From cbd51962761922a5efdadc90efbb084aba01a12d Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Tue, 7 May 2024 05:28:56 +0000 Subject: [PATCH] feat(api): update via SDK Studio (#478) --- api.md | 9 +- .../zero_trust/identity_providers.py | 164 +++-- src/cloudflare/types/zero_trust/__init__.py | 4 +- ...r_get_response.py => identity_provider.py} | 4 +- .../identity_provider_create_response.py | 588 ------------------ .../identity_provider_update_response.py | 588 ------------------ tests/api_resources/test_snippets.py | 10 + .../zero_trust/test_identity_providers.py | 468 +++++++------- 8 files changed, 330 insertions(+), 1505 deletions(-) rename src/cloudflare/types/zero_trust/{identity_provider_get_response.py => identity_provider.py} (99%) delete mode 100644 src/cloudflare/types/zero_trust/identity_provider_create_response.py delete mode 100644 src/cloudflare/types/zero_trust/identity_provider_update_response.py diff --git a/api.md b/api.md index 195fbc3c5e3..876bb0d3509 100644 --- a/api.md +++ b/api.md @@ -5008,21 +5008,18 @@ from cloudflare.types.zero_trust import ( IdentityProvider, IdentityProviderType, ScimConfig, - IdentityProviderCreateResponse, - IdentityProviderUpdateResponse, IdentityProviderListResponse, IdentityProviderDeleteResponse, - IdentityProviderGetResponse, ) ``` Methods: -- client.zero_trust.identity_providers.create(\*, account_id, zone_id, \*\*params) -> Optional -- client.zero_trust.identity_providers.update(uuid, \*, account_id, zone_id, \*\*params) -> Optional +- client.zero_trust.identity_providers.create(\*, account_id, zone_id, \*\*params) -> Optional +- client.zero_trust.identity_providers.update(uuid, \*, account_id, zone_id, \*\*params) -> Optional - client.zero_trust.identity_providers.list(\*, account_id, zone_id) -> SyncSinglePage[IdentityProviderListResponse] - client.zero_trust.identity_providers.delete(uuid, \*, account_id, zone_id) -> Optional -- client.zero_trust.identity_providers.get(uuid, \*, account_id, zone_id) -> Optional +- client.zero_trust.identity_providers.get(uuid, \*, account_id, zone_id) -> Optional ## Organizations diff --git a/src/cloudflare/resources/zero_trust/identity_providers.py b/src/cloudflare/resources/zero_trust/identity_providers.py index ea66fb7f8a9..3e9508b349d 100644 --- a/src/cloudflare/resources/zero_trust/identity_providers.py +++ b/src/cloudflare/resources/zero_trust/identity_providers.py @@ -31,14 +31,12 @@ identity_provider_create_params, identity_provider_update_params, ) +from ...types.zero_trust.identity_provider import IdentityProvider from ...types.zero_trust.scim_config_param import ScimConfigParam from ...types.zero_trust.identity_provider_type import IdentityProviderType from ...types.zero_trust.generic_oauth_config_param import GenericOAuthConfigParam -from ...types.zero_trust.identity_provider_get_response import IdentityProviderGetResponse from ...types.zero_trust.identity_provider_list_response import IdentityProviderListResponse -from ...types.zero_trust.identity_provider_create_response import IdentityProviderCreateResponse from ...types.zero_trust.identity_provider_delete_response import IdentityProviderDeleteResponse -from ...types.zero_trust.identity_provider_update_response import IdentityProviderUpdateResponse __all__ = ["IdentityProvidersResource", "AsyncIdentityProvidersResource"] @@ -68,7 +66,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -116,7 +114,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -164,7 +162,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -212,7 +210,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -260,7 +258,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -308,7 +306,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -356,7 +354,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -404,7 +402,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -452,7 +450,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -500,7 +498,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -548,7 +546,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -596,7 +594,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -644,7 +642,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -692,7 +690,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -765,7 +763,7 @@ def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: if account_id and zone_id: raise ValueError("You cannot provide both account_id and zone_id") @@ -779,7 +777,7 @@ def create( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProviderCreateResponse], + Optional[IdentityProvider], self._post( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers", body=maybe_transform( @@ -796,10 +794,10 @@ def create( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProviderCreateResponse]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProviderCreateResponse] + Any, ResultWrapper[IdentityProvider] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -821,7 +819,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -872,7 +870,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -923,7 +921,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -974,7 +972,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1025,7 +1023,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1076,7 +1074,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1127,7 +1125,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1178,7 +1176,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1229,7 +1227,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1280,7 +1278,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1331,7 +1329,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1382,7 +1380,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1433,7 +1431,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1484,7 +1482,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -1560,7 +1558,7 @@ def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: if not uuid: raise ValueError(f"Expected a non-empty value for `uuid` but received {uuid!r}") if account_id and zone_id: @@ -1576,7 +1574,7 @@ def update( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProviderUpdateResponse], + Optional[IdentityProvider], self._put( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", body=maybe_transform( @@ -1593,10 +1591,10 @@ def update( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProviderUpdateResponse]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProviderUpdateResponse] + Any, ResultWrapper[IdentityProvider] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -1721,7 +1719,7 @@ def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderGetResponse]: + ) -> Optional[IdentityProvider]: """ Fetches a configured identity provider. @@ -1755,7 +1753,7 @@ def get( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProviderGetResponse], + Optional[IdentityProvider], self._get( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", options=make_request_options( @@ -1763,10 +1761,10 @@ def get( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProviderGetResponse]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProviderGetResponse] + Any, ResultWrapper[IdentityProvider] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -1797,7 +1795,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -1845,7 +1843,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -1893,7 +1891,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -1941,7 +1939,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -1989,7 +1987,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -2037,7 +2035,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -2085,7 +2083,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -2133,7 +2131,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -2181,7 +2179,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -2229,7 +2227,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -2277,7 +2275,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -2325,7 +2323,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -2373,7 +2371,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -2421,7 +2419,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: """ Adds a new identity provider to Access. @@ -2494,7 +2492,7 @@ async def create( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderCreateResponse]: + ) -> Optional[IdentityProvider]: if account_id and zone_id: raise ValueError("You cannot provide both account_id and zone_id") @@ -2508,7 +2506,7 @@ async def create( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProviderCreateResponse], + Optional[IdentityProvider], await self._post( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers", body=await async_maybe_transform( @@ -2525,10 +2523,10 @@ async def create( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProviderCreateResponse]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProviderCreateResponse] + Any, ResultWrapper[IdentityProvider] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -2550,7 +2548,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -2601,7 +2599,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -2652,7 +2650,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -2703,7 +2701,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -2754,7 +2752,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -2805,7 +2803,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -2856,7 +2854,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -2907,7 +2905,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -2958,7 +2956,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -3009,7 +3007,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -3060,7 +3058,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -3111,7 +3109,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -3162,7 +3160,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -3213,7 +3211,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: """ Updates a configured identity provider. @@ -3289,7 +3287,7 @@ async def update( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderUpdateResponse]: + ) -> Optional[IdentityProvider]: if not uuid: raise ValueError(f"Expected a non-empty value for `uuid` but received {uuid!r}") if account_id and zone_id: @@ -3305,7 +3303,7 @@ async def update( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProviderUpdateResponse], + Optional[IdentityProvider], await self._put( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", body=await async_maybe_transform( @@ -3322,10 +3320,10 @@ async def update( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProviderUpdateResponse]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProviderUpdateResponse] + Any, ResultWrapper[IdentityProvider] ), # Union types cannot be passed in as arguments in the type system ), ) @@ -3450,7 +3448,7 @@ async def get( extra_query: Query | None = None, extra_body: Body | None = None, timeout: float | httpx.Timeout | None | NotGiven = NOT_GIVEN, - ) -> Optional[IdentityProviderGetResponse]: + ) -> Optional[IdentityProvider]: """ Fetches a configured identity provider. @@ -3484,7 +3482,7 @@ async def get( account_or_zone = "zones" account_or_zone_id = zone_id return cast( - Optional[IdentityProviderGetResponse], + Optional[IdentityProvider], await self._get( f"/{account_or_zone}/{account_or_zone_id}/access/identity_providers/{uuid}", options=make_request_options( @@ -3492,10 +3490,10 @@ async def get( extra_query=extra_query, extra_body=extra_body, timeout=timeout, - post_parser=ResultWrapper[Optional[IdentityProviderGetResponse]]._unwrapper, + post_parser=ResultWrapper[Optional[IdentityProvider]]._unwrapper, ), cast_to=cast( - Any, ResultWrapper[IdentityProviderGetResponse] + Any, ResultWrapper[IdentityProvider] ), # Union types cannot be passed in as arguments in the type system ), ) diff --git a/src/cloudflare/types/zero_trust/__init__.py b/src/cloudflare/types/zero_trust/__init__.py index 5d13447e38c..fe2de93ed13 100644 --- a/src/cloudflare/types/zero_trust/__init__.py +++ b/src/cloudflare/types/zero_trust/__init__.py @@ -31,6 +31,7 @@ from .access_rule_param import AccessRuleParam as AccessRuleParam from .domain_rule_param import DomainRuleParam as DomainRuleParam from .gsuite_group_rule import GSuiteGroupRule as GSuiteGroupRule +from .identity_provider import IdentityProvider as IdentityProvider from .scim_config_param import ScimConfigParam as ScimConfigParam from .country_rule_param import CountryRuleParam as CountryRuleParam from .ip_list_rule_param import IPListRuleParam as IPListRuleParam @@ -73,7 +74,6 @@ from .any_valid_service_token_rule import AnyValidServiceTokenRule as AnyValidServiceTokenRule from .external_evaluation_rule_param import ExternalEvaluationRuleParam as ExternalEvaluationRuleParam from .github_organization_rule_param import GitHubOrganizationRuleParam as GitHubOrganizationRuleParam -from .identity_provider_get_response import IdentityProviderGetResponse as IdentityProviderGetResponse from .identity_provider_create_params import IdentityProviderCreateParams as IdentityProviderCreateParams from .identity_provider_list_response import IdentityProviderListResponse as IdentityProviderListResponse from .identity_provider_update_params import IdentityProviderUpdateParams as IdentityProviderUpdateParams @@ -82,9 +82,7 @@ from .connectivity_setting_edit_params import ConnectivitySettingEditParams as ConnectivitySettingEditParams from .organization_revoke_users_params import OrganizationRevokeUsersParams as OrganizationRevokeUsersParams from .connectivity_setting_get_response import ConnectivitySettingGetResponse as ConnectivitySettingGetResponse -from .identity_provider_create_response import IdentityProviderCreateResponse as IdentityProviderCreateResponse from .identity_provider_delete_response import IdentityProviderDeleteResponse as IdentityProviderDeleteResponse -from .identity_provider_update_response import IdentityProviderUpdateResponse as IdentityProviderUpdateResponse from .any_valid_service_token_rule_param import AnyValidServiceTokenRuleParam as AnyValidServiceTokenRuleParam from .connectivity_setting_edit_response import ConnectivitySettingEditResponse as ConnectivitySettingEditResponse from .organization_revoke_users_response import OrganizationRevokeUsersResponse as OrganizationRevokeUsersResponse diff --git a/src/cloudflare/types/zero_trust/identity_provider_get_response.py b/src/cloudflare/types/zero_trust/identity_provider.py similarity index 99% rename from src/cloudflare/types/zero_trust/identity_provider_get_response.py rename to src/cloudflare/types/zero_trust/identity_provider.py index 2ad98f250b5..6731d7bc439 100644 --- a/src/cloudflare/types/zero_trust/identity_provider_get_response.py +++ b/src/cloudflare/types/zero_trust/identity_provider.py @@ -9,7 +9,7 @@ from .identity_provider_type import IdentityProviderType __all__ = [ - "IdentityProviderGetResponse", + "IdentityProvider", "AccessCentrify", "AccessCentrifyConfig", "AccessFacebook", @@ -570,7 +570,7 @@ class AccessOnetimepin(BaseModel): """ -IdentityProviderGetResponse = Union[ +IdentityProvider = Union[ AzureAD, AccessCentrify, AccessFacebook, diff --git a/src/cloudflare/types/zero_trust/identity_provider_create_response.py b/src/cloudflare/types/zero_trust/identity_provider_create_response.py deleted file mode 100644 index bf1f94e8cc4..00000000000 --- a/src/cloudflare/types/zero_trust/identity_provider_create_response.py +++ /dev/null @@ -1,588 +0,0 @@ -# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. - -from typing import List, Union, Optional - -from .azure_ad import AzureAD -from ..._models import BaseModel -from .scim_config import ScimConfig -from .generic_oauth_config import GenericOAuthConfig -from .identity_provider_type import IdentityProviderType - -__all__ = [ - "IdentityProviderCreateResponse", - "AccessCentrify", - "AccessCentrifyConfig", - "AccessFacebook", - "AccessGitHub", - "AccessGoogle", - "AccessGoogleConfig", - "AccessGoogleApps", - "AccessGoogleAppsConfig", - "AccessLinkedin", - "AccessOIDC", - "AccessOIDCConfig", - "AccessOkta", - "AccessOktaConfig", - "AccessOnelogin", - "AccessOneloginConfig", - "AccessPingone", - "AccessPingoneConfig", - "AccessSAML", - "AccessSAMLConfig", - "AccessSAMLConfigHeaderAttribute", - "AccessYandex", - "AccessOnetimepin", -] - - -class AccessCentrifyConfig(BaseModel): - centrify_account: Optional[str] = None - """Your centrify account url""" - - centrify_app_id: Optional[str] = None - """Your centrify app id""" - - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - -class AccessCentrify(BaseModel): - config: AccessCentrifyConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessFacebook(BaseModel): - config: GenericOAuthConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessGitHub(BaseModel): - config: GenericOAuthConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessGoogleConfig(BaseModel): - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - -class AccessGoogle(BaseModel): - config: AccessGoogleConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessGoogleAppsConfig(BaseModel): - apps_domain: Optional[str] = None - """Your companies TLD""" - - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - -class AccessGoogleApps(BaseModel): - config: AccessGoogleAppsConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessLinkedin(BaseModel): - config: GenericOAuthConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessOIDCConfig(BaseModel): - auth_url: Optional[str] = None - """The authorization_endpoint URL of your IdP""" - - certs_url: Optional[str] = None - """The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens""" - - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - scopes: Optional[List[str]] = None - """OAuth scopes""" - - token_url: Optional[str] = None - """The token_endpoint URL of your IdP""" - - -class AccessOIDC(BaseModel): - config: AccessOIDCConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessOktaConfig(BaseModel): - authorization_server_id: Optional[str] = None - """Your okta authorization server id""" - - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - okta_account: Optional[str] = None - """Your okta account url""" - - -class AccessOkta(BaseModel): - config: AccessOktaConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessOneloginConfig(BaseModel): - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - onelogin_account: Optional[str] = None - """Your OneLogin account url""" - - -class AccessOnelogin(BaseModel): - config: AccessOneloginConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessPingoneConfig(BaseModel): - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - ping_env_id: Optional[str] = None - """Your PingOne environment identifier""" - - -class AccessPingone(BaseModel): - config: AccessPingoneConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessSAMLConfigHeaderAttribute(BaseModel): - attribute_name: Optional[str] = None - """attribute name from the IDP""" - - header_name: Optional[str] = None - """header that will be added on the request to the origin""" - - -class AccessSAMLConfig(BaseModel): - attributes: Optional[List[str]] = None - """ - A list of SAML attribute names that will be added to your signed JWT token and - can be used in SAML policy rules. - """ - - email_attribute_name: Optional[str] = None - """The attribute name for email in the SAML response.""" - - header_attributes: Optional[List[AccessSAMLConfigHeaderAttribute]] = None - """ - Add a list of attribute names that will be returned in the response header from - the Access callback. - """ - - idp_public_certs: Optional[List[str]] = None - """X509 certificate to verify the signature in the SAML authentication response""" - - issuer_url: Optional[str] = None - """IdP Entity ID or Issuer URL""" - - sign_request: Optional[bool] = None - """Sign the SAML authentication request with Access credentials. - - To verify the signature, use the public key from the Access certs endpoints. - """ - - sso_target_url: Optional[str] = None - """URL to send the SAML authentication requests to""" - - -class AccessSAML(BaseModel): - config: AccessSAMLConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessYandex(BaseModel): - config: GenericOAuthConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessOnetimepin(BaseModel): - config: object - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -IdentityProviderCreateResponse = Union[ - AzureAD, - AccessCentrify, - AccessFacebook, - AccessGitHub, - AccessGoogle, - AccessGoogleApps, - AccessLinkedin, - AccessOIDC, - AccessOkta, - AccessOnelogin, - AccessPingone, - AccessSAML, - AccessYandex, - AccessOnetimepin, -] diff --git a/src/cloudflare/types/zero_trust/identity_provider_update_response.py b/src/cloudflare/types/zero_trust/identity_provider_update_response.py deleted file mode 100644 index 21f2aa100d7..00000000000 --- a/src/cloudflare/types/zero_trust/identity_provider_update_response.py +++ /dev/null @@ -1,588 +0,0 @@ -# File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. - -from typing import List, Union, Optional - -from .azure_ad import AzureAD -from ..._models import BaseModel -from .scim_config import ScimConfig -from .generic_oauth_config import GenericOAuthConfig -from .identity_provider_type import IdentityProviderType - -__all__ = [ - "IdentityProviderUpdateResponse", - "AccessCentrify", - "AccessCentrifyConfig", - "AccessFacebook", - "AccessGitHub", - "AccessGoogle", - "AccessGoogleConfig", - "AccessGoogleApps", - "AccessGoogleAppsConfig", - "AccessLinkedin", - "AccessOIDC", - "AccessOIDCConfig", - "AccessOkta", - "AccessOktaConfig", - "AccessOnelogin", - "AccessOneloginConfig", - "AccessPingone", - "AccessPingoneConfig", - "AccessSAML", - "AccessSAMLConfig", - "AccessSAMLConfigHeaderAttribute", - "AccessYandex", - "AccessOnetimepin", -] - - -class AccessCentrifyConfig(BaseModel): - centrify_account: Optional[str] = None - """Your centrify account url""" - - centrify_app_id: Optional[str] = None - """Your centrify app id""" - - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - -class AccessCentrify(BaseModel): - config: AccessCentrifyConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessFacebook(BaseModel): - config: GenericOAuthConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessGitHub(BaseModel): - config: GenericOAuthConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessGoogleConfig(BaseModel): - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - -class AccessGoogle(BaseModel): - config: AccessGoogleConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessGoogleAppsConfig(BaseModel): - apps_domain: Optional[str] = None - """Your companies TLD""" - - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - -class AccessGoogleApps(BaseModel): - config: AccessGoogleAppsConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessLinkedin(BaseModel): - config: GenericOAuthConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessOIDCConfig(BaseModel): - auth_url: Optional[str] = None - """The authorization_endpoint URL of your IdP""" - - certs_url: Optional[str] = None - """The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens""" - - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - scopes: Optional[List[str]] = None - """OAuth scopes""" - - token_url: Optional[str] = None - """The token_endpoint URL of your IdP""" - - -class AccessOIDC(BaseModel): - config: AccessOIDCConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessOktaConfig(BaseModel): - authorization_server_id: Optional[str] = None - """Your okta authorization server id""" - - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - okta_account: Optional[str] = None - """Your okta account url""" - - -class AccessOkta(BaseModel): - config: AccessOktaConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessOneloginConfig(BaseModel): - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - onelogin_account: Optional[str] = None - """Your OneLogin account url""" - - -class AccessOnelogin(BaseModel): - config: AccessOneloginConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessPingoneConfig(BaseModel): - claims: Optional[List[str]] = None - """Custom claims""" - - client_id: Optional[str] = None - """Your OAuth Client ID""" - - client_secret: Optional[str] = None - """Your OAuth Client Secret""" - - email_claim_name: Optional[str] = None - """The claim name for email in the id_token response.""" - - ping_env_id: Optional[str] = None - """Your PingOne environment identifier""" - - -class AccessPingone(BaseModel): - config: AccessPingoneConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessSAMLConfigHeaderAttribute(BaseModel): - attribute_name: Optional[str] = None - """attribute name from the IDP""" - - header_name: Optional[str] = None - """header that will be added on the request to the origin""" - - -class AccessSAMLConfig(BaseModel): - attributes: Optional[List[str]] = None - """ - A list of SAML attribute names that will be added to your signed JWT token and - can be used in SAML policy rules. - """ - - email_attribute_name: Optional[str] = None - """The attribute name for email in the SAML response.""" - - header_attributes: Optional[List[AccessSAMLConfigHeaderAttribute]] = None - """ - Add a list of attribute names that will be returned in the response header from - the Access callback. - """ - - idp_public_certs: Optional[List[str]] = None - """X509 certificate to verify the signature in the SAML authentication response""" - - issuer_url: Optional[str] = None - """IdP Entity ID or Issuer URL""" - - sign_request: Optional[bool] = None - """Sign the SAML authentication request with Access credentials. - - To verify the signature, use the public key from the Access certs endpoints. - """ - - sso_target_url: Optional[str] = None - """URL to send the SAML authentication requests to""" - - -class AccessSAML(BaseModel): - config: AccessSAMLConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessYandex(BaseModel): - config: GenericOAuthConfig - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -class AccessOnetimepin(BaseModel): - config: object - """The configuration parameters for the identity provider. - - To view the required parameters for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - name: str - """The name of the identity provider, shown to users on the login page.""" - - type: IdentityProviderType - """The type of identity provider. - - To determine the value for a specific provider, refer to our - [developer documentation](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/). - """ - - id: Optional[str] = None - """UUID""" - - scim_config: Optional[ScimConfig] = None - """ - The configuration settings for enabling a System for Cross-Domain Identity - Management (SCIM) with the identity provider. - """ - - -IdentityProviderUpdateResponse = Union[ - AzureAD, - AccessCentrify, - AccessFacebook, - AccessGitHub, - AccessGoogle, - AccessGoogleApps, - AccessLinkedin, - AccessOIDC, - AccessOkta, - AccessOnelogin, - AccessPingone, - AccessSAML, - AccessYandex, - AccessOnetimepin, -] diff --git a/tests/api_resources/test_snippets.py b/tests/api_resources/test_snippets.py index 779597259f9..cad43decc6a 100644 --- a/tests/api_resources/test_snippets.py +++ b/tests/api_resources/test_snippets.py @@ -18,6 +18,7 @@ class TestSnippets: parametrize = pytest.mark.parametrize("client", [False, True], indirect=True, ids=["loose", "strict"]) + @pytest.mark.skip(reason="throwing HTTP 415") @parametrize def test_method_update(self, client: Cloudflare) -> None: snippet = client.snippets.update( @@ -26,6 +27,7 @@ def test_method_update(self, client: Cloudflare) -> None: ) assert_matches_type(Optional[Snippet], snippet, path=["response"]) + @pytest.mark.skip(reason="throwing HTTP 415") @parametrize def test_method_update_with_all_params(self, client: Cloudflare) -> None: snippet = client.snippets.update( @@ -36,6 +38,7 @@ def test_method_update_with_all_params(self, client: Cloudflare) -> None: ) assert_matches_type(Optional[Snippet], snippet, path=["response"]) + @pytest.mark.skip(reason="throwing HTTP 415") @parametrize def test_raw_response_update(self, client: Cloudflare) -> None: response = client.snippets.with_raw_response.update( @@ -48,6 +51,7 @@ def test_raw_response_update(self, client: Cloudflare) -> None: snippet = response.parse() assert_matches_type(Optional[Snippet], snippet, path=["response"]) + @pytest.mark.skip(reason="throwing HTTP 415") @parametrize def test_streaming_response_update(self, client: Cloudflare) -> None: with client.snippets.with_streaming_response.update( @@ -62,6 +66,7 @@ def test_streaming_response_update(self, client: Cloudflare) -> None: assert cast(Any, response.is_closed) is True + @pytest.mark.skip(reason="throwing HTTP 415") @parametrize def test_path_params_update(self, client: Cloudflare) -> None: with pytest.raises(ValueError, match=r"Expected a non-empty value for `zone_id` but received ''"): @@ -214,6 +219,7 @@ def test_path_params_get(self, client: Cloudflare) -> None: class TestAsyncSnippets: parametrize = pytest.mark.parametrize("async_client", [False, True], indirect=True, ids=["loose", "strict"]) + @pytest.mark.skip(reason="throwing HTTP 415") @parametrize async def test_method_update(self, async_client: AsyncCloudflare) -> None: snippet = await async_client.snippets.update( @@ -222,6 +228,7 @@ async def test_method_update(self, async_client: AsyncCloudflare) -> None: ) assert_matches_type(Optional[Snippet], snippet, path=["response"]) + @pytest.mark.skip(reason="throwing HTTP 415") @parametrize async def test_method_update_with_all_params(self, async_client: AsyncCloudflare) -> None: snippet = await async_client.snippets.update( @@ -232,6 +239,7 @@ async def test_method_update_with_all_params(self, async_client: AsyncCloudflare ) assert_matches_type(Optional[Snippet], snippet, path=["response"]) + @pytest.mark.skip(reason="throwing HTTP 415") @parametrize async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: response = await async_client.snippets.with_raw_response.update( @@ -244,6 +252,7 @@ async def test_raw_response_update(self, async_client: AsyncCloudflare) -> None: snippet = await response.parse() assert_matches_type(Optional[Snippet], snippet, path=["response"]) + @pytest.mark.skip(reason="throwing HTTP 415") @parametrize async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> None: async with async_client.snippets.with_streaming_response.update( @@ -258,6 +267,7 @@ async def test_streaming_response_update(self, async_client: AsyncCloudflare) -> assert cast(Any, response.is_closed) is True + @pytest.mark.skip(reason="throwing HTTP 415") @parametrize async def test_path_params_update(self, async_client: AsyncCloudflare) -> None: with pytest.raises(ValueError, match=r"Expected a non-empty value for `zone_id` but received ''"): diff --git a/tests/api_resources/zero_trust/test_identity_providers.py b/tests/api_resources/zero_trust/test_identity_providers.py index 0e32620edcb..7204c198113 100644 --- a/tests/api_resources/zero_trust/test_identity_providers.py +++ b/tests/api_resources/zero_trust/test_identity_providers.py @@ -11,11 +11,9 @@ from tests.utils import assert_matches_type from cloudflare.pagination import SyncSinglePage, AsyncSinglePage from cloudflare.types.zero_trust import ( - IdentityProviderGetResponse, + IdentityProvider, IdentityProviderListResponse, - IdentityProviderCreateResponse, IdentityProviderDeleteResponse, - IdentityProviderUpdateResponse, ) base_url = os.environ.get("TEST_API_BASE_URL", "http://127.0.0.1:4010") @@ -33,7 +31,7 @@ def test_method_create_overload_1(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -60,7 +58,7 @@ def test_method_create_with_all_params_overload_1(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -75,7 +73,7 @@ def test_raw_response_create_overload_1(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -90,7 +88,7 @@ def test_streaming_response_create_overload_1(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -122,7 +120,7 @@ def test_method_create_overload_2(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -147,7 +145,7 @@ def test_method_create_with_all_params_overload_2(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -162,7 +160,7 @@ def test_raw_response_create_overload_2(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -177,7 +175,7 @@ def test_streaming_response_create_overload_2(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -209,7 +207,7 @@ def test_method_create_overload_3(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -230,7 +228,7 @@ def test_method_create_with_all_params_overload_3(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -245,7 +243,7 @@ def test_raw_response_create_overload_3(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -260,7 +258,7 @@ def test_streaming_response_create_overload_3(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -292,7 +290,7 @@ def test_method_create_overload_4(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -313,7 +311,7 @@ def test_method_create_with_all_params_overload_4(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -328,7 +326,7 @@ def test_raw_response_create_overload_4(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -343,7 +341,7 @@ def test_streaming_response_create_overload_4(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -375,7 +373,7 @@ def test_method_create_overload_5(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -398,7 +396,7 @@ def test_method_create_with_all_params_overload_5(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -413,7 +411,7 @@ def test_raw_response_create_overload_5(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -428,7 +426,7 @@ def test_streaming_response_create_overload_5(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -460,7 +458,7 @@ def test_method_create_overload_6(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -484,7 +482,7 @@ def test_method_create_with_all_params_overload_6(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -499,7 +497,7 @@ def test_raw_response_create_overload_6(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -514,7 +512,7 @@ def test_streaming_response_create_overload_6(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -546,7 +544,7 @@ def test_method_create_overload_7(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -567,7 +565,7 @@ def test_method_create_with_all_params_overload_7(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -582,7 +580,7 @@ def test_raw_response_create_overload_7(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -597,7 +595,7 @@ def test_streaming_response_create_overload_7(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -629,7 +627,7 @@ def test_method_create_overload_8(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -656,7 +654,7 @@ def test_method_create_with_all_params_overload_8(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -671,7 +669,7 @@ def test_raw_response_create_overload_8(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -686,7 +684,7 @@ def test_streaming_response_create_overload_8(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -718,7 +716,7 @@ def test_method_create_overload_9(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -743,7 +741,7 @@ def test_method_create_with_all_params_overload_9(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -758,7 +756,7 @@ def test_raw_response_create_overload_9(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -773,7 +771,7 @@ def test_streaming_response_create_overload_9(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -805,7 +803,7 @@ def test_method_create_overload_10(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -829,7 +827,7 @@ def test_method_create_with_all_params_overload_10(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -844,7 +842,7 @@ def test_raw_response_create_overload_10(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -859,7 +857,7 @@ def test_streaming_response_create_overload_10(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -891,7 +889,7 @@ def test_method_create_overload_11(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -915,7 +913,7 @@ def test_method_create_with_all_params_overload_11(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -930,7 +928,7 @@ def test_raw_response_create_overload_11(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -945,7 +943,7 @@ def test_streaming_response_create_overload_11(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -977,7 +975,7 @@ def test_method_create_overload_12(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1016,7 +1014,7 @@ def test_method_create_with_all_params_overload_12(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1031,7 +1029,7 @@ def test_raw_response_create_overload_12(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1046,7 +1044,7 @@ def test_streaming_response_create_overload_12(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1078,7 +1076,7 @@ def test_method_create_overload_13(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1099,7 +1097,7 @@ def test_method_create_with_all_params_overload_13(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1114,7 +1112,7 @@ def test_raw_response_create_overload_13(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1129,7 +1127,7 @@ def test_streaming_response_create_overload_13(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1161,7 +1159,7 @@ def test_method_create_overload_14(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1179,7 +1177,7 @@ def test_method_create_with_all_params_overload_14(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1194,7 +1192,7 @@ def test_raw_response_create_overload_14(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1209,7 +1207,7 @@ def test_streaming_response_create_overload_14(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1242,7 +1240,7 @@ def test_method_update_overload_1(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1270,7 +1268,7 @@ def test_method_update_with_all_params_overload_1(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1286,7 +1284,7 @@ def test_raw_response_update_overload_1(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1302,7 +1300,7 @@ def test_streaming_response_update_overload_1(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1346,7 +1344,7 @@ def test_method_update_overload_2(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1372,7 +1370,7 @@ def test_method_update_with_all_params_overload_2(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1388,7 +1386,7 @@ def test_raw_response_update_overload_2(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1404,7 +1402,7 @@ def test_streaming_response_update_overload_2(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1448,7 +1446,7 @@ def test_method_update_overload_3(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1470,7 +1468,7 @@ def test_method_update_with_all_params_overload_3(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1486,7 +1484,7 @@ def test_raw_response_update_overload_3(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1502,7 +1500,7 @@ def test_streaming_response_update_overload_3(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1546,7 +1544,7 @@ def test_method_update_overload_4(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1568,7 +1566,7 @@ def test_method_update_with_all_params_overload_4(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1584,7 +1582,7 @@ def test_raw_response_update_overload_4(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1600,7 +1598,7 @@ def test_streaming_response_update_overload_4(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1644,7 +1642,7 @@ def test_method_update_overload_5(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1668,7 +1666,7 @@ def test_method_update_with_all_params_overload_5(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1684,7 +1682,7 @@ def test_raw_response_update_overload_5(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1700,7 +1698,7 @@ def test_streaming_response_update_overload_5(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1744,7 +1742,7 @@ def test_method_update_overload_6(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1769,7 +1767,7 @@ def test_method_update_with_all_params_overload_6(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1785,7 +1783,7 @@ def test_raw_response_update_overload_6(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1801,7 +1799,7 @@ def test_streaming_response_update_overload_6(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1845,7 +1843,7 @@ def test_method_update_overload_7(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1867,7 +1865,7 @@ def test_method_update_with_all_params_overload_7(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1883,7 +1881,7 @@ def test_raw_response_update_overload_7(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1899,7 +1897,7 @@ def test_streaming_response_update_overload_7(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -1943,7 +1941,7 @@ def test_method_update_overload_8(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1971,7 +1969,7 @@ def test_method_update_with_all_params_overload_8(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -1987,7 +1985,7 @@ def test_raw_response_update_overload_8(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2003,7 +2001,7 @@ def test_streaming_response_update_overload_8(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2047,7 +2045,7 @@ def test_method_update_overload_9(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2073,7 +2071,7 @@ def test_method_update_with_all_params_overload_9(self, client: Cloudflare) -> N "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2089,7 +2087,7 @@ def test_raw_response_update_overload_9(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2105,7 +2103,7 @@ def test_streaming_response_update_overload_9(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2149,7 +2147,7 @@ def test_method_update_overload_10(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2174,7 +2172,7 @@ def test_method_update_with_all_params_overload_10(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2190,7 +2188,7 @@ def test_raw_response_update_overload_10(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2206,7 +2204,7 @@ def test_streaming_response_update_overload_10(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2250,7 +2248,7 @@ def test_method_update_overload_11(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2275,7 +2273,7 @@ def test_method_update_with_all_params_overload_11(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2291,7 +2289,7 @@ def test_raw_response_update_overload_11(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2307,7 +2305,7 @@ def test_streaming_response_update_overload_11(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2351,7 +2349,7 @@ def test_method_update_overload_12(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2391,7 +2389,7 @@ def test_method_update_with_all_params_overload_12(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2407,7 +2405,7 @@ def test_raw_response_update_overload_12(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2423,7 +2421,7 @@ def test_streaming_response_update_overload_12(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2467,7 +2465,7 @@ def test_method_update_overload_13(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2489,7 +2487,7 @@ def test_method_update_with_all_params_overload_13(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2505,7 +2503,7 @@ def test_raw_response_update_overload_13(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2521,7 +2519,7 @@ def test_streaming_response_update_overload_13(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2565,7 +2563,7 @@ def test_method_update_overload_14(self, client: Cloudflare) -> None: type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2584,7 +2582,7 @@ def test_method_update_with_all_params_overload_14(self, client: Cloudflare) -> "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2600,7 +2598,7 @@ def test_raw_response_update_overload_14(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2616,7 +2614,7 @@ def test_streaming_response_update_overload_14(self, client: Cloudflare) -> None assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2779,7 +2777,7 @@ def test_method_get(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="string", ) - assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2788,7 +2786,7 @@ def test_method_get_with_all_params(self, client: Cloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="string", ) - assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2801,7 +2799,7 @@ def test_raw_response_get(self, client: Cloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2814,7 +2812,7 @@ def test_streaming_response_get(self, client: Cloudflare) -> None: assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = response.parse() - assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2852,7 +2850,7 @@ async def test_method_create_overload_1(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2879,7 +2877,7 @@ async def test_method_create_with_all_params_overload_1(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2894,7 +2892,7 @@ async def test_raw_response_create_overload_1(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2909,7 +2907,7 @@ async def test_streaming_response_create_overload_1(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -2941,7 +2939,7 @@ async def test_method_create_overload_2(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2966,7 +2964,7 @@ async def test_method_create_with_all_params_overload_2(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2981,7 +2979,7 @@ async def test_raw_response_create_overload_2(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -2996,7 +2994,7 @@ async def test_streaming_response_create_overload_2(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3028,7 +3026,7 @@ async def test_method_create_overload_3(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3049,7 +3047,7 @@ async def test_method_create_with_all_params_overload_3(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3064,7 +3062,7 @@ async def test_raw_response_create_overload_3(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3079,7 +3077,7 @@ async def test_streaming_response_create_overload_3(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3111,7 +3109,7 @@ async def test_method_create_overload_4(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3132,7 +3130,7 @@ async def test_method_create_with_all_params_overload_4(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3147,7 +3145,7 @@ async def test_raw_response_create_overload_4(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3162,7 +3160,7 @@ async def test_streaming_response_create_overload_4(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3194,7 +3192,7 @@ async def test_method_create_overload_5(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3217,7 +3215,7 @@ async def test_method_create_with_all_params_overload_5(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3232,7 +3230,7 @@ async def test_raw_response_create_overload_5(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3247,7 +3245,7 @@ async def test_streaming_response_create_overload_5(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3279,7 +3277,7 @@ async def test_method_create_overload_6(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3303,7 +3301,7 @@ async def test_method_create_with_all_params_overload_6(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3318,7 +3316,7 @@ async def test_raw_response_create_overload_6(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3333,7 +3331,7 @@ async def test_streaming_response_create_overload_6(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3365,7 +3363,7 @@ async def test_method_create_overload_7(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3386,7 +3384,7 @@ async def test_method_create_with_all_params_overload_7(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3401,7 +3399,7 @@ async def test_raw_response_create_overload_7(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3416,7 +3414,7 @@ async def test_streaming_response_create_overload_7(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3448,7 +3446,7 @@ async def test_method_create_overload_8(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3475,7 +3473,7 @@ async def test_method_create_with_all_params_overload_8(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3490,7 +3488,7 @@ async def test_raw_response_create_overload_8(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3505,7 +3503,7 @@ async def test_streaming_response_create_overload_8(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3537,7 +3535,7 @@ async def test_method_create_overload_9(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3562,7 +3560,7 @@ async def test_method_create_with_all_params_overload_9(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3577,7 +3575,7 @@ async def test_raw_response_create_overload_9(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3592,7 +3590,7 @@ async def test_streaming_response_create_overload_9(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3624,7 +3622,7 @@ async def test_method_create_overload_10(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3648,7 +3646,7 @@ async def test_method_create_with_all_params_overload_10(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3663,7 +3661,7 @@ async def test_raw_response_create_overload_10(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3678,7 +3676,7 @@ async def test_streaming_response_create_overload_10(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3710,7 +3708,7 @@ async def test_method_create_overload_11(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3734,7 +3732,7 @@ async def test_method_create_with_all_params_overload_11(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3749,7 +3747,7 @@ async def test_raw_response_create_overload_11(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3764,7 +3762,7 @@ async def test_streaming_response_create_overload_11(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3796,7 +3794,7 @@ async def test_method_create_overload_12(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3835,7 +3833,7 @@ async def test_method_create_with_all_params_overload_12(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3850,7 +3848,7 @@ async def test_raw_response_create_overload_12(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3865,7 +3863,7 @@ async def test_streaming_response_create_overload_12(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3897,7 +3895,7 @@ async def test_method_create_overload_13(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3918,7 +3916,7 @@ async def test_method_create_with_all_params_overload_13(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3933,7 +3931,7 @@ async def test_raw_response_create_overload_13(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3948,7 +3946,7 @@ async def test_streaming_response_create_overload_13(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -3980,7 +3978,7 @@ async def test_method_create_overload_14(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -3998,7 +3996,7 @@ async def test_method_create_with_all_params_overload_14(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4013,7 +4011,7 @@ async def test_raw_response_create_overload_14(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4028,7 +4026,7 @@ async def test_streaming_response_create_overload_14(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderCreateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4061,7 +4059,7 @@ async def test_method_update_overload_1(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4089,7 +4087,7 @@ async def test_method_update_with_all_params_overload_1(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4105,7 +4103,7 @@ async def test_raw_response_update_overload_1(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4121,7 +4119,7 @@ async def test_streaming_response_update_overload_1(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4165,7 +4163,7 @@ async def test_method_update_overload_2(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4191,7 +4189,7 @@ async def test_method_update_with_all_params_overload_2(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4207,7 +4205,7 @@ async def test_raw_response_update_overload_2(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4223,7 +4221,7 @@ async def test_streaming_response_update_overload_2(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4267,7 +4265,7 @@ async def test_method_update_overload_3(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4289,7 +4287,7 @@ async def test_method_update_with_all_params_overload_3(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4305,7 +4303,7 @@ async def test_raw_response_update_overload_3(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4321,7 +4319,7 @@ async def test_streaming_response_update_overload_3(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4365,7 +4363,7 @@ async def test_method_update_overload_4(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4387,7 +4385,7 @@ async def test_method_update_with_all_params_overload_4(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4403,7 +4401,7 @@ async def test_raw_response_update_overload_4(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4419,7 +4417,7 @@ async def test_streaming_response_update_overload_4(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4463,7 +4461,7 @@ async def test_method_update_overload_5(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4487,7 +4485,7 @@ async def test_method_update_with_all_params_overload_5(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4503,7 +4501,7 @@ async def test_raw_response_update_overload_5(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4519,7 +4517,7 @@ async def test_streaming_response_update_overload_5(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4563,7 +4561,7 @@ async def test_method_update_overload_6(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4588,7 +4586,7 @@ async def test_method_update_with_all_params_overload_6(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4604,7 +4602,7 @@ async def test_raw_response_update_overload_6(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4620,7 +4618,7 @@ async def test_streaming_response_update_overload_6(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4664,7 +4662,7 @@ async def test_method_update_overload_7(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4686,7 +4684,7 @@ async def test_method_update_with_all_params_overload_7(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4702,7 +4700,7 @@ async def test_raw_response_update_overload_7(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4718,7 +4716,7 @@ async def test_streaming_response_update_overload_7(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4762,7 +4760,7 @@ async def test_method_update_overload_8(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4790,7 +4788,7 @@ async def test_method_update_with_all_params_overload_8(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4806,7 +4804,7 @@ async def test_raw_response_update_overload_8(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4822,7 +4820,7 @@ async def test_streaming_response_update_overload_8(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4866,7 +4864,7 @@ async def test_method_update_overload_9(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4892,7 +4890,7 @@ async def test_method_update_with_all_params_overload_9(self, async_client: Asyn "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4908,7 +4906,7 @@ async def test_raw_response_update_overload_9(self, async_client: AsyncCloudflar assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4924,7 +4922,7 @@ async def test_streaming_response_update_overload_9(self, async_client: AsyncClo assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -4968,7 +4966,7 @@ async def test_method_update_overload_10(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -4993,7 +4991,7 @@ async def test_method_update_with_all_params_overload_10(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5009,7 +5007,7 @@ async def test_raw_response_update_overload_10(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5025,7 +5023,7 @@ async def test_streaming_response_update_overload_10(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5069,7 +5067,7 @@ async def test_method_update_overload_11(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5094,7 +5092,7 @@ async def test_method_update_with_all_params_overload_11(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5110,7 +5108,7 @@ async def test_raw_response_update_overload_11(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5126,7 +5124,7 @@ async def test_streaming_response_update_overload_11(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5170,7 +5168,7 @@ async def test_method_update_overload_12(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5210,7 +5208,7 @@ async def test_method_update_with_all_params_overload_12(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5226,7 +5224,7 @@ async def test_raw_response_update_overload_12(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5242,7 +5240,7 @@ async def test_streaming_response_update_overload_12(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5286,7 +5284,7 @@ async def test_method_update_overload_13(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5308,7 +5306,7 @@ async def test_method_update_with_all_params_overload_13(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5324,7 +5322,7 @@ async def test_raw_response_update_overload_13(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5340,7 +5338,7 @@ async def test_streaming_response_update_overload_13(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5384,7 +5382,7 @@ async def test_method_update_overload_14(self, async_client: AsyncCloudflare) -> type="onetimepin", account_id="string", ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5403,7 +5401,7 @@ async def test_method_update_with_all_params_overload_14(self, async_client: Asy "user_deprovision": True, }, ) - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5419,7 +5417,7 @@ async def test_raw_response_update_overload_14(self, async_client: AsyncCloudfla assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5435,7 +5433,7 @@ async def test_streaming_response_update_overload_14(self, async_client: AsyncCl assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderUpdateResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True @@ -5598,7 +5596,7 @@ async def test_method_get(self, async_client: AsyncCloudflare) -> None: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="string", ) - assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5607,7 +5605,7 @@ async def test_method_get_with_all_params(self, async_client: AsyncCloudflare) - "f174e90a-fafe-4643-bbbc-4a0ed4fc8415", account_id="string", ) - assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5620,7 +5618,7 @@ async def test_raw_response_get(self, async_client: AsyncCloudflare) -> None: assert response.is_closed is True assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) @pytest.mark.skip(reason="TODO: investigate broken test") @parametrize @@ -5633,7 +5631,7 @@ async def test_streaming_response_get(self, async_client: AsyncCloudflare) -> No assert response.http_request.headers.get("X-Stainless-Lang") == "python" identity_provider = await response.parse() - assert_matches_type(Optional[IdentityProviderGetResponse], identity_provider, path=["response"]) + assert_matches_type(Optional[IdentityProvider], identity_provider, path=["response"]) assert cast(Any, response.is_closed) is True