Skip to content

Commit

Permalink
feat(api): api update (#2217)
Browse files Browse the repository at this point in the history
  • Loading branch information
stainless-app[bot] authored and meorphis committed Jan 13, 2025
1 parent 72247d2 commit d0a4299
Show file tree
Hide file tree
Showing 2 changed files with 49 additions and 17 deletions.
2 changes: 1 addition & 1 deletion .stats.yml
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
configured_endpoints: 1448
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-5d9269029aa80ea06158ff1156ec30914cbeca10b8893ba9ef2df46511e10aae.yml
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/cloudflare%2Fcloudflare-0530d6510c5b139af850d24a4f932d5139c8d321a955ffa101b0debafbd75465.yml
64 changes: 48 additions & 16 deletions src/resources/zero-trust/identity-providers.ts
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ export class IdentityProviders extends APIResource {
if (isRequestOptions(params)) {
return this.list({}, params);
}
const { account_id, zone_id } = params;
const { account_id, zone_id, ...query } = params;
if (!account_id && !zone_id) {
throw new CloudflareError('You must provide either account_id or zone_id.');
}
Expand All @@ -110,7 +110,7 @@ export class IdentityProviders extends APIResource {
return this._client.getAPIList(
`/${accountOrZone}/${accountOrZoneId}/access/identity_providers`,
IdentityProviderListResponsesSinglePage,
options,
{ query, ...options },
);
}

Expand Down Expand Up @@ -696,6 +696,11 @@ export namespace IdentityProvider {
*/
email_claim_name?: string;

/**
* Enable Proof Key for Code Exchange (PKCE)
*/
pkce_enabled?: boolean;

/**
* OAuth scopes
*/
Expand Down Expand Up @@ -1091,13 +1096,15 @@ export interface IdentityProviderSCIMConfig {
enabled?: boolean;

/**
* Indicates how a SCIM event updates an Access identity. Use "automatic" to
* automatically update a user's Access identity and augment it with fields from
* the SCIM user resource. Use "reauth" to force re-authentication on group
* membership updates. With "reauth" Access identities will not contain fields from
* the SCIM user resource.
* Indicates how a SCIM event updates a user identity used for policy evaluation.
* Use "automatic" to automatically update a user's identity and augment it with
* fields from the SCIM user resource. Use "reauth" to force re-authentication on
* group membership updates, user identity update will only occur after successful
* re-authentication. With "reauth" identities will not contain fields from the
* SCIM user resource. With "no_action" identities will not be changed by SCIM
* updates in any way and users will not be prompted to reauthenticate.
*/
identity_update_behavior?: 'automatic' | 'reauth';
identity_update_behavior?: 'automatic' | 'reauth' | 'no_action';

/**
* A flag to remove a user's seat in Zero Trust when they have been deprovisioned
Expand Down Expand Up @@ -1131,13 +1138,15 @@ export interface IdentityProviderSCIMConfigParam {
enabled?: boolean;

/**
* Indicates how a SCIM event updates an Access identity. Use "automatic" to
* automatically update a user's Access identity and augment it with fields from
* the SCIM user resource. Use "reauth" to force re-authentication on group
* membership updates. With "reauth" Access identities will not contain fields from
* the SCIM user resource.
* Indicates how a SCIM event updates a user identity used for policy evaluation.
* Use "automatic" to automatically update a user's identity and augment it with
* fields from the SCIM user resource. Use "reauth" to force re-authentication on
* group membership updates, user identity update will only occur after successful
* re-authentication. With "reauth" identities will not contain fields from the
* SCIM user resource. With "no_action" identities will not be changed by SCIM
* updates in any way and users will not be prompted to reauthenticate.
*/
identity_update_behavior?: 'automatic' | 'reauth';
identity_update_behavior?: 'automatic' | 'reauth' | 'no_action';

/**
* A flag to remove a user's seat in Zero Trust when they have been deprovisioned
Expand Down Expand Up @@ -1574,6 +1583,11 @@ export namespace IdentityProviderListResponse {
*/
email_claim_name?: string;

/**
* Enable Proof Key for Code Exchange (PKCE)
*/
pkce_enabled?: boolean;

/**
* OAuth scopes
*/
Expand Down Expand Up @@ -2446,6 +2460,11 @@ export namespace IdentityProviderCreateParams {
*/
email_claim_name?: string;

/**
* Enable Proof Key for Code Exchange (PKCE)
*/
pkce_enabled?: boolean;

/**
* OAuth scopes
*/
Expand Down Expand Up @@ -3394,6 +3413,11 @@ export namespace IdentityProviderUpdateParams {
*/
email_claim_name?: string;

/**
* Enable Proof Key for Code Exchange (PKCE)
*/
pkce_enabled?: boolean;

/**
* OAuth scopes
*/
Expand Down Expand Up @@ -3820,14 +3844,22 @@ export namespace IdentityProviderUpdateParams {

export interface IdentityProviderListParams {
/**
* The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
* Path param: The Account ID to use for this endpoint. Mutually exclusive with the
* Zone ID.
*/
account_id?: string;

/**
* The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
* Path param: The Zone ID to use for this endpoint. Mutually exclusive with the
* Account ID.
*/
zone_id?: string;

/**
* Query param: Indicates to Access to only retrieve identity providers that have
* the System for Cross-Domain Identity Management (SCIM) enabled.
*/
scim_enabled?: string;
}

export interface IdentityProviderDeleteParams {
Expand Down

0 comments on commit d0a4299

Please sign in to comment.