonesSSLRecommenderParam"] +__all__ = ["ZoneSettingSSLRecommenderParam"] -class ZonesSSLRecommenderParam(TypedDict, total=False): +class ZoneSettingSSLRecommenderParam(TypedDict, total=False): id: Literal["ssl_recommender"] """Enrollment value for SSL/TLS Recommender.""" diff --git a/src/cloudflare/types/zones/settings/zones_tls_1_3.py b/src/cloudflare/types/zones/settings/zone_setting_tls_1_3.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_tls_1_3.py rename to src/cloudflare/types/zones/settings/zone_setting_tls_1_3.py index e1e5b455c01..358da89a923 100644 --- a/src/cloudflare/types/zones/settings/zones_tls_1_3.py +++ b/src/cloudflare/types/zones/settings/zone_setting_tls_1_3.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesTLS1_3"] +__all__ = ["ZoneSettingTLS1_3"] -class ZonesTLS1_3(BaseModel): +class ZoneSettingTLS1_3(BaseModel): id: Literal["tls_1_3"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_tls_1_3_param.py b/src/cloudflare/types/zones/settings/zone_setting_tls_1_3_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_tls_1_3_param.py rename to src/cloudflare/types/zones/settings/zone_setting_tls_1_3_param.py index fe04f5f4d4a..d20c15d5bfb 100644 --- a/src/cloudflare/types/zones/settings/zones_tls_1_3_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_tls_1_3_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesTLS1_3Param"] +__all__ = ["ZoneSettingTLS1_3Param"] -class ZonesTLS1_3Param(TypedDict, total=False): +class ZoneSettingTLS1_3Param(TypedDict, total=False): id: Required[Literal["tls_1_3"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_tls_client_auth.py b/src/cloudflare/types/zones/settings/zone_setting_tls_client_auth.py similarity index 88% rename from src/cloudflare/types/zones/settings/zones_tls_client_auth.py rename to src/cloudflare/types/zones/settings/zone_setting_tls_client_auth.py index 5427c2cad17..f0e6b95ec4c 100644 --- a/src/cloudflare/types/zones/settings/zones_tls_client_auth.py +++ b/src/cloudflare/types/zones/settings/zone_setting_tls_client_auth.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesTLSClientAuth"] +__all__ = ["ZoneSettingTLSClientAuth"] -class ZonesTLSClientAuth(BaseModel): +class ZoneSettingTLSClientAuth(BaseModel): id: Literal["tls_client_auth"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_tls_client_auth_param.py b/src/cloudflare/types/zones/settings/zone_setting_tls_client_auth_param.py similarity index 77% rename from src/cloudflare/types/zones/settings/zones_tls_client_auth_param.py rename to src/cloudflare/types/zones/settings/zone_setting_tls_client_auth_param.py index 9a8c7e289e0..289a202f08d 100644 --- a/src/cloudflare/types/zones/settings/zones_tls_client_auth_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_tls_client_auth_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesTLSClientAuthParam"] +__all__ = ["ZoneSettingTLSClientAuthParam"] -class ZonesTLSClientAuthParam(TypedDict, total=False): +class ZoneSettingTLSClientAuthParam(TypedDict, total=False): id: Required[Literal["tls_client_auth"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_true_client_ip_header.py b/src/cloudflare/types/zones/settings/zone_setting_true_client_ip_header.py similarity index 87% rename from src/cloudflare/types/zones/settings/zones_true_client_ip_header.py rename to src/cloudflare/types/zones/settings/zone_setting_true_client_ip_header.py index 93f2443c07a..f9a885775b1 100644 --- a/src/cloudflare/types/zones/settings/zones_true_client_ip_header.py +++ b/src/cloudflare/types/zones/settings/zone_setting_true_client_ip_header.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesTrueClientIPHeader"] +__all__ = ["ZoneSettingTrueClientIPHeader"] -class ZonesTrueClientIPHeader(BaseModel): +class ZoneSettingTrueClientIPHeader(BaseModel): id: Literal["true_client_ip_header"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_true_client_ip_header_param.py b/src/cloudflare/types/zones/settings/zone_setting_true_client_ip_header_param.py similarity index 75% rename from src/cloudflare/types/zones/settings/zones_true_client_ip_header_param.py rename to src/cloudflare/types/zones/settings/zone_setting_true_client_ip_header_param.py index bc757fd777d..ea4ebe080bf 100644 --- a/src/cloudflare/types/zones/settings/zones_true_client_ip_header_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_true_client_ip_header_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesTrueClientIPHeaderParam"] +__all__ = ["ZoneSettingTrueClientIPHeaderParam"] -class ZonesTrueClientIPHeaderParam(TypedDict, total=False): +class ZoneSettingTrueClientIPHeaderParam(TypedDict, total=False): id: Required[Literal["true_client_ip_header"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_waf.py b/src/cloudflare/types/zones/settings/zone_setting_waf.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_waf.py rename to src/cloudflare/types/zones/settings/zone_setting_waf.py index 8901bffce8e..807977534a3 100644 --- a/src/cloudflare/types/zones/settings/zones_waf.py +++ b/src/cloudflare/types/zones/settings/zone_setting_waf.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesWAF"] +__all__ = ["ZoneSettingWAF"] -class ZonesWAF(BaseModel): +class ZoneSettingWAF(BaseModel): id: Literal["waf"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_waf_param.py b/src/cloudflare/types/zones/settings/zone_setting_waf_param.py similarity index 80% rename from src/cloudflare/types/zones/settings/zones_waf_param.py rename to src/cloudflare/types/zones/settings/zone_setting_waf_param.py index 12a1a702b43..bbd479b146d 100644 --- a/src/cloudflare/types/zones/settings/zones_waf_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_waf_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesWAFParam"] +__all__ = ["ZoneSettingWAFParam"] -class ZonesWAFParam(TypedDict, total=False): +class ZoneSettingWAFParam(TypedDict, total=False): id: Required[Literal["waf"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_webp.py b/src/cloudflare/types/zones/settings/zone_setting_webp.py similarity index 90% rename from src/cloudflare/types/zones/settings/zones_webp.py rename to src/cloudflare/types/zones/settings/zone_setting_webp.py index 9ee628fe0d8..35a3bb58b40 100644 --- a/src/cloudflare/types/zones/settings/zones_webp.py +++ b/src/cloudflare/types/zones/settings/zone_setting_webp.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesWebP"] +__all__ = ["ZoneSettingWebP"] -class ZonesWebP(BaseModel): +class ZoneSettingWebP(BaseModel): id: Literal["webp"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_webp_param.py b/src/cloudflare/types/zones/settings/zone_setting_webp_param.py similarity index 79% rename from src/cloudflare/types/zones/settings/zones_webp_param.py rename to src/cloudflare/types/zones/settings/zone_setting_webp_param.py index 317f8483550..45147aa2f27 100644 --- a/src/cloudflare/types/zones/settings/zones_webp_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_webp_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesWebPParam"] +__all__ = ["ZoneSettingWebPParam"] -class ZonesWebPParam(TypedDict, total=False): +class ZoneSettingWebPParam(TypedDict, total=False): id: Required[Literal["webp"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_websockets.py b/src/cloudflare/types/zones/settings/zone_setting_websockets.py similarity index 89% rename from src/cloudflare/types/zones/settings/zones_websockets.py rename to src/cloudflare/types/zones/settings/zone_setting_websockets.py index 1b064d8cc26..6faa560ef95 100644 --- a/src/cloudflare/types/zones/settings/zones_websockets.py +++ b/src/cloudflare/types/zones/settings/zone_setting_websockets.py @@ -6,10 +6,10 @@ from ...._models import BaseModel -__all__ = ["ZonesWebsockets"] +__all__ = ["ZoneSettingWebsockets"] -class ZonesWebsockets(BaseModel): +class ZoneSettingWebsockets(BaseModel): id: Literal["websockets"] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones/settings/zones_websockets_param.py b/src/cloudflare/types/zones/settings/zone_setting_websockets_param.py similarity index 77% rename from src/cloudflare/types/zones/settings/zones_websockets_param.py rename to src/cloudflare/types/zones/settings/zone_setting_websockets_param.py index c7abe5e6c57..ab2fdbbc8ac 100644 --- a/src/cloudflare/types/zones/settings/zones_websockets_param.py +++ b/src/cloudflare/types/zones/settings/zone_setting_websockets_param.py @@ -4,10 +4,10 @@ from typing_extensions import Literal, Required, TypedDict -__all__ = ["ZonesWebsocketsParam"] +__all__ = ["ZoneSettingWebsocketsParam"] -class ZonesWebsocketsParam(TypedDict, total=False): +class ZoneSettingWebsocketsParam(TypedDict, total=False): id: Required[Literal["websockets"]] """ID of the zone setting.""" diff --git a/src/cloudflare/types/zones_page_rule.py b/src/cloudflare/types/zones_pagerule.py similarity index 96% rename from src/cloudflare/types/zones_page_rule.py rename to src/cloudflare/types/zones_pagerule.py index 8c1e165543b..2a6f1eb0d64 100644 --- a/src/cloudflare/types/zones_page_rule.py +++ b/src/cloudflare/types/zones_pagerule.py @@ -6,7 +6,7 @@ from .._models import BaseModel -__all__ = ["ZonesPageRule", "Action", "ActionValue", "Target", "TargetConstraint"] +__all__ = ["ZonesPagerule", "Action", "ActionValue", "Target", "TargetConstraint"] class ActionValue(BaseModel): @@ -51,7 +51,7 @@ class Target(BaseModel): """A target based on the URL of the request.""" -class ZonesPageRule(BaseModel): +class ZonesPagerule(BaseModel): id: str """Identifier""" diff --git a/tests/api_resources/alerting/destinations/test_webhooks.py b/tests/api_resources/alerting/destinations/test_webhooks.py index 2ea95891b4a..e6875cc2835 100644 --- a/tests/api_resources/alerting/destinations/test_webhooks.py +++ b/tests/api_resources/alerting/destinations/test_webhooks.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.alerting.destinations import ( - AaaWebhooks, + AlertingWebhooks, WebhookListResponse, WebhookCreateResponse, WebhookDeleteResponse, @@ -259,7 +259,7 @@ def test_method_get(self, client: Cloudflare) -> None: "b115d5ec-15c6-41ee-8b76-92c449b5227b", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AaaWebhooks, webhook, path=["response"]) + assert_matches_type(AlertingWebhooks, webhook, path=["response"]) @pytest.mark.skip() @parametrize @@ -272,7 +272,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" webhook = response.parse() - assert_matches_type(AaaWebhooks, webhook, path=["response"]) + assert_matches_type(AlertingWebhooks, webhook, path=["response"]) @pytest.mark.skip() @parametrize @@ -285,7 +285,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" webhook = response.parse() - assert_matches_type(AaaWebhooks, webhook, path=["response"]) + assert_matches_type(AlertingWebhooks, webhook, path=["response"]) assert cast(Any, response.is_closed) is True @@ -544,7 +544,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "b115d5ec-15c6-41ee-8b76-92c449b5227b", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AaaWebhooks, webhook, path=["response"]) + assert_matches_type(AlertingWebhooks, webhook, path=["response"]) @pytest.mark.skip() @parametrize @@ -557,7 +557,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" webhook = await response.parse() - assert_matches_type(AaaWebhooks, webhook, path=["response"]) + assert_matches_type(AlertingWebhooks, webhook, path=["response"]) @pytest.mark.skip() @parametrize @@ -570,7 +570,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" webhook = await response.parse() - assert_matches_type(AaaWebhooks, webhook, path=["response"]) + assert_matches_type(AlertingWebhooks, webhook, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/alerting/test_history.py b/tests/api_resources/alerting/test_history.py index 56d0a52b905..7fe38ffcb56 100644 --- a/tests/api_resources/alerting/test_history.py +++ b/tests/api_resources/alerting/test_history.py @@ -11,7 +11,7 @@ from tests.utils import assert_matches_type from cloudflare._utils import parse_datetime from cloudflare.pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray -from cloudflare.types.alerting import AaaHistory +from cloudflare.types.alerting import AlertingHistory base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -25,7 +25,7 @@ def test_method_list(self, client: Cloudflare) -> None: history = client.alerting.history.list( account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(SyncV4PagePaginationArray[AaaHistory], history, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[AlertingHistory], history, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: per_page=5, since=parse_datetime("2022-05-19T20:29:58.679897Z"), ) - assert_matches_type(SyncV4PagePaginationArray[AaaHistory], history, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[AlertingHistory], history, path=["response"]) @pytest.mark.skip() @parametrize @@ -49,7 +49,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" history = response.parse() - assert_matches_type(SyncV4PagePaginationArray[AaaHistory], history, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[AlertingHistory], history, path=["response"]) @pytest.mark.skip() @parametrize @@ -61,7 +61,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" history = response.parse() - assert_matches_type(SyncV4PagePaginationArray[AaaHistory], history, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[AlertingHistory], history, path=["response"]) assert cast(Any, response.is_closed) is True @@ -83,7 +83,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: history = await async_client.alerting.history.list( account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AsyncV4PagePaginationArray[AaaHistory], history, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[AlertingHistory], history, path=["response"]) @pytest.mark.skip() @parametrize @@ -95,7 +95,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) per_page=5, since=parse_datetime("2022-05-19T20:29:58.679897Z"), ) - assert_matches_type(AsyncV4PagePaginationArray[AaaHistory], history, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[AlertingHistory], history, path=["response"]) @pytest.mark.skip() @parametrize @@ -107,7 +107,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" history = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[AaaHistory], history, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[AlertingHistory], history, path=["response"]) @pytest.mark.skip() @parametrize @@ -119,7 +119,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" history = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[AaaHistory], history, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[AlertingHistory], history, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/alerting/test_policies.py b/tests/api_resources/alerting/test_policies.py index 1f130bb584f..a186b043a67 100644 --- a/tests/api_resources/alerting/test_policies.py +++ b/tests/api_resources/alerting/test_policies.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.alerting import ( - AaaPolicies, + AlertingPolicies, PolicyListResponse, PolicyCreateResponse, PolicyDeleteResponse, @@ -369,7 +369,7 @@ def test_method_get(self, client: Cloudflare) -> None: "0da2b59e-f118-439d-8097-bdfb215203c9", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AaaPolicies, policy, path=["response"]) + assert_matches_type(AlertingPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -382,7 +382,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(AaaPolicies, policy, path=["response"]) + assert_matches_type(AlertingPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -395,7 +395,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(AaaPolicies, policy, path=["response"]) + assert_matches_type(AlertingPolicies, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -764,7 +764,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "0da2b59e-f118-439d-8097-bdfb215203c9", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AaaPolicies, policy, path=["response"]) + assert_matches_type(AlertingPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -777,7 +777,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(AaaPolicies, policy, path=["response"]) + assert_matches_type(AlertingPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -790,7 +790,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(AaaPolicies, policy, path=["response"]) + assert_matches_type(AlertingPolicies, policy, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/certificate_authorities/test_hostname_associations.py b/tests/api_resources/certificate_authorities/test_hostname_associations.py index a705fec551e..58ba5b38106 100644 --- a/tests/api_resources/certificate_authorities/test_hostname_associations.py +++ b/tests/api_resources/certificate_authorities/test_hostname_associations.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.certificate_authorities import ( - TLSCertificatesAndHostnamesHostnameAssociation, + TLSHostnameAssociation, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -25,7 +25,7 @@ def test_method_update(self, client: Cloudflare) -> None: hostname_association = client.certificate_authorities.hostname_associations.update( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -35,7 +35,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: hostnames=["api.example.com", "api.example.com", "api.example.com"], mtls_certificate_id="xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", ) - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -47,7 +47,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname_association = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -59,7 +59,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname_association = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) assert cast(Any, response.is_closed) is True @@ -77,7 +77,7 @@ def test_method_get(self, client: Cloudflare) -> None: hostname_association = client.certificate_authorities.hostname_associations.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -86,7 +86,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", mtls_certificate_id="b2134436-2555-4acf-be5b-26c48136575e", ) - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -98,7 +98,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname_association = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -110,7 +110,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname_association = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) assert cast(Any, response.is_closed) is True @@ -132,7 +132,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: hostname_association = await async_client.certificate_authorities.hostname_associations.update( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare hostnames=["api.example.com", "api.example.com", "api.example.com"], mtls_certificate_id="xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", ) - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -154,7 +154,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname_association = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -166,7 +166,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname_association = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) assert cast(Any, response.is_closed) is True @@ -184,7 +184,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: hostname_association = await async_client.certificate_authorities.hostname_associations.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -193,7 +193,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - zone_id="023e105f4ecef8ad9ca31a8372d0c353", mtls_certificate_id="b2134436-2555-4acf-be5b-26c48136575e", ) - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -205,7 +205,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname_association = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) @pytest.mark.skip() @parametrize @@ -217,7 +217,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname_association = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameAssociation, hostname_association, path=["response"]) + assert_matches_type(TLSHostnameAssociation, hostname_association, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/dns/analytics/reports/test_bytimes.py b/tests/api_resources/dns/analytics/reports/test_bytimes.py index 45e54b4766d..ddd7f707f9d 100644 --- a/tests/api_resources/dns/analytics/reports/test_bytimes.py +++ b/tests/api_resources/dns/analytics/reports/test_bytimes.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare._utils import parse_datetime -from cloudflare.types.dns.analytics.reports import DNSDNSAnalyticsAPIReportBytime +from cloudflare.types.dns.analytics.reports import DNSAnalyticsReportByTime base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_get(self, client: Cloudflare) -> None: bytime = client.dns.analytics.reports.bytimes.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -40,7 +40,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: time_delta="hour", until=parse_datetime("2023-11-11T13:00:00Z"), ) - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -52,7 +52,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" bytime = response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -64,7 +64,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" bytime = response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) assert cast(Any, response.is_closed) is True @@ -86,7 +86,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: bytime = await async_client.dns.analytics.reports.bytimes.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -102,7 +102,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - time_delta="hour", until=parse_datetime("2023-11-11T13:00:00Z"), ) - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -114,7 +114,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" bytime = await response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -126,7 +126,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" bytime = await response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/dns/analytics/test_reports.py b/tests/api_resources/dns/analytics/test_reports.py index 3f9b8ec4bd0..2667a082de7 100644 --- a/tests/api_resources/dns/analytics/test_reports.py +++ b/tests/api_resources/dns/analytics/test_reports.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare._utils import parse_datetime -from cloudflare.types.dns.analytics import DNSDNSAnalyticsAPIReport +from cloudflare.types.dns.analytics import DNSAnalyticsReport base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_get(self, client: Cloudflare) -> None: report = client.dns.analytics.reports.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: sort="+responseCode,-queryName", until=parse_datetime("2023-11-11T13:00:00Z"), ) - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -51,7 +51,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" report = response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -63,7 +63,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" report = response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) assert cast(Any, response.is_closed) is True @@ -85,7 +85,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: report = await async_client.dns.analytics.reports.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -100,7 +100,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - sort="+responseCode,-queryName", until=parse_datetime("2023-11-11T13:00:00Z"), ) - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -112,7 +112,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" report = await response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -124,7 +124,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" report = await response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/dns/firewall/analytics/reports/test_bytimes.py b/tests/api_resources/dns/firewall/analytics/reports/test_bytimes.py index 7c748237dfb..a2d0f8a7b6d 100644 --- a/tests/api_resources/dns/firewall/analytics/reports/test_bytimes.py +++ b/tests/api_resources/dns/firewall/analytics/reports/test_bytimes.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare._utils import parse_datetime -from cloudflare.types.dns.analytics.reports import DNSDNSAnalyticsAPIReportBytime +from cloudflare.types.dns.analytics.reports import DNSAnalyticsReportByTime base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -25,7 +25,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -42,7 +42,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: time_delta="hour", until=parse_datetime("2023-11-11T13:00:00Z"), ) - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -55,7 +55,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" bytime = response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -68,7 +68,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" bytime = response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) assert cast(Any, response.is_closed) is True @@ -98,7 +98,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -115,7 +115,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - time_delta="hour", until=parse_datetime("2023-11-11T13:00:00Z"), ) - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -128,7 +128,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" bytime = await response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) @pytest.mark.skip() @parametrize @@ -141,7 +141,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" bytime = await response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReportBytime, bytime, path=["response"]) + assert_matches_type(DNSAnalyticsReportByTime, bytime, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/dns/firewall/analytics/test_reports.py b/tests/api_resources/dns/firewall/analytics/test_reports.py index 79fe457f9a6..e36cb3033ac 100644 --- a/tests/api_resources/dns/firewall/analytics/test_reports.py +++ b/tests/api_resources/dns/firewall/analytics/test_reports.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare._utils import parse_datetime -from cloudflare.types.dns.analytics import DNSDNSAnalyticsAPIReport +from cloudflare.types.dns.analytics import DNSAnalyticsReport base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -25,7 +25,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -41,7 +41,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: sort="+responseCode,-queryName", until=parse_datetime("2023-11-11T13:00:00Z"), ) - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -54,7 +54,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" report = response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -67,7 +67,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" report = response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) assert cast(Any, response.is_closed) is True @@ -97,7 +97,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -113,7 +113,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - sort="+responseCode,-queryName", until=parse_datetime("2023-11-11T13:00:00Z"), ) - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -126,7 +126,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" report = await response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) @pytest.mark.skip() @parametrize @@ -139,7 +139,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" report = await response.parse() - assert_matches_type(DNSDNSAnalyticsAPIReport, report, path=["response"]) + assert_matches_type(DNSAnalyticsReport, report, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/dns/test_firewall.py b/tests/api_resources/dns/test_firewall.py index 9425fdff0f7..ccf77c74206 100644 --- a/tests/api_resources/dns/test_firewall.py +++ b/tests/api_resources/dns/test_firewall.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.dns import ( - DNSFirewallDNSFirewall, + DNSFirewall, FirewallDeleteResponse, ) from cloudflare.pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray @@ -29,7 +29,7 @@ def test_method_create(self, client: Cloudflare) -> None: name="My Awesome DNS Firewall cluster", upstream_ips=["192.0.2.1", "198.51.100.1", "2001:DB8:100::CF"], ) - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -52,7 +52,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: ratelimit=600, retries=2, ) - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -66,7 +66,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -80,7 +80,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) assert cast(Any, response.is_closed) is True @@ -100,7 +100,7 @@ def test_method_list(self, client: Cloudflare) -> None: firewall = client.dns.firewall.list( account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(SyncV4PagePaginationArray[DNSFirewallDNSFirewall], firewall, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[DNSFirewall], firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -110,7 +110,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: page=1, per_page=1, ) - assert_matches_type(SyncV4PagePaginationArray[DNSFirewallDNSFirewall], firewall, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[DNSFirewall], firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -122,7 +122,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = response.parse() - assert_matches_type(SyncV4PagePaginationArray[DNSFirewallDNSFirewall], firewall, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[DNSFirewall], firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -134,7 +134,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = response.parse() - assert_matches_type(SyncV4PagePaginationArray[DNSFirewallDNSFirewall], firewall, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[DNSFirewall], firewall, path=["response"]) assert cast(Any, response.is_closed) is True @@ -212,7 +212,7 @@ def test_method_edit(self, client: Cloudflare) -> None: name="My Awesome DNS Firewall cluster", upstream_ips=["192.0.2.1", "198.51.100.1", "2001:DB8:100::CF"], ) - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -237,7 +237,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: ratelimit=600, retries=2, ) - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -257,7 +257,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -277,7 +277,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) assert cast(Any, response.is_closed) is True @@ -317,7 +317,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -330,7 +330,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -343,7 +343,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) assert cast(Any, response.is_closed) is True @@ -374,7 +374,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: name="My Awesome DNS Firewall cluster", upstream_ips=["192.0.2.1", "198.51.100.1", "2001:DB8:100::CF"], ) - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -397,7 +397,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare ratelimit=600, retries=2, ) - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -411,7 +411,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = await response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -425,7 +425,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = await response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) assert cast(Any, response.is_closed) is True @@ -445,7 +445,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: firewall = await async_client.dns.firewall.list( account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AsyncV4PagePaginationArray[DNSFirewallDNSFirewall], firewall, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[DNSFirewall], firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -455,7 +455,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) page=1, per_page=1, ) - assert_matches_type(AsyncV4PagePaginationArray[DNSFirewallDNSFirewall], firewall, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[DNSFirewall], firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -467,7 +467,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[DNSFirewallDNSFirewall], firewall, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[DNSFirewall], firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -479,7 +479,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[DNSFirewallDNSFirewall], firewall, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[DNSFirewall], firewall, path=["response"]) assert cast(Any, response.is_closed) is True @@ -557,7 +557,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: name="My Awesome DNS Firewall cluster", upstream_ips=["192.0.2.1", "198.51.100.1", "2001:DB8:100::CF"], ) - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -582,7 +582,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) ratelimit=600, retries=2, ) - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -602,7 +602,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = await response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -622,7 +622,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = await response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) assert cast(Any, response.is_closed) is True @@ -662,7 +662,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -675,7 +675,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = await response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) @pytest.mark.skip() @parametrize @@ -688,7 +688,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" firewall = await response.parse() - assert_matches_type(DNSFirewallDNSFirewall, firewall, path=["response"]) + assert_matches_type(DNSFirewall, firewall, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/durable_objects/namespaces/test_objects.py b/tests/api_resources/durable_objects/namespaces/test_objects.py index fff7b92c91d..3273c4e5eda 100644 --- a/tests/api_resources/durable_objects/namespaces/test_objects.py +++ b/tests/api_resources/durable_objects/namespaces/test_objects.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.pagination import SyncCursorLimitPagination, AsyncCursorLimitPagination -from cloudflare.types.durable_objects.namespaces import WorkersObject +from cloudflare.types.durable_objects.namespaces import DurableObject base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -25,7 +25,7 @@ def test_method_list(self, client: Cloudflare) -> None: "5fd1cafff895419c8bcc647fc64ab8f0", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(SyncCursorLimitPagination[WorkersObject], object, path=["response"]) + assert_matches_type(SyncCursorLimitPagination[DurableObject], object, path=["response"]) @pytest.mark.skip() @parametrize @@ -36,7 +36,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: cursor="AAAAANuhDN7SjacTnSVsDu3WW1Lvst6dxJGTjRY5BhxPXdf6L6uTcpd_NVtjhn11OUYRsVEykxoUwF-JQU4dn6QylZSKTOJuG0indrdn_MlHpMRtsxgXjs-RPdHYIVm3odE_uvEQ_dTQGFm8oikZMohns34DLBgrQpc", limit=10, ) - assert_matches_type(SyncCursorLimitPagination[WorkersObject], object, path=["response"]) + assert_matches_type(SyncCursorLimitPagination[DurableObject], object, path=["response"]) @pytest.mark.skip() @parametrize @@ -49,7 +49,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" object = response.parse() - assert_matches_type(SyncCursorLimitPagination[WorkersObject], object, path=["response"]) + assert_matches_type(SyncCursorLimitPagination[DurableObject], object, path=["response"]) @pytest.mark.skip() @parametrize @@ -62,7 +62,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" object = response.parse() - assert_matches_type(SyncCursorLimitPagination[WorkersObject], object, path=["response"]) + assert_matches_type(SyncCursorLimitPagination[DurableObject], object, path=["response"]) assert cast(Any, response.is_closed) is True @@ -92,7 +92,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: "5fd1cafff895419c8bcc647fc64ab8f0", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AsyncCursorLimitPagination[WorkersObject], object, path=["response"]) + assert_matches_type(AsyncCursorLimitPagination[DurableObject], object, path=["response"]) @pytest.mark.skip() @parametrize @@ -103,7 +103,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) cursor="AAAAANuhDN7SjacTnSVsDu3WW1Lvst6dxJGTjRY5BhxPXdf6L6uTcpd_NVtjhn11OUYRsVEykxoUwF-JQU4dn6QylZSKTOJuG0indrdn_MlHpMRtsxgXjs-RPdHYIVm3odE_uvEQ_dTQGFm8oikZMohns34DLBgrQpc", limit=10, ) - assert_matches_type(AsyncCursorLimitPagination[WorkersObject], object, path=["response"]) + assert_matches_type(AsyncCursorLimitPagination[DurableObject], object, path=["response"]) @pytest.mark.skip() @parametrize @@ -116,7 +116,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" object = await response.parse() - assert_matches_type(AsyncCursorLimitPagination[WorkersObject], object, path=["response"]) + assert_matches_type(AsyncCursorLimitPagination[DurableObject], object, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" object = await response.parse() - assert_matches_type(AsyncCursorLimitPagination[WorkersObject], object, path=["response"]) + assert_matches_type(AsyncCursorLimitPagination[DurableObject], object, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/firewall/test_lockdowns.py b/tests/api_resources/firewall/test_lockdowns.py index 8bd81557bd6..16e5b7909e4 100644 --- a/tests/api_resources/firewall/test_lockdowns.py +++ b/tests/api_resources/firewall/test_lockdowns.py @@ -11,7 +11,7 @@ from tests.utils import assert_matches_type from cloudflare.pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray from cloudflare.types.firewall import ( - LegacyJhsZonelockdown, + FirewallZoneLockdown, LockdownDeleteResponse, ) @@ -28,7 +28,7 @@ def test_method_create(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -41,7 +41,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -54,7 +54,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) assert cast(Any, response.is_closed) is True @@ -75,7 +75,7 @@ def test_method_update(self, client: Cloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -89,7 +89,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -103,7 +103,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) assert cast(Any, response.is_closed) is True @@ -130,7 +130,7 @@ def test_method_list(self, client: Cloudflare) -> None: lockdown = client.firewall.lockdowns.list( "023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -147,7 +147,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: priority=5, uri_search="/some/path", ) - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -159,7 +159,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = response.parse() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -171,7 +171,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = response.parse() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallZoneLockdown], lockdown, path=["response"]) assert cast(Any, response.is_closed) is True @@ -242,7 +242,7 @@ def test_method_get(self, client: Cloudflare) -> None: "372e67954025e0ba6aaa6d586b9e0b59", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -255,7 +255,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -268,7 +268,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) assert cast(Any, response.is_closed) is True @@ -298,7 +298,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -311,7 +311,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = await response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -324,7 +324,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = await response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) assert cast(Any, response.is_closed) is True @@ -345,7 +345,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -359,7 +359,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = await response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -373,7 +373,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = await response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) assert cast(Any, response.is_closed) is True @@ -400,7 +400,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: lockdown = await async_client.firewall.lockdowns.list( "023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -417,7 +417,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) priority=5, uri_search="/some/path", ) - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -429,7 +429,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -441,7 +441,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallZoneLockdown], lockdown, path=["response"]) assert cast(Any, response.is_closed) is True @@ -512,7 +512,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "372e67954025e0ba6aaa6d586b9e0b59", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -525,7 +525,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = await response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) @pytest.mark.skip() @parametrize @@ -538,7 +538,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" lockdown = await response.parse() - assert_matches_type(Optional[LegacyJhsZonelockdown], lockdown, path=["response"]) + assert_matches_type(Optional[FirewallZoneLockdown], lockdown, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/firewall/test_rules.py b/tests/api_resources/firewall/test_rules.py index 0a5d7bd3cc5..aefacf8cab2 100644 --- a/tests/api_resources/firewall/test_rules.py +++ b/tests/api_resources/firewall/test_rules.py @@ -12,8 +12,8 @@ from cloudflare.pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray from cloudflare.types.firewall import ( RuleEditResponse, + FirewallFilterRule, RuleCreateResponse, - LegacyJhsFilterRule, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -76,7 +76,7 @@ def test_method_update(self, client: Cloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -90,7 +90,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -104,7 +104,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -131,7 +131,7 @@ def test_method_list(self, client: Cloudflare) -> None: rule = client.firewall.rules.list( "023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -144,7 +144,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: paused=False, per_page=5, ) - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -156,7 +156,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -168,7 +168,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallFilterRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -187,7 +187,7 @@ def test_method_delete(self, client: Cloudflare) -> None: "372e67954025e0ba6aaa6d586b9e0b60", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -197,7 +197,7 @@ def test_method_delete_with_all_params(self, client: Cloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", delete_filter_if_unused=True, ) - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -210,7 +210,7 @@ def test_raw_response_delete(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -223,7 +223,7 @@ def test_streaming_response_delete(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -306,7 +306,7 @@ def test_method_get(self, client: Cloudflare) -> None: "372e67954025e0ba6aaa6d586b9e0b60", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -319,7 +319,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -332,7 +332,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -409,7 +409,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -423,7 +423,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -437,7 +437,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -464,7 +464,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: rule = await async_client.firewall.rules.list( "023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -477,7 +477,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) paused=False, per_page=5, ) - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -489,7 +489,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -501,7 +501,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallFilterRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -520,7 +520,7 @@ async def test_method_delete(self, async_client: AsyncCloudflare) -> None: "372e67954025e0ba6aaa6d586b9e0b60", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -530,7 +530,7 @@ async def test_method_delete_with_all_params(self, async_client: AsyncCloudflare zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", delete_filter_if_unused=True, ) - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -543,7 +543,7 @@ async def test_raw_response_delete(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -556,7 +556,7 @@ async def test_streaming_response_delete(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -639,7 +639,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "372e67954025e0ba6aaa6d586b9e0b60", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -652,7 +652,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -665,7 +665,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[LegacyJhsFilterRule], rule, path=["response"]) + assert_matches_type(Optional[FirewallFilterRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/firewall/waf/packages/test_groups.py b/tests/api_resources/firewall/waf/packages/test_groups.py index 02642236030..78d0a147146 100644 --- a/tests/api_resources/firewall/waf/packages/test_groups.py +++ b/tests/api_resources/firewall/waf/packages/test_groups.py @@ -13,7 +13,7 @@ from cloudflare.types.firewall.waf.packages import ( GroupGetResponse, GroupEditResponse, - WAFManagedRulesSchemasGroup, + WAFManagedRulesGroup, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -29,7 +29,7 @@ def test_method_list(self, client: Cloudflare) -> None: "a25a9a7e9c00afc1fb2e0245519d725b", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(SyncV4PagePaginationArray[WAFManagedRulesSchemasGroup], group, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[WAFManagedRulesGroup], group, path=["response"]) @pytest.mark.skip() @parametrize @@ -44,7 +44,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: page=1, per_page=5, ) - assert_matches_type(SyncV4PagePaginationArray[WAFManagedRulesSchemasGroup], group, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[WAFManagedRulesGroup], group, path=["response"]) @pytest.mark.skip() @parametrize @@ -57,7 +57,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = response.parse() - assert_matches_type(SyncV4PagePaginationArray[WAFManagedRulesSchemasGroup], group, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[WAFManagedRulesGroup], group, path=["response"]) @pytest.mark.skip() @parametrize @@ -70,7 +70,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = response.parse() - assert_matches_type(SyncV4PagePaginationArray[WAFManagedRulesSchemasGroup], group, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[WAFManagedRulesGroup], group, path=["response"]) assert cast(Any, response.is_closed) is True @@ -239,7 +239,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: "a25a9a7e9c00afc1fb2e0245519d725b", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AsyncV4PagePaginationArray[WAFManagedRulesSchemasGroup], group, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[WAFManagedRulesGroup], group, path=["response"]) @pytest.mark.skip() @parametrize @@ -254,7 +254,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) page=1, per_page=5, ) - assert_matches_type(AsyncV4PagePaginationArray[WAFManagedRulesSchemasGroup], group, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[WAFManagedRulesGroup], group, path=["response"]) @pytest.mark.skip() @parametrize @@ -267,7 +267,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[WAFManagedRulesSchemasGroup], group, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[WAFManagedRulesGroup], group, path=["response"]) @pytest.mark.skip() @parametrize @@ -280,7 +280,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[WAFManagedRulesSchemasGroup], group, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[WAFManagedRulesGroup], group, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/firewall/waf/test_overrides.py b/tests/api_resources/firewall/waf/test_overrides.py index 8530c8f87ab..54cbdacc6d0 100644 --- a/tests/api_resources/firewall/waf/test_overrides.py +++ b/tests/api_resources/firewall/waf/test_overrides.py @@ -11,7 +11,7 @@ from tests.utils import assert_matches_type from cloudflare.pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray from cloudflare.types.firewall.waf import ( - LegacyJhsOverride, + WAFOverride, OverrideDeleteResponse, ) @@ -28,7 +28,7 @@ def test_method_create(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -41,7 +41,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -54,7 +54,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) assert cast(Any, response.is_closed) is True @@ -75,7 +75,7 @@ def test_method_update(self, client: Cloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -89,7 +89,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -103,7 +103,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) assert cast(Any, response.is_closed) is True @@ -130,7 +130,7 @@ def test_method_list(self, client: Cloudflare) -> None: override = client.firewall.waf.overrides.list( "023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -140,7 +140,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: page=1, per_page=5, ) - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -152,7 +152,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = response.parse() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -164,7 +164,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = response.parse() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[WAFOverride], override, path=["response"]) assert cast(Any, response.is_closed) is True @@ -235,7 +235,7 @@ def test_method_get(self, client: Cloudflare) -> None: "de677e5818985db1285d0e80225f06e5", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -248,7 +248,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -261,7 +261,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) assert cast(Any, response.is_closed) is True @@ -291,7 +291,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -304,7 +304,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = await response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -317,7 +317,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = await response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) assert cast(Any, response.is_closed) is True @@ -338,7 +338,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -352,7 +352,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = await response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -366,7 +366,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = await response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) assert cast(Any, response.is_closed) is True @@ -393,7 +393,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: override = await async_client.firewall.waf.overrides.list( "023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -403,7 +403,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) page=1, per_page=5, ) - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -415,7 +415,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -427,7 +427,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[WAFOverride], override, path=["response"]) assert cast(Any, response.is_closed) is True @@ -498,7 +498,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "de677e5818985db1285d0e80225f06e5", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -511,7 +511,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = await response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) @pytest.mark.skip() @parametrize @@ -524,7 +524,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" override = await response.parse() - assert_matches_type(Optional[LegacyJhsOverride], override, path=["response"]) + assert_matches_type(Optional[WAFOverride], override, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/healthchecks/test_previews.py b/tests/api_resources/healthchecks/test_previews.py index 6f97f8597e4..f6a16e32539 100644 --- a/tests/api_resources/healthchecks/test_previews.py +++ b/tests/api_resources/healthchecks/test_previews.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types import HealthchecksHealthchecks +from cloudflare.types import Healthcheck from cloudflare.types.healthchecks import PreviewDeleteResponse base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -26,7 +26,7 @@ def test_method_create(self, client: Cloudflare) -> None: address="www.example.com", name="server-1", ) - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -62,7 +62,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: healthcheck_timeout=0, type="HTTPS", ) - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -76,7 +76,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = response.parse() - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -90,7 +90,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = response.parse() - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) assert cast(Any, response.is_closed) is True @@ -163,7 +163,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -176,7 +176,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = response.parse() - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -189,7 +189,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = response.parse() - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) assert cast(Any, response.is_closed) is True @@ -220,7 +220,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: address="www.example.com", name="server-1", ) - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -256,7 +256,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare healthcheck_timeout=0, type="HTTPS", ) - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -270,7 +270,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = await response.parse() - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -284,7 +284,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = await response.parse() - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) assert cast(Any, response.is_closed) is True @@ -357,7 +357,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -370,7 +370,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = await response.parse() - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -383,7 +383,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = await response.parse() - assert_matches_type(HealthchecksHealthchecks, preview, path=["response"]) + assert_matches_type(Healthcheck, preview, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/images/test_v1.py b/tests/api_resources/images/test_v1.py index c46f71ba3f1..f3420a94005 100644 --- a/tests/api_resources/images/test_v1.py +++ b/tests/api_resources/images/test_v1.py @@ -11,7 +11,7 @@ from tests.utils import assert_matches_type from cloudflare.pagination import SyncV4PagePagination, AsyncV4PagePagination from cloudflare.types.images import ( - ImagesImage, + Image, V1ListResponse, V1DeleteResponse, ) @@ -29,7 +29,7 @@ def test_method_create_overload_1(self, client: Cloudflare) -> None: account_id="023e105f4ecef8ad9ca31a8372d0c353", file={}, ) - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -42,7 +42,7 @@ def test_raw_response_create_overload_1(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -55,7 +55,7 @@ def test_streaming_response_create_overload_1(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) assert cast(Any, response.is_closed) is True @@ -75,7 +75,7 @@ def test_method_create_overload_2(self, client: Cloudflare) -> None: account_id="023e105f4ecef8ad9ca31a8372d0c353", url="https://example.com/path/to/logo.png", ) - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -88,7 +88,7 @@ def test_raw_response_create_overload_2(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -101,7 +101,7 @@ def test_streaming_response_create_overload_2(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) assert cast(Any, response.is_closed) is True @@ -225,7 +225,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "string", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -236,7 +236,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: metadata={}, require_signed_urls=True, ) - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -249,7 +249,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -262,7 +262,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) assert cast(Any, response.is_closed) is True @@ -288,7 +288,7 @@ def test_method_get(self, client: Cloudflare) -> None: "string", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -301,7 +301,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -314,7 +314,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) assert cast(Any, response.is_closed) is True @@ -344,7 +344,7 @@ async def test_method_create_overload_1(self, async_client: AsyncCloudflare) -> account_id="023e105f4ecef8ad9ca31a8372d0c353", file={}, ) - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -357,7 +357,7 @@ async def test_raw_response_create_overload_1(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = await response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -370,7 +370,7 @@ async def test_streaming_response_create_overload_1(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = await response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) assert cast(Any, response.is_closed) is True @@ -390,7 +390,7 @@ async def test_method_create_overload_2(self, async_client: AsyncCloudflare) -> account_id="023e105f4ecef8ad9ca31a8372d0c353", url="https://example.com/path/to/logo.png", ) - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -403,7 +403,7 @@ async def test_raw_response_create_overload_2(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = await response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -416,7 +416,7 @@ async def test_streaming_response_create_overload_2(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = await response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) assert cast(Any, response.is_closed) is True @@ -540,7 +540,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "string", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -551,7 +551,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) metadata={}, require_signed_urls=True, ) - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -564,7 +564,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = await response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -577,7 +577,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = await response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) assert cast(Any, response.is_closed) is True @@ -603,7 +603,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "string", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -616,7 +616,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = await response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) @pytest.mark.skip() @parametrize @@ -629,7 +629,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" v1 = await response.parse() - assert_matches_type(ImagesImage, v1, path=["response"]) + assert_matches_type(Image, v1, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/load_balancers/test_previews.py b/tests/api_resources/load_balancers/test_previews.py index e8910746a8e..de8e142121c 100644 --- a/tests/api_resources/load_balancers/test_previews.py +++ b/tests/api_resources/load_balancers/test_previews.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.user.load_balancers import LoadBalancingPreviewResult +from cloudflare.types.user.load_balancers import LoadBalancingPreview base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_get(self, client: Cloudflare) -> None: "p1aba936b94213e5b8dca0c0dbf1f9cc", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = response.parse() - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = response.parse() - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) assert cast(Any, response.is_closed) is True @@ -80,7 +80,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "p1aba936b94213e5b8dca0c0dbf1f9cc", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = await response.parse() - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -106,7 +106,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = await response.parse() - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/logpush/test_edge.py b/tests/api_resources/logpush/test_edge.py index 3fc8d0b92ea..3c0826f48f8 100644 --- a/tests/api_resources/logpush/test_edge.py +++ b/tests/api_resources/logpush/test_edge.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.logpush import EdgeGetResponse, LogpushInstantLogsJob +from cloudflare.types.logpush import EdgeGetResponse, InstantLogpushJob base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_create(self, client: Cloudflare) -> None: edge = client.logpush.edge.create( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LogpushInstantLogsJob], edge, path=["response"]) + assert_matches_type(Optional[InstantLogpushJob], edge, path=["response"]) @pytest.mark.skip() @parametrize @@ -34,7 +34,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: filter='{"where":{"and":[{"key":"ClientCountry","operator":"neq","value":"ca"}]}}', sample=1, ) - assert_matches_type(Optional[LogpushInstantLogsJob], edge, path=["response"]) + assert_matches_type(Optional[InstantLogpushJob], edge, path=["response"]) @pytest.mark.skip() @parametrize @@ -46,7 +46,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" edge = response.parse() - assert_matches_type(Optional[LogpushInstantLogsJob], edge, path=["response"]) + assert_matches_type(Optional[InstantLogpushJob], edge, path=["response"]) @pytest.mark.skip() @parametrize @@ -58,7 +58,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" edge = response.parse() - assert_matches_type(Optional[LogpushInstantLogsJob], edge, path=["response"]) + assert_matches_type(Optional[InstantLogpushJob], edge, path=["response"]) assert cast(Any, response.is_closed) is True @@ -122,7 +122,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: edge = await async_client.logpush.edge.create( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LogpushInstantLogsJob], edge, path=["response"]) + assert_matches_type(Optional[InstantLogpushJob], edge, path=["response"]) @pytest.mark.skip() @parametrize @@ -133,7 +133,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare filter='{"where":{"and":[{"key":"ClientCountry","operator":"neq","value":"ca"}]}}', sample=1, ) - assert_matches_type(Optional[LogpushInstantLogsJob], edge, path=["response"]) + assert_matches_type(Optional[InstantLogpushJob], edge, path=["response"]) @pytest.mark.skip() @parametrize @@ -145,7 +145,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" edge = await response.parse() - assert_matches_type(Optional[LogpushInstantLogsJob], edge, path=["response"]) + assert_matches_type(Optional[InstantLogpushJob], edge, path=["response"]) @pytest.mark.skip() @parametrize @@ -157,7 +157,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" edge = await response.parse() - assert_matches_type(Optional[LogpushInstantLogsJob], edge, path=["response"]) + assert_matches_type(Optional[InstantLogpushJob], edge, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/logpush/test_jobs.py b/tests/api_resources/logpush/test_jobs.py index e5332bbbc6d..d0d382b8fe1 100644 --- a/tests/api_resources/logpush/test_jobs.py +++ b/tests/api_resources/logpush/test_jobs.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.logpush import JobListResponse, JobDeleteResponse -from cloudflare.types.logpush.datasets import LogpushLogpushJob +from cloudflare.types.logpush.datasets import LogpushJob base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -26,7 +26,7 @@ def test_method_create(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -56,7 +56,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: }, ownership_challenge="00000000000000000000", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -70,7 +70,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -84,7 +84,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) assert cast(Any, response.is_closed) is True @@ -113,7 +113,7 @@ def test_method_update(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: }, ownership_challenge="00000000000000000000", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -156,7 +156,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -170,7 +170,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) assert cast(Any, response.is_closed) is True @@ -327,7 +327,7 @@ def test_method_get(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -337,7 +337,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -351,7 +351,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -365,7 +365,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) assert cast(Any, response.is_closed) is True @@ -398,7 +398,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -428,7 +428,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare }, ownership_challenge="00000000000000000000", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -442,7 +442,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = await response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -456,7 +456,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = await response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) assert cast(Any, response.is_closed) is True @@ -485,7 +485,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -514,7 +514,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare }, ownership_challenge="00000000000000000000", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -528,7 +528,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = await response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -542,7 +542,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = await response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) assert cast(Any, response.is_closed) is True @@ -699,7 +699,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -709,7 +709,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - account_id="string", zone_id="string", ) - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -723,7 +723,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = await response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) @pytest.mark.skip() @parametrize @@ -737,7 +737,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" job = await response.parse() - assert_matches_type(Optional[LogpushLogpushJob], job, path=["response"]) + assert_matches_type(Optional[LogpushJob], job, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/logs/control/cmb/test_config.py b/tests/api_resources/logs/control/cmb/test_config.py index a5a8b7fd189..4792cc9ed77 100644 --- a/tests/api_resources/logs/control/cmb/test_config.py +++ b/tests/api_resources/logs/control/cmb/test_config.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.logs.control.cmb import LogcontrolCmbConfig, ConfigDeleteResponse +from cloudflare.types.logs.control.cmb import CmbConfig, ConfigDeleteResponse base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_create(self, client: Cloudflare) -> None: config = client.logs.control.cmb.config.create( account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) @pytest.mark.skip() @parametrize @@ -32,7 +32,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: account_id="023e105f4ecef8ad9ca31a8372d0c353", regions="eu", ) - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) @pytest.mark.skip() @parametrize @@ -44,7 +44,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) @pytest.mark.skip() @parametrize @@ -56,7 +56,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ def test_method_get(self, client: Cloudflare) -> None: config = client.logs.control.cmb.config.get( account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) @pytest.mark.skip() @parametrize @@ -128,7 +128,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) @pytest.mark.skip() @parametrize @@ -140,7 +140,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -162,7 +162,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: config = await async_client.logs.control.cmb.config.create( account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) @pytest.mark.skip() @parametrize @@ -171,7 +171,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare account_id="023e105f4ecef8ad9ca31a8372d0c353", regions="eu", ) - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) @pytest.mark.skip() @parametrize @@ -183,7 +183,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) @pytest.mark.skip() @parametrize @@ -195,7 +195,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -255,7 +255,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: config = await async_client.logs.control.cmb.config.get( account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) @pytest.mark.skip() @parametrize @@ -267,7 +267,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) @pytest.mark.skip() @parametrize @@ -279,7 +279,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(Optional[LogcontrolCmbConfig], config, path=["response"]) + assert_matches_type(Optional[CmbConfig], config, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/magic_network_monitoring/configs/test_full.py b/tests/api_resources/magic_network_monitoring/configs/test_full.py index 17677bd6624..79aa9f510d5 100644 --- a/tests/api_resources/magic_network_monitoring/configs/test_full.py +++ b/tests/api_resources/magic_network_monitoring/configs/test_full.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.magic_network_monitoring import MagicVisibilityMNMConfig +from cloudflare.types.magic_network_monitoring import MagicNetworkMonitoringConfig base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_get(self, client: Cloudflare) -> None: full = client.magic_network_monitoring.configs.full.get( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, full, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, full, path=["response"]) @pytest.mark.skip() @parametrize @@ -35,7 +35,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" full = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, full, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, full, path=["response"]) @pytest.mark.skip() @parametrize @@ -47,7 +47,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" full = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, full, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, full, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: full = await async_client.magic_network_monitoring.configs.full.get( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, full, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, full, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" full = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, full, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, full, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" full = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, full, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, full, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/magic_network_monitoring/rules/test_advertisements.py b/tests/api_resources/magic_network_monitoring/rules/test_advertisements.py index 4a065273aae..a1a24e48efe 100644 --- a/tests/api_resources/magic_network_monitoring/rules/test_advertisements.py +++ b/tests/api_resources/magic_network_monitoring/rules/test_advertisements.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.magic_network_monitoring.rules import MagicVisibilityMNMRuleAdvertisable +from cloudflare.types.magic_network_monitoring.rules import MagicNetworkMonitoringRuleAdvertisable base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "2890e6fa406311ed9b5a23f70f6fb8cf", account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRuleAdvertisable], advertisement, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRuleAdvertisable], advertisement, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" advertisement = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRuleAdvertisable], advertisement, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRuleAdvertisable], advertisement, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" advertisement = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRuleAdvertisable], advertisement, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRuleAdvertisable], advertisement, path=["response"]) assert cast(Any, response.is_closed) is True @@ -80,7 +80,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "2890e6fa406311ed9b5a23f70f6fb8cf", account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRuleAdvertisable], advertisement, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRuleAdvertisable], advertisement, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" advertisement = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRuleAdvertisable], advertisement, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRuleAdvertisable], advertisement, path=["response"]) @pytest.mark.skip() @parametrize @@ -106,7 +106,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" advertisement = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRuleAdvertisable], advertisement, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRuleAdvertisable], advertisement, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/magic_network_monitoring/test_configs.py b/tests/api_resources/magic_network_monitoring/test_configs.py index 684b9811710..47cd42f94e8 100644 --- a/tests/api_resources/magic_network_monitoring/test_configs.py +++ b/tests/api_resources/magic_network_monitoring/test_configs.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.magic_network_monitoring import MagicVisibilityMNMConfig +from cloudflare.types.magic_network_monitoring import MagicNetworkMonitoringConfig base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_create(self, client: Cloudflare) -> None: config = client.magic_network_monitoring.configs.create( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -35,7 +35,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -47,7 +47,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -65,7 +65,7 @@ def test_method_update(self, client: Cloudflare) -> None: config = client.magic_network_monitoring.configs.update( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -77,7 +77,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -89,7 +89,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -107,7 +107,7 @@ def test_method_delete(self, client: Cloudflare) -> None: config = client.magic_network_monitoring.configs.delete( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -119,7 +119,7 @@ def test_raw_response_delete(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -131,7 +131,7 @@ def test_streaming_response_delete(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -149,7 +149,7 @@ def test_method_edit(self, client: Cloudflare) -> None: config = client.magic_network_monitoring.configs.edit( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -161,7 +161,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -191,7 +191,7 @@ def test_method_get(self, client: Cloudflare) -> None: config = client.magic_network_monitoring.configs.get( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -203,7 +203,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -215,7 +215,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -237,7 +237,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: config = await async_client.magic_network_monitoring.configs.create( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -249,7 +249,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -261,7 +261,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -279,7 +279,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: config = await async_client.magic_network_monitoring.configs.update( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -291,7 +291,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -303,7 +303,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -321,7 +321,7 @@ async def test_method_delete(self, async_client: AsyncCloudflare) -> None: config = await async_client.magic_network_monitoring.configs.delete( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -333,7 +333,7 @@ async def test_raw_response_delete(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -345,7 +345,7 @@ async def test_streaming_response_delete(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -363,7 +363,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: config = await async_client.magic_network_monitoring.configs.edit( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -375,7 +375,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -387,7 +387,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) assert cast(Any, response.is_closed) is True @@ -405,7 +405,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: config = await async_client.magic_network_monitoring.configs.get( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -417,7 +417,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) @pytest.mark.skip() @parametrize @@ -429,7 +429,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" config = await response.parse() - assert_matches_type(MagicVisibilityMNMConfig, config, path=["response"]) + assert_matches_type(MagicNetworkMonitoringConfig, config, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/magic_network_monitoring/test_rules.py b/tests/api_resources/magic_network_monitoring/test_rules.py index 0e4b85296b0..fde54d8a3f9 100644 --- a/tests/api_resources/magic_network_monitoring/test_rules.py +++ b/tests/api_resources/magic_network_monitoring/test_rules.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.magic_network_monitoring import RuleListResponse, MagicVisibilityMNMRule +from cloudflare.types.magic_network_monitoring import RuleListResponse, MagicNetworkMonitoringRule base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_create(self, client: Cloudflare) -> None: rule = client.magic_network_monitoring.rules.create( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -35,7 +35,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -47,7 +47,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -65,7 +65,7 @@ def test_method_update(self, client: Cloudflare) -> None: rule = client.magic_network_monitoring.rules.update( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -77,7 +77,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -89,7 +89,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -150,7 +150,7 @@ def test_method_delete(self, client: Cloudflare) -> None: "2890e6fa406311ed9b5a23f70f6fb8cf", account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -163,7 +163,7 @@ def test_raw_response_delete(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -176,7 +176,7 @@ def test_streaming_response_delete(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -202,7 +202,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "2890e6fa406311ed9b5a23f70f6fb8cf", account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -215,7 +215,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -228,7 +228,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -254,7 +254,7 @@ def test_method_get(self, client: Cloudflare) -> None: "2890e6fa406311ed9b5a23f70f6fb8cf", account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -267,7 +267,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -280,7 +280,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -309,7 +309,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: rule = await async_client.magic_network_monitoring.rules.create( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -321,7 +321,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -333,7 +333,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -351,7 +351,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: rule = await async_client.magic_network_monitoring.rules.update( account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -363,7 +363,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -375,7 +375,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -436,7 +436,7 @@ async def test_method_delete(self, async_client: AsyncCloudflare) -> None: "2890e6fa406311ed9b5a23f70f6fb8cf", account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -449,7 +449,7 @@ async def test_raw_response_delete(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -462,7 +462,7 @@ async def test_streaming_response_delete(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -488,7 +488,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "2890e6fa406311ed9b5a23f70f6fb8cf", account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -501,7 +501,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -514,7 +514,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -540,7 +540,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "2890e6fa406311ed9b5a23f70f6fb8cf", account_id="6f91088a406011ed95aed352566e8d4c", ) - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -553,7 +553,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -566,7 +566,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" rule = await response.parse() - assert_matches_type(Optional[MagicVisibilityMNMRule], rule, path=["response"]) + assert_matches_type(Optional[MagicNetworkMonitoringRule], rule, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/origin_tls_client_auth/hostnames/test_certificates.py b/tests/api_resources/origin_tls_client_auth/hostnames/test_certificates.py index 046e5613ffa..e4b70f13e45 100644 --- a/tests/api_resources/origin_tls_client_auth/hostnames/test_certificates.py +++ b/tests/api_resources/origin_tls_client_auth/hostnames/test_certificates.py @@ -11,7 +11,7 @@ from tests.utils import assert_matches_type from cloudflare.types.origin_tls_client_auth.hostnames import ( CertificateListResponse, - TLSCertificatesAndHostnamesSchemasCertificateObject, + OriginTLSClientCertificate, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -28,7 +28,7 @@ def test_method_create(self, client: Cloudflare) -> None: certificate="-----BEGIN CERTIFICATE-----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\nYbjM2rxXiyLGxB4Bol7QTv4zHif7Zt89FReT/NBy4rzaskDJY5L6xmY=\n-----END CERTIFICATE-----\n", private_key="-----BEGIN RSA PRIVATE KEY-----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\nlv6XTQaMyf6n1yjzL+fzDrH3qXMxHMO/b13EePXpDMpY7HQpoLDi\n-----END RSA PRIVATE KEY-----\n", ) - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -42,7 +42,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -56,7 +56,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -119,7 +119,7 @@ def test_method_delete(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -132,7 +132,7 @@ def test_raw_response_delete(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -145,7 +145,7 @@ def test_streaming_response_delete(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -171,7 +171,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -184,7 +184,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -197,7 +197,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -228,7 +228,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: certificate="-----BEGIN CERTIFICATE-----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\nYbjM2rxXiyLGxB4Bol7QTv4zHif7Zt89FReT/NBy4rzaskDJY5L6xmY=\n-----END CERTIFICATE-----\n", private_key="-----BEGIN RSA PRIVATE KEY-----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\nlv6XTQaMyf6n1yjzL+fzDrH3qXMxHMO/b13EePXpDMpY7HQpoLDi\n-----END RSA PRIVATE KEY-----\n", ) - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -242,7 +242,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -256,7 +256,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -319,7 +319,7 @@ async def test_method_delete(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -332,7 +332,7 @@ async def test_raw_response_delete(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -345,7 +345,7 @@ async def test_streaming_response_delete(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -371,7 +371,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -384,7 +384,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -397,7 +397,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesSchemasCertificateObject, certificate, path=["response"]) + assert_matches_type(OriginTLSClientCertificate, certificate, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/origin_tls_client_auth/test_hostnames.py b/tests/api_resources/origin_tls_client_auth/test_hostnames.py index a1aa0ef25ee..1cbcd2e6440 100644 --- a/tests/api_resources/origin_tls_client_auth/test_hostnames.py +++ b/tests/api_resources/origin_tls_client_auth/test_hostnames.py @@ -11,7 +11,7 @@ from tests.utils import assert_matches_type from cloudflare.types.origin_tls_client_auth import ( HostnameUpdateResponse, - TLSCertificatesAndHostnamesHostnameCertidObject, + OriginTLSClientCertificateID, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -73,7 +73,7 @@ def test_method_get(self, client: Cloudflare) -> None: "app.example.com", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesHostnameCertidObject, hostname, path=["response"]) + assert_matches_type(OriginTLSClientCertificateID, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -86,7 +86,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameCertidObject, hostname, path=["response"]) + assert_matches_type(OriginTLSClientCertificateID, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -99,7 +99,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameCertidObject, hostname, path=["response"]) + assert_matches_type(OriginTLSClientCertificateID, hostname, path=["response"]) assert cast(Any, response.is_closed) is True @@ -175,7 +175,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "app.example.com", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesHostnameCertidObject, hostname, path=["response"]) + assert_matches_type(OriginTLSClientCertificateID, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -188,7 +188,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameCertidObject, hostname, path=["response"]) + assert_matches_type(OriginTLSClientCertificateID, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -201,7 +201,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesHostnameCertidObject, hostname, path=["response"]) + assert_matches_type(OriginTLSClientCertificateID, hostname, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/page_shield/test_policies.py b/tests/api_resources/page_shield/test_policies.py index ab8a6908786..c531d102cdf 100644 --- a/tests/api_resources/page_shield/test_policies.py +++ b/tests/api_resources/page_shield/test_policies.py @@ -10,8 +10,8 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.page_shield import ( + PageShieldPolicy, PolicyListResponse, - PageShieldPageshieldPolicy, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -26,7 +26,7 @@ def test_method_create(self, client: Cloudflare) -> None: policy = client.page_shield.policies.create( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: expression='ends_with(http.request.uri.path, "/checkout")', value="script-src 'none';", ) - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -51,7 +51,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -63,7 +63,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -82,7 +82,7 @@ def test_method_update(self, client: Cloudflare) -> None: "c9ef84a6bf5e47138c75d95e2f933e8f", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -96,7 +96,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: expression='ends_with(http.request.uri.path, "/checkout")', value="script-src 'none';", ) - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -109,7 +109,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -122,7 +122,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -242,7 +242,7 @@ def test_method_get(self, client: Cloudflare) -> None: "c9ef84a6bf5e47138c75d95e2f933e8f", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -255,7 +255,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -268,7 +268,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -297,7 +297,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: policy = await async_client.page_shield.policies.create( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -310,7 +310,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare expression='ends_with(http.request.uri.path, "/checkout")', value="script-src 'none';", ) - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -322,7 +322,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -334,7 +334,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -353,7 +353,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: "c9ef84a6bf5e47138c75d95e2f933e8f", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -367,7 +367,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare expression='ends_with(http.request.uri.path, "/checkout")', value="script-src 'none';", ) - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -380,7 +380,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -393,7 +393,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -513,7 +513,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "c9ef84a6bf5e47138c75d95e2f933e8f", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -526,7 +526,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -539,7 +539,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(PageShieldPageshieldPolicy, policy, path=["response"]) + assert_matches_type(PageShieldPolicy, policy, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/pagerules/test_settings.py b/tests/api_resources/pagerules/test_settings.py index 0ce1835d63f..47bfe3f3456 100644 --- a/tests/api_resources/pagerules/test_settings.py +++ b/tests/api_resources/pagerules/test_settings.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.pagerules import ZonesSettings +from cloudflare.types.pagerules import ZonePageruleSettings base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_list(self, client: Cloudflare) -> None: setting = client.pagerules.settings.list( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(ZonesSettings, setting, path=["response"]) + assert_matches_type(ZonePageruleSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -35,7 +35,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = response.parse() - assert_matches_type(ZonesSettings, setting, path=["response"]) + assert_matches_type(ZonePageruleSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -47,7 +47,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = response.parse() - assert_matches_type(ZonesSettings, setting, path=["response"]) + assert_matches_type(ZonePageruleSettings, setting, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: setting = await async_client.pagerules.settings.list( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(ZonesSettings, setting, path=["response"]) + assert_matches_type(ZonePageruleSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = await response.parse() - assert_matches_type(ZonesSettings, setting, path=["response"]) + assert_matches_type(ZonePageruleSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = await response.parse() - assert_matches_type(ZonesSettings, setting, path=["response"]) + assert_matches_type(ZonePageruleSettings, setting, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/ssl/universal/test_settings.py b/tests/api_resources/ssl/universal/test_settings.py index 755252038f5..027e556f715 100644 --- a/tests/api_resources/ssl/universal/test_settings.py +++ b/tests/api_resources/ssl/universal/test_settings.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.ssl.universal import TLSCertificatesAndHostnamesUniversal +from cloudflare.types.ssl.universal import UniversalSSLSettings base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_edit(self, client: Cloudflare) -> None: setting = client.ssl.universal.settings.edit( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -32,7 +32,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", enabled=True, ) - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -44,7 +44,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -56,7 +56,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) assert cast(Any, response.is_closed) is True @@ -74,7 +74,7 @@ def test_method_get(self, client: Cloudflare) -> None: setting = client.ssl.universal.settings.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -86,7 +86,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -98,7 +98,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) assert cast(Any, response.is_closed) is True @@ -120,7 +120,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: setting = await async_client.ssl.universal.settings.edit( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) zone_id="023e105f4ecef8ad9ca31a8372d0c353", enabled=True, ) - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -141,7 +141,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -153,7 +153,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) assert cast(Any, response.is_closed) is True @@ -171,7 +171,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: setting = await async_client.ssl.universal.settings.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -183,7 +183,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -195,7 +195,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesUniversal, setting, path=["response"]) + assert_matches_type(UniversalSSLSettings, setting, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/stream/test_audio_tracks.py b/tests/api_resources/stream/test_audio_tracks.py index a344883e943..ed0b79fd777 100644 --- a/tests/api_resources/stream/test_audio_tracks.py +++ b/tests/api_resources/stream/test_audio_tracks.py @@ -10,8 +10,8 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.stream import ( + StreamAudio, AudioTrackGetResponse, - StreamAdditionalAudio, AudioTrackDeleteResponse, ) @@ -93,7 +93,7 @@ def test_method_copy(self, client: Cloudflare) -> None: account_id="023e105f4ecef8ad9ca31a8372d0c353", label="director commentary", ) - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -104,7 +104,7 @@ def test_method_copy_with_all_params(self, client: Cloudflare) -> None: label="director commentary", url="https://www.examplestorage.com/audio_file.mp3", ) - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -118,7 +118,7 @@ def test_raw_response_copy(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" audio_track = response.parse() - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -132,7 +132,7 @@ def test_streaming_response_copy(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" audio_track = response.parse() - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ def test_method_edit(self, client: Cloudflare) -> None: account_id="023e105f4ecef8ad9ca31a8372d0c353", identifier="ea95132c15732412d22c1476fa83f27a", ) - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: default=True, label="director commentary", ) - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -187,7 +187,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" audio_track = response.parse() - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -201,7 +201,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" audio_track = response.parse() - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) assert cast(Any, response.is_closed) is True @@ -357,7 +357,7 @@ async def test_method_copy(self, async_client: AsyncCloudflare) -> None: account_id="023e105f4ecef8ad9ca31a8372d0c353", label="director commentary", ) - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -368,7 +368,7 @@ async def test_method_copy_with_all_params(self, async_client: AsyncCloudflare) label="director commentary", url="https://www.examplestorage.com/audio_file.mp3", ) - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -382,7 +382,7 @@ async def test_raw_response_copy(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" audio_track = await response.parse() - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -396,7 +396,7 @@ async def test_streaming_response_copy(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" audio_track = await response.parse() - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) assert cast(Any, response.is_closed) is True @@ -425,7 +425,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: account_id="023e105f4ecef8ad9ca31a8372d0c353", identifier="ea95132c15732412d22c1476fa83f27a", ) - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -437,7 +437,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) default=True, label="director commentary", ) - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -451,7 +451,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" audio_track = await response.parse() - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) @pytest.mark.skip() @parametrize @@ -465,7 +465,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" audio_track = await response.parse() - assert_matches_type(StreamAdditionalAudio, audio_track, path=["response"]) + assert_matches_type(StreamAudio, audio_track, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_client_certificates.py b/tests/api_resources/test_client_certificates.py index c4e871cc374..1f3fb7fbd8f 100644 --- a/tests/api_resources/test_client_certificates.py +++ b/tests/api_resources/test_client_certificates.py @@ -9,9 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types import ( - TLSCertificatesAndHostnamesClientCertificate, -) +from cloudflare.types import ClientCertificate from cloudflare.pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -28,7 +26,7 @@ def test_method_create(self, client: Cloudflare) -> None: csr="-----BEGIN CERTIFICATE REQUEST-----\nMIICY....\n-----END CERTIFICATE REQUEST-----\n", validity_days=3650, ) - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -42,7 +40,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -56,7 +54,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -76,11 +74,7 @@ def test_method_list(self, client: Cloudflare) -> None: client_certificate = client.client_certificates.list( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type( - SyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], - client_certificate, - path=["response"], - ) + assert_matches_type(SyncV4PagePaginationArray[ClientCertificate], client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,11 +87,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: per_page=5, status="all", ) - assert_matches_type( - SyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], - client_certificate, - path=["response"], - ) + assert_matches_type(SyncV4PagePaginationArray[ClientCertificate], client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -109,11 +99,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = response.parse() - assert_matches_type( - SyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], - client_certificate, - path=["response"], - ) + assert_matches_type(SyncV4PagePaginationArray[ClientCertificate], client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -125,11 +111,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = response.parse() - assert_matches_type( - SyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], - client_certificate, - path=["response"], - ) + assert_matches_type(SyncV4PagePaginationArray[ClientCertificate], client_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -148,7 +130,7 @@ def test_method_delete(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -161,7 +143,7 @@ def test_raw_response_delete(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -174,7 +156,7 @@ def test_streaming_response_delete(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -200,7 +182,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -213,7 +195,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -226,7 +208,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -252,7 +234,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -265,7 +247,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -278,7 +260,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -309,7 +291,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: csr="-----BEGIN CERTIFICATE REQUEST-----\nMIICY....\n-----END CERTIFICATE REQUEST-----\n", validity_days=3650, ) - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -323,7 +305,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -337,7 +319,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -357,11 +339,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: client_certificate = await async_client.client_certificates.list( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type( - AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], - client_certificate, - path=["response"], - ) + assert_matches_type(AsyncV4PagePaginationArray[ClientCertificate], client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -374,11 +352,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) per_page=5, status="all", ) - assert_matches_type( - AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], - client_certificate, - path=["response"], - ) + assert_matches_type(AsyncV4PagePaginationArray[ClientCertificate], client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -390,11 +364,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = await response.parse() - assert_matches_type( - AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], - client_certificate, - path=["response"], - ) + assert_matches_type(AsyncV4PagePaginationArray[ClientCertificate], client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -406,11 +376,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = await response.parse() - assert_matches_type( - AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesClientCertificate], - client_certificate, - path=["response"], - ) + assert_matches_type(AsyncV4PagePaginationArray[ClientCertificate], client_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -429,7 +395,7 @@ async def test_method_delete(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -442,7 +408,7 @@ async def test_raw_response_delete(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -455,7 +421,7 @@ async def test_streaming_response_delete(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -481,7 +447,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -494,7 +460,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -507,7 +473,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -533,7 +499,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -546,7 +512,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -559,7 +525,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" client_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesClientCertificate, client_certificate, path=["response"]) + assert_matches_type(ClientCertificate, client_certificate, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_custom_certificates.py b/tests/api_resources/test_custom_certificates.py index e5c7d131965..139dc561d9a 100644 --- a/tests/api_resources/test_custom_certificates.py +++ b/tests/api_resources/test_custom_certificates.py @@ -10,11 +10,11 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types import ( + CustomCertificate, CustomCertificateGetResponse, CustomCertificateEditResponse, CustomCertificateCreateResponse, CustomCertificateDeleteResponse, - TLSCertificatesAndHostnamesCustomCertificate, ) from cloudflare.pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray @@ -94,11 +94,7 @@ def test_method_list(self, client: Cloudflare) -> None: custom_certificate = client.custom_certificates.list( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type( - SyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], - custom_certificate, - path=["response"], - ) + assert_matches_type(SyncV4PagePaginationArray[CustomCertificate], custom_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -109,11 +105,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: page=1, per_page=5, ) - assert_matches_type( - SyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], - custom_certificate, - path=["response"], - ) + assert_matches_type(SyncV4PagePaginationArray[CustomCertificate], custom_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -125,11 +117,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_certificate = response.parse() - assert_matches_type( - SyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], - custom_certificate, - path=["response"], - ) + assert_matches_type(SyncV4PagePaginationArray[CustomCertificate], custom_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -141,11 +129,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_certificate = response.parse() - assert_matches_type( - SyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], - custom_certificate, - path=["response"], - ) + assert_matches_type(SyncV4PagePaginationArray[CustomCertificate], custom_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -401,11 +385,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: custom_certificate = await async_client.custom_certificates.list( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type( - AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], - custom_certificate, - path=["response"], - ) + assert_matches_type(AsyncV4PagePaginationArray[CustomCertificate], custom_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -416,11 +396,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) page=1, per_page=5, ) - assert_matches_type( - AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], - custom_certificate, - path=["response"], - ) + assert_matches_type(AsyncV4PagePaginationArray[CustomCertificate], custom_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -432,11 +408,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_certificate = await response.parse() - assert_matches_type( - AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], - custom_certificate, - path=["response"], - ) + assert_matches_type(AsyncV4PagePaginationArray[CustomCertificate], custom_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -448,11 +420,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_certificate = await response.parse() - assert_matches_type( - AsyncV4PagePaginationArray[TLSCertificatesAndHostnamesCustomCertificate], - custom_certificate, - path=["response"], - ) + assert_matches_type(AsyncV4PagePaginationArray[CustomCertificate], custom_certificate, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_custom_nameservers.py b/tests/api_resources/test_custom_nameservers.py index d93759bde30..28b14dca1e2 100644 --- a/tests/api_resources/test_custom_nameservers.py +++ b/tests/api_resources/test_custom_nameservers.py @@ -10,8 +10,8 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types import ( + CustomNameserver, CustomNameserverGetResponse, - DNSCustomNameserversCustomNS, CustomNameserverDeleteResponse, CustomNameserverVerifyResponse, CustomNameserverAvailabiltyResponse, @@ -30,7 +30,7 @@ def test_method_create(self, client: Cloudflare) -> None: account_id="372e67954025e0ba6aaa6d586b9e0b59", ns_name="ns1.example.com", ) - assert_matches_type(DNSCustomNameserversCustomNS, custom_nameserver, path=["response"]) + assert_matches_type(CustomNameserver, custom_nameserver, path=["response"]) @pytest.mark.skip() @parametrize @@ -40,7 +40,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: ns_name="ns1.example.com", ns_set=1, ) - assert_matches_type(DNSCustomNameserversCustomNS, custom_nameserver, path=["response"]) + assert_matches_type(CustomNameserver, custom_nameserver, path=["response"]) @pytest.mark.skip() @parametrize @@ -53,7 +53,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_nameserver = response.parse() - assert_matches_type(DNSCustomNameserversCustomNS, custom_nameserver, path=["response"]) + assert_matches_type(CustomNameserver, custom_nameserver, path=["response"]) @pytest.mark.skip() @parametrize @@ -66,7 +66,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_nameserver = response.parse() - assert_matches_type(DNSCustomNameserversCustomNS, custom_nameserver, path=["response"]) + assert_matches_type(CustomNameserver, custom_nameserver, path=["response"]) assert cast(Any, response.is_closed) is True @@ -268,7 +268,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: account_id="372e67954025e0ba6aaa6d586b9e0b59", ns_name="ns1.example.com", ) - assert_matches_type(DNSCustomNameserversCustomNS, custom_nameserver, path=["response"]) + assert_matches_type(CustomNameserver, custom_nameserver, path=["response"]) @pytest.mark.skip() @parametrize @@ -278,7 +278,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare ns_name="ns1.example.com", ns_set=1, ) - assert_matches_type(DNSCustomNameserversCustomNS, custom_nameserver, path=["response"]) + assert_matches_type(CustomNameserver, custom_nameserver, path=["response"]) @pytest.mark.skip() @parametrize @@ -291,7 +291,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_nameserver = await response.parse() - assert_matches_type(DNSCustomNameserversCustomNS, custom_nameserver, path=["response"]) + assert_matches_type(CustomNameserver, custom_nameserver, path=["response"]) @pytest.mark.skip() @parametrize @@ -304,7 +304,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_nameserver = await response.parse() - assert_matches_type(DNSCustomNameserversCustomNS, custom_nameserver, path=["response"]) + assert_matches_type(CustomNameserver, custom_nameserver, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_dnssec.py b/tests/api_resources/test_dnssec.py index 2e7b46d29d4..9e45b478ef2 100644 --- a/tests/api_resources/test_dnssec.py +++ b/tests/api_resources/test_dnssec.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types import DNSSECDNSSEC, DNSSECDeleteResponse +from cloudflare.types import DNSSEC, DNSSECDeleteResponse base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -65,7 +65,7 @@ def test_method_edit(self, client: Cloudflare) -> None: dnssec = client.dnssec.edit( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) @pytest.mark.skip() @parametrize @@ -76,7 +76,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: dnssec_presigned=True, status="active", ) - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) @pytest.mark.skip() @parametrize @@ -88,7 +88,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" dnssec = response.parse() - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) @pytest.mark.skip() @parametrize @@ -100,7 +100,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" dnssec = response.parse() - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) assert cast(Any, response.is_closed) is True @@ -118,7 +118,7 @@ def test_method_get(self, client: Cloudflare) -> None: dnssec = client.dnssec.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) @pytest.mark.skip() @parametrize @@ -130,7 +130,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" dnssec = response.parse() - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" dnssec = response.parse() - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) assert cast(Any, response.is_closed) is True @@ -206,7 +206,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: dnssec = await async_client.dnssec.edit( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) @pytest.mark.skip() @parametrize @@ -217,7 +217,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) dnssec_presigned=True, status="active", ) - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) @pytest.mark.skip() @parametrize @@ -229,7 +229,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" dnssec = await response.parse() - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) @pytest.mark.skip() @parametrize @@ -241,7 +241,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" dnssec = await response.parse() - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) assert cast(Any, response.is_closed) is True @@ -259,7 +259,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: dnssec = await async_client.dnssec.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) @pytest.mark.skip() @parametrize @@ -271,7 +271,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" dnssec = await response.parse() - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) @pytest.mark.skip() @parametrize @@ -283,7 +283,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" dnssec = await response.parse() - assert_matches_type(DNSSECDNSSEC, dnssec, path=["response"]) + assert_matches_type(DNSSEC, dnssec, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_filters.py b/tests/api_resources/test_filters.py index b8ddc874a6e..dfd37057490 100644 --- a/tests/api_resources/test_filters.py +++ b/tests/api_resources/test_filters.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types import ( - LegacyJhsFilter, + FirewallFilter, FilterCreateResponse, ) from cloudflare.pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray @@ -75,7 +75,7 @@ def test_method_update(self, client: Cloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -89,7 +89,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -103,7 +103,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) assert cast(Any, response.is_closed) is True @@ -130,7 +130,7 @@ def test_method_list(self, client: Cloudflare) -> None: filter = client.filters.list( "023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -144,7 +144,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: per_page=5, ref="FIL-100", ) - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -156,7 +156,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = response.parse() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -168,7 +168,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = response.parse() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallFilter], filter, path=["response"]) assert cast(Any, response.is_closed) is True @@ -187,7 +187,7 @@ def test_method_delete(self, client: Cloudflare) -> None: "372e67954025e0ba6aaa6d586b9e0b61", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -200,7 +200,7 @@ def test_raw_response_delete(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -213,7 +213,7 @@ def test_streaming_response_delete(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) assert cast(Any, response.is_closed) is True @@ -239,7 +239,7 @@ def test_method_get(self, client: Cloudflare) -> None: "372e67954025e0ba6aaa6d586b9e0b61", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -252,7 +252,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -265,7 +265,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) assert cast(Any, response.is_closed) is True @@ -342,7 +342,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", body={}, ) - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -356,7 +356,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = await response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -370,7 +370,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = await response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) assert cast(Any, response.is_closed) is True @@ -397,7 +397,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: filter = await async_client.filters.list( "023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -411,7 +411,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) per_page=5, ref="FIL-100", ) - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -423,7 +423,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -435,7 +435,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallFilter], filter, path=["response"]) assert cast(Any, response.is_closed) is True @@ -454,7 +454,7 @@ async def test_method_delete(self, async_client: AsyncCloudflare) -> None: "372e67954025e0ba6aaa6d586b9e0b61", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -467,7 +467,7 @@ async def test_raw_response_delete(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = await response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -480,7 +480,7 @@ async def test_streaming_response_delete(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = await response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) assert cast(Any, response.is_closed) is True @@ -506,7 +506,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "372e67954025e0ba6aaa6d586b9e0b61", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -519,7 +519,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = await response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -532,7 +532,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = await response.parse() - assert_matches_type(Optional[LegacyJhsFilter], filter, path=["response"]) + assert_matches_type(Optional[FirewallFilter], filter, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_healthchecks.py b/tests/api_resources/test_healthchecks.py index f6e27537930..15fff51ea85 100644 --- a/tests/api_resources/test_healthchecks.py +++ b/tests/api_resources/test_healthchecks.py @@ -10,8 +10,8 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types import ( + Healthcheck, HealthcheckListResponse, - HealthchecksHealthchecks, HealthcheckDeleteResponse, ) @@ -29,7 +29,7 @@ def test_method_create(self, client: Cloudflare) -> None: address="www.example.com", name="server-1", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -65,7 +65,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: healthcheck_timeout=0, type="HTTPS", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -79,7 +79,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ def test_method_update(self, client: Cloudflare) -> None: address="www.example.com", name="server-1", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -153,7 +153,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: healthcheck_timeout=0, type="HTTPS", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -168,7 +168,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -183,7 +183,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) assert cast(Any, response.is_closed) is True @@ -309,7 +309,7 @@ def test_method_edit(self, client: Cloudflare) -> None: address="www.example.com", name="server-1", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -346,7 +346,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: healthcheck_timeout=0, type="HTTPS", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -361,7 +361,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -376,7 +376,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) assert cast(Any, response.is_closed) is True @@ -406,7 +406,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -419,7 +419,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -432,7 +432,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) assert cast(Any, response.is_closed) is True @@ -463,7 +463,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: address="www.example.com", name="server-1", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -499,7 +499,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare healthcheck_timeout=0, type="HTTPS", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -513,7 +513,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = await response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -527,7 +527,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = await response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) assert cast(Any, response.is_closed) is True @@ -550,7 +550,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: address="www.example.com", name="server-1", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -587,7 +587,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare healthcheck_timeout=0, type="HTTPS", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -602,7 +602,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = await response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -617,7 +617,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = await response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) assert cast(Any, response.is_closed) is True @@ -743,7 +743,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: address="www.example.com", name="server-1", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -780,7 +780,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) healthcheck_timeout=0, type="HTTPS", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -795,7 +795,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = await response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -810,7 +810,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = await response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) assert cast(Any, response.is_closed) is True @@ -840,7 +840,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -853,7 +853,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = await response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) @pytest.mark.skip() @parametrize @@ -866,7 +866,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" healthcheck = await response.parse() - assert_matches_type(HealthchecksHealthchecks, healthcheck, path=["response"]) + assert_matches_type(Healthcheck, healthcheck, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_keyless_certificates.py b/tests/api_resources/test_keyless_certificates.py index 935738235ef..61398a313e3 100644 --- a/tests/api_resources/test_keyless_certificates.py +++ b/tests/api_resources/test_keyless_certificates.py @@ -10,8 +10,8 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types import ( + KeylessCertificateHostname, KeylessCertificateListResponse, - TLSCertificatesAndHostnamesBase, KeylessCertificateDeleteResponse, ) @@ -30,7 +30,7 @@ def test_method_create(self, client: Cloudflare) -> None: host="example.com", port=24008, ) - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -47,7 +47,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: "vnet_id": "7365377a-85a4-4390-9480-531ef7dc7a3c", }, ) - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -62,7 +62,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -77,7 +77,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -195,7 +195,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -212,7 +212,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "vnet_id": "7365377a-85a4-4390-9480-531ef7dc7a3c", }, ) - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -225,7 +225,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -238,7 +238,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -266,7 +266,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -279,7 +279,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -292,7 +292,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -326,7 +326,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: host="example.com", port=24008, ) - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -343,7 +343,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare "vnet_id": "7365377a-85a4-4390-9480-531ef7dc7a3c", }, ) - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -358,7 +358,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -373,7 +373,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -491,7 +491,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -508,7 +508,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "vnet_id": "7365377a-85a4-4390-9480-531ef7dc7a3c", }, ) - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -521,7 +521,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -534,7 +534,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -562,7 +562,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -575,7 +575,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -588,7 +588,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" keyless_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesBase, keyless_certificate, path=["response"]) + assert_matches_type(KeylessCertificateHostname, keyless_certificate, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_mtls_certificates.py b/tests/api_resources/test_mtls_certificates.py index 0f2bcab94d0..e3cdca8326b 100644 --- a/tests/api_resources/test_mtls_certificates.py +++ b/tests/api_resources/test_mtls_certificates.py @@ -10,9 +10,9 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types import ( + MTLSCertificate, + MTLSCertificateUpdate, MTLSCertificateListResponse, - TLSCertificatesAndHostnamesCertificateObjectPost, - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -29,7 +29,7 @@ def test_method_create(self, client: Cloudflare) -> None: ca=True, certificates="-----BEGIN CERTIFICATE-----\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\n-----END CERTIFICATE-----", ) - assert_matches_type(TLSCertificatesAndHostnamesCertificateObjectPost, mtls_certificate, path=["response"]) + assert_matches_type(MTLSCertificateUpdate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -41,7 +41,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: name="example_ca_cert", private_key="-----BEGIN PRIVATE KEY-----\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\n-----END PRIVATE KEY-----", ) - assert_matches_type(TLSCertificatesAndHostnamesCertificateObjectPost, mtls_certificate, path=["response"]) + assert_matches_type(MTLSCertificateUpdate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -55,7 +55,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesCertificateObjectPost, mtls_certificate, path=["response"]) + assert_matches_type(MTLSCertificateUpdate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -69,7 +69,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = response.parse() - assert_matches_type(TLSCertificatesAndHostnamesCertificateObjectPost, mtls_certificate, path=["response"]) + assert_matches_type(MTLSCertificateUpdate, mtls_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -132,9 +132,7 @@ def test_method_delete(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -147,9 +145,7 @@ def test_raw_response_delete(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = response.parse() - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -162,9 +158,7 @@ def test_streaming_response_delete(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = response.parse() - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -190,9 +184,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -205,9 +197,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = response.parse() - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -220,9 +210,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = response.parse() - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -253,7 +241,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: ca=True, certificates="-----BEGIN CERTIFICATE-----\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\n-----END CERTIFICATE-----", ) - assert_matches_type(TLSCertificatesAndHostnamesCertificateObjectPost, mtls_certificate, path=["response"]) + assert_matches_type(MTLSCertificateUpdate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -265,7 +253,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare name="example_ca_cert", private_key="-----BEGIN PRIVATE KEY-----\nMIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDEXDkcICRU3XBv9hiiPnBWIjgTQyowmVFxDr11mONgZB/cMYjE/OvQjvnpwNcOaSK16MOpAjNbELKRx2lZiVJaLRDCccqCxXwP/CrdRChcqGzo7mbNksMlcidrErb0LlEBKLFC2QjRmRKqB+YOs4TD8WsZu2S667A2fZmjRlaqOxFi1h62ee0P+TLU628UC/nl41JifSt5Evt7hMDHakemdwZblNYr2p6T3NQjdhjYXTtP4UmOGJBhJ7i7Kicg3d3CIgdTMbggSeGWqjndr4ldVnD96FN3cVT5uDFsn2CJXTFgdeBWoUnMS4VnUZzPWGf4vSBXC8qV7Ls+w46yT7T1AgMBAAECggEAQZnp/oqCeNPOR6l5S2L+1tfx0gWjZ78hJVteUpZ0iHSK7F6kKeOxyOird7vUXV0kmo+cJq+0hp0Ke4eam640FCpwKfYoSQ4/R3vgujGWJnaihCN5tv5sMet0XeJPuz5qE7ALoKCvwI6aXLHs20aAeZIDTQJ9QbGSGnJVzOWn+JDTidIgZpN57RpXfSAwnJPTQK/PN8i5z108hsaDOdEgGmxYZ7kYqMqzX20KXmth58LDfPixs5JGtS60iiKC/wOcGzkB2/AdTSojR76oEU77cANP/3zO25NG//whUdYlW0t0d7PgXxIeJe+xgYnamDQJx3qonVyt4H77ha0ObRAj9QKBgQDicZr+VTwFMnELP3a+FXGnjehRiuS1i7MXGKxNweCD+dFlML0FplSQS8Ro2n+d8lu8BBXGx0qm6VXu8Rhn7TAUL6q+PCgfarzxfIhacb/TZCqfieIHsMlVBfhV5HCXnk+kis0tuC/PRArcWTwDHJUJXkBhvkUsNswvQzavDPI7KwKBgQDd/WgLkj7A3X5fgIHZH/GbDSBiXwzKb+rF4ZCT2XFgG/OAW7vapfcX/w+v+5lBLyrocmOAS3PGGAhM5T3HLnUCQfnK4qgps1Lqibkc9Tmnsn60LanUjuUMsYv/zSw70tozbzhJ0pioEpWfRxRZBztO2Rr8Ntm7h6Fk701EXGNAXwKBgQCD1xsjy2J3sCerIdcz0u5qXLAPkeuZW+34m4/ucdwTWwc0gEz9lhsULFj9p4G351zLuiEnq+7mAWLcDJlmIO3mQt6JhiLiL9Y0T4pgBmxmWqKKYtAsJB0EmMY+1BNN44mBRqMxZFTJu1cLdhT/xstrOeoIPqytknYNanfTMZlzIwKBgHrLXe5oq0XMP8dcMneEcAUwsaU4pr6kQd3L9EmUkl5zl7J9C+DaxWAEuwzBw/iGutlxzRB+rD/7szu14wJ29EqXbDGKRzMp+se5/yfBjm7xEZ1hVPw7PwBShfqt57X/4Ktq7lwHnmH6RcGhc+P7WBc5iO/S94YAdIp8xOT3pf9JAoGAE0QkqJUY+5Mgr+fBO0VNV72ZoPveGpW+De59uhKAOnu1zljQCUtk59m6+DXfm0tNYKtawa5n8iN71Zh+s62xXSt3pYi1Y5CCCmv8Y4BhwIcPwXKk3zEvLgSHVTpC0bayA9aSO4bbZgVXa5w+Z0w/vvfp9DWo1IS3EnQRrz6WMYA=\n-----END PRIVATE KEY-----", ) - assert_matches_type(TLSCertificatesAndHostnamesCertificateObjectPost, mtls_certificate, path=["response"]) + assert_matches_type(MTLSCertificateUpdate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -279,7 +267,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesCertificateObjectPost, mtls_certificate, path=["response"]) + assert_matches_type(MTLSCertificateUpdate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -293,7 +281,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = await response.parse() - assert_matches_type(TLSCertificatesAndHostnamesCertificateObjectPost, mtls_certificate, path=["response"]) + assert_matches_type(MTLSCertificateUpdate, mtls_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -356,9 +344,7 @@ async def test_method_delete(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -371,9 +357,7 @@ async def test_raw_response_delete(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = await response.parse() - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -386,9 +370,7 @@ async def test_streaming_response_delete(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = await response.parse() - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -414,9 +396,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", account_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -429,9 +409,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = await response.parse() - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -444,9 +422,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" mtls_certificate = await response.parse() - assert_matches_type( - TLSCertificatesAndHostnamesComponentsSchemasCertificateObject, mtls_certificate, path=["response"] - ) + assert_matches_type(MTLSCertificate, mtls_certificate, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_page_shield.py b/tests/api_resources/test_page_shield.py index a6dd2b7fe2a..f8bbeaa1a85 100644 --- a/tests/api_resources/test_page_shield.py +++ b/tests/api_resources/test_page_shield.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types import PageShieldGetZoneSettings, PageShieldUpdateZoneSettings +from cloudflare.types import PageShieldSetting, PageShieldUpdateResponse base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_update(self, client: Cloudflare) -> None: page_shield = client.page_shield.update( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(PageShieldUpdateZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldUpdateResponse, page_shield, path=["response"]) @pytest.mark.skip() @parametrize @@ -34,7 +34,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: use_cloudflare_reporting_endpoint=True, use_connection_url_path=True, ) - assert_matches_type(PageShieldUpdateZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldUpdateResponse, page_shield, path=["response"]) @pytest.mark.skip() @parametrize @@ -46,7 +46,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" page_shield = response.parse() - assert_matches_type(PageShieldUpdateZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldUpdateResponse, page_shield, path=["response"]) @pytest.mark.skip() @parametrize @@ -58,7 +58,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" page_shield = response.parse() - assert_matches_type(PageShieldUpdateZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldUpdateResponse, page_shield, path=["response"]) assert cast(Any, response.is_closed) is True @@ -76,7 +76,7 @@ def test_method_get(self, client: Cloudflare) -> None: page_shield = client.page_shield.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(PageShieldGetZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldSetting, page_shield, path=["response"]) @pytest.mark.skip() @parametrize @@ -88,7 +88,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" page_shield = response.parse() - assert_matches_type(PageShieldGetZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldSetting, page_shield, path=["response"]) @pytest.mark.skip() @parametrize @@ -100,7 +100,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" page_shield = response.parse() - assert_matches_type(PageShieldGetZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldSetting, page_shield, path=["response"]) assert cast(Any, response.is_closed) is True @@ -122,7 +122,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: page_shield = await async_client.page_shield.update( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(PageShieldUpdateZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldUpdateResponse, page_shield, path=["response"]) @pytest.mark.skip() @parametrize @@ -133,7 +133,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare use_cloudflare_reporting_endpoint=True, use_connection_url_path=True, ) - assert_matches_type(PageShieldUpdateZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldUpdateResponse, page_shield, path=["response"]) @pytest.mark.skip() @parametrize @@ -145,7 +145,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" page_shield = await response.parse() - assert_matches_type(PageShieldUpdateZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldUpdateResponse, page_shield, path=["response"]) @pytest.mark.skip() @parametrize @@ -157,7 +157,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" page_shield = await response.parse() - assert_matches_type(PageShieldUpdateZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldUpdateResponse, page_shield, path=["response"]) assert cast(Any, response.is_closed) is True @@ -175,7 +175,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: page_shield = await async_client.page_shield.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(PageShieldGetZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldSetting, page_shield, path=["response"]) @pytest.mark.skip() @parametrize @@ -187,7 +187,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" page_shield = await response.parse() - assert_matches_type(PageShieldGetZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldSetting, page_shield, path=["response"]) @pytest.mark.skip() @parametrize @@ -199,7 +199,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" page_shield = await response.parse() - assert_matches_type(PageShieldGetZoneSettings, page_shield, path=["response"]) + assert_matches_type(PageShieldSetting, page_shield, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_plans.py b/tests/api_resources/test_plans.py index 46e615a6e8a..06a9beb548f 100644 --- a/tests/api_resources/test_plans.py +++ b/tests/api_resources/test_plans.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types import PlanListResponse, BillSubsAPIAvailableRatePlan +from cloudflare.types import PlanListResponse, AvailableRatePlan base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -66,7 +66,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(BillSubsAPIAvailableRatePlan, plan, path=["response"]) + assert_matches_type(AvailableRatePlan, plan, path=["response"]) @pytest.mark.skip() @parametrize @@ -79,7 +79,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" plan = response.parse() - assert_matches_type(BillSubsAPIAvailableRatePlan, plan, path=["response"]) + assert_matches_type(AvailableRatePlan, plan, path=["response"]) @pytest.mark.skip() @parametrize @@ -92,7 +92,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" plan = response.parse() - assert_matches_type(BillSubsAPIAvailableRatePlan, plan, path=["response"]) + assert_matches_type(AvailableRatePlan, plan, path=["response"]) assert cast(Any, response.is_closed) is True @@ -164,7 +164,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(BillSubsAPIAvailableRatePlan, plan, path=["response"]) + assert_matches_type(AvailableRatePlan, plan, path=["response"]) @pytest.mark.skip() @parametrize @@ -177,7 +177,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" plan = await response.parse() - assert_matches_type(BillSubsAPIAvailableRatePlan, plan, path=["response"]) + assert_matches_type(AvailableRatePlan, plan, path=["response"]) @pytest.mark.skip() @parametrize @@ -190,7 +190,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" plan = await response.parse() - assert_matches_type(BillSubsAPIAvailableRatePlan, plan, path=["response"]) + assert_matches_type(AvailableRatePlan, plan, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/test_waiting_rooms.py b/tests/api_resources/test_waiting_rooms.py index 2630e4cca3f..610dd7a3ab8 100644 --- a/tests/api_resources/test_waiting_rooms.py +++ b/tests/api_resources/test_waiting_rooms.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types import ( - WaitingroomWaitingroom, + WaitingRoom, WaitingRoomListResponse, WaitingRoomDeleteResponse, ) @@ -31,7 +31,7 @@ def test_method_create(self, client: Cloudflare) -> None: new_users_per_minute=200, total_active_users=200, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -73,7 +73,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: session_duration=1, suspended=True, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -89,7 +89,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -105,7 +105,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) assert cast(Any, response.is_closed) is True @@ -132,7 +132,7 @@ def test_method_update(self, client: Cloudflare) -> None: new_users_per_minute=200, total_active_users=200, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -175,7 +175,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: session_duration=1, suspended=True, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -192,7 +192,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -209,7 +209,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) assert cast(Any, response.is_closed) is True @@ -341,7 +341,7 @@ def test_method_edit(self, client: Cloudflare) -> None: new_users_per_minute=200, total_active_users=200, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -384,7 +384,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: session_duration=1, suspended=True, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -401,7 +401,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -418,7 +418,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) assert cast(Any, response.is_closed) is True @@ -452,7 +452,7 @@ def test_method_get(self, client: Cloudflare) -> None: "699d98642c564d2e855e9661899b7252", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -465,7 +465,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -478,7 +478,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) assert cast(Any, response.is_closed) is True @@ -511,7 +511,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: new_users_per_minute=200, total_active_users=200, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -553,7 +553,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare session_duration=1, suspended=True, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -569,7 +569,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = await response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -585,7 +585,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = await response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) assert cast(Any, response.is_closed) is True @@ -612,7 +612,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: new_users_per_minute=200, total_active_users=200, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -655,7 +655,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare session_duration=1, suspended=True, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -672,7 +672,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = await response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -689,7 +689,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = await response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) assert cast(Any, response.is_closed) is True @@ -821,7 +821,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: new_users_per_minute=200, total_active_users=200, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -864,7 +864,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) session_duration=1, suspended=True, ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -881,7 +881,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = await response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -898,7 +898,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = await response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) assert cast(Any, response.is_closed) is True @@ -932,7 +932,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "699d98642c564d2e855e9661899b7252", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -945,7 +945,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = await response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) @pytest.mark.skip() @parametrize @@ -958,7 +958,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" waiting_room = await response.parse() - assert_matches_type(WaitingroomWaitingroom, waiting_room, path=["response"]) + assert_matches_type(WaitingRoom, waiting_room, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/user/firewall/test_access_rules.py b/tests/api_resources/user/firewall/test_access_rules.py index bab166c1867..a20ec3c2db9 100644 --- a/tests/api_resources/user/firewall/test_access_rules.py +++ b/tests/api_resources/user/firewall/test_access_rules.py @@ -11,7 +11,7 @@ from tests.utils import assert_matches_type from cloudflare.pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray from cloudflare.types.user.firewall import ( - LegacyJhsRule, + FirewallRule, AccessRuleDeleteResponse, ) @@ -28,7 +28,7 @@ def test_method_create(self, client: Cloudflare) -> None: configuration={}, mode="challenge", ) - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -41,7 +41,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: mode="challenge", notes="This rule is enabled because of an event that occurred on date X.", ) - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -54,7 +54,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = response.parse() - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -67,7 +67,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = response.parse() - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -75,7 +75,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: @parametrize def test_method_list(self, client: Cloudflare) -> None: access_rule = client.user.firewall.access_rules.list() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -99,7 +99,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: page=1, per_page=20, ) - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -109,7 +109,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = response.parse() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -119,7 +119,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = response.parse() - assert_matches_type(SyncV4PagePaginationArray[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[FirewallRule], access_rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -171,7 +171,7 @@ def test_method_edit(self, client: Cloudflare) -> None: access_rule = client.user.firewall.access_rules.edit( "92f17202ed8bd63d69a66b86a49a8f6b", ) - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -181,7 +181,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: mode="challenge", notes="This rule is enabled because of an event that occurred on date X.", ) - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -193,7 +193,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = response.parse() - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -205,7 +205,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = response.parse() - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -228,7 +228,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: configuration={}, mode="challenge", ) - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -241,7 +241,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare mode="challenge", notes="This rule is enabled because of an event that occurred on date X.", ) - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -254,7 +254,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = await response.parse() - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -267,7 +267,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = await response.parse() - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -275,7 +275,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> @parametrize async def test_method_list(self, async_client: AsyncCloudflare) -> None: access_rule = await async_client.user.firewall.access_rules.list() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -299,7 +299,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) page=1, per_page=20, ) - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -309,7 +309,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -319,7 +319,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[FirewallRule], access_rule, path=["response"]) assert cast(Any, response.is_closed) is True @@ -371,7 +371,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: access_rule = await async_client.user.firewall.access_rules.edit( "92f17202ed8bd63d69a66b86a49a8f6b", ) - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -381,7 +381,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) mode="challenge", notes="This rule is enabled because of an event that occurred on date X.", ) - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -393,7 +393,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = await response.parse() - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) @pytest.mark.skip() @parametrize @@ -405,7 +405,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" access_rule = await response.parse() - assert_matches_type(Optional[LegacyJhsRule], access_rule, path=["response"]) + assert_matches_type(Optional[FirewallRule], access_rule, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/user/load_balancers/test_preview.py b/tests/api_resources/user/load_balancers/test_preview.py index a91db725c8c..a5da3f9e2c9 100644 --- a/tests/api_resources/user/load_balancers/test_preview.py +++ b/tests/api_resources/user/load_balancers/test_preview.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.user.load_balancers import LoadBalancingPreviewResult +from cloudflare.types.user.load_balancers import LoadBalancingPreview base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_get(self, client: Cloudflare) -> None: preview = client.user.load_balancers.preview.get( "f1aba936b94213e5b8dca0c0dbf1f9cc", ) - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -35,7 +35,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = response.parse() - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -47,7 +47,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = response.parse() - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: preview = await async_client.user.load_balancers.preview.get( "f1aba936b94213e5b8dca0c0dbf1f9cc", ) - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = await response.parse() - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" preview = await response.parse() - assert_matches_type(LoadBalancingPreviewResult, preview, path=["response"]) + assert_matches_type(LoadBalancingPreview, preview, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/user/test_organizations.py b/tests/api_resources/user/test_organizations.py index 8158bae1594..b0b008cc682 100644 --- a/tests/api_resources/user/test_organizations.py +++ b/tests/api_resources/user/test_organizations.py @@ -11,7 +11,7 @@ from tests.utils import assert_matches_type from cloudflare.pagination import SyncV4PagePaginationArray, AsyncV4PagePaginationArray from cloudflare.types.user import ( - IamOrganization, + Organization, OrganizationGetResponse, OrganizationDeleteResponse, ) @@ -26,7 +26,7 @@ class TestOrganizations: @parametrize def test_method_list(self, client: Cloudflare) -> None: organization = client.user.organizations.list() - assert_matches_type(SyncV4PagePaginationArray[IamOrganization], organization, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[Organization], organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -40,7 +40,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: per_page=5, status="member", ) - assert_matches_type(SyncV4PagePaginationArray[IamOrganization], organization, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[Organization], organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = response.parse() - assert_matches_type(SyncV4PagePaginationArray[IamOrganization], organization, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[Organization], organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -60,7 +60,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = response.parse() - assert_matches_type(SyncV4PagePaginationArray[IamOrganization], organization, path=["response"]) + assert_matches_type(SyncV4PagePaginationArray[Organization], organization, path=["response"]) assert cast(Any, response.is_closed) is True @@ -156,7 +156,7 @@ class TestAsyncOrganizations: @parametrize async def test_method_list(self, async_client: AsyncCloudflare) -> None: organization = await async_client.user.organizations.list() - assert_matches_type(AsyncV4PagePaginationArray[IamOrganization], organization, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[Organization], organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -170,7 +170,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) per_page=5, status="member", ) - assert_matches_type(AsyncV4PagePaginationArray[IamOrganization], organization, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[Organization], organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -180,7 +180,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[IamOrganization], organization, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[Organization], organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -190,7 +190,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = await response.parse() - assert_matches_type(AsyncV4PagePaginationArray[IamOrganization], organization, path=["response"]) + assert_matches_type(AsyncV4PagePaginationArray[Organization], organization, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/waiting_rooms/events/test_details.py b/tests/api_resources/waiting_rooms/events/test_details.py index 53a6bc6939d..0de30ba6d50 100644 --- a/tests/api_resources/waiting_rooms/events/test_details.py +++ b/tests/api_resources/waiting_rooms/events/test_details.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.waiting_rooms.events import WaitingroomEventDetailsResult +from cloudflare.types.waiting_rooms.events import WaitingroomEventDetails base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -25,7 +25,7 @@ def test_method_get(self, client: Cloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", waiting_room_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(WaitingroomEventDetailsResult, detail, path=["response"]) + assert_matches_type(WaitingroomEventDetails, detail, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" detail = response.parse() - assert_matches_type(WaitingroomEventDetailsResult, detail, path=["response"]) + assert_matches_type(WaitingroomEventDetails, detail, path=["response"]) @pytest.mark.skip() @parametrize @@ -53,7 +53,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" detail = response.parse() - assert_matches_type(WaitingroomEventDetailsResult, detail, path=["response"]) + assert_matches_type(WaitingroomEventDetails, detail, path=["response"]) assert cast(Any, response.is_closed) is True @@ -93,7 +93,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", waiting_room_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(WaitingroomEventDetailsResult, detail, path=["response"]) + assert_matches_type(WaitingroomEventDetails, detail, path=["response"]) @pytest.mark.skip() @parametrize @@ -107,7 +107,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" detail = await response.parse() - assert_matches_type(WaitingroomEventDetailsResult, detail, path=["response"]) + assert_matches_type(WaitingroomEventDetails, detail, path=["response"]) @pytest.mark.skip() @parametrize @@ -121,7 +121,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" detail = await response.parse() - assert_matches_type(WaitingroomEventDetailsResult, detail, path=["response"]) + assert_matches_type(WaitingroomEventDetails, detail, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/waiting_rooms/test_events.py b/tests/api_resources/waiting_rooms/test_events.py index c72975b9a31..b74a62410d6 100644 --- a/tests/api_resources/waiting_rooms/test_events.py +++ b/tests/api_resources/waiting_rooms/test_events.py @@ -10,9 +10,9 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.waiting_rooms import ( + WaitingroomEvent, EventListResponse, EventDeleteResponse, - WaitingroomEventResult, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -31,7 +31,7 @@ def test_method_create(self, client: Cloudflare) -> None: event_start_time="2021-09-28T15:30:00.000Z", name="production_webinar_event", ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -53,7 +53,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: suspended=True, total_active_users=200, ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -69,7 +69,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -85,7 +85,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) assert cast(Any, response.is_closed) is True @@ -121,7 +121,7 @@ def test_method_update(self, client: Cloudflare) -> None: event_start_time="2021-09-28T15:30:00.000Z", name="production_webinar_event", ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -144,7 +144,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: suspended=True, total_active_users=200, ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -161,7 +161,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -178,7 +178,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) assert cast(Any, response.is_closed) is True @@ -342,7 +342,7 @@ def test_method_edit(self, client: Cloudflare) -> None: event_start_time="2021-09-28T15:30:00.000Z", name="production_webinar_event", ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -365,7 +365,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: suspended=True, total_active_users=200, ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -382,7 +382,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -399,7 +399,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) assert cast(Any, response.is_closed) is True @@ -444,7 +444,7 @@ def test_method_get(self, client: Cloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", waiting_room_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -458,7 +458,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -472,7 +472,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) assert cast(Any, response.is_closed) is True @@ -514,7 +514,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: event_start_time="2021-09-28T15:30:00.000Z", name="production_webinar_event", ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -536,7 +536,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare suspended=True, total_active_users=200, ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -552,7 +552,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = await response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -568,7 +568,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = await response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) assert cast(Any, response.is_closed) is True @@ -604,7 +604,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: event_start_time="2021-09-28T15:30:00.000Z", name="production_webinar_event", ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -627,7 +627,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare suspended=True, total_active_users=200, ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -644,7 +644,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = await response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -661,7 +661,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = await response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) assert cast(Any, response.is_closed) is True @@ -825,7 +825,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: event_start_time="2021-09-28T15:30:00.000Z", name="production_webinar_event", ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -848,7 +848,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) suspended=True, total_active_users=200, ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -865,7 +865,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = await response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -882,7 +882,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = await response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) assert cast(Any, response.is_closed) is True @@ -927,7 +927,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", waiting_room_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -941,7 +941,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = await response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) @pytest.mark.skip() @parametrize @@ -955,7 +955,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" event = await response.parse() - assert_matches_type(WaitingroomEventResult, event, path=["response"]) + assert_matches_type(WaitingroomEvent, event, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/web3/hostnames/ipfs_universal_paths/content_lists/test_entries.py b/tests/api_resources/web3/hostnames/ipfs_universal_paths/content_lists/test_entries.py index e83f727f654..fea633985d2 100644 --- a/tests/api_resources/web3/hostnames/ipfs_universal_paths/content_lists/test_entries.py +++ b/tests/api_resources/web3/hostnames/ipfs_universal_paths/content_lists/test_entries.py @@ -12,7 +12,7 @@ from cloudflare.types.web3.hostnames.ipfs_universal_paths.content_lists import ( EntryListResponse, EntryDeleteResponse, - DwebConfigContentListEntry, + DistributedWebConfigContentListEntry, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -30,7 +30,7 @@ def test_method_create(self, client: Cloudflare) -> None: content="QmPZ9gcCEpqKTo6aq61g2nXGUhM4iCL3ewB6LDXZCtioEB", type="cid", ) - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -42,7 +42,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: type="cid", description="this is my content list entry", ) - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -57,7 +57,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -72,7 +72,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) assert cast(Any, response.is_closed) is True @@ -105,7 +105,7 @@ def test_method_update(self, client: Cloudflare) -> None: content="QmPZ9gcCEpqKTo6aq61g2nXGUhM4iCL3ewB6LDXZCtioEB", type="cid", ) - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -118,7 +118,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: type="cid", description="this is my content list entry", ) - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -134,7 +134,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -150,7 +150,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) assert cast(Any, response.is_closed) is True @@ -312,7 +312,7 @@ def test_method_get(self, client: Cloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -326,7 +326,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -340,7 +340,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) assert cast(Any, response.is_closed) is True @@ -383,7 +383,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: content="QmPZ9gcCEpqKTo6aq61g2nXGUhM4iCL3ewB6LDXZCtioEB", type="cid", ) - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -395,7 +395,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare type="cid", description="this is my content list entry", ) - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -412,7 +412,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = await response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -427,7 +427,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = await response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) assert cast(Any, response.is_closed) is True @@ -460,7 +460,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: content="QmPZ9gcCEpqKTo6aq61g2nXGUhM4iCL3ewB6LDXZCtioEB", type="cid", ) - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -473,7 +473,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare type="cid", description="this is my content list entry", ) - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -491,7 +491,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = await response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -507,7 +507,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = await response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) assert cast(Any, response.is_closed) is True @@ -671,7 +671,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -685,7 +685,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = await response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) @pytest.mark.skip() @parametrize @@ -699,7 +699,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" entry = await response.parse() - assert_matches_type(DwebConfigContentListEntry, entry, path=["response"]) + assert_matches_type(DistributedWebConfigContentListEntry, entry, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/web3/hostnames/ipfs_universal_paths/test_content_lists.py b/tests/api_resources/web3/hostnames/ipfs_universal_paths/test_content_lists.py index 88971d819cb..62cab2a7d3a 100644 --- a/tests/api_resources/web3/hostnames/ipfs_universal_paths/test_content_lists.py +++ b/tests/api_resources/web3/hostnames/ipfs_universal_paths/test_content_lists.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.web3.hostnames.ipfs_universal_paths import ( - DwebConfigContentListDetails, + DistributedWebConfigContentList, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -28,7 +28,7 @@ def test_method_update(self, client: Cloudflare) -> None: action="block", entries=[{}, {}, {}], ) - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) @pytest.mark.skip() @parametrize @@ -43,7 +43,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" content_list = response.parse() - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) @pytest.mark.skip() @parametrize @@ -58,7 +58,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" content_list = response.parse() - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) assert cast(Any, response.is_closed) is True @@ -88,7 +88,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) @pytest.mark.skip() @parametrize @@ -101,7 +101,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" content_list = response.parse() - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) @pytest.mark.skip() @parametrize @@ -114,7 +114,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" content_list = response.parse() - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) assert cast(Any, response.is_closed) is True @@ -146,7 +146,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: action="block", entries=[{}, {}, {}], ) - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) @pytest.mark.skip() @parametrize @@ -161,7 +161,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" content_list = await response.parse() - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) @pytest.mark.skip() @parametrize @@ -176,7 +176,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" content_list = await response.parse() - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) assert cast(Any, response.is_closed) is True @@ -206,7 +206,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) @pytest.mark.skip() @parametrize @@ -219,7 +219,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" content_list = await response.parse() - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) @pytest.mark.skip() @parametrize @@ -232,7 +232,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" content_list = await response.parse() - assert_matches_type(DwebConfigContentListDetails, content_list, path=["response"]) + assert_matches_type(DistributedWebConfigContentList, content_list, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/web3/test_hostnames.py b/tests/api_resources/web3/test_hostnames.py index 8bcd33047a8..ea1c6bc3f40 100644 --- a/tests/api_resources/web3/test_hostnames.py +++ b/tests/api_resources/web3/test_hostnames.py @@ -11,7 +11,7 @@ from tests.utils import assert_matches_type from cloudflare.types.web3 import ( HostnameListResponse, - DwebConfigWeb3Hostname, + DistributedWebHostname, HostnameDeleteResponse, ) @@ -28,7 +28,7 @@ def test_method_create(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", target="ipfs", ) - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: description="This is my IPFS gateway.", dnslink="/ipns/onboarding.ipfs.cloudflare.com", ) - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -52,7 +52,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -65,7 +65,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) assert cast(Any, response.is_closed) is True @@ -179,7 +179,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -190,7 +190,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: description="This is my IPFS gateway.", dnslink="/ipns/onboarding.ipfs.cloudflare.com", ) - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -203,7 +203,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -216,7 +216,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) assert cast(Any, response.is_closed) is True @@ -242,7 +242,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -255,7 +255,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -268,7 +268,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) assert cast(Any, response.is_closed) is True @@ -298,7 +298,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", target="ipfs", ) - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -309,7 +309,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare description="This is my IPFS gateway.", dnslink="/ipns/onboarding.ipfs.cloudflare.com", ) - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -322,7 +322,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = await response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -335,7 +335,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = await response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) assert cast(Any, response.is_closed) is True @@ -449,7 +449,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -460,7 +460,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) description="This is my IPFS gateway.", dnslink="/ipns/onboarding.ipfs.cloudflare.com", ) - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -473,7 +473,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = await response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -486,7 +486,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = await response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) assert cast(Any, response.is_closed) is True @@ -512,7 +512,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -525,7 +525,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = await response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) @pytest.mark.skip() @parametrize @@ -538,7 +538,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" hostname = await response.parse() - assert_matches_type(DwebConfigWeb3Hostname, hostname, path=["response"]) + assert_matches_type(DistributedWebHostname, hostname, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/workers/test_filters.py b/tests/api_resources/workers/test_filters.py index 8932ac5c98d..b8cc1e4144a 100644 --- a/tests/api_resources/workers/test_filters.py +++ b/tests/api_resources/workers/test_filters.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.workers import ( - WorkersFilters, + WorkersFilter, FilterListResponse, FilterCreateResponse, FilterDeleteResponse, @@ -81,7 +81,7 @@ def test_method_update(self, client: Cloudflare) -> None: enabled=True, pattern="example.net/*", ) - assert_matches_type(WorkersFilters, filter, path=["response"]) + assert_matches_type(WorkersFilter, filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -96,7 +96,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = response.parse() - assert_matches_type(WorkersFilters, filter, path=["response"]) + assert_matches_type(WorkersFilter, filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -111,7 +111,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = response.parse() - assert_matches_type(WorkersFilters, filter, path=["response"]) + assert_matches_type(WorkersFilter, filter, path=["response"]) assert cast(Any, response.is_closed) is True @@ -291,7 +291,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: enabled=True, pattern="example.net/*", ) - assert_matches_type(WorkersFilters, filter, path=["response"]) + assert_matches_type(WorkersFilter, filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -306,7 +306,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = await response.parse() - assert_matches_type(WorkersFilters, filter, path=["response"]) + assert_matches_type(WorkersFilter, filter, path=["response"]) @pytest.mark.skip() @parametrize @@ -321,7 +321,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" filter = await response.parse() - assert_matches_type(WorkersFilters, filter, path=["response"]) + assert_matches_type(WorkersFilter, filter, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/workers/test_routes.py b/tests/api_resources/workers/test_routes.py index 370c18dd419..7fc7824e396 100644 --- a/tests/api_resources/workers/test_routes.py +++ b/tests/api_resources/workers/test_routes.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.workers import ( - WorkersRoutes, + WorkersRoute, RouteListResponse, RouteCreateResponse, RouteDeleteResponse, @@ -86,7 +86,7 @@ def test_method_update(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", pattern="example.net/*", ) - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) @pytest.mark.skip() @parametrize @@ -97,7 +97,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: pattern="example.net/*", script="this-is_my_script-01", ) - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) @pytest.mark.skip() @parametrize @@ -111,7 +111,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" route = response.parse() - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) @pytest.mark.skip() @parametrize @@ -125,7 +125,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" route = response.parse() - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) assert cast(Any, response.is_closed) is True @@ -247,7 +247,7 @@ def test_method_get(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) @pytest.mark.skip() @parametrize @@ -260,7 +260,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" route = response.parse() - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) @pytest.mark.skip() @parametrize @@ -273,7 +273,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" route = response.parse() - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) assert cast(Any, response.is_closed) is True @@ -360,7 +360,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", pattern="example.net/*", ) - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) @pytest.mark.skip() @parametrize @@ -371,7 +371,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare pattern="example.net/*", script="this-is_my_script-01", ) - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) @pytest.mark.skip() @parametrize @@ -385,7 +385,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" route = await response.parse() - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) @pytest.mark.skip() @parametrize @@ -399,7 +399,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" route = await response.parse() - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) assert cast(Any, response.is_closed) is True @@ -521,7 +521,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) @pytest.mark.skip() @parametrize @@ -534,7 +534,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" route = await response.parse() - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) @pytest.mark.skip() @parametrize @@ -547,7 +547,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" route = await response.parse() - assert_matches_type(WorkersRoutes, route, path=["response"]) + assert_matches_type(WorkersRoute, route, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/workers_for_platforms/dispatch/namespaces/test_scripts.py b/tests/api_resources/workers_for_platforms/dispatch/namespaces/test_scripts.py index 7e6c865df3c..6689db85892 100644 --- a/tests/api_resources/workers_for_platforms/dispatch/namespaces/test_scripts.py +++ b/tests/api_resources/workers_for_platforms/dispatch/namespaces/test_scripts.py @@ -11,7 +11,7 @@ from tests.utils import assert_matches_type from cloudflare.types.workers import WorkersScript from cloudflare.types.workers_for_platforms.dispatch.namespaces import ( - WorkersNamespaceScript, + WorkersForPlatformsNamespaceScript, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -326,7 +326,7 @@ def test_method_get(self, client: Cloudflare) -> None: account_id="023e105f4ecef8ad9ca31a8372d0c353", dispatch_namespace="my-dispatch-namespace", ) - assert_matches_type(WorkersNamespaceScript, script, path=["response"]) + assert_matches_type(WorkersForPlatformsNamespaceScript, script, path=["response"]) @pytest.mark.skip() @parametrize @@ -340,7 +340,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" script = response.parse() - assert_matches_type(WorkersNamespaceScript, script, path=["response"]) + assert_matches_type(WorkersForPlatformsNamespaceScript, script, path=["response"]) @pytest.mark.skip() @parametrize @@ -354,7 +354,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" script = response.parse() - assert_matches_type(WorkersNamespaceScript, script, path=["response"]) + assert_matches_type(WorkersForPlatformsNamespaceScript, script, path=["response"]) assert cast(Any, response.is_closed) is True @@ -692,7 +692,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: account_id="023e105f4ecef8ad9ca31a8372d0c353", dispatch_namespace="my-dispatch-namespace", ) - assert_matches_type(WorkersNamespaceScript, script, path=["response"]) + assert_matches_type(WorkersForPlatformsNamespaceScript, script, path=["response"]) @pytest.mark.skip() @parametrize @@ -706,7 +706,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" script = await response.parse() - assert_matches_type(WorkersNamespaceScript, script, path=["response"]) + assert_matches_type(WorkersForPlatformsNamespaceScript, script, path=["response"]) @pytest.mark.skip() @parametrize @@ -720,7 +720,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" script = await response.parse() - assert_matches_type(WorkersNamespaceScript, script, path=["response"]) + assert_matches_type(WorkersForPlatformsNamespaceScript, script, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/access/applications/test_policies.py b/tests/api_resources/zero_trust/access/applications/test_policies.py index e5d3e901d42..a61a2e24960 100644 --- a/tests/api_resources/zero_trust/access/applications/test_policies.py +++ b/tests/api_resources/zero_trust/access/applications/test_policies.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust.access.applications import ( - AccessPolicies, + ZeroTrustPolicies, PolicyListResponse, PolicyDeleteResponse, ) @@ -36,7 +36,7 @@ def test_method_create(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: ], session_duration="24h", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -102,7 +102,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -123,7 +123,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -188,7 +188,7 @@ def test_method_update(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -234,7 +234,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: ], session_duration="24h", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -256,7 +256,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -278,7 +278,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -517,7 +517,7 @@ def test_method_get(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -528,7 +528,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -543,7 +543,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -558,7 +558,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -616,7 +616,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -661,7 +661,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare ], session_duration="24h", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -682,7 +682,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -703,7 +703,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -768,7 +768,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -814,7 +814,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare ], session_duration="24h", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -836,7 +836,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -858,7 +858,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1097,7 +1097,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -1108,7 +1108,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - account_id="string", zone_id="string", ) - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -1123,7 +1123,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -1138,7 +1138,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(AccessPolicies, policy, path=["response"]) + assert_matches_type(ZeroTrustPolicies, policy, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/access/test_applications.py b/tests/api_resources/zero_trust/access/test_applications.py index edb66e5d907..cd481f558e1 100644 --- a/tests/api_resources/zero_trust/access/test_applications.py +++ b/tests/api_resources/zero_trust/access/test_applications.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust.access import ( - AccessApps, + ZeroTrustApps, ApplicationListResponse, ApplicationDeleteResponse, ) @@ -30,7 +30,7 @@ def test_method_create_overload_1(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -78,7 +78,7 @@ def test_method_create_with_all_params_overload_1(self, client: Cloudflare) -> N skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_raw_response_create_overload_1(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -108,7 +108,7 @@ def test_streaming_response_create_overload_1(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -138,7 +138,7 @@ def test_method_create_overload_2(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -180,7 +180,7 @@ def test_method_create_with_all_params_overload_2(self, client: Cloudflare) -> N tags=["engineers", "engineers", "engineers"], type="saas", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -193,7 +193,7 @@ def test_raw_response_create_overload_2(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -206,7 +206,7 @@ def test_streaming_response_create_overload_2(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -234,7 +234,7 @@ def test_method_create_overload_3(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -282,7 +282,7 @@ def test_method_create_with_all_params_overload_3(self, client: Cloudflare) -> N skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -297,7 +297,7 @@ def test_raw_response_create_overload_3(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -312,7 +312,7 @@ def test_streaming_response_create_overload_3(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -344,7 +344,7 @@ def test_method_create_overload_4(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -392,7 +392,7 @@ def test_method_create_with_all_params_overload_4(self, client: Cloudflare) -> N skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -407,7 +407,7 @@ def test_raw_response_create_overload_4(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -422,7 +422,7 @@ def test_streaming_response_create_overload_4(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -453,7 +453,7 @@ def test_method_create_overload_5(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -470,7 +470,7 @@ def test_method_create_with_all_params_overload_5(self, client: Cloudflare) -> N auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -484,7 +484,7 @@ def test_raw_response_create_overload_5(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -498,7 +498,7 @@ def test_streaming_response_create_overload_5(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -527,7 +527,7 @@ def test_method_create_overload_6(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -544,7 +544,7 @@ def test_method_create_with_all_params_overload_6(self, client: Cloudflare) -> N auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -558,7 +558,7 @@ def test_raw_response_create_overload_6(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -572,7 +572,7 @@ def test_streaming_response_create_overload_6(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -601,7 +601,7 @@ def test_method_create_overload_7(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -618,7 +618,7 @@ def test_method_create_with_all_params_overload_7(self, client: Cloudflare) -> N auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -632,7 +632,7 @@ def test_raw_response_create_overload_7(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -646,7 +646,7 @@ def test_streaming_response_create_overload_7(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -674,7 +674,7 @@ def test_method_create_overload_8(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -689,7 +689,7 @@ def test_method_create_with_all_params_overload_8(self, client: Cloudflare) -> N tags=["engineers", "engineers", "engineers"], type="bookmark", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -702,7 +702,7 @@ def test_raw_response_create_overload_8(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -715,7 +715,7 @@ def test_streaming_response_create_overload_8(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -744,7 +744,7 @@ def test_method_update_overload_1(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -793,7 +793,7 @@ def test_method_update_with_all_params_overload_1(self, client: Cloudflare) -> N skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -809,7 +809,7 @@ def test_raw_response_update_overload_1(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -825,7 +825,7 @@ def test_streaming_response_update_overload_1(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -858,7 +858,7 @@ def test_method_update_overload_2(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -901,7 +901,7 @@ def test_method_update_with_all_params_overload_2(self, client: Cloudflare) -> N tags=["engineers", "engineers", "engineers"], type="saas", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -915,7 +915,7 @@ def test_raw_response_update_overload_2(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -929,7 +929,7 @@ def test_streaming_response_update_overload_2(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -960,7 +960,7 @@ def test_method_update_overload_3(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1009,7 +1009,7 @@ def test_method_update_with_all_params_overload_3(self, client: Cloudflare) -> N skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1025,7 +1025,7 @@ def test_raw_response_update_overload_3(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1041,7 +1041,7 @@ def test_streaming_response_update_overload_3(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1076,7 +1076,7 @@ def test_method_update_overload_4(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1125,7 +1125,7 @@ def test_method_update_with_all_params_overload_4(self, client: Cloudflare) -> N skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1141,7 +1141,7 @@ def test_raw_response_update_overload_4(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1157,7 +1157,7 @@ def test_streaming_response_update_overload_4(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1191,7 +1191,7 @@ def test_method_update_overload_5(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1209,7 +1209,7 @@ def test_method_update_with_all_params_overload_5(self, client: Cloudflare) -> N auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1224,7 +1224,7 @@ def test_raw_response_update_overload_5(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1239,7 +1239,7 @@ def test_streaming_response_update_overload_5(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1271,7 +1271,7 @@ def test_method_update_overload_6(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1289,7 +1289,7 @@ def test_method_update_with_all_params_overload_6(self, client: Cloudflare) -> N auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1304,7 +1304,7 @@ def test_raw_response_update_overload_6(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1319,7 +1319,7 @@ def test_streaming_response_update_overload_6(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1351,7 +1351,7 @@ def test_method_update_overload_7(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1369,7 +1369,7 @@ def test_method_update_with_all_params_overload_7(self, client: Cloudflare) -> N auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1384,7 +1384,7 @@ def test_raw_response_update_overload_7(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1399,7 +1399,7 @@ def test_streaming_response_update_overload_7(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1430,7 +1430,7 @@ def test_method_update_overload_8(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1446,7 +1446,7 @@ def test_method_update_with_all_params_overload_8(self, client: Cloudflare) -> N tags=["engineers", "engineers", "engineers"], type="bookmark", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1460,7 +1460,7 @@ def test_raw_response_update_overload_8(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1474,7 +1474,7 @@ def test_streaming_response_update_overload_8(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1631,7 +1631,7 @@ def test_method_get(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1641,7 +1641,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1655,7 +1655,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1669,7 +1669,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1770,7 +1770,7 @@ async def test_method_create_overload_1(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1818,7 +1818,7 @@ async def test_method_create_with_all_params_overload_1(self, async_client: Asyn skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1833,7 +1833,7 @@ async def test_raw_response_create_overload_1(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1848,7 +1848,7 @@ async def test_streaming_response_create_overload_1(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1878,7 +1878,7 @@ async def test_method_create_overload_2(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1920,7 +1920,7 @@ async def test_method_create_with_all_params_overload_2(self, async_client: Asyn tags=["engineers", "engineers", "engineers"], type="saas", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1933,7 +1933,7 @@ async def test_raw_response_create_overload_2(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -1946,7 +1946,7 @@ async def test_streaming_response_create_overload_2(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1974,7 +1974,7 @@ async def test_method_create_overload_3(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2022,7 +2022,7 @@ async def test_method_create_with_all_params_overload_3(self, async_client: Asyn skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2037,7 +2037,7 @@ async def test_raw_response_create_overload_3(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2052,7 +2052,7 @@ async def test_streaming_response_create_overload_3(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2084,7 +2084,7 @@ async def test_method_create_overload_4(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2132,7 +2132,7 @@ async def test_method_create_with_all_params_overload_4(self, async_client: Asyn skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2147,7 +2147,7 @@ async def test_raw_response_create_overload_4(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2162,7 +2162,7 @@ async def test_streaming_response_create_overload_4(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2193,7 +2193,7 @@ async def test_method_create_overload_5(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2210,7 +2210,7 @@ async def test_method_create_with_all_params_overload_5(self, async_client: Asyn auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2224,7 +2224,7 @@ async def test_raw_response_create_overload_5(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2238,7 +2238,7 @@ async def test_streaming_response_create_overload_5(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2267,7 +2267,7 @@ async def test_method_create_overload_6(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2284,7 +2284,7 @@ async def test_method_create_with_all_params_overload_6(self, async_client: Asyn auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2298,7 +2298,7 @@ async def test_raw_response_create_overload_6(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2312,7 +2312,7 @@ async def test_streaming_response_create_overload_6(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2341,7 +2341,7 @@ async def test_method_create_overload_7(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2358,7 +2358,7 @@ async def test_method_create_with_all_params_overload_7(self, async_client: Asyn auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2372,7 +2372,7 @@ async def test_raw_response_create_overload_7(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2386,7 +2386,7 @@ async def test_streaming_response_create_overload_7(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2414,7 +2414,7 @@ async def test_method_create_overload_8(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2429,7 +2429,7 @@ async def test_method_create_with_all_params_overload_8(self, async_client: Asyn tags=["engineers", "engineers", "engineers"], type="bookmark", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2442,7 +2442,7 @@ async def test_raw_response_create_overload_8(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2455,7 +2455,7 @@ async def test_streaming_response_create_overload_8(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2484,7 +2484,7 @@ async def test_method_update_overload_1(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2533,7 +2533,7 @@ async def test_method_update_with_all_params_overload_1(self, async_client: Asyn skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2549,7 +2549,7 @@ async def test_raw_response_update_overload_1(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2565,7 +2565,7 @@ async def test_streaming_response_update_overload_1(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2598,7 +2598,7 @@ async def test_method_update_overload_2(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2641,7 +2641,7 @@ async def test_method_update_with_all_params_overload_2(self, async_client: Asyn tags=["engineers", "engineers", "engineers"], type="saas", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2655,7 +2655,7 @@ async def test_raw_response_update_overload_2(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2669,7 +2669,7 @@ async def test_streaming_response_update_overload_2(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2700,7 +2700,7 @@ async def test_method_update_overload_3(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2749,7 +2749,7 @@ async def test_method_update_with_all_params_overload_3(self, async_client: Asyn skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2765,7 +2765,7 @@ async def test_raw_response_update_overload_3(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2781,7 +2781,7 @@ async def test_streaming_response_update_overload_3(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2816,7 +2816,7 @@ async def test_method_update_overload_4(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2865,7 +2865,7 @@ async def test_method_update_with_all_params_overload_4(self, async_client: Asyn skip_interstitial=True, tags=["engineers", "engineers", "engineers"], ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2881,7 +2881,7 @@ async def test_raw_response_update_overload_4(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2897,7 +2897,7 @@ async def test_streaming_response_update_overload_4(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2931,7 +2931,7 @@ async def test_method_update_overload_5(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2949,7 +2949,7 @@ async def test_method_update_with_all_params_overload_5(self, async_client: Asyn auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2964,7 +2964,7 @@ async def test_raw_response_update_overload_5(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -2979,7 +2979,7 @@ async def test_streaming_response_update_overload_5(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3011,7 +3011,7 @@ async def test_method_update_overload_6(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3029,7 +3029,7 @@ async def test_method_update_with_all_params_overload_6(self, async_client: Asyn auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3044,7 +3044,7 @@ async def test_raw_response_update_overload_6(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3059,7 +3059,7 @@ async def test_streaming_response_update_overload_6(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3091,7 +3091,7 @@ async def test_method_update_overload_7(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3109,7 +3109,7 @@ async def test_method_update_with_all_params_overload_7(self, async_client: Asyn auto_redirect_to_identity=True, session_duration="24h", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3124,7 +3124,7 @@ async def test_raw_response_update_overload_7(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3139,7 +3139,7 @@ async def test_streaming_response_update_overload_7(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3170,7 +3170,7 @@ async def test_method_update_overload_8(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3186,7 +3186,7 @@ async def test_method_update_with_all_params_overload_8(self, async_client: Asyn tags=["engineers", "engineers", "engineers"], type="bookmark", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3200,7 +3200,7 @@ async def test_raw_response_update_overload_8(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3214,7 +3214,7 @@ async def test_streaming_response_update_overload_8(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3371,7 +3371,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3381,7 +3381,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - account_id="string", zone_id="string", ) - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3395,7 +3395,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) @pytest.mark.skip() @parametrize @@ -3409,7 +3409,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" application = await response.parse() - assert_matches_type(AccessApps, application, path=["response"]) + assert_matches_type(ZeroTrustApps, application, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/access/test_bookmarks.py b/tests/api_resources/zero_trust/access/test_bookmarks.py index 6b59f35d527..af1d5cafa7f 100644 --- a/tests/api_resources/zero_trust/access/test_bookmarks.py +++ b/tests/api_resources/zero_trust/access/test_bookmarks.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zero_trust.access import AccessBookmarks, BookmarkListResponse, BookmarkDeleteResponse +from cloudflare.types.zero_trust.access import ZeroTrustBookmarks, BookmarkListResponse, BookmarkDeleteResponse base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_create(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) assert cast(Any, response.is_closed) is True @@ -76,7 +76,7 @@ def test_method_update(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -89,7 +89,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -102,7 +102,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) assert cast(Any, response.is_closed) is True @@ -222,7 +222,7 @@ def test_method_get(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -235,7 +235,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -248,7 +248,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) assert cast(Any, response.is_closed) is True @@ -278,7 +278,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -291,7 +291,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = await response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -304,7 +304,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = await response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) assert cast(Any, response.is_closed) is True @@ -330,7 +330,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -343,7 +343,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = await response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -356,7 +356,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = await response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) assert cast(Any, response.is_closed) is True @@ -476,7 +476,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -489,7 +489,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = await response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) @pytest.mark.skip() @parametrize @@ -502,7 +502,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" bookmark = await response.parse() - assert_matches_type(AccessBookmarks, bookmark, path=["response"]) + assert_matches_type(ZeroTrustBookmarks, bookmark, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/access/test_certificates.py b/tests/api_resources/zero_trust/access/test_certificates.py index 7aa9a0bd693..c60a9faf351 100644 --- a/tests/api_resources/zero_trust/access/test_certificates.py +++ b/tests/api_resources/zero_trust/access/test_certificates.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust.access import ( - AccessCertificates, + ZeroTrustCertificates, CertificateListResponse, CertificateDeleteResponse, ) @@ -30,7 +30,7 @@ def test_method_create(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -42,7 +42,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: zone_id="string", associated_hostnames=["admin.example.com", "admin.example.com", "admin.example.com"], ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -57,7 +57,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -72,7 +72,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -104,7 +104,7 @@ def test_method_update(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -116,7 +116,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: zone_id="string", name="Allow devs", ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -131,7 +131,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -146,7 +146,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -320,7 +320,7 @@ def test_method_get(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -330,7 +330,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -344,7 +344,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -358,7 +358,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -399,7 +399,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -411,7 +411,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare zone_id="string", associated_hostnames=["admin.example.com", "admin.example.com", "admin.example.com"], ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -426,7 +426,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -441,7 +441,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -473,7 +473,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -485,7 +485,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare zone_id="string", name="Allow devs", ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -500,7 +500,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -515,7 +515,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) assert cast(Any, response.is_closed) is True @@ -689,7 +689,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -699,7 +699,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - account_id="string", zone_id="string", ) - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -713,7 +713,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) @pytest.mark.skip() @parametrize @@ -727,7 +727,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" certificate = await response.parse() - assert_matches_type(AccessCertificates, certificate, path=["response"]) + assert_matches_type(ZeroTrustCertificates, certificate, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/access/test_custom_pages.py b/tests/api_resources/zero_trust/access/test_custom_pages.py index 01d4e6959e5..b3837e153f5 100644 --- a/tests/api_resources/zero_trust/access/test_custom_pages.py +++ b/tests/api_resources/zero_trust/access/test_custom_pages.py @@ -10,10 +10,10 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust.access import ( - AccessCustomPage, + ZeroTrustCustomPage, CustomPageListResponse, CustomPageDeleteResponse, - AccessCustomPageWithoutHTML, + ZeroTrustCustomPageWithoutHTML, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -31,7 +31,7 @@ def test_method_create(self, client: Cloudflare) -> None: name="string", type="identity_denied", ) - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -43,7 +43,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: type="identity_denied", app_count=0, ) - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -58,7 +58,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = response.parse() - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -73,7 +73,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = response.parse() - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) assert cast(Any, response.is_closed) is True @@ -98,7 +98,7 @@ def test_method_update(self, client: Cloudflare) -> None: name="string", type="identity_denied", ) - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -111,7 +111,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: type="identity_denied", app_count=0, ) - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -127,7 +127,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = response.parse() - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -143,7 +143,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = response.parse() - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) assert cast(Any, response.is_closed) is True @@ -269,7 +269,7 @@ def test_method_get(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AccessCustomPage, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPage, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -282,7 +282,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = response.parse() - assert_matches_type(AccessCustomPage, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPage, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -295,7 +295,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = response.parse() - assert_matches_type(AccessCustomPage, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPage, custom_page, path=["response"]) assert cast(Any, response.is_closed) is True @@ -327,7 +327,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: name="string", type="identity_denied", ) - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -339,7 +339,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare type="identity_denied", app_count=0, ) - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -354,7 +354,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = await response.parse() - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -369,7 +369,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = await response.parse() - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) assert cast(Any, response.is_closed) is True @@ -394,7 +394,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: name="string", type="identity_denied", ) - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -407,7 +407,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare type="identity_denied", app_count=0, ) - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -423,7 +423,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = await response.parse() - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -439,7 +439,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = await response.parse() - assert_matches_type(AccessCustomPageWithoutHTML, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPageWithoutHTML, custom_page, path=["response"]) assert cast(Any, response.is_closed) is True @@ -565,7 +565,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AccessCustomPage, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPage, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -578,7 +578,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = await response.parse() - assert_matches_type(AccessCustomPage, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPage, custom_page, path=["response"]) @pytest.mark.skip() @parametrize @@ -591,7 +591,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" custom_page = await response.parse() - assert_matches_type(AccessCustomPage, custom_page, path=["response"]) + assert_matches_type(ZeroTrustCustomPage, custom_page, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/access/test_groups.py b/tests/api_resources/zero_trust/access/test_groups.py index b9b29edbdef..dfbd4b9ca0e 100644 --- a/tests/api_resources/zero_trust/access/test_groups.py +++ b/tests/api_resources/zero_trust/access/test_groups.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust.access import ( - AccessGroups, + ZeroTrustGroups, GroupListResponse, GroupDeleteResponse, ) @@ -34,7 +34,7 @@ def test_method_create(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -60,7 +60,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: {"email": {"email": "test@example.com"}}, ], ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -79,7 +79,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -98,7 +98,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) assert cast(Any, response.is_closed) is True @@ -143,7 +143,7 @@ def test_method_update(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -170,7 +170,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: {"email": {"email": "test@example.com"}}, ], ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -190,7 +190,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -210,7 +210,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) assert cast(Any, response.is_closed) is True @@ -399,7 +399,7 @@ def test_method_get(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -409,7 +409,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -423,7 +423,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -437,7 +437,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) assert cast(Any, response.is_closed) is True @@ -482,7 +482,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -508,7 +508,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare {"email": {"email": "test@example.com"}}, ], ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -527,7 +527,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = await response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -546,7 +546,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = await response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) assert cast(Any, response.is_closed) is True @@ -591,7 +591,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -618,7 +618,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare {"email": {"email": "test@example.com"}}, ], ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -638,7 +638,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = await response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -658,7 +658,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = await response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) assert cast(Any, response.is_closed) is True @@ -847,7 +847,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -857,7 +857,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - account_id="string", zone_id="string", ) - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -871,7 +871,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = await response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) @pytest.mark.skip() @parametrize @@ -885,7 +885,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" group = await response.parse() - assert_matches_type(AccessGroups, group, path=["response"]) + assert_matches_type(ZeroTrustGroups, group, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/access/test_service_tokens.py b/tests/api_resources/zero_trust/access/test_service_tokens.py index a9d1545197a..0d5090665c0 100644 --- a/tests/api_resources/zero_trust/access/test_service_tokens.py +++ b/tests/api_resources/zero_trust/access/test_service_tokens.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust.access import ( - AccessServiceTokens, + ZeroTrustServiceTokens, ServiceTokenListResponse, ServiceTokenCreateResponse, ServiceTokenRotateResponse, @@ -98,7 +98,7 @@ def test_method_update(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -110,7 +110,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: duration="60m", name="CI/CD token", ) - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -124,7 +124,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -138,7 +138,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) assert cast(Any, response.is_closed) is True @@ -235,7 +235,7 @@ def test_method_delete(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -245,7 +245,7 @@ def test_method_delete_with_all_params(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -259,7 +259,7 @@ def test_raw_response_delete(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -273,7 +273,7 @@ def test_streaming_response_delete(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) assert cast(Any, response.is_closed) is True @@ -308,7 +308,7 @@ def test_method_refresh(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -321,7 +321,7 @@ def test_raw_response_refresh(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -334,7 +334,7 @@ def test_streaming_response_refresh(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) assert cast(Any, response.is_closed) is True @@ -485,7 +485,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -497,7 +497,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare duration="60m", name="CI/CD token", ) - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -511,7 +511,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = await response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -525,7 +525,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = await response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) assert cast(Any, response.is_closed) is True @@ -622,7 +622,7 @@ async def test_method_delete(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -632,7 +632,7 @@ async def test_method_delete_with_all_params(self, async_client: AsyncCloudflare account_id="string", zone_id="string", ) - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -646,7 +646,7 @@ async def test_raw_response_delete(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = await response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -660,7 +660,7 @@ async def test_streaming_response_delete(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = await response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) assert cast(Any, response.is_closed) is True @@ -695,7 +695,7 @@ async def test_method_refresh(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -708,7 +708,7 @@ async def test_raw_response_refresh(self, async_client: AsyncCloudflare) -> None assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = await response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) @pytest.mark.skip() @parametrize @@ -721,7 +721,7 @@ async def test_streaming_response_refresh(self, async_client: AsyncCloudflare) - assert response.http_request.headers.get("X-Stainless-Lang") == "python" service_token = await response.parse() - assert_matches_type(AccessServiceTokens, service_token, path=["response"]) + assert_matches_type(ZeroTrustServiceTokens, service_token, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/access/test_tags.py b/tests/api_resources/zero_trust/access/test_tags.py index cc0c3b79128..d8d355d0b29 100644 --- a/tests/api_resources/zero_trust/access/test_tags.py +++ b/tests/api_resources/zero_trust/access/test_tags.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust.access import ( - AccessTag, + ZeroTrustTag, TagListResponse, TagDeleteResponse, ) @@ -28,7 +28,7 @@ def test_method_create(self, client: Cloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", name="engineers", ) - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -41,7 +41,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -54,7 +54,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) assert cast(Any, response.is_closed) is True @@ -75,7 +75,7 @@ def test_method_update(self, client: Cloudflare) -> None: identifier="023e105f4ecef8ad9ca31a8372d0c353", name="engineers", ) - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -89,7 +89,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -103,7 +103,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) assert cast(Any, response.is_closed) is True @@ -225,7 +225,7 @@ def test_method_get(self, client: Cloudflare) -> None: "engineers", identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -238,7 +238,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -251,7 +251,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) assert cast(Any, response.is_closed) is True @@ -281,7 +281,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: "023e105f4ecef8ad9ca31a8372d0c353", name="engineers", ) - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -294,7 +294,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = await response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -307,7 +307,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = await response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) assert cast(Any, response.is_closed) is True @@ -328,7 +328,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: identifier="023e105f4ecef8ad9ca31a8372d0c353", name="engineers", ) - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -342,7 +342,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = await response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -356,7 +356,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = await response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) assert cast(Any, response.is_closed) is True @@ -478,7 +478,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "engineers", identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -491,7 +491,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = await response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) @pytest.mark.skip() @parametrize @@ -504,7 +504,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" tag = await response.parse() - assert_matches_type(AccessTag, tag, path=["response"]) + assert_matches_type(ZeroTrustTag, tag, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/access/users/test_last_seen_identity.py b/tests/api_resources/zero_trust/access/users/test_last_seen_identity.py index 2f7683091e5..b721c3213cb 100644 --- a/tests/api_resources/zero_trust/access/users/test_last_seen_identity.py +++ b/tests/api_resources/zero_trust/access/users/test_last_seen_identity.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zero_trust.access.users import AccessIdentity +from cloudflare.types.zero_trust.access.users import ZeroTrustIdentity base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_get(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AccessIdentity, last_seen_identity, path=["response"]) + assert_matches_type(ZeroTrustIdentity, last_seen_identity, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" last_seen_identity = response.parse() - assert_matches_type(AccessIdentity, last_seen_identity, path=["response"]) + assert_matches_type(ZeroTrustIdentity, last_seen_identity, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" last_seen_identity = response.parse() - assert_matches_type(AccessIdentity, last_seen_identity, path=["response"]) + assert_matches_type(ZeroTrustIdentity, last_seen_identity, path=["response"]) assert cast(Any, response.is_closed) is True @@ -80,7 +80,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", identifier="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(AccessIdentity, last_seen_identity, path=["response"]) + assert_matches_type(ZeroTrustIdentity, last_seen_identity, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" last_seen_identity = await response.parse() - assert_matches_type(AccessIdentity, last_seen_identity, path=["response"]) + assert_matches_type(ZeroTrustIdentity, last_seen_identity, path=["response"]) @pytest.mark.skip() @parametrize @@ -106,7 +106,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" last_seen_identity = await response.parse() - assert_matches_type(AccessIdentity, last_seen_identity, path=["response"]) + assert_matches_type(ZeroTrustIdentity, last_seen_identity, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/devices/posture/test_integrations.py b/tests/api_resources/zero_trust/devices/posture/test_integrations.py index 9dda68a16d0..fd4e734bc86 100644 --- a/tests/api_resources/zero_trust/devices/posture/test_integrations.py +++ b/tests/api_resources/zero_trust/devices/posture/test_integrations.py @@ -11,8 +11,8 @@ from tests.utils import assert_matches_type from cloudflare.types.zero_trust.devices.posture import ( IntegrationListResponse, + DevicePostureIntegrations, IntegrationDeleteResponse, - TeamsDevicesDevicePostureIntegrations, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -36,7 +36,7 @@ def test_method_create(self, client: Cloudflare) -> None: name="My Workspace One Integration", type="workspace_one", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -53,7 +53,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: name="My Workspace One Integration", type="workspace_one", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -74,7 +74,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -95,7 +95,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) assert cast(Any, response.is_closed) is True @@ -217,7 +217,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -235,7 +235,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: name="My Workspace One Integration", type="workspace_one", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -248,7 +248,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -261,7 +261,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) assert cast(Any, response.is_closed) is True @@ -287,7 +287,7 @@ def test_method_get(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -300,7 +300,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -313,7 +313,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) assert cast(Any, response.is_closed) is True @@ -351,7 +351,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: name="My Workspace One Integration", type="workspace_one", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -368,7 +368,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare name="My Workspace One Integration", type="workspace_one", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -389,7 +389,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -410,7 +410,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) assert cast(Any, response.is_closed) is True @@ -532,7 +532,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -550,7 +550,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) name="My Workspace One Integration", type="workspace_one", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -563,7 +563,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -576,7 +576,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) assert cast(Any, response.is_closed) is True @@ -602,7 +602,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -615,7 +615,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) @pytest.mark.skip() @parametrize @@ -628,7 +628,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" integration = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureIntegrations], integration, path=["response"]) + assert_matches_type(Optional[DevicePostureIntegrations], integration, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/devices/test_dex_tests.py b/tests/api_resources/zero_trust/devices/test_dex_tests.py index f7f43db5432..9e8ccfa5ead 100644 --- a/tests/api_resources/zero_trust/devices/test_dex_tests.py +++ b/tests/api_resources/zero_trust/devices/test_dex_tests.py @@ -10,9 +10,9 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust.devices import ( + DEXTestSchemasHTTP, DEXTestListResponse, DEXTestDeleteResponse, - TeamsDevicesDeviceDEXTestSchemasHTTP, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -31,7 +31,7 @@ def test_method_create(self, client: Cloudflare) -> None: interval="30m", name="HTTP dash health check", ) - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -48,7 +48,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: name="HTTP dash health check", description="Checks the dash endpoint every 30 minutes", ) - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -64,7 +64,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -80,7 +80,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) assert cast(Any, response.is_closed) is True @@ -107,7 +107,7 @@ def test_method_update(self, client: Cloudflare) -> None: interval="30m", name="HTTP dash health check", ) - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -125,7 +125,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: name="HTTP dash health check", description="Checks the dash endpoint every 30 minutes", ) - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -159,7 +159,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) assert cast(Any, response.is_closed) is True @@ -287,7 +287,7 @@ def test_method_get(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -300,7 +300,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -313,7 +313,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) assert cast(Any, response.is_closed) is True @@ -346,7 +346,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: interval="30m", name="HTTP dash health check", ) - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -363,7 +363,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare name="HTTP dash health check", description="Checks the dash endpoint every 30 minutes", ) - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -379,7 +379,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -395,7 +395,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) assert cast(Any, response.is_closed) is True @@ -422,7 +422,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: interval="30m", name="HTTP dash health check", ) - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -440,7 +440,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare name="HTTP dash health check", description="Checks the dash endpoint every 30 minutes", ) - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -457,7 +457,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -474,7 +474,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) assert cast(Any, response.is_closed) is True @@ -602,7 +602,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -615,7 +615,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) @pytest.mark.skip() @parametrize @@ -628,7 +628,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" dex_test = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceDEXTestSchemasHTTP], dex_test, path=["response"]) + assert_matches_type(Optional[DEXTestSchemasHTTP], dex_test, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/devices/test_networks.py b/tests/api_resources/zero_trust/devices/test_networks.py index 4536cb5f799..dcff69ee7ba 100644 --- a/tests/api_resources/zero_trust/devices/test_networks.py +++ b/tests/api_resources/zero_trust/devices/test_networks.py @@ -11,8 +11,8 @@ from tests.utils import assert_matches_type from cloudflare.types.zero_trust.devices import ( NetworkListResponse, + DeviceManagedNetworks, NetworkDeleteResponse, - TeamsDevicesDeviceManagedNetworks, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -30,7 +30,7 @@ def test_method_create(self, client: Cloudflare) -> None: name="managed-network-1", type="tls", ) - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -44,7 +44,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: name="managed-network-1", type="tls", ) - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -59,7 +59,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -74,7 +74,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) assert cast(Any, response.is_closed) is True @@ -96,7 +96,7 @@ def test_method_update(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -111,7 +111,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: name="managed-network-1", type="tls", ) - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -124,7 +124,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -137,7 +137,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) assert cast(Any, response.is_closed) is True @@ -257,7 +257,7 @@ def test_method_get(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -270,7 +270,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -283,7 +283,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) assert cast(Any, response.is_closed) is True @@ -315,7 +315,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: name="managed-network-1", type="tls", ) - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -329,7 +329,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare name="managed-network-1", type="tls", ) - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -344,7 +344,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -359,7 +359,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) assert cast(Any, response.is_closed) is True @@ -381,7 +381,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -396,7 +396,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare name="managed-network-1", type="tls", ) - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -409,7 +409,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -422,7 +422,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) assert cast(Any, response.is_closed) is True @@ -542,7 +542,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -555,7 +555,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) @pytest.mark.skip() @parametrize @@ -568,7 +568,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" network = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceManagedNetworks], network, path=["response"]) + assert_matches_type(Optional[DeviceManagedNetworks], network, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/devices/test_policies.py b/tests/api_resources/zero_trust/devices/test_policies.py index 1d16b75f2c8..9dd46518c65 100644 --- a/tests/api_resources/zero_trust/devices/test_policies.py +++ b/tests/api_resources/zero_trust/devices/test_policies.py @@ -12,7 +12,7 @@ from cloudflare.types.zero_trust.devices import ( PolicyListResponse, PolicyDeleteResponse, - TeamsDevicesDeviceSettingsPolicy, + DevicesDeviceSettingsPolicy, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -30,7 +30,7 @@ def test_method_create(self, client: Cloudflare) -> None: name="Allow Developers", precedence=100, ) - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -58,7 +58,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: support_url="https://1.1.1.1/help", switch_locked=True, ) - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -73,7 +73,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -88,7 +88,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -204,7 +204,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -231,7 +231,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: support_url="https://1.1.1.1/help", switch_locked=True, ) - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -244,7 +244,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -257,7 +257,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -283,7 +283,7 @@ def test_method_get(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -296,7 +296,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -309,7 +309,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -341,7 +341,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: name="Allow Developers", precedence=100, ) - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -369,7 +369,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare support_url="https://1.1.1.1/help", switch_locked=True, ) - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -384,7 +384,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -399,7 +399,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -515,7 +515,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -542,7 +542,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) support_url="https://1.1.1.1/help", switch_locked=True, ) - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -555,7 +555,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -568,7 +568,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) assert cast(Any, response.is_closed) is True @@ -594,7 +594,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -607,7 +607,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) @pytest.mark.skip() @parametrize @@ -620,7 +620,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" policy = await response.parse() - assert_matches_type(Optional[TeamsDevicesDeviceSettingsPolicy], policy, path=["response"]) + assert_matches_type(Optional[DevicesDeviceSettingsPolicy], policy, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/devices/test_posture.py b/tests/api_resources/zero_trust/devices/test_posture.py index 104cafc6bd3..01f053a9399 100644 --- a/tests/api_resources/zero_trust/devices/test_posture.py +++ b/tests/api_resources/zero_trust/devices/test_posture.py @@ -10,9 +10,9 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust.devices import ( + DevicePostureRules, PostureListResponse, PostureDeleteResponse, - TeamsDevicesDevicePostureRules, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -29,7 +29,7 @@ def test_method_create(self, client: Cloudflare) -> None: name="Admin Serial Numbers", type="file", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: match=[{"platform": "windows"}, {"platform": "windows"}, {"platform": "windows"}], schedule="1h", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -64,7 +64,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -78,7 +78,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) assert cast(Any, response.is_closed) is True @@ -101,7 +101,7 @@ def test_method_update(self, client: Cloudflare) -> None: name="Admin Serial Numbers", type="file", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -123,7 +123,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: match=[{"platform": "windows"}, {"platform": "windows"}, {"platform": "windows"}], schedule="1h", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -138,7 +138,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -153,7 +153,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) assert cast(Any, response.is_closed) is True @@ -277,7 +277,7 @@ def test_method_get(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -290,7 +290,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -303,7 +303,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) assert cast(Any, response.is_closed) is True @@ -334,7 +334,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: name="Admin Serial Numbers", type="file", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -355,7 +355,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare match=[{"platform": "windows"}, {"platform": "windows"}, {"platform": "windows"}], schedule="1h", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -369,7 +369,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -383,7 +383,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) assert cast(Any, response.is_closed) is True @@ -406,7 +406,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: name="Admin Serial Numbers", type="file", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -428,7 +428,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare match=[{"platform": "windows"}, {"platform": "windows"}, {"platform": "windows"}], schedule="1h", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -443,7 +443,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -458,7 +458,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) assert cast(Any, response.is_closed) is True @@ -582,7 +582,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -595,7 +595,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) @pytest.mark.skip() @parametrize @@ -608,7 +608,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" posture = await response.parse() - assert_matches_type(Optional[TeamsDevicesDevicePostureRules], posture, path=["response"]) + assert_matches_type(Optional[DevicePostureRules], posture, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/devices/test_settings.py b/tests/api_resources/zero_trust/devices/test_settings.py index 34506294770..76fe07fda54 100644 --- a/tests/api_resources/zero_trust/devices/test_settings.py +++ b/tests/api_resources/zero_trust/devices/test_settings.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zero_trust.devices import TeamsDevicesZeroTrustAccountDeviceSettings +from cloudflare.types.zero_trust.devices import ZeroTrustAccountDeviceSettings base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_update(self, client: Cloudflare) -> None: setting = client.zero_trust.devices.settings.update( account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -35,7 +35,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: root_certificate_installation_enabled=True, use_zt_virtual_ip=True, ) - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -47,7 +47,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = response.parse() - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -59,7 +59,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = response.parse() - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) assert cast(Any, response.is_closed) is True @@ -77,7 +77,7 @@ def test_method_list(self, client: Cloudflare) -> None: setting = client.zero_trust.devices.settings.list( account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -89,7 +89,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = response.parse() - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -101,7 +101,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = response.parse() - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) assert cast(Any, response.is_closed) is True @@ -123,7 +123,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: setting = await async_client.zero_trust.devices.settings.update( account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -135,7 +135,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare root_certificate_installation_enabled=True, use_zt_virtual_ip=True, ) - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -147,7 +147,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = await response.parse() - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -159,7 +159,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = await response.parse() - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) assert cast(Any, response.is_closed) is True @@ -177,7 +177,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: setting = await async_client.zero_trust.devices.settings.list( account_id="699d98642c564d2e855e9661899b7252", ) - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -189,7 +189,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = await response.parse() - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -201,7 +201,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" setting = await response.parse() - assert_matches_type(Optional[TeamsDevicesZeroTrustAccountDeviceSettings], setting, path=["response"]) + assert_matches_type(Optional[ZeroTrustAccountDeviceSettings], setting, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/test_identity_providers.py b/tests/api_resources/zero_trust/test_identity_providers.py index d7c5d1ee833..88f99fd5541 100644 --- a/tests/api_resources/zero_trust/test_identity_providers.py +++ b/tests/api_resources/zero_trust/test_identity_providers.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust import ( - AccessIdentityProviders, + ZeroTrustIdentityProviders, IdentityProviderListResponse, IdentityProviderDeleteResponse, ) @@ -31,7 +31,7 @@ def test_method_create_overload_1(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -59,7 +59,7 @@ def test_method_create_with_all_params_overload_1(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -75,7 +75,7 @@ def test_raw_response_create_overload_1(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -91,7 +91,7 @@ def test_streaming_response_create_overload_1(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -126,7 +126,7 @@ def test_method_create_overload_2(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -152,7 +152,7 @@ def test_method_create_with_all_params_overload_2(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -168,7 +168,7 @@ def test_raw_response_create_overload_2(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -184,7 +184,7 @@ def test_streaming_response_create_overload_2(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -219,7 +219,7 @@ def test_method_create_overload_3(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -241,7 +241,7 @@ def test_method_create_with_all_params_overload_3(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -257,7 +257,7 @@ def test_raw_response_create_overload_3(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -273,7 +273,7 @@ def test_streaming_response_create_overload_3(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -308,7 +308,7 @@ def test_method_create_overload_4(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -330,7 +330,7 @@ def test_method_create_with_all_params_overload_4(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -346,7 +346,7 @@ def test_raw_response_create_overload_4(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -362,7 +362,7 @@ def test_streaming_response_create_overload_4(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -397,7 +397,7 @@ def test_method_create_overload_5(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -421,7 +421,7 @@ def test_method_create_with_all_params_overload_5(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -437,7 +437,7 @@ def test_raw_response_create_overload_5(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -453,7 +453,7 @@ def test_streaming_response_create_overload_5(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -488,7 +488,7 @@ def test_method_create_overload_6(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -513,7 +513,7 @@ def test_method_create_with_all_params_overload_6(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -529,7 +529,7 @@ def test_raw_response_create_overload_6(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -545,7 +545,7 @@ def test_streaming_response_create_overload_6(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -580,7 +580,7 @@ def test_method_create_overload_7(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -602,7 +602,7 @@ def test_method_create_with_all_params_overload_7(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -618,7 +618,7 @@ def test_raw_response_create_overload_7(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -634,7 +634,7 @@ def test_streaming_response_create_overload_7(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -669,7 +669,7 @@ def test_method_create_overload_8(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -697,7 +697,7 @@ def test_method_create_with_all_params_overload_8(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -713,7 +713,7 @@ def test_raw_response_create_overload_8(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -729,7 +729,7 @@ def test_streaming_response_create_overload_8(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -764,7 +764,7 @@ def test_method_create_overload_9(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -790,7 +790,7 @@ def test_method_create_with_all_params_overload_9(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -806,7 +806,7 @@ def test_raw_response_create_overload_9(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -822,7 +822,7 @@ def test_streaming_response_create_overload_9(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -857,7 +857,7 @@ def test_method_create_overload_10(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -882,7 +882,7 @@ def test_method_create_with_all_params_overload_10(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -898,7 +898,7 @@ def test_raw_response_create_overload_10(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -914,7 +914,7 @@ def test_streaming_response_create_overload_10(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -949,7 +949,7 @@ def test_method_create_overload_11(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -974,7 +974,7 @@ def test_method_create_with_all_params_overload_11(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -990,7 +990,7 @@ def test_raw_response_create_overload_11(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1006,7 +1006,7 @@ def test_streaming_response_create_overload_11(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1041,7 +1041,7 @@ def test_method_create_overload_12(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1081,7 +1081,7 @@ def test_method_create_with_all_params_overload_12(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1097,7 +1097,7 @@ def test_raw_response_create_overload_12(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1113,7 +1113,7 @@ def test_streaming_response_create_overload_12(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1148,7 +1148,7 @@ def test_method_create_overload_13(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1170,7 +1170,7 @@ def test_method_create_with_all_params_overload_13(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1186,7 +1186,7 @@ def test_raw_response_create_overload_13(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1202,7 +1202,7 @@ def test_streaming_response_create_overload_13(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1237,7 +1237,7 @@ def test_method_create_overload_14(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1256,7 +1256,7 @@ def test_method_create_with_all_params_overload_14(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1272,7 +1272,7 @@ def test_raw_response_create_overload_14(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1288,7 +1288,7 @@ def test_streaming_response_create_overload_14(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1324,7 +1324,7 @@ def test_method_update_overload_1(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1353,7 +1353,7 @@ def test_method_update_with_all_params_overload_1(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1370,7 +1370,7 @@ def test_raw_response_update_overload_1(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1387,7 +1387,7 @@ def test_streaming_response_update_overload_1(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1435,7 +1435,7 @@ def test_method_update_overload_2(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1462,7 +1462,7 @@ def test_method_update_with_all_params_overload_2(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1479,7 +1479,7 @@ def test_raw_response_update_overload_2(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1496,7 +1496,7 @@ def test_streaming_response_update_overload_2(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1544,7 +1544,7 @@ def test_method_update_overload_3(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1567,7 +1567,7 @@ def test_method_update_with_all_params_overload_3(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1584,7 +1584,7 @@ def test_raw_response_update_overload_3(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1601,7 +1601,7 @@ def test_streaming_response_update_overload_3(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1649,7 +1649,7 @@ def test_method_update_overload_4(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1672,7 +1672,7 @@ def test_method_update_with_all_params_overload_4(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1689,7 +1689,7 @@ def test_raw_response_update_overload_4(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1706,7 +1706,7 @@ def test_streaming_response_update_overload_4(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1754,7 +1754,7 @@ def test_method_update_overload_5(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1779,7 +1779,7 @@ def test_method_update_with_all_params_overload_5(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1796,7 +1796,7 @@ def test_raw_response_update_overload_5(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1813,7 +1813,7 @@ def test_streaming_response_update_overload_5(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1861,7 +1861,7 @@ def test_method_update_overload_6(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1887,7 +1887,7 @@ def test_method_update_with_all_params_overload_6(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1904,7 +1904,7 @@ def test_raw_response_update_overload_6(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1921,7 +1921,7 @@ def test_streaming_response_update_overload_6(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1969,7 +1969,7 @@ def test_method_update_overload_7(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -1992,7 +1992,7 @@ def test_method_update_with_all_params_overload_7(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2009,7 +2009,7 @@ def test_raw_response_update_overload_7(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2026,7 +2026,7 @@ def test_streaming_response_update_overload_7(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2074,7 +2074,7 @@ def test_method_update_overload_8(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2103,7 +2103,7 @@ def test_method_update_with_all_params_overload_8(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2120,7 +2120,7 @@ def test_raw_response_update_overload_8(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2137,7 +2137,7 @@ def test_streaming_response_update_overload_8(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2185,7 +2185,7 @@ def test_method_update_overload_9(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2212,7 +2212,7 @@ def test_method_update_with_all_params_overload_9(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2229,7 +2229,7 @@ def test_raw_response_update_overload_9(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2246,7 +2246,7 @@ def test_streaming_response_update_overload_9(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2294,7 +2294,7 @@ def test_method_update_overload_10(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2320,7 +2320,7 @@ def test_method_update_with_all_params_overload_10(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2337,7 +2337,7 @@ def test_raw_response_update_overload_10(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2354,7 +2354,7 @@ def test_streaming_response_update_overload_10(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2402,7 +2402,7 @@ def test_method_update_overload_11(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2428,7 +2428,7 @@ def test_method_update_with_all_params_overload_11(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2445,7 +2445,7 @@ def test_raw_response_update_overload_11(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2462,7 +2462,7 @@ def test_streaming_response_update_overload_11(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2510,7 +2510,7 @@ def test_method_update_overload_12(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2551,7 +2551,7 @@ def test_method_update_with_all_params_overload_12(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2568,7 +2568,7 @@ def test_raw_response_update_overload_12(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2585,7 +2585,7 @@ def test_streaming_response_update_overload_12(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2633,7 +2633,7 @@ def test_method_update_overload_13(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2656,7 +2656,7 @@ def test_method_update_with_all_params_overload_13(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2673,7 +2673,7 @@ def test_raw_response_update_overload_13(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2690,7 +2690,7 @@ def test_streaming_response_update_overload_13(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2738,7 +2738,7 @@ def test_method_update_overload_14(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2758,7 +2758,7 @@ def test_method_update_with_all_params_overload_14(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2775,7 +2775,7 @@ def test_raw_response_update_overload_14(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2792,7 +2792,7 @@ def test_streaming_response_update_overload_14(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2972,7 +2972,7 @@ def test_method_get(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2982,7 +2982,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -2996,7 +2996,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3010,7 +3010,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3052,7 +3052,7 @@ async def test_method_create_overload_1(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3080,7 +3080,7 @@ async def test_method_create_with_all_params_overload_1(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3096,7 +3096,7 @@ async def test_raw_response_create_overload_1(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3112,7 +3112,7 @@ async def test_streaming_response_create_overload_1(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3147,7 +3147,7 @@ async def test_method_create_overload_2(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3173,7 +3173,7 @@ async def test_method_create_with_all_params_overload_2(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3189,7 +3189,7 @@ async def test_raw_response_create_overload_2(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3205,7 +3205,7 @@ async def test_streaming_response_create_overload_2(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3240,7 +3240,7 @@ async def test_method_create_overload_3(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3262,7 +3262,7 @@ async def test_method_create_with_all_params_overload_3(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3278,7 +3278,7 @@ async def test_raw_response_create_overload_3(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3294,7 +3294,7 @@ async def test_streaming_response_create_overload_3(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3329,7 +3329,7 @@ async def test_method_create_overload_4(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3351,7 +3351,7 @@ async def test_method_create_with_all_params_overload_4(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3367,7 +3367,7 @@ async def test_raw_response_create_overload_4(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3383,7 +3383,7 @@ async def test_streaming_response_create_overload_4(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3418,7 +3418,7 @@ async def test_method_create_overload_5(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3442,7 +3442,7 @@ async def test_method_create_with_all_params_overload_5(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3458,7 +3458,7 @@ async def test_raw_response_create_overload_5(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3474,7 +3474,7 @@ async def test_streaming_response_create_overload_5(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3509,7 +3509,7 @@ async def test_method_create_overload_6(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3534,7 +3534,7 @@ async def test_method_create_with_all_params_overload_6(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3550,7 +3550,7 @@ async def test_raw_response_create_overload_6(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3566,7 +3566,7 @@ async def test_streaming_response_create_overload_6(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3601,7 +3601,7 @@ async def test_method_create_overload_7(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3623,7 +3623,7 @@ async def test_method_create_with_all_params_overload_7(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3639,7 +3639,7 @@ async def test_raw_response_create_overload_7(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3655,7 +3655,7 @@ async def test_streaming_response_create_overload_7(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3690,7 +3690,7 @@ async def test_method_create_overload_8(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3718,7 +3718,7 @@ async def test_method_create_with_all_params_overload_8(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3734,7 +3734,7 @@ async def test_raw_response_create_overload_8(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3750,7 +3750,7 @@ async def test_streaming_response_create_overload_8(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3785,7 +3785,7 @@ async def test_method_create_overload_9(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3811,7 +3811,7 @@ async def test_method_create_with_all_params_overload_9(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3827,7 +3827,7 @@ async def test_raw_response_create_overload_9(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3843,7 +3843,7 @@ async def test_streaming_response_create_overload_9(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3878,7 +3878,7 @@ async def test_method_create_overload_10(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3903,7 +3903,7 @@ async def test_method_create_with_all_params_overload_10(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3919,7 +3919,7 @@ async def test_raw_response_create_overload_10(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3935,7 +3935,7 @@ async def test_streaming_response_create_overload_10(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3970,7 +3970,7 @@ async def test_method_create_overload_11(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -3995,7 +3995,7 @@ async def test_method_create_with_all_params_overload_11(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4011,7 +4011,7 @@ async def test_raw_response_create_overload_11(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4027,7 +4027,7 @@ async def test_streaming_response_create_overload_11(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4062,7 +4062,7 @@ async def test_method_create_overload_12(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4102,7 +4102,7 @@ async def test_method_create_with_all_params_overload_12(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4118,7 +4118,7 @@ async def test_raw_response_create_overload_12(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4134,7 +4134,7 @@ async def test_streaming_response_create_overload_12(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4169,7 +4169,7 @@ async def test_method_create_overload_13(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4191,7 +4191,7 @@ async def test_method_create_with_all_params_overload_13(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4207,7 +4207,7 @@ async def test_raw_response_create_overload_13(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4223,7 +4223,7 @@ async def test_streaming_response_create_overload_13(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4258,7 +4258,7 @@ async def test_method_create_overload_14(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4277,7 +4277,7 @@ async def test_method_create_with_all_params_overload_14(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4293,7 +4293,7 @@ async def test_raw_response_create_overload_14(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4309,7 +4309,7 @@ async def test_streaming_response_create_overload_14(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4345,7 +4345,7 @@ async def test_method_update_overload_1(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4374,7 +4374,7 @@ async def test_method_update_with_all_params_overload_1(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4391,7 +4391,7 @@ async def test_raw_response_update_overload_1(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4408,7 +4408,7 @@ async def test_streaming_response_update_overload_1(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4456,7 +4456,7 @@ async def test_method_update_overload_2(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4483,7 +4483,7 @@ async def test_method_update_with_all_params_overload_2(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4500,7 +4500,7 @@ async def test_raw_response_update_overload_2(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4517,7 +4517,7 @@ async def test_streaming_response_update_overload_2(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4565,7 +4565,7 @@ async def test_method_update_overload_3(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4588,7 +4588,7 @@ async def test_method_update_with_all_params_overload_3(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4605,7 +4605,7 @@ async def test_raw_response_update_overload_3(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4622,7 +4622,7 @@ async def test_streaming_response_update_overload_3(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4670,7 +4670,7 @@ async def test_method_update_overload_4(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4693,7 +4693,7 @@ async def test_method_update_with_all_params_overload_4(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4710,7 +4710,7 @@ async def test_raw_response_update_overload_4(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4727,7 +4727,7 @@ async def test_streaming_response_update_overload_4(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4775,7 +4775,7 @@ async def test_method_update_overload_5(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4800,7 +4800,7 @@ async def test_method_update_with_all_params_overload_5(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4817,7 +4817,7 @@ async def test_raw_response_update_overload_5(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4834,7 +4834,7 @@ async def test_streaming_response_update_overload_5(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4882,7 +4882,7 @@ async def test_method_update_overload_6(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4908,7 +4908,7 @@ async def test_method_update_with_all_params_overload_6(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4925,7 +4925,7 @@ async def test_raw_response_update_overload_6(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -4942,7 +4942,7 @@ async def test_streaming_response_update_overload_6(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4990,7 +4990,7 @@ async def test_method_update_overload_7(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5013,7 +5013,7 @@ async def test_method_update_with_all_params_overload_7(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5030,7 +5030,7 @@ async def test_raw_response_update_overload_7(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5047,7 +5047,7 @@ async def test_streaming_response_update_overload_7(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5095,7 +5095,7 @@ async def test_method_update_overload_8(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5124,7 +5124,7 @@ async def test_method_update_with_all_params_overload_8(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5141,7 +5141,7 @@ async def test_raw_response_update_overload_8(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5158,7 +5158,7 @@ async def test_streaming_response_update_overload_8(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5206,7 +5206,7 @@ async def test_method_update_overload_9(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5233,7 +5233,7 @@ async def test_method_update_with_all_params_overload_9(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5250,7 +5250,7 @@ async def test_raw_response_update_overload_9(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5267,7 +5267,7 @@ async def test_streaming_response_update_overload_9(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5315,7 +5315,7 @@ async def test_method_update_overload_10(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5341,7 +5341,7 @@ async def test_method_update_with_all_params_overload_10(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5358,7 +5358,7 @@ async def test_raw_response_update_overload_10(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5375,7 +5375,7 @@ async def test_streaming_response_update_overload_10(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5423,7 +5423,7 @@ async def test_method_update_overload_11(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5449,7 +5449,7 @@ async def test_method_update_with_all_params_overload_11(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5466,7 +5466,7 @@ async def test_raw_response_update_overload_11(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5483,7 +5483,7 @@ async def test_streaming_response_update_overload_11(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5531,7 +5531,7 @@ async def test_method_update_overload_12(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5572,7 +5572,7 @@ async def test_method_update_with_all_params_overload_12(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5589,7 +5589,7 @@ async def test_raw_response_update_overload_12(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5606,7 +5606,7 @@ async def test_streaming_response_update_overload_12(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5654,7 +5654,7 @@ async def test_method_update_overload_13(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5677,7 +5677,7 @@ async def test_method_update_with_all_params_overload_13(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5694,7 +5694,7 @@ async def test_raw_response_update_overload_13(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5711,7 +5711,7 @@ async def test_streaming_response_update_overload_13(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5759,7 +5759,7 @@ async def test_method_update_overload_14(self, async_client: AsyncCloudflare) -> account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5779,7 +5779,7 @@ async def test_method_update_with_all_params_overload_14(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5796,7 +5796,7 @@ async def test_raw_response_update_overload_14(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -5813,7 +5813,7 @@ async def test_streaming_response_update_overload_14(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5993,7 +5993,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -6003,7 +6003,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - account_id="string", zone_id="string", ) - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -6017,7 +6017,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) @pytest.mark.skip() @parametrize @@ -6031,7 +6031,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(AccessIdentityProviders, identity_provider, path=["response"]) + assert_matches_type(ZeroTrustIdentityProviders, identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zero_trust/test_organizations.py b/tests/api_resources/zero_trust/test_organizations.py index dd5c07f0323..e0fee873f5f 100644 --- a/tests/api_resources/zero_trust/test_organizations.py +++ b/tests/api_resources/zero_trust/test_organizations.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zero_trust import ( - AccessOrganizations, + ZeroTrustOrganizations, OrganizationRevokeUsersResponse, ) @@ -29,7 +29,7 @@ def test_method_create(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -54,7 +54,7 @@ def test_method_create_with_all_params(self, client: Cloudflare) -> None: user_seat_expiration_inactive_time="720h", warp_auth_session_duration="24h", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -69,7 +69,7 @@ def test_raw_response_create(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -84,7 +84,7 @@ def test_streaming_response_create(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) assert cast(Any, response.is_closed) is True @@ -114,7 +114,7 @@ def test_method_update(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -143,7 +143,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: user_seat_expiration_inactive_time="720h", warp_auth_session_duration="24h", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -156,7 +156,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -169,7 +169,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) assert cast(Any, response.is_closed) is True @@ -195,7 +195,7 @@ def test_method_list(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -204,7 +204,7 @@ def test_method_list_with_all_params(self, client: Cloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -217,7 +217,7 @@ def test_raw_response_list(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -230,7 +230,7 @@ def test_streaming_response_list(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) assert cast(Any, response.is_closed) is True @@ -329,7 +329,7 @@ async def test_method_create(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -354,7 +354,7 @@ async def test_method_create_with_all_params(self, async_client: AsyncCloudflare user_seat_expiration_inactive_time="720h", warp_auth_session_duration="24h", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -369,7 +369,7 @@ async def test_raw_response_create(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = await response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -384,7 +384,7 @@ async def test_streaming_response_create(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = await response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) assert cast(Any, response.is_closed) is True @@ -414,7 +414,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -443,7 +443,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare user_seat_expiration_inactive_time="720h", warp_auth_session_duration="24h", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -456,7 +456,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = await response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -469,7 +469,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = await response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) assert cast(Any, response.is_closed) is True @@ -495,7 +495,7 @@ async def test_method_list(self, async_client: AsyncCloudflare) -> None: account_id="string", zone_id="string", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -504,7 +504,7 @@ async def test_method_list_with_all_params(self, async_client: AsyncCloudflare) account_id="string", zone_id="string", ) - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -517,7 +517,7 @@ async def test_raw_response_list(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = await response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) @pytest.mark.skip() @parametrize @@ -530,7 +530,7 @@ async def test_streaming_response_list(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" organization = await response.parse() - assert_matches_type(AccessOrganizations, organization, path=["response"]) + assert_matches_type(ZeroTrustOrganizations, organization, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_advanced_ddos.py b/tests/api_resources/zones/settings/test_advanced_ddos.py index e24a9056fc8..b2093a38e88 100644 --- a/tests/api_resources/zones/settings/test_advanced_ddos.py +++ b/tests/api_resources/zones/settings/test_advanced_ddos.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesAdvancedDDOS +from cloudflare.types.zones.settings import ZoneSettingAdvancedDDOS base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -23,7 +23,7 @@ def test_method_get(self, client: Cloudflare) -> None: advanced_ddos = client.zones.settings.advanced_ddos.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesAdvancedDDOS], advanced_ddos, path=["response"]) + assert_matches_type(Optional[ZoneSettingAdvancedDDOS], advanced_ddos, path=["response"]) @pytest.mark.skip() @parametrize @@ -35,7 +35,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" advanced_ddos = response.parse() - assert_matches_type(Optional[ZonesAdvancedDDOS], advanced_ddos, path=["response"]) + assert_matches_type(Optional[ZoneSettingAdvancedDDOS], advanced_ddos, path=["response"]) @pytest.mark.skip() @parametrize @@ -47,7 +47,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" advanced_ddos = response.parse() - assert_matches_type(Optional[ZonesAdvancedDDOS], advanced_ddos, path=["response"]) + assert_matches_type(Optional[ZoneSettingAdvancedDDOS], advanced_ddos, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: advanced_ddos = await async_client.zones.settings.advanced_ddos.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesAdvancedDDOS], advanced_ddos, path=["response"]) + assert_matches_type(Optional[ZoneSettingAdvancedDDOS], advanced_ddos, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" advanced_ddos = await response.parse() - assert_matches_type(Optional[ZonesAdvancedDDOS], advanced_ddos, path=["response"]) + assert_matches_type(Optional[ZoneSettingAdvancedDDOS], advanced_ddos, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" advanced_ddos = await response.parse() - assert_matches_type(Optional[ZonesAdvancedDDOS], advanced_ddos, path=["response"]) + assert_matches_type(Optional[ZoneSettingAdvancedDDOS], advanced_ddos, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_always_online.py b/tests/api_resources/zones/settings/test_always_online.py index 3ddb8b6437e..a9bf66a4608 100644 --- a/tests/api_resources/zones/settings/test_always_online.py +++ b/tests/api_resources/zones/settings/test_always_online.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesAlwaysOnline +from cloudflare.types.zones.settings import ZoneSettingAlwaysOnline base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_online = response.parse() - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_online = response.parse() - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: always_online = client.zones.settings.always_online.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_online = response.parse() - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_online = response.parse() - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_online = await response.parse() - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_online = await response.parse() - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: always_online = await async_client.zones.settings.always_online.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_online = await response.parse() - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_online = await response.parse() - assert_matches_type(Optional[ZonesAlwaysOnline], always_online, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysOnline], always_online, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_always_use_https.py b/tests/api_resources/zones/settings/test_always_use_https.py index 684f210599a..6353ba32c8c 100644 --- a/tests/api_resources/zones/settings/test_always_use_https.py +++ b/tests/api_resources/zones/settings/test_always_use_https.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesAlwaysUseHTTPS +from cloudflare.types.zones.settings import ZoneSettingAlwaysUseHTTPS base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_use_https = response.parse() - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_use_https = response.parse() - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: always_use_https = client.zones.settings.always_use_https.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_use_https = response.parse() - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_use_https = response.parse() - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_use_https = await response.parse() - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_use_https = await response.parse() - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: always_use_https = await async_client.zones.settings.always_use_https.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_use_https = await response.parse() - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" always_use_https = await response.parse() - assert_matches_type(Optional[ZonesAlwaysUseHTTPS], always_use_https, path=["response"]) + assert_matches_type(Optional[ZoneSettingAlwaysUseHTTPS], always_use_https, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_automatic_https_rewrites.py b/tests/api_resources/zones/settings/test_automatic_https_rewrites.py index 8d6249df9b0..4e952b6088d 100644 --- a/tests/api_resources/zones/settings/test_automatic_https_rewrites.py +++ b/tests/api_resources/zones/settings/test_automatic_https_rewrites.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesAutomaticHTTPSRewrites +from cloudflare.types.zones.settings import ZoneSettingAutomaticHTTPSRewrites base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_https_rewrite = response.parse() - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_https_rewrite = response.parse() - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: automatic_https_rewrite = client.zones.settings.automatic_https_rewrites.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_https_rewrite = response.parse() - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_https_rewrite = response.parse() - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_https_rewrite = await response.parse() - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_https_rewrite = await response.parse() - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: automatic_https_rewrite = await async_client.zones.settings.automatic_https_rewrites.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_https_rewrite = await response.parse() - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_https_rewrite = await response.parse() - assert_matches_type(Optional[ZonesAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) + assert_matches_type(Optional[ZoneSettingAutomaticHTTPSRewrites], automatic_https_rewrite, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_automatic_platform_optimization.py b/tests/api_resources/zones/settings/test_automatic_platform_optimization.py index 5072eaa4263..70d171a60df 100644 --- a/tests/api_resources/zones/settings/test_automatic_platform_optimization.py +++ b/tests/api_resources/zones/settings/test_automatic_platform_optimization.py @@ -10,7 +10,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type from cloudflare.types.zones.settings import ( - ZonesAutomaticPlatformOptimization, + ZoneSettingAutomaticPlatformOptimization, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -34,7 +34,7 @@ def test_method_edit(self, client: Cloudflare) -> None: }, ) assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) @pytest.mark.skip() @@ -56,7 +56,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_platform_optimization = response.parse() assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) @pytest.mark.skip() @@ -78,7 +78,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: automatic_platform_optimization = response.parse() assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) assert cast(Any, response.is_closed) is True @@ -106,7 +106,7 @@ def test_method_get(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) @pytest.mark.skip() @@ -120,7 +120,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_platform_optimization = response.parse() assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) @pytest.mark.skip() @@ -134,7 +134,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: automatic_platform_optimization = response.parse() assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) assert cast(Any, response.is_closed) is True @@ -166,7 +166,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: }, ) assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) @pytest.mark.skip() @@ -188,7 +188,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_platform_optimization = await response.parse() assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) @pytest.mark.skip() @@ -210,7 +210,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N automatic_platform_optimization = await response.parse() assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) assert cast(Any, response.is_closed) is True @@ -238,7 +238,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) @pytest.mark.skip() @@ -252,7 +252,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" automatic_platform_optimization = await response.parse() assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) @pytest.mark.skip() @@ -266,7 +266,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No automatic_platform_optimization = await response.parse() assert_matches_type( - Optional[ZonesAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] + Optional[ZoneSettingAutomaticPlatformOptimization], automatic_platform_optimization, path=["response"] ) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_brotli.py b/tests/api_resources/zones/settings/test_brotli.py index 3347d4aea86..73766d4c64a 100644 --- a/tests/api_resources/zones/settings/test_brotli.py +++ b/tests/api_resources/zones/settings/test_brotli.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesBrotli +from cloudflare.types.zones.settings import ZoneSettingBrotli base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" brotli = response.parse() - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" brotli = response.parse() - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: brotli = client.zones.settings.brotli.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" brotli = response.parse() - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" brotli = response.parse() - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" brotli = await response.parse() - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" brotli = await response.parse() - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: brotli = await async_client.zones.settings.brotli.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" brotli = await response.parse() - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" brotli = await response.parse() - assert_matches_type(Optional[ZonesBrotli], brotli, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrotli], brotli, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_browser_cache_ttl.py b/tests/api_resources/zones/settings/test_browser_cache_ttl.py index d0a6b045cdd..8d268c3ef36 100644 --- a/tests/api_resources/zones/settings/test_browser_cache_ttl.py +++ b/tests/api_resources/zones/settings/test_browser_cache_ttl.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesBrowserCacheTTL +from cloudflare.types.zones.settings import ZoneSettingBrowserCacheTTL base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value=0, ) - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_cache_ttl = response.parse() - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_cache_ttl = response.parse() - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: browser_cache_ttl = client.zones.settings.browser_cache_ttl.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_cache_ttl = response.parse() - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_cache_ttl = response.parse() - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value=0, ) - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_cache_ttl = await response.parse() - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_cache_ttl = await response.parse() - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: browser_cache_ttl = await async_client.zones.settings.browser_cache_ttl.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_cache_ttl = await response.parse() - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_cache_ttl = await response.parse() - assert_matches_type(Optional[ZonesBrowserCacheTTL], browser_cache_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCacheTTL], browser_cache_ttl, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_browser_check.py b/tests/api_resources/zones/settings/test_browser_check.py index 080dd772308..61272e97eea 100644 --- a/tests/api_resources/zones/settings/test_browser_check.py +++ b/tests/api_resources/zones/settings/test_browser_check.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesBrowserCheck +from cloudflare.types.zones.settings import ZoneSettingBrowserCheck base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_check = response.parse() - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_check = response.parse() - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: browser_check = client.zones.settings.browser_check.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_check = response.parse() - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_check = response.parse() - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_check = await response.parse() - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_check = await response.parse() - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: browser_check = await async_client.zones.settings.browser_check.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_check = await response.parse() - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" browser_check = await response.parse() - assert_matches_type(Optional[ZonesBrowserCheck], browser_check, path=["response"]) + assert_matches_type(Optional[ZoneSettingBrowserCheck], browser_check, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_cache_level.py b/tests/api_resources/zones/settings/test_cache_level.py index ae2203b4d29..a0a28636295 100644 --- a/tests/api_resources/zones/settings/test_cache_level.py +++ b/tests/api_resources/zones/settings/test_cache_level.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesCacheLevel +from cloudflare.types.zones.settings import ZoneSettingCacheLevel base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="aggressive", ) - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" cache_level = response.parse() - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" cache_level = response.parse() - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: cache_level = client.zones.settings.cache_level.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" cache_level = response.parse() - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" cache_level = response.parse() - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="aggressive", ) - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" cache_level = await response.parse() - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" cache_level = await response.parse() - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: cache_level = await async_client.zones.settings.cache_level.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" cache_level = await response.parse() - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" cache_level = await response.parse() - assert_matches_type(Optional[ZonesCacheLevel], cache_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingCacheLevel], cache_level, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_challenge_ttl.py b/tests/api_resources/zones/settings/test_challenge_ttl.py index 59632468cad..a65a5f5acc5 100644 --- a/tests/api_resources/zones/settings/test_challenge_ttl.py +++ b/tests/api_resources/zones/settings/test_challenge_ttl.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesChallengeTTL +from cloudflare.types.zones.settings import ZoneSettingChallengeTTL base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value=300, ) - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" challenge_ttl = response.parse() - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" challenge_ttl = response.parse() - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: challenge_ttl = client.zones.settings.challenge_ttl.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" challenge_ttl = response.parse() - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" challenge_ttl = response.parse() - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value=300, ) - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" challenge_ttl = await response.parse() - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" challenge_ttl = await response.parse() - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: challenge_ttl = await async_client.zones.settings.challenge_ttl.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" challenge_ttl = await response.parse() - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" challenge_ttl = await response.parse() - assert_matches_type(Optional[ZonesChallengeTTL], challenge_ttl, path=["response"]) + assert_matches_type(Optional[ZoneSettingChallengeTTL], challenge_ttl, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_ciphers.py b/tests/api_resources/zones/settings/test_ciphers.py index 1696421ef30..db8234f0cb0 100644 --- a/tests/api_resources/zones/settings/test_ciphers.py +++ b/tests/api_resources/zones/settings/test_ciphers.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesCiphers +from cloudflare.types.zones.settings import ZoneSettingCiphers base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value=["ECDHE-RSA-AES128-GCM-SHA256", "AES128-SHA"], ) - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" cipher = response.parse() - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" cipher = response.parse() - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: cipher = client.zones.settings.ciphers.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" cipher = response.parse() - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" cipher = response.parse() - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value=["ECDHE-RSA-AES128-GCM-SHA256", "AES128-SHA"], ) - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" cipher = await response.parse() - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" cipher = await response.parse() - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: cipher = await async_client.zones.settings.ciphers.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" cipher = await response.parse() - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" cipher = await response.parse() - assert_matches_type(Optional[ZonesCiphers], cipher, path=["response"]) + assert_matches_type(Optional[ZoneSettingCiphers], cipher, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_development_mode.py b/tests/api_resources/zones/settings/test_development_mode.py index 51065a51653..da544ae4902 100644 --- a/tests/api_resources/zones/settings/test_development_mode.py +++ b/tests/api_resources/zones/settings/test_development_mode.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesDevelopmentMode +from cloudflare.types.zones.settings import ZoneSettingDevelopmentMode base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" development_mode = response.parse() - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" development_mode = response.parse() - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: development_mode = client.zones.settings.development_mode.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" development_mode = response.parse() - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" development_mode = response.parse() - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" development_mode = await response.parse() - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" development_mode = await response.parse() - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: development_mode = await async_client.zones.settings.development_mode.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" development_mode = await response.parse() - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" development_mode = await response.parse() - assert_matches_type(Optional[ZonesDevelopmentMode], development_mode, path=["response"]) + assert_matches_type(Optional[ZoneSettingDevelopmentMode], development_mode, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_early_hints.py b/tests/api_resources/zones/settings/test_early_hints.py index 760edbad6b9..22f8fc291c6 100644 --- a/tests/api_resources/zones/settings/test_early_hints.py +++ b/tests/api_resources/zones/settings/test_early_hints.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesEarlyHints +from cloudflare.types.zones.settings import ZoneSettingEarlyHints base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" early_hint = response.parse() - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" early_hint = response.parse() - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: early_hint = client.zones.settings.early_hints.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" early_hint = response.parse() - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" early_hint = response.parse() - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" early_hint = await response.parse() - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" early_hint = await response.parse() - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: early_hint = await async_client.zones.settings.early_hints.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" early_hint = await response.parse() - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" early_hint = await response.parse() - assert_matches_type(Optional[ZonesEarlyHints], early_hint, path=["response"]) + assert_matches_type(Optional[ZoneSettingEarlyHints], early_hint, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_email_obfuscation.py b/tests/api_resources/zones/settings/test_email_obfuscation.py index 0b6611b86cf..21e99a91238 100644 --- a/tests/api_resources/zones/settings/test_email_obfuscation.py +++ b/tests/api_resources/zones/settings/test_email_obfuscation.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesEmailObfuscation +from cloudflare.types.zones.settings import ZoneSettingEmailObfuscation base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" email_obfuscation = response.parse() - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" email_obfuscation = response.parse() - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: email_obfuscation = client.zones.settings.email_obfuscation.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" email_obfuscation = response.parse() - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" email_obfuscation = response.parse() - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" email_obfuscation = await response.parse() - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" email_obfuscation = await response.parse() - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: email_obfuscation = await async_client.zones.settings.email_obfuscation.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" email_obfuscation = await response.parse() - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" email_obfuscation = await response.parse() - assert_matches_type(Optional[ZonesEmailObfuscation], email_obfuscation, path=["response"]) + assert_matches_type(Optional[ZoneSettingEmailObfuscation], email_obfuscation, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_font_settings.py b/tests/api_resources/zones/settings/test_font_settings.py index 6248e66165a..a67a18b8281 100644 --- a/tests/api_resources/zones/settings/test_font_settings.py +++ b/tests/api_resources/zones/settings/test_font_settings.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import SpeedCloudflareFonts +from cloudflare.types.zones.settings import ZoneSettingFonts base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" font_setting = response.parse() - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" font_setting = response.parse() - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: font_setting = client.zones.settings.font_settings.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" font_setting = response.parse() - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" font_setting = response.parse() - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" font_setting = await response.parse() - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" font_setting = await response.parse() - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: font_setting = await async_client.zones.settings.font_settings.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" font_setting = await response.parse() - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" font_setting = await response.parse() - assert_matches_type(Optional[SpeedCloudflareFonts], font_setting, path=["response"]) + assert_matches_type(Optional[ZoneSettingFonts], font_setting, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_h2_prioritization.py b/tests/api_resources/zones/settings/test_h2_prioritization.py index 09549c525c1..b6d774deea1 100644 --- a/tests/api_resources/zones/settings/test_h2_prioritization.py +++ b/tests/api_resources/zones/settings/test_h2_prioritization.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesH2Prioritization +from cloudflare.types.zones.settings import ZoneSettingH2Prioritization base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -27,7 +27,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) @pytest.mark.skip() @parametrize @@ -55,7 +55,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" h2_prioritization = response.parse() - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) @pytest.mark.skip() @parametrize @@ -71,7 +71,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" h2_prioritization = response.parse() - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) assert cast(Any, response.is_closed) is True @@ -93,7 +93,7 @@ def test_method_get(self, client: Cloudflare) -> None: h2_prioritization = client.zones.settings.h2_prioritization.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) @pytest.mark.skip() @parametrize @@ -105,7 +105,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" h2_prioritization = response.parse() - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) @pytest.mark.skip() @parametrize @@ -117,7 +117,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" h2_prioritization = response.parse() - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) assert cast(Any, response.is_closed) is True @@ -143,7 +143,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) @pytest.mark.skip() @parametrize @@ -155,7 +155,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "value": "on", }, ) - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) @pytest.mark.skip() @parametrize @@ -171,7 +171,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" h2_prioritization = await response.parse() - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) @pytest.mark.skip() @parametrize @@ -187,7 +187,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" h2_prioritization = await response.parse() - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) assert cast(Any, response.is_closed) is True @@ -209,7 +209,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: h2_prioritization = await async_client.zones.settings.h2_prioritization.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) @pytest.mark.skip() @parametrize @@ -221,7 +221,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" h2_prioritization = await response.parse() - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) @pytest.mark.skip() @parametrize @@ -233,7 +233,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" h2_prioritization = await response.parse() - assert_matches_type(Optional[ZonesH2Prioritization], h2_prioritization, path=["response"]) + assert_matches_type(Optional[ZoneSettingH2Prioritization], h2_prioritization, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_hotlink_protection.py b/tests/api_resources/zones/settings/test_hotlink_protection.py index a72b8a08446..8373f4e3e14 100644 --- a/tests/api_resources/zones/settings/test_hotlink_protection.py +++ b/tests/api_resources/zones/settings/test_hotlink_protection.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesHotlinkProtection +from cloudflare.types.zones.settings import ZoneSettingHotlinkProtection base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hotlink_protection = response.parse() - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" hotlink_protection = response.parse() - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: hotlink_protection = client.zones.settings.hotlink_protection.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hotlink_protection = response.parse() - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" hotlink_protection = response.parse() - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hotlink_protection = await response.parse() - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" hotlink_protection = await response.parse() - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: hotlink_protection = await async_client.zones.settings.hotlink_protection.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" hotlink_protection = await response.parse() - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" hotlink_protection = await response.parse() - assert_matches_type(Optional[ZonesHotlinkProtection], hotlink_protection, path=["response"]) + assert_matches_type(Optional[ZoneSettingHotlinkProtection], hotlink_protection, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_http2.py b/tests/api_resources/zones/settings/test_http2.py index 0f4244cc4f8..d4158ff76db 100644 --- a/tests/api_resources/zones/settings/test_http2.py +++ b/tests/api_resources/zones/settings/test_http2.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesHTTP2 +from cloudflare.types.zones.settings import ZoneSettingHTTP2 base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" http2 = response.parse() - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" http2 = response.parse() - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: http2 = client.zones.settings.http2.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" http2 = response.parse() - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" http2 = response.parse() - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" http2 = await response.parse() - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" http2 = await response.parse() - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: http2 = await async_client.zones.settings.http2.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" http2 = await response.parse() - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" http2 = await response.parse() - assert_matches_type(Optional[ZonesHTTP2], http2, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP2], http2, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_http3.py b/tests/api_resources/zones/settings/test_http3.py index b3d5a4a3070..9bf0e153a66 100644 --- a/tests/api_resources/zones/settings/test_http3.py +++ b/tests/api_resources/zones/settings/test_http3.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesHTTP3 +from cloudflare.types.zones.settings import ZoneSettingHTTP3 base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" http3 = response.parse() - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" http3 = response.parse() - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: http3 = client.zones.settings.http3.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" http3 = response.parse() - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" http3 = response.parse() - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" http3 = await response.parse() - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" http3 = await response.parse() - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: http3 = await async_client.zones.settings.http3.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" http3 = await response.parse() - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" http3 = await response.parse() - assert_matches_type(Optional[ZonesHTTP3], http3, path=["response"]) + assert_matches_type(Optional[ZoneSettingHTTP3], http3, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_image_resizing.py b/tests/api_resources/zones/settings/test_image_resizing.py index 6d4b9c79567..14e1f4bdedb 100644 --- a/tests/api_resources/zones/settings/test_image_resizing.py +++ b/tests/api_resources/zones/settings/test_image_resizing.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesImageResizing +from cloudflare.types.zones.settings import ZoneSettingImageResizing base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -27,7 +27,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) @pytest.mark.skip() @parametrize @@ -55,7 +55,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" image_resizing = response.parse() - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) @pytest.mark.skip() @parametrize @@ -71,7 +71,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" image_resizing = response.parse() - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) assert cast(Any, response.is_closed) is True @@ -93,7 +93,7 @@ def test_method_get(self, client: Cloudflare) -> None: image_resizing = client.zones.settings.image_resizing.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) @pytest.mark.skip() @parametrize @@ -105,7 +105,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" image_resizing = response.parse() - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) @pytest.mark.skip() @parametrize @@ -117,7 +117,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" image_resizing = response.parse() - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) assert cast(Any, response.is_closed) is True @@ -143,7 +143,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) @pytest.mark.skip() @parametrize @@ -155,7 +155,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "value": "on", }, ) - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) @pytest.mark.skip() @parametrize @@ -171,7 +171,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" image_resizing = await response.parse() - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) @pytest.mark.skip() @parametrize @@ -187,7 +187,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" image_resizing = await response.parse() - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) assert cast(Any, response.is_closed) is True @@ -209,7 +209,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: image_resizing = await async_client.zones.settings.image_resizing.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) @pytest.mark.skip() @parametrize @@ -221,7 +221,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" image_resizing = await response.parse() - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) @pytest.mark.skip() @parametrize @@ -233,7 +233,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" image_resizing = await response.parse() - assert_matches_type(Optional[ZonesImageResizing], image_resizing, path=["response"]) + assert_matches_type(Optional[ZoneSettingImageResizing], image_resizing, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_ip_geolocation.py b/tests/api_resources/zones/settings/test_ip_geolocation.py index ea44bbab61d..3bd9a3caadf 100644 --- a/tests/api_resources/zones/settings/test_ip_geolocation.py +++ b/tests/api_resources/zones/settings/test_ip_geolocation.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesIPGeolocation +from cloudflare.types.zones.settings import ZoneSettingIPGeolocation base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ip_geolocation = response.parse() - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" ip_geolocation = response.parse() - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: ip_geolocation = client.zones.settings.ip_geolocation.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ip_geolocation = response.parse() - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" ip_geolocation = response.parse() - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ip_geolocation = await response.parse() - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" ip_geolocation = await response.parse() - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: ip_geolocation = await async_client.zones.settings.ip_geolocation.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ip_geolocation = await response.parse() - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" ip_geolocation = await response.parse() - assert_matches_type(Optional[ZonesIPGeolocation], ip_geolocation, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPGeolocation], ip_geolocation, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_ipv6.py b/tests/api_resources/zones/settings/test_ipv6.py index 1b77fb23944..7022d02d058 100644 --- a/tests/api_resources/zones/settings/test_ipv6.py +++ b/tests/api_resources/zones/settings/test_ipv6.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesIPV6 +from cloudflare.types.zones.settings import ZoneSettingIPV6 base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ipv6 = response.parse() - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" ipv6 = response.parse() - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: ipv6 = client.zones.settings.ipv6.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ipv6 = response.parse() - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" ipv6 = response.parse() - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ipv6 = await response.parse() - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" ipv6 = await response.parse() - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: ipv6 = await async_client.zones.settings.ipv6.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ipv6 = await response.parse() - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" ipv6 = await response.parse() - assert_matches_type(Optional[ZonesIPV6], ipv6, path=["response"]) + assert_matches_type(Optional[ZoneSettingIPV6], ipv6, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_min_tls_version.py b/tests/api_resources/zones/settings/test_min_tls_version.py index 2374157f094..77dcffe9737 100644 --- a/tests/api_resources/zones/settings/test_min_tls_version.py +++ b/tests/api_resources/zones/settings/test_min_tls_version.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesMinTLSVersion +from cloudflare.types.zones.settings import ZoneSettingMinTLSVersion base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="1.0", ) - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" min_tls_version = response.parse() - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" min_tls_version = response.parse() - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: min_tls_version = client.zones.settings.min_tls_version.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" min_tls_version = response.parse() - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" min_tls_version = response.parse() - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="1.0", ) - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" min_tls_version = await response.parse() - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" min_tls_version = await response.parse() - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: min_tls_version = await async_client.zones.settings.min_tls_version.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" min_tls_version = await response.parse() - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" min_tls_version = await response.parse() - assert_matches_type(Optional[ZonesMinTLSVersion], min_tls_version, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinTLSVersion], min_tls_version, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_minify.py b/tests/api_resources/zones/settings/test_minify.py index e9fcb1ddfe4..ccd289fcaeb 100644 --- a/tests/api_resources/zones/settings/test_minify.py +++ b/tests/api_resources/zones/settings/test_minify.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesMinify +from cloudflare.types.zones.settings import ZoneSettingMinify base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value={}, ) - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "js": "on", }, ) - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" minify = response.parse() - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) @pytest.mark.skip() @parametrize @@ -63,7 +63,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" minify = response.parse() - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) assert cast(Any, response.is_closed) is True @@ -82,7 +82,7 @@ def test_method_get(self, client: Cloudflare) -> None: minify = client.zones.settings.minify.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) @pytest.mark.skip() @parametrize @@ -94,7 +94,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" minify = response.parse() - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) @pytest.mark.skip() @parametrize @@ -106,7 +106,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" minify = response.parse() - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) assert cast(Any, response.is_closed) is True @@ -129,7 +129,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value={}, ) - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "js": "on", }, ) - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) @pytest.mark.skip() @parametrize @@ -155,7 +155,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" minify = await response.parse() - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) @pytest.mark.skip() @parametrize @@ -168,7 +168,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" minify = await response.parse() - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) assert cast(Any, response.is_closed) is True @@ -187,7 +187,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: minify = await async_client.zones.settings.minify.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) @pytest.mark.skip() @parametrize @@ -199,7 +199,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" minify = await response.parse() - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) @pytest.mark.skip() @parametrize @@ -211,7 +211,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" minify = await response.parse() - assert_matches_type(Optional[ZonesMinify], minify, path=["response"]) + assert_matches_type(Optional[ZoneSettingMinify], minify, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_mirage.py b/tests/api_resources/zones/settings/test_mirage.py index a5033413b8d..26681ffdbef 100644 --- a/tests/api_resources/zones/settings/test_mirage.py +++ b/tests/api_resources/zones/settings/test_mirage.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesMirage +from cloudflare.types.zones.settings import ZoneSettingMirage base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mirage = response.parse() - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" mirage = response.parse() - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: mirage = client.zones.settings.mirage.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mirage = response.parse() - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" mirage = response.parse() - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mirage = await response.parse() - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" mirage = await response.parse() - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: mirage = await async_client.zones.settings.mirage.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mirage = await response.parse() - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" mirage = await response.parse() - assert_matches_type(Optional[ZonesMirage], mirage, path=["response"]) + assert_matches_type(Optional[ZoneSettingMirage], mirage, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_mobile_redirect.py b/tests/api_resources/zones/settings/test_mobile_redirect.py index 92ca6833ac8..dd3ddd992ac 100644 --- a/tests/api_resources/zones/settings/test_mobile_redirect.py +++ b/tests/api_resources/zones/settings/test_mobile_redirect.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesMobileRedirect +from cloudflare.types.zones.settings import ZoneSettingMobileRedirect base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value={}, ) - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "strip_uri": False, }, ) - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mobile_redirect = response.parse() - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) @pytest.mark.skip() @parametrize @@ -63,7 +63,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" mobile_redirect = response.parse() - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) assert cast(Any, response.is_closed) is True @@ -82,7 +82,7 @@ def test_method_get(self, client: Cloudflare) -> None: mobile_redirect = client.zones.settings.mobile_redirect.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) @pytest.mark.skip() @parametrize @@ -94,7 +94,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mobile_redirect = response.parse() - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) @pytest.mark.skip() @parametrize @@ -106,7 +106,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" mobile_redirect = response.parse() - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) assert cast(Any, response.is_closed) is True @@ -129,7 +129,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value={}, ) - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "strip_uri": False, }, ) - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) @pytest.mark.skip() @parametrize @@ -155,7 +155,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mobile_redirect = await response.parse() - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) @pytest.mark.skip() @parametrize @@ -168,7 +168,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" mobile_redirect = await response.parse() - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) assert cast(Any, response.is_closed) is True @@ -187,7 +187,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: mobile_redirect = await async_client.zones.settings.mobile_redirect.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) @pytest.mark.skip() @parametrize @@ -199,7 +199,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" mobile_redirect = await response.parse() - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) @pytest.mark.skip() @parametrize @@ -211,7 +211,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" mobile_redirect = await response.parse() - assert_matches_type(Optional[ZonesMobileRedirect], mobile_redirect, path=["response"]) + assert_matches_type(Optional[ZoneSettingMobileRedirect], mobile_redirect, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_nel.py b/tests/api_resources/zones/settings/test_nel.py index 53482bbdffb..a15a85d9be0 100644 --- a/tests/api_resources/zones/settings/test_nel.py +++ b/tests/api_resources/zones/settings/test_nel.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesNEL +from cloudflare.types.zones.settings import ZoneSettingNEL base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -27,7 +27,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "value": {}, }, ) - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "value": {"enabled": False}, }, ) - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) @pytest.mark.skip() @parametrize @@ -55,7 +55,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" nel = response.parse() - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) @pytest.mark.skip() @parametrize @@ -71,7 +71,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" nel = response.parse() - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) assert cast(Any, response.is_closed) is True @@ -93,7 +93,7 @@ def test_method_get(self, client: Cloudflare) -> None: nel = client.zones.settings.nel.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) @pytest.mark.skip() @parametrize @@ -105,7 +105,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" nel = response.parse() - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) @pytest.mark.skip() @parametrize @@ -117,7 +117,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" nel = response.parse() - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) assert cast(Any, response.is_closed) is True @@ -143,7 +143,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "value": {}, }, ) - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) @pytest.mark.skip() @parametrize @@ -155,7 +155,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "value": {"enabled": False}, }, ) - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) @pytest.mark.skip() @parametrize @@ -171,7 +171,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" nel = await response.parse() - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) @pytest.mark.skip() @parametrize @@ -187,7 +187,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" nel = await response.parse() - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) assert cast(Any, response.is_closed) is True @@ -209,7 +209,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: nel = await async_client.zones.settings.nel.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) @pytest.mark.skip() @parametrize @@ -221,7 +221,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" nel = await response.parse() - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) @pytest.mark.skip() @parametrize @@ -233,7 +233,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" nel = await response.parse() - assert_matches_type(Optional[ZonesNEL], nel, path=["response"]) + assert_matches_type(Optional[ZoneSettingNEL], nel, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_opportunistic_encryption.py b/tests/api_resources/zones/settings/test_opportunistic_encryption.py index bbe296b515b..88126a49703 100644 --- a/tests/api_resources/zones/settings/test_opportunistic_encryption.py +++ b/tests/api_resources/zones/settings/test_opportunistic_encryption.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesOpportunisticEncryption +from cloudflare.types.zones.settings import ZoneSettingOpportunisticEncryption base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_encryption = response.parse() - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,9 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_encryption = response.parse() - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"] + ) assert cast(Any, response.is_closed) is True @@ -69,7 +71,7 @@ def test_method_get(self, client: Cloudflare) -> None: opportunistic_encryption = client.zones.settings.opportunistic_encryption.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +83,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_encryption = response.parse() - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +95,9 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_encryption = response.parse() - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"] + ) assert cast(Any, response.is_closed) is True @@ -116,7 +120,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +133,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_encryption = await response.parse() - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +146,9 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_encryption = await response.parse() - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"] + ) assert cast(Any, response.is_closed) is True @@ -161,7 +167,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: opportunistic_encryption = await async_client.zones.settings.opportunistic_encryption.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +179,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_encryption = await response.parse() - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +191,9 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_encryption = await response.parse() - assert_matches_type(Optional[ZonesOpportunisticEncryption], opportunistic_encryption, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOpportunisticEncryption], opportunistic_encryption, path=["response"] + ) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_opportunistic_onion.py b/tests/api_resources/zones/settings/test_opportunistic_onion.py index e3e36fc68f0..da6a2844d4f 100644 --- a/tests/api_resources/zones/settings/test_opportunistic_onion.py +++ b/tests/api_resources/zones/settings/test_opportunistic_onion.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesOpportunisticOnion +from cloudflare.types.zones.settings import ZoneSettingOpportunisticOnion base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_onion = response.parse() - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_onion = response.parse() - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: opportunistic_onion = client.zones.settings.opportunistic_onion.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_onion = response.parse() - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_onion = response.parse() - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_onion = await response.parse() - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_onion = await response.parse() - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: opportunistic_onion = await async_client.zones.settings.opportunistic_onion.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_onion = await response.parse() - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" opportunistic_onion = await response.parse() - assert_matches_type(Optional[ZonesOpportunisticOnion], opportunistic_onion, path=["response"]) + assert_matches_type(Optional[ZoneSettingOpportunisticOnion], opportunistic_onion, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_orange_to_orange.py b/tests/api_resources/zones/settings/test_orange_to_orange.py index afab16b079c..1d4c32bd289 100644 --- a/tests/api_resources/zones/settings/test_orange_to_orange.py +++ b/tests/api_resources/zones/settings/test_orange_to_orange.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesOrangeToOrange +from cloudflare.types.zones.settings import ZoneSettingOrangeToOrange base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -27,7 +27,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) @pytest.mark.skip() @parametrize @@ -55,7 +55,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" orange_to_orange = response.parse() - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) @pytest.mark.skip() @parametrize @@ -71,7 +71,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" orange_to_orange = response.parse() - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) assert cast(Any, response.is_closed) is True @@ -93,7 +93,7 @@ def test_method_get(self, client: Cloudflare) -> None: orange_to_orange = client.zones.settings.orange_to_orange.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) @pytest.mark.skip() @parametrize @@ -105,7 +105,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" orange_to_orange = response.parse() - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) @pytest.mark.skip() @parametrize @@ -117,7 +117,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" orange_to_orange = response.parse() - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) assert cast(Any, response.is_closed) is True @@ -143,7 +143,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) @pytest.mark.skip() @parametrize @@ -155,7 +155,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "value": "on", }, ) - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) @pytest.mark.skip() @parametrize @@ -171,7 +171,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" orange_to_orange = await response.parse() - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) @pytest.mark.skip() @parametrize @@ -187,7 +187,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" orange_to_orange = await response.parse() - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) assert cast(Any, response.is_closed) is True @@ -209,7 +209,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: orange_to_orange = await async_client.zones.settings.orange_to_orange.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) @pytest.mark.skip() @parametrize @@ -221,7 +221,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" orange_to_orange = await response.parse() - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) @pytest.mark.skip() @parametrize @@ -233,7 +233,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" orange_to_orange = await response.parse() - assert_matches_type(Optional[ZonesOrangeToOrange], orange_to_orange, path=["response"]) + assert_matches_type(Optional[ZoneSettingOrangeToOrange], orange_to_orange, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_origin_error_page_pass_thru.py b/tests/api_resources/zones/settings/test_origin_error_page_pass_thru.py index 427d913c2c5..1a12caea70f 100644 --- a/tests/api_resources/zones/settings/test_origin_error_page_pass_thru.py +++ b/tests/api_resources/zones/settings/test_origin_error_page_pass_thru.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesOriginErrorPagePassThru +from cloudflare.types.zones.settings import ZoneSettingOriginErrorPagePassThru base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,9 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -37,7 +39,9 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" origin_error_page_pass_thru = response.parse() - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -50,7 +54,9 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" origin_error_page_pass_thru = response.parse() - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) assert cast(Any, response.is_closed) is True @@ -69,7 +75,9 @@ def test_method_get(self, client: Cloudflare) -> None: origin_error_page_pass_thru = client.zones.settings.origin_error_page_pass_thru.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -81,7 +89,9 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" origin_error_page_pass_thru = response.parse() - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -93,7 +103,9 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" origin_error_page_pass_thru = response.parse() - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) assert cast(Any, response.is_closed) is True @@ -116,7 +128,9 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -129,7 +143,9 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" origin_error_page_pass_thru = await response.parse() - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -142,7 +158,9 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" origin_error_page_pass_thru = await response.parse() - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) assert cast(Any, response.is_closed) is True @@ -161,7 +179,9 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: origin_error_page_pass_thru = await async_client.zones.settings.origin_error_page_pass_thru.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -173,7 +193,9 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" origin_error_page_pass_thru = await response.parse() - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -185,7 +207,9 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" origin_error_page_pass_thru = await response.parse() - assert_matches_type(Optional[ZonesOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"]) + assert_matches_type( + Optional[ZoneSettingOriginErrorPagePassThru], origin_error_page_pass_thru, path=["response"] + ) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_polish.py b/tests/api_resources/zones/settings/test_polish.py index 0f150ea11c1..81c7e82e6ae 100644 --- a/tests/api_resources/zones/settings/test_polish.py +++ b/tests/api_resources/zones/settings/test_polish.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesPolish +from cloudflare.types.zones.settings import ZoneSettingPolish base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -27,7 +27,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "value": "off", }, ) - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "value": "off", }, ) - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) @pytest.mark.skip() @parametrize @@ -55,7 +55,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" polish = response.parse() - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) @pytest.mark.skip() @parametrize @@ -71,7 +71,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" polish = response.parse() - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) assert cast(Any, response.is_closed) is True @@ -93,7 +93,7 @@ def test_method_get(self, client: Cloudflare) -> None: polish = client.zones.settings.polish.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) @pytest.mark.skip() @parametrize @@ -105,7 +105,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" polish = response.parse() - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) @pytest.mark.skip() @parametrize @@ -117,7 +117,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" polish = response.parse() - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) assert cast(Any, response.is_closed) is True @@ -143,7 +143,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "value": "off", }, ) - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) @pytest.mark.skip() @parametrize @@ -155,7 +155,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "value": "off", }, ) - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) @pytest.mark.skip() @parametrize @@ -171,7 +171,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" polish = await response.parse() - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) @pytest.mark.skip() @parametrize @@ -187,7 +187,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" polish = await response.parse() - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) assert cast(Any, response.is_closed) is True @@ -209,7 +209,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: polish = await async_client.zones.settings.polish.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) @pytest.mark.skip() @parametrize @@ -221,7 +221,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" polish = await response.parse() - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) @pytest.mark.skip() @parametrize @@ -233,7 +233,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" polish = await response.parse() - assert_matches_type(Optional[ZonesPolish], polish, path=["response"]) + assert_matches_type(Optional[ZoneSettingPolish], polish, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_prefetch_preload.py b/tests/api_resources/zones/settings/test_prefetch_preload.py index 4a73bb876e7..64ef352ed41 100644 --- a/tests/api_resources/zones/settings/test_prefetch_preload.py +++ b/tests/api_resources/zones/settings/test_prefetch_preload.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesPrefetchPreload +from cloudflare.types.zones.settings import ZoneSettingPrefetchPreload base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" prefetch_preload = response.parse() - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" prefetch_preload = response.parse() - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: prefetch_preload = client.zones.settings.prefetch_preload.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" prefetch_preload = response.parse() - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" prefetch_preload = response.parse() - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" prefetch_preload = await response.parse() - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" prefetch_preload = await response.parse() - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: prefetch_preload = await async_client.zones.settings.prefetch_preload.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" prefetch_preload = await response.parse() - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" prefetch_preload = await response.parse() - assert_matches_type(Optional[ZonesPrefetchPreload], prefetch_preload, path=["response"]) + assert_matches_type(Optional[ZoneSettingPrefetchPreload], prefetch_preload, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_proxy_read_timeout.py b/tests/api_resources/zones/settings/test_proxy_read_timeout.py index 1523c87b3ba..0741ea010da 100644 --- a/tests/api_resources/zones/settings/test_proxy_read_timeout.py +++ b/tests/api_resources/zones/settings/test_proxy_read_timeout.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesProxyReadTimeout +from cloudflare.types.zones.settings import ZoneSettingProxyReadTimeout base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -27,7 +27,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "value": 0, }, ) - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "value": 0, }, ) - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) @pytest.mark.skip() @parametrize @@ -55,7 +55,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" proxy_read_timeout = response.parse() - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) @pytest.mark.skip() @parametrize @@ -71,7 +71,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" proxy_read_timeout = response.parse() - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) assert cast(Any, response.is_closed) is True @@ -93,7 +93,7 @@ def test_method_get(self, client: Cloudflare) -> None: proxy_read_timeout = client.zones.settings.proxy_read_timeout.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) @pytest.mark.skip() @parametrize @@ -105,7 +105,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" proxy_read_timeout = response.parse() - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) @pytest.mark.skip() @parametrize @@ -117,7 +117,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" proxy_read_timeout = response.parse() - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) assert cast(Any, response.is_closed) is True @@ -143,7 +143,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "value": 0, }, ) - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) @pytest.mark.skip() @parametrize @@ -155,7 +155,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "value": 0, }, ) - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) @pytest.mark.skip() @parametrize @@ -171,7 +171,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" proxy_read_timeout = await response.parse() - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) @pytest.mark.skip() @parametrize @@ -187,7 +187,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" proxy_read_timeout = await response.parse() - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) assert cast(Any, response.is_closed) is True @@ -209,7 +209,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: proxy_read_timeout = await async_client.zones.settings.proxy_read_timeout.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) @pytest.mark.skip() @parametrize @@ -221,7 +221,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" proxy_read_timeout = await response.parse() - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) @pytest.mark.skip() @parametrize @@ -233,7 +233,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" proxy_read_timeout = await response.parse() - assert_matches_type(Optional[ZonesProxyReadTimeout], proxy_read_timeout, path=["response"]) + assert_matches_type(Optional[ZoneSettingProxyReadTimeout], proxy_read_timeout, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_pseudo_ipv4.py b/tests/api_resources/zones/settings/test_pseudo_ipv4.py index 63d82be5b13..e0528d56434 100644 --- a/tests/api_resources/zones/settings/test_pseudo_ipv4.py +++ b/tests/api_resources/zones/settings/test_pseudo_ipv4.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesPseudoIPV4 +from cloudflare.types.zones.settings import ZoneSettingPseudoIPV4 base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" pseudo_ipv4 = response.parse() - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" pseudo_ipv4 = response.parse() - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: pseudo_ipv4 = client.zones.settings.pseudo_ipv4.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" pseudo_ipv4 = response.parse() - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" pseudo_ipv4 = response.parse() - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" pseudo_ipv4 = await response.parse() - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" pseudo_ipv4 = await response.parse() - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: pseudo_ipv4 = await async_client.zones.settings.pseudo_ipv4.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" pseudo_ipv4 = await response.parse() - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" pseudo_ipv4 = await response.parse() - assert_matches_type(Optional[ZonesPseudoIPV4], pseudo_ipv4, path=["response"]) + assert_matches_type(Optional[ZoneSettingPseudoIPV4], pseudo_ipv4, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_response_buffering.py b/tests/api_resources/zones/settings/test_response_buffering.py index acda6a91b4d..5ffbb57322f 100644 --- a/tests/api_resources/zones/settings/test_response_buffering.py +++ b/tests/api_resources/zones/settings/test_response_buffering.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesBuffering +from cloudflare.types.zones.settings import ZoneSettingBuffering base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" response_buffering = response.parse() - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" response_buffering = response.parse() - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: response_buffering = client.zones.settings.response_buffering.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" response_buffering = response.parse() - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" response_buffering = response.parse() - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" response_buffering = await response.parse() - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" response_buffering = await response.parse() - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: response_buffering = await async_client.zones.settings.response_buffering.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" response_buffering = await response.parse() - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" response_buffering = await response.parse() - assert_matches_type(Optional[ZonesBuffering], response_buffering, path=["response"]) + assert_matches_type(Optional[ZoneSettingBuffering], response_buffering, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_rocket_loader.py b/tests/api_resources/zones/settings/test_rocket_loader.py index fa1369c91cf..0b3c8e8bac3 100644 --- a/tests/api_resources/zones/settings/test_rocket_loader.py +++ b/tests/api_resources/zones/settings/test_rocket_loader.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesRocketLoader +from cloudflare.types.zones.settings import ZoneSettingRocketLoader base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -27,7 +27,7 @@ def test_method_edit(self, client: Cloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) @pytest.mark.skip() @parametrize @@ -39,7 +39,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) @pytest.mark.skip() @parametrize @@ -55,7 +55,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rocket_loader = response.parse() - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) @pytest.mark.skip() @parametrize @@ -71,7 +71,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rocket_loader = response.parse() - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) assert cast(Any, response.is_closed) is True @@ -93,7 +93,7 @@ def test_method_get(self, client: Cloudflare) -> None: rocket_loader = client.zones.settings.rocket_loader.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) @pytest.mark.skip() @parametrize @@ -105,7 +105,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rocket_loader = response.parse() - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) @pytest.mark.skip() @parametrize @@ -117,7 +117,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" rocket_loader = response.parse() - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) assert cast(Any, response.is_closed) is True @@ -143,7 +143,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: "value": "on", }, ) - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) @pytest.mark.skip() @parametrize @@ -155,7 +155,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "value": "on", }, ) - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) @pytest.mark.skip() @parametrize @@ -171,7 +171,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rocket_loader = await response.parse() - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) @pytest.mark.skip() @parametrize @@ -187,7 +187,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" rocket_loader = await response.parse() - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) assert cast(Any, response.is_closed) is True @@ -209,7 +209,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: rocket_loader = await async_client.zones.settings.rocket_loader.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) @pytest.mark.skip() @parametrize @@ -221,7 +221,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" rocket_loader = await response.parse() - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) @pytest.mark.skip() @parametrize @@ -233,7 +233,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" rocket_loader = await response.parse() - assert_matches_type(Optional[ZonesRocketLoader], rocket_loader, path=["response"]) + assert_matches_type(Optional[ZoneSettingRocketLoader], rocket_loader, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_security_headers.py b/tests/api_resources/zones/settings/test_security_headers.py index 49a7e7a0332..824e612c0e8 100644 --- a/tests/api_resources/zones/settings/test_security_headers.py +++ b/tests/api_resources/zones/settings/test_security_headers.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesSecurityHeader +from cloudflare.types.zones.settings import ZoneSettingSecurityHeader base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value={}, ) - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -40,7 +40,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: } }, ) - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -53,7 +53,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_header = response.parse() - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -66,7 +66,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_header = response.parse() - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) assert cast(Any, response.is_closed) is True @@ -85,7 +85,7 @@ def test_method_get(self, client: Cloudflare) -> None: security_header = client.zones.settings.security_headers.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -97,7 +97,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_header = response.parse() - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -109,7 +109,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_header = response.parse() - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) assert cast(Any, response.is_closed) is True @@ -132,7 +132,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value={}, ) - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -148,7 +148,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) } }, ) - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -161,7 +161,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_header = await response.parse() - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -174,7 +174,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_header = await response.parse() - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) assert cast(Any, response.is_closed) is True @@ -193,7 +193,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: security_header = await async_client.zones.settings.security_headers.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -205,7 +205,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_header = await response.parse() - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -217,7 +217,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_header = await response.parse() - assert_matches_type(Optional[ZonesSecurityHeader], security_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityHeader], security_header, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_security_level.py b/tests/api_resources/zones/settings/test_security_level.py index 71fcf116d56..9cb8a9aedc3 100644 --- a/tests/api_resources/zones/settings/test_security_level.py +++ b/tests/api_resources/zones/settings/test_security_level.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesSecurityLevel +from cloudflare.types.zones.settings import ZoneSettingSecurityLevel base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_level = response.parse() - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_level = response.parse() - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: security_level = client.zones.settings.security_level.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_level = response.parse() - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_level = response.parse() - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_level = await response.parse() - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_level = await response.parse() - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: security_level = await async_client.zones.settings.security_level.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_level = await response.parse() - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" security_level = await response.parse() - assert_matches_type(Optional[ZonesSecurityLevel], security_level, path=["response"]) + assert_matches_type(Optional[ZoneSettingSecurityLevel], security_level, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_server_side_excludes.py b/tests/api_resources/zones/settings/test_server_side_excludes.py index 86277b42302..dcaed8d2853 100644 --- a/tests/api_resources/zones/settings/test_server_side_excludes.py +++ b/tests/api_resources/zones/settings/test_server_side_excludes.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesServerSideExclude +from cloudflare.types.zones.settings import ZoneSettingServerSideExclude base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" server_side_exclude = response.parse() - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" server_side_exclude = response.parse() - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: server_side_exclude = client.zones.settings.server_side_excludes.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" server_side_exclude = response.parse() - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" server_side_exclude = response.parse() - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" server_side_exclude = await response.parse() - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" server_side_exclude = await response.parse() - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: server_side_exclude = await async_client.zones.settings.server_side_excludes.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" server_side_exclude = await response.parse() - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" server_side_exclude = await response.parse() - assert_matches_type(Optional[ZonesServerSideExclude], server_side_exclude, path=["response"]) + assert_matches_type(Optional[ZoneSettingServerSideExclude], server_side_exclude, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_sort_query_string_for_cache.py b/tests/api_resources/zones/settings/test_sort_query_string_for_cache.py index 7b447e836b3..170d7bec92c 100644 --- a/tests/api_resources/zones/settings/test_sort_query_string_for_cache.py +++ b/tests/api_resources/zones/settings/test_sort_query_string_for_cache.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesSortQueryStringForCache +from cloudflare.types.zones.settings import ZoneSettingSortQueryStringForCache base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,9 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -37,7 +39,9 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" sort_query_string_for_cache = response.parse() - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -50,7 +54,9 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" sort_query_string_for_cache = response.parse() - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) assert cast(Any, response.is_closed) is True @@ -69,7 +75,9 @@ def test_method_get(self, client: Cloudflare) -> None: sort_query_string_for_cache = client.zones.settings.sort_query_string_for_cache.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -81,7 +89,9 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" sort_query_string_for_cache = response.parse() - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -93,7 +103,9 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" sort_query_string_for_cache = response.parse() - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) assert cast(Any, response.is_closed) is True @@ -116,7 +128,9 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -129,7 +143,9 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" sort_query_string_for_cache = await response.parse() - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -142,7 +158,9 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" sort_query_string_for_cache = await response.parse() - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) assert cast(Any, response.is_closed) is True @@ -161,7 +179,9 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: sort_query_string_for_cache = await async_client.zones.settings.sort_query_string_for_cache.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -173,7 +193,9 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" sort_query_string_for_cache = await response.parse() - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) @pytest.mark.skip() @parametrize @@ -185,7 +207,9 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" sort_query_string_for_cache = await response.parse() - assert_matches_type(Optional[ZonesSortQueryStringForCache], sort_query_string_for_cache, path=["response"]) + assert_matches_type( + Optional[ZoneSettingSortQueryStringForCache], sort_query_string_for_cache, path=["response"] + ) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_ssl.py b/tests/api_resources/zones/settings/test_ssl.py index 271ad8e6b62..1a22aa81a7a 100644 --- a/tests/api_resources/zones/settings/test_ssl.py +++ b/tests/api_resources/zones/settings/test_ssl.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesSSL +from cloudflare.types.zones.settings import ZoneSettingSSL base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl = response.parse() - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl = response.parse() - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: ssl = client.zones.settings.ssl.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl = response.parse() - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl = response.parse() - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl = await response.parse() - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl = await response.parse() - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: ssl = await async_client.zones.settings.ssl.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl = await response.parse() - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl = await response.parse() - assert_matches_type(Optional[ZonesSSL], ssl, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSL], ssl, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_ssl_recommender.py b/tests/api_resources/zones/settings/test_ssl_recommender.py index e9b7ee62f0a..5fb5afb20c0 100644 --- a/tests/api_resources/zones/settings/test_ssl_recommender.py +++ b/tests/api_resources/zones/settings/test_ssl_recommender.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesSSLRecommender +from cloudflare.types.zones.settings import ZoneSettingSSLRecommender base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value={}, ) - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) @pytest.mark.skip() @parametrize @@ -36,7 +36,7 @@ def test_method_edit_with_all_params(self, client: Cloudflare) -> None: "id": "ssl_recommender", }, ) - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) @pytest.mark.skip() @parametrize @@ -49,7 +49,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl_recommender = response.parse() - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) @pytest.mark.skip() @parametrize @@ -62,7 +62,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl_recommender = response.parse() - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) assert cast(Any, response.is_closed) is True @@ -81,7 +81,7 @@ def test_method_get(self, client: Cloudflare) -> None: ssl_recommender = client.zones.settings.ssl_recommender.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl_recommender = response.parse() - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) @pytest.mark.skip() @parametrize @@ -105,7 +105,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl_recommender = response.parse() - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) assert cast(Any, response.is_closed) is True @@ -128,7 +128,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value={}, ) - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) @pytest.mark.skip() @parametrize @@ -140,7 +140,7 @@ async def test_method_edit_with_all_params(self, async_client: AsyncCloudflare) "id": "ssl_recommender", }, ) - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) @pytest.mark.skip() @parametrize @@ -153,7 +153,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl_recommender = await response.parse() - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) @pytest.mark.skip() @parametrize @@ -166,7 +166,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl_recommender = await response.parse() - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) assert cast(Any, response.is_closed) is True @@ -185,7 +185,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: ssl_recommender = await async_client.zones.settings.ssl_recommender.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) @pytest.mark.skip() @parametrize @@ -197,7 +197,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl_recommender = await response.parse() - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) @pytest.mark.skip() @parametrize @@ -209,7 +209,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" ssl_recommender = await response.parse() - assert_matches_type(Optional[ZonesSSLRecommender], ssl_recommender, path=["response"]) + assert_matches_type(Optional[ZoneSettingSSLRecommender], ssl_recommender, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_tls_1_3.py b/tests/api_resources/zones/settings/test_tls_1_3.py index 210b95adaa2..4cf09b010a6 100644 --- a/tests/api_resources/zones/settings/test_tls_1_3.py +++ b/tests/api_resources/zones/settings/test_tls_1_3.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesTLS1_3 +from cloudflare.types.zones.settings import ZoneSettingTLS1_3 base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_1_3 = response.parse() - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_1_3 = response.parse() - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: tls_1_3 = client.zones.settings.tls_1_3.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_1_3 = response.parse() - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_1_3 = response.parse() - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_1_3 = await response.parse() - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_1_3 = await response.parse() - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: tls_1_3 = await async_client.zones.settings.tls_1_3.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_1_3 = await response.parse() - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_1_3 = await response.parse() - assert_matches_type(Optional[ZonesTLS1_3], tls_1_3, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLS1_3], tls_1_3, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_tls_client_auth.py b/tests/api_resources/zones/settings/test_tls_client_auth.py index 6d13ddbf08a..b29d5c2a6f6 100644 --- a/tests/api_resources/zones/settings/test_tls_client_auth.py +++ b/tests/api_resources/zones/settings/test_tls_client_auth.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesTLSClientAuth +from cloudflare.types.zones.settings import ZoneSettingTLSClientAuth base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_client_auth = response.parse() - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_client_auth = response.parse() - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: tls_client_auth = client.zones.settings.tls_client_auth.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_client_auth = response.parse() - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_client_auth = response.parse() - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_client_auth = await response.parse() - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_client_auth = await response.parse() - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: tls_client_auth = await async_client.zones.settings.tls_client_auth.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_client_auth = await response.parse() - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" tls_client_auth = await response.parse() - assert_matches_type(Optional[ZonesTLSClientAuth], tls_client_auth, path=["response"]) + assert_matches_type(Optional[ZoneSettingTLSClientAuth], tls_client_auth, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_true_client_ip_header.py b/tests/api_resources/zones/settings/test_true_client_ip_header.py index 4d59db44462..11556f8be2d 100644 --- a/tests/api_resources/zones/settings/test_true_client_ip_header.py +++ b/tests/api_resources/zones/settings/test_true_client_ip_header.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesTrueClientIPHeader +from cloudflare.types.zones.settings import ZoneSettingTrueClientIPHeader base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" true_client_ip_header = response.parse() - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" true_client_ip_header = response.parse() - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: true_client_ip_header = client.zones.settings.true_client_ip_header.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" true_client_ip_header = response.parse() - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" true_client_ip_header = response.parse() - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" true_client_ip_header = await response.parse() - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" true_client_ip_header = await response.parse() - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: true_client_ip_header = await async_client.zones.settings.true_client_ip_header.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" true_client_ip_header = await response.parse() - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" true_client_ip_header = await response.parse() - assert_matches_type(Optional[ZonesTrueClientIPHeader], true_client_ip_header, path=["response"]) + assert_matches_type(Optional[ZoneSettingTrueClientIPHeader], true_client_ip_header, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_waf.py b/tests/api_resources/zones/settings/test_waf.py index cd650dff8a1..e573fa58ab5 100644 --- a/tests/api_resources/zones/settings/test_waf.py +++ b/tests/api_resources/zones/settings/test_waf.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesWAF +from cloudflare.types.zones.settings import ZoneSettingWAF base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waf = response.parse() - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" waf = response.parse() - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: waf = client.zones.settings.waf.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waf = response.parse() - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" waf = response.parse() - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waf = await response.parse() - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" waf = await response.parse() - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: waf = await async_client.zones.settings.waf.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" waf = await response.parse() - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" waf = await response.parse() - assert_matches_type(Optional[ZonesWAF], waf, path=["response"]) + assert_matches_type(Optional[ZoneSettingWAF], waf, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_webp.py b/tests/api_resources/zones/settings/test_webp.py index 3c4c3bf82d1..d8230d7b497 100644 --- a/tests/api_resources/zones/settings/test_webp.py +++ b/tests/api_resources/zones/settings/test_webp.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesWebP +from cloudflare.types.zones.settings import ZoneSettingWebP base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" webp = response.parse() - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" webp = response.parse() - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: webp = client.zones.settings.webp.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" webp = response.parse() - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" webp = response.parse() - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" webp = await response.parse() - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" webp = await response.parse() - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: webp = await async_client.zones.settings.webp.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" webp = await response.parse() - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" webp = await response.parse() - assert_matches_type(Optional[ZonesWebP], webp, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebP], webp, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_websocket.py b/tests/api_resources/zones/settings/test_websocket.py index 28ed4a5597b..7cac8f78a2c 100644 --- a/tests/api_resources/zones/settings/test_websocket.py +++ b/tests/api_resources/zones/settings/test_websocket.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import ZonesWebsockets +from cloudflare.types.zones.settings import ZoneSettingWebsockets base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" websocket = response.parse() - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" websocket = response.parse() - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: websocket = client.zones.settings.websocket.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" websocket = response.parse() - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" websocket = response.parse() - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="off", ) - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" websocket = await response.parse() - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" websocket = await response.parse() - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: websocket = await async_client.zones.settings.websocket.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" websocket = await response.parse() - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" websocket = await response.parse() - assert_matches_type(Optional[ZonesWebsockets], websocket, path=["response"]) + assert_matches_type(Optional[ZoneSettingWebsockets], websocket, path=["response"]) assert cast(Any, response.is_closed) is True diff --git a/tests/api_resources/zones/settings/test_zero_rtt.py b/tests/api_resources/zones/settings/test_zero_rtt.py index 5103f2aa6fb..3e05091750a 100644 --- a/tests/api_resources/zones/settings/test_zero_rtt.py +++ b/tests/api_resources/zones/settings/test_zero_rtt.py @@ -9,7 +9,7 @@ from cloudflare import Cloudflare, AsyncCloudflare from tests.utils import assert_matches_type -from cloudflare.types.zones.settings import Zones0rtt +from cloudflare.types.zones.settings import ZoneSetting0rtt base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -24,7 +24,7 @@ def test_method_edit(self, client: Cloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) @pytest.mark.skip() @parametrize @@ -37,7 +37,7 @@ def test_raw_response_edit(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" zero_rtt = response.parse() - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) @pytest.mark.skip() @parametrize @@ -50,7 +50,7 @@ def test_streaming_response_edit(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" zero_rtt = response.parse() - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) assert cast(Any, response.is_closed) is True @@ -69,7 +69,7 @@ def test_method_get(self, client: Cloudflare) -> None: zero_rtt = client.zones.settings.zero_rtt.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) @pytest.mark.skip() @parametrize @@ -81,7 +81,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" zero_rtt = response.parse() - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) @pytest.mark.skip() @parametrize @@ -93,7 +93,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" zero_rtt = response.parse() - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) assert cast(Any, response.is_closed) is True @@ -116,7 +116,7 @@ async def test_method_edit(self, async_client: AsyncCloudflare) -> None: zone_id="023e105f4ecef8ad9ca31a8372d0c353", value="on", ) - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) @pytest.mark.skip() @parametrize @@ -129,7 +129,7 @@ async def test_raw_response_edit(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" zero_rtt = await response.parse() - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) @pytest.mark.skip() @parametrize @@ -142,7 +142,7 @@ async def test_streaming_response_edit(self, async_client: AsyncCloudflare) -> N assert response.http_request.headers.get("X-Stainless-Lang") == "python" zero_rtt = await response.parse() - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) assert cast(Any, response.is_closed) is True @@ -161,7 +161,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: zero_rtt = await async_client.zones.settings.zero_rtt.get( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) @pytest.mark.skip() @parametrize @@ -173,7 +173,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" zero_rtt = await response.parse() - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) @pytest.mark.skip() @parametrize @@ -185,7 +185,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" zero_rtt = await response.parse() - assert_matches_type(Optional[Zones0rtt], zero_rtt, path=["response"]) + assert_matches_type(Optional[ZoneSetting0rtt], zero_rtt, path=["response"]) assert cast(Any, response.is_closed) is True