Skip to content

Commit ff93dde

Browse files
stainless-app[bot]stainless-bot
authored andcommitted
feat(api): OpenAPI spec update via Stainless API (#172)
1 parent d5e5eb5 commit ff93dde

File tree

4 files changed

+31
-0
lines changed

4 files changed

+31
-0
lines changed

src/cloudflare/types/zero_trust/access/access_apps.py

+9
Original file line numberDiff line numberDiff line change
@@ -242,6 +242,15 @@ class SaaSApplicationSaasAppAccessSamlSaasApp(BaseModel):
242242
public_key: Optional[str] = None
243243
"""The Access public certificate that will be used to verify your identity."""
244244

245+
saml_attribute_transform_jsonata: Optional[str] = None
246+
"""
247+
A [JSONata] (https://jsonata.org/) expression that transforms an application's
248+
user identities into attribute assertions in the SAML response. The expression
249+
can transform id, email, name, and groups values. It can also transform fields
250+
listed in the saml_attributes or oidc_fields of the identity provider used to
251+
authenticate. The output of this expression must be a JSON object.
252+
"""
253+
245254
sp_entity_id: Optional[str] = None
246255
"""A globally unique name for an identity or service provider."""
247256

src/cloudflare/types/zero_trust/access/application_create_params.py

+9
Original file line numberDiff line numberDiff line change
@@ -276,6 +276,15 @@ class SaaSApplicationSaasAppAccessSamlSaasApp(TypedDict, total=False):
276276
public_key: str
277277
"""The Access public certificate that will be used to verify your identity."""
278278

279+
saml_attribute_transform_jsonata: str
280+
"""
281+
A [JSONata] (https://jsonata.org/) expression that transforms an application's
282+
user identities into attribute assertions in the SAML response. The expression
283+
can transform id, email, name, and groups values. It can also transform fields
284+
listed in the saml_attributes or oidc_fields of the identity provider used to
285+
authenticate. The output of this expression must be a JSON object.
286+
"""
287+
279288
sp_entity_id: str
280289
"""A globally unique name for an identity or service provider."""
281290

src/cloudflare/types/zero_trust/access/application_update_params.py

+9
Original file line numberDiff line numberDiff line change
@@ -276,6 +276,15 @@ class SaaSApplicationSaasAppAccessSamlSaasApp(TypedDict, total=False):
276276
public_key: str
277277
"""The Access public certificate that will be used to verify your identity."""
278278

279+
saml_attribute_transform_jsonata: str
280+
"""
281+
A [JSONata] (https://jsonata.org/) expression that transforms an application's
282+
user identities into attribute assertions in the SAML response. The expression
283+
can transform id, email, name, and groups values. It can also transform fields
284+
listed in the saml_attributes or oidc_fields of the identity provider used to
285+
authenticate. The output of this expression must be a JSON object.
286+
"""
287+
279288
sp_entity_id: str
280289
"""A globally unique name for an identity or service provider."""
281290

tests/api_resources/zero_trust/access/test_applications.py

+4
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,7 @@ def test_method_create_with_all_params_overload_2(self, client: Cloudflare) -> N
173173
"name_id_format": "id",
174174
"name_id_transform_jsonata": "$substringBefore(email, '@') & '+sandbox@' & $substringAfter(email, '@')",
175175
"public_key": "example unique name",
176+
"saml_attribute_transform_jsonata": "$ ~>| groups | {'group_name': name} |",
176177
"sp_entity_id": "example unique name",
177178
"sso_endpoint": "https://example.cloudflareaccess.com/cdn-cgi/access/sso/saml/b3f58a2b414e0b51d45c8c2af26fccca0e27c63763c426fa52f98dcf0b3b3bfd",
178179
},
@@ -893,6 +894,7 @@ def test_method_update_with_all_params_overload_2(self, client: Cloudflare) -> N
893894
"name_id_format": "id",
894895
"name_id_transform_jsonata": "$substringBefore(email, '@') & '+sandbox@' & $substringAfter(email, '@')",
895896
"public_key": "example unique name",
897+
"saml_attribute_transform_jsonata": "$ ~>| groups | {'group_name': name} |",
896898
"sp_entity_id": "example unique name",
897899
"sso_endpoint": "https://example.cloudflareaccess.com/cdn-cgi/access/sso/saml/b3f58a2b414e0b51d45c8c2af26fccca0e27c63763c426fa52f98dcf0b3b3bfd",
898900
},
@@ -1911,6 +1913,7 @@ async def test_method_create_with_all_params_overload_2(self, async_client: Asyn
19111913
"name_id_format": "id",
19121914
"name_id_transform_jsonata": "$substringBefore(email, '@') & '+sandbox@' & $substringAfter(email, '@')",
19131915
"public_key": "example unique name",
1916+
"saml_attribute_transform_jsonata": "$ ~>| groups | {'group_name': name} |",
19141917
"sp_entity_id": "example unique name",
19151918
"sso_endpoint": "https://example.cloudflareaccess.com/cdn-cgi/access/sso/saml/b3f58a2b414e0b51d45c8c2af26fccca0e27c63763c426fa52f98dcf0b3b3bfd",
19161919
},
@@ -2631,6 +2634,7 @@ async def test_method_update_with_all_params_overload_2(self, async_client: Asyn
26312634
"name_id_format": "id",
26322635
"name_id_transform_jsonata": "$substringBefore(email, '@') & '+sandbox@' & $substringAfter(email, '@')",
26332636
"public_key": "example unique name",
2637+
"saml_attribute_transform_jsonata": "$ ~>| groups | {'group_name': name} |",
26342638
"sp_entity_id": "example unique name",
26352639
"sso_endpoint": "https://example.cloudflareaccess.com/cdn-cgi/access/sso/saml/b3f58a2b414e0b51d45c8c2af26fccca0e27c63763c426fa52f98dcf0b3b3bfd",
26362640
},

0 commit comments

Comments
 (0)